Skip to main content
Top
Published in:

01-12-2016 | Original Article

Computing competing cascades on signed networks

Authors: Ajitesh Srivastava, Charalampos Chelmis, Viktor K. Prasanna

Published in: Social Network Analysis and Mining | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Often in marketing, political campaigns and social media, two competing products or opinions propagate over a social network. Studying social influence in such competing cascade scenarios enables building effective strategies for maximizing the propagation of one process by targeting the most “influential” nodes in the network. The majority of prior work, however, focuses on unsigned networks where individuals adopt the opinion of their neighbors with certain probability. In real life, relationships between individuals can be positive (e.g., friend of relationship) or negative (e.g., connection between “foes”). According to social theory, people tend to have similar opinions to their friends but opposite of their foes. We study the problem of competing cascades on signed networks, which has been relatively unexplored. Particularly, we study the progressive propagation of two competing cascades in a signed network under the Independent Cascade Model and Generalized Linear Threshold Model and provide an approximate analytical solution to compute the probability of infection of a node at any given time. We validate the quality of our approximation on several synthetic graphs. We leverage our analytical solution to the problem of competing cascades in signed networks to develop a heuristic for the influence maximization problem. We allow the seed-set to be initialized with populations of both cascades with the end goal of maximizing the spread of one cascade. We validate our approach on several large-scale real-world and synthetic networks. Our experiments demonstrate that our influence maximization heuristic significantly outperforms state-of-the-art methods, particularly when the network is dominated by distrust relationships.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
1
ksdensity function in MATLAB.
 
Literature
go back to reference Bharathi S, Kempe D, Salek M (2007) Competitive influence maximization in social networks. In: Deng X, Graham FC (eds) Internet and network economics: third international workshop on WINE. Springer, Berlin, pp 306–311CrossRef Bharathi S, Kempe D, Salek M (2007) Competitive influence maximization in social networks. In: Deng X, Graham FC (eds) Internet and network economics: third international workshop on WINE. Springer, Berlin, pp 306–311CrossRef
go back to reference Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: Saberi A (ed) Internet and network economics: 6th international workshop on WINE. Springer, Berlin, pp 539–550CrossRef Borodin A, Filmus Y, Oren J (2010) Threshold models for competitive influence in social networks. In: Saberi A (ed) Internet and network economics: 6th international workshop on WINE. Springer, Berlin, pp 539–550CrossRef
go back to reference Budak C, Agrawal D, El Abbadi A (2012) Diffusion of information in social networks: is it all local? In: ICDM, pp 121–130 Budak C, Agrawal D, El Abbadi A (2012) Diffusion of information in social networks: is it all local? In: ICDM, pp 121–130
go back to reference Chelmis C, Prasanna VK (2013) The role of organization hierarchy in technology adoption at the workplace. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 8–15 Chelmis C, Prasanna VK (2013) The role of organization hierarchy in technology adoption at the workplace. In: Proceedings of the 2013 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 8–15
go back to reference Chelmis C, Srivastava A, Prasanna VK (2014) Computational models of technology adoption at the workplace. Soc Netw Anal Min 4(1):1–18CrossRef Chelmis C, Srivastava A, Prasanna VK (2014) Computational models of technology adoption at the workplace. Soc Netw Anal Min 4(1):1–18CrossRef
go back to reference Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 199–208 Chen W, Wang Y, Yang S (2009) Efficient influence maximization in social networks. In: Proceedings of the 15th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 199–208
go back to reference Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 1029–1038 Chen W, Wang C, Wang Y (2010) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 1029–1038
go back to reference Chen W, Collins A, Cummings R, Ke T, Liu Z, Rincon D, Sun X, Wang Y, Wei W, Yuan Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate. In: SDM, SIAM, vol 11, pp 379–390 Chen W, Collins A, Cummings R, Ke T, Liu Z, Rincon D, Sun X, Wang Y, Wei W, Yuan Y (2011) Influence maximization in social networks when negative opinions may emerge and propagate. In: SDM, SIAM, vol 11, pp 379–390
go back to reference Chen W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process. arXiv:12043074 Chen W, Lu W, Zhang N (2012) Time-critical influence maximization in social networks with time-delayed diffusion process. arXiv:​12043074
go back to reference Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 57–66 Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 57–66
go back to reference Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, CambridgeCrossRefMATH Easley D, Kleinberg J (2010) Networks, crowds, and markets: reasoning about a highly connected world. Cambridge University Press, CambridgeCrossRefMATH
go back to reference Goyal A, Lu W, Lakshmanan LV (2011) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: 2011 IEEE 11th international conference on data mining (ICDM). IEEE, pp 211–220 Goyal A, Lu W, Lakshmanan LV (2011) Simpath: an efficient algorithm for influence maximization under the linear threshold model. In: 2011 IEEE 11th international conference on data mining (ICDM). IEEE, pp 211–220
go back to reference He X, Song G, Chen W, Jiang Q (2012) Influence blocking maximization in social networks under the competitive linear threshold model. In: SDM, SIAM, pp 463–474 He X, Song G, Chen W, Jiang Q (2012) Influence blocking maximization in social networks under the competitive linear threshold model. In: SDM, SIAM, pp 463–474
go back to reference Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 137–146 Kempe D, Kleinberg J, Tardos É (2003) Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 137–146
go back to reference Leskovec J, Chakrabarti D, Kleinberg J, Faloutsos C, Ghahramani Z (2010a) Kronecker graphs: an approach to modeling networks. The Journal of Machine Learning Research 11:985–1042MathSciNetMATH Leskovec J, Chakrabarti D, Kleinberg J, Faloutsos C, Ghahramani Z (2010a) Kronecker graphs: an approach to modeling networks. The Journal of Machine Learning Research 11:985–1042MathSciNetMATH
go back to reference Leskovec J, Huttenlocher D, Kleinberg J (2010b) Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1361–1370 Leskovec J, Huttenlocher D, Kleinberg J (2010b) Signed networks in social media. In: Proceedings of the SIGCHI conference on human factors in computing systems. ACM, pp 1361–1370
go back to reference Li Y, Chen W, Wang Y, Zhang ZL (2013) Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the sixth ACM international conference on web search and data mining. ACM, pp 657–666 Li Y, Chen W, Wang Y, Zhang ZL (2013) Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In: Proceedings of the sixth ACM international conference on web search and data mining. ACM, pp 657–666
go back to reference Li D, Xu ZM, Chakraborty N, Gupta A, Sycara K, Li S (2014) Polarity related influence maximization in signed social networks. PLoS One 9(7):e102,199CrossRef Li D, Xu ZM, Chakraborty N, Gupta A, Sycara K, Li S (2014) Polarity related influence maximization in signed social networks. PLoS One 9(7):e102,199CrossRef
go back to reference Matsubara Y, Sakurai Y, Faloutsos C (2015) The web as a jungle: non-linear dynamical systems for co-evolving online activities. In: Proceedings of the 24th international conference on world wide web. ACM, pp 721–731 Matsubara Y, Sakurai Y, Faloutsos C (2015) The web as a jungle: non-linear dynamical systems for co-evolving online activities. In: Proceedings of the 24th international conference on world wide web. ACM, pp 721–731
go back to reference Myers SA, Leskovec J (2012) Clash of the contagions: Cooperation and competition in information diffusion. In: ICDM, Citeseer, vol 12, pp 539–548 Myers SA, Leskovec J (2012) Clash of the contagions: Cooperation and competition in information diffusion. In: ICDM, Citeseer, vol 12, pp 539–548
go back to reference Pathak N, Banerjee A, Srivastava J (2010) A generalized linear threshold model for multiple cascades. In: 2010 IEEE 10th international conference on data mining (ICDM). IEEE, pp 965–970 Pathak N, Banerjee A, Srivastava J (2010) A generalized linear threshold model for multiple cascades. In: 2010 IEEE 10th international conference on data mining (ICDM). IEEE, pp 965–970
go back to reference Srivastava A, Chelmis C, Prasanna VK (2014) Influence in social networks: a unified model? In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE, pp 451–454 Srivastava A, Chelmis C, Prasanna VK (2014) Influence in social networks: a unified model? In: 2014 IEEE/ACM international conference on advances in social networks analysis and mining (ASONAM). IEEE, pp 451–454
go back to reference Srivastava A, Chelmis C, Prasanna VK (2015) Social influence computation and maximization in signed networks with competing cascades. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 41–48 Srivastava A, Chelmis C, Prasanna VK (2015) Social influence computation and maximization in signed networks with competing cascades. In: Proceedings of the 2015 IEEE/ACM international conference on advances in social networks analysis and mining. ACM, pp 41–48
go back to reference Wang C, Chen W, Wang Y (2012) Scalable influence maximization for independent cascade model in large-scale social networks. Data Min Knowl Discov 25(3):545–576MathSciNetCrossRefMATH Wang C, Chen W, Wang Y (2012) Scalable influence maximization for independent cascade model in large-scale social networks. Data Min Knowl Discov 25(3):545–576MathSciNetCrossRefMATH
Metadata
Title
Computing competing cascades on signed networks
Authors
Ajitesh Srivastava
Charalampos Chelmis
Viktor K. Prasanna
Publication date
01-12-2016
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2016
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-016-0392-3

Premium Partner