skip to main content
10.1145/3077136.3080646acmconferencesArticle/Chapter ViewAbstractPublication PagesirConference Proceedingsconference-collections
short-paper

Leveraging Cross-Network Information for Graph Sparsification in Influence Maximization

Authors Info & Claims
Published:07 August 2017Publication History

ABSTRACT

When tackling large-scale influence maximization (IM) problem, one effective strategy is to employ graph sparsification as a pre-processing step, by removing a fraction of edges to make original networks become more concise and tractable for the task. In this work, a Cross-Network Graph Sparsification (CNGS) model is proposed to leverage the influence backbone knowledge pre-detected in a source network to predict and remove the edges least likely to contribute to the influence propagation in the target networks. Experimental results demonstrate that conducting graph sparsification by the proposed CNGS model can obtain a good trade-off between efficiency and effectiveness of IM, i.e., existing IM greedy algorithms can run more efficiently, while the loss of influence spread can be made as small as possible in the sparse target networks.

References

  1. P. Domingos, and M. Richardson. Mining the network value of customers. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. J. Leskovec, A. Krause, and C. Guestrin. Cost-effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. A. Goyal, W. Lu, and L. V. S. Lakshmanan. Celf++: Optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th International Conference Companion on World Wide Web, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. B. Wilder, and G. Sukthankar. Sparsification of Social Networks Using Random Walks. In Proceedings of International Conference on Social Computation (SocialCom), 2015.Google ScholarGoogle Scholar
  7. M. Mathioudakis, F. Bonchi, and C. Castillo. Sparsification of influence networks. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. F. Zhou, S.Mahler, and H. Toivonen. Simplification of networks by edge pruning. In Bisociative Knowledge Discovery, 2012. Google ScholarGoogle ScholarCross RefCross Ref
  9. H. Lamba, and R. Narayanam. A novel and model independent approach for efficient influence maximization in social networks. In Proceedings of International Conference on Web Information Systems Engineering, 2013. Google ScholarGoogle ScholarCross RefCross Ref
  10. Q. Hu, G. Wang, and P. S. Yu. Transferring influence: Supervised learning for efficient influence maximization across networks. In International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom), 2014.Google ScholarGoogle Scholar
  11. M. Chen, K. Q. Weinberger, and J. Blitzer. Co-training for domain adaptation. In Advances in Neural Information Processing Systems, 2011.Google ScholarGoogle Scholar

Index Terms

  1. Leveraging Cross-Network Information for Graph Sparsification in Influence Maximization

                    Recommendations

                    Comments

                    Login options

                    Check if you have access through your login credentials or your institution to get full access on this article.

                    Sign in
                    • Published in

                      cover image ACM Conferences
                      SIGIR '17: Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval
                      August 2017
                      1476 pages
                      ISBN:9781450350228
                      DOI:10.1145/3077136

                      Copyright © 2017 ACM

                      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                      Publisher

                      Association for Computing Machinery

                      New York, NY, United States

                      Publication History

                      • Published: 7 August 2017

                      Permissions

                      Request permissions about this article.

                      Request Permissions

                      Check for updates

                      Qualifiers

                      • short-paper

                      Acceptance Rates

                      SIGIR '17 Paper Acceptance Rate78of362submissions,22%Overall Acceptance Rate792of3,983submissions,20%

                    PDF Format

                    View or Download as a PDF file.

                    PDF

                    eReader

                    View online with eReader.

                    eReader