Influence maximization in temporal networks

被引:0
|
作者
Osawa, Shogo [1 ]
Murata, Tsuyoshi [1 ]
机构
[1] Department of Computer Science, Graduate School of Information Science and Engineering, Tokyo Institute of Technology, Japan
关键词
Conventional methods - Greedy algorithms - Heuristic approach - Influence maximizations - Network structures - Spread of informations - Temporal networks - Viral marketing;
D O I
10.1527/tjsai.30-6_JWEIN-A
中图分类号
学科分类号
摘要
Influence maximization problem is the problem of finding the node set of size k that maximizes the spread of information or disease in a given network. Solving this problem is one of the most important parts of predicting epidemic size or optimizing a viral marketing. This problem is already proved to be NP-Hard and many approximation algorithms have been proposed. Most of these approximation algorithms aim at static networks and few algorithms can be applied to temporal networks, where their network structures change dynamically as the time elapses. In this paper, we propose a new algorithm for influence maximization problem in temporal networks. Proposed algorithm is a greedy algorithm that starts with an empty node set S and adds the node n which maximizes the influence of S ∪ {n} until |S| = k. We approximate influence of node set S with a heuristic approach because calculating influence of a node set exactly is #P-Hard. Our experiments for comparing the exact solution and solution by our proposed method show that our proposed method outputs almost exact solution on small networks that the exact solution can be obtained in practical time. By another experiments on larger networks, we demonstrate that the proposed method is more effective than the conventional methods of selecting nodes in the order of centrality values and is consistently 640 times faster than greedy method using Monte-Carlo simulation without losing much accuracy. © 2015, Japanese Society for Artificial Intelligence. All rights reserved.
引用
收藏
页码:693 / 702
相关论文
共 50 条
  • [31] Influence Maximization in Signed Networks by Enhancing the Negative Influence
    Dai, Caiyan
    Hu, Kongfa
    IEEE ACCESS, 2021, 9 : 44084 - 44093
  • [32] TBCELF: Temporal Budget-Aware Influence Maximization
    Zahoor, Aaqib
    Gillani, Iqra Altaf
    Bashir, Janibul
    PROCEEDINGS OF 7TH JOINT INTERNATIONAL CONFERENCE ON DATA SCIENCE AND MANAGEMENT OF DATA, CODS-COMAD 2024, 2024, : 580 - 581
  • [33] Two Influence Maximization Games on Graphs Made Temporal
    Boehmer, Niclas
    Froese, Vincent
    Henkel, Julia
    Lasars, Yvonne
    Niedermeier, Rolf
    Renken, Malte
    PROCEEDINGS OF THE THIRTIETH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, IJCAI 2021, 2021, : 45 - 51
  • [34] Efficient algorithms for influence maximization in social networks
    Chen, Yi-Cheng
    Peng, Wen-Chih
    Lee, Suh-Yin
    KNOWLEDGE AND INFORMATION SYSTEMS, 2012, 33 (03) : 577 - 601
  • [35] Collective Influence Maximization in Mobile Social Networks
    Wu, Xudong
    Fu, Luoyi
    Wang, Shuaiqi
    Jiang, Bo
    Wang, Xinbing
    Chen, Guihai
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (02) : 797 - 812
  • [36] Influence Maximization with Priority in Online Social Networks
    Pham, Canh V.
    Ha, Dung K. T.
    Vu, Quang C.
    Su, Anh N.
    Hoang, Huan X.
    ALGORITHMS, 2020, 13 (08)
  • [37] Influence maximization in social networks based on TOPSIS
    Zareie, Ahmad
    Sheikhahmadi, Amir
    Khamforoosh, Keyhan
    EXPERT SYSTEMS WITH APPLICATIONS, 2018, 108 : 96 - 107
  • [38] Influence maximization of informed agents in social networks
    AskariSichani, Omid
    Jalili, Mahdi
    APPLIED MATHEMATICS AND COMPUTATION, 2015, 254 : 229 - 239
  • [39] Influence Maximization in Social Networks with Genetic Algorithms
    Bucur, Doina
    Iacca, Giovanni
    APPLICATIONS OF EVOLUTIONARY COMPUTATION, EVOAPPLICATIONS 2016, PT I, 2016, 9597 : 379 - 392
  • [40] Time Constrained Influence Maximization in Social Networks
    Liu, Bo
    Cong, Gao
    Xu, Dong
    Zeng, Yifeng
    12TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM 2012), 2012, : 439 - 448