Kempe-Kleinberg-Tardos Conjecture A simple proof

Slides:



Advertisements
Similar presentations
Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Advertisements

How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Diffusion and Cascading Behavior in Random Networks Marc Lelarge (INRIA-ENS) WIDS MIT, May 31, 2011.
Information Networks Failures and Epidemics in Networks Lecture 12.
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Efficient Control of Epidemics over Random Networks Marc Lelarge (INRIA-ENS) SIGMETRICS 09.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
Analysis of Boolean Functions Fourier Analysis, Projections, Influence, Junta, Etc… And (some) applications Slides prepared with help of Ricky Rosen.
1 Mazes In The Theory of Computer Science Dana Moshkovitz.
Complexity 1 Mazes And Random Walks. Complexity 2 Can You Solve This Maze?
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Maximizing Product Adoption in Social Networks
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
1 Burning a graph as a model of social contagion Anthony Bonato Ryerson University Institute of Software Chinese Academy of Sciences.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Online Social Networks and Media
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 The Encoding Complexity of Network Coding Michael Langberg California Institute of Technology Joint work with Jehoshua Bruck and Alex Sprintson.
Improved Competitive Ratios for Submodular Secretary Problems ? Moran Feldman Roy SchwartzJoseph (Seffi) Naor Technion – Israel Institute of Technology.
Miniconference on the Mathematics of Computation
1 How to burn a graph Anthony Bonato Ryerson University GRASCan 2015.
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
Lecture 2-1 Submodular Maximization Weili Wu Ding-Zhu Du University of Texas at Dallas.
game chromatic number game chromatic number of G in the game Alice plays first the game Bob plays first game chromatic number of G in.
Lecture 2-3 Deterministic Difussion Weili Wu Ding-Zhu Du University of Texas at Dallas.
Introduction to Social Computing
Wenyu Zhang From Social Network Group
Independent Cascade Model and Linear Threshold Model
Heuristic & Approximation
Greedy & Heuristic algorithms in Influence Maximization
Random Testing: Theoretical Results and Practical Implications IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2012 Andrea Arcuri, Member, IEEE, Muhammad.
What Stops Social Epidemics?
Outline Introduction Signal, random variable, random process and spectra Analog modulation Analog to digital conversion Digital transmission through baseband.
Influence Maximization
Modularity Maximization
Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas
Introduction to Social Computing
Positive Influence Dominating Set
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Framework for the Secretary Problem on the Intersection of Matroids
The Importance of Communities for Learning to Influence
Maximal Independent Set
Influence-Based Community Detection
Diffusion in Networks Dr. Henry Hexmoor Department of Computer Science Southern Illinois University Carbondale 1/17/2019.
Miniconference on the Mathematics of Computation
A History Sensitive Cascade Model in Diffusion Networks
Bharathi-Kempe-Salek Conjecture
General Threshold and Cascade Models
Proof of Kleinberg’s small-world theorems
Influence Maximization
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
Constructing a m-connected k-Dominating Set in Unit Disc Graphs
at University of Texas at Dallas
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Noncooperative Rumor Blocking
Presentation transcript:

Kempe-Kleinberg-Tardos Conjecture A simple proof Lecture 2-5 Kempe-Kleinberg-Tardos Conjecture A simple proof Ding-Zhu Du University of Texas at Dallas First, I want to thank you for you presence. ********In this presentation I will try to introduce The social network which is a theoretical structure to study relationships between individuals, groups, organizations, or even entire societies.  It is related to a wide range of disciplines. These disciplines include, but are not limited to information science, biology, economics, geography, communication studies, and so on.. The study of social networks begins with the late eighteenth century, two sociologists (Émile [ei'mi:l] Durkheim and Ferdinand ['fɝdənænd] Fer迪南de Tönnies) foreshadowed the idea of social networks in their theories and research of social groups. Nowadays, we study social networks using network analysis to identify social communities, pick influential person, and design good software.

Outline of KKT Conjecture IM in Threshold Model KKT Conjecture A Simple Proof Applications 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

General Threshold Model 1 2 3

LT: Stop! w v Y Inactive Node 0.6 Active Node 0.2 Threshold 0.2 0.3 Active neighbors X 0.1 0.4 U 0.3 0.5 Stop! 0.2 0.5 w v

Inapproximability Theorem Proof Recall

Input size

is monotone submodular. but not submodular.

Outline Threshold Model KKT Conjecture A Simple Proof Applications 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Kempe-Kleinberg-Tardos Conjecture This conjecture is proved by Mossel and Roch in 2007 (STOC’07)

Linear Threshold (LT) Model A node v has random threshold ~ U[0,1] A node v is influenced by each neighbor w according to a weight bw,v such that A node v becomes active when at least (weighted) fraction of its neighbors are active Given a random choice of thresholds, and an initial set of active nodes A0 (with all other nodes inactive), the diffusion process unfolds deterministically in discrete steps: in step t, all nodes that were active in step t-1 remain active, and we activate any node v for which the total weight of its active neighbors is at least Theta(v)

Example Stop! w v Y Inactive Node 0.6 Active Node 0.2 Threshold 0.2 0.3 Active neighbors X 0.1 0.4 U 0.3 0.5 Stop! 0.2 0.5 w v

Outline Threshold Model KKT Conjecture A Simple Proof Applications 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Idea: Piecemeal Growth Seeds can be distributed step by step or altogether, the distribution of final influence set does not change.

Notations ~

Notations ~ ~ ~ ~

Lemma 1 Proof

1st Try ~ ~

1st Try

1st Try Not true!

More Techniques: Antisense Phase and Need-to-Know Representation

Antisense Phase ~ ~

Lemma 2 ~ ~ Proof

2nd Try ~ ~

2nd Try

Lemma 3 Proof

Outline Threshold Model KKT Conjecture A Simple Proof Applications 1. Brief overview of social networks 2. How to build applications on top of the social network –  Think about a social network being MS Windows, We can build applications on it.

Linear Threshold (LT) Model A node v has random threshold ~ U[0,1] A node v is influenced by each neighbor w according to a weight bw,v such that A node v becomes active when at least (weighted) fraction of its neighbors are active Given a random choice of thresholds, and an initial set of active nodes A0 (with all other nodes inactive), the diffusion process unfolds deterministically in discrete steps: in step t, all nodes that were active in step t-1 remain active, and we activate any node v for which the total weight of its active neighbors is at least Theta(v)

Decreasing Cascade Model

Deterministic Model

Independent Cascade

Triggering Model

IC is a special cases of Triggering Model

LT(or MC) is a special cases of Triggering Model

Triggering Model Triggering model is not a general threshold model. When triggering set at every node is fixed, it can be seen as a threshold model. Then # of influenced nodes is a monotone increasing submodular function of seed set. Triggering model is a linear combination of threshold models. Coefficients are probability.

“Only-Listen-Once” Model

References 1 2

1 2 3

1 1 2 3 2 3 1 1 2 3 2 3

1 2 3

Proof of Submodularity

Conjecture

THANK YOU!

Open Problem 1