<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Heuristics Approaches for the Influence Maximization Problem on Hypergraphs</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Vincenzo</forename><surname>Auletta</surname></persName>
							<email>auletta@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Information Engineering, Electrical Engineering and Applied Mathematics (DIEM)</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<postCode>I84084</postCode>
									<settlement>Fisciano</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Francesco</forename><surname>Cauteruccio</surname></persName>
							<email>fcauteruccio@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Information Engineering, Electrical Engineering and Applied Mathematics (DIEM)</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<postCode>I84084</postCode>
									<settlement>Fisciano</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Diodato</forename><surname>Ferraioli</surname></persName>
							<email>dferraioli@unisa.it</email>
							<affiliation key="aff0">
								<orgName type="department">Department of Information Engineering, Electrical Engineering and Applied Mathematics (DIEM)</orgName>
								<orgName type="institution">University of Salerno</orgName>
								<address>
									<postCode>I84084</postCode>
									<settlement>Fisciano</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">Italian Association for Artificial Intelligence</orgName>
								<address>
									<addrLine>November 25-28</addrLine>
									<postCode>2024</postCode>
									<settlement>Bolzano</settlement>
									<country key="IT">Italy</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Heuristics Approaches for the Influence Maximization Problem on Hypergraphs</title>
					</analytic>
					<monogr>
						<idno type="ISSN">1613-0073</idno>
					</monogr>
					<idno type="MD5">653873D9D657440AF02396DA0D0B9E4F</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2025-04-23T20:16+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Influence Maximization, Hypergraphs, Shapley Value, Hill Climbing, Evolution Strategies (D. Ferraioli) 0000-0002-7875-3366 (V. Auletta)</term>
					<term>0000-0001-8400-1083 (F. Cauteruccio)</term>
					<term>0000-0002-7962-5200 (D. Ferraioli)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>While the Influence Maximization (IM) problem has been extensively studied in graph topologies, with numerous algorithms and heuristics proposed, there has been relatively little focus on exploring this problem in the context of hypergraphs, which, despite being more complex, offer greater expressiveness. In this paper, we consider the current IM scenario considering hypergraph topologies, and we discuss two families of algorithms for the IM problem. The first family uses node importance measures that are specifically defined for hypergraphs, leveraging both topological characteristics and concepts from cooperative game theory. The second family addresses the problem through two well-known metaheuristic approaches, namely, hill climbing and evolution strategy. An initial experimental evaluation demonstrates that these approaches frequently outperform the leading algorithms currently proposed in the literature.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>The advent of social media and viral marketing has highlighted the critical need to understand how information, behaviors, and innovations propagate through networks. Central to this exploration is the influence maximization (IM) problem, a key concept in network theory, where the objective is to identify a group of key individuals in a network whose combined influence is maximized <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>. This problem has attracted substantial attention in different areas, and its implications are broad, impacting various applications, including opinion formation, combating misinformation, link recommendations, and even influencing election outcomes on social networks <ref type="bibr" target="#b2">[3,</ref><ref type="bibr" target="#b3">4,</ref><ref type="bibr" target="#b4">5,</ref><ref type="bibr" target="#b5">6,</ref><ref type="bibr" target="#b6">7]</ref>. The primary goal is to identify the smallest set of nodes (or seeds) in a graph that can maximize the spread of information under specific propagation models. Traditionally, the IM problem has been studied within the context of standard networks with dyadic relationships <ref type="bibr" target="#b1">[2,</ref><ref type="bibr" target="#b7">8]</ref>, with the seminal work in <ref type="bibr" target="#b0">[1]</ref> establishing hardness results and introducing an algorithm with a (1 − 1/𝑒) approximation guarantee under the independent cascade (IC) and linear threshold (LT) diffusion models. Over time, a variety of approaches tackling the IM problem have been developed <ref type="bibr" target="#b8">[9,</ref><ref type="bibr" target="#b9">10,</ref><ref type="bibr" target="#b10">11,</ref><ref type="bibr" target="#b11">12]</ref>. However, recent advancements in hypernetwork science, a field that explores higher-order interactions within complex systems <ref type="bibr" target="#b12">[13]</ref>, have introduced new opportunities. Hypergraphs, the primary modeling tool in this field, extend traditional graph theory by enabling edges (which we now call hyperedges) to connect multiple vertices simultaneously, offering a richer representation of real-world phenomena. While the IM problem has been extensively studied in ordinary networks, its adaptation to hypergraphs remains a relatively nascent area of research. Early efforts focused on transforming hypergraphs into simpler structures, such as bipartite graphs, to leverage existing algorithms <ref type="bibr" target="#b13">[14]</ref>. However, this approach often loses critical information encoded in the higherorder structure of hypergraphs. The computational challenges of IM in hypergraphs were rigorously explored in <ref type="bibr" target="#b14">[15]</ref>, which demonstrated the problem's NP-hardness and proposed an approximation framework with a (1 − 1/𝑒 − 𝜖) guarantee. Building on this foundation, recent studies have developed specialized algorithms tailored to specific diffusion models. For instance, <ref type="bibr" target="#b15">[16]</ref> introduced heuristics under the LT diffusion model, while <ref type="bibr" target="#b16">[17]</ref> proposed a ranking-based approach for the HyperCascade model. Algorithms like HADP <ref type="bibr" target="#b17">[18]</ref> and MEI <ref type="bibr" target="#b18">[19]</ref> have sought to minimize overlap between seeds to enhance influence spread, though both rely on transforming hypergraphs into simpler graph representations. Direct approaches to IM on hypergraphs have also gained traction. Similarly, <ref type="bibr" target="#b19">[20]</ref> modeled hypergraphs as electrostatic fields, introducing a novel perspective for assessing node influence. Other contributions, such as <ref type="bibr" target="#b20">[21]</ref>, extended message-passing techniques from ordinary networks to hypergraphs, focusing on collective influence within hyperedges. Research on weighted hypergraphs, as in <ref type="bibr" target="#b21">[22]</ref>, has introduced adaptive dissemination models to better capture real-world dynamics. Despite these advancements, many existing methods either specialize in a single diffusion process or require structural transformations that limit their generality.</p><p>Furthermore, it is worth noting that, to the best of our knowledge, several aspects remain understudied in this context. First, traditional types of IM algorithms have yet to be thoroughly explored for hypergraph topologies. Generally, classical IM approaches are categorized into four main types: (i) simulation-based, (ii) proxy-based, (iii) sketch-based, and (iv) intelligent optimization-based approaches. The first category includes algorithms that utilize techniques such as Monte Carlo simulations to model information propagation across individual nodes. A notable example is the algorithm proposed in <ref type="bibr" target="#b0">[1]</ref>, which has also been extended to hypergraph topologies. The second category adopts proxy models to approximate the influence spread of a given seed set, thereby avoiding potentially time-consuming simulations. Several algorithms in this category, such as those proposed in <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>, have been adapted for hypergraph topologies. The third category encompasses algorithms that evaluate influence spread by computing sketches based on the given graph and a specific diffusion model. While some classical approaches, such as reverse influence sampling, have been explored in the literature <ref type="bibr" target="#b17">[18]</ref>, their application to and formalization for hypergraph topologies remains an ongoing area of research. Finally, the fourth category involves the use of intelligent optimization algorithms, such as metaheuristic methods, to address the IM problem. Although a plethora of such approaches have been proposed in the classical setting, relatively few have been developed specifically for hypergraph topologies <ref type="bibr" target="#b22">[23]</ref>.</p><p>In this discussion paper, we illustrate an ongoing work focusing on the design and development of two families of approaches for tackling the IM problem on hypergraphs. These include node propertiesbased algorithms and metaheuristics-based algorithms. The former involves an algorithm that selects seed nodes by considering different centrality values, some of them also based on cooperative game theory. The latter consists of two metaheuristics algorithms based on hill climbing and evolutionary strategy, respectively. Also, we highlight an initial experimental evaluation, in which these algorithms are used, and we conclude by discussing several research directions that, in our opinion, are worth to be studied in the future.</p><p>The outline of the paper is as follows. In Section 2, we provide the background definitions and the problem statement. In Section 3, we discuss the two families of algorithms, and we briefly highlight an initial experimental evaluation assessing their performance. Finally, in Section 4, we draw our conclusion and discuss a series of future directions regarding this context.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Problem Statement</head><p>A hypergraph 𝐻 = (𝑉, 𝐸) is a pair consisting of a set 𝑉 = {𝑣 1 , . . . , 𝑣 𝑛 } of elements called nodes, and a family of sets 𝐸 = (𝑒 1 , . . . , 𝑒 𝑚 ) called hyperedges. A hyperedge represents a relation among a subset of vertices in 𝑉 , i.e., 𝑒 𝑗 ⊆ 𝑉 , for all 𝑗 = 1, . . . , 𝑚. The order of a hypergraph is its number of nodes, i.e., 𝑛 = |𝑉 |, while the size of a hypergraph is 𝑚 = |𝐸|. A node 𝑣 𝑖 ∈ 𝑉 belongs to a hyperedge 𝑒 𝑗 ∈ 𝐸 if 𝑣 𝑗 ∈ 𝑒 𝑗 . The degree of a node 𝑣 𝑖 is the number 𝑑(𝑣 𝑖 ) of neighbors of 𝑣 𝑖 ; a node 𝑣 𝑙 ∈ 𝑉 is the neighbor of node 𝑣 𝑖 iff there exists at least one hyperedge 𝑒 𝑗 which 𝑣 𝑙 and 𝑣 𝑖 both belong to. The hyperdegree of a node 𝑣 𝑖 is the number 𝑑 𝐻 (𝑣 𝑖 ) of hyperedges to which 𝑣 𝑖 belongs. The line graph 𝐿(𝐻) of 𝐻 is the graph on node set 𝐸 ′ = {𝑒 ′ 1 , . . . , 𝑒 ′ 𝑚 } and edge set 𝑉 ′ = {{𝑒 ′ 𝑖 , 𝑒 ′ 𝑗 } : 𝑒 𝑖 ∩ 𝑒 𝑗 ̸ = ∅ for 𝑖 ̸ = 𝑗} <ref type="bibr" target="#b23">[24]</ref>. In other words, 𝐿(𝐻) is the graph where nodes represent the hyperedges, and there is an edge between two nodes if the two hyperedges share at least one common node in 𝐻. Furthermore, given a set 𝑉 of nodes and a function 𝜈 : 2 𝑉 → R, that assigns a measure of importance to each subset of nodes, the Shapley value of 𝑣 ∈ 𝑉 <ref type="bibr" target="#b24">[25]</ref> with respect to 𝜈 is defined as the average of the marginal contribution of 𝑣 to the subsets at which she belongs, i.e., how much she increases the importance of these groups. The Shapley value can be efficiently computed for the following specific choices of 𝜈 <ref type="bibr" target="#b25">[26]</ref>, namely: (i) 𝜈 𝑑𝑒𝑔 (𝑆), that measures the importance of a subset 𝑆 of nodes as its size and the number of neighbors; (ii) 𝜈 𝑐𝑙𝑜𝑠𝑒 (𝑆), that measures the importance of a subset 𝑆 of nodes as the inverse of the minimum distance between nodes outside 𝑆 from nodes in 𝑆. Given a hypergraph 𝐻 = (𝑉, 𝐸), a value 𝑘 ∈ Z &gt;0 , and a diffusion process model on hypergraph 𝜎 𝐻 , the Influence Maximization (IM) problem on hypergraphs consists in finding a subset 𝑆 * ⊆ 𝑉 of 𝑘 nodes, called seed node set, such that the expected number of infected nodes is maximized. Formally, 𝑆 * = arg max 𝑆⊆𝑉,|𝑆|=𝑘 𝜎 𝐻 (𝑆), where 𝜎 𝐻 (𝑆) indicates the expected influence (i.e., the number of reached nodes) of the seed node set 𝑆 at the end of the process. In line with the literature <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>, we use the Susceptible-Infected (SI) model with Contact Process (CP) dynamics on hypergraphs (SICP <ref type="bibr" target="#b17">[18]</ref>). In this model, a node can be either in a susceptible (S) or infected (I) state. An S-state node can be infected by each of its neighbors in the I-state with a given infection rate 𝛽. The model works as follows: (i) nodes in the seed set are set to be infected (I-state), and the remaining nodes are susceptible (S-state); (ii) at each time step 𝑡, we find the I-state nodes. For each I-state node 𝑣 𝑖 , we find all hyperedges 𝐸 𝑖 containing the node 𝑣 𝑖 . Then, a hyperedge 𝑒 𝑗 is chosen from 𝐸 𝑖 uniformly at random. Then, each of the S-state nodes in 𝑒 𝑗 will be infected by 𝑣 𝑖 with probability 𝛽; (iii) the process terminates after 𝑇 steps, and we set 𝜎 𝐻 (𝑆) to be the number of nodes in I-state.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Algorithms and Results</head><p>We discuss two families of algorithms to tackle the IM problem on hypergraphs. The first one consists of an algorithm called SmartPROPS. It leverages node centrality to construct an optimal seed set, based on a node property function 𝜑 : 𝑉 → R and a threshold function 𝜌 : 𝑉 → R. The idea behind the algorithm is to use 𝜑 to sort nodes, and then iteratively select the most important one based on 𝜌, which ensures that nodes with a considerable number of overlapping hyperedges are discarded. We propose four different variants of SmartPROPS, namely: (i) SmartDEG, in which the seeds coincide with the top-𝑘 highest degree nodes <ref type="bibr" target="#b1">[2]</ref>, and 𝜑 is the degree centrality; (ii) SmartHYPERDEG, similar as the previous one, it exploits the hyperdegree of each node; (iii) SmartSHAPDEG, the Shapley Degree value, computed on 𝐿(𝐻), is used as the node property; (iv) SmartSHAPCLOSE, here the Shapley Closeness is used as the node property instead. The second family of algorithms is metaheuristics-based, and includes two algorithms, HC and ES. The former is based on a random-restart steepest ascent hill climbing approach. It is a simple yet powerful and versatile metaheuristic optimization algorithm that iteratively seeks to improve a solution with respect to a given measure of quality; it has been used extensively in disparate contexts <ref type="bibr" target="#b26">[27,</ref><ref type="bibr" target="#b27">28,</ref><ref type="bibr" target="#b28">29]</ref>. The algorithm begins by randomly selecting an initial solution and iteratively improves it by generating neighbor solutions, via a perturbation function, and upgrading it accordingly to the calculated expected influence. Eventually, a global best solution is obtained when no further improvements are possible. Four variants can be defined: HC 1 , where a node from 𝑅 is replaced with one of its neighbors chosen randomly from the largest hyperedge containing the former; HC 2 , similarly as HC 1 but the node to be replaced is the one with the smaller degree value; HC 3 and HC 4 replace the node having respectively the smallest Shapley Degree value and the smallest Shapley Closeness value. Instead, ES draws inspiration from a population-based metaheuristic inspired by the principles of biological evolution, called evolution strategy <ref type="bibr" target="#b29">[30]</ref>, and it is based in particular on a variant called (𝜇 + 𝜆) <ref type="bibr" target="#b30">[31]</ref>, where 𝜇 is the number of candidate solutions in the parent generation, and 𝜆 is the number of candidate solutions obtained from the parent generation. The algorithm iterates for a given number of generations. At each generation, the best 𝜇 solutions are kept from the 𝜆 candidates and their parents. At the start, ES initializes a population of 𝜇 individuals, chosen uniformly at random. In each generation, the algorithms iterates over 𝜆 to generate the same amounts of new solutions via a mutation operator. This operator implements the same variations proposed for the HC algorithm, leading to the ES 1 , ES 2 , ES 3 , and ES 4 variants. We now highlight some preliminary results of the proposed algorithms on eight real-world hypergraphs used as benchmarks in the literature <ref type="bibr" target="#b17">[18,</ref><ref type="bibr" target="#b18">19]</ref>. Different baselines are considered, namely, Degree, Greedy, HADP <ref type="bibr" target="#b17">[18]</ref>, and Adeff <ref type="bibr" target="#b18">[19]</ref> <ref type="foot" target="#foot_0">1</ref> . The first is a common baseline based on selecting the top-𝑘 nodes with the maximal degree. The second one is drawn by the approach in <ref type="bibr" target="#b0">[1]</ref>, and selects the node with maximal influence in each iteration. The last two are recently proposed algorithms for the problem. For the discussed algorithms, we set parameters as follows: for HC, we set the number of restarts to 25, while for ES, we set 𝜇 = 4, 𝜆 = 10, and the maximum number of generations to 25. The obtained influence spread curve is presented in Figure <ref type="figure" target="#fig_0">1</ref>, averaged over 100 runs. For variants, we only show HC 1 and ES 1 . The 𝑥-axis refers to the value of 𝑘, while the 𝑦-axis reports the average expected influence 𝜎 𝐻 (𝑆). Inside each plot, a smaller one reports the obtained value at 𝑘 = 25. We can see how the metaheuristics-based algorithms generally perform better than the remaining ones. Also, they achieve the largest expected influence when 𝑘 = 1. Except for some cases where the Greedy reaches similar values, no other algorithms perform in the same manner. As far as 𝑘 = 25 is concerned, we observe almost identical behavior to the previous one. Here, HC 1 and ES 1 perform effectively, together with the Greedy one.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusion and Future Directions</head><p>This discussion paper explores the Influence Maximization (IM) problem within hypergraph topologies, an area that remains largely understudied despite its significant potential for capturing higher-order interactions in complex systems. In this paper, we critically discuss two families of algorithms, namely, (i) node properties-based, (ii) and metaheuristics-based ones, designed to address the challenges of the IM problem on hypergraph topologies. The first family involves an algorithm that leverages hypergraphspecific features, such as Shapley-based centrality measures, to select the seed set, while the second one includes metaheuristics algorithms, and in particular hill climbing and evolutionary strategies, to tackle the problem. Our initial analysis, supported by experimental observations, provides insight into the potential of these approaches while highlighting areas where further refinement is needed.</p><p>As this is an ongoing effort, several directions for future research emerge. First, we aim to deepen our understanding of the problem by performing a comprehensive evaluation across diverse hypergraph structures and diffusion models. This includes investigating settings with different conditions, such as hypergraphs evolving over time, and hypergraphs presenting weights and other dynamic features.</p><p>Second, a critical area of future work lies in designing scalable algorithms suitable for large-scale hypergraphs. Indeed, such algorithms could require exploring parallelization techniques and designing more efficient heuristics. Furthermore, incorporating adaptive mechanisms to optimize parameter selection dynamically could improve algorithmic robustness and applicability. Third, an understudied aspect is investigating practical applications of the IM problem in domains such as social influence campaigns, biological networks, and knowledge graph propagation. Bridging the gap between theoretical discussions and real-world deployment is essential for demonstrating the utility of hypergraph-based IM approaches. Finally, future work could also explore the integration of these algorithms with machine learning models to predict influence spread, potentially combining traditional IM techniques with data-driven approaches.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Expected influence 𝜎 𝐻 (𝑆) obtained with different values of 𝑘 (from 1 to 25), averaged over 100 runs, and with the SICP parameters being 𝛽 = 0.01 and 𝑇 = 25.</figDesc></figure>
			<note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="1" xml:id="foot_0">All algorithms have been implemented in Python 3.10</note>
		</body>
		<back>

			<div type="acknowledgement">
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Acknowledgments</head><p>This work is supported by the PNRR project FAIR-Future AI Research (PE00000013) under the NRRP MUR program funded by NextGenerationEU.</p></div>
			</div>

			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">Maximizing the spread of influence through a social network</title>
		<author>
			<persName><forename type="first">D</forename><surname>Kempe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Kleinberg</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Tardos</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD)</title>
				<meeting>of the of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (KDD)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2003">2003</date>
			<biblScope unit="page" from="137" to="146" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<analytic>
		<title level="a" type="main">A survey on influence maximization in a social network</title>
		<author>
			<persName><forename type="first">S</forename><surname>Banerjee</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Jenamani</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">K</forename><surname>Pratihar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Knowledge and Information Systems</title>
		<imprint>
			<biblScope unit="volume">62</biblScope>
			<biblScope unit="page" from="3417" to="3455" />
			<date type="published" when="2020">2020</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">On the complexity of reasoning about opinion diffusion under majority dynamics</title>
		<author>
			<persName><forename type="first">V</forename><surname>Auletta</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ferraioli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Greco</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Artificial Intelligence</title>
		<imprint>
			<biblScope unit="volume">284</biblScope>
			<biblScope unit="page">103288</biblScope>
			<date type="published" when="2020">2020</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Election manipulation on social networks: Seeding, edge removal, edge addition</title>
		<author>
			<persName><forename type="first">M</forename><surname>Castiglioni</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ferraioli</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Gatti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Landriani</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">71</biblScope>
			<biblScope unit="page" from="1049" to="1090" />
			<date type="published" when="2021">2021</date>
			<publisher>AI Access Foundation</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">An approach to detect backbones of information diffusers among different communities of a social platform</title>
		<author>
			<persName><forename type="first">G</forename><surname>Bonifazi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cauteruccio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Corradini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Marchetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Pierini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Terracina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ursino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Virgili</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data &amp; Knowledge Engineering</title>
		<imprint>
			<biblScope unit="volume">140</biblScope>
			<biblScope unit="page">102048</biblScope>
			<date type="published" when="2022">2022</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">Scalable influence maximization for prevalent viral marketing in large-scale social networks</title>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)</title>
				<meeting>of the ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="1029" to="1038" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">End-to-end influence maximization in the field</title>
		<author>
			<persName><forename type="first">B</forename><surname>Wilder</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Onasch-Vera</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Hudson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Luna</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Wilson</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Petering</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Woo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Tambe</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Rice</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS)</title>
				<meeting>of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS)</meeting>
		<imprint>
			<date type="published" when="2018">2018</date>
			<biblScope unit="volume">18</biblScope>
			<biblScope unit="page" from="1414" to="1422" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<analytic>
		<title level="a" type="main">Identifying influential nodes in social networks: Exploiting self-voting mechanism</title>
		<author>
			<persName><forename type="first">P</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Fang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Big Data</title>
		<imprint>
			<biblScope unit="volume">11</biblScope>
			<biblScope unit="page" from="296" to="306" />
			<date type="published" when="2023">2023</date>
			<publisher>Mary Ann Liebert</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<analytic>
		<title level="a" type="main">Celf++ optimizing the greedy algorithm for influence maximization in social networks</title>
		<author>
			<persName><forename type="first">A</forename><surname>Goyal</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Lu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><forename type="middle">V</forename><surname>Lakshmanan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 20th international conference companion on World Wide Web (WWW)</title>
				<meeting>of the 20th international conference companion on World Wide Web (WWW)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2011">2011</date>
			<biblScope unit="page" from="47" to="48" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">Scalable influence maximization for independent cascade model in large-scale social networks</title>
		<author>
			<persName><forename type="first">C</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Wang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Data Mining and Knowledge Discovery</title>
		<imprint>
			<biblScope unit="volume">25</biblScope>
			<biblScope unit="page" from="545" to="576" />
			<date type="published" when="2012">2012</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Influence maximization in near-linear time: A martingale approach</title>
		<author>
			<persName><forename type="first">Y</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Shi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xiao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2015 ACM International Conference on Management of Data (SIGMOD)</title>
				<meeting>of the 2015 ACM International Conference on Management of Data (SIGMOD)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2015">2015</date>
			<biblScope unit="page" from="1539" to="1554" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Scalable influence maximization in social networks under the linear threshold model</title>
		<author>
			<persName><forename type="first">W</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yuan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">L</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 2010 IEEE International Conference on Data Mining (ICDM)</title>
				<meeting>of the 2010 IEEE International Conference on Data Mining (ICDM)</meeting>
		<imprint>
			<publisher>IEEE</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="page" from="88" to="97" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Networks beyond pairwise interactions: Structure and dynamics</title>
		<author>
			<persName><forename type="first">F</forename><surname>Battiston</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cencetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">I</forename><surname>Iacopini</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Latora</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lucas</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Patania</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-G</forename><surname>Young</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Petri</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Physics Reports</title>
		<imprint>
			<biblScope unit="volume">874</biblScope>
			<biblScope unit="page" from="1" to="92" />
			<date type="published" when="2020">2020</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">Influence maximization in social media networks using hypergraphs</title>
		<author>
			<persName><forename type="first">F</forename><surname>Amato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Moscato</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Picariello</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Sperlí</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the International Conference on Green, Pervasive, and Cloud Computing (GPC)</title>
				<meeting>of the International Conference on Green, Pervasive, and Cloud Computing (GPC)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="207" to="221" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<title level="a" type="main">Social influence maximization in hypergraph in social networks</title>
		<author>
			<persName><forename type="first">J</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Zhu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Ghosh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yuan</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Network Science and Engineering</title>
		<imprint>
			<biblScope unit="volume">6</biblScope>
			<biblScope unit="page" from="801" to="811" />
			<date type="published" when="2018">2018</date>
			<publisher>IEEE</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Social influence maximization in hypergraphs</title>
		<author>
			<persName><forename type="first">A</forename><surname>Antelmi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Cordasco</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Spagnuolo</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Szufel</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Entropy</title>
		<imprint>
			<biblScope unit="volume">23</biblScope>
			<biblScope unit="page">796</biblScope>
			<date type="published" when="2021">2021</date>
			<publisher>MDPI</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<analytic>
		<title level="a" type="main">Hyper-imrank: Ranking-based influence maximization for hypergraphs</title>
		<author>
			<persName><forename type="first">A</forename><surname>Ma</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Rajkumar</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 5th Joint International Conference on Data Science &amp; Management of Data (9th ACM IKDD CODS and 27th COMAD)</title>
				<meeting>of the 5th Joint International Conference on Data Science &amp; Management of Data (9th ACM IKDD CODS and 27th COMAD)</meeting>
		<imprint>
			<publisher>ACM</publisher>
			<date type="published" when="2022">2022</date>
			<biblScope unit="page" from="100" to="104" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<analytic>
		<title level="a" type="main">An efficient adaptive degree-based heuristic algorithm for influence maximization in hypergraphs</title>
		<author>
			<persName><forename type="first">M</forename><surname>Xie</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X.-X</forename><surname>Zhan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z.-K</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing &amp; Management</title>
		<imprint>
			<biblScope unit="volume">60</biblScope>
			<biblScope unit="page">103161</biblScope>
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<analytic>
		<title level="a" type="main">Influence maximization on hypergraphs via multi-hop influence estimation</title>
		<author>
			<persName><forename type="first">X</forename><surname>Gong</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><forename type="middle">W X</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Chen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">W</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhang</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing &amp; Management</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page">103683</biblScope>
			<date type="published" when="2024">2024</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">Influence maximization in hypergraphs: A self-optimizing algorithm based on electrostatic field</title>
		<author>
			<persName><forename type="first">S</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Li</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Chaos, Solitons &amp; Fractals</title>
		<imprint>
			<biblScope unit="volume">174</biblScope>
			<biblScope unit="page">113888</biblScope>
			<date type="published" when="2023">2023</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<analytic>
		<title level="a" type="main">Influence maximization based on threshold models in hypergraphs</title>
		<author>
			<persName><forename type="first">R</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Qu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><surname>Zhang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Xu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Pei</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Chaos: An Interdisciplinary Journal of Nonlinear Science</title>
		<imprint>
			<biblScope unit="volume">34</biblScope>
			<date type="published" when="2024">2024</date>
			<publisher>AIP Publishing</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<analytic>
		<title level="a" type="main">Eioa: A computing expectation-based influence evaluation method in weighted hypergraphs</title>
		<author>
			<persName><forename type="first">Q</forename><surname>Pan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">H</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Tang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Lv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><surname>Wang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">X</forename><surname>Wu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Ruan</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Yv</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Lao</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Information Processing &amp; Management</title>
		<imprint>
			<biblScope unit="volume">61</biblScope>
			<biblScope unit="page">103856</biblScope>
			<date type="published" when="2024">2024</date>
			<publisher>Elsevier</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">Influence maximization in hypergraphs using multi-objective evolutionary algorithms</title>
		<author>
			<persName><forename type="first">S</forename><surname>Genetti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Ribaga</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Cunegatti</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Q</forename><forename type="middle">F</forename><surname>Lotito</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Iacca</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of the 18th International Conference on Parallel Problem Solving from Nature (PPSN)</title>
				<meeting>of the 18th International Conference on Parallel Problem Solving from Nature (PPSN)</meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2024">2024</date>
			<biblScope unit="page" from="217" to="235" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<analytic>
		<title level="a" type="main">Hypernetwork science via high-order hypergraph walks</title>
		<author>
			<persName><forename type="first">S</forename><forename type="middle">G</forename><surname>Aksoy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Joslyn</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">O</forename><surname>Marrero</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Praggastis</surname></persName>
		</author>
		<author>
			<persName><forename type="first">E</forename><surname>Purvine</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">EPJ Data Science</title>
		<imprint>
			<biblScope unit="volume">9</biblScope>
			<biblScope unit="page">16</biblScope>
			<date type="published" when="2020">2020</date>
			<publisher>Springer</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<analytic>
		<title level="a" type="main">A value for n-person games</title>
		<author>
			<persName><forename type="first">L</forename><surname>Shapley</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Contributions to the Theory of Games</title>
				<imprint>
			<publisher>Princeton University Press</publisher>
			<date type="published" when="1953">1953</date>
			<biblScope unit="page" from="307" to="317" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<analytic>
		<title level="a" type="main">Efficient computation of the shapley value for game-theoretic network centrality</title>
		<author>
			<persName><forename type="first">T</forename><surname>Michalak</surname></persName>
		</author>
		<author>
			<persName><forename type="first">K</forename><surname>Aadithya</surname></persName>
		</author>
		<author>
			<persName><forename type="first">P</forename><surname>Szczepanski</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Ravindran</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><surname>Jennings</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Journal of Artificial Intelligence Research</title>
		<imprint>
			<biblScope unit="volume">46</biblScope>
			<biblScope unit="page" from="607" to="650" />
			<date type="published" when="2013">2013</date>
			<publisher>AI Access Foundation</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<author>
			<persName><forename type="first">M</forename><surname>Gendreau</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J.-Y</forename><surname>Potvin</surname></persName>
		</author>
		<title level="m">Handbook of metaheuristics</title>
				<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2010">2010</date>
			<biblScope unit="volume">2</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">An improved hill climbing algorithm for graph partitioning</title>
		<author>
			<persName><forename type="first">H</forename><surname>Li</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Liu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Lin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><surname>Yoo</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">The Computer Journal</title>
		<imprint>
			<biblScope unit="volume">66</biblScope>
			<biblScope unit="page" from="1761" to="1776" />
			<date type="published" when="2023">2023</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b28">
	<analytic>
		<title level="a" type="main">A model-guided string-based approach to white matter fiber-bundles extraction</title>
		<author>
			<persName><forename type="first">C</forename><surname>Stamile</surname></persName>
		</author>
		<author>
			<persName><forename type="first">F</forename><surname>Cauteruccio</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Terracina</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Ursino</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Kocevar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">D</forename><surname>Sappey-Marinier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proc. of 8th International Conference on Brain Informatics and Health (BIH 2015)</title>
				<meeting>of 8th International Conference on Brain Informatics and Health (BIH 2015)<address><addrLine>London, UK</addrLine></address></meeting>
		<imprint>
			<publisher>Springer</publisher>
			<date type="published" when="2015-09-02">August 30-September 2, 2015. 2015</date>
			<biblScope unit="volume">8</biblScope>
			<biblScope unit="page" from="135" to="144" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b29">
	<monogr>
		<title level="m" type="main">Evolutionary algorithms in theory and practice: evolution strategies, evolutionary programming, genetic algorithms</title>
		<author>
			<persName><forename type="first">T</forename><surname>Back</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1996">1996</date>
			<publisher>Oxford University Press</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b30">
	<monogr>
		<title level="m" type="main">Evolutionary optimization algorithms</title>
		<author>
			<persName><forename type="first">D</forename><surname>Simon</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2013">2013</date>
			<publisher>John Wiley &amp; Sons</publisher>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
