{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T10:37:32Z","timestamp":1726310252501},"reference-count":32,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2015,5,1]],"date-time":"2015-05-01T00:00:00Z","timestamp":1430438400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Engineering Applications of Artificial Intelligence"],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1016\/j.engappai.2015.02.007","type":"journal-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T01:56:53Z","timestamp":1426557413000},"page":"195-206","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":33,"special_numbering":"C","title":["Trust based latency aware influence maximization in social networks"],"prefix":"10.1016","volume":"41","author":[{"given":"Rezvan","family":"Mohamadi-Baghmolaei","sequence":"first","affiliation":[]},{"given":"Niloofar","family":"Mozafari","sequence":"additional","affiliation":[]},{"given":"Ali","family":"Hamzeh","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.engappai.2015.02.007_bib1","doi-asserted-by":"crossref","unstructured":"Ahmed, S., Ezeife, C., 2013. Discovering influential nodes from trust network. In: Proceedings of the 28th ACM Symposium on Applied Computing (ACMSAC), pp. 121\u2013128.","DOI":"10.1145\/2480362.2480389"},{"key":"10.1016\/j.engappai.2015.02.007_bib2","doi-asserted-by":"crossref","unstructured":"Barbieri, N., Bonchi, F., Manco, G., 2012. Topic-aware social influence propagation models. In: Proceedings of the International Conference on Data Mining (ICDM), IEEE, pp. 81\u201390.","DOI":"10.1109\/ICDM.2012.122"},{"key":"10.1016\/j.engappai.2015.02.007_bib3","unstructured":"Barzilai, J., 2013. On the Construction of Trust Metrics. AAAI Spring Symposium: Trust and Autonomous Systems."},{"key":"10.1016\/j.engappai.2015.02.007_bib4","doi-asserted-by":"crossref","unstructured":"Bel\u00e1k, V., Lam, S., Hayes, C., 2012. Towards maximising cross-community infor-mation diffusion. In: Proceedings of ASONAM 2012, pp. 171\u2013178.","DOI":"10.1109\/ASONAM.2012.38"},{"key":"10.1016\/j.engappai.2015.02.007_bib5","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, Y., Yang, S., 2009. Efficient influence maximization in social networks. In: KDD, pp. 199\u2013208.","DOI":"10.1145\/1557019.1557047"},{"key":"10.1016\/j.engappai.2015.02.007_bib6","doi-asserted-by":"crossref","unstructured":"Chen, W., Wang, C., Wang, Y., 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: KDD, pp. 1029\u20131038.","DOI":"10.1145\/1835804.1835934"},{"key":"10.1016\/j.engappai.2015.02.007_bib7","doi-asserted-by":"crossref","unstructured":"Chen, W., Collins, A., Cummings, R., Ke, T., Liu, Z., Rinc\u00b4on, D., Sun, X., Wang, Y., Wei, W., Yuan, Y., 2011. Influence maximization in social networks when negative opinions may emerge and propagate. In: SDM.","DOI":"10.1137\/1.9781611972818.33"},{"key":"10.1016\/j.engappai.2015.02.007_bib8","unstructured":"Chen, W., Lu, W., Zhang, N., 2012. Time-critical influence maximization in social networks with time-delayed diffusion process. In: AAAI, pp. 1\u20135."},{"key":"10.1016\/j.engappai.2015.02.007_bib9","doi-asserted-by":"crossref","unstructured":"Domingos, P., Richardson, M., 2001. Mining the network value of customers. In: Proceedings of the Seventh International Conference on Knowledge Discovery and Data Mining (KDD), pp. 57\u201366.","DOI":"10.1145\/502512.502525"},{"issue":"3","key":"10.1016\/j.engappai.2015.02.007_bib10","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1023\/A:1011122126881","article-title":"Talk of the network: a complex systems look at the underlying process of word-of-mouth","volume":"12","author":"Goldenberg","year":"2001","journal-title":"Mark. Lett."},{"key":"10.1016\/j.engappai.2015.02.007_bib11","doi-asserted-by":"crossref","unstructured":"Goyal, A., Bonchi, F., Lakshmanan, L.V.S., 2010. Learning influence probabilities in social networks. In: WSDM, pp. 241\u2013250.","DOI":"10.1145\/1718487.1718518"},{"issue":"6","key":"10.1016\/j.engappai.2015.02.007_bib12","doi-asserted-by":"crossref","first-page":"1420","DOI":"10.1086\/226707","article-title":"Threshold models of collective behavior","volume":"83","author":"Granovetter","year":"1978","journal-title":"Am. J. Sociol."},{"key":"10.1016\/j.engappai.2015.02.007_bib13","doi-asserted-by":"crossref","unstructured":"Guille, A., Hacid, H., Favre, C., Zighed, D.A., March 2013. Information diffusion in online social networks: a survey. SIGMOD, USA, vol. 42, no. 4, pp. 17\u201328.","DOI":"10.1145\/2503792.2503797"},{"key":"10.1016\/j.engappai.2015.02.007_bib14","first-page":"1","article-title":"Opening closed regimes, what was the role of social media during the Arab spring","author":"Howard","year":"2011","journal-title":"Proj. Inf. Technol. Polit. Islam"},{"key":"10.1016\/j.engappai.2015.02.007_bib15","doi-asserted-by":"crossref","unstructured":"Kimura, M., Saito, K., 2006. Tractable models for information diffusion in social networks. In: PKDD 2006, LNAI 4213, pp. 259\u2013271.","DOI":"10.1007\/11871637_27"},{"key":"10.1016\/j.engappai.2015.02.007_bib16","unstructured":"Kimura, M., Saito, K., Nakano, R., 2007. Extracting influential nodes for information diffusion on social network. In: AAAI, pp. 1371\u20131376."},{"key":"10.1016\/j.engappai.2015.02.007_bib17","doi-asserted-by":"crossref","unstructured":"Kempe, D., Kleinberg, J., Tardos, E., 2003. Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, pp. 137\u2013146.","DOI":"10.1145\/956750.956769"},{"key":"10.1016\/j.engappai.2015.02.007_bib18","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N., 2007. Cost-effective outbreak detection in networks. In: KDD, pp. 420\u2013429.","DOI":"10.1145\/1281192.1281239"},{"key":"10.1016\/j.engappai.2015.02.007_bib19","doi-asserted-by":"crossref","unstructured":"Liu, B., Cong, G., Xu, D., Zeng, Y., 2012. Time constrained influence maximization in social networks. In: Proceedings of the International Conference on Data Mining (ICDM), IEEE, pp. 439\u2013448.","DOI":"10.1109\/ICDM.2012.158"},{"key":"10.1016\/j.engappai.2015.02.007_bib20","doi-asserted-by":"crossref","unstructured":"Lu, W., Lakshmanan, L.V.S., 2012. Profit maximization over social networks. In: Proceedings of the International Conference on Data Mining (ICDM), IEEE, pp. 479\u2013488.","DOI":"10.1109\/ICDM.2012.145"},{"key":"10.1016\/j.engappai.2015.02.007_bib21","series-title":"Computing with social trust","first-page":"259","article-title":"Trust metrics in recommender systems","author":"Massa","year":"2009"},{"issue":"1","key":"10.1016\/j.engappai.2015.02.007_bib22","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1007\/BF01588971","article-title":"\u201cAn analysis of approximations for maximizing submodular set functions\u201d","volume":"14","author":"Nemhauser","year":"1978","journal-title":"Math. Program."},{"key":"10.1016\/j.engappai.2015.02.007_bib23","doi-asserted-by":"crossref","first-page":"640","DOI":"10.1016\/j.engappai.2012.01.003","article-title":"A new blockmodeling based hierarchical clustering algorithm for web social networks","author":"Qiao","year":"2012","journal-title":"Eng. Appl. Artif. Intell."},{"key":"10.1016\/j.engappai.2015.02.007_bib24","doi-asserted-by":"crossref","unstructured":"Richardson, M. Domingos, P., 2002. Mining knowledge-sharing sites for viral marketing. In: Proceedings of the Eighth International Conference on Knowledge Discovery and Data Mining (KDD), pp. 61\u201370.","DOI":"10.1145\/775047.775057"},{"key":"10.1016\/j.engappai.2015.02.007_bib25","doi-asserted-by":"crossref","unstructured":"Rodriguez, M.G., Leskovec, J., Krause, A., 2010. Inferring networks of diffusion and influence. In: KDD, pp. 1019\u20131028.","DOI":"10.1145\/1835804.1835933"},{"key":"10.1016\/j.engappai.2015.02.007_bib26","unstructured":"Rodriguez, M.G., Balduzzi, D., Sch\u00a8olkopf, B., 2011. Uncovering the temporal dynamics of diffusion networks. In: ICML, pp. 561\u2013568."},{"key":"10.1016\/j.engappai.2015.02.007_bib27","unstructured":"Rodriguez, M.G., Sch\u00f6lkopf, B., 2012. Influence maximization in continuous time diffusion networks. In: Proceedings of the 29th International Conference on Machine Learning (ICML-12), pp. 313\u2013320."},{"key":"10.1016\/j.engappai.2015.02.007_bib28","doi-asserted-by":"crossref","unstructured":"Saito, K., Kimura, M., Ohara, K., Motoda, H., 2010. Selecting information diffusion models over social networks for behavioral analysis. In: PKDD, pp. 180\u2013195.","DOI":"10.1007\/978-3-642-15939-8_12"},{"key":"10.1016\/j.engappai.2015.02.007_bib29","unstructured":"Schivinski, B., Dabrowski, D., 2013. The impact of brand communication on brand equity dimensions and brand purchase intention through Facebook. Working Paper Series A, Gdansk University of Technology, Faculty of Management and Economics vol. 4, no. 4, pp. 2\u201323."},{"key":"10.1016\/j.engappai.2015.02.007_bib30","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1016\/j.engappai.2011.06.008","article-title":"Partial identities as a foundation for trust and reputation","volume":"24","author":"Such","year":"2011","journal-title":"Eng. Appl. Artif. Intell."},{"issue":"6","key":"10.1016\/j.engappai.2015.02.007_bib31","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1093\/aje\/kwh255","article-title":"Different epidemic curves for severe acute respiratory syndrome reveal similar impacts of control measures","volume":"160","author":"Wallinga","year":"2004","journal-title":"Am. J. Epidemiol."},{"key":"10.1016\/j.engappai.2015.02.007_bib32","series-title":"Social Network Analysis: Methods and Applications","author":"Wasserman","year":"1994"}],"container-title":["Engineering Applications of Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197615000378?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0952197615000378?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,21]],"date-time":"2019-08-21T22:10:56Z","timestamp":1566425456000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0952197615000378"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":32,"alternative-id":["S0952197615000378"],"URL":"https:\/\/doi.org\/10.1016\/j.engappai.2015.02.007","relation":{},"ISSN":["0952-1976"],"issn-type":[{"value":"0952-1976","type":"print"}],"subject":[],"published":{"date-parts":[[2015,5]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Trust based latency aware influence maximization in social networks","name":"articletitle","label":"Article Title"},{"value":"Engineering Applications of Artificial Intelligence","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.engappai.2015.02.007","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2015 Elsevier Ltd. All rights reserved.","name":"copyright","label":"Copyright"}]}}