Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Influence Estimation and Maximization in Continuous-Time Diffusion Networks

Published: 08 February 2016 Publication History

Abstract

If a piece of information is released from a set of media sites, can it spread, in 1 month, to a million web pages? Can we efficiently find a small set of media sites among millions that can maximize the spread of the information, in 1 month? The two problems are called influence estimation and maximization problems respectively, which are very challenging since both the time-sensitive nature of the problems and the issue of scalability need to be addressed simultaneously. In this article, we propose two algorithms for influence estimation in continuous-time diffusion networks. The first one uses continuous-time Markov chains to estimate influence exactly on networks with exponential, or, more generally, phase-type transmission functions, but does not scale to large-scale networks, and the second one is a highly efficient randomized algorithm, which estimates the influence of every node in a network with general transmission functions, |ν| nodes and |ε| edges to an accuracy of ϵ using n = O(1/ϵ2) randomizations and up to logarithmic factors O(n|ε|+n|ν| computations. We then show that finding the set of most influential source nodes in a continuous time diffusion network is an NP-hard problem and develop an efficient greedy algorithm with provable near-optimal performance. When used as subroutines in the influence maximization algorithm, the exact influence estimation algorithm is guaranteed to find a set of C nodes with an influence of at least (1 − 1/e)OPT and the randomized algorithm is guaranteed to find a set with an influence of at least 1 − 1/e)OPT − 2Cε, where OPT is the optimal value. Experiments on both synthetic and real-world data show that the proposed algorithms significantly improve over previous state-of-the-art methods in terms of the accuracy of the estimated influence and the quality of the selected nodes to maximize the influence, and the randomized algorithm can easily scale up to networks of millions of nodes.

References

[1]
S. Asmussen and O. Nerman. 1996. Fitting phase-type distributions via the EM algorithm. Scandinavian Journal of Statistics 23, 4 (1996), 419--441.
[2]
N. Barbieri, F. Bonchi, and G. Manco. 2013. Topic-aware social influence propagation models. Knowledge and Information Systems 37, 3 (2013), 555--584.
[3]
S. Bharathi, D. Kempe, and M. Salek. 2007. Competitive influence maximization in social networks. Internet and Network Economics (2007), 306--311.
[4]
C. Budak, D. Agrawal, and A. El Abbadi. 2011. Limiting the spread of misinformation in social networks. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining.
[5]
T. Carnes, C. Nagarajan, S. M. Wild, and A. van Zuylen. 2007. Maximizing influence in a competitive social network: A follower’s perspective. In Proceedings of the 9th International Conference on Electronic Commerce. ACM, 351--360.
[6]
W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, and Y. Yuan. 2011. Influence maximization in social networks when negative opinions may emerge and propagate. In Proceedings of the SIAM Conference on Data Mining. 379--390.
[7]
W. Chen, W. Lu, and N. Zhang. 2012. Time-critical influence maximization in social networks with time-delayed diffusion process. In Proceedings of the 26th AAAI Conference on Artificial Intelligence.
[8]
W. Chen, C. Wang, and Y. Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1029--1038.
[9]
W. Chen, Y. Wang, and S. Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 199--208.
[10]
A. Clauset, C. Moore, and M. E. J. Newman. 2008. Hierarchical structure and the prediction of missing links in networks. Nature 453, 7191 (2008), 98--101.
[11]
E. Cohen. 1997. Size-estimation framework with applications to transitive closure and reachability. Journal of Computer System Science 55, 3 (1997), 441--453.
[12]
E. Cohen, D. Delling, T. Pajor, and R. F. Werneck. 2014. Timed influence: Computation and maximization. arXiv Preprint arXiv:1410.6976 (2014).
[13]
N. Du, L. Song, M. Gomez-Rodriguez, and H. Zha. 2013. Scalable influence estimation in continuous-time diffusion networks. In Neural Information Processing Systems (NIPS).
[14]
N. Du, L. Song, A. Smola, and M. Yuan. 2012. Learning networks of heterogeneous influence. In Advances in Neural Information Processing Systems.
[15]
N. Du, L. Song, H. Woo, and H. Zha. 2013. Uncover topic-sensitive information diffusion networks. In Proceedings of the 16th International Conference on Artificial Intelligence and Statistics (AISTATS).
[16]
P. Erdős and A. Rényi. 1960. On the evolution of random graphs. Publication of the Mathematical Institute of the Hungarian Academy of Science 5 (1960), 17--67.
[17]
L. Georgiadis, R. F. Werneck, R. E. Tarjan, S. Triantafyllis, and D. I. August. 2006. Finding dominators in practice. Journal of Graph Algorithms and Applications 10, 1 (2006), 69--94.
[18]
M. Gomez-Rodriguez, D. Balduzzi, and B. Schölkopf. 2011. Uncovering the temporal dynamics of diffusion networks. In Proceedings of the 28th International Conference on Machine Learning.
[19]
M. Gomez-Rodriguez, J. Leskovec, D. Balduzzi, and B. Schölkopf. 2013c. Uncovering the structure and temporal dynamics of information propagation. Network Science (2013).
[20]
M. Gomez-Rodriguez, J. Leskovec, and A. Krause. 2010. Inferring networks of diffusion and influence. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. 1019--1028.
[21]
M. Gomez-Rodriguez, J. Leskovec, and B. Schölkopf. 2013a. Modeling information propagation with survival theory. In Proceedings of the 30th International Conference on Machine Learning (ICML).
[22]
M. Gomez-Rodriguez, J. Leskovec, and B. Schölkopf. 2013b. Structure and dynamics of information pathways in on-line media. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining.
[23]
M. Gomez-Rodriguez and B. Schölkopf. 2012a. Influence maximization in continuous time diffusion networks. In Proceedings of the 29th International Conference on Machine Learning.
[24]
M. Gomez-Rodriguez and B. Schölkopf. 2012b. Submodular inference of diffusion networks from multiple trees. In Proceedings of the 29th International Conference on Machine Learning.
[25]
A. Goyal, F. Bonchi, L. V. S. Lakshmanan, and S. Venkatasubramanian. 2013. On minimizing budget and time in influence propagation over social networks. Social Network Analysis and Mining 3, 2 (2013), 179--192.
[26]
A. Horvath and M. Telek. 2000. Approximating heavy tailed behaviour with phase type distributions. In Proceedings of 3rd International Conference on Matrix-Analytic Methods in Stochastic models.
[27]
D. Ienco, F. Bonchi, and C. Castillo. 2010. The meme ranking problem: Maximizing microblogging virality. In ICDM Workshops. 328--335.
[28]
M. T. Irfan and L. E. Ortiz. 2011. A game-theoretic approach to influence in networks. In Proceedings of the 25th Conference on Artificial Intelligence (AAAI).
[29]
T. Iwata, A. Shah, and Z. Ghahramani. 2013. Discovering latent influence in online social activities via shared cascade poisson processes. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 266--274.
[30]
R. M. Karp. 1972. Reducibility among combinatorial problems. In Proceedings of a Symposium on the Complexity of Computer Computations. Plenum Press, New York, 85--103.
[31]
D. Kempe, J. M. Kleinberg, and É. Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 137--146.
[32]
M. Kimura and K. Saito. 2006. Tractable models for information diffusion in social networks. In Proceedings of the 10th European Conference on Principles and Practice of Knowledge Discovery in Databases (PKDD).
[33]
A. Krause. 2008. Optimizing Sensing: Theory and Applications. Ph.D. Thesis. CMU.
[34]
V. G. Kulkarni. 1986. Shortest paths in networks with exponentially distributed arc lengths. Networks 16, 3 (1986), 255--274.
[35]
T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila. 2010. Finding effectors in social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1059--1068.
[36]
J. F. Lawless. 1982. Statistical Models and Methods for Lifetime Data. Wiley New York.
[37]
J. Leskovec, L. A. Adamic, and B. A. Huberman. 2006. The dynamics of viral marketing. In Proceedings of the 7th ACM Conference on Electronic Commerce. 228--237.
[38]
J. Leskovec, L. Backstrom, and J. Kleinberg. 2009. Meme-tracking and the dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining. 497--506.
[39]
J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. 2010. Kronecker graphs: An approach to modeling networks. The Journal of Machine Learning Research 11 (2010), 985--1042.
[40]
J. Leskovec, J. Kleinberg, and C. Faloutsos. 2007a. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD) 1, 1 (2007), 1--41.
[41]
J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. 2007b. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 420--429.
[42]
J. Leskovec, K. J. Lang, A. Dasgupta, and M. W. Mahoney. 2008. Statistical properties of community structure in large social and information networks. In Proceedings of the 17th International Conference on World Wide Web.
[43]
B. Liu, G. Cong, D. Xu, and Y. Zeng. 2012. Time constrained influence maximization in social networks. In Proceedings of the IEEE 12th International Conference on Data Mining (ICDM).
[44]
M. Minoux. 1978. Accelerated greedy algorithms for maximizing submodular set functions. In Proceedings of the 8th IFIP Conference on Optimization Techniques. 234--243.
[45]
G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. 1978. An analysis of approximations for maximizing submodular set functions. Mathematical Programming 14, 1 (1978), 265--294.
[46]
P. Netrapalli and S. Sanghavi. 2012. Finding the graph of epidemic cascades. In Proceedings of the 12th ACM SIGMETRICS/Performance.
[47]
J. S. Provan and M. O. Ball. 1984. Computing network reliability in time polynomial in the number of cuts. Operations Research 32, 3 (1984), 516--526.
[48]
J. S. Provan and D. R. Shier. 1996. A paradigm for listing (s, t)-cuts in graphs. Algorithmica 15, 4 (1996), 351--372.
[49]
M. Richardson and P. Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 70.
[50]
K. Saito, M. Kimura, K. Ohara, and H. Motoda. 2010. Selecting information diffusion models over social networks for behavioral analysis. In Proceedings of the European conference on Machine Learning and knowledge Discovery in Databases (PKDD).
[51]
R. B. Sidje. 1998. Expokit: A software package for computing matrix exponentials. ACM Trans. Math. Software 24, 1 (1998), 130--156.
[52]
Y. Singer. 2012. How to win friends and influence people, truthfully: Influence maximization mechanisms for social networks. In Proceedings of the 5th ACM International Conference on Web Search and Data Mining (WSDM).
[53]
Y. Tang, Y. Shi, and X. Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data.
[54]
J. Wallinga and P. Teunis. 2004. Different epidemic curves for severe acute respiratory syndrome reveal similar impacts of control measures. American Journal of Epidemiology 160, 6 (2004), 509--516.
[55]
V. Wolf. 2008. Equivalences on Phase-Type Processes. Ph.D. Dissertation. University of Mannheim.

Cited By

View all
  • (2024)Scalable Continuous-time Diffusion Framework for Network Inference and Influence EstimationProceedings of the ACM Web Conference 202410.1145/3589334.3645652(2660-2671)Online publication date: 13-May-2024
  • (2024)Influence maximization on hypergraphs via multi-hop influence estimationInformation Processing & Management10.1016/j.ipm.2024.10368361:3(103683)Online publication date: May-2024
  • (2023)Influence Propagation Based Influencer Detection in Online ForumIEICE Transactions on Information and Systems10.1587/transinf.2022IIP0010E106.D:4(433-442)Online publication date: 1-Apr-2023
  • Show More Cited By

Index Terms

  1. Influence Estimation and Maximization in Continuous-Time Diffusion Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Transactions on Information Systems
      ACM Transactions on Information Systems  Volume 34, Issue 2
      April 2016
      220 pages
      ISSN:1046-8188
      EISSN:1558-2868
      DOI:10.1145/2891107
      Issue’s Table of Contents
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 08 February 2016
      Accepted: 01 September 2015
      Revised: 01 September 2015
      Received: 01 June 2014
      Published in TOIS Volume 34, Issue 2

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Networks of diffusion
      2. influence estimation
      3. influence maximization
      4. social networks

      Qualifiers

      • Research-article
      • Research
      • Refereed

      Funding Sources

      • International Conference on Machine Learning (ICML)
      • Neural Information Processing Systems (NIPS)

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)36
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 16 Nov 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Scalable Continuous-time Diffusion Framework for Network Inference and Influence EstimationProceedings of the ACM Web Conference 202410.1145/3589334.3645652(2660-2671)Online publication date: 13-May-2024
      • (2024)Influence maximization on hypergraphs via multi-hop influence estimationInformation Processing & Management10.1016/j.ipm.2024.10368361:3(103683)Online publication date: May-2024
      • (2023)Influence Propagation Based Influencer Detection in Online ForumIEICE Transactions on Information and Systems10.1587/transinf.2022IIP0010E106.D:4(433-442)Online publication date: 1-Apr-2023
      • (2023)Efficiently Counting Triangles for Hypergraph Streams by Reservoir-Based SamplingIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2023.323633535:11(11328-11341)Online publication date: 1-Nov-2023
      • (2023)Positive Influence Maximization in Signed Networks Within a Limited TimeIEEE Transactions on Computational Social Systems10.1109/TCSS.2022.319241010:5(2624-2635)Online publication date: Oct-2023
      • (2023)Discovering Influencers in Opinion Formation Over Social GraphsIEEE Open Journal of Signal Processing10.1109/OJSP.2023.32611324(188-207)Online publication date: 2023
      • (2023)Identifying Opinion Influencers over Social NetworksICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)10.1109/ICASSP49357.2023.10094722(1-5)Online publication date: 4-Jun-2023
      • (2023)BibliographyData Mining10.1016/B978-0-12-811760-6.00024-2(681-734)Online publication date: 2023
      • (2023)Data mining trends and research frontiersData Mining10.1016/B978-0-12-811760-6.00022-9(605-654)Online publication date: 2023
      • (2023)Synthesizing Knowledge through A Data Analytics-Based Systematic Literature Review ProtocolInformation Systems Frontiers10.1007/s10796-023-10432-3Online publication date: 9-Oct-2023
      • Show More Cited By

      View Options

      Login options

      Full Access

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media