How to Identify an Infection Source With Limited Observations
暂无分享,去创建一个
[1] Jonathan Currie,et al. Opti: Lowering the Barrier Between Open Source Optimizers and the Industrial MATLAB User , 2012 .
[2] Jure Leskovec,et al. The dynamics of viral marketing , 2005, EC '06.
[3] Harald Haas,et al. Asilomar Conference on Signals, Systems, and Computers , 2006 .
[4] Xin-She Yang,et al. Introduction to Algorithms , 2021, Nature-Inspired Optimization Algorithms.
[5] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[6] Gueorgi Kossinets,et al. Empirical Analysis of an Evolving Social Network , 2006, Science.
[7] William Feller,et al. An Introduction to Probability Theory and Its Applications , 1967 .
[8] Martin Vetterli,et al. Locating the Source of Diffusion in Large-Scale Networks , 2012, Physical review letters.
[9] David J. C. MacKay,et al. Information Theory, Inference, and Learning Algorithms , 2004, IEEE Transactions on Information Theory.
[10] Steffen Staab,et al. Social Networks Applied , 2005, IEEE Intell. Syst..
[11] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[12] Lei Ying,et al. Information source detection in the SIR model: A sample path based approach , 2012, 2013 Information Theory and Applications Workshop (ITA).
[13] Ying-Hai Wang,et al. Role of diffusion in an epidemic model of mobile individuals on networks , 2012, The European Physical Journal B.
[14] L. Allen. Some discrete-time SI, SIR, and SIS epidemic models. , 1994, Mathematical biosciences.
[15] Duncan J. Watts,et al. Everyone's an influencer: quantifying influence on twitter , 2011, WSDM '11.
[16] Ray-Guang Cheng,et al. Modeling Information Dissemination in Generalized Social Networks , 2013, IEEE Communications Letters.
[17] Devavrat Shah,et al. Rumors in a Network: Who's the Culprit? , 2009, IEEE Transactions on Information Theory.
[18] John Scott. What is social network analysis , 2010 .
[19] Wuqiong Luo,et al. Identifying Infection Sources and Regions in Large Networks , 2012, IEEE Transactions on Signal Processing.
[20] Wei Chen,et al. Efficient influence maximization in social networks , 2009, KDD.
[21] Ramanathan V. Guha,et al. Information diffusion through blogspace , 2004, WWW '04.
[22] Jure Leskovec,et al. Learning to Discover Social Circles in Ego Networks , 2012, NIPS.
[23] Yilun Shang,et al. Mixed SI (R) epidemic dynamics in random graphs with general degree distributions , 2013, Appl. Math. Comput..
[24] S. M. Hedetniemi,et al. Linear Algorithms for Finding the Jordan Center and Path Center of a Tree , 1981 .
[25] N. Ling. The Mathematical Theory of Infectious Diseases and its applications , 1978 .
[26] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[27] Krishna P. Gummadi,et al. Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.
[28] Yu Zhang,et al. Identifying Key Users for Targeted Marketing by Mining Online Social Network , 2010, 2010 IEEE 24th International Conference on Advanced Information Networking and Applications Workshops.
[29] Duncan J. Watts,et al. Collective dynamics of ‘small-world’ networks , 1998, Nature.
[30] Thomas H. Cormen,et al. Introduction to algorithms [2nd ed.] , 2001 .
[31] Jure Leskovec,et al. Inferring networks of diffusion and influence , 2010, KDD.
[32] Huan Liu,et al. Synthesis Lectures on Data Mining and Knowledge Discovery , 2009 .
[33] Feller William,et al. An Introduction To Probability Theory And Its Applications , 1950 .
[34] Wuqiong Luo,et al. Finding an infection source under the SIS model , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.
[35] Gonzalo Camarillo,et al. Towards the Convergence between IMS and Social Networks , 2010, 2010 6th International Conference on Wireless and Mobile Communications.
[36] Alexander Grey,et al. The Mathematical Theory of Infectious Diseases and Its Applications , 1977 .
[37] Tao Zhou,et al. Immunization of susceptible–infected model on scale-free networks , 2006, physics/0610138.
[38] Tobias Achterberg,et al. SCIP: solving constraint integer programs , 2009, Math. Program. Comput..
[39] Jacob Goldenberg,et al. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .
[40] Pedro M. Domingos. Mining Social Networks for Viral Marketing , 2022 .
[41] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[42] Jon Kleinberg,et al. Maximizing the spread of influence through a social network , 2003, KDD '03.
[43] Chee Wei Tan,et al. Rooting out the rumor culprit from suspects , 2013, 2013 IEEE International Symposium on Information Theory.