Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/2722129.2722260acmotherconferencesArticle/Chapter ViewAbstractPublication PagessodaConference Proceedingsconference-collections
research-article

Contagious sets in expanders

Published: 04 January 2015 Publication History
  • Get Citation Alerts
  • Abstract

    We consider the following activation process in undirected graphs: a vertex is active either if it belongs to a set of initially activated vertices or if at some point it has at least r active neighbors, where r > 1 is the activation threshold. A contagious set is a set whose activation results with the entire graph being active. Given a graph G, let m(G, r) be the minimal size of a contagious set. It is known that for every d-regular or nearly d-regular graph on n vertices, m(G, r) ≤ O(nr/d). We consider such graphs that additionally have expansion properties, parameterized by the spectral gap and/or the girth of the graphs.
    The general flavor of our results is that sufficiently strong expansion properties imply that m(G, 2) ≤ O(n/d2) (and more generally, m(G, r) ≤ O(n/dr/(r-1))). In addition, we demonstrate that rather weak assumptions on the girth and/or the spectral gap suffice in order to imply that m(G, 2) ≤ O(n log d/d2). For example, we show this for graphs of girth at least 7, and for graphs with λ(G) < (1 − ε)d, provided the graph has no 4-cycles.
    Our results are algorithmic, entailing simple and efficient algorithms for selecting contagious sets.

    References

    [1]
    A. Aazami, M. D. Stilp. Approximation algorithms and hardness for domination with propagation. SIAM Journal on Discrete Mathematics, 23: 1382--1399, 2009.
    [2]
    E. Ackerman, O. Ben-Zwi, and G. Wolfovitz. Combinatorial model and bounds for target set selection. Theoretical Computer Science, 411: 4017--4022, 2010.
    [3]
    N. Alon, and M. R. Capalbo. Finding disjoint paths in expanders deterministically and online. In FOCS, 518--524, 2007.
    [4]
    N. Alon and F. R. K. Chung. Explicit construction of linear sized tolerant networks. Discrete Mathematics, 306: 1068--1071, 2006.
    [5]
    N. Alon, H. Kaplan, M. Krivelevich, D. Malkhi, and J. P. Stern. Scalable secure storage when half the system is faulty. Information and Computation, 174: 203--213, 2002.
    [6]
    N. Alon and J. Spencer. The Probablistic Method. Wiley, 2008.
    [7]
    S. Arora, S. Khot, A. Kolla, D. Steurer, M. Tulsiani, and N. K. Vishnoi. Unique games on expanding constraint graphs are easy. In STOC, 21--28, 2008.
    [8]
    A. Bagchi, A. Bhargava, A. Chaudhary, D. Eppstein, and C. Scheideler. The effect of faults on network expansion. Theory Comput. Syst, 39: 903--928, 2006.
    [9]
    J. Balogh and B. Bollobás. Bootstrap percolation on the hypercube, in Probabilty Theory and Related Fields, 134: 624--648, 2006.
    [10]
    J. Balogh, B. Bollobás, H. Duminil-Copin and R. Morris. The sharp threshold for bootstrap percolation in all dimensions, in Trans. Amer. Math. Soc., to appear.
    [11]
    J. Balogh, B. Csaba, M. Pei and W. Samotij. Large bounded degree trees in expanding graphs. Electronic Journal of Combinatorics, 17: 2010, Publication R6.
    [12]
    J. Balogh, Y. Peres and G. Pete. Bootstrap percolation on infinite trees and non-amenable groups. Combinatorics, Probability and Computing, 15: 715--730, 2006.
    [13]
    J. Balogh and G. Pete. Random disease on the square grid. Random Structures and Algorithms, 13: 409--422, 1998.
    [14]
    J. Balogh and B. Pittel. Bootstrap percolation on the random regular graph. Random Structures and Algorithms, 30: 257--286, 2007.
    [15]
    A. L. Barabasi and R. Albert. Emergence of scaling in random networks. Science, 286: 509--512, 1999.
    [16]
    O. Ben-Zwi, D. Hermelin, D. Lokshtanov, and I. Newman. Treewidth governs the complexity of target set selection. Discrete Optimization, 8: 87--96, 2011.
    [17]
    L. E. Blume, D. A. Easley, J. M. Kleinberg, R. Kleinberg and E. Tardos. Which networks are least susceptible to cascading failures? In FOCS, 393--402, 2011.
    [18]
    B. Bollobás. Random graphs. Cambridge Stud. Adv. Math. 73, Cambridge University Press, Cambridge, 2001.
    [19]
    B. Bollobás, C. Holmgren, P. J. Smith, and A. J. Uzzell. The time of bootstrap percolation with dense initial sets. Annals of Probability, to appear.
    [20]
    A. Z. Broder, A. M. Frieze, and E. Upfal. Existence and construction of edge disjoint paths on expander graphs. In STOC, 140--149, 1992.
    [21]
    J. Chalupa, P. L. Leath and G. R. Reich. Bootstrap percolation on a Bethe latice. J. Phys. C: Solid State Phys., 12, p L31, 1979.
    [22]
    N. Chen. On the approximability of influence in social networks. Siam Journal of Discrete Math, 23: 1400--1415, 2009.
    [23]
    M. Chopin, A. Nichterlein, R. Niedermeier and M. Weller. Constant thresholds can make target set selection tractable. In MedAlg, 120--133, 2012.
    [24]
    A. Coja-Oghlan, U. Feige, M. Krivelevich and D. Reichman. Contagious sets in expanders. arXiv prepreint, Febuary 2014, arXiv:1306.2465.
    [25]
    P. Domingos and M. Richardson. Mining the network value of customers, In KDD, 57--66, 2001.
    [26]
    U. Feige, M. Krivelevich and D. Reichman. Contagious sets in random graphs. Manuscript.
    [27]
    J. Friedman. A proof of Alon's second eigenvalue conjecture and related problems. Memoirs of the AMS, 910: 720--724, 2008.
    [28]
    J. Friedman and N. Pippenger. Expanding graphs contain all small trees. Combinatorica, 7: 71--76, 1987.
    [29]
    M. Granovetter Threshold models of collective behavior. American Journal of Sociology, 83: 1420--1443, 1978.
    [30]
    P. Haxell. Tree embeddings. Journal of Graph Theory, 36: 121--130, 2001.
    [31]
    S. Hoory, N. Linial, and A. Widgerson. Expander graphs and their applications. Bulletin of the American Mathematical Society, 43: 439--561, 2006.
    [32]
    S. Janson. On percolation in random graphs with given degree sequence. Electronic Journal of Probability, 14: 86--118, 2009.
    [33]
    S. Janson, T. Łuczak, T. Turova and T. Vallier. Bootstrap percolation on the random graph Gn,p. Annals of Appied Probability, 22: 1989--2047, 2012.
    [34]
    D. Kempe, J. Kleinberg and E. Tardos. Maximizing the spread of influence through a social network. In KDD, 137--146, 2003.
    [35]
    J. Kleinberg and R. Rubinfeld. Short paths in expander graphs. In FOCS, 86--95, 1996.
    [36]
    M. Krivelevich and B. Sudakov. Pseudo-random graphs. In More Sets, Graphs and Numbers, Bolyai Society Mathematical Studies 15, Springer, 199--262, 2006.
    [37]
    M. Krivelevich and B. Sudakov. Minors in expanding graphs. Geometric and Functional Analysis, 19, 294--331, 2009.
    [38]
    E. Mossel and S. Roch. Submodularity of influence in social networks: From local to global. SIAM Journal of Computing, 39: 2176--2188, 2010.
    [39]
    D. Peleg. Size bounds for dynamic monopolies. Discrete Applied Mathematics, 86: 263--273, 1998.
    [40]
    L. Pósa. Hamiltonian circuits in random graphs. Discrete Mathematics, 14: 359--364, 1976.
    [41]
    I. Rapaport, K. Suchan, I. Todinca, J. Verstraéte. On dissemination thresholds in regular and irregular graph classes. Algorithmica, 59: 16--34, 2011.
    [42]
    D. Reichman. New bounds for contagious sets. Discrete Mathematics, 312: 1812--1814, 2012.
    [43]
    T. Tlusty and J. P. Eckmann. Remarks on bootstrap percolation in metric networks. J. Phys. A, 205004, 2009.
    [44]
    N. C. Wormald. Models of random regular graphs. In J. Lamb and D. Preece, editors, Surveys in Combinatorics, volume 276 of London Mathematical Society Lecture Note Series, pages 239--298. Cambridge University Press, 1999.

    Cited By

    View all

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    SODA '15: Proceedings of the twenty-sixth annual ACM-SIAM symposium on Discrete algorithms
    January 2015
    2056 pages
    • Program Chair:
    • Piotr Indyk

    Sponsors

    • SIAM: Society for Industrial and Applied Mathematics

    In-Cooperation

    Publisher

    Society for Industrial and Applied Mathematics

    United States

    Publication History

    Published: 04 January 2015

    Check for updates

    Qualifiers

    • Research-article

    Conference

    SODA '15
    Sponsor:
    • SIAM
    SODA '15: ACM SIAM Symposium on Discrete Algorithms
    January 4 - 6, 2015
    California, San Diego

    Acceptance Rates

    SODA '15 Paper Acceptance Rate 137 of 495 submissions, 28%;
    Overall Acceptance Rate 411 of 1,322 submissions, 31%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)3
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 11 Aug 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)Contagious sets in dense graphsEuropean Journal of Combinatorics10.1016/j.ejc.2017.07.01168:C(66-78)Online publication date: 1-Feb-2018
    • (2018)Discovering Small Target Sets in Social NetworksAlgorithmica10.1007/s00453-017-0390-580:6(1804-1833)Online publication date: 1-Jun-2018
    • (2015)Influence Propagation over Large Scale Social NetworksProceedings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 201510.1145/2808797.2808888(1531-1538)Online publication date: 25-Aug-2015
    • (2015)A Fast and Effective Heuristic for Discovering Small Target Sets in Social NetworksProceedings of the 9th International Conference on Combinatorial Optimization and Applications - Volume 948610.1007/978-3-319-26626-8_15(193-208)Online publication date: 18-Dec-2015
    • (2015)Optimizing Spread of Influence in Social Networks via Partial IncentivesPost-Proceedings of the 22nd International Colloquium on Structural Information and Communication Complexity - Volume 943910.1007/978-3-319-25258-2_9(119-134)Online publication date: 14-Jul-2015

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media