[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/1835804.1835936acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Social action tracking via noise tolerant time-varying factor graphs

Published: 25 July 2010 Publication History

Abstract

It is well known that users' behaviors (actions) in a social network are influenced by various factors such as personal interests, social influence, and global trends. However, few publications systematically study how social actions evolve in a dynamic social network and to what extent different factors affect the user actions.
In this paper, we propose a Noise Tolerant Time-varying Factor Graph Model (NTT-FGM) for modeling and predicting social actions. NTT-FGM simultaneously models social network structure, user attributes and user action history for better prediction of the users' future actions. More specifically, a user's action at time t is generated by her latent state at t, which is influenced by her attributes, her own latent state at time t-1 and her neighbors' states at time t and t-1. Based on this intuition, we formalize the social action tracking problem using the NTT-FGM model; then present an efficient algorithm to learn the model, by combining the ideas from both continuous linear system and Markov random field.
Finally, we present a case study of our model on predicting future social actions. We validate the model on three different types of real-world data sets. Qualitatively, our model can uncover some interesting patterns of the social dynamics. Quantitatively, experimental results show that the proposed method outperforms several baseline methods for action prediction.

Supplementary Material

JPG File (kdd2010_tan_sat_01.jpg)
MOV File (kdd2010_tan_sat_01.mov)

References

[1]
R. Albert and A. L. Barabasi. Statistical mechanics of complex networks. Reviews of Modern Physics, 74(1), 2002.
[2]
A. Anagnostopoulos, R. Kumar, and M. Mahdian. Influence and correlation in social networks. In KDD'08, pages 7--15, 2008.
[3]
L. Backstrom, R. Kumar, C. Marlow, J. Novak, and A. Tomkins. Preferential behavior in online groups. In WSDM'08, pages 117--128, 2008.
[4]
N. T. Bailey. The mathematical theory of infectious diseases and its applications / norman t.j. bailey. 1975.
[5]
M. Cha, A. Mislove, and K. P. Gummadi. A measurement-driven analysis of information propagation in the flickr social network. In WWW'09.
[6]
D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. Feedback effects between similarity and social influence in online communities. In KDD'08, pages 160--168, 2008.
[7]
P. Domingos and M. Richardson. Mining the network value of customers. In KDD'01, pages 57--66, 2001.
[8]
M. Faloutsos, P. Faloutsos, and C. Faloutsos. On power-law relationships of the internet topology. In SIGCOMM'99, pages 251--262, 1999.
[9]
Z. Ghahramani and M. I. Jordan. Factorial hidden markov models. Machine Learning, 29(2-3):245--273, 1997.
[10]
A. Goyal, F. Bonchi, and L. V. Lakshmanan. Learning influence probabilities in social networks. In WSDM'10, 2010.
[11]
M. Granovetter. The strength of weak ties. American Journal of Sociology, 78(6):1360--1380, 1973.
[12]
D. Gruhl, R. Guha, D. Liben-Nowell, and A. Tomkins. Information diffusion through blogspace. In WWW'04, pages 491--501, 2004.
[13]
L. Guo, E. Tan, S. Chen, X. Zhang, and Y. E. Zhao. Analyzing patterns of user content generation in online social networks. In KDD'09, pages 369--378, 2009.
[14]
S. S. Haykin. Kalman Filtering and Neural Networks. John Wiley & Sons, Inc., New York, NY, USA, 2001.
[15]
D. Kempe, J. Kleinberg, and E. Tardos. Maximizing the spread of influence through a social network. In KDD'03, pages 137--146, 2003.
[16]
J. Kleinberg. Temporal dynamics of on-line information streams. In Data Stream Managemnt: Processing High-speed Data. Springer, 2005.
[17]
D. Krackhardt. The Strength of Strong ties: the importance of philos in networks and organization in Book of Nitin Nohria and Robert G. Eccles (Ed.), Networks and Organizations. Cambridge, Harvard Business School Press, Hershey, USA, 1992.
[18]
J. D. Lafferty, A. McCallum, and F. C. N. Pereira. Conditional random fields: Probabilistic models for segmenting and labeling sequence data. In ICML'01, pages 282--289, 2001.
[19]
J. Leskovec, L. Backstrom, R. Kumar, and A. Tomkins. Microscopic evolution of social networks. In KDD'08, pages 462--470, 2008.
[20]
S. Macskassy and F. Provost. A simple relational classifier. In Workshop on Multi-Relational Data Mining in conjunction with KDD'03, 2003.
[21]
M. E. J. Newman. The structure and function of complex networks. SIAM Reviews, 45, 2003.
[22]
T. Qin, T.-Y. Liu, X.-D. Zhang, D.-S.Wang, and H. Li. Multi-task feature learning. In NIPS'08, pages 1281--1288, 2008.
[23]
M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD'02, pages 61--70, 2002.
[24]
P. Sarkar and A. W. Moore. Dynamic social network analysis using latent space models. SIGKDD Explor. Newsl., 7(2):31--40, 2005.
[25]
J. Scripps, P.-N. Tan, and A.-H. Esfahanian. Measuring the effects of preprocessing decisions and network forces in dynamic network analysis. In KDD'09, pages 747--756, 2009.
[26]
X. Shi, J. Zhu, R. Cai, and L. Zhang. User grouping behavior in online forums. In KDD'09, pages 777--786, 2009.
[27]
P. Singla and M. Richardson. Yes, there is a correlation: - from social networks to personal behavior on the web. In WWW'08, pages 655--664, 2008.
[28]
S. H. Strogatz. Exploring complex networks. Nature, 410:268--276, 2003.
[29]
J. Tang, J. Sun, C. Wang, and Z. Yang. Social influence analysis in large-scale networks. In KDD'09, pages 807--816, 2009.
[30]
J. Tang, J. Zhang, L. Yao, J. Li, L. Zhang, and Z. Su. Arnetminer: Extraction and mining of academic social networks. In KDD'08, pages 990--998, 2008.
[31]
L. Tang and H. Liu. Relational learning via latent social dimensions. In KDD'09, pages 817--826, 2009.
[32]
W. Wiegerinck. Variational approximations between mean field theory and the junction tree algorithm. In UAI'00, pages 626--633, 2000.
[33]
T. Yang, Y. Chi, S. Zhu, Y. Gong, and R. Jin. A bayesian approach toward finding communities and their evolutions in dynamic social networks. In SDM'09, pages 990--1001, 2009.
[34]
J. S. Yedidia, W. T. Freeman, and Y. Weiss. Generalized belief propagation. In NIPS'01, pages 689--695, 2001.
[35]
E. Zheleva, H. Sharara, and L. Getoor. Co-evolution of social and affiliation networks. In KDD'09, June 2009.

Cited By

View all
  • (2024)Community detection based on improved user interaction degree, weighted quasi-local path-based similarity and frequent pattern miningThe Journal of Supercomputing10.1007/s11227-024-06178-780:13(18544-18572)Online publication date: 1-Sep-2024
  • (2022)Information cascades blocking through influential nodes identification on social networksJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-022-04456-x14:6(7519-7530)Online publication date: 7-Dec-2022
  • (2021)Credible Influence Analysis in Mass Media Using Causal Inference2021 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI53945.2021.9624679(1-5)Online publication date: 2-Nov-2021
  • Show More Cited By

Index Terms

  1. Social action tracking via noise tolerant time-varying factor graphs

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      KDD '10: Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
      July 2010
      1240 pages
      ISBN:9781450300551
      DOI:10.1145/1835804
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 25 July 2010

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. social action tracking
      2. social influence analysis
      3. time-varying factor graphs

      Qualifiers

      • Research-article

      Conference

      KDD '10
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)22
      • Downloads (Last 6 weeks)2
      Reflects downloads up to 11 Dec 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Community detection based on improved user interaction degree, weighted quasi-local path-based similarity and frequent pattern miningThe Journal of Supercomputing10.1007/s11227-024-06178-780:13(18544-18572)Online publication date: 1-Sep-2024
      • (2022)Information cascades blocking through influential nodes identification on social networksJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-022-04456-x14:6(7519-7530)Online publication date: 7-Dec-2022
      • (2021)Credible Influence Analysis in Mass Media Using Causal Inference2021 IEEE International Conference on Intelligence and Security Informatics (ISI)10.1109/ISI53945.2021.9624679(1-5)Online publication date: 2-Nov-2021
      • (2021)A Microblog Popularity Prediction Model Based on Temporal Sequence Features and Text Features2021 IEEE International Conference on Computer Science, Electronic Information Engineering and Intelligent Control Technology (CEI)10.1109/CEI52496.2021.9574577(795-800)Online publication date: 24-Sep-2021
      • (2020)Measure User Intimacy by Mining Maximum Information Transmission PathsComplexity10.1155/2020/23764512020Online publication date: 1-Jan-2020
      • (2020)ChronoGraph: Enabling Temporal Graph Traversals for Efficient Information Diffusion Analysis over TimeIEEE Transactions on Knowledge and Data Engineering10.1109/TKDE.2019.289156532:3(424-437)Online publication date: 1-Mar-2020
      • (2020)Do Influencers Influence? – Analyzing Players’ Activity in an Online Multiplayer Game2020 IEEE Conference on Games (CoG)10.1109/CoG47356.2020.9231957(120-127)Online publication date: Aug-2020
      • (2020)Can the adoption of health information on social media be predicted by information characteristics?Aslib Journal of Information Management10.1108/AJIM-12-2019-0369ahead-of-print:ahead-of-printOnline publication date: 8-Dec-2020
      • (2019)User behavior mining on social media: a systematic literature reviewMultimedia Tools and Applications10.1007/s11042-019-08046-678:23(33747-33804)Online publication date: 17-Aug-2019
      • (2019)An Algorithm of Sina Microblog User’s Sentimental Influence Analysis Based on CNN+ELM ModelProceedings of ELM 201810.1007/978-3-030-23307-5_10(86-97)Online publication date: 30-Jun-2019
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media