Lecture 2-6 Complexity for Computing Influence Spread

Slides:



Advertisements
Similar presentations
Solving connectivity problems parameterized by treewidth in single exponential time Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk Jesper Nederlof, Dagstuhl.
Advertisements

Chapter 4 Partition (3) Double Partition Ding-Zhu Du.
Part VI NP-Hardness. Lecture 23 Whats NP? Hard Problems.
Complexity Theory Lecture 6
Chapter 7 Linear Programming I. Simplex Method Ding-Zhu Du.
Lecture 9. Resource bounded KC K-, and C- complexities depend on unlimited computational resources. Kolmogorov himself first observed that we can put resource.
Competition in VM – Completing the Circle. Previous work in Competitive VM Mainly follower’s perspective: given state (say of seed selection) of previous.
2 4 Theorem:Proof: What shall we do for an undirected graph?
Lecture 3 Universal TM. Code of a DTM Consider a one-tape DTM M = (Q, Σ, Γ, δ, s). It can be encoded as follows: First, encode each state, each direction,
Lecture 16 Deterministic Turing Machine (DTM) Finite Control tape head.
Lecture 24 MAS 714 Hartmut Klauck
Maximizing the Spread of Influence through a Social Network
Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
Fall 2004COMP 3351 Recursively Enumerable and Recursive Languages.
Recent Development on Elimination Ordering Group 1.
Recursively Enumerable and Recursive Languages
Graph Triangulation by Dmitry Pidan Based on the paper “A sufficiently fast algorithm for finding close to optimal junction tree” by Ann Becker and Dan.
1 CSE 417: Algorithms and Computational Complexity Winter 2001 Lecture 19 Instructor: Paul Beame.
Influence Maximization
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
CSCI 4325 / 6339 Theory of Computation Zhixiang Chen.
Limits of Local Algorithms in Random Graphs
Applications of types of SATs Arash Ahadi What is SAT?
December 7-10, 2013, Dallas, Texas
Computation Model and Complexity Class. 2 An algorithmic process that uses the result of a random draw to make an approximated decision has the ability.
Problem Setting :Influence Maximization A new product is available in the market. Whom to give free samples to maximize the purchase of the product ? 1.
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
Submodular Maximization with Cardinality Constraints Moran Feldman Based On Submodular Maximization with Cardinality Constraints. Niv Buchbinder, Moran.
Joel Oren, University of Toronto
Recursively Enumerable and Recursive Languages
Of 17 Limits of Local Algorithms in Random Graphs Madhu Sudan MSR Joint work with David Gamarnik (MIT) 7/11/2013Local Algorithms on Random Graphs1.
Lecture 5-2 Target-Influence and Power Law Graphs Ding-Zhu Du Univ of Texas at Dallas.
The Church-Turing Thesis
Unconstrained Submodular Maximization Moran Feldman The Open University of Israel Based On Maximizing Non-monotone Submodular Functions. Uriel Feige, Vahab.
1 Recursively Enumerable and Recursive Languages.
Design and Analysis of Approximation Algorithms
NP-Completeness A problem is NP-complete if: It is in NP
Seed Selection.
Independent Cascade Model and Linear Threshold Model
Heuristic & Approximation
A simple parallel algorithm for the MIS problem
Greedy & Heuristic algorithms in Influence Maximization
Recursively Enumerable and Recursive Languages
Lecture 2-6 Polynomial Time Hierarchy
Influence Maximization
Modularity Maximization
Turing Machines Space bounds Reductions Complexity classes
Power Law Structure Weili Wu Ding-Zhu Du Univ of Texas at Dallas
The Definition of Algorithm
What is the next line of the proof?
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Subhash Khot Theory Group
Bin Fu Department of Computer Science
Randomized Algorithms CS648
Particle Filtering ICS 275b 2002.
Lecture 23 Greedy Strategy
Detect rumor sources 2019/1/3
The Off-Line Machine Input File read-only (once) Input string
Clustering.
Influence Maximization
Viral Marketing over Social Networks
CS6382 Theory of Computation
Independent Cascade Model and Linear Threshold Model
Lecture 28 Approximation of Set Cover
Submodular Maximization with Cardinality Constraints
Multiple Products.
Data-Dependent Approximation
Presentation transcript:

Lecture 2-6 Complexity for Computing Influence Spread Ding-Zhu Du

Section 9.1-2

Definition

Examples

Turing Reduction

Oracle DTM Query tape Query state

Oracle DTM Query tape answer state Remark:

#P-Complete

Theorem (Chen et al., 2010) Proof

1 2 3

1 1 2 3 2 3 1 1 2 3 2 3

1 1 2 3 2 3 1 1 2 3 2 3

Theorem (Chen et al., 2010) Proof

Disadvantage Lack of efficiency. Computing σm(S) is # P-hard under both IC and LT models. Selecting a new vertex u that provides the largest marginal gain σm(S+u) - σm(S), which can only be approximated by Monte-Carlo simulations (10,000 trials). Assume a weighted social graph as input. How to learn influence probabilities from history? ( Step 3 of the Greedy algorithm above)

References

Thanks, end.