2013
DOI: 10.1186/2190-8532-2-1
|View full text |Cite
|
Sign up to set email alerts
|

An “Estimate & Score Algorithm” for simultaneous parameter estimation and reconstruction of incomplete data on social networks

Abstract: Dynamic activity involving social networks often has distinctive temporal patterns that can be exploited in situations involving incomplete information. Gang rivalry networks, in particular, display a high degree of temporal clustering of activity associated with retaliatory behavior. A recent study of a Los Angeles gang network shows that known gang activity between rivals can be modeled as a self-exciting point process on an edge of the rivalry network. In real-life situations, data is incomplete and law-enf… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 18 publications
(13 citation statements)
references
References 36 publications
0
13
0
Order By: Relevance
“…The model chosen to explore this question is a Hawkes self-exciting point process. It makes use of a response function (or kernel) which holds information pertaining to the long-term influence of previous events and has been shown to well represent a number of past dependent processes including gang related violence [18,24,52], email exchanges to infer organisation leadership [21], burglary [34,50] and violent deaths in conflicts as previously mentioned [29]. It also provides an opportunity to examine each of the five phases of PIRA activity separately, as is done in Model 1 and all subsequent models, offering direct quantitative insights into how the group behaved and reacted through the stages of the Republican campaign.…”
Section: Introductionmentioning
confidence: 99%
“…The model chosen to explore this question is a Hawkes self-exciting point process. It makes use of a response function (or kernel) which holds information pertaining to the long-term influence of previous events and has been shown to well represent a number of past dependent processes including gang related violence [18,24,52], email exchanges to infer organisation leadership [21], burglary [34,50] and violent deaths in conflicts as previously mentioned [29]. It also provides an opportunity to examine each of the five phases of PIRA activity separately, as is done in Model 1 and all subsequent models, offering direct quantitative insights into how the group behaved and reacted through the stages of the Republican campaign.…”
Section: Introductionmentioning
confidence: 99%
“…We conducted experiments on synthetic and real-world data sets, and compared the performance of our MHP/AMHP algorithm with state-of-the-art DEAP methods including: Parameter-Fixed Hawkes Process (PFHP) proposed in [16], Estimate & Score Algorithm (ESA) proposed in [8] and Latent Point Process Model (LPPM) proposed in [3]. …”
Section: Methodsmentioning
confidence: 99%
“…Gang activities are successfully modeled using Hawkes processes [16, 8]. However, these existing works employed substantial approximation schemes and failed to optimize the data likelihood.…”
Section: Related Workmentioning
confidence: 99%
“…We take a maximum-likelihood approach, using an expectation-maximisation numerical method to combat the problem's ill conditioning [36]. Finally, we give several examples for different choices of the triggering function g. It is most common in the literature to assume an exponential form for g [5,11,15,22,34], though other forms are also in use, including power law [6,27] and the exponential multiplied by a polynomial [28]. Our comparison of exponential and power-law forms suggests that it does not matter which is used, validating the frequent use of the exponential form.…”
Section: Em Estimation Of Hawkes Process Parametersmentioning
confidence: 99%
“…The Hawkes process appears in the seismology literature as a model for the timing of earthquakes and their aftershocks [26]. As interest in and availability of large data sets of human activities have grown, Hawkes processes have been used to model electronic Point-process models of social network interactions communications [5], gang crimes [10,15,34], and even terrorist and insurgent activity [19,25].…”
Section: Burstiness and Hawkes Processesmentioning
confidence: 99%