skip to main content
10.1145/3297156.3297185acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsaiConference Proceedingsconference-collections
research-article

Dynamic Update Upper Bounds Influence Maximization Algorithm

Published:08 December 2018Publication History

ABSTRACT

In the field of social network analysis, influence maximization is an important research area. The goal is to find K nodes that maximize the final range of influence based on a given spread model. In the study of influence maximization, the research method based on greedy algorithm mainly focuses on how to further reduce Monte-Carlo simulations. In this paper, based on the dynamic update of the upper bound of marginal benefit of node, we propose an Upper Bound Update Greedy (UBUG) algorithm and an Upper Bound Update Heuristic (UBUH) algorithm. Experimental results show that the UBUG algorithm can reduce more MC simulations than the CELF [1] and UBLF [2] algorithms without losing the accuracy of the results. And compared to other heuristic algorithms, the UBUH not only meets the requirements of high calculation speed but also has a good accuracy.

References

  1. Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., & Glance, N. (2007, August). Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 420--429). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Zhou, C., Zhang, P., Zang, W., & Guo, L. (2015). On the upper bounds of spread for greedy algorithms in social network influence maximization. IEEE Transactions on Knowledge and Data Engineering, 27(10), 2770--2783. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Kempe, D., Kleinberg, J., & Tardos, É. (2003, August). Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 137--146). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Goyal, A., Lu, W., & Lakshmanan, L. V. (2011, March). Celf++: optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web (pp. 47--48). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Chen, W., Wang, Y., & Yang, S. (2009, June). Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 199--208). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Wang, Y., Cong, G., Song, G., & Xie, K. (2010, July). Community-based greedy algorithm for mining top-k influential nodes in mobile social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1039--1048). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Chen, W., Wang, C., & Wang, Y. (2010, July). Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 1029--1038). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Chen, W., Yuan, Y., & Zhang, L. (2010, December). Scalable influence maximization in social networks under the linear threshold model. In Data Mining (ICDM), 2010 IEEE 10th International Conference on (pp. 88--97). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Goyal, A., Lu, W., & Lakshmanan, L. V. (2011, December). Simpath: An efficient algorithm for influence maximization under the linear threshold model. In Data Mining (ICDM), 2011 IEEE 11th International Conference on (pp. 211--220). IEEE. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Kimura, M., & Saito, K. (2006, September). Tractable models for information diffusion in social networks. In European Conference on Principles of Data Mining and Knowledge Discovery (pp. 259--271). Springer, Berlin, Heidelberg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Narayanam, R., & Narahari, Y. (2011). A shapley value-based approach to discover influential nodes in social networks. IEEE Transactions on Automation Science and Engineering, 8(1), 130--147.Google ScholarGoogle ScholarCross RefCross Ref
  12. Tang, Y., Xiao, X., & Shi, Y. (2014, June). Influence maximization: Near-optimal time complexity meets practical efficiency. In Proceedings of the 2014 ACM SIGMOD international conference on Management of data (pp. 75--86). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Domingos, P., & Richardson, M. (2001, August). Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 57--66). ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Borgs, C., Brautbar, M., Chayes, J., & Lucier, B. (2014, January). Maximizing social influence in nearly optimal time. In Proceedings of the twenty-fifth annual ACM-SIAM symposium on Discrete algorithms (pp. 946--957). Society for Industrial and Applied Mathematics. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Jung, K., Chen, W., & Heo, W. (2011). IRIE: A scalable influence maximization algorithm for independent cascade model and its extensions (No. arXiv: 1111.4795).Google ScholarGoogle Scholar

Index Terms

  1. Dynamic Update Upper Bounds Influence Maximization Algorithm

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      CSAI '18: Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence
      December 2018
      641 pages
      ISBN:9781450366069
      DOI:10.1145/3297156

      Copyright © 2018 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 8 December 2018

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
      • Research
      • Refereed limited

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader