Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence 2019
DOI: 10.24963/ijcai.2019/304
|View full text |Cite
|
Sign up to set email alerts
|

Recommending Links to Maximize the Influence in Social Networks

Abstract: Social link recommendation systems, like "People-you-may-know" on Facebook, "Who-to-follow" on Twitter, and "Suggested-Accounts" on Instagram assist the users of a social network in establishing new connections with other users. While these systems are becoming more and more important in the growth of social media, they tend to increase the popularity of users that are already popular. Indeed, since link recommenders aim at predicting users' behavior, they accelerate the creation of links that are likely to be… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
5
4

Relationship

2
7

Authors

Journals

citations
Cited by 16 publications
(16 citation statements)
references
References 22 publications
0
16
0
Order By: Relevance
“…For multiple-source-target case, we employ Hill Climbing (HC) , Eigenvalue-based Optimization (EO) [16], and two more recent methods, ESSSP [36] and IMA [38], as competitors. Both ESSSP and IMA follow the same manner of adding a budget of new edges into the graph, each with a fixed probability.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…For multiple-source-target case, we employ Hill Climbing (HC) , Eigenvalue-based Optimization (EO) [16], and two more recent methods, ESSSP [36] and IMA [38], as competitors. Both ESSSP and IMA follow the same manner of adding a budget of new edges into the graph, each with a fixed probability.…”
Section: Methodsmentioning
confidence: 99%
“…However, such global metric is not query-specific. In real-world, users may tend to optimize the network in a way that is relevant only to themselves, e.g., a campaigner would like to improve the influence [38] of her product to her target customers, but not that of all similar products (from other competitors), and neither to other users who are not her targets. Moreover, many network metrics studied in the past cannot be easily generalized to probabilistic scenarios (e.g., connected component size).…”
Section: Related Workmentioning
confidence: 99%
“…Since our Algorithm 1 is a modified version of the algorithm GREEDY2 presented in [25], whose aim was to maximize the influence diffusion in a social network, we can exploit the same reduction to the Limited Seed Selection problem (LSS) that aims at finding a subset of the initial active users in order to maximize the expected number of influenced users. This reduction allows us to adapt the algorithm presented in [26] in such a way that it finds a subset of a given limited set of edges, i.e., S ⊆ (A 0 × V).…”
Section: Improving the Running Timementioning
confidence: 99%
“…The problem of improving the reachability of a graph is an important graph-theoretical question, which finds applications in several areas. There are several recent possible application scenarios for this problem, for example suggesting friends in a social network in order to increase the spreading of information [1][2][3], reducing the convergence time of random walk processes to perform faster network simulations [4,5], improving wireless sensor networks resilience [6] and even control elections in social networks [7,8].…”
Section: Introductionmentioning
confidence: 99%