{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,27]],"date-time":"2025-08-27T00:18:26Z","timestamp":1756253906089,"version":"3.44.0"},"reference-count":26,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/glocom.2012.6503546","type":"proceedings-article","created":{"date-parts":[[2013,4,26]],"date-time":"2013-04-26T19:29:23Z","timestamp":1367004563000},"page":"2834-2839","source":"Crossref","is-referenced-by-count":5,"title":["Influence maximization in noncooperative social networks"],"prefix":"10.1109","author":[{"given":"Yile","family":"Yang","sequence":"first","affiliation":[{"name":"University of Hong Kong, Pokfulam, China"}]},{"given":"Victor O.K.","family":"Li","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Pokfulam, China"}]},{"given":"Kuang","family":"Xu","sequence":"additional","affiliation":[{"name":"University of Hong Kong, Pokfulam, China"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1557019.1557108"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1145\/1718487.1718518"},{"key":"18","first-page":"180","article-title":"Selecting infonnation diffusion models over social networks for behavioral analysis","author":"saito","year":"2010","journal-title":"Proceedings of the 2010 European Conference on Machine Learning and Knowledge Discovery in Databases Part III"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1109\/JSAC.2008.080922"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1145\/1401890.1401897"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1145\/506147.506153"},{"doi-asserted-by":"publisher","key":"14","DOI":"10.1145\/567112.567113"},{"doi-asserted-by":"publisher","key":"11","DOI":"10.1016\/0378-8733(91)90017-N"},{"doi-asserted-by":"publisher","key":"12","DOI":"10.1017\/CBO9780511815478"},{"key":"21","first-page":"1","article-title":"Using complex systems analysis to advance marketing tbeory development: Modeling heterogeneity effects on new product growtb through stochastic cellular automata","volume":"2001","author":"goldenberg","year":"2001","journal-title":"Academy of Marketing Science Review"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1086\/226707"},{"doi-asserted-by":"publisher","key":"22","DOI":"10.1007\/BF01588971"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.4153\/CJM-1956-045-5"},{"doi-asserted-by":"publisher","key":"24","DOI":"10.1017\/CBO9780511761942"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1103\/PhysRevE.69.026113"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1145\/1217299.1217301"},{"doi-asserted-by":"publisher","key":"3","DOI":"10.1145\/1232722.1232727"},{"key":"2","doi-asserted-by":"crossref","first-page":"333","DOI":"10.1017\/S0021849904040371","article-title":"Viral marketing or electronic word-of-moutb advertising: Examining consumer responses and motivations to pass along email","volume":"44","author":"phelps","year":"2004","journal-title":"Journal of Advertising Research"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1109\/INFCOM.2010.5462077"},{"key":"1","article-title":"Measuring user influence in twitter: The million follower fallacy","author":"cha","year":"0","journal-title":"Proceedings of the 4th International AAAI Conference on Weblogs and Social Media (ICWSM)"},{"key":"7","article-title":"The probabilistic maximum coverage problem in social networks","author":"fan","year":"2011","journal-title":"Proc IEEE GlobeCom'11"},{"doi-asserted-by":"publisher","key":"6","DOI":"10.1145\/956750.956769"},{"doi-asserted-by":"publisher","key":"5","DOI":"10.1145\/775047.775057"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/502512.502525"},{"key":"9","article-title":"Bazaar: Strengtbening user reputations in online marketplaces","author":"post","year":"2011","journal-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation"},{"year":"1993","author":"ahuja","journal-title":"Network Flows Theory Algorithms and Applications","key":"8"}],"event":{"name":"GLOBECOM 2012 - 2012 IEEE Global Communications Conference","start":{"date-parts":[[2012,12,3]]},"location":"Anaheim, CA, USA","end":{"date-parts":[[2012,12,7]]}},"container-title":["2012 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6490098\/6503052\/06503546.pdf?arnumber=6503546","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T19:06:26Z","timestamp":1756235186000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6503546\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":26,"URL":"https:\/\/doi.org\/10.1109\/glocom.2012.6503546","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}