scispace - formally typeset
Proceedings ArticleDOI

Efficient Algorithms for Social Network Coverage and Reach

Reads0
Chats0
TLDR
This paper proposes approximation based approaches to solve two specific problems related to information flow in social network applications and shows that these approaches outperform existing approaches using both a theoretical analysis and experimental results.
Abstract
Social networks, though started as a software tool enabling people to connect with each other, have emerged in recent times as platforms for businesses, individuals and government agencies to conduct a number of activities ranging from marketing to emergency situation management. As a result, a large number of social network analytics tools have been developed for a variety of applications. A snapshot of social networks at any particular time, called a social graph, represents the connectivity of nodes and potentially the flow of information amongst the nodes (or vertices) in the graph. Understanding the flow of information in a social graph plays an important role in social network applications. Two specific problems related to information flow have implications in many social network applications: (a) finding a minimum set of nodes one has to know to recover the whole graph (also known as the vertex cover problem) and (b) determining the minimum set of nodes one required to reach all nodes in the graph within a specific number of hops (we refer this as the vertex reach problem). Finding an optimal solution to these problems is NP-Hard. In this paper, we propose approximation based approaches and show that our approaches outperform existing approaches using both a theoretical analysis and experimental results.

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

Computing A Near-Maximum Independent Set in Linear Time by Reducing-Peeling

TL;DR: A Reducing-Peeling framework which iteratively reduces the graph size by applying reduction rules on vertices with very low degrees and temporarily removing the vertex with the highest degree if the reduction rules cannot be applied, and a linear-time algorithm and a near-linear time algorithm that can generate a high-quality independent set from a graph in practice.
Book ChapterDOI

Active Learning for Entity Alignment

TL;DR: One of the main findings is that passive learning approaches, which can be efficiently precomputed and deployed more easily, achieve performance comparable to the active learning strategies.
Book ChapterDOI

Improving Energy Usage in Cloud Computing Using DVFS

TL;DR: An energy-optimized allocation algorithm is proposed where DVFS technique is used for virtual machines and the system model that includes different sub-system models is explained formally and the implementation of algorithms in homogeneous as well as heterogeneous environment is evaluated.
Proceedings ArticleDOI

TweetRipple: Understanding Your Twitter Audience and the Impact of Your Tweets

TL;DR: It is suggested that the ROI is multifaceted, and a framework (CAMIO) is presented to study it and a system, called TweetRipple, built on CAMIO is described to support for people to start answering questions about the effectiveness of one's engagement on social media.
Book ChapterDOI

Active Learning for Entity Alignment

TL;DR: In this article, the authors propose a novel framework for labeling entity alignments in knowledge graph datasets and evaluate different active and passive learning strategies to select informative instances for the human labeler.
References
More filters
Book ChapterDOI

Introduction to Algorithms

Xin-She Yang
TL;DR: This chapter provides an overview of the fundamentals of algorithms and their links to self-organization, exploration, and exploitation.
Proceedings ArticleDOI

Maximizing the spread of influence through a social network

TL;DR: An analysis framework based on submodular functions shows that a natural greedy strategy obtains a solution that is provably within 63% of optimal for several classes of models, and suggests a general approach for reasoning about the performance guarantees of algorithms for these types of influence problems in social networks.
Journal ArticleDOI

Maximizing the Spread of Influence through a Social Network

TL;DR: The problem of finding the most influential nodes in a social network is NP-hard as mentioned in this paper, and the first provable approximation guarantees for efficient algorithms were provided by Domingos et al. using an analysis framework based on submodular functions.
Journal ArticleDOI

A survey on routing protocols for wireless sensor networks

TL;DR: The three main categories explored in this paper are data-centric, hierarchical and location-based; each routing protocol is described and discussed under the appropriate category.
Proceedings ArticleDOI

Cost-effective outbreak detection in networks

TL;DR: This work exploits submodularity to develop an efficient algorithm that scales to large problems, achieving near optimal placements, while being 700 times faster than a simple greedy algorithm and achieving speedups and savings in storage of several orders of magnitude.
Related Papers (5)