Bharathi-Kempe-Salek Conjecture

Slides:



Advertisements
Similar presentations
Chapter 4 Partition (3) Double Partition Ding-Zhu Du.
Advertisements

Problems and Their Classes
How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.
Algorithm Design Techniques: Greedy Algorithms. Introduction Algorithm Design Techniques –Design of algorithms –Algorithms commonly used to solve problems.
LEARNING INFLUENCE PROBABILITIES IN SOCIAL NETWORKS Amit Goyal Francesco Bonchi Laks V. S. Lakshmanan University of British Columbia Yahoo! Research University.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Diffusion and Cascading Behavior in Random Networks Marc Lelarge (INRIA-ENS) WIDS MIT, May 31, 2011.
DAVA: Distributing Vaccines over Networks under Prior Information
Graph Isomorphism Algorithms and networks. Graph Isomorphism 2 Today Graph isomorphism: definition Complexity: isomorphism completeness The refinement.
Maximizing the Spread of Influence through a Social Network
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Competitive Viral Marketing Based on: S. Bharathi et al. Competitive Influence Maximization in Social Networks, WINE C. Budak et al. Limiting the.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Computability and Complexity 20-1 Computability and Complexity Andrei Bulatov Random Sources.
Epidemics in Social Networks
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Adaptiveness vs. obliviousness and randomization vs. determinism Dariusz Kowalski University of Connecticut & Warsaw University Andrzej Pelc University.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Maximizing Product Adoption in Social Networks
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Week 10Complexity of Algorithms1 Hard Computational Problems Some computational problems are hard Despite a numerous attempts we do not know any efficient.
. CLASSES RP AND ZPP By: SARIKA PAMMI. CONTENTS:  INTRODUCTION  RP  FACTS ABOUT RP  MONTE CARLO ALGORITHM  CO-RP  ZPP  FACTS ABOUT ZPP  RELATION.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
 Probability in Propagation. Transmission Rates  Models discussed so far assume a 100% transmission rate to susceptible individuals (e.g. Firefighter.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Inventory Control with Time-Varying Demand. 2  Week 1Introduction to Production Planning and Inventory Control  Week 2Inventory Control – Deterministic.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
Instructor: Shengyu Zhang 1. Optimization Very often we need to solve an optimization problem.  Maximize the utility/payoff/gain/…  Minimize the cost/penalty/loss/…
Random Sampling Algorithms with Applications Kyomin Jung KAIST Aug ERC Workshop.
Presented By Ravindra Babu, Pentyala.  Real World Problem  What is Coloring  Planar Graphs  Vertex Coloring  Edge Coloring  NP Hard Problem  Problem.
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Chapter 7 Linear Programming
Umans Complexity Theory Lectures
Greedy & Heuristic algorithms in Influence Maximization
Lecture 5 Dynamic Programming
Influence Maximization
Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas
Algorithms and networks
Lecture 5 Dynamic Programming
│ University of Texas at Dallas │
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Hidden Markov Models Part 2: Algorithms
Algorithms and networks
Detect rumor sources 2019/1/3
Miniconference on the Mathematics of Computation
A History Sensitive Cascade Model in Diffusion Networks
General Threshold and Cascade Models
Kempe-Kleinberg-Tardos Conjecture A simple proof
Influence Maximization
Malik Magdon-Ismail, Konstantin Mertsalov, Mark Goldberg
Theorem 9.3 A problem Π is in P if and only if there exist a polynomial p( ) and a constant c such that ICp (x|Π) ≤ c holds for all instances x of Π.
Viral Marketing over Social Networks
Independent Cascade Model and Linear Threshold Model
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Noncooperative Rumor Blocking
Cave generation with cellular automata
Presentation transcript:

Bharathi-Kempe-Salek Conjecture Lecture 2-3 Bharathi-Kempe-Salek Conjecture Ding-Zhu Du University of Texas at Dallas

Bharathi-Kempe-Salek Conjecture

Solution Deterministic diffusion model -polynomial-time. Linear Threshold (LT) – polynomial-time. Independent Cascade (IC) – NP-hard.

Deterministic Diffusion Model When a node becomes active (infected or protected), it activates all of its currently inactive (not infected and not protected) neighbors. The activation attempts succeed with a probability 1.

Deterministic Model 6 2 1 5 Two kinds of influence cascades: rumors and protectors. Each individual has three status: inactive, rumored, protected. The active individual activates all of its neighbors successfully. When rumors and protectors influence an individual at the same time, then the individual is protected. Each individual only has one chance to influence their neighbors. A node will never change its status if it has been activated. 3 4 both 1 and 6 are source nodes. Step 1: 1--2,3; 6--2,4. . 4/4/2019 5

Example 6 2 1 5 3 4 Step 2: 4--5. 4/4/2019

A Property of Optimal Solution

Naïve Dynamic Programming

Naïve Dynamic Programming

Running Time It is not a polynomial-time!

Counting

Virtual Nodes Change arborescence to binary arborescence At most n virtual nodes can be introduced.

Weight

Naïve Dynamic Programming

Linear Threshold (LT) Model A node v has random threshold ~ U[0,1] A node v is influenced by each neighbor w according to a weight bw,v such that A node v becomes active when at least (weighted) fraction of its neighbors are active Given a random choice of thresholds, and an initial set of active nodes A0 (with all other nodes inactive), the diffusion process unfolds deterministically in discrete steps: in step t, all nodes that were active in step t-1 remain active, and we activate any node v for which the total weight of its active neighbors is at least Theta(v)

Example Stop! w v Y Inactive Node 0.6 Active Node 0.2 Threshold 0.2 0.3 Active neighbors X 0.1 0.4 U 0.3 0.5 Stop! 0.2 0.5 w v

A property

Equivalent Networks

At seed v

At non-seed v

At non-seed v

At non-seed v

At non-seed v

At seed v

Independent Cascade (IC) Model When node v becomes active, it has a single chance of activating each currently inactive neighbor w. The activation attempt succeeds with probability pvw . The deterministic model is a special case of IC model. In this case, pvw =1 for all (v,w). We again start with an initial set of active nodes A0, and the process unfolds in discrete steps according to the following randomized rule. When node v first becomes active in step t, it is given a single chance to activate each currently inactive neighbor w; it succeeds with a probability pv;w —a parameter of the system — independently of the history thus far. (If w has multiple newly activated neighbors, their attempts are sequenced in an arbitrary order.) If v succeeds, then w will become active in step t+1; but whether or not v succeeds, it cannot make any further attempts to activate w in subsequent rounds. Again, the process runs until no more activations are possible.

Example Y 0.6 Inactive Node 0.2 0.2 0.3 Active Node Newly active node X U 0.1 0.4 Successful attempt 0.5 0.3 0.2 Unsuccessful attempt 0.5 w v Stop!

At non-seed v

Another Dynamic Programming

Proof of NP-hardness

Partition Problem This is a well-known NP-complete problem!

Special Case This is still an NP-complete problem!

Subsum Problem This is still an NP-complete problem!

Key Fact 1

<1?

h=?

Key Fact 2

References

THANK YOU!