Skip to main content

Cascade of Edge Activation in Networks

  • Conference paper
  • First Online:
Computational Data and Social Networks (CSoNet 2019)

Abstract

We consider models for inducing a maximum cascade of activating connections in social networks over a finite horizon subject to budget constraints. These models reflect problems of choosing an initial set of pairs of individuals to connect or engage in order to maximize the cascade of new connections or engagements over time. We assume connections activate as a result of past activation of neighboring connections. We show that the optimization problem is NP-hard, and we provide a method for improving computations.

Supported by NRC Research Associateship Programs and the US Air Force Research Laboratory (AFRL) Mathematical Modeling and Optimization Institute and sponsored by AFRL/RW under agreement number FA8651-14-2-0002.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Asavathiratham, C., Roy, S., Lesieutre, B.C., Verghese, G.C.: The influence model. IEEE Control Syst. Mag. 21(6), 52–64 (2001)

    Article  Google Scholar 

  2. Ashokan, R., Zenarosa, G.L., He, X.: Diffusion model for the adoption of smartphone brands under competitive pricing. Int. J. Trade Econ. Finan. 9(3), 96–99 (2018)

    Article  Google Scholar 

  3. Bass, F.M.: A new product growth for model consumer durables. Manag. Sci. 15(5), 215–227 (1969)

    Article  Google Scholar 

  4. Brown, J.J., Reingen, P.H.: Social ties and word-of-mouth referral behavior. J. Consum. Res. 14(3), 350–362 (1987)

    Article  Google Scholar 

  5. Domingos, P., Richardson, M.: Mining the network value of customers. In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2001, pp. 57–66 (2001)

    Google Scholar 

  6. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W. H. Freeman & Co., New York (1979)

    MATH  Google Scholar 

  7. Gillen, C.P., Veremyev, A., Prokopyev, O.A., Pasiliao, E.L.: Critical arcs detection in influence networks. Networks 71(4), 412–431 (2018)

    Article  MathSciNet  Google Scholar 

  8. Goldenberg, J., Libai, B., Muller, E.: Talk of the network: a complex systems look at the underlying process of word-of-mouth. Mark. Lett. 12(3), 211–223 (2001)

    Article  Google Scholar 

  9. Goyal, A., Bonchi, F., Lakshmanan, L.V.S., Venkatasubramanian, S.: On minimizing budget and time in influence propagation over social networks. Soc. Netw. Anal. Min. 3(2), 179–192 (2013)

    Article  Google Scholar 

  10. Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 137–146. ACM, New York (2003)

    Google Scholar 

  11. Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. Theory Comput. 11(4), 105–147 (2015)

    Article  MathSciNet  Google Scholar 

  12. Krackhardt, D.: Assessing the political landscape: structure, cognition, and power in organizations. Adm. Sci. Q. 35(2), 342–369 (1990)

    Article  Google Scholar 

Download references

Acknowledgements

The US Government is authorized to reproduce and distribute reprints for Governmental purposes notwithstanding any copyright notation thereon. The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of AFRL/RW or the US Government.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gabriel Lopez Zenarosa .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Zenarosa, G.L., Veremyev, A., Pasiliao, E.L. (2019). Cascade of Edge Activation in Networks. In: Tagarelli, A., Tong, H. (eds) Computational Data and Social Networks. CSoNet 2019. Lecture Notes in Computer Science(), vol 11917. Springer, Cham. https://doi.org/10.1007/978-3-030-34980-6_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-34980-6_16

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-34979-0

  • Online ISBN: 978-3-030-34980-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics