{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T04:28:12Z","timestamp":1688185692925},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2013,4,18]],"date-time":"2013-04-18T00:00:00Z","timestamp":1366243200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comb Optim"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1007\/s10878-013-9616-x","type":"journal-article","created":{"date-parts":[[2013,4,17]],"date-time":"2013-04-17T10:46:32Z","timestamp":1366195592000},"page":"685-700","source":"Crossref","is-referenced-by-count":1,"title":["Loyalty improvement beyond the seeds in social networks"],"prefix":"10.1007","volume":"29","author":[{"given":"Huan","family":"Ma","sequence":"first","affiliation":[]},{"given":"Yuqing","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Deying","family":"Li","sequence":"additional","affiliation":[]},{"given":"Songsong","family":"Li","sequence":"additional","affiliation":[]},{"given":"Weili","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,18]]},"reference":[{"key":"9616_CR1","doi-asserted-by":"crossref","unstructured":"Blondel VD, Guillaume J, Lambiotte R (2008) Lefebvre E (2008) Fast unfolding of communities in large networks. J Stat Mech: Theory Exp. doi: 10.1088\/1742-5468\/2008\/10\/P10008","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"9616_CR2","doi-asserted-by":"crossref","unstructured":"Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: The sixth workshop on Internet and network economics","DOI":"10.1007\/978-3-642-17572-5_48"},{"key":"9616_CR3","doi-asserted-by":"crossref","unstructured":"Cao TY, Wu XD, Wang S, Hu XH (2010) OASNET: an optimal allocation approach to influence maximization in modular social networks. In: SAC","DOI":"10.1145\/1774088.1774314"},{"key":"9616_CR4","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010a) Scalable influence maximization for prevalent viral marketing in large scale social networks. In: KDD","DOI":"10.1145\/1835804.1835934"},{"key":"9616_CR5","doi-asserted-by":"crossref","unstructured":"Chen W, Yuan Y, Zhang L (2010b) Scalable influence maximization in social networks under the linear threshold model. In: ICDM, pp 88\u201397","DOI":"10.1109\/ICDM.2010.118"},{"key":"9616_CR6","doi-asserted-by":"crossref","unstructured":"Domingos P, Richardson M (2001) Mining the network value of customers. In: KDD, pp 57\u201366","DOI":"10.1145\/502512.502525"},{"issue":"5","key":"9616_CR7","first-page":"1","volume":"79","author":"A Galstyan","year":"2009","unstructured":"Galstyan A, Musoyan V, Cohen P (2009) Maximizing influence propagation in networks with community structure. Phys Rev Lett 79(5):1\u20137","journal-title":"Phys Rev Lett"},{"key":"9616_CR8","doi-asserted-by":"crossref","unstructured":"Goyal A, Lu W, Lakshmanan LVS (2011) An efficient algorithm for influence maximization under the linear threshold model. In: ICDM","DOI":"10.1109\/ICDM.2011.132"},{"key":"9616_CR9","doi-asserted-by":"crossref","unstructured":"Jiang QY, Song GJ, Cong G, Wang Y, Si WJ, Xie KQ (2011) Simulated annealing based influence maximization in social networks. In: AAAI","DOI":"10.1609\/aaai.v25i1.7838"},{"issue":"3","key":"9616_CR10","doi-asserted-by":"crossref","first-page":"328","DOI":"10.2307\/2094293","volume":"39","author":"JD Kasarda","year":"1974","unstructured":"Kasarda JD, Janowitz M (1974) Community attachment in mass society. Am Sociol Rev 39(3):328\u2013339","journal-title":"Am Sociol Rev"},{"key":"9616_CR11","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg JM, Tardos \u00c9 (2003) Maximizing the spread of influence through a social network. In: KDD","DOI":"10.1145\/956750.956769"},{"key":"9616_CR12","unstructured":"Kimura M, Saito K, Nakano R (2007) Extracting influential nodes for information diffusion on a social network. In: AAAI"},{"issue":"3","key":"9616_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.2307\/1249783","volume":"35","author":"P Kotler","year":"1971","unstructured":"Kotler P, Zaltman G (1971) Social marketing: an approach to planned social change. J Mark 35(3):3\u201312","journal-title":"J Mark"},{"key":"9616_CR14","volume-title":"Fostering sustainable behavior: an introduction to community based social marketing","author":"D McKenzie Mohr","year":"1999","unstructured":"McKenzie Mohr D, Smith W (1999) Fostering sustainable behavior: an introduction to community based social marketing. New Society Publishers, Gabriola Island"},{"key":"9616_CR15","doi-asserted-by":"crossref","unstructured":"Pathak N, Banerjee A, Srivastava J (2010) A generalized linear threshold model for multiple cascades. In: ICDM","DOI":"10.1109\/ICDM.2010.153"},{"key":"9616_CR16","doi-asserted-by":"crossref","unstructured":"Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: KDD, pp 61\u201370","DOI":"10.1145\/775056.775057"},{"issue":"4","key":"9616_CR17","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1086\/229068","volume":"94","author":"RJ Sampson","year":"1989","unstructured":"Sampson RJ, Groves WB (1989) Community structure and crime: testing social disorganization theory. Am J Sociol 94(4):774","journal-title":"Am J Sociol"},{"key":"9616_CR18","doi-asserted-by":"crossref","unstructured":"Wang Y, Cong G, Song GJ, Xie KQ (2010) Community-based greedy algorithm for mining top-K influential nodes in mobile social networks. In: KDD","DOI":"10.1145\/1835804.1835935"}],"container-title":["Journal of Combinatorial Optimization"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-013-9616-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10878-013-9616-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10878-013-9616-x","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,1]],"date-time":"2023-07-01T03:47:15Z","timestamp":1688183235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10878-013-9616-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,18]]},"references-count":18,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2015,5]]}},"alternative-id":["9616"],"URL":"https:\/\/doi.org\/10.1007\/s10878-013-9616-x","relation":{},"ISSN":["1382-6905","1573-2886"],"issn-type":[{"value":"1382-6905","type":"print"},{"value":"1573-2886","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,18]]}}}