Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.

Slides:



Advertisements
Similar presentations
Compressing Forwarding Tables Ori Rottenstreich (Technion, Israel) Joint work with Marat Radan, Yuval Cassuto, Isaac Keslassy (Technion, Israel) Carmi.
Advertisements

RecMax – Can we combine the power of Social Networks and Recommender Systems? Amit Goyal and L. RecMax: Exploting Recommender Systems for Fun and Profit.
Competition in VM – Completing the Circle. Previous work in Competitive VM Mainly follower’s perspective: given state (say of seed selection) of previous.
Amit Goyal Laks V. S. Lakshmanan RecMax: Exploiting Recommender Systems for Fun and Profit University of British Columbia
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Viral Marketing – Learning Influence Probabilities.
Learning Influence Probabilities in Social Networks 1 2 Amit Goyal 1 Francesco Bonchi 2 Laks V. S. Lakshmanan 1 U. of British Columbia Yahoo! Research.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Coverage by Directional Sensors Jing Ai and Alhussein A. Abouzeid Dept. of Electrical, Computer and Systems Engineering Rensselaer Polytechnic Institute.
Spread of Influence through a Social Network Adapted from :
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
Mauro Sozio and Aristides Gionis Presented By:
Maximizing the Spread of Influence through a Social Network
Suqi Cheng Research Center of Web Data Sciences & Engineering
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Mining Top-K Large Structural Patterns in a Massive Network Feida Zhu 1, Qiang Qu 2, David Lo 1, Xifeng Yan 3, Jiawei Han 4, and Philip S. Yu 5 1 Singapore.
1 Efficient Subgraph Search over Large Uncertain Graphs Ye Yuan 1, Guoren Wang 1, Haixun Wang 2, Lei Chen 3 1. Northeastern University, China 2. Microsoft.
1 On Good and Fair Paper- Reviewer Assignment Cheng LONG, Raymond Chi-Wing Wong, Yu Peng, Liangliang Ye The Hong Kong University of Science and Technology.
CIKM’2008 Presentation Oct. 27, 2008 Napa, California
Cache Placement in Sensor Networks Under Update Cost Constraint Bin Tang, Samir Das and Himanshu Gupta Department of Computer Science Stony Brook University.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Jan 6-10th, 2007VLSI Design A Reduced Complexity Algorithm for Minimizing N-Detect Tests Kalyana R. Kantipudi Vishwani D. Agrawal Department of Electrical.
Influence Maximization
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
Viral Marketing for Dedicated Customers Presented by: Cheng Long 25 August, 2012.
Fast Spectrum Allocation in Coordinated Dynamic Spectrum Access Based Cellular Networks Anand Prabhu Subramanian*, Himanshu Gupta*,
Personalized Influence Maximization on Social Networks
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Thang N. Dinh, Dung T. Nguyen, My T. Thai Dept. of Computer & Information Science & Engineering University of Florida, Gainesville, FL Hypertext-2012,
Approximation Algorithms
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
December 7-10, 2013, Dallas, Texas
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
Mining Top-K Large Structural Patterns in a Massive Network Feida Zhu 1, Qiang Qu 2, David Lo 1, Xifeng Yan 3, Jiawei Han 4, and Philip S. Yu 5 1 Singapore.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
IMRank: Influence Maximization via Finding Self-Consistent Ranking
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
1 Approximation algorithms Algorithms and Networks 2015/2016 Hans L. Bodlaender Johan M. M. van Rooij TexPoint fonts used in EMF. Read the TexPoint manual.
Instructor: Shengyu Zhang 1. Location change for the final 2 classes Nov 17: YIA 404 (Yasumoto International Academic Park 康本國際學術園 ) Nov 24: No class.
Bo Zong, Yinghui Wu, Ambuj K. Singh, Xifeng Yan 1 Inferring the Underlying Structure of Information Cascades
Polyhedral Optimization Lecture 5 – Part 3 M. Pawan Kumar Slides available online
Optimal Relay Placement for Indoor Sensor Networks Cuiyao Xue †, Yanmin Zhu †, Lei Ni †, Minglu Li †, Bo Li ‡ † Shanghai Jiao Tong University ‡ HK University.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Yu Wang1, Gao Cong2, Guojie Song1, Kunqing Xie1
Inferring Networks of Diffusion and Influence
Wenyu Zhang From Social Network Group
Nanyang Technological University
Finding Dense and Connected Subgraphs in Dual Networks
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
Abolfazl Asudeh Azade Nazi Nan Zhang Gautam DaS
Independent Cascade Model and Linear Threshold Model
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Effective Social Network Quarantine with Minimal Isolation Costs
Conflict-Aware Event-Participant Arrangement
Coverage Approximation Algorithms
Cost-effective Outbreak Detection in Networks
Bharathi-Kempe-Salek Conjecture
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
Presentation transcript:

Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011

Outline 1. Background 2. Problem 3. Solutions 4. Experimental results 5. Conclusion

Viral Marketing Traditional advertising: Cover massive individuals. Trust level: medium/low. Viral marketing: Target a limited number of users. Utilizes the relationships in social networks, e.g., friends, families, etc. Trust level: relatively high.

Viral Marketing Process of Viral Marketing. Step 1: select initial users (seeds). Step 2: propagation process. Influenced users. Two popular propagation models. Independent Cascade model (IC model) Linear Threshold model (LT model)

Viral Marketing (Cont.) An example: Family Edge, weight Process Step 1: select seeds. Step 2: propagation process. Influenced users: We say the influenced nodes are incurred by a seed set. E.g., Ada, Bob, David are the influenced users incurred by {Ada}. seed AdaBob, David

Outline 1. Background 2. Problem 3. Solutions 4. Experimental results 5. Conclusion

Problem definition σ(S): the expected number of influenced users incurred by seed set S. J-MIN-Seed: Given a social network and an integer J, we want to find a seed set S such that σ(S) ≥ J and |S| is minimized. J-MIN-Seed is NP-hard. (maximum cover problem)

Applications Most scenarios of viral marketing. Seeds. Influenced users. E.g., in some cases, for a company, the goal of targeting a certain amount of users (revenue) has been set up while the cost paid to seeds should be minimized.

Related Work Propagation Models E.g., IC model and LT model Influence Maximization problem Mainly focus on maximizing σ(S) given |S |. Different goals & different constraints. Thus, they cannot be adapted to our problem. Extensions of Influence Maximization problem. E.g., multiple products, competitive products etc..

Outline 1. Background 2. Problem 3. Solutions 4. Experimental results 5. Conclusion

Solution (an approximate one) Greedy algorithm: S: seed set. Set S to be empty. Iteratively add the user that incurs the largest influence gain into S. Stop when the incurred influence achieve the goal of J.

Analysis

Full Coverage

Outline 1. Background 2. Problem 3. Solutions 4. Experimental results 5. Conclusion

Experiment set-up Real datasets: HEP-T, Epinions, Amazon, DBLP Algorithms: Random Degree-heuristic Centrality-heuristic Greedy (Greedy1 and Greedy2) Measures: No. of seeds, Running time and memory

Experimental results (IC Model) Additive Error (Fig. 5 (a)): The errors are much smaller than the theoretical ones. Multiplicative Error (Fig. 5 (b)): The empirical multiplicative error bound is usually smaller than 2.

Experimental results (IC Model) No. of seeds: Our greedy algorithm returns the smallest number of seeds.

Outline 1. Background 2. Problem 3. Solutions 4. Experimental results 5. Conclusion

Conclusion We propose the J-MIN-Seed problem. We design a greedy algorithm which can provide error guarantees. Under the setting of J=|V|, we develop another probabilistic algorithm which can provide an arbitrarily small error with high probability. We conducted extensive experiments which verified our algorithms.

Q & A Thank you.

Motivation A seed set incurs some influenced users. S: seed set. σ(S): influenced users incurred by S. To a company: A seed: cost. An influenced user: revenue. It wants to earn at least a certain amount of revenue (influenced users) while minimizing the cost (seed).

Motivation (Cont.) How to select the seed set such that at least a certain number of individuals are influenced; the number of seeds is minimized?

Intractability & properties σ(S) is submodular for independent cascade model (IC-model) and liner threshold model (LT-model). Error guarantee. α(I) is not submodular for IC-model or LT- model.

Approximate solution

Analysis

Experimental results (IC Model) Running time: The greedy algorithm runs slower than others.

Experimental results (IC Model) Memory: All methods are memory-efficient (less than 2MB).