Seeding influential nodes in non-submodular models of information diffusion

Verfasser / Beitragende:
[Elliot Anshelevich, Ameya Hate, Malik Magdon-Ismail]
Ort, Verlag, Jahr:
2015
Enthalten in:
Autonomous Agents and Multi-Agent Systems, 29/1(2015-01-01), 131-159
Format:
Artikel (online)
ID: 605514593
LEADER caa a22 4500
001 605514593
003 CHVBK
005 20210128100705.0
007 cr unu---uuuuu
008 210128e20150101xx s 000 0 eng
024 7 0 |a 10.1007/s10458-014-9254-4  |2 doi 
035 |a (NATIONALLICENCE)springer-10.1007/s10458-014-9254-4 
245 0 0 |a Seeding influential nodes in non-submodular models of information diffusion  |h [Elektronische Daten]  |c [Elliot Anshelevich, Ameya Hate, Malik Magdon-Ismail] 
520 3 |a We consider the model of information diffusion in social networks from Hui et al. (Agentbased simulation of the diffusion of warnings, 2010) which incorporates trust (weighted links) between actors, and allows actors to actively participate in the spreading process, specifically through the ability to query friends for additional information. This model captures how social agents transmit and act upon information more realistically as compared to the simpler threshold and cascade models. However, it is more difficult to analyze, in particular with respect to seeding strategies. We present efficient, scalable algorithms for determining good seed sets—initial nodes to inject with the information. Our general approach is to reduce our model to a class of simpler models for which provably good sets can be constructed. By tuning this class of simpler models, we obtain a good seed set for the original more complex model. We call this the projected greedy approach because a model is ‘projected' onto a class of simpler models where the greedy seed set selection is near-optimal. We demonstrate the effectiveness of our seeding strategy on synthetic graphs as well as a realistic San Diego evacuation network constructed during the 2007 fires, and the DBLP network of collaborations. 
540 |a The Author(s), 2014 
690 7 |a Diffusion  |2 nationallicence 
690 7 |a Evacuation  |2 nationallicence 
690 7 |a Multi-agent systems  |2 nationallicence 
700 1 |a Anshelevich  |D Elliot  |u Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA  |4 aut 
700 1 |a Hate  |D Ameya  |u Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA  |4 aut 
700 1 |a Magdon-Ismail  |D Malik  |u Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA  |4 aut 
773 0 |t Autonomous Agents and Multi-Agent Systems  |d Springer US; http://www.springer-ny.com  |g 29/1(2015-01-01), 131-159  |x 1387-2532  |q 29:1<131  |1 2015  |2 29  |o 10458 
856 4 0 |u https://doi.org/10.1007/s10458-014-9254-4  |q text/html  |z Onlinezugriff via DOI 
898 |a BK010053  |b XK010053  |c XK010000 
900 7 |a Metadata rights reserved  |b Springer special CC-BY-NC licence  |2 nationallicence 
908 |D 1  |a research-article  |2 jats 
949 |B NATIONALLICENCE  |F NATIONALLICENCE  |b NL-springer 
950 |B NATIONALLICENCE  |P 856  |E 40  |u https://doi.org/10.1007/s10458-014-9254-4  |q text/html  |z Onlinezugriff via DOI 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Anshelevich  |D Elliot  |u Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA  |4 aut 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Hate  |D Ameya  |u Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA  |4 aut 
950 |B NATIONALLICENCE  |P 700  |E 1-  |a Magdon-Ismail  |D Malik  |u Computer Science Department, Rensselaer Polytechnic Institute, Troy, NY, USA  |4 aut 
950 |B NATIONALLICENCE  |P 773  |E 0-  |t Autonomous Agents and Multi-Agent Systems  |d Springer US; http://www.springer-ny.com  |g 29/1(2015-01-01), 131-159  |x 1387-2532  |q 29:1<131  |1 2015  |2 29  |o 10458