Towards Information Diffusion in Mobile Social Networks

被引:40
作者
Lu, Zongqing [1 ]
Wen, Yonggang [2 ]
Zhang, Weizhan [3 ]
Zheng, Qinghua [3 ]
Cao, Guohong [1 ]
机构
[1] Penn State Univ, Dept Comp Sci & Engn, University Pk, PA 16802 USA
[2] Nanyang Technol Univ, Sch Comp Engn, Singapore 639798, Singapore
[3] Xi An Jiao Tong Univ, Dept Comp Sci & Engn, Xian 710049, Peoples R China
基金
美国国家科学基金会;
关键词
Information diffusion; mobile social networks; community structure; SPREAD;
D O I
10.1109/TMC.2015.2451624
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The emerging of mobile social networks opens opportunities for viral marketing. However, before fully utilizing mobile social networks as a platform for viral marketing, many challenges have to be addressed. In this paper, we address the problem of identifying a small number of individuals through whom the information can be diffused to the network as soon as possible, referred to as the diffusion minimization problem. Diffusion minimization under the probabilistic diffusion model can be formulated as an asymmetric k-center problem which is NP-hard, and the best known approximation algorithm for the asymmetric k-center problem has approximation ratio of log*n and time complexity O(n(5)). Clearly, the performance and the time complexity of the approximation algorithm are not satisfiable in large-scale mobile social networks. To deal with this problem, we propose a community based algorithm and a distributed set-cover algorithm. The performance of the proposed algorithms is evaluated by extensive experiments on both synthetic networks and a real trace. The results show that the community based algorithm has the best performance in both synthetic networks and the real trace compared to existing algorithms, and the distributed set-cover algorithm outperforms the approximation algorithm in the real trace in terms of diffusion time.
引用
收藏
页码:1292 / 1304
页数:13
相关论文
共 40 条
[1]  
[Anonymous], 2013, POLYM DEGRAD STABIL
[2]  
[Anonymous], 2011, Proceedings of the Twenty-Fifth AAAI Conference on Articial Intelligence, DOI DOI 10.1609/AAAI.V25I1.7838
[3]  
[Anonymous], 2010, P 16 ACM SIGKDD INT, DOI DOI 10.1145/1835804.1835934
[4]  
[Anonymous], 2012, P 21 INT C WORLD WID, DOI DOI 10.1145/2187836.2187907
[5]  
[Anonymous], 2004, SIGKDD Explorations, DOI [DOI 10.1145/1046456.1046462, 10.1145/988672.988739]
[6]  
[Anonymous], 2009, WWW 09 P 18 INT WORL, DOI DOI 10.1145/1526709.1526806
[7]  
[Anonymous], 2011, Proceedings of the 17th annual international conference on Mobile computing and networking, DOI DOI 10.1145/2030613
[8]  
Chen W., 2012, P 26 AAAI C ART INT
[9]   Efficient Influence Maximization in Social Networks [J].
Chen, Wei ;
Wang, Yajun ;
Yang, Siyu .
KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, :199-207
[10]   Asymmetric κ-center is log* n-hard to approximate [J].
Chuzhoy, J ;
Kortsarz, G ;
Guha, S ;
Krauthgamer, R ;
Halperin, E ;
Naor, J ;
Khanna, S .
JOURNAL OF THE ACM, 2005, 52 (04) :538-551