Lecture 5-2 Target-Influence and Power Law Graphs Ding-Zhu Du Univ of Texas at Dallas.

Slides:



Advertisements
Similar presentations
Chapter 4 Partition (3) Double Partition Ding-Zhu Du.
Advertisements

Approximations for Min Connected Sensor Cover Ding-Zhu Du University of Texas at Dallas.
Approximation Algorithms
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Maximizing the Spread of Influence through a Social Network
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
PCPs and Inapproximability Introduction. My T. Thai 2 Why Approximation Algorithms  Problems that we cannot find an optimal solution.
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Lecture 3 Power Law Structure Ding-Zhu Du Univ of Texas at Dallas.
Influence Maximization
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Approximating Minimum Bounded Degree Spanning Tree (MBDST) Mohit Singh and Lap Chi Lau “Approximating Minimum Bounded DegreeApproximating Minimum Bounded.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Thang N. Dinh, Dung T. Nguyen, My T. Thai Dept. of Computer & Information Science & Engineering University of Florida, Gainesville, FL Hypertext-2012,
DATA MINING LECTURE 13 Pagerank, Absorbing Random Walks Coverage Problems.
Approximation Algorithms
December 7-10, 2013, Dallas, Texas
An Efficient Algorithm for Enumerating Pseudo Cliques Dec/18/2007 ISAAC, Sendai Takeaki Uno National Institute of Informatics & The Graduate University.
Chapter 2 Greedy Strategy I. Independent System Ding-Zhu Du.
Nonunique Probe Selection and Group Testing Ding-Zhu Du.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Testing the independence number of hypergraphs
Lecture 1-5 Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas.
Mohamed Hefeeda 1 School of Computing Science Simon Fraser University, Canada Efficient k-Coverage Algorithms for Wireless Sensor Networks Mohamed Hefeeda.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Lecture 5-1 Positive Influence Dominating Set Ding-Zhu Du Univ of Texas at Dallas.
Lecture 2-1 Submodular Maximization Weili Wu Ding-Zhu Du University of Texas at Dallas.
Constructing K-Connected M-Dominating Sets in Wireless Sensor Networks Yiwei Wu, Feng Wang, My T. Thai and Yingshu Li Georgia State University Arizona.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
A Connectivity-Based Popularity Prediction Approach for Social Networks Huangmao Quan, Ana Milicic, Slobodan Vucetic, and Jie Wu Department of Computer.
Lecture 2-3 Deterministic Difussion Weili Wu Ding-Zhu Du University of Texas at Dallas.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Computational Social Networks --computational data networks Weili Wu Ding-Zhu Du University of Texas at Dallas.
Ding-Zhu Du │ University of Texas at Dallas │ Lecture 3 Influence and Profit 1.
1/54 Rumor Source Detection: A Group Testing Approach Ding-Zhu Du Department of Computer Science University of Texas at Dallas.
1/54 Rumor Source Detection: monitor placement Ding-Zhu Du Department of Computer Science University of Texas at Dallas.
Greedy Approximation with Non- submodular Potential Function Ding-Zhu Du.
Inferring Networks of Diffusion and Influence
Seed Selection.
Wenyu Zhang From Social Network Group
Independent Cascade Model and Linear Threshold Model
Heuristic & Approximation
Greedy & Heuristic algorithms in Influence Maximization
│ University of Texas at Dallas │
Influence Maximization
Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas
Positive Influence Dominating Set
Independent Cascade Model and Linear Threshold Model
Influence-Based Community Detection
Coverage Approximation Algorithms
Detect rumor sources 2019/1/3
Problem Solving 4.
at University of Texas at Dallas
A Better Approximation for Minimum Total Routing Path Clustering Problem in 2-D Underwater Sensor Networks Wei Wang, Donghyun Kim, and Weili Wu, A Better.
Independent Cascade Model and Linear Threshold Model
Survey on Coverage Problems in Wireless Sensor Networks - 2
Lecture 28 Approximation of Set Cover
at University of Texas at Dallas
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Data-Dependent Approximation
Presentation transcript:

Lecture 5-2 Target-Influence and Power Law Graphs Ding-Zhu Du Univ of Texas at Dallas

Product Advertisement 2

More Companies: Competition 3

How to Measure Influence? 4

A Winning Strategy: Get enough Positive Influence 5 Majority!!!

Positive-Influence Max 6 A B x

Minimum Budget Maximum Influence Given – a market (e.g. a set of individuals) – estimates for influence between individuals Goal – Minimum budget for initial advertising (e.g. give away free samples of product) in order to occupy the market. Question – Which set of individuals should we target at? Application besides product marketing – spread an innovation, ideas, news – detect stories in blogs – analyze Twitter 7

Positive-Influence Dominating: Min Budget Given a network, Find a minimum positive-influence dominating set. 8

Some Product may target only a portion of networks! 9

Target-Dominating Given a network G=(V,E) and a node subset Q, Find a minimum node-subset positive-influence dominating Q. Q is called a target set. How can a boy to influence a girl? (He Chen et al.) 10

Potential Function 11 Lemma 1 Proof 1 2 3

Greedy Algorithm

Theorem

14 Lemma 1 2

Theorem

Theorem

Power Law Graph During the evolution and growth of a network, the great majority of new edges are to nodes with an already high degree.

Power law distribution: f(x) ~ x –α Log-log scale: log f(x) ~ –αlog x Power-law distribution 18

Nodes with high degrees may have “butterfly effect”. Small number Big influence Power Law 19

20

21

Theorem 22

23 Lemma 2 Proof Lemma 1

24 Lemma 3 Proof

Theorem 25 Proof

Remarks on Power-Law Networks Constant-approximation is easily obtained. NP-hardness is not so hard to prove. Usually, it is open for existence of PTAS. 26

Remarks on Power-Law Networks Could we really ignore small difference? 你懂的 27

Open Problems Is there a constant- approximation for any target set in power-law graphs? Is there a constant- approximation for positive- influence max in power-law graphs? 28

Feng Zou, Zhao Zhang, Weili Wu: Latency- Bounded Minimum Influential Node Selection in Social Networks. WASA 2009: Feng ZouZhao ZhangWASA 2009 Feng Zou, James Willson, Zhao Zhang, Weili Wu: Fast Information Propagation in Social Networks. Discrete Math., Alg. and Appl. 2(1): (2010) Feng ZouJames WillsonZhao ZhangDiscrete Math., Alg. and Appl References

Feng Wang, Hongwei Du, Erika Camacho, Kuai Xu, Wonjun Lee, Yan Shi, Shan Shan: On positive influence dominating sets in social networks. Theor. Comput. Sci. 412(3): (2011)Hongwei DuErika CamachoKuai Xu Wonjun LeeYan ShiShan Theor. Comput. Sci. 412 Thang N. Dinh, Dung T. Nguyen, My T. Thai: Cheap, easy, and massively effective viral marketing in social networks: truth or fiction? HT 2012: Thang N. DinhDung T. NguyenHT 2012 Wei Zhang, Weili Wu, Feng Wang, Kuai Xu: Positive influence dominating sets in power-law graphs. Social Netw. Analys. Mining 2(1): (2012) Wei ZhangFeng WangKuai Xu Social Netw. Analys. Mining 2 Lidan Fan, Weili Wu, Kai Xing, Wonjun Lee, Ding-Zhu Du, Precautionary Rumor Containment via Trustworthy People in Social Networks. 30

Xu Zhu, Jieun Yu, Wonjun Lee, Donghyun Kim, Shan Shan, Ding-Zhu Du: New dominating sets in social networks. J. Global Optimization 48(4): (2010) Xu ZhuJieun YuWonjun LeeDonghyun Kim Shan J. Global Optimization 48 Thang N. Dinh, Yilin Shen, Dung T. Nguyen, My T. Thai: On the approximability of positive influence dominating set in social networks. J. Comb. Optim. 27(3): (2014) Thang N. DinhYilin ShenDung T. NguyenJ. Comb. Optim

Wei Zhang, Weili Wu, Feng Wang, Kuai Xu: Positive influence dominating sets in power- law graphs. Social Netw. Analys. Mining 2(1): (2012) Wei ZhangFeng WangKuai XuSocial Netw. Analys. Mining 2 Theorem. For 2<α<3, there is a polynomial- time constant-approximation. 32

Multi-steps Given a network, Find a minimum subset of nodes K which positively dominates all nodes within at most d steps. 33

Thang N. Dinh, Dung T. Nguyen, My T. Thai: Cheap, easy, and massively effective viral marketing in social networks: truth or fiction? HT 2012: Thang N. DinhDung T. NguyenHT Theorem

THANK YOU! END