{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:46:27Z","timestamp":1773153987900,"version":"3.50.1"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,11]]},"DOI":"10.1109\/icnp.2016.7784445","type":"proceedings-article","created":{"date-parts":[[2016,12,17]],"date-time":"2016-12-17T07:55:26Z","timestamp":1481961326000},"page":"1-10","source":"Crossref","is-referenced-by-count":44,"title":["Profit maximization for viral marketing in Online Social Networks"],"prefix":"10.1109","author":[{"given":"Jing","family":"Tang","sequence":"first","affiliation":[]},{"given":"Xueyan","family":"Tang","sequence":"additional","affiliation":[]},{"given":"Junsong","family":"Yuan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.40"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2007.29"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-012-0062-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367524"},{"key":"ref13","first-page":"2436","article-title":"Submodular optimization with submodular cover and submodular knapsack constraints","author":"iyer","year":"2013","journal-title":"Proc NIPS"},{"key":"ref14","first-page":"855","article-title":"Fast semidifferential-based submodular function optimization","author":"iyer","year":"2013","journal-title":"Proc ICML"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.79"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281239"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2011.2178078"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.99"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623684"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/FOCS.2012.73"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593670"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.122"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2013.55"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735706"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.14778\/2752939.2752950"},{"key":"ref9","first-page":"3147","article-title":"Scalable influence estimation in continuous-time diffusion networks","author":"du","year":"2013","journal-title":"Proc NIPS"},{"key":"ref1","year":"0"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2012.145"},{"key":"ref22","first-page":"138","article-title":"Fast and accurate influence maximization on large networks with pruned monte-carlo simulations","author":"ohsaka","year":"2014","journal-title":"Proc AAAI"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"ref24","first-page":"517","article-title":"Maximizing the spread of cascades using network design","author":"sheldon","year":"2010","journal-title":"Proc UAI"},{"key":"ref23","first-page":"561","article-title":"Uncovering the temporal dynamics of diffusion networks","author":"rodriguez","year":"2011","journal-title":"Proc ICML"},{"key":"ref26","first-page":"1539","article-title":"Influence maximization in near-linear time: A martingale approach","author":"tang","year":"2015","journal-title":"Proc ACM SIGMOD"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.2320515"}],"event":{"name":"2016 IEEE 24th International Conference on Network Protocols (ICNP)","location":"Singapore","start":{"date-parts":[[2016,11,8]]},"end":{"date-parts":[[2016,11,11]]}},"container-title":["2016 IEEE 24th International Conference on Network Protocols (ICNP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7774710\/7784399\/07784445.pdf?arnumber=7784445","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,1,5]],"date-time":"2017-01-05T13:34:51Z","timestamp":1483623291000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7784445\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/icnp.2016.7784445","relation":{},"subject":[],"published":{"date-parts":[[2016,11]]}}}