{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T00:53:24Z","timestamp":1740099204340,"version":"3.37.3"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,17]],"date-time":"2019-10-17T00:00:00Z","timestamp":1571270400000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000774","name":"Defense Threat Reduction Agency","doi-asserted-by":"publisher","award":["CNIMS Contract HDTRA1-11-D-0016-0001"],"id":[{"id":"10.13039\/100000774","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["ACI-1443054, IIS-1633028, CMMI-1745207"],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,17]]},"DOI":"10.1145\/3269206.3271790","type":"proceedings-article","created":{"date-parts":[[2018,10,22]],"date-time":"2018-10-22T12:08:27Z","timestamp":1540210107000},"page":"377-386","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Inferring Probabilistic Contagion Models Over Networks Using Active Queries"],"prefix":"10.1145","author":[{"given":"Abhijin","family":"Adiga","sequence":"first","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Vanessa","family":"Cedeno-Mieles","sequence":"additional","affiliation":[{"name":"Virginia Tech & Escuela Superior Polit\u00e9cnica del Litoral (ESPOL), Blacksburg, VA, USA"}]},{"given":"Chris J.","family":"Kuhlman","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"Madhav V.","family":"Marathe","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, VA, USA"}]},{"given":"S. S.","family":"Ravi","sequence":"additional","affiliation":[{"name":"Virginia Tech & University at Albany -- SUNY, Blacksburg, VA, USA"}]},{"given":"Daniel J.","family":"Rosenkrantz","sequence":"additional","affiliation":[{"name":"University at Albany -- SUNY, Albany, NY, USA"}]},{"given":"Richard E.","family":"Stearns","sequence":"additional","affiliation":[{"name":"University at Albany -- SUNY, Albany, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"et almbox","author":"Adiga A.","year":"2018","unstructured":"A. Adiga , V. Cedeno-Mieles , et almbox . 2018 . Active Query Based Inference of Probabilistic Contagion Models Over Networks. NDSSL Tech. Rep. 2018--48, Virginia Tech, Blacksburg, VA. A. Adiga, V. Cedeno-Mieles, et almbox. 2018. Active Query Based Inference of Probabilistic Contagion Models Over Networks. NDSSL Tech. Rep. 2018--48, Virginia Tech, Blacksburg, VA."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2016.07.008"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1995456.1995598"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.epidem.2010.11.002"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2011.02.027"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1126\/science.1185231"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539797315306"},{"key":"e_1_3_2_1_8_1","first-page":"1","article-title":"Formal Modeling of the Resistance to Peer Influence Questionnaire: A Comparison of Adolescent Boys and Girls With and Without Mild-to-Borderline Intellectual Disability","volume":"43","author":"Dekkers L. M. S.","year":"2017","unstructured":"L. M. S. Dekkers , A. Bexkens , A. D. Hofman , 2017 . Formal Modeling of the Resistance to Peer Influence Questionnaire: A Comparison of Adolescent Boys and Girls With and Without Mild-to-Borderline Intellectual Disability . Assessment , Vol. 43 (2017), 1 -- 14 . L. M. S. Dekkers, A. Bexkens, A. D. Hofman, et almbox. 2017. Formal Modeling of the Resistance to Peer Influence Questionnaire: A Comparison of Adolescent Boys and Girls With and Without Mild-to-Borderline Intellectual Disability. Assessment , Vol. 43 (2017), 1--14.","journal-title":"Assessment"},{"key":"e_1_3_2_1_9_1","unstructured":"R. Durrett. 1988. Lecture Notes on Particle Systems and Percolation .Wadsworth. R. Durrett. 1988. Lecture Notes on Particle Systems and Percolation .Wadsworth."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"D. Easley and J. Kleinberg. 2010. Networks Crowds and Markets: Reasoning About a Highly Connected World .Cambridge University Press. D. Easley and J. Kleinberg. 2010. Networks Crowds and Markets: Reasoning About a Highly Connected World .Cambridge University Press.","DOI":"10.1017\/CBO9780511761942"},{"key":"e_1_3_2_1_11_1","unstructured":"M. R. Garey and D. S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-completeness .W. H. Freeman & Co. San Francisco. M. R. Garey and D. S. Johnson. 1979. Computers and Intractability: A Guide to the Theory of NP-completeness .W. H. Freeman & Co. San Francisco."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011122126881"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"S. Gonz\u00e1lez-Bail\u00f3n J. Borge-Holthoefer A. Rivero and Y. Moreno. 2011. The dynamics of protest recruitment through an online network. Scientific Reports (2011). S. Gonz\u00e1lez-Bail\u00f3n J. Borge-Holthoefer A. Rivero and Y. Moreno. 2011. The dynamics of protest recruitment through an online network. Scientific Reports (2011).","DOI":"10.1038\/srep00197"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718487.1718518"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956769"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"J. Kleinberg S. Mullainathan and J. Ugander. 2017. Comparison-Based Choices. arXiv:1705.05735v1 {cs.DS}. 20 pages. J. Kleinberg S. Mullainathan and J. Ugander. 2017. Comparison-Based Choices. arXiv:1705.05735v1 {cs.DS}. 20 pages.","DOI":"10.1145\/3033274.3085134"},{"key":"e_1_3_2_1_17_1","unstructured":"J. Leskovec and A. Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. J. Leskovec and A. Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132847.3132883"},{"volume-title":"Interacting Particle Systems","author":"Liggett T. M.","key":"e_1_3_2_1_19_1","unstructured":"T. M. Liggett . 1985. Interacting Particle Systems . Springer . T. M. Liggett. 1985. Interacting Particle Systems .Springer."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-012-0252-3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0022461"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1110069108"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"M. Mitzenmacher and E. Upfal. 2005. Probability and Computing: Randomized Algorithms and Probabilistic Analysis .Cambridge University Press. M. Mitzenmacher and E. Upfal. 2005. Probability and Computing: Randomized Algorithms and Probabilistic Analysis .Cambridge University Press.","DOI":"10.1017\/CBO9780511813603"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/a0017417"},{"key":"e_1_3_2_1_25_1","unstructured":"H. Mortveit and C. Reidys. 2007. An Introduction to Sequential Dynamical Systems .Springer New York NY. H. Mortveit and C. Reidys. 2007. An Introduction to Sequential Dynamical Systems .Springer New York NY."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1963405.1963503"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-85567-5_9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1037\/0012-1649.43.6.1531"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396795"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1177\/0146167294205002"},{"volume-title":"to Graph Theory","author":"West D. B.","key":"e_1_3_2_1_31_1","unstructured":"D. B. West . 2001. Intro. to Graph Theory . Prentice-Hall . D. B. West. 2001. Intro. to Graph Theory .Prentice-Hall."}],"event":{"name":"CIKM '18: The 27th ACM International Conference on Information and Knowledge Management","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGIR ACM Special Interest Group on Information Retrieval"],"location":"Torino Italy","acronym":"CIKM '18"},"container-title":["Proceedings of the 27th ACM International Conference on Information and Knowledge Management"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3269206.3271790","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3269206.3271790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,11]],"date-time":"2023-01-11T14:53:11Z","timestamp":1673448791000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3269206.3271790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,17]]},"references-count":31,"alternative-id":["10.1145\/3269206.3271790","10.1145\/3269206"],"URL":"https:\/\/doi.org\/10.1145\/3269206.3271790","relation":{},"subject":[],"published":{"date-parts":[[2018,10,17]]},"assertion":[{"value":"2018-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}