Minimizing the influence of misinformation via vertex blocking
Information cascade in online social networks can be rather negative, eg, the spread of
rumors may trigger panic. To limit the influence of misinformation in an effective and efficient …
rumors may trigger panic. To limit the influence of misinformation in an effective and efficient …
Exact computation of influence spread by binary decision diagrams
Evaluating influence spread in social networks is a fundamental procedure to estimate the
word-of-mouth effect in viral marketing. There are enormous studies about this topic; …
word-of-mouth effect in viral marketing. There are enormous studies about this topic; …
[HTML][HTML] A bayesian inference model for sustainable crowd source logistics for small and medium scale enterprises (SME) in africa
KO Agyemang - American Journal of Industrial and Business …, 2022 - scirp.org
Trade in Africa is likely to increase and alter significantly during the next decade. Intra-
African trade has shown significant potential to reinvigorate African commerce. Logistics and …
African trade has shown significant potential to reinvigorate African commerce. Logistics and …
Efficient bandit combinatorial optimization algorithm with zero-suppressed binary decision diagrams
We consider bandit combinatorial optimization (BCO) problems. A BCO instance generally
has a huge set of all feasible solutions, which we call the action set. To avoid dealing with …
has a huge set of all feasible solutions, which we call the action set. To avoid dealing with …
Influence Minimization via Blocking Strategies
We study the influence minimization problem: given a graph $ G $ and a seed set $ S $,
blocking at most $ b $ nodes or $ b $ edges such that the influence spread of the seed set is …
blocking at most $ b $ nodes or $ b $ edges such that the influence spread of the seed set is …
[HTML][HTML] Probabilistic abductive logic programming using Dirichlet priors
Probabilistic programming is an area of research that aims to develop general inference
algorithms for probabilistic models expressed as probabilistic programs whose execution …
algorithms for probabilistic models expressed as probabilistic programs whose execution …
[PDF][PDF] An Abductive-Inductive Algorithm for Probabilistic Inductive Logic Programming.
The integration of abduction and induction has lead to a variety of non-monotonic ILP
systems. XHAIL is one of these systems, in which abduction is used to compute hypotheses …
systems. XHAIL is one of these systems, in which abduction is used to compute hypotheses …
Practical adversarial combinatorial bandit algorithm via compression of decision sets
We consider the adversarial combinatorial multi-armed bandit (CMAB) problem, whose
decision set can be exponentially large with respect to the number of given arms. To avoid …
decision set can be exponentially large with respect to the number of given arms. To avoid …
DARMS-Dynamic Asset-integrity and Risk Management System-How Machine Learning and Systems Engineering cooperate to enhance the resilience of complex …
T Vairo - 2022 - tesidottorato.depositolegale.it
Abstract “Static, incomplete, superficial, wrong”. The traditional approach to risk analysis, as
applied in the process industries, has been largely criticized in response to recent major …
applied in the process industries, has been largely criticized in response to recent major …
[PDF][PDF] Online, Submodular, and Polynomial Optimization with Discrete Structures
S Sakaue - 2020 - repository.kulib.kyoto-u.ac.jp
This dissertation is devoted to online, submodular, and polynomial optimization problems,
all of which have been important research subjects in terms of both theory and practice. With …
all of which have been important research subjects in terms of both theory and practice. With …