Skip to main content
Erschienen in: Social Network Analysis and Mining 1/2014

01.12.2014 | Original Article

A novel approach to online social influence maximization

verfasst von: Wen Xu, Zaixin Lu, Weili Wu, Zhiming Chen

Erschienen in: Social Network Analysis and Mining | Ausgabe 1/2014

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Online social networks are becoming a true growth point of Internet. As individuals constantly desire to interact with each other, the ability for Internet to deliver this networking influence becomes much stronger. In this paper, we study the online social influence maximization problem, which is to find a small group of influential users that maximizes the spread of influence through networks. After a thorough analysis of existing models, especially two classical ones, namely Independent cascade and linear thresholds, we argue that their idea that each user can only be activated by its active neighbors is not applicable to online social networks, since in many applications there is no clear concept for the issue of "activation". In our proposed influence model, if there is a social influence path linking two nonadjacent individuals, the value of influence between these two individuals can be evaluated along the existing social path based on the influence transitivity property under certain constraints. To compute influence probabilities between two neighbors, we also develop a new method which leverages both structure of networks and historical data. With reasonably learned influence probabilities, we recast the problem of online influence maximization to a weighted maximum cut problem which analyzes the influence flow among graph vertices. By running a semidefinite program-based (GW) algorithm on a complete influence graph, an optimal seed set can be identified effectively. We also provide experimental results on real online social networks, showing that our algorithm significantly outperforms greedy methods.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Akcora CG, Carminati B, Ferrari E (2011) Network and profile based measures for user similarities on social networks. In: IEEE international conference on information reuse and integration (IRI), pp 292–298 Akcora CG, Carminati B, Ferrari E (2011) Network and profile based measures for user similarities on social networks. In: IEEE international conference on information reuse and integration (IRI), pp 292–298
Zurück zum Zitat Albert R, Jeong H, Barabasi A (2000) Error and attack tolenrance of complex networks. Nature 406:378–382CrossRef Albert R, Jeong H, Barabasi A (2000) Error and attack tolenrance of complex networks. Nature 406:378–382CrossRef
Zurück zum Zitat Alizadeh F (1995) Interior point methods in semidefinite programming with applications to combinatorial optimization. SIAM J Optim 5:13–51CrossRefMathSciNetMATH Alizadeh F (1995) Interior point methods in semidefinite programming with applications to combinatorial optimization. SIAM J Optim 5:13–51CrossRefMathSciNetMATH
Zurück zum Zitat Aral S (2011) Identifying social influence: a Comment on opinion leadership and social contagion in new product diffusion. Mark Sci 30(2)217–223CrossRef Aral S (2011) Identifying social influence: a Comment on opinion leadership and social contagion in new product diffusion. Mark Sci 30(2)217–223CrossRef
Zurück zum Zitat Bakshy E et al (2011) Everyones an influencer: quantifying influence on Twitter. In: WSDM, pp 65–74 Bakshy E et al (2011) Everyones an influencer: quantifying influence on Twitter. In: WSDM, pp 65–74
Zurück zum Zitat Bhagat S, Goyal A, Lakshmanan LVS (2012) Maximizing product adoption in social networks. In: WSDM, pp 603–612 Bhagat S, Goyal A, Lakshmanan LVS (2012) Maximizing product adoption in social networks. In: WSDM, pp 603–612
Zurück zum Zitat Bross J, Richly K, Kohnen M, Meinel C (2012) Identifying the top-dogs of the blogosphere. Soc Netw Analy Min 2(1):53–67CrossRef Bross J, Richly K, Kohnen M, Meinel C (2012) Identifying the top-dogs of the blogosphere. Soc Netw Analy Min 2(1):53–67CrossRef
Zurück zum Zitat Burer S, Monteiro R (2004) Local minima and convergence in low-rank semidefinite programming. Math Progr 103(3):427–444CrossRefMathSciNet Burer S, Monteiro R (2004) Local minima and convergence in low-rank semidefinite programming. Math Progr 103(3):427–444CrossRefMathSciNet
Zurück zum Zitat Chen W, Wang C, Wang Y (2010a) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: KDD, pp 1029–1038 Chen W, Wang C, Wang Y (2010a) Scalable influence maximization for prevalent viral marketing in large-scale social networks. In: KDD, pp 1029–1038
Zurück zum Zitat Chen W, Yuan Y, Zhang L (2010b) Scalable influence maximization in social networks under the linear threshold model. In: ICDM, pp 88–97 Chen W, Yuan Y, Zhang L (2010b) Scalable influence maximization in social networks under the linear threshold model. In: ICDM, pp 88–97
Zurück zum Zitat Christianson B, Harbison WS (1996) Why isnt trust transitivie? In: International workshop on security protocols, pp 171–176 Christianson B, Harbison WS (1996) Why isnt trust transitivie? In: International workshop on security protocols, pp 171–176
Zurück zum Zitat Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD conference on knowledge discovery and data mining, pp 57–66 Domingos P, Richardson M (2001) Mining the network value of customers. In: Proceedings of the 7th ACM SIGKDD conference on knowledge discovery and data mining, pp 57–66
Zurück zum Zitat Ferri F, Grifoni P, Guzzo T (2012) New forms of social and professional digital relationships: the case of Facebook. Soc Netw Analy Mini 2(2):121–137CrossRef Ferri F, Grifoni P, Guzzo T (2012) New forms of social and professional digital relationships: the case of Facebook. Soc Netw Analy Mini 2(2):121–137CrossRef
Zurück zum Zitat Gimpel J, Karnes K, Mctague J, Pearson-Merkowitz S (2008) Distance-decay in the political geography of friends-and-neighbors voting. Polit Geogr 27:231–252CrossRef Gimpel J, Karnes K, Mctague J, Pearson-Merkowitz S (2008) Distance-decay in the political geography of friends-and-neighbors voting. Polit Geogr 27:231–252CrossRef
Zurück zum Zitat Goemans MX, Williamson DP (1995) Improved approximation algorithms for maximum cut and satisfiability using semidefinite programming. J ACM, 42(6):1145CrossRefMathSciNet Goemans MX, Williamson DP (1995) Improved approximation algorithms for maximum cut and satisfiability using semidefinite programming. J ACM, 42(6):1145CrossRefMathSciNet
Zurück zum Zitat Goyal A, Bonchi F, Lakshmanan LVS (2010) Learning influence probabilities in social networks. In: WSDM, pp 241–250 Goyal A, Bonchi F, Lakshmanan LVS (2010) Learning influence probabilities in social networks. In: WSDM, pp 241–250
Zurück zum Zitat Goyal A, Lu W, Lakshmanan LVS (2011) A data-based approach to social influence maximization. In: PVLDB, vol 5, no 1 Goyal A, Lu W, Lakshmanan LVS (2011) A data-based approach to social influence maximization. In: PVLDB, vol 5, no 1
Zurück zum Zitat Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: WWW, pp 403–412 Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: WWW, pp 403–412
Zurück zum Zitat Hang C, Wang Y, Singh M (2009) Operators for propagating trust and their evaluation in social networks. In: AAMAS, pp 1025–1032 Hang C, Wang Y, Singh M (2009) Operators for propagating trust and their evaluation in social networks. In: AAMAS, pp 1025–1032
Zurück zum Zitat Ienco D, Bonchi F, Castillo C (2010) The meme ranking problem: maximizing microblogging virality. In: SIASP workshop of ICDM, pp 328–335 Ienco D, Bonchi F, Castillo C (2010) The meme ranking problem: maximizing microblogging virality. In: SIASP workshop of ICDM, pp 328–335
Zurück zum Zitat Iyengar R, Van den Bulte C, Valente TW (2011) Opinion leadership and social contagion in new product diffusion. Mark Sci 30(2):195–212CrossRef Iyengar R, Van den Bulte C, Valente TW (2011) Opinion leadership and social contagion in new product diffusion. Mark Sci 30(2):195–212CrossRef
Zurück zum Zitat Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: RecSys, pp 135–142 Jamali M, Ester M (2010) A matrix factorization technique with trust propagation for recommendation in social networks. In: RecSys, pp 135–142
Zurück zum Zitat Jin Y, Lin CY, Matsuo Y, Ishizuka M (2012) Mining dynamic social networks from public news articles for company value prediction. Soc Netw Anal Min 2(3):217–228CrossRef Jin Y, Lin CY, Matsuo Y, Ishizuka M (2012) Mining dynamic social networks from public news articles for company value prediction. Soc Netw Anal Min 2(3):217–228CrossRef
Zurück zum Zitat Josang A, Pope S.: (2005) Semantic constraints for trust transitivity. In: APCCM, pp 59–68 Josang A, Pope S.: (2005) Semantic constraints for trust transitivity. In: APCCM, pp 59–68
Zurück zum Zitat Kempe D, Kleinberg JM, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD conference on knowledge discovery and data mining, pp 137–146 Kempe D, Kleinberg JM, Tardos E (2003) Maximizing the spread of influence through a social network. In: Proceedings of the 9th ACM SIGKDD conference on knowledge discovery and data mining, pp 137–146
Zurück zum Zitat Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: Proceedings of the 10th European conference on principles and practice of knowledge discovery in databases, pp 259–271 Kimura M, Saito K (2006) Tractable models for information diffusion in social networks. In: Proceedings of the 10th European conference on principles and practice of knowledge discovery in databases, pp 259–271
Zurück zum Zitat Lappas T, Terzi E, Gunopulos D, Mannila H (2010) Finding effectors in social networks. In: KDD, pp 1059–1068 Lappas T, Terzi E, Gunopulos D, Mannila H (2010) Finding effectors in social networks. In: KDD, pp 1059–1068
Zurück zum Zitat Leskovec J, Krause A, Guestrin C, Faloutsos C, Van-Briesen J, Glance NS (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD conference on knowledge discovery and data mining, pp 420–429 Leskovec J, Krause A, Guestrin C, Faloutsos C, Van-Briesen J, Glance NS (2007) Cost-effective outbreak detection in networks. In: Proceedings of the 13th ACM SIGKDD conference on knowledge discovery and data mining, pp 420–429
Zurück zum Zitat Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web (TWEB) 1(1):5CrossRef Leskovec J, Adamic LA, Huberman BA (2007) The dynamics of viral marketing. ACM Trans Web (TWEB) 1(1):5CrossRef
Zurück zum Zitat Li L, Wang Y, Lim E (2009) Trust-oriented composite services selection and discovery. In: ICSOC, pp 50–67 Li L, Wang Y, Lim E (2009) Trust-oriented composite services selection and discovery. In: ICSOC, pp 50–67
Zurück zum Zitat Ma H, King I, Lyu MR (2007) Effective missing data prediction for collaborative filtering. In: Proceedings of the 30th annual international ACM SIGIR conference on research and development in information retrieval, USA, pp 39–46 Ma H, King I, Lyu MR (2007) Effective missing data prediction for collaborative filtering. In: Proceedings of the 30th annual international ACM SIGIR conference on research and development in information retrieval, USA, pp 39–46
Zurück zum Zitat Mathioudakis M, Bonchi F, Castillo C, Gionis A, Ukkonen A (2011) Sparsification of influence networks. In: KDD, pp 529–537 Mathioudakis M, Bonchi F, Castillo C, Gionis A, Ukkonen A (2011) Sparsification of influence networks. In: KDD, pp 529–537
Zurück zum Zitat Nail J (2004) The consumer advertising backlash. In: Forrester research and intelliseek market research report Nail J (2004) The consumer advertising backlash. In: Forrester research and intelliseek market research report
Zurück zum Zitat Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp 61–70 Richardson M, Domingos P (2002) Mining knowledge-sharing sites for viral marketing. In: Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining, pp 61–70
Zurück zum Zitat Saito K et al (2008) Prediction of information diffusion probabilities for independent cascade model. In: KES, pp 67–75 Saito K et al (2008) Prediction of information diffusion probabilities for independent cascade model. In: KES, pp 67–75
Zurück zum Zitat Song X, Chi Y, Hino K, Tseng BL (2007) Information flow modeling based on diffusion rate for prediction and ranking. In: WWW, pp 191–200 Song X, Chi Y, Hino K, Tseng BL (2007) Information flow modeling based on diffusion rate for prediction and ranking. In: WWW, pp 191–200
Zurück zum Zitat Walter F, Battiston S, Schweitzer F (2008) A model of a trust-based recommendation system on a social network. AAMAS 16(1):57–74 Walter F, Battiston S, Schweitzer F (2008) A model of a trust-based recommendation system on a social network. AAMAS 16(1):57–74
Zurück zum Zitat Wasserman S, Faust K (1994) Social network analysis. Cambridge university Press, CambridgeCrossRef Wasserman S, Faust K (1994) Social network analysis. Cambridge university Press, CambridgeCrossRef
Metadaten
Titel
A novel approach to online social influence maximization
verfasst von
Wen Xu
Zaixin Lu
Weili Wu
Zhiming Chen
Publikationsdatum
01.12.2014
Verlag
Springer Vienna
Erschienen in
Social Network Analysis and Mining / Ausgabe 1/2014
Print ISSN: 1869-5450
Elektronische ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-014-0153-0

Weitere Artikel der Ausgabe 1/2014

Social Network Analysis and Mining 1/2014 Zur Ausgabe