Discrete Interventions in Hawkes Processes with Applications in Invasive Species Management
Authors: Amrita Gupta, Mehrdad Farajtabar, Bistra Dilkina, Hongyuan Zha
IJCAI 2018 | Conference PDF | Archive PDF | Plain Text | LLM Run Details
| Reproducibility Variable | Result | LLM Response |
|---|---|---|
| Research Type | Experimental | We present an empirical study of two variants of the invasive control problem: minimizing the final rate of invasions, and minimizing the number of invasions at the end of a given time horizon. |
| Researcher Affiliation | Academia | 1 School of Computational Science & Engineering, Georgia Institute of Technology 2 Department of Computer Science, University of Southern California agupta375@gatech.edu, mehrdad@gatech.edu, dilkina@usc.edu, zha@cc.gatech.edu |
| Pseudocode | No | The paper describes methods and formulations (e.g., integer programming, heuristic strategies) but does not include any explicitly labeled pseudocode or algorithm blocks. |
| Open Source Code | No | The paper does not provide any explicit statements about releasing source code or links to a code repository for the methodology described. |
| Open Datasets | Yes | We have verified the applicability of this modeling framework using data about the encroachment of A. grandis trees into montane meadows at Bunchgrass Ridge in Oregon [Halpern, 2012]. |
| Dataset Splits | No | The paper mentions validating expressions on simulated data and applying the methodology to a real dataset, but does not provide specific training, validation, or test dataset splits (e.g., percentages or sample counts). |
| Hardware Specification | No | The paper does not provide specific details regarding the hardware (e.g., CPU, GPU models, memory) used for running the experiments. |
| Software Dependencies | Yes | We used the mixed integer linear programming solver offered through the intlinprog function in MATLAB 2016b. |
| Experiment Setup | Yes | We generate synthetic networks with known parameters as described in Appendix A. We can empirically evaluate the closed-form expressions for our intervention objectives E [λ(T)] and E [N(T)]. To do this, we simulate a single realization of an invasion cascade up to time τ = 50... We set the intervention budgets B as fixed percentages of Ball to allow comparisons between the different realizations. |