Viral Marketing over Social Networks

Slides:



Advertisements
Similar presentations
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Advertisements

Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Cost-effective Outbreak Detection in Networks Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, Natalie Glance.
DAVA: Distributing Vaccines over Networks under Prior Information
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Least Cost Rumor Blocking in Social networks Lidan Fan Computer Science Department the University of Texas at Dallas.
Ding-Zhu Du │ University of Texas at Dallas │ Lecture 7 Rumor Blocking 0.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
CS774. Markov Random Field : Theory and Application Lecture 04 Kyomin Jung KAIST Sep
Epidemics in Social Networks
Approximation Algorithms
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
Zoë Abrams, Ashish Goel, Serge Plotkin Stanford University Set K-Cover Algorithms for Energy Efficient Monitoring in Wireless Sensor Networks.
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Adaptive CSMA under the SINR Model: Fast convergence using the Bethe Approximation Krishna Jagannathan IIT Madras (Joint work with) Peruru Subrahmanya.
DATA MINING LECTURE 13 Absorbing Random walks Coverage.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
Expanders via Random Spanning Trees R 許榮財 R 黃佳婷 R 黃怡嘉.
December 7-10, 2013, Dallas, Texas
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Online Social Networks and Media
I NFORMATION C ASCADE Priyanka Garg. OUTLINE Information Propagation Virus Propagation Model How to model infection? Inferring Latent Social Networks.
Linear Program Set Cover. Given a universe U of n elements, a collection of subsets of U, S = {S 1,…, S k }, and a cost function c: S → Q +. Find a minimum.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
 Probability in Propagation. Transmission Rates  Models discussed so far assume a 100% transmission rate to susceptible individuals (e.g. Firefighter.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
1 Latency-Bounded Minimum Influential Node Selection in Social Networks Incheol Shin
IMRank: Influence Maximization via Finding Self-Consistent Ranking
Algorithms For Solving History Sensitive Cascade in Diffusion Networks Research Proposal Georgi Smilyanov, Maksim Tsikhanovich Advisor Dr Yu Zhang Trinity.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
CHAPTER SIX T HE P ROBABILISTIC M ETHOD M1 Zhang Cong 2011/Nov/28.
1/54 Rumor Source Detection: monitor placement Ding-Zhu Du Department of Computer Science University of Texas at Dallas.
The Set-covering Problem Problem statement –given a finite set X and a family F of subsets where every element of X is contained in one of the subsets.
Inferring Networks of Diffusion and Influence
Seed Selection.
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
Influence Maximization
Maximal Independent Set
Degree and Eigenvector Centrality
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Effective Social Network Quarantine with Minimal Isolation Costs
Coverage Approximation Algorithms
Detect rumor sources 2019/1/3
Cost-effective Outbreak Detection in Networks
Rule Selection as Submodular Function
A History Sensitive Cascade Model in Diffusion Networks
Bharathi-Kempe-Salek Conjecture
Kempe-Kleinberg-Tardos Conjecture A simple proof
Ch09 _2 Approximation algorithm
Influence Maximization
Independent Cascade Model and Linear Threshold Model
Navigation and Propagation in Networks
Submodular Maximization with Cardinality Constraints
And Competitive Influence
Lecture 2-6 Complexity for Computing Influence Spread
Presentation transcript:

Viral Marketing over Social Networks C. de Kerchove 27/01/2006

that will spread the virus through the network at best The principle We have a network G(V,E) We choose a subset of V … that will spread the virus through the network at best G seed

that will spread the virus through the network at best The principle We have a network G(V,E) We choose a subset of V … that will spread the virus through the network at best G seed

The motivations To be RICH diffusion of new products, ads by the “word of mouth effect”

The motivations To be RICH To PREVENT epidemics diffusion of new products, ads by the “word of mouth effect” To PREVENT epidemics propagation of diseases or dangerous rumors

The motivations To be RICH To PREVENT epidemics diffusion of new products, ads by the “word of mouth effect” To PREVENT epidemics propagation of diseases or dangerous rumors To INFORM about the network since we measure in someway the centrality of some vertices

Outline Two Models of Influence The optimization Problem Linear Threshold Model Independent Cascade Model The optimization Problem To infect a lot of people after k steps The Greedy Algorithm Efficient and the worst cast is bounded

Two Models of Influence Linear Threshold Model Independent Cascade Model The spread of the virus occurs over a weighted network. Therefore we need DATA that describe such a network. Ex. 1: Telephone calls network weighted according to the duration of calls. Ex. 2: Emails network weighted according to the number of emails. OR we know only the topology of the network (Scale-Free, etc.)

Two Models of Influence Linear Threshold Model Independent Cascade Model LTM Each node v is influenced by each neighbor w according to a weight bv,w such that Node v become active in step t+1 if where θv is the threshold value of v. Put at random => simulating our lack of knowledge OR fixed (θv = 1/2 for every node)

Two Models of Influence Linear Threshold Model Independent Cascade Model ICM When a node v first become active in step t, it is given A SINGLE CHANCE to activate each currently inactivate neighbors w. It succeds with a probability pv,w. If w has multiple newly activated neighbors, their attempts are sequenced in an arbitrary order Whether or not v suceed, it cannot make any further attempts to activate his neighbors.

NP-HARD to determine the optimum The optimization Problem To infect a lot of people after k steps We define the influence of a set of nodes A, denoted to be the expected number of active nodes at the end of the process, given that A is the initial active set of size r. NP-HARD to determine the optimum BUT it can be efficiently approximated to within a factor of THUS a performance guarantee ~ 63%

A result of Nemhauser, Wolsey, and Fisher: The Greedy Algorithm Efficient and the worst cast is bounded A result of Nemhauser, Wolsey, and Fisher: Theorem: For a nonnegative, monotone submodular function f, let S be a set of size r obtained by selecting elements one at a time, each time choosing an element that provides the largest marginal increase in the function value of f over all r-element sets. Then Rest to proof that is a nonnegative, monotone submodular function.

Generalization of the two Models The Greedy Algorithm Efficient and the worst cast is bounded Generalization of the two Models LTM: we can use a monotone function fv that maps subset of neighbors of v on [0,1]. ICM: the probability pv,w depends on the set of w’s neighbors that have already tried to infect w.

Some experiments…