{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T15:11:48Z","timestamp":1770736308403,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"SODATECH project"},{"name":"French Government within the program of \u201cInvestments for the Future\u00a0\u2013\u00a0Big Data\u201d"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Sci. Eng."],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/tnse.2016.2600029","type":"journal-article","created":{"date-parts":[[2016,8,12]],"date-time":"2016-08-12T19:54:37Z","timestamp":1471031677000},"page":"271-285","source":"Crossref","is-referenced-by-count":21,"title":["Suppressing Epidemics in Networks Using Priority Planning"],"prefix":"10.1109","volume":"3","author":[{"given":"Kevin","family":"Scaman","sequence":"first","affiliation":[]},{"given":"Argyris","family":"Kalogeratos","sequence":"additional","affiliation":[]},{"given":"Nicolas","family":"Vayatis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780199206650.001.0001"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.2005.35"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2007.03.001"},{"key":"ref36","first-page":"548","article-title":"Learning to discover social circles in ego networks","author":"mcauley","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref35","year":"2011"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.036103"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2013.6761078"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TCNS.2014.2310911"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129184"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0041428"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.0607900104"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934963"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20315"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040083"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2014.7040083"},{"key":"ref19","article-title":"What makes a good plan? An efficient planning approach to control diffusion processes in networks","author":"scaman","year":"2014","journal-title":"CoRR"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1137\/0125042"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753486"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1137\/0112012"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1080\/13645579.2013.774172"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.91.247901"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/0166-218X(92)90229-4"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557227"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/RELDIS.2003.1238052"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396795"},{"key":"ref2","first-page":"3147","article-title":"Scalable influence estimation in continuous-time diffusion networks","author":"du","year":"0","journal-title":"Proc Adv Neural Inf Process Syst"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.84.061911"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.925623"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0012-365X(89)90083-6"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1498374"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"313","DOI":"10.1145\/568522.568523","article-title":"A survey of graph layout problems","volume":"34","author":"petit","year":"2002","journal-title":"ACM Comput Surveys"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2015.7402770"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2013.01.016"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-011-0907-2"}],"container-title":["IEEE Transactions on Network Science and Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6488902\/7763892\/07542525.pdf?arnumber=7542525","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:12:33Z","timestamp":1642003953000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7542525\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":36,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tnse.2016.2600029","relation":{},"ISSN":["2327-4697"],"issn-type":[{"value":"2327-4697","type":"print"}],"subject":[],"published":{"date-parts":[[2016,10]]}}}