Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Parallel Greedy Algorithm to Multiple Influence Maximization in Social Network

Published: 21 April 2021 Publication History

Abstract

Influence Maximization (IM) problem is to select influential users to maximize the influence spread, which plays an important role in many real-world applications such as product recommendation, epidemic control, and network monitoring. Nowadays multiple kinds of information can propagate in online social networks simultaneously, but current literature seldom discuss about this phenomenon. Accordingly, in this article, we propose Multiple Influence Maximization (MIM) problem where multiple information can propagate in a single network with different propagation probabilities. The goal of MIM problems is to maximize the overall accumulative influence spreads of different information with the limit of seed budget . To solve MIM problems, we first propose a greedy framework to solve MIM problems which maintains an -approximate ratio. We further propose parallel algorithms based on semaphores, an inter-thread communication mechanism, which significantly improves our algorithms efficiency. Then we conduct experiments for our framework using complex social network datasets with 12k, 154k, 317k, and 1.1m nodes, and the experimental results show that our greedy framework outperforms other heuristic algorithms greatly for large influence spread and parallelization of algorithms reduces running time observably with acceptable memory overhead.

References

[1]
Cigdem Aslay, Nicola Barbieri, Francesco Bonchi, and Ricardo A. Baeza-Yates. 2014. Online topic-aware influence maximization queries. In Open Proceedings International Conference on Extending Database Technology (EDBT’14). 295–306.
[2]
Nicola Barbieri, Francesco Bonchi, and Giuseppe Manco. 2013. Topic-aware social influence propagation models. Knowledge and Information Systems 37, 3 (2013), 555–584.
[3]
Christian Borgs, Michael Brautbar, Jennifer Chayes, and Brendan Lucier. 2014. Maximizing social influence in nearly optimal time. In ACM-SIAM Symposium on Discrete Algorithms. 946–957.
[4]
Shuo Chen, Ju Fan, Guoliang Li, Jianhua Feng, Kian-lee Tan, and Jinhui Tang. 2015. Online topic-aware influence maximization. The International Journal on Very Large Data Bases 8, 6 (2015), 666–677.
[5]
Wei Chen, Tian Lin, Zihan Tan, Mingfei Zhao, and Xuren Zhou. 2016. Robust influence maximization. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’16). ACM, 795–804.
[6]
Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’10). 1029–1038.
[7]
Wei Chen, Yajun Wang, and Siyu Yang. 2009. Efficient influence maximization in social networks. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’09). 199–208.
[8]
Wei Chen, Yifei Yuan, and Li Zhang. 2010. Scalable influence maximization in social networks under the linear threshold model. In IEEE International Conference on Data Mining (ICDM’10). 88–97.
[9]
Suqi Cheng, Huawei Shen, Junming Huang, Guoqing Zhang, and Xueqi Cheng. 2013. StaticGreedy: Solving the scalability-accuracy dilemma in influence maximization. In ACM International Conference on Information & Knowledge Management (CIKM’13). 509–518.
[10]
Edsger W. Dijkstra. 1968. Cooperating sequential processes. In The Origin of Concurrent Programming. Springer, 65–138.
[11]
Pedro Domingos and Matt Richardson. 2001. Mining the network value of customers. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’01). 57–66.
[12]
Marshall L. Fisher, George L. Nemhauser, and Laurence A. Wolsey. 1978. An analysis of approximations for maximizing submodular set functions—II. In Polyhedral Combinatorics. Springer, 73–87.
[13]
Sainyam Galhotra, Akhil Arora, and Shourya Roy. 2016. Holistic influence maximization: Combining scalability and efficiency with opinion-aware models. In ACM International Conference on Management of Data (SIGMOD’16). 743–758.
[14]
Amit Goyal, Wei Lu, and Laks V.S. Lakshmanan. 2011. CELF++: Optimizing the greedy algorithm for influence maximization in social networks. In ACM International Conference Companion on World Wide Web (WWW’11). 47–48.
[15]
Amit Goyal, Wei Lu, and Laks VS Lakshmanan. 2011. Simpath: An efficient algorithm for influence maximization under the linear threshold model. In IEEE International Conference on Data Mining (ICDM’11). 211–220.
[16]
Xinran He and David Kempe. 2014. Stability of influence maximization. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’14). 1256–1265.
[17]
Xinran He and David Kempe. 2016. Robust influence maximization. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’16). 885–894.
[18]
Xinran He and David Kempe. 2018. Stability and robustness in influence maximization. ACM Transactions on Knowledge Discovery from Data 12, 6 (2018), 1–34.
[19]
Xinran He, Guojie Song, Wei Chen, and Qingye Jiang. 2012. Influence blocking maximization in social networks under the competitive linear threshold model. In SIAM International Conference on Sustainable Design and Manufacturing (SDM’12). 463–474.
[20]
Kyomin Jung, Wooram Heo, and Wei Chen. 2012. IRIE: Scalable and robust influence maximization in social networks. In IEEE International Conference on Data Mining (ICDM’12). 918–923.
[21]
Dimitris Kalimeris, Gal Kaplun, and Yaron Singer. 2019. Robust influence maximization for hyperparametric models. In International Conference on Machine Learning (ICML’19). Vol. 97. 3192–3200.
[22]
David Kempe, Jon Kleinberg, and Éva Tardos. 2003. Maximizing the spread of influence through a social network. In ACM International Conference on Knowledge Discovery and Data Dining (SIGKDD’03). 137–146.
[23]
Arijit Khan, Benjamin Zehnder, and Donald Kossmann. 2016. Revenue maximization by viral marketing: A social network host’s perspective. In IEEE Data Engineering (ICDE’16). 37–48.
[24]
Siyu Lei, Silviu Maniu, Luyi Mo, Reynold Cheng, and Pierre Senellart. 2015. Online influence maximization. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’15). 645–654.
[25]
Jure Leskovec, Andreas Krause, Carlos Guestrin, Christos Faloutsos, Jeanne VanBriesen, and Natalie Glance. 2007. Cost-effective outbreak detection in networks. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’07). 420–429.
[26]
Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. Retrieved from http://snap.stanford.edu/data.
[27]
Guoliang Li, Shuo Chen, Jianhua Feng, Kian-lee Tan, and Wen-syan Li. 2014. Efficient location-aware influence maximization. In ACM International Conference on Management of Data (SIGMOD’14). 87–98.
[28]
Hui Li, Sourav S Bhowmick, Aixin Sun, and Jiangtao Cui. 2015. Conformity-aware influence maximization in online social networks. The International Journal on Very Large Data Bases 24, 1 (2015), 117–141.
[29]
Meghna Lowalekar, Pradeep Varakantham, and Akshat Kumar. 2016. Robust influence maximization. In International Conference on Autonomous Agents and Multiagent Systems (AAMAS’16). 1395–1396.
[30]
Zaixin Lu, Lidan Fan, Weili Wu, Bhavani Thuraisingham, and Kai Yang. 2014. Efficient influence spread estimation for influence maximization under the linear threshold model. Computational Social Networks 1, 1 (2014), 1.
[31]
Hung Nguyen, Tri Nguyen, Nhat Hai Phan, and Thang Dinh. 2017. Importance sketching of influence dynamics in billion-scale networks. In IEEE International Conference on Data Mining (ICDM’17). 337–346.
[32]
Hung T. Nguyen, My T. Thai, and Thang N. Dinh. 2016. Stop-and-stare: Optimal sampling algorithms for viral marketing in billion-scale networks. In International Conference on Management of Data (SIGMOD’16). 695–710.
[33]
Naoto Ohsaka, Takuya Akiba, Yuichi Yoshida, and Ken-ichi Kawarabayashi. 2014. Fast and accurate influence maximization on large networks with pruned Monte-Carlo simulations. In AAAI Conference on Artificial Intelligence (AAAI’14). 138–144.
[34]
Naoto Ohsaka, Tomohiro Sonobe, Sumio Fujita, and Ken Ichi Kawarabayashi. 2017. Coarsening massive influence networks for scalable diffusion analysis. In ACM International Conference on Management of Data (SIGMOD’17). 635–650.
[35]
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The Pagerank Citation Ranking: Bringing Order to the Web. Technical Report. Stanford InfoLab.
[36]
Diana Popova, Naoto Ohsaka, Ken ichi Kawarabayashi, and Alex Thomo. 2018. NoSingles: A space-efficient algorithm for influence maximization. In ACM International Conference on Scientific and Statistical Database Management (SSDBM’18). 18:1–18:12.
[37]
Yadong Qin, Jun Ma, and Shuai Gao. 2017. Efficient influence maximization under TSCM: A suitable diffusion model in online social networks. Soft Computing 21, 4 (2017), 827–838.
[38]
Matthew Richardson and Pedro Domingos. 2002. Mining knowledge-sharing sites for viral marketing. In ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD’02). 61–70.
[39]
Ryan A. Rossi and Nesreen K. Ahmed. 2015. The network data repository with interactive graph analytics and visualization. In ACM Association for the Advancement of Artificial Intelligence (AAAI’15). 4292–4293.
[40]
Youze Tang, Yanchen Shi, and Xiaokui Xiao. 2015. Influence maximization in near-linear time. In ACM International Conference on Management of Data (SIGMOD’15). 1529–1554.
[41]
Youze Tang, Xiaokui Xiao, and Yanchen Shi. 2014. Influence maximization: Near-optimal time complexity meets practical efficiency. In ACM International Conference on Management of Data (SIGMOD’14). 75–86.
[42]
Alan Tsang, Bryan Wilder, Eric Rice, Milind Tambe, and Yair Zick. 2019. Group-fairness in influence maximization. In International Joint Conference on Artificial Intelligence (IJCAI’19). 5997–6005.
[43]
Yanhao Wang, Qi Fan, Yuchen Li, and Kian-Lee Tan. 2017. Real-time influence maximization on dynamic social streams. The International Journal on Very Large Data Bases 10, 7 (2017), 805–816.
[44]
Jianming Zhu, Smita Ghosh, and Weili Wu. 2019. Group influence maximization problem in social networks. IEEE Transactions on Computational Social Systems 6, 6 (2019), 1156–1164.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Knowledge Discovery from Data
ACM Transactions on Knowledge Discovery from Data  Volume 15, Issue 3
June 2021
533 pages
ISSN:1556-4681
EISSN:1556-472X
DOI:10.1145/3454120
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 April 2021
Accepted: 01 December 2020
Revised: 01 November 2020
Received: 01 September 2019
Published in TKDD Volume 15, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Influence maximization
  2. social network
  3. parallel algorithm

Qualifiers

  • Research-article
  • Refereed

Funding Sources

  • National Key R&D Program of China
  • National Natural Science Foundation of China
  • Tencent Joint Research Program

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 448
    Total Downloads
  • Downloads (Last 12 months)53
  • Downloads (Last 6 weeks)8
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

Cited By

View all

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media