2019
DOI: 10.48550/arxiv.1903.08810
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Link prediction with hyperbolic geometry

Maksim Kitsak,
Ivan Voitalov,
Dmitri Krioukov
Help me understand this report
View published versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
5
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
2

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(5 citation statements)
references
References 46 publications
0
5
0
Order By: Relevance
“…Cross-geometric representations can be obtained by repurposing any existing MLE-based geometric embedding methods, e.g., Refs. [11,17,58,59]. MLE-based embedders aim to find node coordinates maximizing the likelihood L that the network of interest was generated as the latent space model.…”
Section: Appendix D: Embedding Complementarity-driven Networkmentioning
confidence: 99%
See 3 more Smart Citations
“…Cross-geometric representations can be obtained by repurposing any existing MLE-based geometric embedding methods, e.g., Refs. [11,17,58,59]. MLE-based embedders aim to find node coordinates maximizing the likelihood L that the network of interest was generated as the latent space model.…”
Section: Appendix D: Embedding Complementarity-driven Networkmentioning
confidence: 99%
“…( 1). In our work repurpose the HyperLink Embedder (HL) [11] and refer to the resulting complementarity-based embedder as the Complementarity-based HyperLink (CHL) embedder, see Appendix D.…”
Section: Appendix D: Embedding Complementarity-driven Networkmentioning
confidence: 99%
See 2 more Smart Citations
“…Beyond being a formal theoretical framework to explain the topology of real networks, network geometry can be used to develop practical applications for real systems, including routing of information in the Internet [9], community detection [9,14,15], prediction of missing links [3,16,17], a precise definition of hierarchy in networks [15], and downscaled network replicas [10], to name a few. However, applications require faithful embeddings of real-world networks into the hidden metric space using only the information contained in their topology.…”
Section: Introductionmentioning
confidence: 99%