Locating the contagion source in networks with partial timestamps
暂无分享,去创建一个
[1] David S. Johnson,et al. Computers and Inrracrobiliry: A Guide ro the Theory of NP-Completeness , 1979 .
[2] Lei Ying,et al. Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).
[3] Jure Leskovec,et al. Correcting for missing data in information cascades , 2011, WSDM '11.
[4] Stephen P. Boyd,et al. Accuracy at the Top , 2012, NIPS.
[5] Lenka Zdeborová,et al. Inferring the origin of an epidemy with dynamic message-passing algorithm , 2013, Physical review. E, Statistical, nonlinear, and soft matter physics.
[6] Devavrat Shah,et al. Rumor centrality: a universal source detector , 2012, SIGMETRICS '12.
[7] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[8] Chee Wei Tan,et al. Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.
[9] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[10] Wuqiong Luo,et al. How to Identify an Infection Source With Limited Observations , 2013, IEEE Journal of Selected Topics in Signal Processing.
[11] Dimitrios Gunopulos,et al. Finding effectors in social networks , 2010, KDD.
[12] Lei Ying,et al. Information source detection in the SIR model: A sample path based approach , 2013, ITA.
[13] Laks V. S. Lakshmanan,et al. SIMPATH: An Efficient Algorithm for Influence Maximization under the Linear Threshold Model , 2011, 2011 IEEE 11th International Conference on Data Mining.
[14] Ramanathan V. Guha,et al. Information diffusion through blogspace , 2004, WWW '04.
[15] J. Char. Generation of Trees, Two-Trees, and Storage of Master Forests , 1968 .
[16] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[17] Nam P. Nguyen,et al. Sources of misinformation in Online Social Networks: Who to suspect? , 2012, MILCOM 2012 - 2012 IEEE Military Communications Conference.
[18] Chee Wei Tan,et al. Rumor source detection with multiple observations: fundamental limits and algorithms , 2014, SIGMETRICS '14.
[19] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[20] Yue M. Lu,et al. A fast Monte Carlo algorithm for source localization on graphs , 2013, Optics & Photonics - Optical Engineering + Applications.
[21] Jure Leskovec,et al. Information diffusion and external influence in networks , 2012, KDD.
[22] Massimo Franceschetti,et al. Rumor source detection under probabilistic sampling , 2013, 2013 IEEE International Symposium on Information Theory.
[23] Bruno Sinopoli,et al. Network observability and localization of the source of diffusion based on a subset of nodes , 2013, 2013 51st Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[24] Huan Liu,et al. Seeking provenance of information using social media , 2013, CIKM.
[25] Christos Faloutsos,et al. Rise and fall patterns of information diffusion: model and implications , 2012, KDD.
[26] Martin Vetterli,et al. Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.
[27] Wuqiong Luo,et al. Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.
[28] Christos Faloutsos,et al. Spotting Culprits in Epidemics: How Many and Which Ones? , 2012, 2012 IEEE 12th International Conference on Data Mining.
[29] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[30] Wuqiong Luo,et al. Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[31] P. Pattison,et al. Cumulated social roles: The duality of persons and their algebras☆ , 1986 .
[32] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[33] Devavrat Shah,et al. Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.