Discrete Interventions in Hawkes Processes with Applications in Invasive Species Management

Authors: Amrita Gupta, Mehrdad Farajtabar, Bistra Dilkina, Hongyuan Zha

IJCAI 2018 | Conference PDF | Archive PDF | Plain Text | LLM Run Details

Reproducibility Variable Result LLM Response
Research Type Experimental We present an empirical study of two variants of the invasive control problem: minimizing the final rate of invasions, and minimizing the number of invasions at the end of a given time horizon.
Researcher Affiliation Academia 1 School of Computational Science & Engineering, Georgia Institute of Technology 2 Department of Computer Science, University of Southern California agupta375@gatech.edu, mehrdad@gatech.edu, dilkina@usc.edu, zha@cc.gatech.edu
Pseudocode No The paper describes methods and formulations (e.g., integer programming, heuristic strategies) but does not include any explicitly labeled pseudocode or algorithm blocks.
Open Source Code No The paper does not provide any explicit statements about releasing source code or links to a code repository for the methodology described.
Open Datasets Yes We have verified the applicability of this modeling framework using data about the encroachment of A. grandis trees into montane meadows at Bunchgrass Ridge in Oregon [Halpern, 2012].
Dataset Splits No The paper mentions validating expressions on simulated data and applying the methodology to a real dataset, but does not provide specific training, validation, or test dataset splits (e.g., percentages or sample counts).
Hardware Specification No The paper does not provide specific details regarding the hardware (e.g., CPU, GPU models, memory) used for running the experiments.
Software Dependencies Yes We used the mixed integer linear programming solver offered through the intlinprog function in MATLAB 2016b.
Experiment Setup Yes We generate synthetic networks with known parameters as described in Appendix A. We can empirically evaluate the closed-form expressions for our intervention objectives E [λ(T)] and E [N(T)]. To do this, we simulate a single realization of an invasion cascade up to time τ = 50... We set the intervention budgets B as fixed percentages of Ball to allow comparisons between the different realizations.