The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2016
DOI: 10.1109/tnse.2016.2600029
|View full text |Cite
|
Sign up to set email alerts
|

Suppressing Epidemics in Networks Using Priority Planning

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
29
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
6
1
1

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(29 citation statements)
references
References 31 publications
0
29
0
Order By: Relevance
“…holds. However, (13) is not the best approximation that can be derived from the solutions of (10). The optimal approximation which can be obtained from propagating the dynamics (10) can be found efficiently via linear programming, as we state formally in the following result and its proof.…”
Section: Decay Constraint Approximationmentioning
confidence: 99%
“…holds. However, (13) is not the best approximation that can be derived from the solutions of (10). The optimal approximation which can be obtained from propagating the dynamics (10) can be found efficiently via linear programming, as we state formally in the following result and its proof.…”
Section: Decay Constraint Approximationmentioning
confidence: 99%
“…The Dynamic Resource Allocation (DRA) [11], [12] dynamically determines the resource allocation vector…”
Section: A Setting and Scoring Functionmentioning
confidence: 99%
“…Dynamic Resource Allocation (DRA) [11], [12] is a model for network control, originally developed for SISlike processes [10] (the nodes are either infected or healthy without permanent immunity) that distributes a limited budget of available treatment resources on infected nodes in order to speed-up their recovery. The resources are non-cumulable at nodes (i.e.…”
Section: Introductionmentioning
confidence: 99%
“…In recent years, epidemic theory has found applications in various different fields, covering virus/disease spreading (both biological and digital ones) (e.g., [1] [5]) and corresponding immunization strategies (e.g., [26] [27] [28] [29]), information dissemination in (online) social networks (e.g., [30]), communication protocol design (e.g., [31] [32] [33]) and cascading failure prediction/protection (e.g., [34]) as well as in more general contexts, analysis on stability of spreading processes over time-varying networks (e.g., [35]) and iden-tification of influential seeds/spreaders in networks (e.g., [36]). …”
Section: Background Basics and Related Workmentioning
confidence: 99%