Abstract
Imagine we are introducing a new product through a social network, where we know for each user in the network the function of purchase probability with respect to discount. Then, what discounts should we offer to those social network users so that, under a predefined budget, the adoption of the product is maximized in expectation? Although influence maximization has been extensively explored, this appealing practical problem still cannot be answered by the existing influence maximization methods. In this article, we tackle the problem systematically. We formulate the general continuous influence maximization problem, investigate the essential properties, and develop a general coordinate descent algorithmic framework as well as the engineering techniques for practical implementation. Our investigation does not assume any specific influence model and thus is general and principled. At the same time, using the most popularly adopted triggering model as a concrete example, we demonstrate that more efficient methods are feasible under specific influence models. Our extensive empirical study on four benchmark real-world networks with synthesized purchase probability curves clearly illustrates that continuous influence maximization can improve influence spread significantly with very moderate extra running time comparing to the classical influence maximization methods.
- Christian Borgs, Michael Brautbar, Jennifer Chayes, and Brendan Lucier. 2014. Maximizing social influence in nearly optimal time. In Proceedings of the 25th Annual ACM-SIAM Symposium on Discrete Algorithms. SIAM, 946--957.Google ScholarCross Ref
- Stephen Boyd and Lieven Vandenberghe. 2004. Convex Optimization. CUP.Google Scholar
- Mike Brennan. 1995. Constructing demand curves from purchase probability data: An application of the juster scale. Marketing Bulletin 6, May (1995), 51--58.Google Scholar
- Wei Chen, Laks V. S. Lakshmanan, and Carlos Castillo. 2013. Information and influence propagation in social networks. Synthesis Lectures on Data Management 5, 4 (2013), 1--177.Google ScholarCross Ref
- Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 1029--1038.Google ScholarDigital Library
- Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 199--208.Google ScholarDigital Library
- Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable influence maximization in social networks under the linear threshold model. In Proceedings of the IEEE 10th International Conference on Data Mining. IEEE, 88--97.Google ScholarDigital Library
- Yeong Bin Cho, Yoon Ho Cho, and Soung Hie Kim. 2005. Mining changes in customer buying behavior for collaborative recommendations. Expert Systems with Applications 28, 2 (2005), 359--369.Google ScholarDigital Library
- Paul Dagum, Richard Karp, Michael Luby, and Sheldon Ross. 2000. An optimal algorithm for Monte Carlo estimation. SIAM Journal on Computing 29, 5 (2000), 1484--1496.Google ScholarDigital Library
- Erik D. Demaine, MohammadTaghi Hajiaghayi, Hamid Mahini, David L. Malec, S. Raghavan, Anshul Sawant, and Morteza Zadimoghadam. 2014. How to influence people with partial incentives. In Proceedings of the 23rd International Conference on World Wide Web. ACM, 937--948.Google ScholarDigital Library
- Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 57--66.Google ScholarDigital Library
- Nan Du, Le Song, Manuel Gomez-Rodriguez, and Hongyuan Zha. 2013. Scalable influence estimation in continuous-time diffusion networks. In Proceedings of the 26th International Conference on Neural Information Processing Systems. 3147--3155.Google Scholar
- Milad Eftekhar, Yashar Ganjali, and Nick Koudas. 2013. Information cascade at group scale. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 401--409.Google ScholarDigital Library
- Mehrdad Farajtabar, Nan Du, Manuel Gomez-Rodriguez, Isabel Valera, Hongyuan Zha, and Le Song. 2014. Shaping social activity by incentivizing users. In Proceedings of the 27th International Conference on Neural Information Processing Systems. ACM, 2474–2482.Google Scholar
- Amit Goyal, Wei Lu, and Laks V. S. Lakshmanan. 2011. Simpath: An efficient algorithm for influence maximization under the linear threshold model. In Proceedings of the IEEE 11th International Conference on Data Mining. IEEE, 211--220.Google Scholar
- Keke Huang, Sibo Wang, Glenn Bevilacqua, Xiaokui Xiao, and Laks V. S. Lakshmanan. 2017. Revisiting the stop-and-stare algorithms for influence maximization. Proceedings of the VLDB Endowment 10, 9 (2017), 913--924.Google ScholarDigital Library
- David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 137--146.Google ScholarDigital Library
- David Kempe, Jon M. Kleinberg, and Éva Tardos. 2015. Maximizing the spread of influence through a social network. Theory of Computing 11, 4 (2015), 105--147.Google ScholarCross Ref
- Aradhna Krishna. 1994. The impact of dealing patterns on purchase behavior. Marketing Science 13, 4 (1994), 351--373.Google ScholarDigital Library
- Siyu Lei, Silviu Maniu, Luyi Mo, Reynold Cheng, and Pierre Senellart. 2015. Online influence maximization. In Proceedings of the 21st ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 645--654.Google ScholarDigital Library
- Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 420--429.Google ScholarDigital Library
- Hairong Liu, Longin Jan Latecki, and Shuicheng Yan. 2013. Fast detection of dense subgraphs with iterative shrinking and expansion. IEEE Transactions on Pattern Analysis and Machine Intelligence 35, 9 (2013), 2131--2142.Google ScholarDigital Library
- Qi Liu, Biao Xiang, Enhong Chen, Hui Xiong, Fangshuang Tang, and Jeffrey Xu Yu. 2014. Influence maximization over large-scale social networks: A bounded linear approach. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management. ACM, 171--180.Google ScholarDigital Library
- Qi Liu, Biao Xiang, Nicholas Jing Yuan, Enhong Chen, Hui Xiong, Yi Zheng, and Yu Yang. 2017. An influence propagation view of pagerank. ACM Transactions on Knowledge Discovery from Data 11, 3 (2017), 30.Google Scholar
- Cheng Long and R. C.-W. Wong. 2011. Minimizing seed set for viral marketing. In Proceedings of the IEEE 11th International Conference onData Mining. IEEE, 427--436.Google ScholarDigital Library
- Michael Mitzenmacher and Eli Upfal. 2005. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. CUP.Google Scholar
- Elchanan Mossel and Sebastien Roch. 2007. On the submodularity of influence in social networks. In Proceedings of the 39th Annual ACM Symposium on Theory of Computing. ACM, 128--134.Google ScholarDigital Library
- Katta G. Murty and Santosh N. Kabadi. 1987. Some NP-complete problems in quadratic and nonlinear programming. Mathematical Programming 39, 2 (1987), 117--129.Google ScholarDigital Library
- Huy Nguyen and Rong Zheng. 2013. On budgeted influence maximization in social networks. IEEE Journal on Selected Areas in Communications 31, 6 (2013), 1084--1094.Google ScholarCross Ref
- Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 2016. Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In Proceedings of the 2016 International Conference on Management of Data. ACM, 695--710.Google Scholar
- Shai Shalev-Shwartz and Shai Ben-David. 2014. Understanding Machine Learning: From Theory to Algorithms. CUP.Google Scholar
- Yaron Singer. 2012. How to win friends and influence people, truthfully: Influence maximization mechanisms for social networks. In Proceedings of the 5th ACM International Conference on Web Search and Data Mining. ACM, 733--742.Google ScholarDigital Library
- Euiho Suh, Seungjae Lim, Hyunseok Hwang, and Suyeon Kim. 2004. A prediction model for the purchase probability of anonymous customers to support real time web marketing: A case study. Expert Systems with Applications 27, 2 (2004), 245--255.Google ScholarCross Ref
- Maxim Sviridenko. 2004. A note on maximizing a submodular set function subject to a knapsack constraint. Operations Research Letters 32, 1 (2004), 41--43.Google ScholarDigital Library
- Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence maximization in near-linear time: A martingale approach. In Proceedings of the 2015 ACM SIGMOD International Conference on Management of Data. ACM, 1539–1554.Google ScholarDigital Library
- Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence maximization: Near-optimal time complexity meets practical efficiency. In Proceedings of the 2014 ACM SIGMOD International Conference on Management of Data. ACM, 75--86.Google ScholarDigital Library
- Gaebler Ventures. 2013. Business Advertising. Retrieved from http://www.gaebler.com/Business-Advertising.htm.Google Scholar
- Yue Wang, WeiJing Huang, Lang Zong, TengJiao Wang, and DongQing Yang. 2013. Influence maximization with limit cost in social network. Science China Information Sciences 56, 7 (2013), 1--14.Google Scholar
- Zhefeng Wang, Enhong Chen, Qi Liu, Yu Yang, Yong Ge, and Biao Chang. 2015. Maximizing the coverage of information propagation in social networks. In Proceedings of the 24th International Joint Conference on Artificial Intelligence. ACM, 2104–2110.Google Scholar
- Yu Yang, Xiangbo Mao, Jian Pei, and Xiaofei He. 2016. Continuous influence maximization: What discounts should we offer to social network users? In Proceedings of the 2016 International Conference on Management of Data. ACM, 727--741.Google ScholarDigital Library
- Jing Yuan and Shao-Jie Tang. 2017. Adaptive discount allocation in social networks. In Proceedings of the 18th ACM International Symposium on Mobile Ad Hoc Networking and Computing. ACM, 22.Google ScholarDigital Library
Index Terms
- Continuous Influence Maximization
Recommendations
Continuous Influence Maximization: What Discounts Should We Offer to Social Network Users?
SIGMOD '16: Proceedings of the 2016 International Conference on Management of DataImagine we are introducing a new product through a social network, where we know for each user in the network the purchase probability curve with respect to discount. Then, what discount should we offer to those social network users so that the adoption ...
Diversified social influence maximization
ASONAM '14: Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningFor better viral marketing, there has been a lot of research on social influence maximization. However, the problem that who is influenced and how diverse the influenced population is, which is important in real-world marketing, has largely been ...
On the Robustness of Influence Maximization Algorithms against Non-Adversarial Perturbations
ASONAM '17: Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017Influence maximization is a combinatorial optimization problem on a graph: Given a social network, an influence maximization algorithm aims to find a set of influential (seed) nodes in the network such that the expected number of nodes influenced by the ...
Comments