skip to main content
10.1145/2623330.2623704acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Scalable diffusion-aware optimization of network topology

Published:24 August 2014Publication History

ABSTRACT

How can we optimize the topology of a networked system to bring a flu under control, propel a video to popularity, or stifle a network malware in its infancy? Previous work on information diffusion has focused on modeling the diffusion dynamics and selecting nodes to maximize/minimize influence. Only a paucity of recent studies have attempted to address the network modification problems, where the goal is to either facilitate desirable spreads or curtail undesirable ones by adding or deleting a small subset of network nodes or edges. In this paper, we focus on the widely studied linear threshold diffusion model, and prove, for the first time, that the network modification problems under this model have supermodular objective functions. This surprising property allows us to design efficient data structures and scalable algorithms with provable approximation guarantees, despite the hardness of the problems in question. Both the time and space complexities of our algorithms are linear in the size of the network, which allows us to experiment with millions of nodes and edges. We show that our algorithms outperform an array of heuristics in terms of their effectiveness in controlling diffusion processes, often beating the next best by a significant margin.

Skip Supplemental Material Section

Supplemental Material

p1226-sidebyside.mp4

mp4

384.6 MB

References

  1. I. Bogunovic. Robust protection of networks against cascading phenomena. Master's thesis, ETHZ, 2012.Google ScholarGoogle Scholar
  2. U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25(2), 2001.Google ScholarGoogle ScholarCross RefCross Ref
  3. W. Chen, L. V. Lakshmanan, and C. Castillo. Information and influence propagation in social networks. Synthesis Lectures on Data Management, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In IEEE ICDM, pages 88--97, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Cohen. Size-estimation framework with applications to transitive closure and reachability. Journal of Computer and System Sciences, 55(3):441--453, 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. P. Domingos and M. Richardson. Mining the network value of customers. In ACM KDD, pages 57--66, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. N. Du, L. Song, H. Zha, and M. Gomez Rodriguez. Scalable influence estimation in continuous time diffusion networks. In NIPS, 2013.Google ScholarGoogle Scholar
  8. C. Gao, J. Liu, and N. Zhong. Network immunization and virus propagation in email networks: experimental evaluation and analysis. KAIS, 27(2):253--279, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. X. He, G. Song, W. Chen, and Q. Jiang. Influence blocking maximization in social networks under the competitive linear threshold model. In SDM, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  10. H. W. Hethcote. The mathematics of infectious diseases. SIAM review, 42(4):599--653, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. R. Iyer, S. Jegelka, and J. Bilmes. Fast semidifferential-based submodular function optimization. In ICML, 2013.Google ScholarGoogle Scholar
  12. D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In ACM KDD, pages 137--146. ACM, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. M. Kimura, K. Saito, and H. Motoda. Solving the contamination minimization problem on networks for the linear threshold model. In PRICAI. 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. M. Kimura, K. Saito, and H. Motoda. Blocking links to minimize contamination spread in a social network. ACM TKDD, 3(2):9, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. C. J. Kuhlman, G. Tuli, S. Swarup, M. V. Marathe, and S. Ravi. Blocking simple and complex contagion by edge removal. In IEEE ICDM, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  16. J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In ACM KDD, pages 497--506. ACM, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs: An approach to modeling networks. 11(Feb):985--1042, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Nemhauser, L. Wolsey, and M. Fisher. An analysis of the approximations for maximizing submodular set functions. Mathematical Programming, 14, 1978.Google ScholarGoogle Scholar
  19. S. Peng, S. Yu, and A. Yang. Smartphone malware and its propagation modeling: A survey. IEEE Communications Surveys Tutorials, PP(99):1--17, 2013.Google ScholarGoogle Scholar
  20. C. M. Schneider, T. Mihaljev, S. Havlin, and H. J. Herrmann. Suppressing epidemics with a limited amount of immunization units. Physical Review E, 84(6), 2011.Google ScholarGoogle ScholarCross RefCross Ref
  21. D. Sheldon, B. Dilkina, A. N. Elmachtoub, R. Finseth, et al. Maximizing the spread of cascades using network design. UAI, 2010.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. H. Tong, B. A. Prakash, T. Eliassi-Rad, M. Faloutsos, and C. Faloutsos. Gelling, and melting, large graphs by edge manipulation. In ACM CIKM, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Scalable diffusion-aware optimization of network topology

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      KDD '14: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining
      August 2014
      2028 pages
      ISBN:9781450329569
      DOI:10.1145/2623330

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 24 August 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      KDD '14 Paper Acceptance Rate151of1,036submissions,15%Overall Acceptance Rate1,133of8,635submissions,13%

      Upcoming Conference

      KDD '24

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader