Sorting in c log n parallel steps
Combinatorica
SIAM Journal on Computing
Size bounds for dynamic monopolies
Discrete Applied Mathematics
Approximation algorithms
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
The importance of being biased
STOC '02 Proceedings of the thiry-fourth annual ACM symposium on Theory of computing
Dynamic monopolies of constant size
Journal of Combinatorial Theory Series B
Mining knowledge-sharing sites for viral marketing
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Hardness of Approximation for Vertex-Connectivity Network Design Problems
SIAM Journal on Computing
Inoculation strategies for victims of viruses and the sum-of-squares partition problem
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
On the spread of viruses on the internet
SODA '05 Proceedings of the sixteenth annual ACM-SIAM symposium on Discrete algorithms
FOCS '05 Proceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science
On the submodularity of influence in social networks
Proceedings of the thirty-ninth annual ACM symposium on Theory of computing
On threshold behavior in query incentive networks
Proceedings of the 8th ACM conference on Electronic commerce
The role of compatibility in the diffusion of technologies through social networks
Proceedings of the 8th ACM conference on Electronic commerce
Approximation Algorithms and Hardness for Domination with Propagation
APPROX '07/RANDOM '07 Proceedings of the 10th International Workshop on Approximation and the 11th International Workshop on Randomization, and Combinatorial Optimization. Algorithms and Techniques
Influential nodes in a diffusion model for social networks
ICALP'05 Proceedings of the 32nd international conference on Automata, Languages and Programming
Diffusion of Innovations on Random Networks: Understanding the Chasm
WINE '08 Proceedings of the 4th International Workshop on Internet and Network Economics
An exact almost optimal algorithm for target set selection in social networks
Proceedings of the 10th ACM conference on Electronic commerce
Minimizing the expected complete influence time of a social network
Information Sciences: an International Journal
Note: Combinatorial model and bounds for target set selection
Theoretical Computer Science
Finding spread blockers in dynamic networks
SNAKDD'08 Proceedings of the Second international conference on Advances in social network mining and analysis
New results on the complexity of the max- and min-rep problems
SOFSEM'11 Proceedings of the 37th international conference on Current trends in theory and practice of computer science
Proceedings of the fifth ACM international conference on Web search and data mining
Stable sets of threshold-based cascades on the erdős-rényi random graphs
IWOCA'11 Proceedings of the 22nd international conference on Combinatorial Algorithms
On the non-progressive spread of influence through social networks
LATIN'12 Proceedings of the 10th Latin American international conference on Theoretical Informatics
Triggering cascades on undirected connected graphs
Information Processing Letters
Treewidth governs the complexity of target set selection
Discrete Optimization
The robust set problem: parameterized complexity and approximation
MFCS'12 Proceedings of the 37th international conference on Mathematical Foundations of Computer Science
The firefighter problem with more than one firefighter on trees
Discrete Applied Mathematics
Complex contagion and the weakness of long ties in social networks: revisited
Proceedings of the fourteenth ACM conference on Electronic commerce
Repetition-aware content placement in navigational networks
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Trial and error in influential social networks
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Analysis of misinformation containment in online social networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Weighted graph-based methods for identifying the most influential actors in trust social networks
International Journal of Networking and Virtual Organisations
Hi-index | 0.00 |
In this paper, we study the spread of influence through a social network, in a model initially studied by Kempe, Kleinberg and Tardos [14, 15]: We are given a graph modeling a social network, where each node v has a (fixed) threshold tv, such that the node will adopt a new product if tv of its neighbors adopt it. Our goal is to find a small set S of nodes such that targeting the product to S would lead to adoption of the product by a large number of nodes in the graph. We show strong inapproximability results for several variants of this problem. Our main result says that the problem of minimizing the size of S, while ensuring that targeting S would influence the whole network into adopting the product, is hard to approximate within a polylogarithmic factor. This implies similar results if only a fixed fraction of the network is ensured to adopt the product. Further, the hardness of approximation result continues to hold when all nodes have majority thresholds, or have constant degree and threshold two. The latter answers a complexity question proposed in [10, 29]. We also give some positive results for more restricted cases, such as when the underlying graph is a tree.