Proceedings of the 2017 ACM International Conference on Management of Data 2017
DOI: 10.1145/3035918.3035924
|View full text |Cite
|
Sign up to set email alerts
|

Debunking the Myths of Influence Maximization

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
38
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 109 publications
(39 citation statements)
references
References 25 publications
1
38
0
Order By: Relevance
“…Golovin and Krause [18] show that the above greedy policy returns a (ln η + 1) 2 -approximate solution to the optimum. 1 This approximation guarantee, however, does not lead to a practical algorithm for the ASM problem, because (i) it requires the help from an oracle to exactly identify the node with the maximum expected marginal truncated spread in each round, but (ii) computing the exact expected spread of any node set is #P-hard [7].…”
Section: Existing Solutionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Golovin and Krause [18] show that the above greedy policy returns a (ln η + 1) 2 -approximate solution to the optimum. 1 This approximation guarantee, however, does not lead to a practical algorithm for the ASM problem, because (i) it requires the help from an oracle to exactly identify the node with the maximum expected marginal truncated spread in each round, but (ii) computing the exact expected spread of any node set is #P-hard [7].…”
Section: Existing Solutionsmentioning
confidence: 99%
“…Motivated by this observation, Vaswani and Lakshmanan [42] attempt to extend Golovin and Krause's method by replacing the oracle with an spread estimator with bounded errors. In particular, they assume that for any 1 Golovin and Krause claim that the approximation guarantee is (ln η + 1) in an earlier version of their work [17], but point out that the proof has gaps in a revised version [18].…”
Section: Existing Solutionsmentioning
confidence: 99%
“…One particularly promising set of algorithms use the concept of reverse reachable (RR) sets to select seed nodes. These include the TIM, TIM+ [11] and IMM [12] algorithms, which are currently considered to be among the top-performing influence maximisation approaches on realistic benchmark problems [13].…”
Section: Related Workmentioning
confidence: 99%
“…A rich literature followed, focusing on computationally efficient and scalable algorithms to solve IM. The recent benchmarking study of Arora et al [4] summarizes state-of-the-art techniques and also debunks many IM myths.…”
Section: Introductionmentioning
confidence: 99%
“…Importantly, all the IM studies discussed in [4] have as starting point a specific diffusion model (IC or LT), whose graph topology and parameters -basically the edge weights -are known. In order to infer the diffusion parameters or the underlying graph structure, or both, [5], [6], [7], [8] propose offline, model-specific methods, which rely on observed information cascades.…”
Section: Introductionmentioning
confidence: 99%