Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Using Generalized Annotated Programs to Solve Social Network Diffusion Optimization Problems

Published: 01 June 2013 Publication History

Abstract

There has been extensive work in many different fields on how phenomena of interest (e.g., diseases, innovation, product adoption) “diffuse” through a social network. As social networks increasingly become a fabric of society, there is a need to make “optimal” decisions with respect to an observed model of diffusion. For example, in epidemiology, officials want to find a set of k individuals in a social network which, if treated, would minimize spread of a disease. In marketing, campaign managers try to identify a set of k customers that, if given a free sample, would generate maximal “buzz” about the product. In this article, we first show that the well-known Generalized Annotated Program (GAP) paradigm can be used to express many existing diffusion models. We then define a class of problems called Social Network Diffusion Optimization Problems (SNDOPs). SNDOPs have four parts: (i) a diffusion model expressed as a GAP, (ii) an objective function we want to optimize with respect to a given diffusion model, (iii) an integer k > 0 describing resources (e.g., medication) that can be placed at nodes, (iv) a logical condition VC that governs which nodes can have a resource (e.g., only children above the age of 5 can be treated with a given medication). We study the computational complexity of SNDOPs and show both NP-completeness results as well as results on complexity of approximation. We then develop an exact and a heuristic algorithm to solve a large class of SNDOPproblems and show that our GREEDY-SNDOPs algorithm achieves the best possible approximation ratio that a polynomial algorithm can achieve (unless P = NP). We conclude with a prototype experimental implementation to solve SNDOPs that looks at a real-world Wikipedia dataset consisting of over 103,000 edges.

Supplementary Material

PDF File (a10-shakarian_appendix.pdf)
The proof is given in an electronic appendix, available online in the ACM Digital Library.

References

[1]
Anderson, R. M. and May, R. M. 1979. Population biology of infectious diseases: Part i. Nature 280, 5721, 361.
[2]
Apt, K. 2003. Principles of Constraint Programming. Cambridge University Press.
[3]
Aral, S., Muchnik, L., and Sundararajan, A. 2009. Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proc. Nat. Acad. Sci. U.S.A 106, 51, 21544--21549.
[4]
Backstrom, L., Huttenlocher, D. P., Kleinberg, J. M., and Lan, X. 2006. Group formation in large social networks: Membership, growth, and evolution. In Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 44--54.
[5]
Bonissone, P. 1987. Summarizing and propagating uncertain information with triangular norms. Int. J. Approx. Reason. 1, 1, 71--101.
[6]
Borgatti, S. and Everett, M. 2006. A graph-theoretic perspective on centrality. Social Netw. 28, 4, 466--484.
[7]
Broecheler, M., Shakarian, P., and Subrahmanian, V. 2010. A scalable framework for modeling competitive diffusion in social networks. In Proceedings of the International Conference on Social Computing, 295--302.
[8]
Centola, D. 2010. The spread ofbehavior in an online social network experiment. Science 329, 5996, 1194--1197.
[9]
Centola, D. 2011. An experimental study of homophily in the adoption of health behavior. Science 334, 6060, 1269--72.
[10]
Cha, M., Mislove, A., Adams, B., and Gummadi, K. P. 2008. Characterizing social cascades in flickr. In Proceedings of the 1st Workshop on Online Social Networks (WOSP’08). ACM, New York, NY, 13--18.
[11]
Cha, M., Mislove, A., and Gummadi, K. P. 2009. A Measurement-driven Analysis of Information Propagation in the Flickr Social Network. In Proceedings of the 18th International World Wide Web Conference (WWW’09).
[12]
Chen, N. 2009. On the approximability of influence in social networks. SIAM J. Discrete Math. 23, 1400--1415.
[13]
Chen, W., Wang, C., and Wang, Y. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD’10). ACM, New York, 1029--1038.
[14]
Chiang, C.-Y., Huang, L.-H., Li, B.-J., Wu, J., and Yeh, H.-G. 2011. Some results on the target set selection problem. CoRR abs/1111.6685.
[15]
Coelho, F., Codeco, C., and Cruz, H. 2008. Epigrass: A tool to study disease spread in complex networks. Source Code Biol. Med. 3, 3.
[16]
Cowan, R. and Jonard, N. 2004. Network structure and the diffusion of knowledge. J. Econ. Dynamics Control 28, 8, 1557--1575.
[17]
Damasio, C., Pereira, L., and Swift, T. 1999. Coherent well-founded annotated logic programs. In Proceedings of the International Coriference on Logic Programming and Non-Monotonic Reasoning. Lecture Notes in Computer Science, vol. 1730, Springer. 262--276.
[18]
Dekhtyar, A. and Subrahmanian, V. S. 2000. Hybrid probabilistic programs. J. Logic Program. 43, 3, 187--250.
[19]
Dekhtyar, M. I., Dekhtyar, A., and Subrahmanian, V. S. 1999. Hybrid probabilistic programs: Algorithms and complexity. In Proceedings of the Conference on Uncertainty in Artificial Intelligence. 160--169.
[20]
Dreyer, P. and Roberts, F. 2009. Irreversible -threshold processes: Graph-theoretical threshold models of the spread of disease and of opinion. Discrete Appl. Math. 157, 7, 1615--1627.
[21]
Dubois, D. and Prade, H. 1990. Resolution principles in possibilistic logic. Int. J. Approx. Reason. 4, 1, 1--21.
[22]
Dubois, D., Lang, J., and Prade, H. 1991. A brief overview of possibilistic logic. In Proceedings of the European Conference on Symbolic and Quantifative Approaches to Reasoning with Uncertainty. 53--57.
[23]
Eagle, N., Pentland, A., and Lazer, D. 2008. Mobile phone data for inferring social network structure. In Proceedings of the International Conference on Social and Behavioral Computing. Springer Verlag, 79--88.
[24]
Eiter, T. and Gottlob, G. 1995. The complexity of logic-based abduction. J. ACM 42, 1, 3--42.
[25]
Eiter, T., Lu, J., and Subrahmanian, V. 1997. Computing non-ground representations of stable models. In Proceedings of the International Conferente on Logic Programming and Non-Monotonic Reasoning. Lecture Notes in Computer Science, vol. 1265, Springer, 198--217.
[26]
Falaschi, M., Levi, G., Martelli, M., and Palamidessi, C. 1988. A new declarative semantics for logic languages. In Proceedings of the 5th Internationa1 Conference and Symposium on Logic Programming. 993--1005.
[27]
Feige, U. 1998. A threshold of ln n for approximating set cover. J. ACM 45, 4, 634--652.
[28]
Frühwirth, T. 1994. Annotated constraint logic programming applied to temporal reasoning. In Proceedings of the 6th International Symposium on Programming Language Implementation and Logic Programming. Springer.
[29]
Garey, M. R. and Johnson, D. S. 1979. Computers and Intractability; A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York, NY, USA.
[30]
Gottlob, G., Marcus, S., Nerode, A., Salzer, G., and Subrahmanian, V. S. 1996. A non-ground realization of the stable and well-founded semantics. Theor. Comput. Sci. 166, 1-2, 221--262.
[31]
Granovetter, M. 1978. Threshold models of collective behavior. Amer. J. Sociol. 83, 6, 1420--1443.
[32]
Hethcote, H. W. 1976. Qualitative analyses of communicable disease models. Math. Biosci. 28, 3--4, 335--356.
[33]
Hommersom, A. and Lucas, P. J. F. 2011. Generalising the interaction rules in probabilistic logic. In Proceedings of the International Joint Conference on Artificial Intelligence. 912--917.
[34]
Jackson, M. and Yariv, L. 2005. Diffusion on social networks. In Economie Publique, vol. 16. 69--82.
[35]
Kempe, D., Kleinberg, J., and Tardos, E. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’03). ACM, New York, 137--146.
[36]
Kern-Isberner, G. and Lukasiewicz, T. 2004. Combining probabilistic logic programming with the power of maximum entropy. Artif. Intell. 157, 1-2, 139--202.
[37]
Khuller, S., Martinez, M. V., Nau, D. S., Sliva, A., Simari, G. I., and Subrahmanian, V. S. 2007. Computing most probable worlds of action probabilistic logic programs: Scalable estimation for 10 30,000 worlds. Ann. Math. Artif. Intell. 51, 2-4, 295--331.
[38]
Kifer, M. and Lozinskii, E. L. 1992. A logic for reasoning with inconsistency. J. Autom. Reason. 9, 2, 179--215.
[39]
Kifer, M. and Subrahmanian, V. 1992. Theory of generalized annotated logic programming and its applications. J. Logic Program. 12, 3&4, 335--367.
[40]
Kleinberg, J. 2008. The convergence of social and technological networks. Comm. ACM 51, 11, 66--72.
[41]
Kozen, D. 1991. The Design and Analysis of Algorithms. Springer.
[42]
Krajci, S., Lencses, R., and Vojts, P. 2004. A comparison of fuzzy and annotated logic programming. Fuzzy Sets Syst. 144, 1, 173 -- 192.
[43]
Leone, N., Scarcello, F., and Subrahmanian, V. 2004. Optimal models of disjunctive logic programs: Semantics, complexity, and computation. IEEE Trans. Knowl. Data Eng. 16, 487--503.
[44]
Leskovec, J., Adamic, L. A., and Huberman, B. A. 2007a. The dynamics of viral marketing. ACM Trans. Web 1, 1.
[45]
Leskovec, J., Huttenlocher, D., and Kleinberg, J. 2010. Predicting positive and negative links in online social networks. In Proceedings of the 19th international conference on World Wide Web (WWW’10). ACM, New York, 641--650.
[46]
Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., and Glance, N. 2007b. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD’07). ACM, 420--429.
[47]
Lloyd, J. W. 1987. Foundations of logic Programming. Springer.
[48]
Lu, J. 1996. Logic programs with signs and annotations. J. Logic Comput. 6, 6, 755--778.
[49]
Lu, J., Murray, N., and Rosenthal, E. 1993. Signed formulas and annotated logics. In Proceedings of the 23rd International Symposium on Multiple-Valued Logic. 48--53.
[50]
Lukasiewicz, T. 1998. Probabilistic logic programming. In Proceedings of the European Conference on Artificial Intelligence (ECAI’98). 388--392.
[51]
Mancarella, P., Raffaetà, A., and Turini, F. 1999. Temporal annotated constraint logic programming with multiple theories. In Proceedings of the 10th International Workshop on Database and Expert Systems Applications (DEXA’99).
[52]
Mossel, E. and Roch, S. 2007. On the submodularity of influence in social networks. In Proceedings of the Armual ACM Symposium on Theory of Computing (STOC’07). ACM, New York, 128--134.
[53]
Nemhauser, G. L., Wolsey, L. A., and Fisher, M. 1978. An analysis of approximations for maximizing submodular set functions -- I. Math. Program. 14, 1, 265--294.
[54]
Ng, R. T. and Subrahmanian, V. S. 1992. Probabilistic logic programming. Inf. Comput. 101, 2, 150--201.
[55]
Ng, R. T. and Subrahmanian, V. S. 1993. A semantical framework for supporting subjective and conditional probabilities in deductive databases. J. Autom. Reason. 10, 2, 191--235.
[56]
Poole, D. 2008. The independent choice logic and beyond. In Probabilistic Inductive Logic Programming. 222--243.
[57]
Raedt, L. D., Kimmig, A., and Toivonen, H. 2007. Problog: A probabilistic prolog and its application in link discovery. In Proceedings of the International Joint Coriference on Artificial Intelligence. 2462--2467.
[58]
Roth, D. 1996. On the hardness of approximate reasoning. Artif. Intell. 82, 273--302.
[59]
Rychtář, J. and Stadler, B. 2008. Evolutionary dynamics on small-world networks. Int. J. Comput. Math. Sci. 2, 1.
[60]
Sato, T. 1995. A statistical learning method for logic programs with distribution semantics. In Proceedings of the International Coriference on Logic Programming. 715--729.
[61]
Schelling, T. C. 1978. Micromotives and Macrobehavior. W.W. Norton and Co.
[62]
Shakarian, P., Subrahmanian, V., and Sapino, M. L. 2010. Using generalized annotated programs to solve social network optimization problems. In Technical Communications of the 26th International Conference on Logic Programming. M. Hermenegildo and T. Schaub Eds., Leibniz International Proceedings in Informatics (LIPIcs) Series, vol. 7. Schloss Dagstuhl--Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 182--191.
[63]
Sneyers, J., Meert, W., Vennekens, J., Kameya, Y., and Sato, T. 2010. Chr(prism)-based probabilistic logic learning. J. Theory Pract. Logic Program. 10, 4--6, 433--447.
[64]
Stroe, B. and Subrahmanian, V. S. 2003. First order heterogeneous agent computations. In Proceedings of the 2nd International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS’03). ACM, New York, NY, USA, 217--224.
[65]
Subrahmanian, V. 1988. Generalized triangular norm and co-norm based semantics for quantitate rule set logic programming. Logic Programming Resbarch Group Tech. rep. LPRG-TR- 88-22, Syracuse University.
[66]
Subrahmanian, V. S. and Recupero, D. R. 2008. AVA: Adjective-verb-adverb combinations for sentiment analysis. IEEE Intell. Syst. 23, 4, 43.
[67]
Sun, E., Rosenn, I., Marlow, C., and Lento, T. 2009. Gesundheit! Modeling contagion through facebook news feed. In Proceedings of the 3rd International Conference on Weblogs and Social Media. AAAI Press, San Jose, CA.
[68]
Swift, T. 1999. Tabling for non-monotonic programming. Ann. Math. Artif. Intell. 25, 3-4, 201--240.
[69]
Swift, T. and Warren, D. S. 2010. Tabling with answer subsumption: Implementation, applications and performance. In Proceedings of the European Conference on Logics in Artificial Intelligence. 300--312.
[70]
Thirunarayan, K. and Kifer, M. 1993. A theory of nonmonotonic inheritance based on annotated logic. Artif. Intell. 60, 1, 23--50.
[71]
Van Hentenryck, P. 2009. Constraint logic programming. Knowl. Engin. Rev. 6, 03, 151--194.
[72]
Vennekens, J., Verbaeten, S., and Bruynooghe, M. 2004. Logic programs with annotated disjunctions. In Proceedings of the International Conference on Logic Programming. Lecture Notes in Computer Science, vol. 3132, Springer 431--445.
[73]
Watts, D. and Peretti, J. 2007. Viral marketing for the real world. Harvard Bus. Rev..
[74]
Watts, D. J. 1999. Networks, dynamics, and the small-world phenomenon. Amer. J. Sociol. 105, 2, 493--527.
[75]
Zhang, L., M. P. 2011. Two is a crowd: Optimal trend adoption in social networks. In Proceedings of International Conference on Game Theory for Networks.

Cited By

View all
  • (2021)Local Belief Dynamics in Network Knowledge BasesACM Transactions on Computational Logic10.1145/347739423:1(1-36)Online publication date: 22-Oct-2021
  • (2020)Multi-objective optimization model in a heterogeneous weighted network through key nodes identification in overlapping communitiesComputers & Industrial Engineering10.1016/j.cie.2020.106413144(106413)Online publication date: Jun-2020
  • (2019)Maximizing the Spread of an Opinion when Tertium Datur EstProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331823(1207-1215)Online publication date: 8-May-2019
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Computational Logic
ACM Transactions on Computational Logic  Volume 14, Issue 2
June 2013
366 pages
ISSN:1529-3785
EISSN:1557-945X
DOI:10.1145/2480759
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 June 2013
Accepted: 01 June 2012
Revised: 01 June 2012
Received: 01 January 2011
Published in TOCL Volume 14, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Social network
  2. approximation algorithms
  3. generalized annotated programs

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)1
Reflects downloads up to 19 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Local Belief Dynamics in Network Knowledge BasesACM Transactions on Computational Logic10.1145/347739423:1(1-36)Online publication date: 22-Oct-2021
  • (2020)Multi-objective optimization model in a heterogeneous weighted network through key nodes identification in overlapping communitiesComputers & Industrial Engineering10.1016/j.cie.2020.106413144(106413)Online publication date: Jun-2020
  • (2019)Maximizing the Spread of an Opinion when Tertium Datur EstProceedings of the 18th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3306127.3331823(1207-1215)Online publication date: 8-May-2019
  • (2018)Efficient Maintenance of Shortest Distances in Dynamic GraphsIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2017.277223330:3(474-487)Online publication date: 1-Mar-2018
  • (2017)Incremental maintenance of all-pairs shortest paths in relational DBMSsSocial Network Analysis and Mining10.1007/s13278-017-0457-y7:1Online publication date: 1-Aug-2017
  • (2016)Diffusion centralityArtificial Intelligence10.1016/j.artint.2016.06.008239:C(70-96)Online publication date: 1-Oct-2016
  • (2016)ChoiceGAPs: Competitive Diffusion as a Massive Multi-player Game in Social NetworksScalable Uncertainty Management10.1007/978-3-319-45856-4_21(303-319)Online publication date: 30-Aug-2016
  • (2015)Novel Topic Diffusion Prediction using Latent Semantic and User BehaviorProceedings of the ASE BigData & SocialInformatics 201510.1145/2818869.2818877(1-6)Online publication date: 7-Oct-2015
  • (2015)Evolutionary-based Framework for Optimizing the Spread of Information on TwitterProcedia Computer Science10.1016/j.procs.2015.11.03466(287-296)Online publication date: 2015
  • (2015)Logic Programming Based Diffusion ModelsDiffusion in Social Networks10.1007/978-3-319-23105-1_5(49-73)Online publication date: 2015
  • Show More Cited By

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media