{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,12]],"date-time":"2024-09-12T19:10:45Z","timestamp":1726168245774},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T00:00:00Z","timestamp":1442361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s10618-015-0435-9","type":"journal-article","created":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T09:54:19Z","timestamp":1442397259000},"page":"1217-1248","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Locating the contagion source in networks with partial timestamps"],"prefix":"10.1007","volume":"30","author":[{"given":"Kai","family":"Zhu","sequence":"first","affiliation":[]},{"given":"Zhen","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Lei","family":"Ying","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,9,16]]},"reference":[{"key":"435_CR1","doi-asserted-by":"crossref","unstructured":"Agaskar A, Lu YM (2013) A fast monte carlo algorithm for source localization on graphs. In: SPIE optical engineering and applications","DOI":"10.1117\/12.2023039"},{"key":"435_CR2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804441","volume-title":"Convex optimization","author":"S Boyd","year":"2004","unstructured":"Boyd S, Vandenberghe L (2004) Convex optimization. Cambridge Unversity Press, New York"},{"key":"435_CR3","unstructured":"Boyd S, Cortes C, Mohri M, Radovanovic A (2012) Accuracy at the top. In: Advances in neural information processing systems, pp 962\u2013970"},{"issue":"3","key":"435_CR4","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1016\/0378-8733(86)90006-7","volume":"8","author":"RL Breiger","year":"1986","unstructured":"Breiger RL, Pattison PE (1986) Cumulated social roles: the duality of persons and their algebras. Soc Netw 8(3):215\u2013256","journal-title":"Soc Netw"},{"issue":"3","key":"435_CR5","doi-asserted-by":"crossref","first-page":"228","DOI":"10.1109\/TCT.1968.1082817","volume":"15","author":"J Char","year":"1968","unstructured":"Char J (1968) Generation of trees, two-trees, and storage of master forests. IEEE Trans Circuit Theory 15(3):228\u2013238","journal-title":"IEEE Trans Circuit Theory"},{"key":"435_CR6","doi-asserted-by":"crossref","unstructured":"Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the annual ACM SIGKDD conference on knowledge discovery and data mining (KDD), pp 199\u2013208","DOI":"10.1145\/1557019.1557047"},{"key":"435_CR7","doi-asserted-by":"crossref","unstructured":"Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the annual ACM SIGKDD conference on knowledge discovery and data mining (KDD), pp 1029\u20131038","DOI":"10.1145\/1835804.1835934"},{"key":"435_CR8","doi-asserted-by":"crossref","unstructured":"Chen Z, Zhu K, Ying L (2014) Detecting multiple information sources in networks under the SIR model. In: Proceedings of the IEEE conference on information sciences and systems (CISS), Princeton","DOI":"10.1109\/CISS.2014.6814143"},{"key":"435_CR9","doi-asserted-by":"crossref","unstructured":"Dong W, Zhang W, Tan CW (2013) Rooting out the rumor culprit from suspects. In: Proceedings of the IEEE international symposium on information theory (ISIT), Istanbul, pp 2671\u20132675","DOI":"10.1109\/ISIT.2013.6620711"},{"key":"435_CR10","volume-title":"Computers and intractibility: a guide to the theory of NP-completeness","author":"MR Garey","year":"1979","unstructured":"Garey MR, Johnson DS (1979) Computers and intractibility: a guide to the theory of NP-completeness. Macmillan Higher Education, New York"},{"key":"435_CR11","doi-asserted-by":"crossref","unstructured":"Goyal A, Lu W, Lakshmanan LVS (2011) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: IEEE international conference on data mining (ICDM). IEEE Computer Society, Washington, DC, pp 211\u2013220","DOI":"10.1109\/ICDM.2011.132"},{"key":"435_CR12","doi-asserted-by":"crossref","unstructured":"Gruhl D, Guha R, Liben-Nowell D, Tomkins A (2004) Information diffusion through blogspace. In: Proceedings of the international conference on World Wide Web (WWW), New York, pp 491\u2013501","DOI":"10.1145\/1046456.1046462"},{"key":"435_CR13","doi-asserted-by":"crossref","unstructured":"Gundecha P, Feng Z, Liu H (2013) Seeking provenance of information using social media. In: Proceedings of the ACM international conference on information knowledge management (CIKM), San Francisco, pp 1691\u20131696","DOI":"10.1145\/2505515.2505633"},{"key":"435_CR14","doi-asserted-by":"crossref","unstructured":"Karamchandani N, Franceschetti M (2013) Rumor source detection under probabilistic sampling. In: Proceedings of the IEEE international symposium on information theory (ISIT), Istanbul","DOI":"10.1109\/ISIT.2013.6620613"},{"key":"435_CR15","doi-asserted-by":"crossref","unstructured":"Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the annual ACM SIGKDD conference on knowledge discovery and data mining (KDD), Washington DC, pp 137\u2013146","DOI":"10.1145\/956750.956769"},{"key":"435_CR16","doi-asserted-by":"crossref","unstructured":"Lappas T, Terzi E, Gunopulos D, Mannila H (2010) Finding effectors in social networks. In: Proceedings of the annual ACM SIGKDD conference on knowledge discovery and data mining (KDD), pp 1059\u20131068","DOI":"10.1145\/1835804.1835937"},{"key":"435_CR17","doi-asserted-by":"crossref","unstructured":"Lokhov AY, Mezard M, Ohta H, Zdeborova L (2013) Inferring the origin of an epidemy with dynamic message-passing algorithm. arXiv:1303.5315 , preprint","DOI":"10.1103\/PhysRevE.90.012801"},{"key":"435_CR18","doi-asserted-by":"crossref","unstructured":"Luo W, Tay WP (2013) Finding an infection source under the SIS model. In: Proceedings of the IEEE international conference on acoustics, speech, and signal processing (ICASSP), Vancouver","DOI":"10.1109\/ICASSP.2013.6638194"},{"key":"435_CR19","doi-asserted-by":"crossref","first-page":"2850","DOI":"10.1109\/TSP.2013.2256902","volume":"61","author":"W Luo","year":"2013","unstructured":"Luo W, Tay WP, Leng M (2013) Identifying infection sources and regions in large networks. IEEE Trans Signal Process 61:2850\u20132865","journal-title":"IEEE Trans Signal Process"},{"issue":"4","key":"435_CR20","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/JSTSP.2014.2315533","volume":"8","author":"W Luo","year":"2014","unstructured":"Luo W, Tay WP, Leng M (2014) How to identify an infection source with limited observations. IEEE J Sel Top Signal Process 8(4):586\u2013597","journal-title":"IEEE J Sel Top Signal Process"},{"key":"435_CR21","doi-asserted-by":"crossref","unstructured":"Matsubara Y, Sakurai Y, Prakash BA, Li L, Faloutsos C (2012) Rise and fall patterns of information diffusion: model and implications. In: Proceedings of the annual ACM SIGKDD conference on knowledge discovery and data mining (KDD), Beijing, pp 6\u201314","DOI":"10.1145\/2339530.2339537"},{"key":"435_CR22","doi-asserted-by":"crossref","unstructured":"Myers SA, Zhu C, Leskovec J (2012) Information diffusion and external influence in networks. In: Proceedings of the annual ACM SIGKDD conference on knowledge discovery and data mining (KDD), Beijing, pp 33\u201341","DOI":"10.1145\/2339530.2339540"},{"key":"435_CR23","doi-asserted-by":"crossref","unstructured":"Nguyen DT, Nguyen NP, Thai MT (2012) Sources of misinformation in online social networks: who to suspect? In: Military communications conference, 2012-MILCOM 2012, IEEE, pp 1\u20136","DOI":"10.1109\/MILCOM.2012.6415780"},{"issue":"6","key":"435_CR24","doi-asserted-by":"crossref","first-page":"068,702","DOI":"10.1103\/PhysRevLett.109.068702","volume":"109","author":"PC Pinto","year":"2012","unstructured":"Pinto PC, Thiran P, Vetterli M (2012) Locating the source of diffusion in large-scale networks. Phys Rev Lett 109(6):068,702","journal-title":"Phys Rev Lett"},{"key":"435_CR25","doi-asserted-by":"crossref","unstructured":"Prakash BA, Vreeken J, Faloutsos C (2012) Spotting culprits in epidemics: how many and which ones? In: IEEE international conference on Data Mining (ICDM), Brussels, pp 11\u201320","DOI":"10.1109\/ICDM.2012.136"},{"key":"435_CR26","doi-asserted-by":"crossref","unstructured":"Sadikov E, Medina M, Leskovec J, Garcia-Molina H (2011) Correcting for missing data in information cascades. In: Proceedings of the fourth ACM international conference on web search and data mining, pp 55\u201364","DOI":"10.1145\/1935826.1935844"},{"key":"435_CR27","doi-asserted-by":"crossref","first-page":"5163","DOI":"10.1109\/TIT.2011.2158885","volume":"57","author":"D Shah","year":"2011","unstructured":"Shah D, Zaman T (2011) Rumors in a network: who\u2019s the culprit? IEEE Trans Inf Theory 57:5163\u20135181","journal-title":"IEEE Trans Inf Theory"},{"issue":"1","key":"435_CR28","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1145\/2318857.2254782","volume":"40","author":"D Shah","year":"2012","unstructured":"Shah D, Zaman T (2012) Rumor centrality: a universal source detector. ACM SIGMETRICS Perform Eval Rev 40(1):199\u2013210","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"435_CR29","first-page":"321","volume":"9","author":"J Snow","year":"1854","unstructured":"Snow J (1854) The cholera near Golden-square, and at Deptford. Med Times Gaz 9:321\u2013322","journal-title":"Med Times Gaz"},{"key":"435_CR30","doi-asserted-by":"crossref","unstructured":"Wang Z, Dong W, Zhang W, Tan CW (2014) Rumor source detection with multiple observations: fundamental limits and algorithms. In: Proceedings of the annual ACM SIGMETRICS conference, Austin","DOI":"10.1145\/2591971.2591993"},{"key":"435_CR31","doi-asserted-by":"crossref","unstructured":"Zejnilovic S, Gomes J, Sinopoli B (2013) Network observability and localization of the source of diffusion based on a subset of nodes. In: Proceedings of the annual Allerton conference on communication, control and computing, Monticello","DOI":"10.1109\/Allerton.2013.6736613"},{"key":"435_CR32","unstructured":"Zhu K, Ying L (2013) Information source detection in the SIR model: a sample path based approach. In: Proceedings of information theory and applications workshop (ITA)"},{"key":"435_CR33","doi-asserted-by":"crossref","unstructured":"Zhu K, Ying L (2014) A robust information source estimator with sparse observations. In: Proceedings of the IEEE international conference on computer communications (INFOCOM), Toronto","DOI":"10.1109\/INFOCOM.2014.6848164"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-015-0435-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-015-0435-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-015-0435-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,30]],"date-time":"2019-08-30T12:56:07Z","timestamp":1567169767000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-015-0435-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9,16]]},"references-count":33,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["435"],"URL":"https:\/\/doi.org\/10.1007\/s10618-015-0435-9","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,9,16]]}}}