Learning cascaded influence under partial monitoring
暂无分享,去创建一个
[1] Jie Tang,et al. Modeling Indirect Influence on Twitter , 2012, Int. J. Semantic Web Inf. Syst..
[2] Xiaohua Hu,et al. Tackling the Achilles Heel of Social Networks: Influence Propagation based Language Model Smoothing , 2015, WWW.
[3] Jie Tang,et al. ArnetMiner: extraction and mining of academic social networks , 2008, KDD.
[4] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[5] Lars Backstrom,et al. Structural diversity in social contagion , 2012, Proceedings of the National Academy of Sciences.
[6] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[7] Nicolò Cesa-Bianchi,et al. Combinatorial Bandits , 2012, COLT.
[8] Robert E. Schapire,et al. Non-Stochastic Bandit Slate Problems , 2010, NIPS.
[9] Jure Leskovec,et al. Information diffusion and external influence in networks , 2012, KDD.
[10] Sinan Aral,et al. Identifying Influential and Susceptible Members of Social Networks , 2012, Science.
[11] Jean-Yves Audibert,et al. Minimax Policies for Adversarial and Stochastic Bandits. , 2009, COLT 2009.
[12] Peter Auer,et al. Finite-time Analysis of the Multiarmed Bandit Problem , 2002, Machine Learning.
[13] Laks V. S. Lakshmanan,et al. Learning influence probabilities in social networks , 2010, WSDM '10.
[14] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[15] Tamás Linder,et al. The On-Line Shortest Path Problem Under Partial Monitoring , 2007, J. Mach. Learn. Res..
[16] Matthew Richardson,et al. Mining the network value of customers , 2001, KDD '01.
[17] Cameron Marlow,et al. A 61-million-person experiment in social influence and political mobilization , 2012, Nature.
[18] Reynold Cheng,et al. Online Influence Maximization , 2015, KDD.
[19] Masahiro Kimura,et al. Prediction of Information Diffusion Probabilities for Independent Cascade Model , 2008, KES.
[20] Zheng Wen,et al. Combinatorial Cascading Bandits , 2015, NIPS.
[21] Juan-Zi Li,et al. Social Influence Locality for Modeling Retweeting Behaviors , 2013, IJCAI.
[22] Wtt Wtt. Tight Regret Bounds for Stochastic Combinatorial Semi-Bandits , 2015 .
[23] Csaba Szepesvári,et al. Partial Monitoring - Classification, Regret Bounds, and Algorithms , 2014, Math. Oper. Res..
[24] Yifeng Zeng,et al. Influence Maximization with Novelty Decay in Social Networks , 2014, AAAI.
[25] Wei Chen,et al. Combinatorial Multi-Armed Bandit: General Framework and Applications , 2013, ICML.
[26] Jimeng Sun,et al. Confluence: conformity influence in large social networks , 2013, KDD.
[27] Peter Auer,et al. The Nonstochastic Multiarmed Bandit Problem , 2002, SIAM J. Comput..
[28] Gábor Lugosi,et al. Regret in Online Combinatorial Optimization , 2012, Math. Oper. Res..
[29] Jimeng Sun,et al. Social influence analysis in large-scale networks , 2009, KDD.
[30] Conor Hayes,et al. Cross-Community Influence in Discussion Fora , 2012, ICWSM.
[31] Alexandre Proutière,et al. Combinatorial Bandits Revisited , 2015, NIPS.