{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T08:25:18Z","timestamp":1768897518995,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T00:00:00Z","timestamp":1451865600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Natural Science Foundation of Shanghai","award":["12ZR1445000"],"award-info":[{"award-number":["12ZR1445000"]}]},{"name":"China 973 project","award":["2012CB316200, 2014CB340300"],"award-info":[{"award-number":["2012CB316200, 2014CB340300"]}]},{"name":"Shanghai Pujiang Program","award":["13PJ1403900"],"award-info":[{"award-number":["13PJ1403900"]}]},{"name":"Opening Project of Key Lab of Information Network Security of Ministry of Public Security","award":["C15602"],"award-info":[{"award-number":["C15602"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61202024, 61472252, 61133006, 61422208"],"award-info":[{"award-number":["61202024, 61472252, 61133006, 61422208"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Opening Project of Baidu","award":["181515P005267"],"award-info":[{"award-number":["181515P005267"]}]},{"name":"Shanghai Educational Development Foundation","award":["Chenguang Grant 12CG09"],"award-info":[{"award-number":["Chenguang Grant 12CG09"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,1,4]]},"DOI":"10.1145\/2857546.2857591","type":"proceedings-article","created":{"date-parts":[[2016,2,29]],"date-time":"2016-02-29T16:40:27Z","timestamp":1456764027000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":17,"title":["Multiple Influence Maximization in Social Networks"],"prefix":"10.1145","author":[{"given":"Honglin","family":"Sun","sequence":"first","affiliation":[{"name":"Shanghai Key Lab of Scalable Computing and Systems, Dept. of Computer Science and Engineering Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Xiaofeng","family":"Gao","sequence":"additional","affiliation":[{"name":"Shanghai Key Lab of Scalable Computing and Systems, Dept. of Computer Science and Engineering Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"Shanghai Key Lab of Scalable Computing and Systems, Dept. of Computer Science and Engineering Shanghai Jiao Tong University, Shanghai, China"}]},{"given":"Jian","family":"Gu","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information Network Security of Ministry of Public Security, The Third Research Institute of Ministry of Public Security, Shanghai, China"}]},{"given":"Yongjian","family":"Wang","sequence":"additional","affiliation":[{"name":"Key Laboratory of Information Network Security of Ministry of Public Security, The Third Research Institute of Ministry of Public Security, Shanghai, China"}]}],"member":"320","published-online":{"date-parts":[[2016,1,4]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/502512.502525"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775057"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/2634074.2634144"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835934"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.118"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.132"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40649-014-0001-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13278-014-0153-0"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2593670"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557047"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0366-x"},{"key":"e_1_3_2_1_13_1","first-page":"1","volume-title":"Global Telecommunications Conference (GLOBECOM)","author":"Fan Xiaoguang","year":"2011","unstructured":"Xiaoguang Fan and Victor Li . The probabilistic maximum coverage problem in social networks . In Global Telecommunications Conference (GLOBECOM) , pages 1 -- 5 , 2011 . Xiaoguang Fan and Victor Li. The probabilistic maximum coverage problem in social networks. In Global Telecommunications Conference (GLOBECOM), pages 1--5, 2011."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.99"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623684"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588561"},{"key":"e_1_3_2_1_17_1","first-page":"295","volume-title":"International Conference on Extending Database Technology (EDBT)","author":"Aslay Cigdem","year":"2014","unstructured":"Cigdem Aslay , Nicola Barbieri , Francesco Bonchi , and Ricardo A Baeza-Yates . Online topic-aware influence maximization queries . In International Conference on Extending Database Technology (EDBT) , pages 295 -- 306 , 2014 . Cigdem Aslay, Nicola Barbieri, Francesco Bonchi, and Ricardo A Baeza-Yates. Online topic-aware influence maximization queries. In International Conference on Extending Database Technology (EDBT), pages 295--306, 2014."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735703.2735706"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-013-0646-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723710"}],"event":{"name":"IMCOM '16: The 10th International Conference on Ubiquitous Information Management and Communication","location":"Danang Viet Nam","acronym":"IMCOM '16","sponsor":["SIGAPP ACM Special Interest Group on Applied Computing","SKKU SUNGKYUNKWAN UNIVERSITY"]},"container-title":["Proceedings of the 10th International Conference on Ubiquitous Information Management and Communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857546.2857591","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2857546.2857591","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:54:32Z","timestamp":1750222472000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2857546.2857591"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1,4]]},"references-count":20,"alternative-id":["10.1145\/2857546.2857591","10.1145\/2857546"],"URL":"https:\/\/doi.org\/10.1145\/2857546.2857591","relation":{},"subject":[],"published":{"date-parts":[[2016,1,4]]},"assertion":[{"value":"2016-01-04","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}