{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T00:44:09Z","timestamp":1777941849393,"version":"3.51.4"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:00:00Z","timestamp":1309219200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s13278-011-0033-9","type":"journal-article","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T03:48:15Z","timestamp":1309232895000},"page":"31-37","source":"Crossref","is-referenced-by-count":28,"title":["Positive influence dominating sets in power-law graphs"],"prefix":"10.1007","volume":"2","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Weili","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Kuai","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,28]]},"reference":[{"key":"33_CR1","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1080\/10586458.2001.10504428","volume":"10","author":"W Aiello","year":"2001","unstructured":"Aiello W, Chung F, Lu L (2001) A random graph model for power-law graphs. Exp Math 10:53\u201366","journal-title":"Exp Math"},{"key":"33_CR2","doi-asserted-by":"crossref","unstructured":"Alan M, Massimiliano M, Peter G, Bobby B (2007) Measurement and analysis of online social networks. ACM SIGCOMM IMC. doi: 10.1145\/1298306.1298311","DOI":"10.1145\/1298306.1298311"},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Aris A, Ravi K, Mohammad M (2008) Influence and correlation in social networks. ACM SIGKDD. doi: 10.1145\/1401890.1401897","DOI":"10.1145\/1401890.1401897"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Baden R, Bender A, Spring N, Bhattacharjee B, Starin D (2009) Persona: an online social network with user-defined privacy. ACM SIGCOMM. doi: 10.1145\/1592568.1592585","DOI":"10.1145\/1592568.1592585"},{"key":"33_CR5","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1038\/scientificamerican0503-60","volume":"288","author":"A Barabsi","year":"2003","unstructured":"Barabsi A, Bonabeau E (2003) Scale-free networks. Sci Am 288:60\u201369","journal-title":"Sci Am"},{"key":"33_CR6","doi-asserted-by":"crossref","unstructured":"Bhattacharyya P, Garg A, Wu S (2011) Analysis of user keyword similarity in online social networks. SOCNET. doi: 10.1007\/s13278-010-0006-4","DOI":"10.1007\/s13278-010-0006-4"},{"key":"33_CR7","doi-asserted-by":"crossref","unstructured":"Cha M, Mislove A, Gummadi K (2009) A measurement-driven analysis of information propagation in the flickr social network. WWW, pp 721\u2013730","DOI":"10.1145\/1526709.1526806"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Clauset A, Shalizi C, Newman M (2009) Power-law distributions in empirical data, SIAM Rev. doi: 10.1137\/070710111","DOI":"10.1137\/070710111"},{"key":"33_CR9","unstructured":"David K, Jon K, Eva T (2003) Maximizing the spread of influence through a social network. ACM SIGKDD, pp 137\u2013146"},{"key":"33_CR10","unstructured":"Dougherty H (2010) Facebook Reaches Top Ranking in US. Hitwise Intelligence. http:\/\/weblogs.hitwise.com\/heather-dougherty\/2010\/03\/facebook_reaches_top_ranking_i.html (accessed 15 March 2010)"},{"key":"33_CR11","unstructured":"Du D, Ko K, Hu X (2010) Design and analysis of approximation algorithms. Manuscripts"},{"key":"33_CR12","unstructured":"Eubank S, Kumar V, Marathe M, Srinivasan A, Wang N (2004) Structural and algorithmic aspects of massive social networks. ACM SIAM, pp 718\u2013727"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. ACM workshop on Privacy in the electronic society, pp 71\u201380","DOI":"10.1145\/1102199.1102214"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Kayaalp M, \u00d6zyer T, \u00d6zyer S (2011) A mash-up application utilizing hybridized filtering techniques for recommending events at a social networking site. SOCNET. doi: 10.1007\/s13278-010-0010-8","DOI":"10.1007\/s13278-010-0010-8"},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Nazir A, Raza S, Chuah C (2008) Unveiling facebook: a measurement study of social network based applications. ACM SIGCOMM IMC. doi: 10.1145\/1452520.1452527","DOI":"10.1145\/1452520.1452527"},{"key":"33_CR16","doi-asserted-by":"crossref","unstructured":"Rosen D, Barnett G, Kim J (2011) Social networks and online environments: when science and practice co-evolve. SOCNET. doi: 10.1007\/s13278-010-0011-7","DOI":"10.1007\/s13278-010-0011-7"},{"key":"33_CR17","doi-asserted-by":"crossref","unstructured":"Saravanan M, Prasad G, Karishma S, Suganthi D (2011) Analyzing and labeling telecom communities using structural properties. SOCNET. doi: 10.1007\/s13278-011-0020-1","DOI":"10.1007\/s13278-011-0020-1"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Schneider F, Feldmann A, Krishnamurthy B, Willinger W (2009) Understanding online social network usage from a network perspective. ACM SIGCOMM IMC, pp 35\u201348","DOI":"10.1145\/1644893.1644899"},{"key":"33_CR19","unstructured":"Shishir Bharathi M, Kempe D (2007) Competitive influence maximization in social networks. WINE. doi: 10.1007\/978-3-540-77105-0-31"},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Wang F, Camacho E, Xu K (2009) Positive influence dominating set in online social networks. LNCS, pp 313-321","DOI":"10.1007\/978-3-642-02026-1_29"},{"key":"33_CR21","doi-asserted-by":"crossref","unstructured":"Wang F, Du H, Camacho E, Xu K, Lee W, Shi Y, Shan S (2011) On positive influence dominating sets in social networks. Theor Comput Sci. doi: 10.1016\/j.tcs.2009.10.001","DOI":"10.1016\/j.tcs.2009.10.001"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Willinger W, Rejaie R, Torkjazi M, Valafar M, Maggioni M (2010) Research on online social networks: time to face the real challenges. SIGMETRICS Perform. Eval. Rev. doi: 10.1145\/1710115.1710125","DOI":"10.1145\/1710115.1710125"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0033-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-011-0033-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-011-0033-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T12:29:56Z","timestamp":1560342596000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-011-0033-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,28]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["33"],"URL":"https:\/\/doi.org\/10.1007\/s13278-011-0033-9","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"value":"1869-5450","type":"print"},{"value":"1869-5469","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,28]]}}}