skip to main content
10.1145/2600428.2609616acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
research-article

Predicting trending messages and diffusion participants in microblogging network

Authors Info & Claims
Published:03 July 2014Publication History

ABSTRACT

Microblogging services have emerged as an essential way to strengthen the communications among individuals. One of the most important features of microblog over traditional social networks is the extensive proliferation in information diffusion. As the outbreak of information diffusion often brings in valuable opportunities or devastating effects, it will be beneficial if a mechanism can be provided to predict whether a piece of information will become viral, and which part of the network will participate in propagating this information. In this work, we define three types of influences, namely, interest-oriented influence, social-oriented influence, and epidemic-oriented influence, that will affect a user's decision on whether to perform a diffusion action. We propose a diffusion-targeted influence model to differentiate and quantify various types of influence. Further we model the problem of diffusion prediction by factorizing a user's intention to transmit a microblog into these influences. The learned prediction model is then used to predict the future diffusion state of any new microblog. We conduct experiments on a real-world microblogging dataset to evaluate our method, and the results demonstrate the superiority of the proposed framework as compared to the state-of-the-art approaches.

References

  1. A. Anagnostopoulos, R. Kumar, and M. Mahdian. Influence and correlation in social networks. In SIGKDD, pages 7--15, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone's an influencer: quantifying influence on twitter. In WSDM, pages 65--74, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Bian, Y. Yang, and T.-S. Chua. Multimedia summarization for trending topics in microblogs. In CIKM, pages 1807--1812, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. Cha, H. Haddadi, F. Benevenuto, and P. K. Gummadi. Measuring user influence in twitter: The million follower fallacy. ICWSM, 10:10--17, 2010.Google ScholarGoogle ScholarCross RefCross Ref
  5. W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In SIGKDD, pages 1029--1038, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In SIGKDD, pages 199--208, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Y. Chen, H. Amiri, Z. Li, and T.-S. Chua. Emerging topic detection for organizations from microblogs. In SIGIR, pages 43--52, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. T.-S. Chua, H. Luan, M. Sun, and S. Yang. Next: Nus-tsinghua center for extreme search of user-generated content. IEEE MultiMedia, 19(3):81--87, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. P. Cui, S. Jin, L. Yu, F. Wang, W. Zhu, and S. Yang. Cascading outbreak prediction in networks: a data-driven approach. In SIGKDD, pages 901--909, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters, 12(3):211--223, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  11. A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In WSDM, pages 241--250, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. A. Goyal, F. Bonchi, and L. V. Lakshmanan. A data-based approach to social influence maximization. PVLDB, 5(1):73--84, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In WWW, pages 491--501, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. A. Guille, H. Hacid, C. Favre, and D. A. Zighed. Information diffusion in online social networks: A survey. SIGMOD Record, 42(2):17, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Hong, O. Dan, and B. D. Davison. Predicting popular messages in twitter. In WWW, pages 57--58, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In SIGKDD, pages 137--146, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. F. R. Kschischang, B. J. Frey, and H.-A. Loeliger. Factor graphs and the sum-product algorithm. TIT, 47(2):498--519, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. R. Kumar, J. Novak, P. Raghavan, and A. Tomkins. On the bursty evolution of blogspace. WWW, 8(2):159--178, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. T. La Fond and J. Neville. Randomization tests for distinguishing social influence and homophily effects. In WWW, pages 601--610, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In SIGKDD, pages 420--429, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. S. J. Pan, I. W. Tsang, J. T. Kwok, and Q. Yang. Domain adaptation via transfer component analysis. TNN, 22(2):199--210, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. C. Tan, J. Tang, J. Sun, Q. Lin, and F. Wang. Social action tracking via noise tolerant time-varying factor graphs. In SIGKDD, pages 1049--1058, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. J. Tang, W. Sen, and J. Sun. Confluence: conformity influence in large social networks. In SIGKDD, pages 347--355, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In SIGKDD, pages 807--816, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Z. Wen and W. Yin. A feasible method for optimization with orthogonality constraints. Mathematical Programming, pages 1--38, 2013.Google ScholarGoogle Scholar
  26. J. Weng, E.-P. Lim, J. Jiang, and Q. He. Twitterrank: finding topic-sensitive influential twitterers. In WSDM, pages 261--270, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. R. Xiang, J. Neville, and M. Rogati. Modeling relationship strength in online social networks. In WWW, pages 981--990, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Y. Yang, Y. Yang, Z. Huang, H. T. Shen, and F. Nie. Tag localization with spatial correlations and joint group sparsity. In CVPR, pages 881--888, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Y. Yang, Y. Yang, and H. T. Shen. Effective transfer tagging from image to video. TOMCCAP, 9(2):14, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Predicting trending messages and diffusion participants in microblogging network

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SIGIR '14: Proceedings of the 37th international ACM SIGIR conference on Research & development in information retrieval
        July 2014
        1330 pages
        ISBN:9781450322577
        DOI:10.1145/2600428

        Copyright © 2014 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 3 July 2014

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        SIGIR '14 Paper Acceptance Rate82of387submissions,21%Overall Acceptance Rate792of3,983submissions,20%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader