2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing 2011
DOI: 10.1109/passat/socialcom.2011.50
|View full text |Cite
|
Sign up to set email alerts
|

Modeling Information Diffusion in Networks with Unobserved Links

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(11 citation statements)
references
References 23 publications
0
11
0
Order By: Relevance
“…To overcome this shortage of available information for the network reconstruction for SI and SIR models, a commonly employed setting is the observation of multiple, independent outbreaks or cascades [2]. The state-of-the-art network reconstruction methods for SI and SIR models confine to a maximum-likelihood formulation in discrete time [3], [4], [5], [6], [7], [8]. Besides network reconstruction methods based on observing viral dynamics, current research also focusses on other dynamical processes on networks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…To overcome this shortage of available information for the network reconstruction for SI and SIR models, a commonly employed setting is the observation of multiple, independent outbreaks or cascades [2]. The state-of-the-art network reconstruction methods for SI and SIR models confine to a maximum-likelihood formulation in discrete time [3], [4], [5], [6], [7], [8]. Besides network reconstruction methods based on observing viral dynamics, current research also focusses on other dynamical processes on networks.…”
Section: Related Workmentioning
confidence: 99%
“…The upper bound on T in (13) is smaller than both bounds in (2) and (5) and, hence, condition (13) is a sufficient condition for all transition probabilities of the sampled-time Markov chain to lie in the interval [0, 1].…”
Section: Sampled-time -Sis Processmentioning
confidence: 99%
“…These researchers have improved their model through concave optimization [15]. Duong et al [16] have resolved this problem using two approaches: The first learns graphical model potentials for a given network structure, compensating for missing edges through induced correlations among node states. The second learns the missing connections directly.…”
Section: Generic Approachesmentioning
confidence: 99%
“…The problem of missing data in networks has been addressed from different perspectives ranging from network sampling [22,5,10], where the aim is to obtain a representative subset of the network, to network reconstruction [14,8], where nodes and edges are inferred to recreate the original network. Other works, such as [5,15], have examined the effect of missing nodes and edges on topological metrics of the network (e.g., average node degree, diameter, clustering coefficient).…”
Section: Related Workmentioning
confidence: 99%
“…Online social networks (OSNs) are a natural choice for this purpose as they are readily available and in many cases constitute the desired diffusion medium (e.g., Facebook and Twitter). Consequently such datasets have been widely used in previous research [27,8,23,20].…”
Section: Introductionmentioning
confidence: 99%