2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), Social Computing and Networking (SocialCom), Sus 2016
DOI: 10.1109/bdcloud-socialcom-sustaincom.2016.67
|View full text |Cite
|
Sign up to set email alerts
|

Threshold-Bounded Influence Dominating Sets for Recommendations in Social Networks

Abstract: Abstract-The process of decision making in humans involves a combination of the genuine information held by the individual, and the external influence from their social network connections. This helps individuals to make decisions or adopt behaviors, opinions or products. In this work, we seek to investigate under which conditions and with what cost we can form neighborhoods of influence within a social network, in order to assist individuals with little or no prior genuine information through a two-phase reco… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
17
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
5
1

Relationship

3
3

Authors

Journals

citations
Cited by 8 publications
(17 citation statements)
references
References 36 publications
(33 reference statements)
0
17
0
Order By: Relevance
“…This line of work is drawing inspiration from social correlation theories such as homophily and social influence [18,19]. Most of the existing approaches regard this as a long-term, network diffusion process, and follow a graph-theoretic approach to solve the problem of identification of influentials in a social network [2,6,13].…”
mentioning
confidence: 99%
“…This line of work is drawing inspiration from social correlation theories such as homophily and social influence [18,19]. Most of the existing approaches regard this as a long-term, network diffusion process, and follow a graph-theoretic approach to solve the problem of identification of influentials in a social network [2,6,13].…”
mentioning
confidence: 99%
“…As mentioned earlier, this research extends the NewGreedy algorithm proposed by Eirinaki et al [5]. The EWThr threshold approach is equivalent to finding activated nodes evaluated by the NewGreedy approach, in which the threshold in an undirected graph is degree-dependent for every node.…”
Section: Tb-ip Algorithmmentioning
confidence: 82%
“…The objective is to maximize influence with the minimum number of influencers, and thus this is defined as a min-max problem. We extend previous work [5] that focused on undirected graphs with no cascades, and propose a threshold-bounded influence propagation algorithm that can be applied on directed graphs, taking into account cascading of information in the network. We then propose a two-step recommendation process, in which our proposed algorithm is employed as a pre-processing step to form social graph-based user neighborhoods to be used as input to the recommendation algorithm.…”
Section: Introductionmentioning
confidence: 93%
See 2 more Smart Citations