Analysis of Accuracy of the Locating Information Source Method Based on Observers
ZHANG Yu-bo1, ZHANG Xi-zhe1,2, ZHANG Bin1,2
1. School of Information Science & Engineering, Northeastern University, Shenyang 110819, China; 2. Key Laboratory of Medical Image Computing, Ministry of Education, Northeastern University, Shenyang 110819, China.
ZHANG Yu-bo, ZHANG Xi-zhe, ZHANG Bin. Analysis of Accuracy of the Locating Information Source Method Based on Observers[J]. Journal of Northeastern University Natural Science, 2015, 36(3): 350-353.
[1]Zinoviev D,Duong V.A game theoretical approach to broadcast information diffusion in social networks[C]// Proceedings of the 44th Annual Simulation Symposium.San Diego:Society for Computer Simulation International,2011:47-52. [2]Easley D,Kleinberg J.Networks,crowds,and markets.[M].Cambridge:Cambridge University Press,2010:483-505. [3]Goldenberg J,Libai B,Muller E.Talk of the network:a complex systems look at the underlying process of word-of-mouth[J].Marketing Letters,2001,12(3):211-223. [4]Cha M,Mislove A,Adams B,et al.Characterizing social cascades in flickr[C]// Proceedings of the First Workshop on Online Social Networks.New York:ACM,2008:13-18. [5]Wang Y,Cong G,Song G.Community-based greedy algorithm for mining top-k influential nodes in mobile social networks[C]// Proceedings of the 16th ACM SIGKDD.Washington D C:ACM,2010:1039-1048. [6]Budak C,Agrawal D,El Abbadi A.Limiting the spread of misinformation in social networks[C]// Proceedings of the 20th International Conference on World Wide Web.Hyderabad:ACM,2011:665-674. [7]Shah D,Zaman T.Detecting sources of computer viruses in networks:theory and experiment[C]// ACM SIGMETRICS Performance Evaluation Review.New York:ACM,2010:203-214. [8]Budak D,El Abbadi A.Information diffusion in social networks:observing and influencing societal interests[J].Proceedings of the VLDB Endowment,2011,4(12):1-5. [9]Prakash B A,Vreeken J,Faloutsos C.Spotting culprits in epidemics:how many and which ones?[C]// The 12th International Conference on Data Mining (ICDM).Brussels:IEEE,2012:11-20. [10]Pinto P C,Thiran P,Vetterli M.Locating the source of diffusion in large-scale networks[J].Physical Review Letters,2012,109(6):068702. [11]Erd6s P,Rényi A.On random graphs I[J].Publicationes Mathematicae,1959,6:290-297. [12]Barabási A L,Albert R.Emergence of scaling in random networks[J].Science,1999,286(5439):509-512.