{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:18:04Z","timestamp":1730204284866,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/cdc.2018.8618661","type":"proceedings-article","created":{"date-parts":[[2019,1,24]],"date-time":"2019-01-24T05:12:50Z","timestamp":1548306770000},"page":"5221-5226","source":"Crossref","is-referenced-by-count":0,"title":["Influence Propagation in Competitive Scenario: Winning with Least Amount of Investment in Separated Threshold Model"],"prefix":"10.1109","author":[{"given":"Anisha","family":"Mazumder","sequence":"first","affiliation":[]},{"given":"Arunabha","family":"Sen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.132"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124368"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1126\/science.1236498"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623684"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.2016.2657"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1126\/science.1215842","article-title":"Identifying influential and susceptible members of social networks","volume":"337","author":"aral","year":"2012","journal-title":"Science"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14929-0_4"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1282100.1282167"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.98.2.404"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1282100.1282167"},{"journal-title":"Approximation analysis of influence spread in social networks","year":"2010","author":"goyal","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020492"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"journal-title":"Competitive influence maximization in social networks","year":"2007","author":"bharathi","key":"ref2"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396837"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"539","DOI":"10.1007\/978-3-642-17572-5_48","article-title":"Threshold models for competitive influence in social networks","author":"borodin","year":"2010","journal-title":"Internet and Network Economics"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/11561071_19","article-title":"Unbalanced graph cuts","author":"hayrapetyan","year":"2005","journal-title":"Algorithms&#x2013;ESA 2005"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6761078"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICCNC.2016.7440697"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2016.2553364"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040084"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.74.036104"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972825.40"}],"event":{"name":"2018 IEEE Conference on Decision and Control (CDC)","start":{"date-parts":[[2018,12,17]]},"location":"Miami Beach, FL","end":{"date-parts":[[2018,12,19]]}},"container-title":["2018 IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8592870\/8618647\/08618661.pdf?arnumber=8618661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,23]],"date-time":"2020-08-23T23:03:30Z","timestamp":1598223810000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8618661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/cdc.2018.8618661","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}