Analysis of Heuristic Techniques for Controlling Contagion
暂无分享,去创建一个
[1] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[2] Milind Tambe,et al. GUARDS: game theoretic security allocation on a national scale , 2011, AAMAS.
[3] Wei Chen,et al. Influence Blocking Maximization in Social Networks under the Competitive Linear Threshold Model , 2011, SDM.
[4] Kyle Beardsley,et al. Peacekeeping and the Contagion of Armed Conflict , 2011 .
[5] Nicholas J. Howard,et al. Finding optimal strategies for influencing social networks in two player games , 2010 .
[6] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[7] K. Pauwels,et al. Effects of Word-of-Mouth versus Traditional Marketing: Findings from an Internet Social Networking Site , 2009 .
[8] Allan Borodin,et al. Threshold Models for Competitive Influence in Social Networks , 2010, WINE.
[9] Roger Wattenhofer,et al. Word of Mouth: Rumor Dissemination in Social Networks , 2008, SIROCCO.
[10] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[11] Bo An,et al. PROTECT: a deployed game theoretic system to protect the ports of the United States , 2012, AAMAS.
[12] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[13] Shishir Bharathi,et al. Competitive Influence Maximization in Social Networks , 2007, WINE.
[14] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[15] Divyakant Agrawal,et al. Limiting the spread of misinformation in social networks , 2011, WWW.
[16] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.
[17] Nicola Basilico,et al. Automated Abstractions for Patrolling Security Games , 2011, AAAI.
[18] Asuman E. Ozdaglar,et al. Optimization-based influencing of village social networks in a counterinsurgency , 2011, TIST.
[19] Vincent Conitzer,et al. Multi-Step Multi-Sensor Hider-Seeker Games , 2009, IJCAI.
[20] Vincent Conitzer,et al. A double oracle algorithm for zero-sum security games on graphs , 2011, AAMAS.
[21] Benjamin W. K. Hung. Optimization-based selection of influential agents in a rural Afghan social network , 2010 .
[22] Michael Kearns,et al. Competitive contagion in networks , 2011, STOC '12.
[23] Avrim Blum,et al. Planning in the Presence of Cost Functions Controlled by an Adversary , 2003, ICML.