Online Social Networks and Media

Slides:



Advertisements
Similar presentations
1 SOFSEM 2007 Weighted Nearest Neighbor Algorithms for the Graph Exploration Problem on Cycles Eiji Miyano Kyushu Institute of Technology, Japan Joint.
Advertisements

Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
DAVA: Distributing Vaccines over Networks under Prior Information
Online Social Networks and Media Cascading Behavior in Networks Epidemic Spread Influence Maximization.
Combinatorial Algorithms
Information Networks Failures and Epidemics in Networks Lecture 12.
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Online Social Networks and Media. Graph partitioning The general problem – Input: a graph G=(V,E) edge (u,v) denotes similarity between u and v weighted.
Rescuing an Endangered Species with Monte Carlo AI Tom Dietterich based on work by Dan Sheldon et al. 1.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
Absorbing Random walks Coverage
Epidemics in Social Networks
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Approximation Algorithms Motivation and Definitions TSP Vertex Cover Scheduling.
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Approximation Algorithms: Bristol Summer School 2008 Seffi Naor Computer Science Dept. Technion Haifa, Israel TexPoint fonts used in EMF. Read the TexPoint.
Maximizing Product Adoption in Social Networks
Models of Influence in Online Social Networks
Online Social Networks and Media Epidemics and Influence.
Approximation Algorithms for Stochastic Combinatorial Optimization Part I: Multistage problems Anupam Gupta Carnegie Mellon University.
Stochastic Algorithms Some of the fastest known algorithms for certain tasks rely on chance Stochastic/Randomized Algorithms Two common variations – Monte.
Approximation Algorithms for NP-hard Combinatorial Problems Magnús M. Halldórsson Reykjavik University
Online Social Networks and Media
DATA MINING LECTURE 13 Absorbing Random walks Coverage.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem Kevin Chang Joint work with James Aspnes and Aleksandr Yampolskiy.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
DATA MINING LECTURE 13 Pagerank, Absorbing Random Walks Coverage Problems.
Inoculation Strategies for Victims of Viruses and the Sum-of-Squares Partition Problem James Apnes, Kevin Change, and Aleksandr Yampolskiy.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
Approximation Algorithms for NP-hard Combinatorial Problems Magnús M. Halldórsson Reykjavik University Local Search, Greedy and Partitioning
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Unique Games Approximation Amit Weinstein Complexity Seminar, Fall 2006 Based on: “Near Optimal Algorithms for Unique Games" by M. Charikar, K. Makarychev,
Preserving Privacy and Social Influence Isabelle Stanton.
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
Instructor: Shengyu Zhang 1. Location change for the final 2 classes Nov 17: YIA 404 (Yasumoto International Academic Park 康本國際學術園 ) Nov 24: No class.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
Inferring Networks of Diffusion and Influence
Seed Selection.
Nanyang Technological University
Failures and Epidemics in Networks
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
Approximating the MST Weight in Sublinear Time
Independent Cascade Model and Linear Threshold Model
Maximizing the Spread of Influence through a Social Network
Framework for the Secretary Problem on the Intersection of Matroids
The Importance of Communities for Learning to Influence
Coverage Approximation Algorithms
A History Sensitive Cascade Model in Diffusion Networks
Bharathi-Kempe-Salek Conjecture
Kempe-Kleinberg-Tardos Conjecture A simple proof
Online Social Networks and Media
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
Presentation transcript:

Online Social Networks and Media Influence Maximization

Maximizing spread Suppose that instead of a virus we have an item (product, idea, video) that propagates through contact Word of mouth propagation. An advertiser is interested in maximizing the spread of the item in the network The holy grail of “viral marketing” Question: which nodes should we “infect” so that we maximize the spread? [KKT2003]

Independent cascade model Each node may be active (has the item) or inactive (does not have the item) Time proceeds at discrete time-steps. At time t, every node v that became active in time t-1 actives a non-active neighbor w with probability puw. If it fails, it does not try again The same as the simple SIR model

Influence maximization Influence function: for a set of nodes A (target set) the influence s(A) is the expected number of active nodes at the end of the diffusion process if the item is originally placed in the nodes in A. Influence maximization problem [KKT03]: Given an network, a diffusion model, and a value k, identify a set A of k nodes in the network that maximizes s(A). The problem is NP-hard

A Greedy algorithm What is a simple algorithm for selecting the set A? Computing s(A): perform multiple simulations of the process and take the average. How good is the solution of this algorithm compared to the optimal solution? Greedy algorithm Start with an empty set A Proceed in k steps At each step add the node u to the set A the maximizes the increase in function s(A) The node that activates the most additional nodes

Approximation Algorithms Suppose we have a (combinatorial) optimization problem, and X is an instance of the problem, OPT(X) is the value of the optimal solution for X, and ALG(X) is the value of the solution of an algorithm ALG for X In our case: X = (G,k) is the input instance, OPT(X) is the spread S(A*) of the optimal solution, GREEDY(X) is the spread S(A) of the solution of the Greedy algorithm ALG is a good approximation algorithm if the ratio of OPT and ALG is bounded.

Approximation Ratio For a maximization problem, the algorithm ALG is an 𝛼-approximation algorithm, for 𝛼<1, if for all input instances X, 𝐴𝐿𝐺 𝑋 ≥𝛼𝑂𝑃𝑇 𝑋 The solution of ALG(X) has value at least α% that of the optimal α is the approximation ratio of the algorithm Ideally we would like α to be a small constant

Approximation Ratio for Influence Maximzation The GREEDY algorithm has approximation ratio 𝛼=1− 1 𝑒 𝐺𝑅𝐸𝐸𝐷𝑌 𝑋 ≥ 1− 1 𝑒 𝑂𝑃𝑇 𝑋 , for all X

Proof of approximation ratio The spread function s has two properties: s is monotone: 𝑠(𝐴)≤𝑠 𝐵 if 𝐴⊆𝐵 s is submodular: 𝑠 𝐴∪ 𝑥 −𝑠 𝐴 ≥𝑠 𝐵∪ 𝑥 −𝑠 𝐵 𝑖𝑓 𝐴⊆𝐵 The addition of node x to a set of nodes has greater effect (more activations) for a smaller set. The diminishing returns property

Optimizing submodular functions Theorem: A greedy algorithm that optimizes a monotone and submodular function s, each time adding to the solution A, the node x that maximizes the gain 𝑠 𝐴∪ 𝑥 −𝑠(𝐴)has approximation ratio 𝛼= 1− 1 𝑒 The spread of the Greedy solution is at least 63% that of the optimal

Submodularity of influence Why is s(A) submodular? How do we deal with the fact that influence is defined as an expectation? We will use the fact that probabilistic propagation on a fixed graph can be viewed as deterministic propagation over a randomized graph Express s(A) as an expectation over the input graph rather than the choices of the algorithm

Independent cascade model Each edge (u,v) is considered only once, and it is “activated” with probability puv. We can assume that all random choices have been made in advance generate a sample subgraph of the input graph where edge (u,v) is included with probability puv propagate the item deterministically on the input graph the active nodes at the end of the process are the nodes reachable from the target set A The influence function is obviously(?) submodular when propagation is deterministic The weighted combination of submodular functions is also a submodular function

Linear threshold model Again, each node may be active or inactive Every directed edge (v,u) in the graph has a weight bvu, such that 𝑣 is a neighbor of 𝑢 𝑏 𝑣𝑢 ≤1 Each node u has a (randomly generated) threshold value Tu Time proceeds in discrete time-steps. At time t an inactive node u becomes active if 𝑣 is an active neighbor of 𝑢 𝑏 𝑣𝑢 ≥ 𝑇 𝑢 Related to the game-theoretic model of adoption.

Influence Maximization KKT03 showed that in this case the influence s(A) is still a submodular function, using a similar technique Assumes uniform random thresholds The Greedy algorithm achieves a (1-1/e) approximation