Time-Efficient Network Monitoring Through Confined Search and Adaptive Evaluation
暂无分享,去创建一个
Jun Liu | Jiamou Liu | Qifu Hu | Angsheng Li | J. Liu | Angsheng Li | Jun Liu | Qifu Hu
[1] Yicheng Zhang,et al. Identifying influential nodes in complex networks , 2012 .
[2] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[3] Kevin A. Kwiat,et al. Modeling the spread of active worms , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[4] Kamesh Munagala,et al. Local Search Heuristics for k-Median and Facility Location Problems , 2004, SIAM J. Comput..
[5] Yamir Moreno,et al. Theory of Rumour Spreading in Complex Social Networks , 2007, ArXiv.
[6] Ravishankar Krishnaswamy,et al. Relax, No Need to Round: Integrality of Clustering Formulations , 2014, ITCS.
[7] O. Kariv,et al. An Algorithmic Approach to Network Location Problems. II: The p-Medians , 1979 .
[8] David P. Williamson,et al. An Experimental Evaluation of Incremental and Hierarchical k-Median Algorithms , 2011, SEA.
[9] Bo Yan,et al. Dynamic Relationship Building: Exploitation Versus Exploration on a Social Network , 2017, WISE.
[10] Donald F. Towsley,et al. Monitoring and early warning for internet worms , 2003, CCS '03.
[11] Sudipto Guha,et al. A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.
[12] Sudipto Guha,et al. A constant-factor approximation algorithm for the k-median problem (extended abstract) , 1999, STOC '99.
[13] Mikkel Thorup,et al. Quick k-Median, k-Center, and Facility Location for Sparse Graphs , 2001, SIAM J. Comput..
[14] Andreas Krause,et al. Cost-effective outbreak detection in networks , 2007, KDD '07.
[15] Shi Li,et al. A Dependent LP-Rounding Approach for the k-Median Problem , 2012, ICALP.
[16] Jiamou Liu,et al. How to Build Your Network? A Structural Analysis , 2016, IJCAI.
[17] Milind Tambe,et al. Security Games for Controlling Contagion , 2012, AAAI.
[18] E. N. Gilbert,et al. Random Plane Networks , 1961 .
[19] Paulo Shakarian,et al. Finding Near-Optimal Groups of Epidemic Spreaders in a Complex Network , 2014, PloS one.
[20] Evangelos Markakis,et al. Greedy facility location algorithms analyzed using dual fitting with factor-revealing LP , 2002, JACM.
[21] Milind Tambe,et al. Bayesian Security Games for Controlling Contagion , 2013, 2013 International Conference on Social Computing.