-
1
-
-
0000052835
-
The random walk construction of uniform spanning trees and uniform labelled trees
-
D. J. Aldous. The random walk construction of uniform spanning trees and uniform labelled trees. SIAM J. Discret. Math., 3(4):450-465, 1990.
-
(1990)
SIAM J. Discret. Math.
, vol.3
, Issue.4
, pp. 450-465
-
-
Aldous, D.J.1
-
4
-
-
38449123148
-
Competitive influence maximization in social networks
-
S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In WINE, pages 306-311, 2007.
-
(2007)
WINE
, pp. 306-311
-
-
Bharathi, S.1
Kempe, D.2
Salek, M.3
-
5
-
-
0024766764
-
Generating random spanning trees
-
A. Broder. Generating random spanning trees. In SFCS '89, pages 442-447, 1989.
-
(1989)
SFCS '89
, pp. 442-447
-
-
Broder, A.1
-
6
-
-
0000192876
-
The dissections of rectangles into squares
-
R. L. Brooks, C. Smith, A. Stone, and W. Tutte. The dissections of rectangles into squares. Duke. Math. J., 7:312-340, 1940.
-
(1940)
Duke. Math. J.
, vol.7
, pp. 312-340
-
-
Brooks, R.L.1
Smith, C.2
Stone, A.3
Tutte, W.4
-
7
-
-
36849059175
-
Maximizing influence in a competitive social network: A follower's perspective
-
New York, NY, USA, ACM
-
T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen. Maximizing influence in a competitive social network: a follower's perspective. In ICEC '07, pages 351-360, New York, NY, USA, 2007. ACM.
-
(2007)
ICEC '07
, pp. 351-360
-
-
Carnes, T.1
Nagarajan, C.2
Wild, S.M.3
Zuylen, A.V.4
-
8
-
-
70350643635
-
Efficient influence maximization in social networks
-
W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD, 2009.
-
(2009)
KDD
-
-
Chen, W.1
Wang, Y.2
Yang, S.3
-
9
-
-
79951737128
-
Scalable influence maximization in social networks under the linear threshold model
-
W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In ICDM, pages 88-97, 2010.
-
(2010)
ICDM
, pp. 88-97
-
-
Chen, W.1
Yuan, Y.2
Zhang, L.3
-
10
-
-
0017477973
-
Location of bank accounts to optimize float: An analytic study of exact and approximate algorithms
-
G. Cornuejols, M. L. Fisher, and G. L. Nemhauser. Location of bank accounts to optimize float: An analytic study of exact and approximate algorithms. Management Science, 23(8:789-810, 1977.
-
(1977)
Management Science
, vol.23
, Issue.8
, pp. 789-810
-
-
Cornuejols, G.1
Fisher, M.L.2
Nemhauser, G.L.3
-
12
-
-
0035789667
-
Mining the network value of customers
-
P. Domingos and M. Richardson. Mining the network value of customers. In KDD, pages 57-66, 2001.
-
(2001)
KDD
, pp. 57-66
-
-
Domingos, P.1
Richardson, M.2
-
13
-
-
77049101742
-
Competing for customers in a social network: The quasi-linear case
-
P. Dubey, R. Garg, and B. D. Meyer. Competing for customers in a social network: The quasi-linear case. In WINE, pages 162-173, 2006.
-
(2006)
WINE
, pp. 162-173
-
-
Dubey, P.1
Garg, R.2
Meyer, B.D.3
-
15
-
-
0005694959
-
On the supermodular knapsack problem
-
G. Gallo and B. Simeone. On the supermodular knapsack problem. Mathematical Programming, 45:295-309, 1989.
-
(1989)
Mathematical Programming
, vol.45
, pp. 295-309
-
-
Gallo, G.1
Simeone, B.2
-
16
-
-
84873473973
-
Prop. 8 opponents rally across california to protest gay-marriage ban
-
November
-
J. Garrison and C. Knoll. Prop. 8 opponents rally across california to protest gay-marriage ban. Los Angeles Times, November 2008.
-
(2008)
Los Angeles Times
-
-
Garrison, J.1
Knoll, C.2
-
17
-
-
0010087219
-
Talk of the network: A complex systems look at the underlying process of word-of-mouth
-
J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 2001.
-
(2001)
Marketing Letters
-
-
Goldenberg, J.1
Libai, B.2
Muller, E.3
-
18
-
-
77956221415
-
Inferring networks of diffusion and influence
-
M. Gomez-Rodriguez, J. Leskovec, and A. Krause. Inferring networks of diffusion and influence. In KDD, pages 1019-1028, 2010.
-
(2010)
KDD
, pp. 1019-1028
-
-
Gomez-Rodriguez, M.1
Leskovec, J.2
Krause, A.3
-
20
-
-
51249185617
-
The ellipsoid method and its consequences in combinatorial optimization
-
M. Grötschel, L. Lovász, and A. Schrijver. The ellipsoid method and its consequences in combinatorial optimization. Combinatorica, 1(2):169-197, 1981.
-
(1981)
Combinatorica
, vol.1
, Issue.2
, pp. 169-197
-
-
Grötschel, M.1
Lovász, L.2
Schrijver, A.3
-
21
-
-
0034486891
-
The mathematics of infectious diseases
-
H. W. Hethcote. The mathematics of infectious diseases. SIAM Rev., 42(4):599-653, 2000.
-
(2000)
SIAM Rev
, vol.42
, Issue.4
, pp. 599-653
-
-
Hethcote, H.W.1
-
22
-
-
84872537579
-
Ft. Hood soldier causes stir on twitter
-
online, November
-
K. M. Heussner. Ft. hood soldier causes stir on twitter. ABS News (online), November 2009.
-
(2009)
ABS News
-
-
Heussner, K.M.1
-
24
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
D. Kempe, J. M. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD, 2003.
-
(2003)
KDD
-
-
Kempe, D.1
Kleinberg, J.M.2
Tardos, É.3
-
25
-
-
0027150413
-
Measuring and modeling computer virus prevalence
-
Washington, DC, USA, IEEE Computer Society
-
J. O. Kephart and S. R. White. Measuring and modeling computer virus prevalence. In SP '93, page 2, Washington, DC, USA, 1993. IEEE Computer Society.
-
(1993)
SP '93
, pp. 2
-
-
Kephart, J.O.1
White, S.R.2
-
26
-
-
36348950877
-
Extracting influential nodes for information diffusion on a social network
-
M. Kimura, K. Saito, and R. Nakano. Extracting influential nodes for information diffusion on a social network. In AAAI, pages 1371-1376, 2007.
-
(2007)
AAAI
, pp. 1371-1376
-
-
Kimura, M.1
Saito, K.2
Nakano, R.3
-
27
-
-
4944257625
-
Über die auflösung der gleichungen auf welche man sei der untersuchung der linearen vertheilung galvanischer strome gefuhrt wind
-
G. Kirchhoff. Über die auflösung der gleichungen auf welche man sei der untersuchung der linearen vertheilung galvanischer strome gefuhrt wind. Ann. Phys. Chem, 72:497-508, 1847.
-
(1847)
Ann. Phys. Chem
, vol.72
, pp. 497-508
-
-
Kirchhoff, G.1
-
28
-
-
77955858162
-
-
Jan
-
M. Kitsak, L. K. Gallos, S. Havlin, F. Liljeros, L. Muchnik, H. E. Stanley, and H. A. Makse. Identifying influential spreaders in complex networks. Jan 2010.
-
(2010)
Identifying Influential Spreaders in Complex Networks
-
-
Kitsak, M.1
Gallos, L.K.2
Havlin, S.3
Liljeros, F.4
Muchnik, L.5
Stanley, H.E.6
Makse, H.A.7
-
29
-
-
48349112328
-
Word of mouth: Rumor dissemination in social networks
-
J. Kostka, Y. A. Oswald, and R. Wattenhofer. Word of mouth: Rumor dissemination in social networks. In SIROCCO, pages 185-196, 2008.
-
(2008)
SIROCCO
, pp. 185-196
-
-
Kostka, J.1
Oswald, Y.A.2
Wattenhofer, R.3
-
30
-
-
38249019127
-
Generating random combinatorial objects
-
V. G. Kulkarni. Generating random combinatorial objects. Journal of Algorithms, 11(2):185 - 207, 1990.
-
(1990)
Journal of Algorithms
, vol.11
, Issue.2
, pp. 185-207
-
-
Kulkarni, V.G.1
-
31
-
-
36849083014
-
Cost-effective outbreak detection in networks
-
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. M. VanBriesen, and N. S. Glance. Cost-effective outbreak detection in networks. In KDD, pages 420-429, 2007.
-
(2007)
KDD
, pp. 420-429
-
-
Leskovec, J.1
Krause, A.2
Guestrin, C.3
Faloutsos, C.4
Van Briesen, J.M.5
Glance, N.S.6
-
33
-
-
71549172083
-
On the windfall of friendship: Inoculation strategies on social networks
-
D. Meier, Y. A. Oswald, S. Schmid, and R. Wattenhofer. On the windfall of friendship: inoculation strategies on social networks. In EC '08, pages 294-301, 2008.
-
(2008)
EC '08
, pp. 294-301
-
-
Meier, D.1
Oswald, Y.A.2
Schmid, S.3
Wattenhofer, R.4
-
35
-
-
84872554751
-
Swine flu: Twitter's power to misinform
-
April
-
E. Morozov. Swine flu: Twitter's power to misinform. Foreign Policy, April 2009.
-
(2009)
Foreign Policy
-
-
Morozov, E.1
-
36
-
-
0000095809
-
An analysis of approximations for maximizing submodular set functions
-
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions. Mathematical Programming, 14(1):265-294, 1978.
-
(1978)
Mathematical Programming
, vol.14
, Issue.1
, pp. 265-294
-
-
Nemhauser, G.L.1
Wolsey, L.A.2
Fisher, M.L.3
-
37
-
-
0242456823
-
Mining knowledge-sharing sites for viral marketing
-
M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD, pages 61-70, 2002.
-
(2002)
KDD
, pp. 61-70
-
-
Richardson, M.1
Domingos, P.2
-
38
-
-
57949110318
-
Submodular approximation: Sampling-based algorithms and lower bounds
-
Z. Svitkina and L. Fleischer. Submodular approximation: Sampling-based algorithms and lower bounds. In FOCS, pages 697-706, 2008.
-
(2008)
FOCS
, pp. 697-706
-
-
Svitkina, Z.1
Fleischer, L.2
-
40
-
-
84873465104
-
-
Twitter. http:://www.twitter.com.
-
Twitter
-
-
-
41
-
-
84949487368
-
On computer viral infection and the effect of immunization
-
Washington, DC, USA, IEEE Computer Society
-
C. Wang, J. C. Knight, and M. C. Elder. On computer viral infection and the effect of immunization. In ACSAC '00, page 246, Washington, DC, USA, 2000. IEEE Computer Society.
-
(2000)
ACSAC '00
, pp. 246
-
-
Wang, C.1
Knight, J.C.2
Elder, M.C.3
-
43
-
-
70349153347
-
User interactions in social networks and their implications
-
C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In EuroSys, pages 205-218, 2009.
-
(2009)
EuroSys
, pp. 205-218
-
-
Wilson, C.1
Boe, B.2
Sala, A.3
Puttaswamy, K.P.4
Zhao, B.Y.5
-
44
-
-
0029711422
-
Generating random spanning trees more quickly than the cover time
-
New York, NY, USA, ACM
-
D. B. Wilson. Generating random spanning trees more quickly than the cover time. In STOC '96, pages 296-303, New York, NY, USA, 1996. ACM.
-
(1996)
STOC '96
, pp. 296-303
-
-
Wilson, D.B.1
-
45
-
-
0039660957
-
How to get an exact sample from a generic markov chain and sample a random spanning tree from a directed graph, both within the cover time
-
Philadelphia, PA, USA, Society for Industrial and Applied Mathematics
-
D. B. Wilson and J. G. Propp. How to get an exact sample from a generic markov chain and sample a random spanning tree from a directed graph, both within the cover time. In SODA '96, pages 448-457, Philadelphia, PA, USA, 1996. Society for Industrial and Applied Mathematics.
-
(1996)
SODA '96
, pp. 448-457
-
-
Wilson, D.B.1
Propp, J.G.2
|