Abstract
Influence Maximization has been applied to marketing, advertising and public opinion monitoring. Most of the existed influence maximization algorithms are greedy or heuristic algorithms which are too time consuming. Based on the observation that the structural hole nodes are much more influential, we develop structural holes theory-based influence maximization algorithm SG with an emphasis on time efficiency. We conduct experiments to verify our algorithm’s time efficiency and accuracy, the experimental results show that comparing with the existing algorithms, our algorithms are much faster and scalable.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
He, Z., Cai, Z., Wang, X.: Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: IEEE International Conference on Distributed Computing Systems, pp. 205–214. IEEE (2015)
Cai, J.L.Z., Yan, M., Li, Y.: Using crowdsourced data in location-based social networks to explore influence maximization. In: IEEE INFOCOM 2016 - IEEE Conference on Computer Communications, pp. 1–9. IEEE (2016)
Shi, T., Cheng, S., Cai, Z., et al.: Retrieving the maximal time-bounded positive influence set from social networks. Pers. Ubiquit. Comput. 20(5), 717–730 (2016)
Leskovec, J., Krause, A., Guestrin, C., et al.: Cost-effective outbreak detection in networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 420–429. ACM (2007)
Chen, W., Wang, Y., Yang, S.: Efficient influence maximization in social networks. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining KDD, Paris, France, 28 June–July, pp. 199–208 (2009)
Zhang, E., Wang, G., Gao, K., et al.: Generalized structural holes finding algorithm by bisection in social communities. In: Sixth International Conference on Genetic and Evolutionary Computing, pp. 276–279. IEEE (2012)
Xiao-Ping, S., Yu-Rong, S.: Leveraging neighborhood “structural holes” to identifying key spreaders in social networks. Acta Physica Sinica -Chinese Edition- 64(2), 1–11 (2015)
Lou, T., Tang, J.: Mining structural hole spanners through information diffusion in social networks. In: The International Conference, pp. 825–836 (2013)
Acknowledgment
This work was supported in part by the National Science Foundation of China (61632010, 61100048, 61370222), the Natural Science Foundation of Heilongjiang Province (F2016034), the Education Department of Heilongjiang Province (12531498).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Zhu, J., Yin, X., Wang, Y., Li, J., Zhong, Y., Li, Y. (2017). Structural Holes Theory-Based Influence Maximization in Social Network. In: Ma, L., Khreishah, A., Zhang, Y., Yan, M. (eds) Wireless Algorithms, Systems, and Applications. WASA 2017. Lecture Notes in Computer Science(), vol 10251. Springer, Cham. https://doi.org/10.1007/978-3-319-60033-8_73
Download citation
DOI: https://doi.org/10.1007/978-3-319-60033-8_73
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-60032-1
Online ISBN: 978-3-319-60033-8
eBook Packages: Computer ScienceComputer Science (R0)