Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014.

Slides:



Advertisements
Similar presentations
Mobile Communication Networks Vahid Mirjalili Department of Mechanical Engineering Department of Biochemistry & Molecular Biology.
Advertisements

Size-estimation framework with applications to transitive closure and reachability Presented by Maxim Kalaev Edith Cohen AT&T Bell Labs 1996.
Minimizing Seed Set for Viral Marketing Cheng Long & Raymond Chi-Wing Wong Presented by: Cheng Long 20-August-2011.
Spread of Influence through a Social Network Adapted from :
Maximizing the Spread of Influence through a Social Network
Computing Classic Closeness Centrality, at Scale Edith Cohen Joint with: Thomas Pajor, Daniel Delling, Renato Werneck Microsoft Research.
Exact Inference in Bayes Nets
Maximizing the Spread of Influence through a Social Network
Suqi Cheng Research Center of Web Data Sciences & Engineering
A Fairy Tale of Greedy Algorithms Yuli Ye Joint work with Allan Borodin, University of Toronto.
Maximizing the Spread of Influence through a Social Network By David Kempe, Jon Kleinberg, Eva Tardos Report by Joe Abrams.
Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory (Jon Kleinberg, 2007) and Ch.16 and 19 of Networks,
Beyond Keyword Search: Discovering Relevant Scientific Literature Khalid El-Arini and Carlos Guestrin August 22, 2011 TexPoint fonts used in EMF. Read.
INFERRING NETWORKS OF DIFFUSION AND INFLUENCE Presented by Alicia Frame Paper by Manuel Gomez-Rodriguez, Jure Leskovec, and Andreas Kraus.
The community-search problem and how to plan a successful cocktail party Mauro SozioAris Gionis Max Planck Institute, Germany Yahoo! Research, Barcelona.
Influence Maximization
Maximizing the Spread of Influence through a Social Network
Simpath: An Efficient Algorithm for Influence Maximization under Linear Threshold Model Amit Goyal Wei Lu Laks V. S. Lakshmanan University of British Columbia.
Approximate Inference 2: Monte Carlo Markov Chain
Maximizing Product Adoption in Social Networks
Leveraging Big Data: Lecture 11 Instructors: Edith Cohen Amos Fiat Haim Kaplan Tova Milo.
Models of Influence in Online Social Networks
Diffusion in Social and Information Networks Part II W ORLD W IDE W EB 2015, F LORENCE MPI for Software SystemsGeorgia Institute of Technology Le Song.
Active Learning for Networked Data Based on Non-progressive Diffusion Model Zhilin Yang, Jie Tang, Bin Xu, Chunxiao Xing Dept. of Computer Science and.
Estimation for Monotone Sampling: Competitiveness and Customization Edith Cohen Microsoft Research.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 David Balduzzi 1 Bernhard Schölkopf 1 UNCOVERING THE TEMPORAL DYNAMICS.
Personalized Influence Maximization on Social Networks
DATA MINING LECTURE 13 Absorbing Random walks Coverage.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Influence Maximization in Dynamic Social Networks Honglei Zhuang, Yihan Sun, Jie Tang, Jialin Zhang, Xiaoming Sun.
December 7-10, 2013, Dallas, Texas
Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Eva Tardos Cornell University KDD 2003.
Maximizing the Spread of Influence through a Social Network Authors: David Kempe, Jon Kleinberg, É va Tardos KDD 2003.
Computing Classic Closeness Centrality, at Scale Edith Cohen Joint with: Thomas Pajor, Daniel Delling, Renato Werneck.
CSE 589 Part VI. Reading Skiena, Sections 5.5 and 6.8 CLR, chapter 37.
Online Social Networks and Media
Lecture 3-1 Independent Cascade Weili Wu Ding-Zhu Du University of Texas at Dallas.
On Bharathi-Kempe-Salek Conjecture about Influence Maximization Ding-Zhu Du University of Texas at Dallas.
Manuel Gomez Rodriguez Bernhard Schölkopf I NFLUENCE M AXIMIZATION IN C ONTINUOUS T IME D IFFUSION N ETWORKS , ICML ‘12.
Exact Inference in Bayes Nets. Notation U: set of nodes in a graph X i : random variable associated with node i π i : parents of node i Joint probability:
Miniconference on the Mathematics of Computation
1 How to burn a graph Anthony Bonato Ryerson University GRASCan 2015.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
1 1 MPI for Intelligent Systems 2 Stanford University Manuel Gomez Rodriguez 1,2 Bernhard Schölkopf 1 S UBMODULAR I NFERENCE OF D IFFUSION NETWORKS FROM.
Instructor: Shengyu Zhang 1. Location change for the final 2 classes Nov 17: YIA 404 (Yasumoto International Academic Park 康本國際學術園 ) Nov 24: No class.
1 Structure Learning (The Good), The Bad, The Ugly Inference Graphical Models – Carlos Guestrin Carnegie Mellon University October 13 th, 2008 Readings:
1 1 Stanford University 2 MPI for Biological Cybernetics 3 California Institute of Technology Inferring Networks of Diffusion and Influence Manuel Gomez.
Biao Wang 1, Ge Chen 1, Luoyi Fu 1, Li Song 1, Xinbing Wang 1, Xue Liu 2 1 Shanghai Jiao Tong University 2 McGill University
Inferring Networks of Diffusion and Influence
Wenyu Zhang From Social Network Group
Nanyang Technological University
Independent Cascade Model and Linear Threshold Model
Greedy & Heuristic algorithms in Influence Maximization
New Characterizations in Turnstile Streams with Applications
Influence Maximization
Distributed Submodular Maximization in Massive Datasets
Friend Recommendation with a Target User in Social Networking Services
Independent Cascade Model and Linear Threshold Model
Influence Maximization
Maximizing the Spread of Influence through a Social Network
The Importance of Communities for Learning to Influence
Miniconference on the Mathematics of Computation
Online Social Networks and Media
Lecture 6: Counting triangles Dynamic graphs & sampling
Influence Maximization
Viral Marketing over Social Networks
Discovering Influential Nodes From Social Trust Network
Independent Cascade Model and Linear Threshold Model
Lecture 2-6 Complexity for Computing Influence Spread
Presentation transcript:

Guest lecture II: Amos Fiat’s Social Networks class Edith Cohen TAU, December 2014

Today Diffusion of information/contagion in networks: Applications:  Influence queries  Influence maximization  Influence similarity Reachability-based diffusion: Models & Scalable computation  Basic reachability  IC model  Set of instances

Diffusion in Networks Contagion, information, news, opinions, … spread over the network. When two nodes are connected, infection can pass from one to the other.

Diffusion in Networks Model of how information/infection spreads

Challenges  Modeling: Formulate a model that captures what we want  Scalability: Very efficient computation of many queries on very large networks

Modeling Diffusion

Simplest Model: Reachability “You infect everyone you can reach”

Simplest Model: Reachability “You infect everyone you can reach” Submodular and monotone !

Scalability: Node sketches

Reachability diffusion model: Issues “You infect everyone you can reach”  Intuition that contagion is probabilistic in nature Reachability does not capture:

Reachability diffusion model: Issues “You infect everyone you can reach”  Asymmetry: Distinguish strong or weak connections. Even if network is undirected, influence is not (may depend, say, on how many friends you have) Reachability does not capture: Strong tie weak tie

Reachability diffusion model: Issues “You infect everyone you can reach”  Asymmetry: Distinguish strong or weak connections. Even if network is undirected, influence is not (may depend, say, on how many friends you have) Reachability does not capture: More influencial Less influencial

Reachability diffusion model: Issues “You infect everyone you can reach”  Not robust: Can be very sensitive to presence or deletions of one or few (weak) edges Reachability does not capture:

Reachability diffusion model: Issues “You infect everyone you can reach”  Infection probability should decrease with path length and increase with path multiplicity. Reachability does not capture:

Reachability diffusion model: Issues “You infect everyone you can reach”  Intuition that contagion is probabilistic in nature  Asymmetry: Distinguish strong or weak connections. Even if network is undirected, influence is not (may depend, say, on how many friends you have)  Not robust: Can be very sensitive to presence or deletions of one or few (weak) edges  Infection probability should decrease with path length and increase with path multiplicity. Reachability does not capture:

Independent Cascade (IC) diffusion model [Kempe, Kleinberg, Tardos 2003]

Independent Cascade (IC)  Intuition that contagion is probabilistic in nature  Asymmetry: Distinguish strong or weak connections. Even if network is undirected, influence is not (may depend, say, on how many friends you have)  Not robust: Can be very sensitive to presence or deletions of one or few (weak) edges  Infection probability should decrease with path length and increase with path multiplicity. IC model does capture:

Independent Cascade (IC)  Asymmetry: Distinguish strong or weak connections. Even if network is undirected, influence is not (may depend, say, on how many friends you have) More influencial Less influencial

Independent Cascade (IC)  Infection probability should decrease with path length and increase with path multiplicity.

Scalability: Sketches for an IC model

Sketches for a fixed set of instances  We first consider a fixed (arbitrary) set of instances (edge sets): Influence is the average (or sum) of reachable set sizes, over instances. Motivation:  When the instances come from “enough” Monte Carlo simulations of an IC model, the sketches capture the model.  Capture “median” behavior of IC model  Can capture relations beyond IC model (edges not independent)

Fixed set of instances

Sketches for a fixed set of instances Approach I [CWY KDD 2009]

Combined reachability sketches

Sketches for an IC model

IC model sketching

Influence Maximization We can consider influence maximization:  On a single instance (“static” graph)  A set of instances  An IC model Single instance captures the basic scalability challenges

Influence Maximization  Bad news: Problem is NP-hard even for a single instance (one “static” graph) Elements Sets Reduction to max/set cover:

Influence Maximization  Good news: Monotone and submodular

Greedy Influence Maximization  Greedy generates a sequence of nodes  The approximation guarantee is for each prefix

Greedy Sequence 1 2 3

Scalability Greedy does not scale well even on a single “static” graph – We can not afford much more than linear time on very large networks  In each step we need to determine the node with maximum marginal gain.  Exact computation of the cardinality for each node is costly (search from each node)

Scalability

SkIM: Sketch Based Influence Maximization [CDPW CIKM 2014] We show SkIM for one instance (similar for multiple instances)

SkIM: Sketch Based Influence Maximization [CDPW CIKM 2014]

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch

Sampled Sketch size Inverted sketch 3 0 Residual problem 1 1 1

SkIM correctness

SkIM running time (1 instance)

SkIM: Sketch Based Influence Maximization [CDPW CIKM 2014]

Engineering SkIM

…Engineering SkIM

SkIM on multiple instances

SkIM: Sketch Based Influence Maximization [CDPW CIKM 2014]

[CDPW 2014] data sets from SNAP

Use of reachability sketches for influence:  Chen, Wang, Young. Efficient Influence Maximization in Social Networks. KDD 2009 Combined reachability sketches and scalable influence maximization:  Cohen, Delling, Pajor, Werneck. Sketch-based Influence Maximization and Computation: Scaling up with Guarantees. CIKM 2014  IC model: Kempe, Kleinberg, Tardos “Maximizing the spread of influence through a social networks” KDD 2003 Greedy algorithm for monotone submodular functions:  Nemhauser, Wolsey, Fisher. “An analysis of the approximations of maximizing submodular set functions” 1978 Bibliography: Reachability-based diffusion in networks  Reachability sketches: E. Cohen “Size-Estimation Framework with Applications to Transitive Closure and Reachability” JCSS 1997  KDD 2012 tutorial: Castillo, Chen, Lakshmanan “information and influence spread in social networks” us/people/weic/kdd12tutorial_inf.aspxhttp://research.microsoft.com/en- us/people/weic/kdd12tutorial_inf.aspx  There is a huge literature on scalable IM implementations (without guarantees…)

M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. Uncovering the temporal dynamics of diffusion networks. In ICML, Enhanced model and scalable algorithms:  Cohen, Delling, Pajor, Werneck. Timed-influence: Computation and Maximization. N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. Scalable influence estimation in continuous-time diffusion networks. In NIPS All-Distances Sketches:  E. Cohen “Size-Estimation Framework with Applications to Transitive Closure and Reachability” JCSS 1997  All-Distances skethces, revisited. PODS Further Modelling flexibility: “timed” influence Distance-based diffusion in networks