Diffusion in Networks and the Unexpected Virtue of Burstiness
Abstract
Supplementary Material
- Download
- 416.78 MB
Index Terms
- Diffusion in Networks and the Unexpected Virtue of Burstiness
Recommendations
Simulating the Diffusion of Information: An Agent-Based Modeling Approach
Diffusion occurs in various contexts and generally involves a network of entities and interactions between entities. Through these interactions, some property, e.g., information, ideas, etc., is spread through the network. This paper presents a general ...
Analysis of Heterogeneous Complex Networks Using the Degree of Diffusion
NBIS '13: Proceedings of the 2013 16th International Conference on Network-Based Information SystemsDiffusion is the process of spreading information throughout a network. The degree of diffusion a has been used to measure the diffusion and the adoption rates of different complex networks. It is defined as the percentage between the adopters and non-...
Centrality, gossip, and diffusion of information in networks
EC '14: Proceedings of the fifteenth ACM conference on Economics and computationHow can we identify the most influential nodes in a network for initiating diffusion? Are people able to easily identify those people in their communities who are best at spreading information, and if so How? Using theory and recent data, we will ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
- General Chair:
- Constantinos Daskalakis,
- Program Chairs:
- Moshe Babaioff,
- Hervé Moulin
Sponsors
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Author Tags
Qualifiers
- Abstract
Funding Sources
Conference
Acceptance Rates
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 188Total Downloads
- Downloads (Last 12 months)24
- Downloads (Last 6 weeks)9
Other Metrics
Citations
View Options
Get Access
Login options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in