{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T04:52:53Z","timestamp":1755838373127,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/icde.2014.6816696","type":"proceedings-article","created":{"date-parts":[[2014,5,30]],"date-time":"2014-05-30T18:28:25Z","timestamp":1401474505000},"page":"736-747","source":"Crossref","is-referenced-by-count":22,"title":["Random-walk domination in large graphs"],"prefix":"10.1109","author":[{"given":"Rong-Hua","family":"Li","sequence":"first","affiliation":[]},{"given":"Jeffrey Xu","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Xin","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Cheng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"235","article-title":"Near-optimal sensor placements in gaussian processes: Theory, efficient algorithms and empirical studies","volume":"9","author":"krause","year":"2008","journal-title":"Journal of Machine Learning Research"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"15","first-page":"607","article-title":"The connected domination number of a graph","volume":"13","author":"sampathkumar","year":"1979","journal-title":"J Math Phys Sci"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/PL00009201"},{"key":"13","first-page":"47","article-title":"Incremental construction of k-dominating sets in wireless sensor networks","volume":"5","author":"couture","year":"2008","journal-title":"Ad Hoc & Sensor Wireless Networks"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872040"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/71.980024"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2006.103"},{"key":"21","first-page":"1181","article-title":"A utility-theoretic approach to privacy and personalization","author":"krause","year":"2008","journal-title":"AAAI"},{"key":"20","article-title":"A class of submodular functions for document summarization","author":"lin","year":"2011","journal-title":"ACL"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.126"},{"key":"23","article-title":"Scalable diversified ranking on large graphs","author":"li","year":"2012","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1979.34"},{"key":"25","article-title":"A tractable approach to finding closest truncated-commute-time neighbors in large graphs","author":"sarkar","year":"2007","journal-title":"UAI"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1390156.1390269"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1963.10500830"},{"journal-title":"Random-walk Domination in Large Graphs Problem Definitions and Fast Solutions","year":"2013","author":"li","key":"28"},{"journal-title":"Standford Network Analysis Project","year":"2010","author":"leskovec","key":"29"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1609\/icwsm.v4i1.14069","article-title":"A comparison of information seeking using search engines and social networks","author":"morris","year":"2010","journal-title":"ICWSM"},{"journal-title":"Social Browsing & Information Filtering in Social Media","year":"2007","author":"lerman","key":"2"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1374618.1374631"},{"key":"1","article-title":"Social browsing on flickr","author":"lerman","year":"2007","journal-title":"ICWSM"},{"key":"30","doi-asserted-by":"crossref","DOI":"10.1126\/science.286.5439.509","article-title":"Emergence of scaling in random networks","author":"barabasi","year":"1999","journal-title":"Science"},{"journal-title":"Fundamentals of Domination in Graphs","year":"1998","author":"haynes","key":"7"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2005.01.002"},{"key":"4","article-title":"Confucius and its intelligent disciples: Integrating social with search","volume":"3","author":"si","year":"2010","journal-title":"PVLDB"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/285055.285059"},{"journal-title":"Domination in Graphs Advanced Topics","year":"1998","author":"haynes","key":"8"}],"event":{"name":"2014 IEEE 30th International Conference on Data Engineering (ICDE)","start":{"date-parts":[[2014,3,31]]},"location":"Chicago, IL, USA","end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE 30th International Conference on Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6811095\/6816620\/06816696.pdf?arnumber=6816696","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,13]],"date-time":"2023-07-13T20:35:41Z","timestamp":1689280541000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6816696\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icde.2014.6816696","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}