Konstantin Avrachenkov (INRIA) Prithwish Basu (BBN) Giovanni Neglia (INRIA) Bruno Ribeiro (CMU) Don Towsley (UMass Amherst) 1 K. Avrachenkov, P. Basu,

Slides:



Advertisements
Similar presentations
Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Advertisements

Review: Search problem formulation
Some Graph Algorithms.
CSE 390B: Graph Algorithms Based on CSE 373 slides by Jessica Miller, Ruth Anderson 1.
Solving Problem by Searching
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Analysis of Algorithms Depth First Search. Graph A representation of set of objects Pairs of objects are connected Interconnected objects are called “vertices.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
CSE 373 Graphs 1: Concepts, Depth/Breadth-First Search
Tree Searching. Tree searches A tree search starts at the root and explores nodes from there, looking for a goal node (a node that satisfies certain conditions,
CS 480 Lec 3 Sept 11, 09 Goals: Chapter 3 (uninformed search) project # 1 and # 2 Chapter 4 (heuristic search)
CS 206 Introduction to Computer Science II 11 / 07 / 2008 Instructor: Michael Eckmann.
Artificial Intelligence (CS 461D)
CS171 Introduction to Computer Science II Graphs Strike Back.
UNINFORMED SEARCH Problem - solving agents Example : Romania  On holiday in Romania ; currently in Arad.  Flight leaves tomorrow from Bucharest.
Absorbing Random walks Coverage
1 Walking on a Graph with a Magnifying Glass Stratified Sampling via Weighted Random Walks Maciej Kurant Minas Gjoka, Carter T. Butts, Athina Markopoulou.
Review: Search problem formulation
1 Greedy Algorithms. 2 2 A short list of categories Algorithm types we will consider include: Simple recursive algorithms Backtracking algorithms Divide.
Spanning Trees.
Maciej Kurant (EPFL / UCI) Joint work with: Athina Markopoulou (UCI),
CS 206 Introduction to Computer Science II 11 / 10 / 2008 Instructor: Michael Eckmann.
Geographic Gossip: Efficient Aggregations for Sensor Networks Author: Alex Dimakis, Anand Sarwate, Martin Wainwright University: UC Berkeley Venue: IPSN.
Graph, Search Algorithms Ka-Lok Ng Department of Bioinformatics Asia University.
CS 206 Introduction to Computer Science II 11 / 05 / 2008 Instructor: Michael Eckmann.
Maximum Network lifetime in Wireless Sensor Networks with Adjustable Sensing Ranges Mihaela Cardei, Jie Wu, Mingming Lu, and Mohammad O. Pervaiz Department.
CS 188: Artificial Intelligence Spring 2006 Lecture 2: Queue-Based Search 8/31/2006 Dan Klein – UC Berkeley Many slides over the course adapted from either.
Minas Gjoka, UC IrvineWalking in Facebook 1 Walking in Facebook: A Case Study of Unbiased Sampling of OSNs Minas Gjoka, Maciej Kurant ‡, Carter Butts,
Search  Exhaustive/Blind Search Methods Depth First Search Breadth First Search  Heuristic Methods Hill Climbing Beam Search Best First Search…
C o n f i d e n t i a l HOME NEXT Subject Name: Data Structure Using C Unit Title: Graphs.
Review: Search problem formulation Initial state Actions Transition model Goal state (or goal test) Path cost What is the optimal solution? What is the.
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Tree Searching Breadth First Search Dept First Search.
Minimum Spanning Trees
DATA MINING LECTURE 13 Absorbing Random walks Coverage.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Network Characterization via Random Walks B. Ribeiro, D. Towsley UMass-Amherst.
1 Min-Cost Live Webcast under Joint Pricing of Data, Congestion and Virtualized Servers Rui Zhu 1, Di Niu1, Baochun Li 2 1 Department of Electrical and.
COSC 2007 Data Structures II Chapter 14 Graphs III.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
GRASP: A Sampling Meta-Heuristic
DATA MINING LECTURE 13 Pagerank, Absorbing Random Walks Coverage Problems.
Energy Efficient Broadcast in WANETs under an Overhearing Cost Model Guofeng Deng IMPACT Lab at ASU.
A RTIFICIAL I NTELLIGENCE UNIT : 2 Search Techniques.
Online Social Networks and Media
COMP261 Lecture 6 Dijkstra’s Algorithm. Connectedness Is this graph connected or not? A Z FF C M N B Y BB S P DDGG AA R F G J L EE CC Q O V D T H W E.
Bruno Ribeiro Don Towsley University of Massachusetts Amherst IMC 2010 Melbourne, Australia.
Michael Walker. From Maps to Graphs  Make Intersections Vertices  Make Roads Edges  Result is Weighted Directed Graph  Weights: Speed Limit Length.
Advanced Artificial Intelligence Lecture 2: Search.
Minimum Spanning Trees CS 146 Prof. Sin-Min Lee Regina Wang.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Search Techniques CS480/580 Fall Introduction Trees: – Root, parent, child, sibling, leaf node, node, edge – Single path from root to any node Graphs:
Performance Evaluation Lecture 1: Complex Networks Giovanni Neglia INRIA – EPI Maestro 10 December 2012.
Analyzing Networks. Milgram’s Experiments “Six degrees of Separation” Milgram’s letters to various recruits in Nebraska who were asked to forward the.
On the Placement of Web Server Replicas Yu Cai. Paper On the Placement of Web Server Replicas Lili Qiu, Venkata N. Padmanabhan, Geoffrey M. Voelker Infocom.
Chapter 05 Introduction to Graph And Search Algorithms.
Bo Zong, Yinghui Wu, Ambuj K. Singh, Xifeng Yan 1 Inferring the Underlying Structure of Information Cascades
Source: David Lee Matuszek
Best-first search is a search algorithm which explores a graph by expanding the most promising node chosen according to a specified rule.
Graph Theory Def: A graph is a set of vertices and edges G={V,E} Ex. V = {a,b,c,d,e} E = {ab,bd,ad,ed,ce,cd} Note: above is a purely mathematical definition.
1 3/21/2016 MATH 224 – Discrete Mathematics First we determine if a graph is connected.
1 Link Privacy in Social Networks Aleksandra Korolova, Rajeev Motwani, Shubha U. Nabar CIKM’08 Advisor: Dr. Koh, JiaLing Speaker: Li, HueiJyun Date: 2009/3/30.
Brute Force and Exhaustive Search Brute Force and Exhaustive Search Traveling Salesman Problem Knapsack Problem Assignment Problem Selection Sort and Bubble.
Chapter 3 Solving problems by searching. Search We will consider the problem of designing goal-based agents in observable, deterministic, discrete, known.
Lecture 3: Uninformed Search
Distributed voting application for handheld devices
Coverage Approximation Algorithms
Lecture 2: Complex Networks
Minimum spanning trees
Lecture 28 Approximation of Set Cover
Presentation transcript:

Konstantin Avrachenkov (INRIA) Prithwish Basu (BBN) Giovanni Neglia (INRIA) Bruno Ribeiro (CMU) Don Towsley (UMass Amherst) 1 K. Avrachenkov, P. Basu, G. Neglia, B. Ribeiro*, and D. Towsley, Pay Few, Influence Most: Online Myopic Network Covering, IEEE NetSciCom Workshop 2014 * corresponding author

(c) 2014, Bruno Ribeiro: Voter Boost on Facebook: Apps targeting supporters 1.Ask campaign contributions (volunteer time, money, etc.) 2.Remind users (recruited nodes) & friends to vote 3.Access to friends list 2

(c) 2014, Bruno Ribeiro: 3 covered friend recruited user Problem: Find largest cover given budget B Each recruitment has unit cost

(c) 2014, Bruno Ribeiro: Common solutions:  Minimum Dominating Set (MDS) ◦ NO. Dominating Set must be connected  Minimum Connected Dominating Set (MCDS) ◦ Dominating Set is connected 4 REAL-WORLD PROBLEM: TOPOLOGY UNKNOWN

(c) 2014, Bruno Ribeiro:  Prioritize invitations without friend degree information  Online algorithm 5 covered friend recruited user unknown node

(c) 2014, Bruno Ribeiro:  Existing approaches & shortcomings  MEED & MOD  Conclusions 6

(c) 2014, Bruno Ribeiro:  Existing approaches & shortcomings  MEED & MOD  Conclusions 7

(c) 2014, Bruno Ribeiro: 8  BFS explores nodes in order of discovery  FIFO queue priority LM N OP G QH J IK FED BC A

(c) 2014, Bruno Ribeiro:  Oracle: (Guha and Khuller’ 98) greedy cover w/known topology  BFS Problem: you and your friends have many friends in common (transitivity, cluster) 9 Wiki-talk Slashdot Details in the paper

(c) 2014, Bruno Ribeiro: 10  DFS chooses random unvisited neighbor  LIFO queue priority  Avoids “cluster” overexploration LM N O P G Q H J IK F ED BC A

(c) 2014, Bruno Ribeiro:  Oracle: (Guha and Khuller’ 98) greedy cover w/known topology  DFS Problem: ◦ First observed nodes are hubs ◦ Hubs go to bottom of LIFO queue 11 Wiki-talk Slashdot Details in the paper

(c) 2014, Bruno Ribeiro:  RW chooses random neighbor  No cost of “revisiting” node  Random queue priority 12 LM N O P G Q H J IK F ED BC A Random Walk (RW) Search

(c) 2014, Bruno Ribeiro:  Oracle: (Guha and Khuller’ 98) greedy cover w/known topology  RW advantages: ◦ Less “cluster” problem than BFS ◦ Seeks hubs unlike DFS  RW Problem: random priority not targeting potential super- hubs 13 Wiki-talk Slashdot Details in the paper

(c) 2014, Bruno Ribeiro:  Existing approaches & shortcomings  MEED & MOD  Conclusions 14

(c) 2014, Bruno Ribeiro: Enron network 15 Mathematical analysis MUST consider finite graph effects Details in Tech Report Avg ex. degree unrecruited Avg ex. degree unrecruited node with 4 recruited friends Avg ex. degree unrecruited node with 2 recruited friends Avg ex. degree unrecruited node with 1 recruited friend Budget spent so far

(c) 2014, Bruno Ribeiro:  (Guha and Kuller’98) myopic heuristic 1. Start tree T = {v} 2. Select neighbors of T with max excess degree 3. Add node to T 4. GOTO 2 until budget exhausted  MEED heuristic: Replaces “ with max excess degree” by “ with max EXPECTED excess degree” 16 Excess degree (uncovered degree) Assumes known topology Details in the paper

(c) 2014, Bruno Ribeiro:  Chooses node with max recruited neighbors  MOD heuristic 1.Select unrecruited w/ max recruited neighbors 2.Invite node 3.GOTO 1 until budget is exhausted  In some topologies: node max excess degree = node most recruited friends ◦ e.g., (finite!) random power law graphs with α ∊ {1,2} ◦ approx. true for Erdös-Rényi graphs 17 Details in the paper

(c) 2014, Bruno Ribeiro:  Oracle: (Guha and Khuller’ 98) greedy cover w/known topology  MOD heuristic: closer to Oracle in all tested social networks 18 Slashdot Wiki-talk Details in the paper

(c) 2014, Bruno Ribeiro:  Amazon product-product recommendation network 19 Same nodes, same degrees + randomized neighbors Budget Details in the paper (Maiya & Berger- Wolf, KDD’11) concluded DFS best heuristic for most networks?!?

(c) 2014, Bruno Ribeiro:  Existing approaches & shortcomings  MEED & MOD  Conclusions 20

(c) 2014, Bruno Ribeiro:  Myopic Pay-to-cover problems: many open problems with real-world applications ◦ Theory must consider finite networks!  Our work: Observations in social networks ◦ Theory: Analysis of finite networks ◦ Empirical + why:  DFS consistently bad  BFS suffers with clustering  RW better than BFS  MOD better overall  Thank you! Tech 21