-
1
-
-
84868274301
-
Automated abstractions for patrolling security games
-
Basilico, N., and Gatti, N. 2011. Automated abstractions for patrolling security games. In AAAI.
-
(2011)
AAAI
-
-
Basilico, N.1
Gatti, N.2
-
2
-
-
83755168026
-
Peacekeeping and the contagion of armed conflict
-
Beardsley, K. 2011. Peacekeeping and the contagion of armed conflict. The Journal of Politics 73(4):1051-1064.
-
(2011)
The Journal of Politics
, vol.73
, Issue.4
, pp. 1051-1064
-
-
Beardsley, K.1
-
3
-
-
38449123148
-
Competitive influence maximization in social networks
-
Bharathi, S.; Kempe, D.; and Salek, M. 2007. Competitive influence maximization in social networks. In WINE, 306-311.
-
(2007)
WINE
, pp. 306-311
-
-
Bharathi, S.1
Kempe, D.2
Salek, M.3
-
4
-
-
78650879916
-
Threshold models for competitive influence in social networks
-
Borodin, A.; Filmus, Y.; and Oren, J. 2010. Threshold models for competitive influence in social networks. In WINE, 539-550.
-
(2010)
WINE
, pp. 539-550
-
-
Borodin, A.1
Filmus, Y.2
Oren, J.3
-
5
-
-
84899453905
-
Computing time-dependent policies for patrolling games with mobile targets
-
Bosansky, B.; Lisy, V.; Jakob, M.; and Pechoucek, M. 2011. Computing time-dependent policies for patrolling games with mobile targets. In AAMAS, 989-996.
-
(2011)
AAMAS
, pp. 989-996
-
-
Bosansky, B.1
Lisy, V.2
Jakob, M.3
Pechoucek, M.4
-
6
-
-
0038589165
-
The anatomy of a large-scale hypertextual web search engine
-
Brin, S., and Page, L. 1998. The anatomy of a large-scale hypertextual web search engine. Computer Networks 30:107-117.
-
(1998)
Computer Networks
, vol.30
, pp. 107-117
-
-
Brin, S.1
Page, L.2
-
7
-
-
80052722917
-
Limiting the spread of misinformation in social networks
-
Budak, C.; Agrawal, D.; and Abbadi, A. E. 2011. Limiting the spread of misinformation in social networks. In WWW, 665-674.
-
(2011)
WWW
, pp. 665-674
-
-
Budak, C.1
Agrawal, D.2
Abbadi, A.E.3
-
8
-
-
77956192689
-
Scalable influence maximization for prevalent viral marketing in large-scale social networks
-
Chen, W.; Wang, C.; and Wang, Y. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD, 1029-1038.
-
(2010)
KDD
, pp. 1029-1038
-
-
Chen, W.1
Wang, C.2
Wang, Y.3
-
9
-
-
65549085067
-
Power-law distributions in empirical data
-
Clauset, A.; Shalizi, C. R.; and Newman, M. E. J. 2009. Power-law distributions in empirical data. SIAM Rev. 51:661-703.
-
(2009)
SIAM Rev.
, vol.51
, pp. 661-703
-
-
Clauset, A.1
Shalizi, C.R.2
Newman, M.E.J.3
-
10
-
-
33748712836
-
Computing the optimal strategy to commit to
-
New York, NY, USA: ACM
-
Conitzer, V., and Sandholm, T. 2006. Computing the optimal strategy to commit to. In EC '06: PRoceedings of the 7th ACM conference on Electronic commerce, 82-90. New York, NY, USA: ACM.
-
(2006)
EC '06: PRoceedings of the 7th ACM Conference on Electronic Commerce
, pp. 82-90
-
-
Conitzer, V.1
Sandholm, T.2
-
11
-
-
84899407181
-
A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries
-
Dickerson, J.; Simari, G.; Subrahmanian, V.; and Kraus, S. 2010. A Graph-Theoretic Approach to Protect Static and Moving Targets from Adversaries. In AAMAS, 299-306.
-
(2010)
AAMAS
, pp. 299-306
-
-
Dickerson, J.1
Simari, G.2
Subrahmanian, V.3
Kraus, S.4
-
12
-
-
84862632245
-
Competitive contagion in networks
-
Goyal, S., and Kearns, M. 2012. Competitive contagion in networks. In STOC.
-
(2012)
STOC.
-
-
Goyal, S.1
Kearns, M.2
-
13
-
-
78751683676
-
Multi-step multi-sensor hider-seeker games
-
Halvorson, E.; Conitzer, V.; and Parr, R. 2009. Multi-step multi-sensor hider-seeker games. In IJCAI, 159-166.
-
(2009)
IJCAI
, pp. 159-166
-
-
Halvorson, E.1
Conitzer, V.2
Parr, R.3
-
14
-
-
84880251076
-
Influence blocking maximization in social networks under the competitive linear threshold model technical report
-
abs/1110.4723.
-
He, X.; Song, G.; Chen, W.; and Jiang, Q. 2011. Influence blocking maximization in social networks under the competitive linear threshold model technical report. CoRR abs/1110.4723.
-
(2011)
CoRR
-
-
He, X.1
Song, G.2
Chen, W.3
Jiang, Q.4
-
16
-
-
79952401425
-
Optimization-based influencing of village social networks in a counterinsurgency
-
Hung, B. W. K.; Kolitz, S. E.; and Ozdaglar, A. E. 2011. Optimization-based influencing of village social networks in a counterinsurgency. In SBP, 10-17.
-
(2011)
SBP
, pp. 10-17
-
-
Hung, B.W.K.1
Kolitz, S.E.2
Ozdaglar, A.E.3
-
18
-
-
84899460757
-
A double oracle algorithm for zero-sum security games on graphs
-
Jain, M.; Korzhyk, D.; Vanek, O.; Conitzer, V.; Pechoucek, M.; and Tambe, M. 2011. A double oracle algorithm for zero-sum security games on graphs. In AAMAS, 327-334.
-
(2011)
AAMAS
, pp. 327-334
-
-
Jain, M.1
Korzhyk, D.2
Vanek, O.3
Conitzer, V.4
Pechoucek, M.5
Tambe, M.6
-
19
-
-
76749098758
-
Extracting influential nodes on a social network for information diffusion
-
Kimura, M.; Saito, K.; Nakano, R.; and Motoda, H. 2010. Extracting influential nodes on a social network for information diffusion. Data Min. Knowl. Discov. 20(1):70-97.
-
(2010)
Data Min. Knowl. Discov.
, vol.20
, Issue.1
, pp. 70-97
-
-
Kimura, M.1
Saito, K.2
Nakano, R.3
Motoda, H.4
-
20
-
-
48349112328
-
Word of mouth: Rumor dissemination in social networks
-
Kostka, J.; Oswald, Y. A.; and Wattenhofer, R. 2008. Word of mouth: Rumor dissemination in social networks. In SIROCCO, 185-196.
-
(2008)
SIROCCO
, pp. 185-196
-
-
Kostka, J.1
Oswald, Y.A.2
Wattenhofer, R.3
-
21
-
-
36849083014
-
Cost-effective outbreak detection in networks
-
Leskovec, J.; Krause, A.; Guestrin, C.; Faloutsos, C.; Van-Briesen, J. M.; and Glance, N. S. 2007. Cost-effective outbreak detection in networks. In KDD, 420-429.
-
(2007)
KDD
, pp. 420-429
-
-
Leskovec, J.1
Krause, A.2
Guestrin, C.3
Faloutsos, C.4
Van-Briesen, J.M.5
Glance, N.S.6
-
23
-
-
1942452324
-
Planning in the presence of cost functions controlled by an adversary
-
McMahan, H. B.; Gordon, G. J.; and Blum, A. 2003. Planning in the presence of cost functions controlled by an adversary. In ICML, 536-543.
-
(2003)
ICML
, pp. 536-543
-
-
McMahan, H.B.1
Gordon, G.J.2
Blum, A.3
-
24
-
-
84899919065
-
Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games
-
Paruchuri, P.; Pearce, J. P.; Marecki, J.; Tambe, M.; Ordóñez, F.; and Kraus, S. 2008. Playing games for security: An efficient exact algorithm for solving bayesian stackelberg games. In AAMAS.
-
(2008)
AAMAS.
-
-
Paruchuri, P.1
Pearce, J.P.2
Marecki, J.3
Tambe, M.4
Ordóñez, F.5
Kraus, S.6
-
25
-
-
70349307520
-
Effects of word-of-mouth versus traditional marketing: Findings from an internet social networking site
-
Trusov, M.; Bucklin, R. E.; and Pauwels, K. 2009. Effects of word-of-mouth versus traditional marketing: Findings from an internet social networking site. Journal of Marketing 73.
-
(2009)
Journal of Marketing
, pp. 73
-
-
Trusov, M.1
Bucklin, R.E.2
Pauwels, K.3
-
26
-
-
55849132790
-
-
U.S. Dept. of the Army and U.S. Marine Corps. University of Chicago Press
-
U.S. Dept. of the Army and U.S. Marine Corps. 2007. The U.S. Army/Marine Corps Counterinsurgency Field Manual 3-24. University of Chicago Press.
-
(2007)
The U.S. Army/Marine Corps Counterinsurgency Field Manual
, pp. 3-24
-
-
-
27
-
-
80053434424
-
Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness
-
Yin, Z.; Korzhyk, D.; Kiekintveld, C.; Conitzer, V.; ; and Tambe, M. 2010. Stackelberg vs. nash in security games: Interchangeability, equivalence, and uniqueness. In AAMAS.
-
(2010)
AAMAS.
-
-
Yin, Z.1
Korzhyk, D.2
Kiekintveld, C.3
Conitzer, V.4
Tambe, M.5
|