Skip to main content

Time-Critical Viral Marketing Strategy with the Competition on Online Social Networks

  • Conference paper
  • First Online:
Book cover Computational Social Networks (CSoNet 2016)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 9795))

Included in the following conference series:

Abstract

According to the development of the Internet, using social networks has become an efficient way to marketing these days. The problem of Influence Maximization (IM) appeared in marketing diffusion is one of hot subjects. Nevertheless, there are no researches on propagating information whereas limits unwanted users. Moreover, recent researches shows that information spreading seems to dim after some steps. Hence, how to maximize the influence while limits opposite users after a number of steps? The problem has real applications because business companies always mutually compete and extremely potential desire to broad cart their product without the leakage to opponents.

To be motivated by the phenomenon, we proposed a problem called Influence Maximization while unwanted users limited (d-IML) during known propagation hops d. The problem would be proved to be NP-Complete and could not be approximated with the rate \(1-1/e\) and its objective function was sub modular. Furthermore, we recommended an efficient algorithms to solve the problem. The experiments were handled via the real social networks datasets and the results showed that our algorithm generated better outcome than several other heuristic methods.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Zhang, H., Dinh, T.N., Thai, M.T.: Maximizing the spread of positive influence in online social networks. In: Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS) (2013)

    Google Scholar 

  2. Guo, J., Zhang, P., Zhou, C., Cao, Y., Guo, L.: Personalized influence maximization on social networks. In: Proceedings of the 22nd ACM International Conference on Conference on Information and Knowledge Management (2011)

    Google Scholar 

  3. Zhuang, H., Sun, Y., Tang, J., Zhang, J., Sun, X.: Influence maximization in dynamic social networks. In: Proceedings of IEEE International Conference on Data Mining (ICDM) (2013)

    Google Scholar 

  4. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web (WWW 2011), pp. 665–674. ACM, New York, NY, USA (2011)

    Google Scholar 

  5. Kempe, D., Kleinberg, J., Tardos, E.: Maximizing the spread of influence through a social network. In: Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, New York, NY, USA, pp. 137–146 (2003)

    Google Scholar 

  6. Nguyen, N.P., Yan, G., Thai, M.T., Eidenbenz, S.: Containment of misinformation spread in online social networks. In: Proceedings of ACM Web Science (WebSci) (2012)

    Google Scholar 

  7. Dinh, T.N., Shen, Y., Thai, M.T.: The walls have ears: optimize sharing for visibility and privacy in online social networks. In: Proceedings of ACM International Conference on Information and Knowledge Management (CIKM) (2012)

    Google Scholar 

  8. Nguyen, D.T., Nguyen, N.P., Thai, M.T.: Sources of misinformation in online social networks: who to suspect? In: Proceedings of the IEEE Military Communications Conference (MILCOM) (2012)

    Google Scholar 

  9. Zhang, H., Li, X., Thai, M.: Limiting the spread of misinformation while effectively raising awareness in social networks. In: Proceedings of the 4th International Conference on Computational Social Networks (CSoNet) (2015)

    Google Scholar 

  10. Feige, U.: A threshold of ln n for approximating set cover. J. ACM (JACM) 45(4), 634–652 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  11. Pham, C.V., Hoang, H.X., Vu, M.M.: Preventing and detecting infiltration on online social networks. In: Thai, M.T., Nguyen, N.T., Shen, H. (eds.) CSoNet 2015. LNCS, vol. 9197, pp. 60–73. Springer, Heidelberg (2015)

    Chapter  Google Scholar 

  12. Chen, W., Wei, L., Zhang, N.: Time-critical influence maximization in social networks with time-delayed diffusion process. http://arxiv.org/abs/1204.3074

  13. Gomez-Rodriguez, M., Song, L., Nan, D., Zha, H., Scholkopf, B.: Influence estimation and maximization in continuous-time diffusion networks. ACM Trans. Inf. Syst. 34, 2 (2016). doi:10.1145/2824253

    Article  Google Scholar 

  14. Tang, L., Liu, H.: Relational learning via latent social dimensions. In: Proceedings of the 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2009), pp. 817–826 (2009)

    Google Scholar 

  15. Leskovec, J., Kleinberg, J., Faloutsos, C.: Graph evolution: densification and shrinking diameters. ACM Trans. Knowl. Disc. Data (ACM TKDD) 1(1), 2 (2007)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Canh V. Pham .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Pham, C.V., Thai, M.T., Ha, D., Ngo, D.Q., Hoang, H.X. (2016). Time-Critical Viral Marketing Strategy with the Competition on Online Social Networks. In: Nguyen, H., Snasel, V. (eds) Computational Social Networks. CSoNet 2016. Lecture Notes in Computer Science(), vol 9795. Springer, Cham. https://doi.org/10.1007/978-3-319-42345-6_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-42345-6_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-42344-9

  • Online ISBN: 978-3-319-42345-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics