<--- Back to Details
First PageDocument Content
Network theory / Flow network / Operations research / Diffusion / Networks / Hub / Mathematics / Applied mathematics / Metaphysics
Date: 2013-10-14 14:25:41
Network theory
Flow network
Operations research
Diffusion
Networks
Hub
Mathematics
Applied mathematics
Metaphysics

Modeling Information Diffusion in Implicit Networks Jaewon Yang EE Department, Stanford University Abstract—Social media forms a central domain for the

Add to Reading List

Source URL: ilpubs.stanford.edu

Download Document from Source Website

File Size: 292,47 KB

Share Document on Facebook

Similar Documents

Resistive Network Optimal Power Flow: Uniqueness and Algorithms Chee Wei Tan, Senior Member, IEEE, Desmond W. H. Cai, Student Member, IEEE and Xin Lou Abstract—The optimal power flow (OPF) problem minimizes the power l

Resistive Network Optimal Power Flow: Uniqueness and Algorithms Chee Wei Tan, Senior Member, IEEE, Desmond W. H. Cai, Student Member, IEEE and Xin Lou Abstract—The optimal power flow (OPF) problem minimizes the power l

DocID: 1vid6 - View Document

Introduction Network similarity problem Results Acknowledgements  Spectra of the Spike Flow Graphs of Recurrent

Introduction Network similarity problem Results Acknowledgements Spectra of the Spike Flow Graphs of Recurrent

DocID: 1veQT - View Document

An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi∗ arXiv:1701.03908v1 [cs.SY] 14 Jan 2017

An Arrow-Hurwicz-Uzawa Type Flow as Least Squares Solver for Network Linear Equations Yang Liu, Christian Lageman, Brian D. O. Anderson, and Guodong Shi∗ arXiv:1701.03908v1 [cs.SY] 14 Jan 2017

DocID: 1uJ5N - View Document

Pipe Network  Hand-in Assignment 1 Flow in Water Pipe Network   

Pipe Network Hand-in Assignment 1 Flow in Water Pipe Network  

DocID: 1uInK - View Document

Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

Inductive Intrusion Detection in Flow-Based Network Data using One-Class Support Vector Machines Philipp Winter

DocID: 1uIen - View Document