2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing 2011
DOI: 10.1109/passat/socialcom.2011.85
|View full text |Cite
|
Sign up to set email alerts
|

DNE: A Method for Extracting Cascaded Diffusion Networks from Social Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
29
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(29 citation statements)
references
References 22 publications
0
29
0
Order By: Relevance
“…The reconstruction is done through the edges of the network, while the nodes are known in advance. Eslami et al [Eslami et al 2011] studied the same problem. They modeled the diffusion process as a Markov random walk and proposed an algorithm called DNE to discover the most probable diffusion links.…”
Section: Related Workmentioning
confidence: 97%
See 1 more Smart Citation
“…The reconstruction is done through the edges of the network, while the nodes are known in advance. Eslami et al [Eslami et al 2011] studied the same problem. They modeled the diffusion process as a Markov random walk and proposed an algorithm called DNE to discover the most probable diffusion links.…”
Section: Related Workmentioning
confidence: 97%
“…One important factor that is often studied is the structure of these networks [Clauset et al 2008;Eslami et al 2011;Fortunato 2010;Freno et al ;Gomez-Rodriguez et al 2012;Gong et al 2011;Kim and Leskovec 2011;Leroy et al 2010;Liben-Nowell and Kleinberg 2007;Lin et al 2012;Porter et al 2009;Sadikov et al 2011]. Previously, a Link Prediction Problem [Clauset et al 2008;Liben-Nowell and Kleinberg 2007] was defined as attempting to locate which connections (edges) will soon exist between nodes.…”
Section: Introductionmentioning
confidence: 99%
“…One potential limitation of the algorithms we introduce is the large sizes of their affinity matrices, something that 3 The purity measure is not applicable for the KronEM algorithm as it is not a clustering-based algorithm. may prevent these algorithms from scaling to networks with larger numbers of nodes.…”
Section: B Generalized Configurationmentioning
confidence: 99%
“…Scientists in both academia and industry have recognized the importance of these networks and have focused on various aspects of social networks. One aspect that is often studied is the structure of these networks [1], [2], [3], [4], [5], [6], [7], [8], [9], [10], [11], [12]. Previously, a missing link problem [1], [2] was defined as attempting to locate which connections (edges) will soon exist between nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In this article, by partial observations we mean observing all the infection times of cascades, while the network is latent and we do not know who infected whom. Studies that aim to extract the diffusion network by incomplete observations, are usually known as structure learning or inference problems [Rodriguez et al 2010;Gripon and Rabbat 2013;Snowsill et al 2011;Adar and Adamic 2005;Gomez-Rodriguez et al 2011;Myers and Leskovec 2010;Eslami et al 2011;Zong et al 2012;Netrapalli and Sanghavi 2012;Chierichetti et al 2011;Sadikov et al 2011;Gomez-Rodriguez and Schölkopf 2012;Daneshmand et al 2014;Alpay et al 2011].…”
Section: Introductionmentioning
confidence: 99%