skip to main content
10.1145/2339530.2339537acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Rise and fall patterns of information diffusion: model and implications

Published: 12 August 2012 Publication History

Abstract

The recent explosion in the adoption of search engines and new media such as blogs and Twitter have facilitated faster propagation of news and rumors. How quickly does a piece of news spread over these media? How does its popularity diminish over time? Does the rising and falling pattern follow a simple universal law?
In this paper, we propose SpikeM, a concise yet flexible analytical model for the rise and fall patterns of influence propagation. Our model has the following advantages: (a) unification power: it generalizes and explains earlier theoretical models and empirical observations; (b) practicality: it matches the observed behavior of diverse sets of real data; (c) parsimony: it requires only a handful of parameters; and (d) usefulness: it enables further analytics tasks such as fore- casting, spotting anomalies, and interpretation by reverse- engineering the system parameters of interest (e.g. quality of news, count of interested bloggers, etc.).
Using SpikeM, we analyzed 7.2GB of real data, most of which were collected from the public domain. We have shown that our SpikeM model accurately and succinctly describes all the patterns of the rise-and-fall spikes in these real datasets.

Supplementary Material

JPG File (306_m_talk_1.jpg)
MP4 File (306_m_talk_1.mp4)

References

[1]
R. M. Anderson and R. M. May. Infectious Diseases of Humans. Oxford University Press, 1991.
[2]
A. L. Barabasi. The origin of bursts and heavy tails in human dynamics. Nature, 435, 2005.
[3]
F. M. Bass. A new product growth for model consumer durables. Management Science, 15(5):215--227
[4]
G. E. Box, G. M. Jenkins, and G. C. Reinsel. Time Series Analysis: Forecasting and Control. Prentice Hall, Englewood Cliffs, NJ, 3rd edition, 1994.
[5]
D. Chakrabarti and C. Faloutsos. F4: Large-scale automated forecasting using fractals. CIKM, 2002.
[6]
R. Crane and D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. In PNAS, 2008.
[7]
C. Faloutsos, M. Ranganathan, and Y. Manolopoulos. Fast subsequence matching in time-series databases. In SIGMOD, pages 419--429, 1994.
[8]
A. C. Gilbert, Y. Kotidis, S. Muthukrishnan, and M. Strauss. Surfing wavelets on streams: One-pass summaries for approximate aggregate queries. In VLDB, pages 79--88, 2001.
[9]
M. Goetz, J. Leskovec, M. McGlohon, and C. Faloutsos. Modeling blog dynamics. In ICWSM, 2009.
[10]
D. Gruhl, D. Liben-Nowell, R. Guha, and A. Tomkins. Information diffusion through blogspace. SIGKDD Explor. Newsl., 6(2):43--52, December 2004.
[11]
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW, pages 403--412, 2004.
[12]
A. G. Hawkes and D. Oakes. A cluster representation of a self-exciting process. J. Appl. Prob., 11:493--503, 1974.
[13]
A. Jain, E. Y. Chang, and Y.-F. Wang. Adaptive stream resource management using kalman filters. In SIGMOD, pages 11--22, 2004.
[14]
T. Kahveci and A. K. Singh. An efficient index structure for string databases. In Proceedings of VLDB, pages 351--360, September 2001.
[15]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD, 2003.
[16]
E. J. Keogh, T. Palpanas, V. B. Zordan, D. Gunopulos, and M. Cardle. Indexing large human-motion databases. In VLDB, pages 780--791, 2004.
[17]
J. M. Kleinberg. Bursty and hierarchical structure in streams. In KDD, pages 91--101, 2002.
[18]
R. Kumar, M. Mahdian, and M. McGlohon. Dynamics of conversations. In SIGKDD, pages 553--562, 2010.
[19]
T. Lappas, E. Terzi, D. Gunopulos, and H. Mannila. Finding effectors in social networks. In KDD, pages 1059--1068, 2010.
[20]
J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. TWEB, 1(1), 2007.
[21]
J. Leskovec, L. Backstrom, and J. M. Kleinberg. Meme-tracking and the dynamics of the news cycle. In KDD, pages 497--506, 2009.
[22]
J. Leskovec, M. McGlohon, C. Faloutsos, N. S. Glance, and M. Hurst. Patterns of cascading behavior in large blog graphs. In SDM, 2007.
[23]
K. Levenberg. A method for the solution of certain non-linear problems in least squares. Quarterly Journal of Applied Mathmatics, II(2):164--168, 1944.
[24]
L. Li, C.-J. M. Liang, J. Liu, S. Nath, A. Terzis, and C. Faloutsos. Thermocast: A cyber-physical forecasting model for data centers. In KDD, 2011.
[25]
L. Li, J. McCann, N. Pollard, and C. Faloutsos. Dynammo: Mining and summarization of coevolving sequences with missing values. In KDD, 2009.
[26]
L. Li and B. A. Prakash. Time series clustering: Complex is simpler! In ICML, 2011.
[27]
J. Lin, E. J. Keogh, S. Lonardi, J. P. Lankford, and D. M. Nystrom. Visually mining and monitoring massive time series. In KDD, pages 460--469, 2004.
[28]
Y. Matsubara, Y. Sakurai, and M. Yoshikawa. Scalable algorithms for distribution search. In ICDM, pages 347--356, 2009.
[29]
M. McGlohon, J. Leskovec, C. Faloutsos, M. Hurst, and N. Glance. Finding patterns in blog shapes and blog evolution. In International Conference on Weblogs and Social Media, Boulder, Colo., March 2007.
[30]
P. Papapetrou, V. Athitsos, M. Potamias, G. Kollios, and D. Gunopulos. Embedding-based subsequence matching in time-series databases. ACM Trans. Database Syst., 36(3):17, 2011.
[31]
N. Parikh and N. Sundaresan. Scalable and near real-time burst detection from ecommerce queries. In KDD, pages 972--980, 2008.
[32]
B. A. Prakash, A. Beutel, R. Rosenfeld, and C. Faloutsos. Winner takes all: competing viruses or ideas on fair-play networks. In WWW, pages 1037--1046, 2012.
[33]
B. A. Prakash, D. Chakrabarti, M. Faloutsos, N. Valler, and C. Faloutsos. Threshold conditions for arbitrary cascade models on arbitrary networks. In ICDM, 2011.
[34]
Y. Sakurai, C. Faloutsos, and M. Yamamuro. Stream monitoring under the time warping distance. In Proceedings of the 23rd International Conference on Data Engineering, ICDE 2007, April 15-20, 2007, The Marmara Hotel, Istanbul, Turkey, pages 1046--1055, 2007.
[35]
Y. Sakurai, S. Papadimitriou, and C. Faloutsos. BRAID: Stream mining through group lag correlations. In SIGMOD Conference, pages 599--610, Baltimore, MD, USA, 2005.
[36]
D. Shah and T. Zaman. Rumors in a network: Who's the culprit? IEEE Transactions on Information Theory, 57(8):5163--5181, 2011.
[37]
H. Tong, B. A. Prakash, C. E. Tsourakakis, T. Eliassi-Rad, C. Faloutsos, and D. H. Chau. On the vulnerability of large graphs. In ICDM, 2010.
[38]
M. Vlachos, S. S. Kozat, and P. S. Yu. Optimal distance bounds on time-series data. In SDM, pages 109--120, 2009.
[39]
A. S. Weigend and N. A. Gerschenfeld. Time Series Prediction: Forecasting the Future and Understanding the Past. Addison Wesley, 1994.
[40]
J. Yang and J. Leskovec. Modeling information diffusion in implicit networks. In ICDM, pages 599--608, 2010.
[41]
J. Yang and J. Leskovec. Patterns of temporal variation in online media. In WSDM, pages 177--186, 2011.
[42]
Y. Zhu and D. Shasha. Efficient elastic burst detection in data streams. In KDD, pages 336--345, 2003.

Cited By

View all
  • (2025)Cryptocurrency Topic Burst Prediction via Hybrid Twin-structured Multi-modal LearningDatabase Systems for Advanced Applications10.1007/978-981-97-5779-4_25(373-389)Online publication date: 11-Jan-2025
  • (2025)Are Narratives Contagious? Modeling Narrative Diffusion Using Epidemiological TheoriesSocial Networks Analysis and Mining10.1007/978-3-031-78554-2_20(303-318)Online publication date: 25-Jan-2025
  • (2024)A Survey of Deep Learning-Based Information Cascade PredictionSymmetry10.3390/sym1611143616:11(1436)Online publication date: 29-Oct-2024
  • Show More Cited By

Index Terms

  1. Rise and fall patterns of information diffusion: model and implications

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '12: Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2012
    1616 pages
    ISBN:9781450314626
    DOI:10.1145/2339530
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 12 August 2012

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. information diffusion
    2. social networks

    Qualifiers

    • Research-article

    Conference

    KDD '12
    Sponsor:

    Acceptance Rates

    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Upcoming Conference

    KDD '25

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)87
    • Downloads (Last 6 weeks)10
    Reflects downloads up to 14 Feb 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2025)Cryptocurrency Topic Burst Prediction via Hybrid Twin-structured Multi-modal LearningDatabase Systems for Advanced Applications10.1007/978-981-97-5779-4_25(373-389)Online publication date: 11-Jan-2025
    • (2025)Are Narratives Contagious? Modeling Narrative Diffusion Using Epidemiological TheoriesSocial Networks Analysis and Mining10.1007/978-3-031-78554-2_20(303-318)Online publication date: 25-Jan-2025
    • (2024)A Survey of Deep Learning-Based Information Cascade PredictionSymmetry10.3390/sym1611143616:11(1436)Online publication date: 29-Oct-2024
    • (2024)Revisiting Information Cascades in Online Social NetworksMathematics10.3390/math1301007713:1(77)Online publication date: 28-Dec-2024
    • (2024)Unraveling the Dynamics of Stable and Curious Audiences in Web SystemsProceedings of the ACM Web Conference 202410.1145/3589334.3645473(2464-2475)Online publication date: 13-May-2024
    • (2024)Epidemic Spreading on Directed Networks and Twitter CascadesIEEE Transactions on Network Science and Engineering10.1109/TNSE.2023.334847411:3(2742-2756)Online publication date: May-2024
    • (2024)CSFI for Social Media: Understanding and Predicting Cross-Community Information Propagation2024 IEEE 36th International Conference on Tools with Artificial Intelligence (ICTAI)10.1109/ICTAI62512.2024.00046(264-269)Online publication date: 28-Oct-2024
    • (2024)Predictive Model of Cultural Product Search Interest Based on Collective Memory Hawkes Process2024 11th International Conference on Behavioural and Social Computing (BESC)10.1109/BESC64747.2024.10780717(1-8)Online publication date: 16-Aug-2024
    • (2024)Proselytizing the potential of influencer marketing via artificial intelligence: mapping the research trends through bibliometric analysisCogent Business & Management10.1080/23311975.2024.237288911:1Online publication date: Jul-2024
    • (2024)OlapGN: A multi-layered graph convolution network-based model for locating influential nodes in graph networksKnowledge-Based Systems10.1016/j.knosys.2023.111163283(111163)Online publication date: Jan-2024
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media