Latent self-exciting point process model for spatial-temporal networks
暂无分享,去创建一个
[1] Noel A Cressie,et al. Statistics for Spatio-Temporal Data , 2011 .
[2] P. Brémaud. Point processes and queues, martingale dynamics , 1983 .
[3] Y. Ogata. Space-Time Point-Process Models for Earthquake Occurrences , 1998 .
[4] M. I. Rosenberg,et al. Naval Research Logistics Quarterly. , 1958 .
[5] C. Steglich,et al. DYNAMIC NETWORKS AND BEHAVIOR: SEPARATING SELECTION FROM INFLUENCE: separating selection from influence , 2010 .
[6] Gueorgi Kossinets. Effects of missing data in social networks , 2006, Soc. Networks.
[7] Patrick J. Wolfe,et al. Point process modelling for directed interaction networks , 2010, ArXiv.
[8] Jure Leskovec,et al. Friendship and mobility: user movement in location-based social networks , 2011, KDD.
[9] Stefano Ermon,et al. Feature-Enhanced Probabilistic Models for Diffusion Network Inference , 2012, ECML/PKDD.
[10] David Liben-Nowell,et al. The link-prediction problem for social networks , 2007 .
[11] Padhraic Smyth,et al. Continuous-Time Regression Models for Longitudinal Networks , 2011, NIPS.
[12] Sujay Sanghavi,et al. Learning the graph of epidemic cascades , 2012, SIGMETRICS '12.
[13] Matthew J. Beal,et al. The variational Bayesian EM algorithm for incomplete data: with application to scoring graphical model structures , 2003 .
[14] Jure Leskovec,et al. The Network Completion Problem: Inferring Missing Nodes and Edges in Networks , 2011, SDM.
[15] Puyang Xu,et al. A Model for Temporal Dependencies in Event Streams , 2011, NIPS.
[16] Clifford A. Grammich,et al. Reducing Gun Violence: Results from an Intervention in East Los Angeles , 2003 .
[17] Albert-László Barabási,et al. The origin of bursts and heavy tails in human dynamics , 2005, Nature.
[18] Eric P. Xing,et al. Discrete Temporal Models of Social Networks , 2006, SNA@ICML.
[19] K. Giesecke,et al. Self-Exciting Corporate Defaults : Contagion vs . Frailty , 2008 .
[20] Bernhard Schölkopf,et al. Structure and dynamics of information pathways in online media , 2012, WSDM.
[21] George E. Tita,et al. Self-Exciting Point Process Modeling of Crime , 2011 .
[22] Andrew W. Moore,et al. X-means: Extending K-means with Efficient Estimation of the Number of Clusters , 2000, ICML.
[23] A. Barrat,et al. Dynamical and bursty interactions in social networks. , 2010, Physical review. E, Statistical, nonlinear, and soft matter physics.
[24] A. Stomakhin,et al. Reconstruction of missing data in social networks based on temporal patterns of interactions , 2011 .
[25] Edoardo M. Airoldi,et al. Mixed Membership Stochastic Blockmodels , 2007, NIPS.
[26] Thore Graepel,et al. Poisson-Networks: A Model for Structured Poisson Processes. , 2005 .
[27] P. Bremaud,et al. Point Processes and Queues: Martingale Dynamics (Springer Series in Statistics) , 1981 .
[28] Michael I. Jordan,et al. Modeling Events with Cascades of Poisson Processes , 2010, UAI.
[29] Le Song,et al. Learning Networks of Heterogeneous Influence , 2012, NIPS.
[30] Roger Guimerà,et al. Missing and spurious interactions and the reconstruction of complex networks , 2009, Proceedings of the National Academy of Sciences.
[31] Gentry White,et al. Self-exciting hurdle models for terrorist activity , 2012, 1203.3680.
[32] Aram Galstyan,et al. Information-theoretic measures of influence based on content dynamics , 2012, WSDM.
[33] Kay Giesecke,et al. Affine Point Processes and Portfolio Credit Risk , 2010, SIAM J. Financial Math..
[34] Yu Fan,et al. Learning Continuous-Time Social Network Dynamics , 2009, UAI.
[35] Sarit Kraus,et al. Identifying Missing Node Information in Social Networks , 2011, AAAI.
[36] G. Shedler,et al. Simulation of Nonhomogeneous Poisson Processes by Thinning , 1979 .
[37] Bernhard Schölkopf,et al. Modeling Information Propagation with Survival Theory , 2013, ICML.
[38] Aram Galstyan,et al. Information transfer in social media , 2011, WWW.
[39] Andrea L. Bertozzi,et al. An “Estimate & Score Algorithm” for simultaneous parameter estimation and reconstruction of incomplete data on social networks , 2013, Security Informatics.
[40] Jure Leskovec,et al. Inferring networks of diffusion and influence , 2010, KDD.