2012 IEEE 12th International Conference on Data Mining 2012
DOI: 10.1109/icdm.2012.136
|View full text |Cite
|
Sign up to set email alerts
|

Spotting Culprits in Epidemics: How Many and Which Ones?

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
192
0

Year Published

2014
2014
2019
2019

Publication Types

Select...
3
3
2

Relationship

3
5

Authors

Journals

citations
Cited by 195 publications
(194 citation statements)
references
References 25 publications
2
192
0
Order By: Relevance
“…This is a common assumption when studying source localization (see, e.g., [28,1,26,27,22]). (A.2) We assume that, when a node is chosen as dynamic sensor, it reveals its state (healthy or infected).…”
Section: Model Assumptionsmentioning
confidence: 99%
See 2 more Smart Citations
“…This is a common assumption when studying source localization (see, e.g., [28,1,26,27,22]). (A.2) We assume that, when a node is chosen as dynamic sensor, it reveals its state (healthy or infected).…”
Section: Model Assumptionsmentioning
confidence: 99%
“…Several models for how the epidemic spreads have been studied [17]. Discrete-time transmission delays were initially very common (see Assumption (B.5)) [22,27,1]. Then, to better approximate realistic settings, continuous-time transmission models with varying distributions for the transmission delays have been adopted; e.g., exponential [28,21], Gaussian [26,20,19,36] or truncated Gaussians [30].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Another related problem is immunization, i.e, the problem of finding the best vertices for removal to stop an epidemic, with effective immunization strategies for static and dynamic graphs [19,38,4]. Other such problems where we wish to select a subset of 'important' vertices on graphs, include 'outbreak detection' [27] and finding most-likely starting points ('culprits') of epidemics [26,33]. General Information Diffusion.…”
Section: Related Workmentioning
confidence: 99%
“…Email: jilles@mpi-inf.mpg.de (a) NetSleuth [18] (b) NetFill lic API. In general, as externals we seldom have access to complete cascades and even when we do, we typically analyze only small samples because of the extreme velocity of social media data.…”
Section: Introductionmentioning
confidence: 99%