Abstract
The appearance of social networks provides great opportunities for people to communicate, share and disseminate information. Meanwhile, it is quite challenge for utilizing a social networks efficiently in order to increase the commercial profit or alleviate social problems. One feasible solution is to select a subset of individuals that can positively influence the maximum other ones in the given social network, and some algorithms have been proposed to solve the optimal individual subset selection problem. However, most of the existing works ignored the constraint on time. They assume that the time is either infinite or only suitable to solve the snapshot selection problems. Obviously, both of them are impractical in the real system. Due to such reason, we study the problem of selecting the optimal individual subset to diffuse the positive influence when time is bounded. We proved that such a problem is NP-hard, and a heuristic algorithm based on greedy strategy is proposed. The experimental results on both simulation and real-world social networks based on the trace data in Shanghai show that our proposed algorithm outperforms the existing algorithms significantly, especially when the network structure is sparse.
Similar content being viewed by others
References
http://www.tns-opinion.com/sites/default/files/THINK%209.pdf
Suvnet-trace data. http://wirelesslab.sjtu.edu.cn
Chen W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process[J]. arXiv:1204.3074
Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pp 199–208
Dai W, Wang Y, Jin Q, Ma J (2016) An integrated incentive framework for mobile crowdsourced sensing. Tsinghua Sci Technol 21(2):146–156
Dinh T, Shen Y, Nguyen D, Thai M (2014) On the approximability of positive influence dominating set in social networks. J Comb Optim 27(3):487–503
Fortunato S (2010) Community detection in graphs. Phys Rep 486(3):75–174
Gao X, Wang Y, Li X, Wu W (2009) Analysis on theoretical bonds for approximating dominating set problems. Discrete Math Algorithms Appl 1(1):71–84
He Z, Cai Z, Han Q, Tong W, Sun L, Li Y (2016) An energy efficient privacy-preserving content sharing scheme in mobile social networks. Pers Ubiquitous Comput
He Z, Cai Z, Wang X (2015) Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks. In: The 35th IEEE international conference on distributed computing systems, pp 205–214
He Z, Cai Z, Yu J, et al. Cost-efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks[J].
Jaccard J, Blanton H, Dodge T (2005) Peer influences on risk behavior: analysis of the effects of a close friend. Dev Psychol 41(1):135–147
Jung K, Heo W, Chen W (2011) Irie: a scalable influence maximization algorithm for independent cascade model and its extensions. arXiv preprint arXiv:1111.4795
Kempe D, Kleinberg J, Tardos E (2003) Maximizing the spread of influence through a social network. In: SIGKDD, pp 461–467
Kim D, Li D, Asgari O, Li Y, Tokuta AO (2013) A dominating set based approach to identify effective leader group of social network. In: COCOON, pp 841–848
Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: Principles and practice of knowledge discovery in databases, pp 259–271
Leskovec J, Krause A, Guestrin C, Faloutsos C, VanBriesen J, Glance N (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD international conference on knowledge discovery and data mining, pp 420–429
Leskovec J, Sosič R (2014) SNAP: a general purpose network analysis and graph mining library in C++. http://snap.stanford.edu/snap
Liu X, Li S, Liao X, Wang L, Wu Q (2012) In-time estimation for influence maximization in large-scale social networks. In: Proceedings of the fifth workshop on social network systems, pp 1–6
Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the 8th ACM SIGKDD conference on knowledge discovery and data mining, pp 61–70
Sheldon D, Dilkina B, Elmachtoub A, Finseth R et al (2012) Maximizing the spread of cascades using network design. arXiv preprint arXiv:1203.3514
Wang F, Du H, Camacho E, Xu K, Lee W, Shi Y, Shan S (2011) On positive influence dominating sets in social networks. Theor Comput Sci 412(3):265–269
Wang X, Lin Y, Zhang S, et al (2015) A social activity and physical contact-based routing algorithm in mobile opportunistic networks for emergency response to sudden disasters[J]. Enterp Inf Syst, pp 1–30.
Wang Y, Cai Z, Yin G, et al (2015) A trust measurement in social networks based on game theory[C]//International Conference on Computational Social Networks. Springer International Publishing, pp 236–247
Wang Y, Cai Z, Yin G, Gao Y, Tong X, Wu G (2016) A social activity and physical contact-based routing algorithm in mobile opportunistic networks for emergency response to sudden disasters. Comput Netw 102:157–171
Wang Y, Cong G, Song G, Xie K (2010) Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In: Proceedings of the 16th ACM SIGKDD international conference on knowledge discovery and data mining, pp 1039–1048
Wang Y, Yin G, Cai Z, Dong Y, Dong H (2015) A trust-based probabilistic recommendation model for social networks. J Netw Comput Appl 55:59–67
Zhang L, Cai Z, Wang X (2016) Fakemask: a novel privacy preserving approach for smartphones. IEEE Trans Netw Serv Manag 13(2):335–348
Zhang L, Wang X, Lu J, et al (2014) A novel contact prediction‐based routing scheme for DTNs[J]. Transactions on Emerging Telecommunications Technologies. Trans Emerg Telecommun Technol
Zhang W, Wu W, Wang F, Xu K (2011) Positive influence dominating sets in power-law graphs. Soc Netw Anal Min 2(1):31–37
Acknowledgments
This work is partly supported by the NSF under Grant No. 1252292, National Natural Science Foundation of China under Grant NOs. 61502116, 61190115, 61370217, the National Basic Research Program of China (973 Program) under Grant No. 2012CB316200, the Fundamental Research Funds for the Central Universities under Grant No. HIT.KISTP201415, the National Science Foundation (NSF) under Grant Nos. CNS-1152001, CNS-1252292, the Research Fund for the Doctoral Program of Higher Education of China under Grant No. 20132302120045 and the Natural Scientific Research Innovation Foundation in Harbin Institute of Technology under Grant No. HIT.NSRIF.2014070.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Shi, T., Cheng, S., Cai, Z. et al. Retrieving the maximal time-bounded positive influence set from social networks. Pers Ubiquit Comput 20, 717–730 (2016). https://doi.org/10.1007/s00779-016-0943-7
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00779-016-0943-7