{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:29:29Z","timestamp":1729657769658,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/iccnc.2015.7069316","type":"proceedings-article","created":{"date-parts":[[2015,6,2]],"date-time":"2015-06-02T09:40:57Z","timestamp":1433238057000},"page":"62-66","source":"Crossref","is-referenced-by-count":4,"title":["Effective deployment of monitoring points on social networks"],"prefix":"10.1109","author":[{"given":"Yuanyuan","family":"Bao","sequence":"first","affiliation":[]},{"given":"Wenting","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Chengqi","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Jingchi","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Yibo","family":"Xue","sequence":"additional","affiliation":[]},{"given":"Yingfei","family":"Dong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"237","volume":"25","author":"slavik","year":"1997","journal-title":"A tight analysis of the greedy algorithm for set cover Journal of Algorithms"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1137\/0211045"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"481","DOI":"10.1109\/SFCS.2002.1181972","article-title":"Covering Problems with Hard Capacities, SIAM Journal on Computing, toappear. A Preliminary version appeared","author":"chuzhoy","year":"2002","journal-title":"Proc 43rd Annu Symp Foundations of Computer Science (FOCS)"},{"key":"ref13","first-page":"463","article-title":"Almost optimal set covers in finite vc-dimension. Discrete and Computational Geometry","volume":"14","author":"bronnimann","year":"1995"},{"key":"ref14","first-page":"355","volume":"10","author":"chakrabarty","year":"2010","journal-title":"On column-restricted and priority covering integer programs In IPCO"},{"journal-title":"Crawling Facebook for Social Network Analysis Purpose(WIMS'll)","year":"2011","author":"catanese","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452527"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462078"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242809"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242685"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/APWeb.2010.10"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644901"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1298306.1298310"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"}],"event":{"name":"2015 International Conference on Computing, Networking and Communications (ICNC)","start":{"date-parts":[[2015,2,16]]},"location":"Garden Grove, CA, USA","end":{"date-parts":[[2015,2,19]]}},"container-title":["2015 International Conference on Computing, Networking and Communications (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7057023\/7069279\/07069316.pdf?arnumber=7069316","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T08:48:32Z","timestamp":1498207712000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7069316\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/iccnc.2015.7069316","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}