4.7 Article

CT-IC: Continuously activated and Time-restricted Independent Cascade model for viral marketing

Journal

KNOWLEDGE-BASED SYSTEMS
Volume 62, Issue -, Pages 57-68

Publisher

ELSEVIER
DOI: 10.1016/j.knosys.2014.02.013

Keywords

Influence maximization; Viral marketing; Social networks; Influence diffusion model; Graph mining

Funding

  1. Next-Generation Information Computing Development Program through the National Research Foundation of Korea (NRF) - Ministry of Education, Science and Technology [2012M3C4A7033344]
  2. National Research Foundation of Korea (NRF) - Korea government (MEST) [2013R1A2A2A01067425]
  3. National Research Foundation of Korea [2013R1A2A2A01067425] Funding Source: Korea Institute of Science & Technology Information (KISTI), National Science & Technology Information Service (NTIS)

Ask authors/readers for more resources

Influence maximization problem has gained much attention, which is to find the most influential people. Efficient algorithms have been proposed to solve influence maximization problem according to the proposed diffusion models. Existing diffusion models assume that a node influences its neighbors once, and there is no time constraint in activation process. However, in real-world marketing situations, people influence his/her acquaintances repeatedly, and there are often time restrictions for a marketing. This paper proposes a new realistic influence diffusion model Continuously activated and Time-restricted IC (CT-IC) model which generalizes the IC model. In CT-IC model, every active node activate its neighbors repeatedly, and activation continues until a given time. We first prove CT-IC model satisfies monotonicity and submodularity for influence spread. We then provide an efficient method for calculating exact influence spread for a directed tree. Finally, we propose a scalable influence evaluation algorithm under CT-IC model CT-IPA. Our experiments show CT-IC model finds seeds of higher influence spread than IC model, and CT-IPA is four orders of magnitude faster than the greedy algorithm while providing similar influence spread. (C) 2014 Elsevier B.V. All rights reserved.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.7
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available