Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining 2010
DOI: 10.1145/1835804.1835934
|View full text |Cite
|
Sign up to set email alerts
|

Scalable influence maximization for prevalent viral marketing in large-scale social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

8
1,383
1
6

Year Published

2014
2014
2019
2019

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 1,463 publications
(1,419 citation statements)
references
References 14 publications
8
1,383
1
6
Order By: Relevance
“…They do not have positive or negative weights associated with their edges. Both Independent Cascade (IC) model [1,7,13,14,28] and Linear Threshold (LT) [1] model use unsigned networks. Kempe et al [1] studied the problem of identifying the influential set of nodes in order to maximize the spread of influence.…”
Section: Unsigned Network Modelmentioning
confidence: 99%
See 2 more Smart Citations
“…They do not have positive or negative weights associated with their edges. Both Independent Cascade (IC) model [1,7,13,14,28] and Linear Threshold (LT) [1] model use unsigned networks. Kempe et al [1] studied the problem of identifying the influential set of nodes in order to maximize the spread of influence.…”
Section: Unsigned Network Modelmentioning
confidence: 99%
“…The greedy algorithm proposed by Kempe et al [1] and its improvements are too slow and unscalable. Therefore, W. Chen [7] considered scalability factor and designed a new heuristic algorithm which is easily scalable to billions of nodes as well as edges in the experiments. S. Bharthi [13] studies the influence maximization problem when multiple companies are competing to promote their products or services using viral marketing.…”
Section: Unsigned Network Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Examples of possible speedups include innovations such as the use of a shortest-path based influence cascade model [16] or a lazy-forward optimization algorithm [19] to reduce the number of evaluations on the influence spread of nodes. Clever heuristics have been used very successfully to speed computation in both the LT model (e.g., the PMIA algorithm [8]) and also the IC model [25]. In this chapter, instead of using the original cascade models by Kempe et al we introduce a cascade model that accounts for product interactions and community differences in influence propagation.…”
Section: Related Workmentioning
confidence: 99%
“…Commonly used propagation models such as LTM (Linear Threshold Model) and ICM (Independent Cascade Model) assume that a node's adoption probability is conditioned on the opinions of the local network neighborhood [15]. Much of the previous influence maximization work [10,8,25] uses these two interaction models. Since the original LT model and IC model, other generalized models have been proposed for different domains and specialized applications.…”
Section: Introductionmentioning
confidence: 99%