Example 3: Viral Marketing and the vaccination policy problem

Similar documents
Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg and Eva Tardos

Influence Maximization in the Independent Cascade Model

Maximizing the Spread of Influence through a Social Network

Extracting Influential Nodes for Information Diffusion on a Social Network

Scalable Influence Maximization in Social Networks under the Linear Threshold Model

Lecture Note: Computation problems in social. network analysis

ECS 289 / MAE 298, Lecture 15 Mar 2, Diffusion, Cascades and Influence, Part II

Viral Marketing and Outbreak Detection. Fang Jin Yao Zhang

arxiv: v1 [cs.si] 12 Jan 2019

An Optimal Allocation Approach to Influence Maximization Problem on Modular Social Network. Tianyu Cao, Xindong Wu, Song Wang, Xiaohua Hu

Information Dissemination in Socially Aware Networks Under the Linear Threshold Model

Example 1: An algorithmic view of the small world phenomenon

Part I Part II Part III Part IV Part V. Influence Maximization

Cascades. Rik Sarkar. Social and Technological Networks. University of Edinburgh, 2018.

Minimizing the Spread of Contamination by Blocking Links in a Network

A visual analytics approach to compare propagation models in social networks

Combining intensification and diversification to maximize the propagation of social influence

Combinatorial Model and Bounds for Target Set Selection

Maximizing Diffusion on Dynamic Social Networks

Data mining --- mining graphs

Efficient Influence Maximization in Social Networks

CS224W Project Write-up Static Crawling on Social Graph Chantat Eksombatchai Norases Vesdapunt Phumchanit Watanaprakornkul

IRIE: Scalable and Robust Influence Maximization in Social Networks

Journal of Engineering Science and Technology Review 7 (3) (2014) Research Article

Impact of Clustering on Epidemics in Random Networks

1 Degree Distributions

Greedy and Local Ratio Algorithms in the MapReduce Model

Utilizing Social Influence in Content Distribution Networks

Influence Maximization in Location-Based Social Networks Ivan Suarez, Sudarshan Seshadri, Patrick Cho CS224W Final Project Report

Graphical Approach for Influence Maximization in Social Networks Under Generic Threshold-based Non-submodular Model

Algorithms and Applications in Social Networks. 2017/2018, Semester B Slava Novgorodov

Characteristics of Preferentially Attached Network Grown from. Small World

Learning Network Graph of SIR Epidemic Cascades Using Minimal Hitting Set based Approach

Limiting Concept Spread in Environments with Interacting Concepts

Game Theoretic Models for Social Network Analysis

Detecting and Analyzing Communities in Social Network Graphs for Targeted Marketing

Comparing the diversity of information by word-of-mouth vs. web spread

L Modeling and Simulating Social Systems with MATLAB

An Empirical Analysis of Communities in Real-World Networks

Centralities (4) By: Ralucca Gera, NPS. Excellence Through Knowledge

arxiv:cs/ v1 [cs.ir] 26 Apr 2002

The Robust Set problem: parameterized complexity and approximation

Jure Leskovec Machine Learning Department Carnegie Mellon University

Cross-Layer Design of Influence Maximization in Mobile Social Networks

Absorbing Random walks Coverage

Sources of Misinformation in Online Social Networks: Who to suspect?

Graph Exploration: Taking the User into the Loop

Pattern Mining. Knowledge Discovery and Data Mining 1. Roman Kern KTI, TU Graz. Roman Kern (KTI, TU Graz) Pattern Mining / 42

Non Overlapping Communities

Models and Algorithms for Network Immunization

CS246: Mining Massive Datasets Jure Leskovec, Stanford University

15 Graph Theory Counting the Number of Relations. 2. onto (surjective).

Modeling Dynamic Behavior in Large Evolving Graphs

Basics of Network Analysis

Sparsification of Social Networks Using Random Walks

Degree Distribution: The case of Citation Networks

1 Unweighted Set Cover

Network Environments in AnyLogic. Nathaniel Osgood Agent-Based Modeling Bootcamp for Health Researchers

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization

Absorbing Random walks Coverage

SOCIAL network analysis research can be broadly classified

Exact Computation of Influence Spread by Binary Decision Diagrams

The Microblogging Evolution Based on User's Popularity

Complex networks: A mixture of power-law and Weibull distributions

arxiv: v1 [cs.si] 7 Aug 2017

Chapter 1, Introduction

On Page Rank. 1 Introduction

Min-Cut and Randomization

Homework 4: Clustering, Recommenders, Dim. Reduction, ML and Graph Mining (due November 19 th, 2014, 2:30pm, in class hard-copy please)

Networks in economics and finance. Lecture 1 - Measuring networks

Searching for influencers in big-data complex networks

Lecture 6: Spectral Graph Theory I

Extracting Information from Complex Networks

On a Network Generalization of the Minmax Theorem

Fractional Cascading in Wireless. Jie Gao Computer Science Department Stony Brook University

Simulating the Diffusion of Information: An Agent-based Modeling Approach

Introduction Types of Social Network Analysis Social Networks in the Online Age Data Mining for Social Network Analysis Applications Conclusion

The Complex Network Phenomena. and Their Origin

TELCOM2125: Network Science and Analysis

Polynomial-Time Approximation Algorithms

A History Sensitive Diffusion Network: Preliminary Model and Simulation

Graph Mining and Social Network Analysis

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

Positive Influence Dominating Set in Online Social Networks

Cascading Behavior in Large Blog Graphs Patterns and a model

The clustering in general is the task of grouping a set of objects in such a way that objects

Epidemic spreading on networks

Modeling and Simulating Social Systems with MATLAB

Predict Topic Trend in Blogosphere

Inferring the Underlying Structure of Information Cascades

L Modeling and Simulating Social Systems with MATLAB

Overlay (and P2P) Networks

Social-Tie-Based Information Dissemination in Mobile Opportunistic Social Networks

The Coral Project: Defending against Large-scale Attacks on the Internet. Chenxi Wang

Scale Free Network Growth By Ranking. Santo Fortunato, Alessandro Flammini, and Filippo Menczer

CS1 Lecture 31 Apr. 3, 2019

Coverage Approximation Algorithms

Link Prediction and Anomoly Detection

Weighted Target Set Selection on Social Networks

Empirical Analysis of the Spread of University Students Amative Behavior

Transcription:

Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 2: Jan 19, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 3: Viral Marketing and the vaccination policy problem Diffusion process on network has been studied for a long time. Here are a few well known examples: Ryan and Gross The diffusion of hybrid seed corn in two Iowa communities [1]. Farmers typically hear about hybrid corn seeds from sales persons, but would usually buy them only because of interpersonal network influence. Therefore they found that mass communication functioned as the source of initial information, while interpersonal networks functioned as the influence over the farmers decisions to adopt. Coleman, Katz, Menzel Adoption of tetracycline by physicians in the U.S [2]. Domingos and Richardson asked the following question: If we can try to convince a subset of individuals to adopt a new product/innovation so as to trigger a cascade of further adoptions, who should we target? [3] Kempe, Kleinberg, Tardos KDD answer to the above question. [4] Kempe, Kleinberg, Tardos suggested an algorithmic Influence Maximization Problem (IMP) Input: Input to the problem is a graph G = (V, E), where V is vertex set of graph and E is edge set of graph and a positive integer K. Output: Output to the problem is a size K subset A V with maximum influence. To make this problem precise, we need a definition of influence. To define what influence means, we need a model for how diffusion occurs. Kempe et. al consider several diffusion models including the Linear Threshold Model and the Independent Cascade Model, etc. Independent Cascade Model. 1. Initially some subset of A V of the vertices are active. The rest are inactive. 2. Diffusion proceeds in discrete steps. 3. When vertex v becomes active ( in a particular time step), it has one chance to activate each neighbor w that is currently inactive. W becomes active due to v with probability P v, k 4. If w is activated in time step t, it has the opportunity to activate neighbors in time step t+1. 1

In time step t=0, A has the opportunity to activate its neighbors. B is activated with some probability via A. D is activated with some probability via A and with some probability via E. F is activated with some probability via A and with some probability via E. 5. The process ends in a time step in which there are no activations. In the next step, t=1 A and E are no longer a factor because they have already activated their respective neighbors. This alghoritm can be applied in a disease spread model (SI model where S stands for susceptible and I for infected). Suppose we choose A V as our set of initiators and start the independent cascade model (ICM). Either path can be taken with some probability. σ(a) = expected number of vertices which get activated if we start ICM with initial set A of active nodes. We want to choose that subset which maximizes σ(a) Kempe, Kleinberg and Tardos (KKT) biggest contribution: For many diffusion models including LTM and ICM σ satisfies very nice property called sub modularity. Note that σ is a set function. i.e. σ assigns a number to each subset A V σ : 2 v Notation for set of all subsets of V. σ(a {X} σ (A) σ (B {X}) σ(b) The above represents diminishing returns (Discrete property of diminishing returns). Consider A, B as arbitrary sets such that B is superset of A. 2

Graph Theoretical Terminology: O: nodes /: edges {D, E}: undirected edges (D, E): directed edges Undirected unweighted graph: Directed weighted graph: 3

Directed weighted Graph: The notions degree distribution and clustering show up a lot in the context of social network. Neighbors of D: A, C, E N(V) : set of neighbors of V Degree (v): size of set of neighbors of v = N(v) The degree of distribution of a graph is the sequence P0, P1, P2,............. PK = fraction of vertices with degree K. P0 = 0/5 P1 = 0/5 P2 = 3/5 P3 = 2/5 Pk = 0? K > 3 If we pick vertex v V uniformly at random from G the probability P rob [ deg (v) : k] = P k. Famous example of a degree distribution is power law degree distribution. Faloutsos, Faloutsos, Faloutsos Paper appeared in the ACM SIGCOMM 1999. The internet graph has power-law degree distribution In the internet graph, the vertices were the routers and the edges were one hop ip connections between pairs of routers The graph was plotted with degree K on X-axis and fraction P k along the Y-axis. The result was as below: 4

Then the scale was changed and the graph was as below. The observation was that the distribution was linear. This means that log P k can be written as a linear function. Log P k = - α. log (k) + c Where α > 0, α, c are arbitrary constants Raising both sides to the power of 10, we get P k = 10 ( α log (k)) 10 c = 10 c K α = C. K αwhere C = 10 c P(K) = C. K α This is the power law distribution. Consider a www graph - directed graph. In www graph if you take the in-degrees separately to out-degrees, the graph satisfies the power law distribution in both cases. Apart from craters on the moon and sizes of the earth quakes, a lots of diverse phenomena satisfy the power law of distribution. People were excited that man-made artifacts also satisfied the power law distribution. This led to a huge explosion of research in network science on a power law distribution. To read more about this controversy, please refer to - Lakhina et al. INFOCOM 2003, Sampling biasis in IP Topology Measurements - Achlioptas et al STOC 2005 5

References [1] Ryan and Gross. (1943), The Iowa Study of Hybrid Seed Corn: The Adoption of Innovation. Rural Sociology, 8(1): 15-24. [2] Coleman, Katz, Menzel. (1966), Medical Innovation: A Diffusion Study, Inidianapolis, The Bobbs-Merril Company, Inc. [3] Domingos, P., Richardson, M (2001): Mining the Network Value of Customers. In: ICDM [4] D. Kempe, J. Kleinberg, E. Tardos.(2003) Maximizing the Spread of Influence through a Social Network. Proc. 9th ACM SIGKDD Intl. Conf. on Knowledge Discovery and Data Mining, 6