{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:20:09Z","timestamp":1744258809217,"version":"3.40.4"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"8","license":[{"start":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T00:00:00Z","timestamp":1672358400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T00:00:00Z","timestamp":1672358400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100004663","name":"Ministry of Science and Technology, Taiwan","doi-asserted-by":"publisher","award":["108-2923-E-009-008-MY2"],"award-info":[{"award-number":["108-2923-E-009-008-MY2"]}],"id":[{"id":"10.13039\/501100004663","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Optim Lett"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s11590-022-01963-w","type":"journal-article","created":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T10:12:20Z","timestamp":1672395140000},"page":"1853-1872","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["On the firefighter problem with spreading vaccination for maximizing the number of saved nodes: the IP model and LP rounding algorithms"],"prefix":"10.1007","volume":"17","author":[{"given":"Yongge","family":"Yang","sequence":"first","affiliation":[]},{"given":"Po-An","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Yu-Ching","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Yung-Yan","family":"Fanchiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,30]]},"reference":[{"issue":"7802","key":"1963_CR1","doi-asserted-by":"publisher","first-page":"316","DOI":"10.1038\/d41586-020-01003-6","volume":"580","author":"D Adam","year":"2020","unstructured":"Adam, D.: Special report: the simulations driving the world\u2019s response to covid-19. Nature 580(7802), 316\u2013319 (2020)","journal-title":"Nature"},{"key":"1963_CR2","doi-asserted-by":"crossref","unstructured":"Anshelevich, E., Chakrabarty, D., Hate, A., Swamy, C.: Approximability of the firefighter problem: Computing cuts over time. In: Proceedings of the 20th International Symposium on Algorithms and Computation, pp. 974\u2013983 (2009)","DOI":"10.1007\/978-3-642-10631-6_98"},{"issue":"6","key":"1963_CR3","doi-asserted-by":"publisher","first-page":"1077","DOI":"10.1016\/j.jcss.2006.02.003","volume":"72","author":"J Aspnes","year":"2006","unstructured":"Aspnes, J., Chang, K., Yampolskiy, A.: Inoculation strategies for victims of viruses and the sum-of-squares partition problem. J. Comput. Syst. Sci. 72(6), 1077\u20131093 (2006)","journal-title":"J. Comput. Syst. Sci."},{"key":"1963_CR4","doi-asserted-by":"crossref","unstructured":"Cai, L., Verbin, E., Yang, L.: Firefighting on trees: $$(1- 1\/e)$$-approximation, fixed parameter tractability and a subexponential algorithm. In: International Symposium on Algorithms and Computation, pp. 258\u2013269. Springer (2008)","DOI":"10.1007\/978-3-540-92182-0_25"},{"issue":"6","key":"1963_CR5","doi-asserted-by":"publisher","first-page":"1740","DOI":"10.1137\/080733991","volume":"40","author":"G Calinescu","year":"2011","unstructured":"Calinescu, G., Chekuri, C., Pal, M., Vondr\u00e1k, J.: Maximizing a monotone submodular function subject to a matroid constraint. SIAM J. Comput. 40(6), 1740\u20131766 (2011)","journal-title":"SIAM J. Comput."},{"key":"1963_CR6","doi-asserted-by":"crossref","unstructured":"Chen, P.-A., David, M., Kempe, D.: Better vaccination strategies for better people. In: Proceedings of the 11th ACM conference on Electronic commerce, pp. 179\u2013188 (2010)","DOI":"10.1145\/1807342.1807370"},{"issue":"1","key":"1963_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1186\/s12911-019-1002-x","volume":"20","author":"C-H Cheng","year":"2020","unstructured":"Cheng, C.-H., Kuo, Y.-H., Zhou, Z.: Outbreak minimization vs influence maximization: an optimization framework. BMC Med. Inf. Decis. Mak. 20(1), 1\u201313 (2020)","journal-title":"BMC Med. Inf. Decis. Mak."},{"issue":"2","key":"1963_CR8","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1111\/j.1365-2664.2007.01439.x","volume":"45","author":"D Eisinger","year":"2008","unstructured":"Eisinger, D., Thulke, H.-H.: Spatial pattern formation facilitates eradication of infectious diseases. J. Appl. Ecol. 45(2), 415 (2008)","journal-title":"J. Appl. Ecol."},{"key":"1963_CR9","first-page":"57","volume":"43","author":"S Finbow","year":"2009","unstructured":"Finbow, S., MacGillivray, G.: The firefighter problem: a survey of results, directions and questions. Australas. J Comb. 43, 57\u201378 (2009)","journal-title":"Australas. J Comb."},{"key":"1963_CR10","doi-asserted-by":"crossref","unstructured":"Hartke, S.G.: Attempting to narrow the integrality gap for the firefighter problem on trees. In: Discrete Methods in Epidemiology, pp. 225\u2013231 (2004)","DOI":"10.1090\/dimacs\/070\/11"},{"issue":"4","key":"1963_CR11","doi-asserted-by":"publisher","first-page":"599","DOI":"10.1137\/S0036144500371907","volume":"42","author":"HW Hethcote","year":"2000","unstructured":"Hethcote, H.W.: The mathematics of infectious diseases. SIAM Rev. 42(4), 599\u2013653 (2000)","journal-title":"SIAM Rev."},{"issue":"772","key":"1963_CR12","first-page":"700","volume":"115","author":"W.O. Kermack","year":"1927","unstructured":"Kermack, W..O.., McKendrick, A.G.: A contribution to the mathematical theory of epidemics. Proc. Royal Soc. London Ser. A Contain. Papers Math. Phys. Character 115(772), 700\u2013721 (1927)","journal-title":"Proc. Royal Soc. London Ser. A Contain. Papers Math. Phys. Character"},{"key":"1963_CR13","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Andreas, K., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 420\u2013429 (2007)","DOI":"10.1145\/1281192.1281239"},{"issue":"1","key":"1963_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2898361","volume":"8","author":"J Leskovec","year":"2016","unstructured":"Leskovec, J., Sosi\u010d, R.: Snap: a general-purpose network analysis and graph-mining library. ACM Trans. Intell. Syst. Technol. 8(1), 1 (2016)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"1963_CR15","first-page":"83","volume":"47","author":"G MacGillivray","year":"2003","unstructured":"MacGillivray, G., Wang, P.: On the firefighter problem. J. Combin. Math. Combin. Comput. 47, 83\u201396 (2003)","journal-title":"J. Combin. Math. Combin. Comput."},{"key":"1963_CR16","doi-asserted-by":"crossref","unstructured":"Rossi, R.A., Ahmed, N.K.: The network data repository with interactive graph analytics and visualization. In: AAAI (2015)","DOI":"10.1609\/aaai.v29i1.9277"},{"key":"1963_CR17","volume-title":"Approximation algorithms","author":"VV Vazirani","year":"2010","unstructured":"Vazirani, V.V.: Approximation algorithms. Springer, New York (2010)"},{"key":"1963_CR18","volume-title":"Integer and combinatorial optimization","author":"LA Wolsey","year":"1988","unstructured":"Wolsey, L.A., Nemhauser, G.L.: Integer and combinatorial optimization. Wiley, New York (1988)"},{"issue":"3","key":"1963_CR19","doi-asserted-by":"publisher","first-page":"563","DOI":"10.1007\/s10589-017-9958-x","volume":"69","author":"H-H Wu","year":"2018","unstructured":"Wu, H.-H., K\u00fc\u00e7\u00fckyavuz, S.: A two-stage stochastic programming approach for influence maximization in social networks. Comput. Optim. Appl. 69(3), 563\u2013595 (2018)","journal-title":"Comput. Optim. Appl."},{"issue":"5","key":"1963_CR20","doi-asserted-by":"publisher","first-page":"1563","DOI":"10.1007\/s11590-022-01853-1","volume":"16","author":"S Yao","year":"2022","unstructured":"Yao, S., Fan, N., Hu, J.: Modeling the spread of infectious diseases through influence maximization. Optim. Lett. 16(5), 1563\u20131586 (2022)","journal-title":"Optim. Lett."}],"container-title":["Optimization Letters"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-022-01963-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11590-022-01963-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11590-022-01963-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T14:54:41Z","timestamp":1744210481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11590-022-01963-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,30]]},"references-count":20,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1963"],"URL":"https:\/\/doi.org\/10.1007\/s11590-022-01963-w","relation":{},"ISSN":["1862-4472","1862-4480"],"issn-type":[{"type":"print","value":"1862-4472"},{"type":"electronic","value":"1862-4480"}],"subject":[],"published":{"date-parts":[[2022,12,30]]},"assertion":[{"value":"29 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 December 2022","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 December 2022","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}