{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T10:02:16Z","timestamp":1768903336073,"version":"3.49.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/bigdata.2018.8621973","type":"proceedings-article","created":{"date-parts":[[2019,1,25]],"date-time":"2019-01-25T03:07:18Z","timestamp":1548385638000},"page":"771-780","source":"Crossref","is-referenced-by-count":5,"title":["Influence Maximization in Social Networks With Non-Target Constraints"],"prefix":"10.1109","author":[{"given":"Madhavan R.","family":"Padmanabhan","sequence":"first","affiliation":[]},{"given":"Naresh","family":"Somisetty","sequence":"additional","affiliation":[]},{"given":"Samik","family":"Basu","sequence":"additional","affiliation":[]},{"given":"A.","family":"Pavan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.37"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.14778\/3067421.3067429"},{"key":"ref33","first-page":"1679","article-title":"Near optimal strategies for targeted marketing in social networks","author":"pasumarthi","year":"2015","journal-title":"AAMAS"},{"key":"ref32","first-page":"138","article-title":"Fast and accurate influence maximization on large networks with pruned monte-carlo simulations","author":"ohsaka","year":"2014","journal-title":"AAAI"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915207"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2017.43"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593670"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723734"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983724"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775057"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735706"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.33"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882929"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.14778\/2047485.2047492"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1963192.1963217"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.132"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.145"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.122"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.14778\/2794367.2794376"},{"key":"ref3","first-page":"295","article-title":"Online topic-aware influence maximization queries","author":"aslay","year":"2014","journal-title":"EDBT"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611973402.70"},{"key":"ref29","article-title":"Refutations on &#x201C;debunking the myths of influence maximization: An in-depth benchmarking study","volume":"abs 1705 5144","author":"lu","year":"2017","journal-title":"CoRR"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.15.5.215"},{"key":"ref8","first-page":"345","article-title":"On the red-blue set cover problem","author":"carr","year":"2000","journal-title":"SODA"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1086\/209118"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035924"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735706"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1207\/S15327663JCP0903_1"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1145\/2505515.2505571","article-title":"Personalized influence maximization on social networks","author":"guo","year":"2013","journal-title":"CIKM'13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.79"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2014.2330833"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2433396.2433478"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/PASSAT\/SocialCom.2011.152"}],"event":{"name":"2018 IEEE International Conference on Big Data (Big Data)","location":"Seattle, WA, USA","start":{"date-parts":[[2018,12,10]]},"end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8610059\/8621858\/08621973.pdf?arnumber=8621973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T00:30:27Z","timestamp":1643243427000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8621973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2018.8621973","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}