Minimizing the influence of misinformation via vertex blocking

J Xie, F Zhang, K Wang, X Lin… - 2023 IEEE 39th …, 2023 - ieeexplore.ieee.org
Information cascade in online social networks can be rather negative, eg, the spread of
rumors may trigger panic. To limit the influence of misinformation in an effective and efficient …

Exact computation of influence spread by binary decision diagrams

T Maehara, H Suzuki, M Ishihata - Proceedings of the 26th International …, 2017 - dl.acm.org
Evaluating influence spread in social networks is a fundamental procedure to estimate the
word-of-mouth effect in viral marketing. There are enormous studies about this topic; …

[HTML][HTML] A bayesian inference model for sustainable crowd source logistics for small and medium scale enterprises (SME) in africa

KO Agyemang - American Journal of Industrial and Business …, 2022 - scirp.org
Trade in Africa is likely to increase and alter significantly during the next decade. Intra-
African trade has shown significant potential to reinvigorate African commerce. Logistics and …

Efficient bandit combinatorial optimization algorithm with zero-suppressed binary decision diagrams

S Sakaue, M Ishihata, S Minato - … Conference on Artificial …, 2018 - proceedings.mlr.press
We consider bandit combinatorial optimization (BCO) problems. A BCO instance generally
has a huge set of all feasible solutions, which we call the action set. To avoid dealing with …

Influence Minimization via Blocking Strategies

J Xie, F Zhang, K Wang, J Liu, X Lin… - arXiv preprint arXiv …, 2023 - arxiv.org
We study the influence minimization problem: given a graph $ G $ and a seed set $ S $,
blocking at most $ b $ nodes or $ b $ edges such that the influence spread of the seed set is …

[HTML][HTML] Probabilistic abductive logic programming using Dirichlet priors

CR Turliuc, L Dickens, A Russo, K Broda - International Journal of …, 2016 - Elsevier
Probabilistic programming is an area of research that aims to develop general inference
algorithms for probabilistic models expressed as probabilistic programs whose execution …

[PDF][PDF] An Abductive-Inductive Algorithm for Probabilistic Inductive Logic Programming.

S Dragiev, A Russo, K Broda, M Law, CR Turliuc - ILP (Short Papers), 2016 - core.ac.uk
The integration of abduction and induction has lead to a variety of non-monotonic ILP
systems. XHAIL is one of these systems, in which abduction is used to compute hypotheses …

Practical adversarial combinatorial bandit algorithm via compression of decision sets

S Sakaue, M Ishihata, S Minato - arXiv preprint arXiv:1707.08300, 2017 - arxiv.org
We consider the adversarial combinatorial multi-armed bandit (CMAB) problem, whose
decision set can be exponentially large with respect to the number of given arms. To avoid …

DARMS-Dynamic Asset-integrity and Risk Management System-How Machine Learning and Systems Engineering cooperate to enhance the resilience of complex …

T Vairo - 2022 - tesidottorato.depositolegale.it
Abstract “Static, incomplete, superficial, wrong”. The traditional approach to risk analysis, as
applied in the process industries, has been largely criticized in response to recent major …

[PDF][PDF] Online, Submodular, and Polynomial Optimization with Discrete Structures

S Sakaue - 2020 - repository.kulib.kyoto-u.ac.jp
This dissertation is devoted to online, submodular, and polynomial optimization problems,
all of which have been important research subjects in terms of both theory and practice. With …