skip to main content
10.1145/3038912.3052567acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article
Public Access

Exact Computation of Influence Spread by Binary Decision Diagrams

Published:03 April 2017Publication History

ABSTRACT

Evaluating influence spread in social networks is a fundamental procedure to estimate the word-of-mouth effect in viral marketing. There are enormous studies about this topic; however, under the standard stochastic cascade models, the exact computation of influence spread is known to be #P-hard. Thus, the existing studies have used Monte-Carlo simulation-based approximations to avoid exact computation.

We propose the first algorithm to compute influence spread exactly under the independent cascade model. The algorithm first constructs binary decision diagrams (BDDs) for all possible realizations of influence spread, then computes influence spread by dynamic programming on the constructed BDDs. To construct the BDDs efficiently, we designed a new frontier-based search-type procedure. The constructed BDDs can also be used to solve other influence-spread related problems, such as random sampling without rejection, conditional influence spread evaluation, dynamic probability update, and gradient computation for probability optimization problems.

We conducted computational experiments to evaluate the proposed algorithm. The algorithm successfully computed influence spread on real-world networks with a hundred edges in a reasonable time, which is quite impossible by the naive algorithm. We also conducted an experiment to evaluate the accuracy of the Monte-Carlo simulation-based approximation by comparing exact influence spread obtained by the proposed algorithm.

References

  1. C. Borgs, M. Brautbar, J. Chayes, and B. Lucier. Maximizing social influence in nearly optimal time. In SODA, pages 946--957, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. B. Brecht and C. J. Colbourn. Lower bounds on two-terminal network reliability. Discrete Applied Mathematics, 21(3):185--198, 1988. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. R. E. Bryant. Graph-based algorithms for boolean function manipulation. Transactions on Computers, 100(8):677--691, 1986. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Chen, C. Wang, and Y. Wang. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In KDD, pages 1029--1038, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In KDD, pages 199--208, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. S. Cheng, H. Shen, J. Huang, G. Zhang, and X. Cheng. Staticgreedy: solving the scalability-accuracy dilemma in influence maximization. In CIKM, pages 509--518, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. E. Cohen, D. Delling, T. Pajor, and R. F. Werneck. Sketch-based influence maximization and computation: Scaling up with guarantees. In CIKM, pages 629--638, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. P. Domingos and M. Richardson. Mining the network value of customers. In KDD, pages 57--66, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. Even, A. Itai, and A. Shamir. On the complexity of time table and multi-commodity flow problems. In FOCS, pages 184--193, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 12(3):211--223, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  11. J. Goldenberg, B. Libai, and E. Muller. Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata. Academy of Marketing Science Review, 2001:1, 2001.Google ScholarGoogle Scholar
  12. A. Goyal, W. Lu, and L. V. Lakshmanan. Simpath: An efficient algorithm for influence maximization under the linear threshold model. In ICDM, pages 211--220, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. G. Hardy, C. Lucet, and N. Limnios. Computing all-terminal reliability of stochastic networks with binary decision diagrams. In ASMDA, pages 17--20. Citeseer, 2005.Google ScholarGoogle Scholar
  14. K. Inoue, T. Sato, M. Ishihata, Y. Kameya, and H. Nabeshima. Evaluating abductive hypotheses using an em algorithm on bdds. In IJCAI, pages 810--815, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Y. Inoue and S. Minato. Acceleration of ZDD construction for subgraph enumeration via path-width optimization. TCS-TR-A-16-80. Hokkaido University, 2016.Google ScholarGoogle Scholar
  16. M. Ishihata, Y. Kameya, T. Sato, and S. Minato. Propositionalizing the em algorithm by bdds. In Late Breaking Papers of the 18th International Conference on Inductive Logic Programming, pages 44--49, 2008.Google ScholarGoogle Scholar
  17. M. Ishihata and T. Sato. Bayesian inference for statistical abduction using markov chain monte carlo. In ACML, pages 81--96, 2011.Google ScholarGoogle Scholar
  18. J. Kawahara, T. Inoue, H. Iwashita, and S. Minato. Frontier-based search for enumerating all constrained subgraphs with compressed representation. TCS-TR-A-13-64. Hokkaido University, 2014.Google ScholarGoogle Scholar
  19. D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In KDD, pages 137--146, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. N. G. Kinnersley. The vertex separation number of a graph equals its path-width. Information Processing Letters, 42(6):345--350, 1992. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. Knuth. The art of computer programming: Bitwise tricks & techniques; binary decision diagrams, volume 4, fascicle 1, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost-effective outbreak detection in networks. In KDD, pages 420--429, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Minato, N. Ishiura, and S. Yajima. Shared binary decision diagram with attributed edges for efficient boolean function manipulation. In DAC, pages 52--57, 1990. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. L. Nemhauser, L. A. Wolsey, and M. L. Fisher. An analysis of approximations for maximizing submodular set functions?i. Mathematical Programming, 14(1):265--294, 1978.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. N. Ohsaka, T. Akiba, Y. Yoshida, and K. Kawarabayashi. Fast and accurate influence maximization on large networks with pruned monte-carlo simulations. In AAAI, pages 138--144, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. N. Ohsaka, T. Akiba, Y. Yoshida, and K. Kawarabayashi. Dynamic influence analysis in evolving networks. VLDB, 9(12):1077--1088, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD, pages 61--70, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. K. Sekine, H. Imai, and S. Tani. Computing the tutte polynomial of a graph of moderate size. In International Symposium on Algorithms and Computation, pages 224--233. Springer, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. D. Sieling and I. Wegener. Reduction of obdds in linear time. Information Processing Letters, 48(3):139--144, 1993. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Y. Tang, Y. Shi, and X. Xiao. Influence maximization in near-linear time: A martingale approach. In SIGMOD, pages 1539--1554, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Y. Tang, X. Xiao, and Y. Shi. Influence maximization: Near-optimal time complexity meets practical efficiency. In SIGMOD, pages 75--86, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. L. G. Valiant. The complexity of enumeration and reliability problems. SIAM Journal on Computing, 8(3):410--421, 1979.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Z. Yan, C. Nie, R. Dong, X. Gao, and J. Liu. A novel OBDD-based reliability evaluation algorithm for wireless sensor networks on the multicast model. Mathematical Problems in Engineering, 2015, 2015.Google ScholarGoogle Scholar
  34. R. Yoshinaka, T. Saitoh, J. Kawahara, K. Tsuruma, H. Iwashita, and S.-i. Minato. Finding all solutions and instances of numberlink and slitherlink by zdds. Algorithms, 5(2):176--213, 2012.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Exact Computation of Influence Spread by Binary Decision Diagrams

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            WWW '17: Proceedings of the 26th International Conference on World Wide Web
            April 2017
            1678 pages
            ISBN:9781450349130

            Copyright © 2017 Copyright is held by the International World Wide Web Conference Committee (IW3C2).

            Publisher

            International World Wide Web Conferences Steering Committee

            Republic and Canton of Geneva, Switzerland

            Publication History

            • Published: 3 April 2017

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            WWW '17 Paper Acceptance Rate164of966submissions,17%Overall Acceptance Rate1,899of8,196submissions,23%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader