How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social.

Slides:



Advertisements
Similar presentations
Chapter 5: Tree Constructions
Advertisements

Problems and Their Classes
Circuit and Communication Complexity. Karchmer – Wigderson Games Given The communication game G f : Alice getss.t. f(x)=1 Bob getss.t. f(y)=0 Goal: Find.
Distributed Computing 1. Lower bound for leader election on a complete graph Shmuel Zaks ©
Seminar in Auctions and Mechanism Design Based on J. Hartline’s book: Approximation in Economic Design Presented by: Miki Dimenshtein & Noga Levy.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Totally Unimodular Matrices
Approximation, Chance and Networks Lecture Notes BISS 2005, Bertinoro March Alessandro Panconesi University La Sapienza of Rome.
Spread of Influence through a Social Network Adapted from :
An Approximate Truthful Mechanism for Combinatorial Auctions An Internet Mathematics paper by Aaron Archer, Christos Papadimitriou, Kunal Talwar and Éva.
Congestion Games with Player- Specific Payoff Functions Igal Milchtaich, Department of Mathematics, The Hebrew University of Jerusalem, 1993 Presentation.
Techniques for Dealing with Hard Problems Backtrack: –Systematically enumerates all potential solutions by continually trying to extend a partial solution.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
Lecture 22: April 18 Probabilistic Method. Why Randomness? Probabilistic method: Proving the existence of an object satisfying certain properties without.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
1 Routing and Wavelength Assignment in Wavelength Routing Networks.
Maximizing the Spread of Influence through a Social Network
Outline. Theorem For the two processor network, Bit C(Leader) = Bit C(MaxF) = 2[log 2 ((M + 2)/3.5)] and Bit C t (Leader) = Bit C t (MaxF) = 2[log 2 ((M.
Tutorial 6 of CSCI2110 Bipartite Matching Tutor: Zhou Hong ( 周宏 )
Deterministic Selection and Sorting Prepared by John Reif, Ph.D. Analysis of Algorithms.
The Probabilistic Method Shmuel Wimer Engineering Faculty Bar-Ilan University.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph, any set of nodes that are not adjacent.
1 Complexity of Network Synchronization Raeda Naamnieh.
Online Graph Avoidance Games in Random Graphs Reto Spöhel Diploma Thesis Supervisors: Martin Marciniszyn, Angelika Steger.
1 Algorithms for Large Data Sets Ziv Bar-Yossef Lecture 8 May 4, 2005
CPSC 689: Discrete Algorithms for Mobile and Wireless Systems Spring 2009 Prof. Jennifer Welch.
Prof. Bart Selman Module Probability --- Part e)
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
DANSS Colloquium By Prof. Danny Dolev Presented by Rica Gonen
Lecture 11. Matching A set of edges which do not share a vertex is a matching. Application: Wireless Networks may consist of nodes with single radios,
Computer Science 1 Web as a graph Anna Karpovsky.
Improved results for a memory allocation problem Rob van Stee University of Karlsruhe Germany Leah Epstein University of Haifa Israel WADS 2007 WAOA 2007.
Models of Influence in Online Social Networks
Ch. 8 & 9 – Linear Sorting and Order Statistics What do you trade for speed?
The Theory of NP-Completeness 1. Nondeterministic algorithms A nondeterminstic algorithm consists of phase 1: guessing phase 2: checking If the checking.
Small subgraphs in the Achlioptas process Reto Spöhel, ETH Zürich Joint work with Torsten Mütze and Henning Thomas TexPoint fonts used in EMF. Read the.
Yossi Azar Tel Aviv University Joint work with Ilan Cohen Serving in the Dark 1.
1 Greedy algorithm 叶德仕 2 Greedy algorithm’s paradigm Algorithm is greedy if it builds up a solution in small steps it chooses a decision.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Yaomin Jin Design of Experiments Morris Method.
The Selection Problem. 2 Median and Order Statistics In this section, we will study algorithms for finding the i th smallest element in a set of n elements.
1 Maximal Independent Set. 2 Independent Set (IS): In a graph G=(V,E), |V|=n, |E|=m, any set of nodes that are not adjacent.
PROBABILISTIC COMPUTATION By Remanth Dabbati. INDEX  Probabilistic Turing Machine  Probabilistic Complexity Classes  Probabilistic Algorithms.
Heuristic Optimization Methods Greedy algorithms, Approximation algorithms, and GRASP.
Competitive Queue Policies for Differentiated Services Seminar in Packet Networks1 Competitive Queue Policies for Differentiated Services William.
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
Analysis of Algorithms CS 477/677 Instructor: Monica Nicolescu Lecture 7.
1. 2 You should know by now… u The security level of a strategy for a player is the minimum payoff regardless of what strategy his opponent uses. u A.
Adversarial Coloring, Covering and Domination Chip Klostermeyer.
1 Covering Non-uniform Hypergraphs Endre Boros Yair Caro Zoltán Füredi Raphael Yuster.
Sporadic model building for efficiency enhancement of the hierarchical BOA Genetic Programming and Evolvable Machines (2008) 9: Martin Pelikan, Kumara.
1 Distributed Vertex Coloring. 2 Vertex Coloring: each vertex is assigned a color.
1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Christian Schindelhauer Algorithms for Radio Networks Winter Term 2005/2006.
Non-LP-Based Approximation Algorithms Fabrizio Grandoni IDSIA
Theory of Computational Complexity Probability and Computing Lee Minseon Iwama and Ito lab M1 1.
Network Topology Single-level Diversity Coding System (DCS) An information source is encoded by a number of encoders. There are a number of decoders, each.
Theory of Computational Complexity M1 Takao Inoshita Iwama & Ito Lab Graduate School of Informatics, Kyoto University.
CHAPTER SIX T HE P ROBABILISTIC M ETHOD M1 Zhang Cong 2011/Nov/28.
Krishnendu ChatterjeeFormal Methods Class1 MARKOV CHAINS.
Theory of Computational Complexity Probability and Computing Chapter Hikaru Inada Iwama and Ito lab M1.
Independent Cascade Model and Linear Threshold Model
Maximal Independent Set
Lectures on Network Flows
Independent Cascade Model and Linear Threshold Model
Maximal Independent Set
Resolution Limit in Community Detection
Introduction Wireless Ad-Hoc Network
The Selection Problem.
Independent Cascade Model and Linear Threshold Model
Presentation transcript:

How to Schedule a Cascade in an Arbitrary Graph F. Chierchetti, J. Kleinberg, A. Panconesi February 2012 Presented by Emrah Cem 7301 – Advances in Social Networks The University of Texas at Dallas, Spring 2013

Categories Influence Maximization Community Detection Link Prediction

People get influenced by other’s (their acquaintances’) decisions towards buying a product. Amongst two competing products, both placed equally initially, one manages to capture market significantly faster than the other. These cascades are result of certain early decisions made by a group of consumers. Has been studied in Economics. Design of such initial adopters to seed a desired cascade (by medium of a social network) – the basic aim of this paper. Two assumptions – 1.Only two competing products (only two choices). 2.Primary model – Sequential decisions with positive externalities.

Sequential decisions with positive externalities (Arthur, ‘89) Two types of products – Y’ and N’. Population divided into two classes – Y-types and N-types. A Y-type gets a payoff of P1 from Y’ and P0 from N’. Given P1 > P0. Due to positive externality, a payoff of D per user is added to the total payoff. Say, current number of users of Y’ be M y and that of N’ be M n. Therefore, for one Y-type - Total Payoff (from Y’) = P1 + D*M y Total Payoff (from N’) = P0 + D*M n The larger payoff option wins. Analogous rules for a N-type person.

Decision Parameter c = |P1 – P0|/D Therefore, when |M y – M n | >= c A person will follow the majority |M y – M n | < c A person will follow his own choice For the given model, let’s say: 1.My = Mn = 0, initially. 2.Each new Y-type arrives with a probability p > 0 3.Each new N-type arrives with a probability (1 - p) > 0 Therefore, the first of the either types to have ‘c’ more users will be locked-in, and all decisions made hence will be in favor of the this type. Probability –product of that happening for Y-type =

The Problem: Input: Graph ‘G’; Decision parameter ‘c’; Probability (p) for Y-type and (1-p) for N-type. The type of nodes are revealed when they get to decide their choice. The basic model is that of Arthur’s (as described previously). The only exception is that, now, M y for a node would be the number of neighbors of that node in the graph with a Y’ decision, and vice-versa for M n. The idea of constant adoption:

The Results: The paper states that all graphs can be made to exhibit a constant adoption with expected number of Y’s at least Methodology: Within the given graph, a maximal set of nodes is identified in which all nodes make decisions independently. Subsequently, other nodes are added to S with the intent that a decision from S would be forced on the incoming nodes.

Notes: 1.The paper mentions that there can be graphs for which the expected number of Y’s can be (n – O(1/p)), and this is the maximum possible for any given graph. 2.The model used is an adaptive one, in which while scheduling a node one gets to see the type and decisions of all previously decided nodes. 3.Another version is the non-adaptive one in which an ordering of the full set is created first before seeing the types and decisions of any node.

Concepts used in the algorithm: Although not mentioned in the paper, a possible way to do this would be (from: Wikipedia):

V7 V5 V4 V6 V2 V8 W = {V8, V5, V7, V4, V6, V2} c = 3, W = 2-degenerate sub-graph with Erdos-Hajnal sequence Generation of W V(G) - W = {V1, V3} Graph G

V5 V2V1 c = 3, W = 2-degenerate sub-graph with Erdos-Hajnal sequence V3 V5 V4 V2V1 Graph G V3

The Algorithm:

V7 V3 V5 V4 V6 V2 V1 V8 c = 3, W = 2-degenerate sub-graph with Erdos-Hajnal sequence W = {V8, V5, V7, V4, V6, V2} V(G) - W = {V1, V3} N’ Y’ (forced) N’ Y’ N’

Lower bound on E[# of Y decisions] Y-type user Empty graphs (no edges)Complete graphsAny graph !!! Under the given model With the scheduling produced by Algo. 1

Proof: W is maximal (c-1) degenerate set, so every node in v Є V(G) –W will be connected to at least c nodes in W, otherwise we could add v to W while still keeping W ᴜ {v} has a (c-1)- degenerate graph, and so W would not be maximal. Let k = k(v) be the smallest integer such that v has at least c neighbors in the prefix v 1,v 2,…,v k. After having scheduled v k, node v will have exactly c activated neighbors in W. decision parameter

Example with c=3 v4 v1 v5 v3 v2 v6 Nodes in W Nodes in V(G) - W v1,v2,v3,v4,v5,v6 is a Erdӧs –Hajnal sequence of nodes in W which is maximal 2-degenerate

Proof: If a new node is activated at line 5, c of the neighbors in W have been activated and all of them have chosen, and all its activated neighbors (if any) in V(G)-W have chosen. Therefore v will choose. On the other hand, if at least one of the activated nodes in W chose, then v will not be scheduled until line 7 is reached.

Example with c=3 v4 v1 v5 v3 v2 v6 Nodes in W Nodes in V(G) - W v Unactivated until Line 7

Proof: Before reaching line 7, all activated nodes in V(G) – W will choose (actually will be forced !!). Thanks to our choice of ordering of nodes in W, when we activate a node v in W, there will be at most (c-1) neighbors in W that have already been activated. Therefore, either v will be forced to choose, or its choice will be equal to its type.

Example with c=3 v4 v1 v5 v3 v2 v6 Nodes in W Nodes in V(G) - W v Will be forced to choose

Proof: At iteration k(v), when v has exactly c active neighbors w 1, w 2,…, w c in W. we execute v iff each of w i ’s chose. Since w i ’s signal is independent of other signals, we have that w 1, w 2,…, w c all choose, therefore v will choose, with probability at least p c.

Example with c=3 v4 v1 v5 v3 v2 v6 Nodes in W Nodes in V(G) - W ≥ 0 P( will choose ) = P( at step k(v) all neighbors in W have chosen ) + P( will choose at line 7) v v By Lemma 2.4, each node in W choose with probability at least p, so the probability that all of them will choose, therefore v will be forced to choose, is at least p c.

Since every node v of G is either part of W or V(G) – W, we have that expected value of the random variable indicating the choice of is at least p c due to the linearity of expectation. Every node in W will choose with probability at least p. Every node in V(G) – W will choose with probability at least p c.

Conclusion A formal influence model was explained. Algorithm was explained. It has been proven that for any graph, proposed algorithm guarantees that E[X]≥p c n, where X is the # of nodes having chosen Y.

p≥p c (since 0≤p≤1, and c≥1), so the larger the size of the (c-1)- degenerate induced subgraph, the larger the expected number of ‘s. Question : Is the size of the (c-1)-degenerate graph limited? Yes. Since c is constant, it is always possible to get a scheduling of value Size of the maximum independent set

Unfair coin flipping (unfair gambler’s ruin) – Player one has n1 coins, player 2 has n2 coins. When one wins a toss, it takes one penny from the other – Player one wins each toss with prob. p, player two wins with prob. q=1-p, then probability of each ending penniless: In our case n1=n2=c, and q=1-p so probability that P 1 wins the game is

Maximum number of a’s We have seen that on any graph of size n, one can find a scheduling guaranteeing at least p c n y’s on expectation. Question: What is the largest possible number of y’s on expectation?

Construction example (t=3, c=2) x1 x2 c=2 nodes w1 w2 w3 t=3 nodes v1{1,2} v1{1,3} v1{2,3} v2{1,2} v2{2,3} v2{1,3} nodes

Scheduling for the constructed graph Until we get c choices,schedule in order the nodes w1, w2,… x1 x2 w1 w2 w3 v1{1,2 } v1{1,3 } v1{2,3 } v2{1,2 } v2{2,3 } v2{1,3 } t=3, c=2 wi1 wi2

There should exist c vj{i1,i2,…,ic} nodes such that when red edges are considered only, there is a complete bipartite graph where wi1, wi2,…, wic are on one side and c vj{i1,i2,…,ic} nodes on the other side. Schedule these c vj{i1,i2,…,ic} nodes. x1 x2 w1 w2 w3 v1{1,2} v1{1,3 } v1{2,3 } v2{1,2 } v2{2,3 } v2{1,3 } t=3, c=2 forced wi1 wi2

Schedule the nodes x1, x2, …,xc in any order. Since they have exactly c activated neighbors where all have been forced to choose, therefore nodes x1, x2, …,xc will also be forced to choose. x1 x2 w1 w2 w3 v1{1,2 } v1{1,3 } v1{2,3 } v2{1,2 } v2{2,3 } v2{1,3 } t=3, c=2 forced wi1 wi2 forced

Schedule the remainder of the clique. All remaining nodes in clique has at least 2c neighbors that have chosen and and at most c neighbors that have chosen, all of tem will be forced to choose. x1 x2 w1 w2 w3 v1{1,2 } v1{1,3 } v1{2,3 } v2{1,2 } v2{2,3 } v2{1,3 } t=3, c=2 forced wi1 wi2 forced

Schedule the every remaining wi node. All remaining wi nodes are connected to exactly c activated nodes that have chosen. Therefore, all will be forced to choose. x1 x2 w1 w2 w3 v1{1,2} v1{1,3} v1{2,3} v2{1,2} v2{2,3} v2{1,3} t=3, c=2 forced wi1 wi2 forced

Upper bound on max number of y’s Note that once we get at least c different y’s, every remaining node will choose. Each w i node activated before we get the (c+1)st choice of, is activated independently from the others. So expected number of n’s are a most Therefore, expected number of y’s are at most.

Non-adaptive version First fix the schedule, then activate the nodes.