skip to main content
10.1145/2623330.2623704acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

Scalable diffusion-aware optimization of network topology

Published: 24 August 2014 Publication History

Abstract

How can we optimize the topology of a networked system to bring a flu under control, propel a video to popularity, or stifle a network malware in its infancy? Previous work on information diffusion has focused on modeling the diffusion dynamics and selecting nodes to maximize/minimize influence. Only a paucity of recent studies have attempted to address the network modification problems, where the goal is to either facilitate desirable spreads or curtail undesirable ones by adding or deleting a small subset of network nodes or edges. In this paper, we focus on the widely studied linear threshold diffusion model, and prove, for the first time, that the network modification problems under this model have supermodular objective functions. This surprising property allows us to design efficient data structures and scalable algorithms with provable approximation guarantees, despite the hardness of the problems in question. Both the time and space complexities of our algorithms are linear in the size of the network, which allows us to experiment with millions of nodes and edges. We show that our algorithms outperform an array of heuristics in terms of their effectiveness in controlling diffusion processes, often beating the next best by a significant margin.

Supplementary Material

MP4 File (p1226-sidebyside.mp4)

References

[1]
I. Bogunovic. Robust protection of networks against cascading phenomena. Master's thesis, ETHZ, 2012.
[2]
U. Brandes. A faster algorithm for betweenness centrality. Journal of Mathematical Sociology, 25(2), 2001.
[3]
W. Chen, L. V. Lakshmanan, and C. Castillo. Information and influence propagation in social networks. Synthesis Lectures on Data Management, 2013.
[4]
W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In IEEE ICDM, pages 88--97, 2010.
[5]
E. Cohen. Size-estimation framework with applications to transitive closure and reachability. Journal of Computer and System Sciences, 55(3):441--453, 1997.
[6]
P. Domingos and M. Richardson. Mining the network value of customers. In ACM KDD, pages 57--66, 2001.
[7]
N. Du, L. Song, H. Zha, and M. Gomez Rodriguez. Scalable influence estimation in continuous time diffusion networks. In NIPS, 2013.
[8]
C. Gao, J. Liu, and N. Zhong. Network immunization and virus propagation in email networks: experimental evaluation and analysis. KAIS, 27(2):253--279, 2011.
[9]
X. He, G. Song, W. Chen, and Q. Jiang. Influence blocking maximization in social networks under the competitive linear threshold model. In SDM, 2012.
[10]
H. W. Hethcote. The mathematics of infectious diseases. SIAM review, 42(4):599--653, 2000.
[11]
R. Iyer, S. Jegelka, and J. Bilmes. Fast semidifferential-based submodular function optimization. In ICML, 2013.
[12]
D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In ACM KDD, pages 137--146. ACM, 2003.
[13]
M. Kimura, K. Saito, and H. Motoda. Solving the contamination minimization problem on networks for the linear threshold model. In PRICAI. 2008.
[14]
M. Kimura, K. Saito, and H. Motoda. Blocking links to minimize contamination spread in a social network. ACM TKDD, 3(2):9, 2009.
[15]
C. J. Kuhlman, G. Tuli, S. Swarup, M. V. Marathe, and S. Ravi. Blocking simple and complex contagion by edge removal. In IEEE ICDM, 2013.
[16]
J. Leskovec, L. Backstrom, and J. Kleinberg. Meme-tracking and the dynamics of the news cycle. In ACM KDD, pages 497--506. ACM, 2009.
[17]
J. Leskovec, D. Chakrabarti, J. Kleinberg, C. Faloutsos, and Z. Ghahramani. Kronecker graphs: An approach to modeling networks. 11(Feb):985--1042, 2010.
[18]
G. Nemhauser, L. Wolsey, and M. Fisher. An analysis of the approximations for maximizing submodular set functions. Mathematical Programming, 14, 1978.
[19]
S. Peng, S. Yu, and A. Yang. Smartphone malware and its propagation modeling: A survey. IEEE Communications Surveys Tutorials, PP(99):1--17, 2013.
[20]
C. M. Schneider, T. Mihaljev, S. Havlin, and H. J. Herrmann. Suppressing epidemics with a limited amount of immunization units. Physical Review E, 84(6), 2011.
[21]
D. Sheldon, B. Dilkina, A. N. Elmachtoub, R. Finseth, et al. Maximizing the spread of cascades using network design. UAI, 2010.
[22]
H. Tong, B. A. Prakash, T. Eliassi-Rad, M. Faloutsos, and C. Faloutsos. Gelling, and melting, large graphs by edge manipulation. In ACM CIKM, 2012.

Cited By

View all

Index Terms

  1. Scalable diffusion-aware optimization of network topology

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    KDD '14: Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining
    August 2014
    2028 pages
    ISBN:9781450329569
    DOI:10.1145/2623330
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 24 August 2014

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. approximation
    2. diffusion networks
    3. network optimization
    4. supermodularity

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    KDD '14
    Sponsor:

    Acceptance Rates

    KDD '14 Paper Acceptance Rate 151 of 1,036 submissions, 15%;
    Overall Acceptance Rate 1,133 of 8,635 submissions, 13%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)47
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 06 Nov 2024

    Other Metrics

    Citations

    Cited By

    View all

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media