Skip to main content

Influence Maximization in Independent Cascade Model with Limited Propagation Distance

  • Conference paper
Web Technologies and Applications (APWeb 2014)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 8710))

Included in the following conference series:

Abstract

Influence Maximization (IM) is the problem of finding k most influential users in a social network. In this paper, a novel propagation model named Independent Cascade Model with Limited Propagation Distance (ICLPD) is established. In the ICLPD, the influence of seed nodes can only propagate limited hops and the transmission capacities of the seed nodes are different. It is proved that IM problem in the ICLPD is NP-hard and the influence spread function has submodularity. Thus a greedy algorithm can be used to get a result which guarantees a ratio of (1 − 1/e) approximation. In addition, an efficient heuristic algorithm named Local Influence Discount Heuristic (LIDH) is proposed to speed up the greedy algorithm. Extensive experiments on two real-world datasets show LIDH works well in the ICLPD. LIDH is several orders of magnitude faster than the greedy algorithm while its influence spread is close to that of the greedy algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Kempe, D., Kleinberg, J., Kleinber, J.: Maximizing the spread of influence through a social network. In: Knowledge Discovery and Data Mining (KDD), pp. 137–146 (2003)

    Google Scholar 

  2. Goldenberg, J., Libai, B., Muller, E.: Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters 12, 211–223 (2001)

    Article  Google Scholar 

  3. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: Knowledge Discovery and Data Mining (KDD), pp. 420–429 (2007)

    Google Scholar 

  4. Kempe, D., Kleinberg, J.M., Tardos, É.: Influential nodes in a diffusion model for social networks. In: Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M. (eds.) ICALP 2005. LNCS, vol. 3580, pp. 1127–1138. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  5. Li, Y., Chen, W., Wang, Y.: Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: International Conference on Web Search and Data Mining (WSDM), pp. 657–666 (2013)

    Google Scholar 

  6. Li, H., Bhowmick, S.S., Sun, A.: Cinema: conformity-aware greedy algorithm for influence maximization in online social networks. In: International Conference on Extending Database Technology (EDBT), pp. 323–334 (2013)

    Google Scholar 

  7. Chen, W., Lu, W., Zhang, N.: Time-critical influence maximization in social networks with time-delayed diffusion process. In: Conference on Artificial Intelligence (AAAI), pp. 592–598 (2012)

    Google Scholar 

  8. Liu, B., Cong, G., Xu, D., Zeng, Y.: Time constrained influence maximization in social networks. In: International Conference on Data Mining (ICDM), pp. 439–448 (2012)

    Google Scholar 

  9. Domingos, P., Richardson, M.: Mining the network value of customers. In: Knowledge Discovery and Data Mining (KDD), pp. 57–66 (2001)

    Google Scholar 

  10. Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: Knowledge Discovery and Data Mining (KDD), pp. 199–208 (2009)

    Google Scholar 

  11. Zhou, C., Zhang, P., Guo, J., Zhu, X.: Ublf: An upper bound based approach to discover influential nodes in social networks. In: International Conference on Data Mining (ICDM), pp. 907–916 (2013)

    Google Scholar 

  12. Estevez, P., Univ. de Chile, S., Vera, P., Saito, K.: Selecting the most influential nodes in social networks. In: International Joint Conference on Neural Networks (ICNN), pp. 2397–2402 (2007)

    Google Scholar 

  13. Chen, W., Wang, C., Guo, J., Wang, Y.: Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Knowledge Discovery and Data Mining (KDD), pp. 1029–1038 (2010)

    Google Scholar 

  14. Lu, W., Lakshmanan, L.V.S.: Simpath: An efficient algorithm for influence maximization under the linear threshold model. In: International Conference on Data Mining (ICDM), pp. 211–220 (2011)

    Google Scholar 

  15. Chen, Y.C., Peng, W.C., Lee, S.Y.: Efficient algorithms for influence maximization in social networks. Knowledge and Information Systems 33, 577–601 (2012)

    Article  Google Scholar 

  16. Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions. Mathematical Programming 14, 256–294 (1978)

    Article  MathSciNet  Google Scholar 

  17. NetComm, available at http://www.datatang.com/data/11979

  18. NetHEPT, available at http://www.datatang.com/data/44859

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this paper

Cite this paper

Lv, S., Pan, L. (2014). Influence Maximization in Independent Cascade Model with Limited Propagation Distance. In: Han, W., Huang, Z., Hu, C., Zhang, H., Guo, L. (eds) Web Technologies and Applications. APWeb 2014. Lecture Notes in Computer Science, vol 8710. Springer, Cham. https://doi.org/10.1007/978-3-319-11119-3_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11119-3_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11118-6

  • Online ISBN: 978-3-319-11119-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics