{"record_type":"pith_number_record","schema_url":"https://pith.science/schemas/pith-number/v1.json","pith_number":"pith:2011:6TVIMQQGBZN2NONFMGRA4VC6XT","short_pith_number":"pith:6TVIMQQG","schema_version":"1.0","canonical_sha256":"f4ea8642060e5ba6b9a561a20e545ebcfa6602eb7ac7307122380a81c15955e5","source":{"kind":"arxiv","id":"1110.4723","version":1},"attestation_state":"computed","paper":{"title":"Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model Technical Report","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["physics.soc-ph"],"primary_cat":"cs.SI","authors_text":"Guojie Song, Qingye Jiang, Wei Chen, Xinran He","submitted_at":"2011-10-21T07:59:37Z","abstract_excerpt":"In many real-world situations, different and often opposite opinions, innovations, or products are competing with one another for their social influence in a networked society. In this paper, we study competitive influence propagation in social networks under the competitive linear threshold (CLT) model, an extension to the classic linear threshold model. Under the CLT model, we focus on the problem that one entity tries to block the influence propagation of its competing entity as much as possible by strategically selecting a number of seed nodes that could initiate its own influence propagat"},"verification_status":{"content_addressed":true,"pith_receipt":true,"author_attested":false,"weak_author_claims":0,"strong_author_claims":0,"externally_anchored":false,"storage_verified":false,"citation_signatures":0,"replication_records":0,"graph_snapshot":true,"references_resolved":false,"formal_links_present":false},"canonical_record":{"source":{"id":"1110.4723","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SI","submitted_at":"2011-10-21T07:59:37Z","cross_cats_sorted":["physics.soc-ph"],"title_canon_sha256":"be0ac3c19b7ab394bad4809d0dd452a16d25a5dda9001ca8f64901d3dd1461f8","abstract_canon_sha256":"ac41cca0f944be1adaf87438a29d530a9c0955739864142eedb8040f0990e9ca"},"schema_version":"1.0"},"receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T04:10:35.194299Z","signature_b64":"aulzzQC/DGPynHxUIBlc3DsXXfiAKGrsZhqrypKLrvWARHkjcCnpPreXhJHJm7W5wcgH+6U3WblYiWVlJuUICQ==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"f4ea8642060e5ba6b9a561a20e545ebcfa6602eb7ac7307122380a81c15955e5","last_reissued_at":"2026-05-18T04:10:35.193748Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T04:10:35.193748Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"graph_snapshot":{"paper":{"title":"Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model Technical Report","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":["physics.soc-ph"],"primary_cat":"cs.SI","authors_text":"Guojie Song, Qingye Jiang, Wei Chen, Xinran He","submitted_at":"2011-10-21T07:59:37Z","abstract_excerpt":"In many real-world situations, different and often opposite opinions, innovations, or products are competing with one another for their social influence in a networked society. In this paper, we study competitive influence propagation in social networks under the competitive linear threshold (CLT) model, an extension to the classic linear threshold model. Under the CLT model, we focus on the problem that one entity tries to block the influence propagation of its competing entity as much as possible by strategically selecting a number of seed nodes that could initiate its own influence propagat"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1110.4723","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"aliases":[{"alias_kind":"arxiv","alias_value":"1110.4723","created_at":"2026-05-18T04:10:35.193835+00:00"},{"alias_kind":"arxiv_version","alias_value":"1110.4723v1","created_at":"2026-05-18T04:10:35.193835+00:00"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1110.4723","created_at":"2026-05-18T04:10:35.193835+00:00"},{"alias_kind":"pith_short_12","alias_value":"6TVIMQQGBZN2","created_at":"2026-05-18T12:26:22.705136+00:00"},{"alias_kind":"pith_short_16","alias_value":"6TVIMQQGBZN2NONF","created_at":"2026-05-18T12:26:22.705136+00:00"},{"alias_kind":"pith_short_8","alias_value":"6TVIMQQG","created_at":"2026-05-18T12:26:22.705136+00:00"}],"events":[],"event_summary":{},"paper_claims":[],"inbound_citations":{"count":0,"internal_anchor_count":0,"sample":[]},"formal_canon":{"evidence_count":0,"sample":[],"anchors":[]},"links":{"html":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT","json":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT.json","graph_json":"https://pith.science/api/pith-number/6TVIMQQGBZN2NONFMGRA4VC6XT/graph.json","events_json":"https://pith.science/api/pith-number/6TVIMQQGBZN2NONFMGRA4VC6XT/events.json","paper":"https://pith.science/paper/1110.4723"},"agent_actions":{"view_html":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT","download_json":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT.json","view_paper":"https://pith.science/paper/1110.4723","resolve_alias":"https://pith.science/api/pith-number/resolve?arxiv=1110.4723&json=true","fetch_graph":"https://pith.science/api/pith-number/6TVIMQQGBZN2NONFMGRA4VC6XT/graph.json","fetch_events":"https://pith.science/api/pith-number/6TVIMQQGBZN2NONFMGRA4VC6XT/events.json","actions":{"anchor_timestamp":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT/action/timestamp_anchor","attest_storage":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT/action/storage_attestation","attest_author":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT/action/author_attestation","sign_citation":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT/action/citation_signature","submit_replication":"https://pith.science/pith/6TVIMQQGBZN2NONFMGRA4VC6XT/action/replication_record"}},"created_at":"2026-05-18T04:10:35.193835+00:00","updated_at":"2026-05-18T04:10:35.193835+00:00"}