Series ISSN: 2153-5418
Series ISSN: 2153-5418
Series ISSN: 2153-5418
SYNTHESIS LECTURES ON DATA MANAGEMENT
SYNTHESIS LECTURES ON DATA MANAGEMENT
SYNTHESIS LECTURES ON DATA MANAGEMENT
Series Editor: M. Tamer Özsu, University of Waterloo
Series Editor: M. Tamer Özsu, University of Waterloo
Series Editor: M. Tamer Özsu, University of Waterloo
Information and Influence Propagation in Social Networks
Information and Influence Propagation in Social Networks
Information and Influence Propagation in Social Networks
Wei Chen, Microsoft Reseacrh Asia, Laks V.S. Lakshmanan, University of Bristish Columbia
Wei Chen, Microsoft Reseacrh Asia, Laks V.S. Lakshmanan, University of Bristish Columbia
Wei Chen, Microsoft Reseacrh Asia, Laks V.S. Lakshmanan, University of Bristish Columbia
and Carlos Castillo, Qatar Computing Institute
and Carlos Castillo, Qatar Computing Institute
and Carlos Castillo, Qatar Computing Institute
Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the
Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the
Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the
spectacular growth of social media and online social networking sites, which continue growing at a very fast pace,
spectacular growth of social media and online social networking sites, which continue growing at a very fast pace,
spectacular growth of social media and online social networking sites, which continue growing at a very fast pace,
as well as by the increasing availability of very large social network datasets for purposes of research. A rich body
as well as by the increasing availability of very large social network datasets for purposes of research. A rich body
as well as by the increasing availability of very large social network datasets for purposes of research. A rich body
of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections,
of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections,
of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections,
practices and customs through networks. Can we build models to explain the way these propagations occur? How
practices and customs through networks. Can we build models to explain the way these propagations occur? How
practices and customs through networks. Can we build models to explain the way these propagations occur? How
can we validate our models against any available real datasets consisting of a social network and propagation traces
can we validate our models against any available real datasets consisting of a social network and propagation traces
can we validate our models against any available real datasets consisting of a social network and propagation traces
that occurred in the past? These are just some questions studied by researchers in this area. Information propagation
that occurred in the past? These are just some questions studied by researchers in this area. Information propagation
that occurred in the past? These are just some questions studied by researchers in this area. Information propagation
models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch
models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch
models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch
important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems
important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems
important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems
arising in these applications have been abstracted and studied extensively by researchers under the garb of influence
arising in these applications have been abstracted and studied extensively by researchers under the garb of influence
arising in these applications have been abstracted and studied extensively by researchers under the garb of influence
maximization.
maximization.
maximization.
This book starts with a detailed description of well-established diffusion models, including the independent
This book starts with a detailed description of well-established diffusion models, including the independent
This book starts with a detailed description of well-established diffusion models, including the independent
cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We
cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We
cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We
describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget,
describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget,
describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget,
and time-criticality, among many others. We delve deep into the key problem of influence maximization, which
and time-criticality, among many others. We delve deep into the key problem of influence maximization, which
and time-criticality, among many others. We delve deep into the key problem of influence maximization, which
selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in
selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in
selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in
classic diffusion models including both the independent cascade and the linear threshold models is computationally
classic diffusion models including both the independent cascade and the linear threshold models is computationally
classic diffusion models including both the independent cascade and the linear threshold models is computationally
intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that
intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that
intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that
have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn
have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn
have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn
this research into practice, such as learning the strength with which individuals in a network influence each other,
this research into practice, such as learning the strength with which individuals in a network influence each other,
this research into practice, such as learning the strength with which individuals in a network influence each other,
as well as the practical aspects of this research including the availability of datasets and software tools for facilitating
as well as the practical aspects of this research including the availability of datasets and software tools for facilitating
as well as the practical aspects of this research including the availability of datasets and software tools for facilitating
research. We conclude with a discussion of various research problems that remain open, both from a technical
research. We conclude with a discussion of various research problems that remain open, both from a technical
research. We conclude with a discussion of various research problems that remain open, both from a technical
perspective and from the viewpoint of transferring the results of research into industry strength applications.
perspective and from the viewpoint of transferring the results of research into industry strength applications.
perspective and from the viewpoint of transferring the results of research into industry strength applications.
C
C
C
H
H
H
E
E
E
N
N
N
•
•
•
L
L
L
A
A
A
K
K
K
S
S
S
H
H
H
M
M
M
A
A
A
N
N
N
A
A
A
N
N
N
•
•
•
C
C
C
A
A
A
S
S
S
T
T
T
I
I
I
L
L
L
L
L
L
O
O
O
I
I
I
N
N
N
F
F
F
O
O
O
R
R
R
M
M
M
A
A
A
T
T
T
I
I
I
O
O
O
N
N
N
A
A
A
N
N
N
D
D
D
I
I
I
N
N
N
F
F
F
L
L
L
U
U
U
E
E
E
N
N
N
C
C
C
E
E
E
P
P
P
R
R
R
O
O
O
P
P
P
A
A
A
G
G
G
A
A
A
T
T
T
I
I
I
O
O
O
N
N
N
I
I
I
N
N
N
S
S
S
O
O
O
C
C
C
I
I
I
A
A
A
L
L
L
N
N
N
E
E
E
T
T
T
W
W
W
O
O
O
R
R
R
K
K
K
S
S
S
&
&
&
CM& Morgan Claypool Publishers
CM& Morgan Claypool Publishers
CM& Morgan Claypool Publishers
Information and
Information and
Information and
Influence Propagation
Influence Propagation
Influence Propagation
in Social Networks
in Social Networks
in Social Networks
Wei Chen
Wei Chen
Wei Chen
Laks V.S. Lakshmanan
Laks V.S. Lakshmanan
Laks V.S. Lakshmanan
Carlos Castillo
Carlos Castillo
Carlos Castillo
About SYNTHESIs
About SYNTHESIs
About SYNTHESIs
This volume is a printed version of a work that appears in the Synthesis
This volume is a printed version of a work that appears in the Synthesis
This volume is a printed version of a work that appears in the Synthesis
Digital Library of Engineering and Computer Science. Synthesis Lectures
Digital Library of Engineering and Computer Science. Synthesis Lectures
Digital Library of Engineering and Computer Science. Synthesis Lectures
provide concise, original presentations of important research and development
provide concise, original presentations of important research and development
provide concise, original presentations of important research and development
topics, published quickly, in digital and print formats. For more information
topics, published quickly, in digital and print formats. For more information
topics, published quickly, in digital and print formats. For more information
visit www.morganclaypool.com
visit www.morganclaypool.com
visit www.morganclaypool.com
&
&
&
Morgan Claypool Publishers
Morgan Claypool Publishers
Morgan Claypool Publishers
w w w . m o r g a n c l a y p o o l . c o m
w w w . m o r g a n c l a y p o o l . c o m
w w w . m o r g a n c l a y p o o l . c o m
ISBN: 978-1-62705-115-6
ISBN: 978-1-62705-115-6
ISBN: 978-1-62705-115-6
90000
90000
90000
9 781627 051156
9 781627 051156
9 781627 051156
M
M
M
O
O
O
R
R
R
G
G
G
A
A
A
N
N
N
&
&
&
C
C
C
L
L
L
A
A
A
Y
Y
Y
P
P
P
O
O
O
O
O
O
L
L
L
SYNTHESIS LECTURES ON DATA MANAGEMENT
SYNTHESIS LECTURES ON DATA MANAGEMENT
SYNTHESIS LECTURES ON DATA MANAGEMENT
M. Tamer Özsu, Series Editor
M. Tamer Özsu, Series Editor
M. Tamer Özsu, Series Editor
Information and Influence
Propagation in
Social Networks
Synthesis Lectures on Data
Management
Editor
M. Tamer Özsu, University of Waterloo
Synthesis Lectures on Data Management is edited by Tamer Özsu of the University of Waterloo.
e series will publish 50- to 125 page publications on topics pertaining to data management. e
scope will largely follow the purview of premier information and computer science conferences, such
as ACM SIGMOD, VLDB, ICDE, PODS, ICDT, and ACM KDD. Potential topics include, but
not are limited to: query languages, database system architectures, transaction management, data
warehousing, XML and databases, data stream systems, wide scale data distribution, multimedia
data management, data mining, and related subjects.
Information and Influence Propagation in Social Networks
Wei Chen, Laks V.S. Lakshmanan, and Carlos Castillo
2013
Data Cleaning: A Practical Perspective
Venkatesh Ganti and Anish Das Sarma
2013
Data Processing on FPGAs
Jens Teubner and Louis Woods
2013
Perspectives on Business Intelligence
Raymond T. Ng, Patricia C. Arocena, Denilson Barbosa, Giuseppe Carenini, Luiz Gomes, Jr.
Stephan Jou, Rock Anthony Leung, Evangelos Milios, Renée J. Miller, John Mylopoulos, Rachel A.
Pottinger, Frank Tompa, and Eric Yu
2013
Semantics Empowered Web 3.0: Managing Enterprise, Social, Sensor, and Cloud-based
Data and Services for Advanced Applications
Amit Sheth and Krishnaprasad irunarayan
2012
Data Management in the Cloud: Challenges and Opportunities
Divyakant Agrawal, Sudipto Das, and Amr El Abbadi
2012
iii
Query Processing over Uncertain Databases
Lei Chen and Xiang Lian
2012
Foundations of Data Quality Management
Wenfei Fan and Floris Geerts
2012
Incomplete Data and Data Dependencies in Relational Databases
Sergio Greco, Cristian Molinaro, and Francesca Spezzano
2012
Business Processes: A Database Perspective
Daniel Deutch and Tova Milo
2012
Data Protection from Insider reats
Elisa Bertino
2012
Deep Web Query Interface Understanding and Integration
Eduard C. Dragut, Weiyi Meng, and Clement T. Yu
2012
P2P Techniques for Decentralized Applications
Esther Pacitti, Reza Akbarinia, and Manal El-Dick
2012
Query Answer Authentication
HweeHwa Pang and Kian-Lee Tan
2012
Declarative Networking
Boon au Loo and Wenchao Zhou
2012
Full-Text (Substring) Indexes in External Memory
Marina Barsky, Ulrike Stege, and Alex omo
2011
Spatial Data Management
Nikos Mamoulis
2011
Database Repairing and Consistent Query Answering
Leopoldo Bertossi
2011
iv
Managing Event Information: Modeling, Retrieval, and Applications
Amarnath Gupta and Ramesh Jain
2011
Fundamentals of Physical Design and Query Compilation
David Toman and Grant Weddell
2011
Methods for Mining and Summarizing Text Conversations
Giuseppe Carenini, Gabriel Murray, and Raymond Ng
2011
Probabilistic Databases
Dan Suciu, Dan Olteanu, Christopher Ré, and Christoph Koch
2011
Peer-to-Peer Data Management
Karl Aberer
2011
Probabilistic Ranking Techniques in Relational Databases
Ihab F. Ilyas and Mohamed A. Soliman
2011
Uncertain Schema Matching
Avigdor Gal
2011
Fundamentals of Object Databases: Object-Oriented and Object-Relational Design
Suzanne W. Dietrich and Susan D. Urban
2010
Advanced Metasearch Engine Technology
Weiyi Meng and Clement T. Yu
2010
Web Page Recommendation Models: eory and Algorithms
Sule Gündüz-Ögüdücü
2010
Multidimensional Databases and Data Warehousing
Christian S. Jensen, Torben Bach Pedersen, and Christian omsen
2010
Database Replication
Bettina Kemme, Ricardo Jimenez-Peris, and Marta Patino-Martinez
2010
v
Relational and XML Data Exchange
Marcelo Arenas, Pablo Barcelo, Leonid Libkin, and Filip Murlak
2010
User-Centered Data Management
Tiziana Catarci, Alan Dix, Stephen Kimani, and Giuseppe Santucci
2010
Data Stream Management
Lukasz Golab and M. Tamer Özsu
2010
Access Control in Data Management Systems
Elena Ferrari
2010
An Introduction to Duplicate Detection
Felix Naumann and Melanie Herschel
2010
Privacy-Preserving Data Publishing: An Overview
Raymond Chi-Wing Wong and Ada Wai-Chee Fu
2010
Keyword Search in Databases
Jeffrey Xu Yu, Lu Qin, and Lijun Chang
2009
Copyright © 2014 by Morgan & Claypool
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in
any form or by any means—electronic, mechanical, photocopy, recording, or any other except for brief quotations
in printed reviews, without the prior permission of the publisher.
Information and Influence Propagation in Social Networks
Wei Chen, Laks V.S. Lakshmanan, and Carlos Castillo
www.morganclaypool.com
ISBN: 9781627051156
ISBN: 9781627051163
paperback
ebook
DOI 10.2200/S00527ED1V01Y201308DTM037
A Publication in the Morgan & Claypool Publishers series
SYNTHESIS LECTURES ON DATA MANAGEMENT
Lecture #37
Series Editor: M. Tamer Özsu, University of Waterloo
Series ISSN
Synthesis Lectures on Data Management
Print 2153-5418 Electronic 2153-5426