2010
DOI: 10.1007/978-3-642-14929-0_4
|View full text |Cite
|
Sign up to set email alerts
|

Finding Spread Blockers in Dynamic Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
36
0

Year Published

2010
2010
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 60 publications
(36 citation statements)
references
References 54 publications
0
36
0
Order By: Relevance
“…Our approach, in contrast, is focused on t ≥ 2 and our heuristics compute a critical set for any specified set of seed nodes. Critical nodes are called "blockers" in [18]. They examine dynamic networks and use a probabilistic diffusion model with threshold = 1.…”
Section: Summary Of Results and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Our approach, in contrast, is focused on t ≥ 2 and our heuristics compute a critical set for any specified set of seed nodes. Critical nodes are called "blockers" in [18]. They examine dynamic networks and use a probabilistic diffusion model with threshold = 1.…”
Section: Summary Of Results and Related Workmentioning
confidence: 99%
“…Other formulations of this problem have been considered in the literature for simple contagions (e.g. [18]). We will discuss the differences between our work and that reported in other references in Section 3.…”
Section: Introductionmentioning
confidence: 99%
“…However, the majority of this work focuses on dynamic patterns [10,17,16,22,27], temporal link prediction [8], anomaly detection [1], dynamic communities [18,28,11], dynamic ranking [20,24], and many others [31,12].…”
Section: Related Workmentioning
confidence: 99%
“…Although some recent research has focused on the analysis of dynamic networks [17,3,5,12,4,21], there has been less work on developing models of temporal behavior in large scale network datasets. There has been some work on modeling temporal events in large scale networks [2,31] and other work that uses temporal link and attribute patterns to improve predictive models [26].…”
mentioning
confidence: 99%
“…These games typically model nature as the adversary, which chooses an initial set of nodes with some predefined probability distribution that the defender is optimizing against [17][18][19][20][21][22]. Variations on this include distributed inoculation games where each node acts independently, in which results such as price of anarchy are generally considered [17,20].…”
Section: Related Workmentioning
confidence: 99%