skip to main content
10.1145/3487351.3489474acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Deterministic influence maximization approach for sequential active marketing

Published:19 January 2022Publication History

ABSTRACT

The influence maximization problem aims to find the best seeding set of nodes in a network to increase the influence spread, under various information diffusion models. Recent advances have shown the importance of the timing of the seeding and introduced the sequential seeding approach, determining a step-by-step cascade of activations. Our study explores a novel Deterministic Influence Maximization Approach (DIMA) for time-based sequential seeding dynamics in a threshold-based model. We examine the problem characteristics and formulate solutions optimizing a scheduled sequential seeding strategy. Based on a set of empirical simulations we demonstrate the properties of the deterministic sequential problem, incorporate three different mathematical programming formulations and provide an initial benchmark for optimization techniques.

References

  1. J. Goldenberg, B. Libai, and E. Muller, "Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata," Academy of Marketing Science Review, vol. 2001, p. 1, 2001.Google ScholarGoogle Scholar
  2. J. Tang, C. Aggarwal, and H. Liu, "Recommendations in signed social networks," in Proceedings of the 25th International Conference on World Wide Web, 2016, pp. 31--40.Google ScholarGoogle Scholar
  3. D. Kempe, J. Kleinberg, and É. Tardos, "Maximizing the spread of influence through a social network," in Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2003, pp. 137--146.Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. P. Shakarian, S. Eyre, and D. Paulo, "A scalable heuristic for viral marketing under the tipping model," Social Network Analysis and Mining, vol. 3, no. 4, pp. 1225--1248, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  5. T. W. Valente, "Network interventions," Science, vol. 337, no. 6090, pp. 49--53, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  6. S. P. Borgatti, "Centrality and network flow," Social networks, vol. 27, no. 1, pp. 55--71, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  7. O. Hinz, B. Skiera, C. Barrot, and J. U. Becker, "Seeding strategies for viral marketing: An empirical comparison," Journal of Marketing, vol. 75, no. 6, pp. 55--71, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  8. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance, "Cost-effective outbreak detection in networks," in Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2007, pp. 420--429.Google ScholarGoogle Scholar
  9. A. Goyal, W. Lu, and L. V. Lakshmanan, "Celf++: optimizing the greedy algorithm for influence maximization in social networks," in Proceedings of the 20th international conference companion on World wide web. ACM, 2011, pp. 47--48.Google ScholarGoogle Scholar
  10. K. Jung, W. Heo, and W. Chen, "Irie: Scalable and robust influence maximization in social networks," in Data Mining (ICDM), 2012 IEEE 12th International Conference on. IEEE, 2012, pp. 918--923.Google ScholarGoogle Scholar
  11. W. Chen, Y. Wang, and S. Yang, "Efficient influence maximization in social networks," in Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2009, pp. 199--208.Google ScholarGoogle Scholar
  12. W. Chen, C. Wang, and Y. Wang, "Scalable influence maximization for prevalent viral marketing in large-scale social networks," in Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 2010, pp. 1029--1038.Google ScholarGoogle Scholar
  13. J. Jankowski, P. Bródka, P. Kazienko, B. K. Szymanski, R. Michalski, and T. Kajdanowicz, "Balancing speed and coverage by sequential seeding in complex networks," Scientific reports, vol. 7, no. 1, pp. 1--11, 2017.Google ScholarGoogle ScholarCross RefCross Ref
  14. D. Goldenberg, A. Sela, and E. Shmueli, "Timing matters: Influence maximization in social networks through scheduled seeding," IEEE Transactions on Computational Social Systems, vol. 5, no. 3, pp. 621--638, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  15. A. Sela, D. Goldenberg, E. Shmueli, and I. Ben-Gal, "Scheduled seeding for latent viral marketing," in Advances in Social Networks Analysis and Mining (ASONAM), 2016 IEEE/ACM International Conference on. IEEE, 2016, pp. 642--643.Google ScholarGoogle Scholar
  16. J. Jankowski, M. Waniek, A. Alshamsi, P. Bródka, and R. Michalski, "Strategic distribution of seeds to support diffusion in complex networks," PloS one, vol. 13, no. 10, p. e0205130, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  17. A. Goyal, F. Bonchi, and L. V. Lakshmanan, "Learning influence probabilities in social networks," in Proceedings of the third ACM international conference on Web search and data mining. ACM, 2010, pp. 241--250.Google ScholarGoogle Scholar
  18. R. M. Anderson, R. M. May, and B. Anderson, Infectious diseases of humans: dynamics and control. Wiley Online Library, 1992, vol. 28.Google ScholarGoogle Scholar
  19. F. Chierichetti, J. Kleinberg, and A. Panconesi, "How to schedule a cascade in an arbitrary graph," SIAM Journal on Computing, vol. 43, no. 6, pp. 1906--1920, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. S. Lin, Q. Hu, F. Wang, and S. Y. Philip, "Steering information diffusion dynamically against user attention limitation," in Data Mining (ICDM), 2014 IEEE International Conference on. IEEE, 2014, pp. 330--339.Google ScholarGoogle Scholar
  21. A. Sela, D. Goldenberg, I. Ben-Gal, and E. Shmueli, "Active viral marketing: Incorporating continuous active seeding efforts into the diffusion model," Expert Systems with Applications, vol. 107, pp. 45--60, 2018.Google ScholarGoogle ScholarCross RefCross Ref
  22. T. Lev and E. Shmueli, "State-based targeted vaccination," Applied Network Science, vol. 6, no. 1, pp. 1--16, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  23. T. Lev, I. Ben-Gal, and E. Shmueli, "Influence maximization through scheduled seeding in a real-world setting," IEEE Transactions on Computational Social Systems, 2021.Google ScholarGoogle ScholarCross RefCross Ref
  24. D. Goldenberg, J. Albert, L. Bernardi, and P. Estevez, "Free lunch! retrospective uplift modeling for dynamic promotions recommendation within roi constraints," in Fourteenth ACM Conference on Recommender Systems, 2020, pp. 486--491.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. M. Gardner, "Mathematical games: The fantastic combinations of john conway's new solitaire game "life"," Scientific American, vol. 223, no. 4, pp. 120--123, 1970.Google ScholarGoogle ScholarCross RefCross Ref
  26. R. Albert and A.-L. Barabási, "Statistical mechanics of complex networks," Reviews of modern physics, vol. 74, no. 1, p. 47, 2002.Google ScholarGoogle ScholarCross RefCross Ref
  27. A.-L. Barabási, R. Albert, and H. Jeong, "Scale-free characteristics of random networks: the topology of the world-wide web," Physica A: statistical mechanics and its applications, vol. 281, no. 1, pp. 69--77, 2000.Google ScholarGoogle Scholar
  28. A. Beveridge and J. Shan, "Network of thrones," Math Horizons, vol. 23, no. 4, pp. 18--22, 2016.Google ScholarGoogle ScholarCross RefCross Ref
  29. P. Laborie, J. Rogerie, P. Shaw, and P. Vilím, "Ibm ilog cp optimizer for scheduling," Constraints, vol. 23, no. 2, pp. 210--250, 2018.Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. P. Bonacich, "Some unique properties of eigenvector centrality," Social networks, vol. 29, no. 4, pp. 555--564, 2007.Google ScholarGoogle ScholarCross RefCross Ref
  31. J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap.stanford.edu/data, Jun. 2014.Google ScholarGoogle Scholar
  32. D. Goldenberg, "Social network analysis: From graph theory to applications with python," in PyCon'19 - The 3rd Annual Israeli Python Conference, 2019.Google ScholarGoogle Scholar
  33. A. Hagberg, P. Swart, and D. S Chult, "Exploring network structure, dynamics, and function using networkx," Los Alamos National Lab.(LANL), Los Alamos, NM (United States), Tech. Rep., 2008.Google ScholarGoogle Scholar
  34. I. I. C. O. Studio-CPLEX, "Users manual-version 12 release 6," IBM ILOG CPLEX Division: Incline Village, NV, USA, 2013.Google ScholarGoogle Scholar

Index Terms

  1. Deterministic influence maximization approach for sequential active marketing
              Index terms have been assigned to the content through auto-classification.

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in
              • Published in

                cover image ACM Conferences
                ASONAM '21: Proceedings of the 2021 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
                November 2021
                693 pages
                ISBN:9781450391283
                DOI:10.1145/3487351

                Copyright © 2021 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 19 January 2022

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article

                Acceptance Rates

                ASONAM '21 Paper Acceptance Rate22of118submissions,19%Overall Acceptance Rate116of549submissions,21%

                Upcoming Conference

                KDD '24
              • Article Metrics

                • Downloads (Last 12 months)19
                • Downloads (Last 6 weeks)2

                Other Metrics

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader