Independent Cascade Model and Linear Threshold Model

Slides:



Advertisements
Similar presentations
Competition in VM – Completing the Circle. Previous work in Competitive VM Mainly follower’s perspective: given state (say of seed selection) of previous.
Advertisements

How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Ioannis Caragiannis, Jason A. Covey, Michal Feldman, Christopher M. Homan, Christos Kaklamanis, Nikos Karanikolask, Ariel D. Procaccia, Je ff rey S. Rosenschein.
Viral Marketing – Learning Influence Probabilities.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
Epidemics in Social Networks
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 8 May 4, 2005
Recent Development on Elimination Ordering Group 1.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
Influence Maximization
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Maximizing Product Adoption in Social Networks
1 Introduction to Approximation Algorithms. 2 NP-completeness Do your best then.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Matroids, Secretary Problems, and Online Mechanisms Nicole Immorlica, Microsoft Research Joint work with Robert Kleinberg and Moshe Babaioff.
Instructor: Shengyu Zhang 1. Location change for the final 2 classes Nov 17: YIA 404 (Yasumoto International Academic Park 康本國際學術園 ) Nov 24: No class.
Approximation Algorithms based on linear programming.
Random Sampling Algorithms with Applications Kyomin Jung KAIST Aug ERC Workshop.
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
1/54 Rumor Source Detection: monitor placement Ding-Zhu Du Department of Computer Science University of Texas at Dallas.
Inferring Networks of Diffusion and Influence
Seed Selection.
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
A simple parallel algorithm for the MIS problem
Chapter 7 Linear Programming
Greedy & Heuristic algorithms in Influence Maximization
Influence Maximization
Maximal Independent Set
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Maximal Independent Set
Bin Fu Department of Computer Science
Coverage Approximation Algorithms
Detect rumor sources 2019/1/3
Stability Analysis of MNCM Class of Algorithms and two more problems !
Miniconference on the Mathematics of Computation
A History Sensitive Cascade Model in Diffusion Networks
Bharathi-Kempe-Salek Conjecture
General Threshold and Cascade Models
Kempe-Kleinberg-Tardos Conjecture A simple proof
Influence Maximization
Markov Networks.
Viral Marketing over Social Networks
Submodular Maximization with Cardinality Constraints
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Multiple Products.
Noncooperative Rumor Blocking
Presentation transcript:

Independent Cascade Model and Linear Threshold Model Lecture 2-2 Independent Cascade Model and Linear Threshold Model Ding-Zhu Du University of Texas at Dallas

Independent Cascade (IC) Model When node v becomes active, it has a single chance of activating each currently inactive neighbor w. The activation attempt succeeds with probability pvw . The deterministic model is a special case of IC model. In this case, pvw =1 for all (v,w). We again start with an initial set of active nodes A0, and the process unfolds in discrete steps according to the following randomized rule. When node v first becomes active in step t, it is given a single chance to activate each currently inactive neighbor w; it succeeds with a probability pv;w —a parameter of the system — independently of the history thus far. (If w has multiple newly activated neighbors, their attempts are sequenced in an arbitrary order.) If v succeeds, then w will become active in step t+1; but whether or not v succeeds, it cannot make any further attempts to activate w in subsequent rounds. Again, the process runs until no more activations are possible.

Example Y 0.6 Inactive Node 0.2 0.2 0.3 Active Node Newly active node X U 0.1 0.4 Successful attempt 0.5 0.3 0.2 Unsuccessful attempt 0.5 w v Stop!

Independent Cascade (IC)

Linear Threshold (LT) Model A node v has random threshold ~ U[0,1] A node v is influenced by each neighbor w according to a weight bw,v such that A node v becomes active when at least (weighted) fraction of its neighbors are active Given a random choice of thresholds, and an initial set of active nodes A0 (with all other nodes inactive), the diffusion process unfolds deterministically in discrete steps: in step t, all nodes that were active in step t-1 remain active, and we activate any node v for which the total weight of its active neighbors is at least Theta(v)

Example Stop! w v Y Inactive Node 0.6 Active Node 0.2 Threshold 0.2 0.3 Active neighbors X 0.1 0.4 U 0.3 0.5 Stop! 0.2 0.5 w v

A property

Mutually-exclusive Cascade (MC)

Theorem Proof

Acyclic Case

General Case In linear threshold model

General Case In Mutually-exclusive Cascade model

Mutually-exclusive Cascade (MC)

Examples

difference between IC and LT 1st Example difference between IC and LT

1 2 3

1 1 2 3 2 3 1 1 2 3 2 3

1 2 3

1 2 3

1 2 3

2nd Example A property of LT=MC

1 2 3 1 1 2 3

Equivalent Networks

Influence Maximization Problem Influence spread of node set S: σ(S) expected number of active nodes at the end of diffusion process, if set S is the initial active set. Problem Definition (by Kempe et al., 2003): (Influence Maximization). Given a directed and edge-weighted social graph G = (V,E, p) , a diffusion model m, and an integer k ≤ |V |, find a set S ⊆ V , |S| = k, such that the expected influence spread σm(S) is maximum. the influence of a set of nodes A: the expected number of active nodes at the end of the process.

Known Results Bad news: NP-hard optimization problem for both IC and LT models. Good news: σm(S) is monotone and submodular. We can use Greedy algorithm! Theorem: The resulting set S activates at least (1-1/e) (>63%) of the expected number of nodes that any size-k set could activate .

Proof of Submodularity

Decision Version of InfMax in IC Is it in NP? Theorem Corollary

Disadvantage Lack of efficiency. Computing σm(S) is # P-hard under both IC and LT models. Selecting a new vertex u that provides the largest marginal gain σm(S+u) - σm(S), which can only be approximated by Monte-Carlo simulations (10,000 trials). Assume a weighted social graph as input. How to learn influence probabilities from history? ( Step 3 of the Greedy algorithm above)

Monte-Carlo Method Buffon's needle

References

THANK YOU!