{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:27:14Z","timestamp":1750220834918,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T00:00:00Z","timestamp":1571702400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Department of Education of Guangdong Province","award":["2015KTSCX183"],"award-info":[{"award-number":["2015KTSCX183"]}]},{"name":"South China University of Technology","award":["X2JS-F8150310"],"award-info":[{"award-number":["X2JS-F8150310"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,22]]},"DOI":"10.1145\/3331453.3362061","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["A New Optimal Algorithm on Information Diffusion Maximization Problem"],"prefix":"10.1145","author":[{"given":"Chunhui","family":"Deng","sequence":"first","affiliation":[{"name":"School of Computer Engineering, Guangzhou CollegeSouth China University of Technology, Guangzhou, China"}]},{"given":"Shuaishuai","family":"Yang","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]},{"given":"Huifang","family":"Deng","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, South China University of Technology, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2019,10,22]]},"reference":[{"unstructured":"The 2015 statistical report on WeChat users by CuriosityChina 199IT Internet Data Center http:\/\/www.199it.com\/archives\/351990.html?weixin_user_id=f0o6ETQjv6IT7PwM6TL39x20z_geYI 2015.  The 2015 statistical report on WeChat users by CuriosityChina 199IT Internet Data Center http:\/\/www.199it.com\/archives\/351990.html?weixin_user_id=f0o6ETQjv6IT7PwM6TL39x20z_geYI 2015.","key":"e_1_3_2_1_1_1"},{"unstructured":"P. Wang \"The Research on Information Diffusion Modeling Over Social Networks \" Master Thesis (Shanghai Jiao Tong University) 2011.  P. Wang \"The Research on Information Diffusion Modeling Over Social Networks \" Master Thesis (Shanghai Jiao Tong University) 2011.","key":"e_1_3_2_1_2_1"},{"unstructured":"L. Zheng \"An Improved Clustering Approach of CURE \" Inner Mongolian Petrochemical Industry 2005.  L. Zheng \"An Improved Clustering Approach of CURE \" Inner Mongolian Petrochemical Industry 2005.","key":"e_1_3_2_1_3_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_4_1","DOI":"10.5555\/2010989.2010999"},{"unstructured":"S.Y. Tang \"Information Diffusion Models in Micro-Blogging Networks Based on Hidden Markov Theory and Conditional Random Fields \" Master Thesis (South China University of Technology) 2014.  S.Y. Tang \"Information Diffusion Models in Micro-Blogging Networks Based on Hidden Markov Theory and Conditional Random Fields \" Master Thesis (South China University of Technology) 2014.","key":"e_1_3_2_1_5_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_6_1","DOI":"10.1142\/S0218339012500076"},{"key":"e_1_3_2_1_7_1","volume-title":"An Empirical Study,\" Computer Science","author":"Macdonald B.","year":"2012","unstructured":"B. Macdonald , Shakarian, P., Howard, N., and Moores, \" Spreaders in the Network SIR Model : An Empirical Study,\" Computer Science , 2012 . B. Macdonald, Shakarian, P., Howard, N., and Moores, \"Spreaders in the Network SIR Model: An Empirical Study,\" Computer Science, 2012."},{"key":"e_1_3_2_1_8_1","first-page":"57","article-title":"Mining the network value of customers","author":"Domingos P.","year":"2002","unstructured":"P. Domingos and M. Richardson , \" Mining the network value of customers ,\" Seventh Acm Sigkdd International Conference on Knowledge Discovery & Data Mining , pp. 57 -- 66 , 2002 . P. Domingos and M. Richardson, \"Mining the network value of customers,\" Seventh Acm Sigkdd International Conference on Knowledge Discovery & Data Mining, pp. 57--66, 2002.","journal-title":"Seventh Acm Sigkdd International Conference on Knowledge Discovery & Data Mining"},{"key":"e_1_3_2_1_9_1","first-page":"137","volume-title":"ACM","author":"Kempe D.","year":"2003","unstructured":"D. Kempe , J. Kleinberg and \u00c9. Tardos, \"Maximizing the spread of influence through a social network,\" Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining , ACM , pp. 137 -- 146 , 2003 , DOI:10.1145\/956750.956769 10.1145\/956750.956769 D. Kempe, J. Kleinberg and \u00c9. Tardos, \"Maximizing the spread of influence through a social network,\" Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, ACM, pp. 137--146, 2003, DOI:10.1145\/956750.956769"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1145\/1281192.1281239"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/1557019.1557047"},{"unstructured":"X.J. Feng \"Potential Based Influence Maximization Algorithm In a Social Network \" Master Thesis (Fudan University) 2010.  X.J. Feng \"Potential Based Influence Maximization Algorithm In a Social Network \" Master Thesis (Fudan University) 2010.","key":"e_1_3_2_1_12_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.3724\/SP.J.1016.2011.01956"},{"unstructured":"X. Ge \"Subject-oriented Influence Maximization Problem Research \" Master Thesis (Yunnan University) 2013.  X. Ge \"Subject-oriented Influence Maximization Problem Research \" Master Thesis (Yunnan University) 2013.","key":"e_1_3_2_1_14_1"},{"unstructured":"H.X. Ren \"The Study of Influence Maximization Algorithm Based on Community Structure \" Master Thesis (Yanshan University) 2014.  H.X. Ren \"The Study of Influence Maximization Algorithm Based on Community Structure \" Master Thesis (Yanshan University) 2014.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","first-page":"1539","article-title":"Influence maximization in near-linear time: a martingale approach","author":"Tang Y.","year":"2015","unstructured":"Y. Tang , Y. Shi , and X. Xiao , \" Influence maximization in near-linear time: a martingale approach ,\" ACM SIGMOD International Conference on Management of Data , pp. 1539 -- 1554 , 2015 . Y. Tang, Y. Shi, and X. Xiao, \"Influence maximization in near-linear time: a martingale approach,\" ACM SIGMOD International Conference on Management of Data, pp. 1539--1554, 2015.","journal-title":"ACM SIGMOD International Conference on Management of Data"},{"key":"e_1_3_2_1_17_1","first-page":"1","article-title":"A new algorithm for the influence maximization problem in dynamic networks or traffic sensor networks","author":"Wang X.G.","year":"2016","unstructured":"X.G. Wang , \" A new algorithm for the influence maximization problem in dynamic networks or traffic sensor networks ,\" Multimedia Tools & Applications , pp. 1 -- 12 , 2016 . X.G. Wang, \"A new algorithm for the influence maximization problem in dynamic networks or traffic sensor networks,\" Multimedia Tools & Applications, pp. 1--12, 2016.","journal-title":"Multimedia Tools & Applications"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-642-12079-4_20"},{"unstructured":"P.F. Zhou \"Research on the Evaluation Method of Blog's Subject Influence and User's Subject Influence \" Master Thesis (South China University of Technology) 2015.  P.F. Zhou \"Research on the Evaluation Method of Blog's Subject Influence and User's Subject Influence \" Master Thesis (South China University of Technology) 2015.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Methods and systems for selecting and presenting content based on context sensitive user preferences, \" U.S. Patent No. 9, 213, 755","author":"Aravamudan M.","year":"2015","unstructured":"M. Aravamudan , A. Rajasekharan , and K. G. Ramakrishnan , \" Methods and systems for selecting and presenting content based on context sensitive user preferences, \" U.S. Patent No. 9, 213, 755 . 15 Dec. 2015 . M. Aravamudan, A. Rajasekharan, and K. G. Ramakrishnan, \"Methods and systems for selecting and presenting content based on context sensitive user preferences, \" U.S. Patent No. 9, 213, 755. 15 Dec. 2015."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1016\/j.knosys.2013.11.006"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.1007\/s00778-014-0369-7"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1145\/2818052.2869079","article-title":"Using gamification to tackle the cold-start problem in recommender systems","author":"Feil S.","year":"2016","unstructured":"S. Feil , M. Kretzer , K. Werder and A. Maedche , \" Using gamification to tackle the cold-start problem in recommender systems ,\" In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion , pp. 253 -- 256 , 2016 . S. Feil, M. Kretzer, K. Werder and A. Maedche, \"Using gamification to tackle the cold-start problem in recommender systems,\" In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion, pp. 253--256, 2016.","journal-title":"Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1109\/TETC.2014.2385594"},{"unstructured":"Sina Micro-blog Dataset datatang.com http:\/\/www.datatang.com\/data\/46758\/ 2014.  Sina Micro-blog Dataset datatang.com http:\/\/www.datatang.com\/data\/46758\/ 2014.","key":"e_1_3_2_1_25_1"}],"event":{"acronym":"CSAE 2019","name":"CSAE 2019: The 3rd International Conference on Computer Science and Application Engineering","location":"Sanya China"},"container-title":["Proceedings of the 3rd International Conference on Computer Science and Application Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331453.3362061","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3331453.3362061","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:38Z","timestamp":1750202018000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3331453.3362061"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,22]]},"references-count":25,"alternative-id":["10.1145\/3331453.3362061","10.1145\/3331453"],"URL":"https:\/\/doi.org\/10.1145\/3331453.3362061","relation":{},"subject":[],"published":{"date-parts":[[2019,10,22]]},"assertion":[{"value":"2019-10-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}