[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1566374.1566424acmconferencesArticle/Chapter ViewAbstractPublication PagesecConference Proceedingsconference-collections
research-article

An exact almost optimal algorithm for target set selection in social networks

Published: 06 July 2009 Publication History

Abstract

The Target Set Selection problem proposed by Kempe, Kleinberg, and Tardos, gives a nice clean combinatorial formulation for many problems arising in economy, sociology, and medicine. Its input is a graph with vertex thresholds, the social network, and the goal is to find a subset of vertices, the target set, that "activates" a prespecified number of vertices in the graph. Activation of a vertex is defined via a so-called activation process as follows: Initially, all vertices in the target set become active. Then at each step i of the process, each vertex gets activated if the number of its active neighbors at iteration i -- 1 exceeds its threshold. The activation process is "monotone" in the sense that once a vertex is activated, it remains active for the entire process.
Unsurprisingly perhaps, Target Set Selection is NPC. More surprising is the fact that both of its maximization and minimization variants turn out to be extremely hard to approximate, even for very restrictive special cases. The only known case for which the problem is known to have some sort of acceptable worst-case solution is the case where the given social network is a tree and the problem becomes polynomial-time solvable. In this paper, we attempt at extending this sparse landscape of tractable instances by considering the treewidth parameter of graphs. This parameter roughly measures the degree of tree-likeness of a given graph, e.g. the treewidth of a tree is 1, and has previously been used to tackle many classical NPhard problems in the literature.
Our contribution is twofold: First, we present an algorithm for Target Set Selection running in nO(w) time, for graphs with n vertices and treewidth bounded by w. The algorithm utilizes various combinatorial properties of the problem; drifting somewhat from standard dynamic-programming algorithms for small treewidth graphs. Also, it can be adopted to much more general settings, including the case of directed graphs, weighted edges, and weighted vertices. On the other hand, we also show that it is highly unlikely to find an nO(√w) time algorithm for Target Set Selection, as this would imply a sub-exponential algorithm for all problems in SNPclass. Together with our upper bound result, this shows that the treewidth parameter determines the complexity of Target Set Selection to a large extent, and should be taken into consideration when tackling this problem in any scenario.

References

[1]
K.A. Abrahamson, R.G. Downey, and M.R. Fellows. Fixed parameter tractability and completeness iv: on completeness for w{p} and pspace analogues. Annals Of Pure And Applied Logic, 73:235--276, 1995.
[2]
E. Amir. Efficient approximation for triangulation of minimum treewidth. In Proceedings of the Seventeenth Conference on Uncertainty in Artificial Intelligence (UAI-01), pages 7--15, 2001.
[3]
S. Arnborg, D. Corneil, and A. Proskurowski. Complexity of finding embeddings in a k-tree. SIAM Journal on Algebraic and Discrete Methods, 8(2):277--284, 1987.
[4]
E. Berger. Dynamic monopolies of constant size. J. Comb. Theory, Ser. B, 83(2):191--200, 2001.
[5]
S. Bharathi, D. Kempe, and M. Salek. Competitive influence maximization in social networks. In WINE, pages 306--311, 2007.
[6]
H. Bodlaender. A linear time algorithm for finding tree-decompositions of small treewidth. SIAM Journal on Computing, 25:1305--1317, 1996.
[7]
V. Bouchitté, D. Kratsch, H. Müller, and I. Todinca. On treewidth approximations. Discrete Applied Mathematics, 136(2-3), 2004.
[8]
J. Brown and P. Reingen. Social ties and word-of-mouth referral behavior. Journal of Consumer Research: An Interdisciplinary Quarterly, 14(3):350--62, 1987.
[9]
J. Chen, B. Chor, M. Fellows, X. Huang, D. Juedes, I. Kanj, and G. Xia. Tight lower bounds for certain parameterized NP-hard problems. In Proc. of the 19th annual IEEE Conference on Computational Complexity (CCC), pages 150--160, 2004.
[10]
N. Chen. On the approximability of influence in social networks. In Proceedings of the 19th annual ACM-SIAM symposium on Discrete algorithms (SODA), pages 1029--1037, 2008.
[11]
Z. Dezsö and A. Barabási. Halting viruses in scale-free networks. Phys. Rev. E, 65(5):055103, 2002.
[12]
P. Domingos and M. Richardson. Mining the network value of customers. In Proceedings of the 7th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD), pages 57--66, 2001.
[13]
R. Downey and M. Fellows. Parameterized Complexity. Springer-Verlag, 1999.
[14]
E. Even-Dar and A. Shapira. A note on maximizing the spread of influence in social networks. In WINE, volume 4858 of LNCS, pages 281--286. Springer, 2007.
[15]
M. Fellows, D. Hermelin, and F. Rosamond. On the parameterized complexity of multiple interval problems -- Manuscript. 2008.
[16]
L.C. Freeman. The Development of Social Network Analysis: A Study in the Sociology of Science. Vancouver, BC, Canada: Empirical Press, 2004.
[17]
J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, pages 211--223, 2001.
[18]
M.S. Granovetter. The strength of weak ties. American Journal of Sociology, 78, pages 1360--1380, 1973.
[19]
M. Kearns and L. Ortiz. Algorithms for interdependent security games. In Proceedings of the 17th Annual Conference on Advances in Neural Information Processing Systems (NIPS), pages 288--297, 2003.
[20]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD), pages 137--146, 2003.
[21]
D. Kempe, J. Kleinberg, and E. Tardos. Influential nodes in a diffusion model for social networks. In Proceedings of the 32nd International Colloquium on Automata, Languages and Programming (ICALP), pages 1127--1138, 2005.
[22]
T. Kloks and H. Bodlaender. Approximating treewidth and pathwidth of some classes of perfect graphs. In Proceedings of the 3rd International Symposium on Algorithms And Computation (ISAAC), pages 116--125, 1992.
[23]
R.T. Mikolajczyk and M. Kretzschmar. Collecting social contact data in the context of disease transmission: Prospective and retrospective study designs. Social Networks, 30(2):127--135, 2008.
[24]
S. Milgram. The small world problem. Psychology Today, 2:60--67, 1967.
[25]
S. Morris. Contagion. The Review of Economic Studies, 67(1):57--78, 2000.
[26]
E. Mossel and S. Roch. On the submodularity of influence in social networks. In Proceedings of the 39th annual ACM symposium on Theory of computing (STOC), pages 128--134, 2007.
[27]
R. Pastor-Satorras and A. Vespignani. Epidemic spreading in scale-free networks. Phys. Rev. Lett., 86(14):3200--3203, 2001.
[28]
D. Peleg. Size bounds for dynamic monopolies. Discrete Applied Mathematics, 86(2-3):263--273, 1998.
[29]
D. Peleg. Local majorities, coalitions and monopolies in graphs: a review. Theor. Comput. Sci., 282(2):231--257, 2002.
[30]
N. Robertson and P. Seymour. Graph minors. II. Algorithmic aspects of tree-width. SIAM Journal of Algorithms, 7:309--322, 1986.
[31]
G. Silverman. The secrets of word-of-mouth marketing. AMACOM New York, 2001.
[32]
D.S. Wilson. Levels of selection: An alternative to individualism in biology and the human sciences. Social Networks, 11(3):257--272, 1989.

Cited By

View all

Index Terms

  1. An exact almost optimal algorithm for target set selection in social networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      EC '09: Proceedings of the 10th ACM conference on Electronic commerce
      July 2009
      376 pages
      ISBN:9781605584584
      DOI:10.1145/1566374
      • General Chair:
      • John Chuang,
      • Program Chairs:
      • Lance Fortnow,
      • Pearl Pu
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 06 July 2009

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. bounded tree-width algorithm
      2. bounded tree-width lower-bound
      3. social networks
      4. target set selection
      5. viral marketing

      Qualifiers

      • Research-article

      Conference

      EC '09
      Sponsor:
      EC '09: ACM Conference on Electronic Commerce
      July 6 - 10, 2009
      California, Stanford, USA

      Acceptance Rates

      Overall Acceptance Rate 664 of 2,389 submissions, 28%

      Upcoming Conference

      EC '25
      The 25th ACM Conference on Economics and Computation
      July 7 - 11, 2025
      Stanford , CA , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)11
      • Downloads (Last 6 weeks)6
      Reflects downloads up to 30 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2023)An Era of Mobile Data Offloading Opportunities: A Comprehensive SurveyMobile Networks and Applications10.1007/s11036-023-02116-829:1(13-28)Online publication date: 22-Feb-2023
      • (2021)NodeRank: Finding influential nodes in social networks based on interestsThe Journal of Supercomputing10.1007/s11227-021-03947-6Online publication date: 24-Jun-2021
      • (2017)SWIMACM Transactions on Information Systems10.1145/307265236:1(1-33)Online publication date: 19-Aug-2017
      • (2016)Harvester: Influence Optimization in Symmetric Interaction Networks2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA)10.1109/DSAA.2016.95(61-70)Online publication date: Oct-2016
      • (2015)Minimizing Seed Selection for Disseminating News with Probabilistic Coverage GuaranteeProceedings of the 17th International Conference on Electronic Commerce 201510.1145/2781562.2781564(1-8)Online publication date: 3-Aug-2015
      • (2015)Deprecation based greedy strategy for target set selection in large scale social networksInformation Sciences: an International Journal10.1016/j.ins.2015.04.024316:C(107-122)Online publication date: 20-Sep-2015
      • (2015)A K-shell Decomposition Based Algorithm for Influence MaximizationProceedings of the 15th International Conference on Engineering the Web in the Big Data Era - Volume 911410.1007/978-3-319-19890-3_18(269-283)Online publication date: 23-Jun-2015
      • (2014)Viral marketing for dedicated customersInformation Systems10.1016/j.is.2014.05.00346(1-23)Online publication date: 1-Dec-2014
      • (2014)A global optimization algorithm for target set selection problemsInformation Sciences: an International Journal10.1016/j.ins.2013.09.033267(101-118)Online publication date: 1-May-2014
      • (2014)Explaining Snapshots of Network Diffusions: Structural and Hardness ResultsComputing and Combinatorics10.1007/978-3-319-08783-2_53(616-625)Online publication date: 2014
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media