Influence Maximization: Near-Optimal Time Complexity Meets Practical Efficiency

被引:563
作者
Tang, Youze [1 ]
Xiao, Xiaokui [1 ]
Shi, Yanchen [1 ]
机构
[1] Nanyang Technol Univ, Sch Comp Engn, Singapore, Singapore
来源
SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA | 2014年
关键词
Algorithms; Theory; Experimentation;
D O I
10.1145/2588555.2593670
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a social network G and a constant k, the influence maximization problem asks for k nodes in G that (directly and indirectly) influence the largest number of nodes under a pre-defined diffusion model. This problem finds important applications in viral marketing, and has been extensively studied in the literature. Existing algorithms for influence maximization, however, either trade approximation guarantees for practical efficiency, or vice versa. In particular, among the algorithms that achieve constant factor approximations under the prominent independent cascade (IC) model or linear threshold (LT) model, none can handle a million-node graph without incurring prohibitive overheads. This paper presents TIM, an algorithm that aims to bridge the theory and practice in influence maximization. On the theory side, we show that TIM runs in O((k + l)(n + m) log n/epsilon(2)) expected time and returns a (1 - 1/e - epsilon)-approximate solution with at least 1 - n(-l) probability. The time complexity of TIM is near-optimal under the IC model, as it is only a log n factor larger than the Omega(m + n) lower-bound established in previous work (for fixed k, l, and epsilon). Moreover, TIM supports the triggering model, which is a general diffusion model that includes both IC and LT as special cases. On the practice side, TIM incorporates novel heuristics that significantly improve its empirical efficiency without compromising its asymptotic performance. We experimentally evaluate TIM with the largest datasets ever tested in the literature, and show that it outperforms the state-of-the-art solutions (with approximation guarantees) by up to four orders of magnitude in terms of running time. In particular, when k = 50, epsilon = 0.2, and l = 1, TIM requires less than one hour on a commodity machine to process a network with 41.6 million nodes and 1.4 billion edges. This demonstrates that influence maximization algorithms can be made practical while still offering strong theoretical guarantees.
引用
收藏
页码:75 / 86
页数:12
相关论文
共 30 条
  • [11] Talk of the network: A complex systems look at the underlying process of word-of-mouth
    Goldenberg, J
    Libai, B
    Muller, E
    [J]. MARKETING LETTERS, 2001, 12 (03) : 211 - 223
  • [12] Goyal A., 2011, Proceedings of the 2011 IEEE 11th International Conference on Data Mining (ICDM 2011), P211, DOI 10.1109/ICDM.2011.132
  • [13] Goyal A., 2010, P ACM WSDM, P241
  • [14] A Data-Based Approach to Social Influence Maximization
    Goyal, Amit
    Bonchi, Francesco
    Lakshmanan, Laks V. S.
    [J]. PROCEEDINGS OF THE VLDB ENDOWMENT, 2011, 5 (01): : 73 - 84
  • [15] THRESHOLD MODELS OF COLLECTIVE BEHAVIOR
    GRANOVETTER, M
    [J]. AMERICAN JOURNAL OF SOCIOLOGY, 1978, 83 (06) : 1420 - 1443
  • [16] Harathi S, 2007, LECT NOTES COMPUT SC, V4858, P306
  • [17] IRIE: Scalable and Robust Influence Maximization in Social Networks
    Jung, Kyomin
    Heo, Wooram
    Chen, Wei
    [J]. 12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, : 918 - 923
  • [18] Kempe D., 2005, Automata, Languages and Programming. 32nd International Colloquium, ICALP 2005. Proceedings (Lecture Notes in Computer Science Vol. 3580), P1127, DOI 10.1007/11523468_91
  • [19] Kempe D., 2015, PROC ACM SIGKDD INT, V11, P105
  • [20] Kim J, 2013, PROC INT CONF DATA, P266, DOI 10.1109/ICDE.2013.6544831