On the Submodularity of Influence in Social Networks
Elchanan Mossel & Sebastien Roch STOC07
Speaker: Xinran He Xinranhe1990@gmail.com
On the Submodularity of Influence in Social Networks Elchanan - - PowerPoint PPT Presentation
On the Submodularity of Influence in Social Networks Elchanan Mossel & Sebastien Roch STOC07 Speaker: Xinran He Xinranhe1990@gmail.com Social Network Social network as a graph Nodes represent individuals. Edges are social
Speaker: Xinran He Xinranhe1990@gmail.com
networkDiffusion in the social network
Initially active individuals S as seed.
uniformly in [0,1].
if where Nv is the set of activated direct neighbors of v.
number of active nodes when the diffusion process ends.
∈
v
N u v uv
Inactive Node Active Node Threshold Active neighbors
v w
0.5 0.3 0.2 0.5 0.1 0.4 0.3 0.2 0.6 0.2
U X
Theorem: The greedy algorithm is a 1-1/e approximation for maximizing monotone and submodular set functions[Nemhauser/Wolsey 1978].
. '
S S i
i
S
∈
Influence Maximization Problem under linear Threshold model can be solved approximately.
∈
v
N u v uv
fv(S) : activation function of node v over S. S is the set of already activated nodes.
diffusion models:
∈
v
N u uv
Linear Threshold Model [KKT 2003]
∈
− −
v
N u uv
p ) 1 ( 1
Independent Cascade Model [KKT 2003]
= r 1 i 1
i
)) S , ( p
ω
v
Decreasing Cascade Model [KKT 2005]
For Linear Threshold model, the influence spread σ(S) is submodular [KKT 2003].
t t t t t t
end end end end end end end end t t t t t t
Aend Bend
– Base Case: – Assume . – For a node v still inactive at step t, we have . Therefore if v is activated in step t+1 in C, it must also be activated in A.
t t t t
B C A C ⊆ ⊆ , A S T S C = ⊆ ∩ =
t t
A C ⊆ ) ( ) (
t v t v
A f C f ≤
1 1 + + ⊆
t t
fv(Ct) fv(At)
t t t
B A D ∪ ⊆ t t t
0.3 0.3 1 2 3
D
0.3 0.3 1 2 3
A
0.3 0.3 1 2 3
B
Θ3=0.5 Θ3=0.5 Θ3=0.5
t t t
B A D ∪ ⊆
Grow S(1) Until it ends Grow S(2) Until it ends …… Grow S(k) Until it ends
Add S(1) Add S(2) Add S(k)
Lemma: The distribution over the activated node set at the end of original process with seed set S and the piecemeal growth process P(S(1),…,S(k)) is identical.
. set seed
partition a is ,..., where process, diffusion growth piecemeal the the as ) ,..., ( Define
) ( ) 1 ( ) ( ) 1 (
S S S S S P P
k k
=
Grow S Grow nothing Add S at stage 1 Add nothing at stage 2 Grow S(1) Grow S(2) Add S(1) at stage 1 Add S(2) at stage 2 Grow nothing Grow S Add nothing at stage 1 Add S at stage 2 end end end end end s s s
thresholds at the beginning; instead we reveal the value of thresholds whenever needed.
want to know whether it is activated at step t. Θv
fv(St-2) fv(St-1)
Θv
nothing. do we Otherwise
( ), ( [ in uniformly pick we and activated becomes , ) ( 1 ) ( ) ( y probabilit With
inactive still each for and initialize we , 1 1 step At 2. ze 1.Initiali
1 2 v 2 2 1 1 − − − − − −
− − = − ≤ ≤ =
t v t v t v t v t v t t
S f S f v S f S f S f v S S n t S S θ
fv(St-2) fv(St-1)
) ( 1
2 −
−
t v S
f
) ( ) (
2 1 − −
−
t v t v
S f S f
) ( ) 1 ( ) ( ) 1 (
k k
Grow S(1) Until it ends …… Grow S(k) Until it ends Grow T Until it ends
K stage piecemeal growth
Add T at the beginning of stage k+1
τ
v v t v
P f P f θ
τ
− + ≥ 1 ) ( ) (
Grow S(1) …… Grow S(k) Grow T Grow S(1) …… Grow S(k) Grow T
τ fv(Pτ) fv(Qτ) θ Θ’ fv(Pt) fv(Qt) θ Θ’v =fv(Pτ)+1- Θv
'
) (
v t v P
f θ ≥
v t v P
f θ ≥ ) (
Grow S(1) …… Grow S(k) Grow T Grow S(1) …… Grow S(k) Grow T
tτ
Lemma: The distributions over the activated node set at the end of the piecemeal growth process P(S(1),…,S(k);T) and the antisense diffusion process Q(S(1),…,S(k);T) are identical.
v τ τ
v v
Grow S(1) …… Grow S(k) Grow T Grow S(1) …… Grow S(k) Grow T
tτ
Grow S∩T Until it ends Grow S\T Until it ends Grow nothing Grow S∩T Until it ends Grow Nothing Grow T\S Until it ends Grow S∩T Until it ends Grow S\T Until it ends Grow T\S Until it ends
t t t
t t t
B A D ∪ ⊆
Grow S∩T Grow Nothing Grow T\S Grow S∩B Grow S\T Grow nothing Grow S∩T Grow S\T Grow T\S
First two stages Last stage
t t t
B A D ∪ ⊆
τ τ
t t
τ τ τ τ
1 1 + +
τ τ τ τ τ τ
+ +
1 1
τ τ
B B D D
t t
\ \ ⊆
τ τ
t t
1 1 + +
) ( ) ( ) ( ) (
τ τ
D f D f B f B f
v t v v t v
− ≥ −
τ τ
B B D D
t t
\ \ ⊆
v v t v v v t v
B f B f D f D f θ θ
τ τ
− + ≥ ⇒ − + ≥ 1 ) ( ) ( 1 ) ( ) (
τ τ
t t
1 1 + +
τ τ τ τ
D D T B B T D S B S
t t
\ , \ ' , ' , = = = =
' S S ⊆
' T T ⊆ ) ' ( ) ' ( ) ( ) ' ( S f T S f S f T S f − ∪ ≥ − ∪
t t t t t t t t t t
τ τ τ Grow S∩T Grow S\T Grow T\S Grow S∩T Grow Nothing Grow T\S Grow S∩T Grow S\T Grow nothing
First two stages Last stage
end end end end end end end end end end end end end end
ω ω ω ω
S u S S S v S
S V v
return : 6 for end : 5 } { : 4 )) ( }) { ( ( max arg u select : 3 do k to 1 i for : 2 set empty to S initialize : 1 Greedy(k) : 1 Algorithm
\
∪ = − ∪ = =
∈
σ σ
S u S S S v S
S V v
return : 6 for end : 5 } { : 4 )) ( }) { ( ( max arg u select : 3 do k to 1 i for : 2 set empty to S initialize : 1 Greedy(k) : 1 Algorithm
\
∪ = − ∪ = =
∈
σ σ
Name Main Idea Model Guarantee Reference CELF Lazy Forward optimization All 1-1/e Leskovec et al. 2007 CELF++ Further optimization of CELF All 1-1/e Goyal et al. 2011 PMIA Use directed tree structure IC No Chen et al. 2010 LDAG Use DAG structure LT No Chen et al. 2010 IRIE Use PageRank to initialize and update locally IC No Chen et al. 2012 CGA Use community structure IC Wang et al. 2010 MSA Simulated Annealing All No Jiang et al. 2011
θ d
e
∆ + −
−
1 1
1
– Local subadditive set function Global subadditive influence spread σ(S)?