-
1
-
-
84886540275
-
Analysis of thompson sampling for the multi-armed bandit problem
-
S. Agrawal and N. Goyal. Analysis of thompson sampling for the multi-armed bandit problem. In COLT, 2012.
-
(2012)
COLT
-
-
Agrawal, S.1
Goyal, N.2
-
3
-
-
0041966002
-
Using confidence bounds for exploitation-exploration trade-offs
-
P. Auer. Using confidence bounds for exploitation-exploration trade-offs. JMLR, 3:397-422, 2003.
-
(2003)
JMLR
, vol.3
, pp. 397-422
-
-
Auer, P.1
-
6
-
-
77956192689
-
Scalable influence maximization for prevalent viral marketing in large-scale social networks
-
W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD, 2010.
-
(2010)
KDD
-
-
Chen, W.1
Wang, C.2
Wang, Y.3
-
7
-
-
70350643635
-
Efficient influence maximization in social networks
-
W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD, 2009.
-
(2009)
KDD
-
-
Chen, W.1
Wang, Y.2
Yang, S.3
-
8
-
-
84897515317
-
Combinatorial multi-armed bandit: General framework and applications
-
W. Chen, Y. Wang, and Y. Yuan. Combinatorial multi-armed bandit: General framework and applications. In ICML, 2013.
-
(2013)
ICML
-
-
Chen, W.1
Wang, Y.2
Yuan, Y.3
-
9
-
-
79951737128
-
Scalable influence maximization in social networks under the linear threshold model
-
W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In ICDM, 2010.
-
(2010)
ICDM
-
-
Chen, W.1
Yuan, Y.2
Zhang, L.3
-
10
-
-
0035789667
-
Mining the network value of customers
-
P. Domingos and M. Richardson. Mining the network value of customers. In KDD, 2001.
-
(2001)
KDD
-
-
Domingos, P.1
Richardson, M.2
-
11
-
-
77950933438
-
Learning influence probabilities in social networks
-
A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In WSDM, 2010.
-
(2010)
WSDM
-
-
Goyal, A.1
Bonchi, F.2
Lakshmanan, L.V.3
-
12
-
-
84858020035
-
A data-based approach to social influence maximization
-
A. Goyal, F. Bonchi, and L. V. Lakshmanan. A data-based approach to social influence maximization. PVLDB, 5(1), 2011.
-
(2011)
PVLDB
, vol.5
, Issue.1
-
-
Goyal, A.1
Bonchi, F.2
Lakshmanan, L.V.3
-
13
-
-
79955154683
-
Celf++: Optimizing the greedy algorithm for influence maximization in social networks
-
A. Goyal, W. Lu, and L. V. Lakshmanan. Celf++: Optimizing the greedy algorithm for influence maximization in social networks. In WWW, 2011.
-
(2011)
WWW
-
-
Goyal, A.1
Lu, W.2
Lakshmanan, L.V.3
-
14
-
-
84863230067
-
Exploring social influence via posterior effect of word-of-mouth recommendations
-
J. Huang, X.-Q. Cheng, H.-W. Shen, T. Zhou, and X. Jin. Exploring social influence via posterior effect of word-of-mouth recommendations. In WSDM, 2012.
-
(2012)
WSDM
-
-
Huang, J.1
Cheng, X.-Q.2
Shen, H.-W.3
Zhou, T.4
Jin, X.5
-
15
-
-
84874023094
-
Irie: Scalable and robust influence maximization in social networks
-
K. Jung, W. Heo, and W. Chen. Irie: Scalable and robust influence maximization in social networks. In ICDM, 2012.
-
(2012)
ICDM
-
-
Jung, K.1
Heo, W.2
Chen, W.3
-
16
-
-
33747172362
-
Maximizing the spread of influence through a social network
-
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, 2003.
-
(2003)
KDD
-
-
Kempe, D.1
Kleinberg, J.2
Tardos, E.3
-
17
-
-
84881351873
-
Scalable and parallelizable processing of influence maximization for large-scale social networks?
-
J. Kim, S.-K. Kim, and H. Yu. Scalable and parallelizable processing of influence maximization for large-scale social networks? In ICDE, 2013.
-
(2013)
ICDE
-
-
Kim, J.1
Kim, S.-K.2
Yu, H.3
-
18
-
-
84954109339
-
-
arXiv:1056.01188
-
S. Lei, S. Maniu, L. Mo, R. Cheng, and P. Senellart. Online influence maximization (extended version). arXiv:1056.01188, 2015.
-
(2015)
Online Influence Maximization (extended Version)
-
-
Lei, S.1
Maniu, S.2
Mo, L.3
Cheng, R.4
Senellart, P.5
-
19
-
-
36849083014
-
Cost-effective outbreak detection in networks
-
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD, 2007.
-
(2007)
KDD
-
-
Leskovec, J.1
Krause, A.2
Guestrin, C.3
Faloutsos, C.4
VanBriesen, J.5
Glance, N.6
-
21
-
-
85025599759
-
The bang for the buck: Fair competitive viral marketing from the host perspective
-
W. Lu, F. Bonchi, A. Goyal, and L. V. Lakshmanan. The bang for the buck: Fair competitive viral marketing from the host perspective. KDD, 2013.
-
(2013)
KDD
-
-
Lu, W.1
Bonchi, F.2
Goyal, A.3
Lakshmanan, L.V.4
-
23
-
-
0242456823
-
Mining knowledge-sharing sites for viral marketing
-
M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD 2002.
-
(2002)
KDD
-
-
Richardson, M.1
Domingos, P.2
-
24
-
-
84966203785
-
Some aspects of the sequential design of experiments
-
H. Robbins. Some aspects of the sequential design of experiments. Bull. Amer. Math. Soc., 58(5), 1952.
-
(1952)
Bull. Amer. Math. Soc.
, vol.58
, Issue.5
-
-
Robbins, H.1
-
25
-
-
80052420949
-
Prediction of information diffusion probabilities for independent cascade model
-
K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In KES, 2008.
-
(2008)
KES
-
-
Saito, K.1
Nakano, R.2
Kimura, M.3
-
26
-
-
84858037291
-
How to win friends and influence people, truthfully: Influence maximization mechanisms for social networks
-
Y. Singer. How to win friends and influence people, truthfully: influence maximization mechanisms for social networks. In WSDM, 2012.
-
(2012)
WSDM
-
-
Singer, Y.1
-
27
-
-
84904282615
-
Influence maximization: Near-optimal time complexity meets practical efficiency
-
Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD, 2014.
-
(2014)
SIGMOD
-
-
Tang, Y.1
Xiao, X.2
Shi, Y.3
-
28
-
-
79955144546
-
Community-based greedy algorithm for mining top-k influential nodes in mobile social networks
-
Y. Wang, G. Cong, G. Song, and K. Xie. Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In KDD, 2010.
-
(2010)
KDD
-
-
Wang, Y.1
Cong, G.2
Song, G.3
Xie, K.4
|