Information and Influence Propagation in Social Networks

Information and Influence Propagation in Social Networks

Author: Wei Chen

Publisher: Springer Nature

Published: 2022-05-31

Total Pages: 161

ISBN-13: 3031018508

DOWNLOAD EBOOK

Research on social networks has exploded over the last decade. To a large extent, this has been fueled by the spectacular growth of social media and online social networking sites, which continue growing at a very fast pace, as well as by the increasing availability of very large social network datasets for purposes of research. A rich body of this research has been devoted to the analysis of the propagation of information, influence, innovations, infections, practices and customs through networks. Can we build models to explain the way these propagations occur? How can we validate our models against any available real datasets consisting of a social network and propagation traces that occurred in the past? These are just some questions studied by researchers in this area. Information propagation models find applications in viral marketing, outbreak detection, finding key blog posts to read in order to catch important stories, finding leaders or trendsetters, information feed ranking, etc. A number of algorithmic problems arising in these applications have been abstracted and studied extensively by researchers under the garb of influence maximization. This book starts with a detailed description of well-established diffusion models, including the independent cascade model and the linear threshold model, that have been successful at explaining propagation phenomena. We describe their properties as well as numerous extensions to them, introducing aspects such as competition, budget, and time-criticality, among many others. We delve deep into the key problem of influence maximization, which selects key individuals to activate in order to influence a large fraction of a network. Influence maximization in classic diffusion models including both the independent cascade and the linear threshold models is computationally intractable, more precisely #P-hard, and we describe several approximation algorithms and scalable heuristics that have been proposed in the literature. Finally, we also deal with key issues that need to be tackled in order to turn this research into practice, such as learning the strength with which individuals in a network influence each other, as well as the practical aspects of this research including the availability of datasets and software tools for facilitating research. We conclude with a discussion of various research problems that remain open, both from a technical perspective and from the viewpoint of transferring the results of research into industry strength applications.


Social Informatics

Social Informatics

Author: Leonard Bolc

Publisher: Springer Science & Business Media

Published: 2010-10-19

Total Pages: 259

ISBN-13: 3642165664

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the Second International Conference on Social Informatics, SocInfo 2010, held in Laxenburg, Austria, in October 2010. The 17 revised full papers presented were carefully reviewed and selected from numerous submissions and feature both the theoretical social network analysis and its practical applications for social recommendation as well as social aspects of virtual collaboration, ranging from social studies of computer supported collaborative work, to the study of enhancements of the Wiki technology. Further topics are research on Webmining, opinion mining, and sentiment analysis; privacy and trust; computational social choice; and virtual teamwork.


Machine Learning and Knowledge Discovery in Databases

Machine Learning and Knowledge Discovery in Databases

Author: Peter A. Flach

Publisher: Springer

Published: 2012-08-15

Total Pages: 867

ISBN-13: 9783642334856

DOWNLOAD EBOOK

This two-volume set LNAI 7523 and LNAI 7524 constitutes the refereed proceedings of the European Conference on Machine Learning and Knowledge Discovery in Databases: ECML PKDD 2012, held in Bristol, UK, in September 2012. The 105 revised research papers presented together with 5 invited talks were carefully reviewed and selected from 443 submissions. The final sections of the proceedings are devoted to Demo and Nectar papers. The Demo track includes 10 papers (from 19 submissions) and the Nectar track includes 4 papers (from 14 submissions). The papers grouped in topical sections on association rules and frequent patterns; Bayesian learning and graphical models; classification; dimensionality reduction, feature selection and extraction; distance-based methods and kernels; ensemble methods; graph and tree mining; large-scale, distributed and parallel mining and learning; multi-relational mining and learning; multi-task learning; natural language processing; online learning and data streams; privacy and security; rankings and recommendations; reinforcement learning and planning; rule mining and subgroup discovery; semi-supervised and transductive learning; sensor data; sequence and string mining; social network mining; spatial and geographical data mining; statistical methods and evaluation; time series and temporal data mining; and transfer learning.


Trends in Social Network Analysis

Trends in Social Network Analysis

Author: Rokia Missaoui

Publisher: Springer

Published: 2017-04-29

Total Pages: 263

ISBN-13: 3319534203

DOWNLOAD EBOOK

The book collects contributions from experts worldwide addressing recent scholarship in social network analysis such as influence spread, link prediction, dynamic network biclustering, and delurking. It covers both new topics and new solutions to known problems. The contributions rely on established methods and techniques in graph theory, machine learning, stochastic modelling, user behavior analysis and natural language processing, just to name a few. This text provides an understanding of using such methods and techniques in order to manage practical problems and situations. Trends in Social Network Analysis: Information Propagation, User Behavior Modelling, Forecasting, and Vulnerability Assessment appeals to students, researchers, and professionals working in the field.


Advances in Electronics, Communication and Computing

Advances in Electronics, Communication and Computing

Author: Akhtar Kalam

Publisher: Springer

Published: 2017-10-27

Total Pages: 797

ISBN-13: 9811047650

DOWNLOAD EBOOK

This book is a compilation of research work in the interdisciplinary areas of electronics, communication, and computing. This book is specifically targeted at students, research scholars and academicians. The book covers the different approaches and techniques for specific applications, such as particle-swarm optimization, Otsu’s function and harmony search optimization algorithm, triple gate silicon on insulator (SOI)MOSFET, micro-Raman and Fourier Transform Infrared Spectroscopy (FTIR) analysis, high-k dielectric gate oxide, spectrum sensing in cognitive radio, microstrip antenna, Ground-penetrating radar (GPR) with conducting surfaces, and digital image forgery detection. The contents of the book will be useful to academic and professional researchers alike.


Python for Graph and Network Analysis

Python for Graph and Network Analysis

Author: Mohammed Zuhair Al-Taie

Publisher: Springer

Published: 2017-03-20

Total Pages: 214

ISBN-13: 3319530046

DOWNLOAD EBOOK

This research monograph provides the means to learn the theory and practice of graph and network analysis using the Python programming language. The social network analysis techniques, included, will help readers to efficiently analyze social data from Twitter, Facebook, LiveJournal, GitHub and many others at three levels of depth: ego, group, and community. They will be able to analyse militant and revolutionary networks and candidate networks during elections. For instance, they will learn how the Ebola virus spread through communities. Practically, the book is suitable for courses on social network analysis in all disciplines that use social methodology. In the study of social networks, social network analysis makes an interesting interdisciplinary research area, where computer scientists and sociologists bring their competence to a level that will enable them to meet the challenges of this fast-developing field. Computer scientists have the knowledge to parse and process data while sociologists have the experience that is required for efficient data editing and interpretation. Social network analysis has successfully been applied in different fields such as health, cyber security, business, animal social networks, information retrieval, and communications.


Diffusion in Social Networks

Diffusion in Social Networks

Author: Paulo Shakarian

Publisher: Springer

Published: 2015-09-16

Total Pages: 110

ISBN-13: 3319231057

DOWNLOAD EBOOK

This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter models), biology (evolutionary models), and epidemiology (SIR/SIS and related models). A variety of properties and problems related to these models are discussed including identifying seeds sets to initiate diffusion, game theoretic problems, predicting diffusion events, and more. The book explores numerous connections between social network diffusion research and artificial intelligence through topics such as agent-based modeling, logic programming, game theory, learning, and data mining. The book also surveys key empirical results in social network diffusion, and reviews the classic and cutting-edge research with a focus on open problems.


Security in IoT Social Networks

Security in IoT Social Networks

Author: Fadi Al-Turjman

Publisher: Academic Press

Published: 2020-11-03

Total Pages: 268

ISBN-13: 0128216034

DOWNLOAD EBOOK

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties. Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks. - Provides several characteristics of social, network, and physical security associated with social information networks - Presents the security mechanisms and events related to social information networks - Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks - Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models


Optimal Social Influence

Optimal Social Influence

Author: Wen Xu

Publisher: Springer

Published: 2020-01-30

Total Pages: 124

ISBN-13: 9783030377748

DOWNLOAD EBOOK

This self-contained book describes social influence from a computational point of view, with a focus on recent and practical applications, models, algorithms and open topics for future research. Researchers, scholars, postgraduates and developers interested in research on social networking and the social influence related issues will find this book useful and motivating. The latest research on social computing is presented along with and illustrations on how to understand and manipulate social influence for knowledge discovery by applying various data mining techniques in real world scenarios. Experimental reports, survey papers, models and algorithms with specific optimization problems are depicted. The main topics covered in this book are: chrematistics of social networks, modeling of social influence propagation, popular research problems in social influence analysis such as influence maximization, rumor blocking, rumor source detection, and multiple social influence competing.


Embedded Systems and Artificial Intelligence

Embedded Systems and Artificial Intelligence

Author: Vikrant Bhateja

Publisher: Springer Nature

Published: 2020-04-07

Total Pages: 880

ISBN-13: 9811509476

DOWNLOAD EBOOK

This book gathers selected research papers presented at the First International Conference on Embedded Systems and Artificial Intelligence (ESAI 2019), held at Sidi Mohamed Ben Abdellah University, Fez, Morocco, on 2–3 May 2019. Highlighting the latest innovations in Computer Science, Artificial Intelligence, Information Technologies, and Embedded Systems, the respective papers will encourage and inspire researchers, industry professionals, and policymakers to put these methods into practice.