MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
Mining the network value of customers
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Rumor routing algorthim for sensor networks
WSNA '02 Proceedings of the 1st ACM international workshop on Wireless sensor networks and applications
Mobility increases the capacity of ad hoc wireless networks
IEEE/ACM Transactions on Networking (TON)
Mining knowledge-sharing sites for viral marketing
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the 4th ACM international symposium on Mobile ad hoc networking & computing
Maximizing the spread of influence through a social network
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
PeopleNet: engineering a wireless virtual social network
Proceedings of the 11th annual international conference on Mobile computing and networking
Building realistic mobility models from coarse-grained traces
Proceedings of the 4th international conference on Mobile systems, applications and services
SybilGuard: defending against sybil attacks via social networks
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Impact of Human Mobility on Opportunistic Forwarding Algorithms
IEEE Transactions on Mobile Computing
Micro-Blog: sharing and querying content through mobile phones and social participation
Proceedings of the 6th international conference on Mobile systems, applications, and services
The convergence of social and technological networks
Communications of the ACM - Remembering Jim Gray
Media sharing based on colocation prediction in urban transport
Proceedings of the 14th ACM international conference on Mobile computing and networking
Efficient influence maximization in social networks
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
It’s Time to Eat! Using Mobile Games to Promote Healthy Eating
IEEE Pervasive Computing
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Overlapping communities in dynamic networks: their detection and mobile applications
MobiCom '11 Proceedings of the 17th annual international conference on Mobile computing and networking
Selective reprogramming of mobile sensor networks through social community detection
EWSN'10 Proceedings of the 7th European conference on Wireless Sensor Networks
Mobile Data Offloading through Opportunistic Communications and Social Participation
IEEE Transactions on Mobile Computing
Fixed point opportunistic routing in delay tolerant networks
IEEE Journal on Selected Areas in Communications
How influential are you: detecting influential bloggers in a blogging community
SocInfo'12 Proceedings of the 4th international conference on Social Informatics
Hi-index | 0.00 |
In this paper, we study the problem of identifying influential users in mobile social networks. Traditional approaches find these users through centralized algorithms on either friendship or social-contact graphs of all users. However, the computational complexity of these algorithms is known to be very high, making them unsuitable for large-scale networks. We propose a lightweight and distributed protocol, iWander, to identify influential users through fixed-length random walks. To the best of our knowledge, we are the first to design a distributed protocol on smartphones that leverages random walks for identifying influential mobile users, although this technique has been used in other areas. The most attractive feature of iWander is its extremely low message overhead, which lends itself well to mobile applications. We evaluate the performance of iWander for two applications, targeted immunization of infectious diseases and target-set selection for information dissemination. Through extensive simulation studies using a real-world mobility trace, we demonstrate that targeted immunization using iWander achieves a comparable performance with a degree-based immunization policy that vaccinates users with large number of contacts first, while consuming only less than 1% of this policy's message overhead. We also show that target-set selection based on iWander outperforms the random and degree-based target-set selections for information dissemination in several scenarios.