Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2012
DOI: 10.1145/2339530.2339601
|View full text |Cite
|
Sign up to set email alerts
|

Interacting viruses in networks

Abstract: Suppose we have two competing ideas/products/viruses, that propagate over a social or other network. Suppose that they are strong/virulent enough, so that each, if left alone, could lead to an epidemic. What will happen when both operate on the network? Earlier models assume that there is perfect competition: if a user buys product 'A' (or gets infected with virus 'X'), she will never buy product 'B' (or virus 'Y'). This is not always true: for example, a user could install and use both Firefox and Google Chro… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
51
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 88 publications
(53 citation statements)
references
References 38 publications
1
51
0
Order By: Relevance
“…This is in line with the competitive exclusion principle found in ecology [11,12]. When viruses are not mutually immune, a region can exist where both viruses survive in the network [13]. Even when nodes are mutually immune, there is a region where stronger and/or quicker viruses can coexist with weaker or slower competitors in the SIR model [14].…”
Section: Introductionsupporting
confidence: 80%
“…This is in line with the competitive exclusion principle found in ecology [11,12]. When viruses are not mutually immune, a region can exist where both viruses survive in the network [13]. Even when nodes are mutually immune, there is a region where stronger and/or quicker viruses can coexist with weaker or slower competitors in the SIR model [14].…”
Section: Introductionsupporting
confidence: 80%
“…The second data set (AA) is an author-author network from DBLP. 4 AA is a co-authorship network, where each node is an author and the existence of an edge indicates the co-authorship between the two corresponding persons. Overall, we have n ¼ 418; 236 nodes and m ¼ 2; 753; 798 edges.…”
Section: Data Setsmentioning
confidence: 99%
“…A large amount of work is also done on analyzing the spreading process of competing information, virus and etc. [4], [59], [62]. The algorithm in [23] enables within-network and across-network classification with regional features of the graph.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of complex network research, the spread of two types of information or epidemic contagions in a network has only recently been considered [18,19,20,21,22,23,24,25]. The earliest study [18] treats two competing epidemics of the susceptible-infective-susceptible (SIS) type, one of which anihilates the other upon contact with certain probability, i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In such a setting the authors prove that only one of the epidemics will persist in a network. They later generalize their model to allow coexistence of the two epidemics [24].…”
Section: Introductionmentioning
confidence: 99%