ellagic-acid 发表于 2025-3-28 17:36:34
http://reply.papertrans.cn/47/4648/464762/464762_41.pngadumbrate 发表于 2025-3-28 22:21:24
Rumor Source Detection in Finite Graphs with Boundary Effects by Message-Passing Algorithms,ity for spreading in graphs with boundary effects. We derive a graph-theoretic characterization of the maximum likelihood estimator for degree-regular graphs with a single end vertex at its boundary and propose a message-passing algorithm that is near-optimal for graphs with more complex boundary co刺耳 发表于 2025-3-29 01:34:56
Robustness of Influence Maximization Against Non-adversarial Perturbations,s subject to adversarial perturbations. In contrast, we consider three types of non-adversarial perturbations and investigate the effectiveness of influence maximization algorithms for finding influential nodes in a more relaxed scenario. Our results show that, even in the context of non-adversarialfloaters 发表于 2025-3-29 04:07:05
http://reply.papertrans.cn/47/4648/464762/464762_44.pngForeshadow 发表于 2025-3-29 07:46:53
Influence and Behavior Analysis in Social Networks and Social MediaLicentious 发表于 2025-3-29 14:42:01
http://reply.papertrans.cn/47/4648/464762/464762_46.png后天习得 发表于 2025-3-29 16:18:39
Book 2019 reviewed and revised to meet the series standards. Original chapters coming from outside of the meeting round out the coverage. The result will appeal to researchers and students working in social network and social media analysis..