Efficient Respondents Selection for Biased Survey using Online Social Networks

Size: px
Start display at page:

Download "Efficient Respondents Selection for Biased Survey using Online Social Networks"

Transcription

1 Efficient Respondents Selection for Biased Survey using Online Social Networks Donghyun Kim 1, Jiaofei Zhong 2, Minhyuk Lee 1, Deying Li 3, Alade O. Tokuta 1 1 North Carolina Central University, Durham, NC, USA 2 California State University, East Bay, Hayward, CA, USA 3 Renmin University of China, Beijing, China Presenter: Donghyun (David) Kim Presented at the 2nd Workshop on Computational Social Networks (CSoNet 2014)

2 Agenda 1. Motivation 2. Preliminaries 3. Problem Statement 4. Algorithm 5. Experiment 6. Conclusion

3 1. Motivation

4 Motivation Growing popularity of social networking web sites such as FACEBOOK, Google+, Twitter, etc Online social networks are getting lots of attentions Useful applications of online social network such as online advertising, information propagation, online survey, etc This work investigates the potential of online social network for survey

5 Motivation cont U.S spent more than $1.8 billion for all survey researches in 2012 Online survey is useful to data collection for marketing or political decision making Hard to find right sample group of respondents in online survey The respondent should represent for each community or group

6 Motivation cont The person who belongs to major group in community, activist and has many friend (e.g. B) The person who belongs to minor group in community, has less friend like (e.g. A)

7 Motivation cont

8 Motivation cont Sometimes the minor opinion is more important than major one

9 Motivation cont Representative group in a social network graph frequently, modeled as a dominating set problem Minimum dominating set good choice of a representative group mostly a subset of majority not suitable for our purpose Needs a new dominating set

10 2. Preliminaries

11 Preliminaries Notations G ( V, E) : represents an online social network graph V V(G) : node set E E(G) : edge set V : number of nodes in V G[D] : subgraph of G induced by D, for any subset Nv, V( G) : set of nodes in V neighboring to v in G, for each node v V D V

12 Preliminaries cont Definition 1 (DS) Given a graph G, a subset D V if for eachnode u V \ D, v is adominating set (DS) of D such that(v,u) E G

13 Preliminaries cont Definition 2 (MDSP) Given a graph G, the goal of the minimum dominating set problem (MDSP) is to find a minimum size DS of G

14 Preliminaries cont Definition 3 (Inverse k core) Given a graph G, a subset such that 0 inverse k k - core in Δ, G if D V is, and a where Δ is the degree of for each v D, N v, D positive integer G, D (G) k is an k no more than k neighbors in D

15 3. Problem Statement

16 Problem Statement Definition 4 (IkCDS) Given a graph G, a subset D V is, and a positive integer k D is an inverse k - core dominating set (IkCDS) of G if(a) D is a DS of G and (b)for each Definition 5 (MIkCDSP) v D, N v, D (G) Given a graph G and a positive integer k the goal of the minimum inverse k - core dominating set problem ( MIkCDSP)is to find a minimum size IkCDS of G. k

17 Problem Statement cont MIkCDSP is NP-hard A special case of minimum dominating set problem, which is proven to be NP-hard. As a MIkCDSP result, with MIkCDSP k is n is NP-hard. equivalent to the Our Approach: Greedy Approximation

18 4. Algorithm

19 Algorithm

20 Example G = (V,E), 1 v1 v 2 v3 v 4 v5 v6

21 Example cont v v v3 0 0 v 4 0 v5 0 v6 D Node ni { } v1 v 2 v3 v 4 v5 v X0 { v1, v2, v3, v4, v5, v6}

22 Example cont v v v3 0 0 v 4 0 v5 0 v6 v and v The Candidate are 2 5

23 Example cont v 2 Let s select, hence D { v2} 0 v 4 v1 2 1 v v5 v6 v3 1 Node ni v1 v 2 3 v v 4 v5 v X 0 { v12, v2 4, v3 5, } v4, v5, v6} X1 { v1, v3, v6}

24 Example cont Since X0 Select node We can select v1 D {, 2} v1 v 0 v 4 v1 2 1 v v5 v6 v3 1 Node ni v1 v 2 3 X 0 { v2, 4} v4, v5} X 1 { v 1, v 23, v3, 6} v5, v6} v v 4 v5 v

25 Example cont Since X0 Select node We can select D { v1, v2, v4} v1 0 v 4 v v v5 v6 v3 1 Node ni v1 v 2 3 v v 4 v5 v X 0 { v 4} X 1 { v 1, v 2, v 3, v 54, v 6 } X2 { v5} Now X0 And the result is D { v1, v2, v4}

26 Performance Analysis Proof idea: the algorithm produces a DS D such that D is also a feasible solution of MIkCDSP.

27 5. Experiment

28 Experiment Case Study #1 The Jazz Musician Network The Jazz Musician Network is a collaboration network of jazz musicians P.M Geiser and L.Danon, Community Substructure In Jazz, Jazz musicians that performed between 1912 and 1940, with most of famous in the 1920's.

29 Experiment cont Cytospace visualization tools

30 Experiment cont Compare average degree among all nodes, MIkCDSP vs. Minimum Dominating Set

31 Experiment cont Compare average degree between MIkCDSP and Minimum Dominating Set D 29% 21% 65% 50% 13% 20%

32 Experiment cont Compare average degree with various k value

33 Experiment cont Visualized Result

34 Experiment cont The hard problem is to pick a right sample on online survey We focus to pick a sample with minority opinion, which is have less friends To the best of our knowledge, this is the first attempt to use online social network to improve the result of online survey The result is showing that our algorithm can select nodes which representative minority opinion

35 6. Conclusion

36 Thank You Question?

Biased Respondent Group Selection under Limited Budget for Minority Opinion Survey

Biased Respondent Group Selection under Limited Budget for Minority Opinion Survey Biased Respondent Group Selection under Limited Budget for Minority Opinion Survey Donghyun Kim 1, Wei Wang 2, Matthew Tetteh 1, Jun Liang 4, Soyoon Park 3, Wonjun Lee 3 1 Dept. of Math. and Physics, North

More information

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL

MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL MobiHoc 2014 MINIMUM-SIZED INFLUENTIAL NODE SET SELECTION FOR SOCIAL NETWORKS UNDER THE INDEPENDENT CASCADE MODEL Jing (Selena) He Department of Computer Science, Kennesaw State University Shouling Ji,

More information

On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph

On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph 1 On Approximating Minimum 3-connected m-dominating Set Problem in Unit Disk Graph Bei Liu, Wei Wang, Donghyun Kim, Senior Member, IEEE, Deying Li, Jingyi Wang, Alade O. Tokuta, Member, IEEE, Yaolin Jiang

More information

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24 CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html

More information

Interact with Strangers

Interact with Strangers Interact with Strangers RATE: Recommendation-aware Trust Evaluation in Online Social Networks Wenjun Jiang 1, 2, Jie Wu 2, and Guojun Wang 1 1. School of Information Science and Engineering, Central South

More information

Tree Decompositions and Tree-Width

Tree Decompositions and Tree-Width Tree Decompositions and Tree-Width CS 511 Iowa State University December 6, 2010 CS 511 (Iowa State University) Tree Decompositions and Tree-Width December 6, 2010 1 / 15 Tree Decompositions Definition

More information

ON SOCIAL-TEMPORAL GROUP QUERY WITH ACQUAINTANCE CONSTRAINT

ON SOCIAL-TEMPORAL GROUP QUERY WITH ACQUAINTANCE CONSTRAINT 1 ON SOCIAL-TEMPORAL GROUP QUERY WITH ACQUAINTANCE CONSTRAINT D.N Yang Y.L Chen W.C Lee M.S Chen Sep 2011 Presented by Roi Fridburg AGENDA Activity Planning Social Graphs Proposed Algorithms SGSelect SGTSelect

More information

NP-problems continued

NP-problems continued NP-problems continued Page 1 Since SAT and INDEPENDENT SET can be reduced to each other we might think that there would be some similarities between the two problems. In fact, there is one such similarity.

More information

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap ECS 253 / MAE 253, Lecture 15 May 17, 2016 I. Probability generating function recap Part I. Ensemble approaches A. Master equations (Random graph evolution, cluster aggregation) B. Network configuration

More information

Formal definition of P

Formal definition of P Since SAT and INDEPENDENT SET can be reduced to each other we might think that there would be some similarities between the two problems. In fact, there is one such similarity. In SAT we want to know if

More information

4. How to prove a problem is NPC

4. How to prove a problem is NPC The reducibility relation T is transitive, i.e, A T B and B T C imply A T C Therefore, to prove that a problem A is NPC: (1) show that A NP (2) choose some known NPC problem B define a polynomial transformation

More information

Web Structure Mining Nodes, Links and Influence

Web Structure Mining Nodes, Links and Influence Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.

More information

Personalized Social Recommendations Accurate or Private

Personalized Social Recommendations Accurate or Private Personalized Social Recommendations Accurate or Private Presented by: Lurye Jenny Paper by: Ashwin Machanavajjhala, Aleksandra Korolova, Atish Das Sarma Outline Introduction Motivation The model General

More information

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748

COT 6936: Topics in Algorithms! Giri Narasimhan. ECS 254A / EC 2443; Phone: x3748 COT 6936: Topics in Algorithms! Giri Narasimhan ECS 254A / EC 2443; Phone: x3748 giri@cs.fiu.edu https://moodle.cis.fiu.edu/v2.1/course/view.php?id=612 Gaussian Elimination! Solving a system of simultaneous

More information

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover

Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover duality 1 Dual fitting approximation for Set Cover, and Primal Dual approximation for Set Cover Guy Kortsarz duality 2 The set cover problem with uniform costs Input: A universe U and a collection of subsets

More information

Welfare Maximization with Friends-of-Friends Network Externalities

Welfare Maximization with Friends-of-Friends Network Externalities Welfare Maximization with Friends-of-Friends Network Externalities Extended version of a talk at STACS 2015, Munich Wolfgang Dvořák 1 joint work with: Sayan Bhattacharya 2, Monika Henzinger 1, Martin Starnberger

More information

Densest subgraph computation and applications in finding events on social media

Densest subgraph computation and applications in finding events on social media Densest subgraph computation and applications in finding events on social media Oana Denisa Balalau advised by Mauro Sozio Télécom ParisTech, Institut Mines Télécom December 4, 2015 1 / 28 Table of Contents

More information

Opinion Dynamics on Triad Scale Free Network

Opinion Dynamics on Triad Scale Free Network Opinion Dynamics on Triad Scale Free Network Li Qianqian 1 Liu Yijun 1,* Tian Ruya 1,2 Ma Ning 1,2 1 Institute of Policy and Management, Chinese Academy of Sciences, Beijing 100190, China lqqcindy@gmail.com,

More information

Mining Triadic Closure Patterns in Social Networks

Mining Triadic Closure Patterns in Social Networks Mining Triadic Closure Patterns in Social Networks Hong Huang, University of Goettingen Jie Tang, Tsinghua University Sen Wu, Stanford University Lu Liu, Northwestern University Xiaoming Fu, University

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6-8:50PM Thursday Location: AK233 Spring 2018 v Course Project I has been graded. Grading was based on v 1. Project report

More information

Exact Algorithms for Dominating Induced Matching Based on Graph Partition

Exact Algorithms for Dominating Induced Matching Based on Graph Partition Exact Algorithms for Dominating Induced Matching Based on Graph Partition Mingyu Xiao School of Computer Science and Engineering University of Electronic Science and Technology of China Chengdu 611731,

More information

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Reputation Systems I HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte Yury Lifshits Wiki Definition Reputation is the opinion (more technically, a social evaluation) of the public toward a person, a

More information

arxiv: v2 [math.co] 7 Jan 2016

arxiv: v2 [math.co] 7 Jan 2016 Global Cycle Properties in Locally Isometric Graphs arxiv:1506.03310v2 [math.co] 7 Jan 2016 Adam Borchert, Skylar Nicol, Ortrud R. Oellermann Department of Mathematics and Statistics University of Winnipeg,

More information

Cost and Preference in Recommender Systems Junhua Chen LESS IS MORE

Cost and Preference in Recommender Systems Junhua Chen LESS IS MORE Cost and Preference in Recommender Systems Junhua Chen, Big Data Research Center, UESTC Email:junmshao@uestc.edu.cn http://staff.uestc.edu.cn/shaojunming Abstract In many recommender systems (RS), user

More information

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex

More information

NP-Complete Problems. Complexity Class P. .. Cal Poly CSC 349: Design and Analyis of Algorithms Alexander Dekhtyar..

NP-Complete Problems. Complexity Class P. .. Cal Poly CSC 349: Design and Analyis of Algorithms Alexander Dekhtyar.. .. Cal Poly CSC 349: Design and Analyis of Algorithms Alexander Dekhtyar.. Complexity Class P NP-Complete Problems Abstract Problems. An abstract problem Q is a binary relation on sets I of input instances

More information

Info-Cluster Based Regional Influence Analysis in Social Networks

Info-Cluster Based Regional Influence Analysis in Social Networks Info-Cluster Based Regional Influence Analysis in Social Networks Chao Li,2,3, Zhongying Zhao,2,3,JunLuo, and Jianping Fan Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen

More information

Communities Via Laplacian Matrices. Degree, Adjacency, and Laplacian Matrices Eigenvectors of Laplacian Matrices

Communities Via Laplacian Matrices. Degree, Adjacency, and Laplacian Matrices Eigenvectors of Laplacian Matrices Communities Via Laplacian Matrices Degree, Adjacency, and Laplacian Matrices Eigenvectors of Laplacian Matrices The Laplacian Approach As with betweenness approach, we want to divide a social graph into

More information

RaRE: Social Rank Regulated Large-scale Network Embedding

RaRE: Social Rank Regulated Large-scale Network Embedding RaRE: Social Rank Regulated Large-scale Network Embedding Authors: Yupeng Gu 1, Yizhou Sun 1, Yanen Li 2, Yang Yang 3 04/26/2018 The Web Conference, 2018 1 University of California, Los Angeles 2 Snapchat

More information

Online Social Networks and Media. Opinion formation on social networks

Online Social Networks and Media. Opinion formation on social networks Online Social Networks and Media Opinion formation on social networks Diffusion of items So far we have assumed that what is being diffused in the network is some discrete item: E.g., a virus, a product,

More information

NP-Complete Problems. More reductions

NP-Complete Problems. More reductions NP-Complete Problems More reductions Definitions P: problems that can be solved in polynomial time (typically in n, size of input) on a deterministic Turing machine Any normal computer simulates a DTM

More information

On Node-differentially Private Algorithms for Graph Statistics

On Node-differentially Private Algorithms for Graph Statistics On Node-differentially Private Algorithms for Graph Statistics Om Dipakbhai Thakkar August 26, 2015 Abstract In this report, we start by surveying three papers on node differential privacy. First, we look

More information

Ma/CS 6b Class 3: Stable Matchings

Ma/CS 6b Class 3: Stable Matchings Ma/CS 6b Class 3: Stable Matchings α p 5 p 12 p 15 q 1 q 7 q 12 β By Adam Sheffer Neighbor Sets Let G = V 1 V 2, E be a bipartite graph. For any vertex a V 1, we define the neighbor set of a as N a = u

More information

Social Relation Based Long-term Vaccine Distribution Planning to Suppress Pandemic

Social Relation Based Long-term Vaccine Distribution Planning to Suppress Pandemic Social Relation Based Long-term Vaccine Distribution Planning to Suppress Pandemic Donghyun Kim 1, Hao Guo 1, Yuchao Li 2, Wei Wang 2, Sung-Si Kwon 1, Alade O. Touta 1 1 Dept. of Math. and Physics, North

More information

Developing a Resourcebased Typology of Cities: A review + pitch

Developing a Resourcebased Typology of Cities: A review + pitch Developing a Resourcebased Typology of Cities: A review + pitch Prof. John Fernández Urban Metabolism Group 19 November 2013 Sustainable Cities RCN MIT Agenda Typologies Motivations Past work History/trends

More information

Dynamic Matching under Preferences

Dynamic Matching under Preferences Dynamic Matching under Preferences Martin Hoefer Max-Planck-Institut für Informatik mhoefer@mpi-inf.mpg.de Kolkata, 11 March 2015 How to find a stable relationship? Stable Marriage Set of Women Set of

More information

Class President: A Network Approach to Popularity. Due July 18, 2014

Class President: A Network Approach to Popularity. Due July 18, 2014 Class President: A Network Approach to Popularity Due July 8, 24 Instructions. Due Fri, July 8 at :59 PM 2. Work in groups of up to 3 3. Type up the report, and submit as a pdf on D2L 4. Attach the code

More information

K-center Hardness and Max-Coverage (Greedy)

K-center Hardness and Max-Coverage (Greedy) IOE 691: Approximation Algorithms Date: 01/11/2017 Lecture Notes: -center Hardness and Max-Coverage (Greedy) Instructor: Viswanath Nagarajan Scribe: Sentao Miao 1 Overview In this lecture, we will talk

More information

Project in Computational Game Theory: Communities in Social Networks

Project in Computational Game Theory: Communities in Social Networks Project in Computational Game Theory: Communities in Social Networks Eldad Rubinstein November 11, 2012 1 Presentation of the Original Paper 1.1 Introduction In this section I present the article [1].

More information

CS281A/Stat241A Lecture 19

CS281A/Stat241A Lecture 19 CS281A/Stat241A Lecture 19 p. 1/4 CS281A/Stat241A Lecture 19 Junction Tree Algorithm Peter Bartlett CS281A/Stat241A Lecture 19 p. 2/4 Announcements My office hours: Tuesday Nov 3 (today), 1-2pm, in 723

More information

Parameterized Algorithms for the H-Packing with t-overlap Problem

Parameterized Algorithms for the H-Packing with t-overlap Problem Journal of Graph Algorithms and Applications http://jgaa.info/ vol. 18, no. 4, pp. 515 538 (2014) DOI: 10.7155/jgaa.00335 Parameterized Algorithms for the H-Packing with t-overlap Problem Alejandro López-Ortiz

More information

Biased Assimilation, Homophily, and the Dynamics of Polarization

Biased Assimilation, Homophily, and the Dynamics of Polarization Biased Assimilation, Homophily, and the Dynamics of Polarization Pranav Dandekar joint work with A. Goel D. Lee Motivating Questions Are we as a society getting polarized? If so, why? Do recommender systems

More information

More on NP and Reductions

More on NP and Reductions Indian Institute of Information Technology Design and Manufacturing, Kancheepuram Chennai 600 127, India An Autonomous Institute under MHRD, Govt of India http://www.iiitdm.ac.in COM 501 Advanced Data

More information

OLAK: An Efficient Algorithm to Prevent Unraveling in Social Networks. Fan Zhang 1, Wenjie Zhang 2, Ying Zhang 1, Lu Qin 1, Xuemin Lin 2

OLAK: An Efficient Algorithm to Prevent Unraveling in Social Networks. Fan Zhang 1, Wenjie Zhang 2, Ying Zhang 1, Lu Qin 1, Xuemin Lin 2 OLAK: An Efficient Algorithm to Prevent Unraveling in Social Networks Fan Zhang 1, Wenjie Zhang 2, Ying Zhang 1, Lu Qin 1, Xuemin Lin 2 1 University of Technology Sydney, Computer 2 University Science

More information

A Note on Maximizing the Spread of Influence in Social Networks

A Note on Maximizing the Spread of Influence in Social Networks A Note on Maximizing the Spread of Influence in Social Networks Eyal Even-Dar 1 and Asaf Shapira 2 1 Google Research, Email: evendar@google.com 2 Microsoft Research, Email: asafico@microsoft.com Abstract.

More information

On representable graphs

On representable graphs On representable graphs Sergey Kitaev and Artem Pyatkin 3rd November 2005 Abstract A graph G = (V, E) is representable if there exists a word W over the alphabet V such that letters x and y alternate in

More information

ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES

ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES JIŘÍ ŠÍMA AND SATU ELISA SCHAEFFER Academy of Sciences of the Czech Republic Helsinki University of Technology, Finland elisa.schaeffer@tkk.fi SOFSEM

More information

Determining the Diameter of Small World Networks

Determining the Diameter of Small World Networks Determining the Diameter of Small World Networks Frank W. Takes & Walter A. Kosters Leiden University, The Netherlands CIKM 2011 October 2, 2011 Glasgow, UK NWO COMPASS project (grant #12.0.92) 1 / 30

More information

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search 6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search Daron Acemoglu and Asu Ozdaglar MIT September 30, 2009 1 Networks: Lecture 7 Outline Navigation (or decentralized search)

More information

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic

The Beginning of Graph Theory. Theory and Applications of Complex Networks. Eulerian paths. Graph Theory. Class Three. College of the Atlantic Theory and Applications of Complex Networs 1 Theory and Applications of Complex Networs 2 Theory and Applications of Complex Networs Class Three The Beginning of Graph Theory Leonhard Euler wonders, can

More information

Math.3336: Discrete Mathematics. Cardinality of Sets

Math.3336: Discrete Mathematics. Cardinality of Sets Math.3336: Discrete Mathematics Cardinality of Sets Instructor: Dr. Blerina Xhabli Department of Mathematics, University of Houston https://www.math.uh.edu/ blerina Email: blerina@math.uh.edu Fall 2018

More information

What are online conversations?suggestions from a research on Trentino as a tourism destination

What are online conversations?suggestions from a research on Trentino as a tourism destination What are online conversations?suggestions from a research on Trentino as a tourism destination Maurizio Teli maurizio@ahref.eu 16 ottobre 2013 Cultways Final Workshop AGENDA 1. Introduction Methodological

More information

+ DEEP. Credentials OLIVIER LA ROCCA

+ DEEP. Credentials OLIVIER LA ROCCA DEEP Credentials OLIVIER LA ROCCA EUROPARTNERS What is Deep? How does it work? Case study AGENDA Contacts Understanding the reality and the nuances of local communities is crucial when it comes to take

More information

Ma/CS 6b Class 3: Stable Matchings

Ma/CS 6b Class 3: Stable Matchings Ma/CS 6b Class 3: Stable Matchings α p 5 p 12 p 15 q 1 q 7 q 12 By Adam Sheffer Reminder: Alternating Paths Let G = V 1 V 2, E be a bipartite graph, and let M be a matching of G. A path is alternating

More information

DS504/CS586: Big Data Analytics Graph Mining II

DS504/CS586: Big Data Analytics Graph Mining II Welcome to DS504/CS586: Big Data Analytics Graph Mining II Prof. Yanhua Li Time: 6:00pm 8:50pm Mon. and Wed. Location: SL105 Spring 2016 Reading assignments We will increase the bar a little bit Please

More information

NP-problems continued

NP-problems continued NP-problems continued Page 1 Since SAT and INDEPENDENT SET can be reduced to each other we might think that there would be some similarities between the two problems. In fact, there is one such similarity.

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information

INFO 2950 Intro to Data Science. Lecture 18: Power Laws and Big Data

INFO 2950 Intro to Data Science. Lecture 18: Power Laws and Big Data INFO 2950 Intro to Data Science Lecture 18: Power Laws and Big Data Paul Ginsparg Cornell University, Ithaca, NY 7 Apr 2016 1/25 Power Laws in log-log space y = cx k (k=1/2,1,2) log 10 y = k log 10 x +log

More information

Simultaneous Influencing and Mapping for Health Interventions

Simultaneous Influencing and Mapping for Health Interventions The Workshops of the Thirtieth AAAI Conference on Artificial Intelligence Expanding the Boundaries of Health Informatics Using AI: Technical Report WS-16-8 Simultaneous Influencing and Mapping for Health

More information

Diffusion of Innovation and Influence Maximization

Diffusion of Innovation and Influence Maximization Diffusion of Innovation and Influence Maximization Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics

More information

arxiv: v1 [cs.ds] 2 Oct 2018

arxiv: v1 [cs.ds] 2 Oct 2018 Contracting to a Longest Path in H-Free Graphs Walter Kern 1 and Daniël Paulusma 2 1 Department of Applied Mathematics, University of Twente, The Netherlands w.kern@twente.nl 2 Department of Computer Science,

More information

Estimating Clustering Coefficients and Size of Social Networks via Random Walk

Estimating Clustering Coefficients and Size of Social Networks via Random Walk Estimating Clustering Coefficients and Size of Social Networks via Random Walk Stephen J. Hardiman* Capital Fund Management France Liran Katzir Advanced Technology Labs Microsoft Research, Israel *Research

More information

Diffusion of Innovation

Diffusion of Innovation Diffusion of Innovation Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Social Network Analysis

More information

Overview and comparison of random walk based techniques for estimating network averages

Overview and comparison of random walk based techniques for estimating network averages Overview and comparison of random walk based techniques for estimating network averages Konstantin Avrachenkov (Inria, France) Ribno COSTNET Conference, 21 Sept. 2016 Motivation Analysing (online) social

More information

An example of LP problem: Political Elections

An example of LP problem: Political Elections Linear Programming An example of LP problem: Political Elections Suppose that you are a politician trying to win an election. Your district has three different types of areas: urban, suburban, and rural.

More information

APPLYING BIG DATA TOOLS TO ACQUIRE AND PROCESS DATA ON CITIES

APPLYING BIG DATA TOOLS TO ACQUIRE AND PROCESS DATA ON CITIES APPLYING BIG DATA TOOLS TO ACQUIRE AND PROCESS DATA ON CITIES JACEK MAŚLANKOWSKI, Ph.D. DEPARTMENT OF BUSINESS INFORMATICS FACULTY OF MANAGEMENT UNIVERSITY OF GDAŃSK, POLAND 1 AGENDA 2 Prerequisites Possible

More information

CSI 445/660 Part 3 (Networks and their Surrounding Contexts)

CSI 445/660 Part 3 (Networks and their Surrounding Contexts) CSI 445/660 Part 3 (Networks and their Surrounding Contexts) Ref: Chapter 4 of [Easley & Kleinberg]. 3 1 / 33 External Factors ffecting Network Evolution Homophily: basic principle: We tend to be similar

More information

On the Complexity of Budgeted Maximum Path Coverage on Trees

On the Complexity of Budgeted Maximum Path Coverage on Trees On the Complexity of Budgeted Maximum Path Coverage on Trees H.-C. Wirth An instance of the budgeted maximum coverage problem is given by a set of weighted ground elements and a cost weighted family of

More information

Polyhedral Approaches to Online Bipartite Matching

Polyhedral Approaches to Online Bipartite Matching Polyhedral Approaches to Online Bipartite Matching Alejandro Toriello joint with Alfredo Torrico, Shabbir Ahmed Stewart School of Industrial and Systems Engineering Georgia Institute of Technology Industrial

More information

Online Social Networks and Media. Link Analysis and Web Search

Online Social Networks and Media. Link Analysis and Web Search Online Social Networks and Media Link Analysis and Web Search How to Organize the Web First try: Human curated Web directories Yahoo, DMOZ, LookSmart How to organize the web Second try: Web Search Information

More information

Uniform Star-factors of Graphs with Girth Three

Uniform Star-factors of Graphs with Girth Three Uniform Star-factors of Graphs with Girth Three Yunjian Wu 1 and Qinglin Yu 1,2 1 Center for Combinatorics, LPMC Nankai University, Tianjin, 300071, China 2 Department of Mathematics and Statistics Thompson

More information

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag

Decision Trees. Nicholas Ruozzi University of Texas at Dallas. Based on the slides of Vibhav Gogate and David Sontag Decision Trees Nicholas Ruozzi University of Texas at Dallas Based on the slides of Vibhav Gogate and David Sontag Supervised Learning Input: labelled training data i.e., data plus desired output Assumption:

More information

Greedy Search in Social Networks

Greedy Search in Social Networks Greedy Search in Social Networks David Liben-Nowell Carleton College dlibenno@carleton.edu Joint work with Ravi Kumar, Jasmine Novak, Prabhakar Raghavan, and Andrew Tomkins. IPAM, Los Angeles 8 May 2007

More information

Analytically tractable processes on networks

Analytically tractable processes on networks University of California San Diego CERTH, 25 May 2011 Outline Motivation 1 Motivation Networks Random walk and Consensus Epidemic models Spreading processes on networks 2 Networks Motivation Networks Random

More information

Efficient Network Structures with Separable Heterogeneous Connection Costs

Efficient Network Structures with Separable Heterogeneous Connection Costs MPRA Munich Personal RePEc Archive Efficient Network Structures with Separable Heterogeneous Connection Costs Babak Heydari and Mohsen Mosleh and Kia Dalili School of Systems and Enterprises, Stevens Institute

More information

Sampling. Everything Data CompSci Spring 2014

Sampling. Everything Data CompSci Spring 2014 Sampling Everything Data CompSci 290.01 Spring 2014 2 Announcements (Thu. Mar 26) Homework #11 will be posted by noon tomorrow. 3 Outline Simple Random Sampling Means & Proportions Importance Sampling

More information

Lecture 18: More NP-Complete Problems

Lecture 18: More NP-Complete Problems 6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with

More information

Social Networks. Chapter 9

Social Networks. Chapter 9 Chapter 9 Social Networks Distributed computing is applicable in various contexts. This lecture exemplarily studies one of these contexts, social networks, an area of study whose origins date back a century.

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CSE 5311 Lecture 25 NP Completeness Junzhou Huang, Ph.D. Department of Computer Science and Engineering CSE5311 Design and Analysis of Algorithms 1 NP-Completeness Some

More information

Administrivia. Blobs and Graphs. Assignment 2. Prof. Noah Snavely CS1114. First part due tomorrow by 5pm Second part due next Friday by 5pm

Administrivia. Blobs and Graphs. Assignment 2. Prof. Noah Snavely CS1114. First part due tomorrow by 5pm Second part due next Friday by 5pm Blobs and Graphs Prof. Noah Snavely CS1114 http://www.cs.cornell.edu/courses/cs1114 Administrivia Assignment 2 First part due tomorrow by 5pm Second part due next Friday by 5pm 2 Prelims Prelim 1: March

More information

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Influence and Social Networks Economics, sociology, political science, etc. all have studied

More information

Topical Sequence Profiling

Topical Sequence Profiling Tim Gollub Nedim Lipka Eunyee Koh Erdan Genc Benno Stein TIR @ DEXA 5. Sept. 2016 Webis Group Bauhaus-Universität Weimar www.webis.de Big Data Experience Lab Adobe Systems www.research.adobe.com R e

More information

CONTAINMENT OF MISINFORMATION PROPAGATION IN ONLINE SOCIAL NETWORKS WITH GIVEN DEADLINE

CONTAINMENT OF MISINFORMATION PROPAGATION IN ONLINE SOCIAL NETWORKS WITH GIVEN DEADLINE Association for Information Systems AIS Electronic Library (AISeL) PACIS 2014 Proceedings Pacific Asia Conference on Information Systems (PACIS) 2014 CONTAINMENT OF MISINFORMATION PROPAGATION IN ONLINE

More information

NP-Hardness reductions

NP-Hardness reductions NP-Hardness reductions Definition: P is the class of problems that can be solved in polynomial time, that is n c for a constant c Roughly, if a problem is in P then it's easy, and if it's not in P then

More information

Circle-based Recommendation in Online Social Networks

Circle-based Recommendation in Online Social Networks Circle-based Recommendation in Online Social Networks Xiwang Yang, Harald Steck*, and Yong Liu Polytechnic Institute of NYU * Bell Labs/Netflix 1 Outline q Background & Motivation q Circle-based RS Trust

More information

Optimal Blocking by Minimizing the Maximum Within-Block Distance

Optimal Blocking by Minimizing the Maximum Within-Block Distance Optimal Blocking by Minimizing the Maximum Within-Block Distance Michael J. Higgins Jasjeet Sekhon Princeton University University of California at Berkeley November 14, 2013 For the Kansas State University

More information

A New Space for Comparing Graphs

A New Space for Comparing Graphs A New Space for Comparing Graphs Anshumali Shrivastava and Ping Li Cornell University and Rutgers University August 18th 2014 Anshumali Shrivastava and Ping Li ASONAM 2014 August 18th 2014 1 / 38 Main

More information

On the Approximability of Partial VC Dimension

On the Approximability of Partial VC Dimension On the Approximability of Partial VC Dimension Cristina Bazgan 1 Florent Foucaud 2 Florian Sikora 1 1 LAMSADE, Université Paris Dauphine, CNRS France 2 LIMOS, Université Blaise Pascal, Clermont-Ferrand

More information

Optimal Design of Experiments on Connected Units

Optimal Design of Experiments on Connected Units Optimal Design of Experiments on Connected Units How to use experiments to measure networks better, and how to use networks to make experiments better. Ben M Parker September 07 Ben M Parker DOE for Networks

More information

Display Advertising Optimization by Quantum Annealing Processor

Display Advertising Optimization by Quantum Annealing Processor Display Advertising Optimization by Quantum Annealing Processor Shinichi Takayanagi*, Kotaro Tanahashi*, Shu Tanaka *Recruit Communications Co., Ltd. Waseda University, JST PRESTO Overview 1. Introduction

More information

Collaborative Filtering. Radek Pelánek

Collaborative Filtering. Radek Pelánek Collaborative Filtering Radek Pelánek 2017 Notes on Lecture the most technical lecture of the course includes some scary looking math, but typically with intuitive interpretation use of standard machine

More information

The Ties that Bind Characterizing Classes by Attributes and Social Ties

The Ties that Bind Characterizing Classes by Attributes and Social Ties The Ties that Bind WWW April, 2017, Bryan Perozzi*, Leman Akoglu Stony Brook University *Now at Google. Introduction Outline Our problem: Characterizing Community Differences Proposed Method Experimental

More information

Randomness and Computation

Randomness and Computation Randomness and Computation or, Randomized Algorithms Mary Cryan School of Informatics University of Edinburgh RC (2018/19) Lecture 11 slide 1 The Probabilistic Method The Probabilistic Method is a nonconstructive

More information

A An Overview of Complexity Theory for the Algorithm Designer

A An Overview of Complexity Theory for the Algorithm Designer A An Overview of Complexity Theory for the Algorithm Designer A.1 Certificates and the class NP A decision problem is one whose answer is either yes or no. Two examples are: SAT: Given a Boolean formula

More information

1.1 P, NP, and NP-complete

1.1 P, NP, and NP-complete CSC5160: Combinatorial Optimization and Approximation Algorithms Topic: Introduction to NP-complete Problems Date: 11/01/2008 Lecturer: Lap Chi Lau Scribe: Jerry Jilin Le This lecture gives a general introduction

More information

Exercises NP-completeness

Exercises NP-completeness Exercises NP-completeness Exercise 1 Knapsack problem Consider the Knapsack problem. We have n items, each with weight a j (j = 1,..., n) and value c j (j = 1,..., n) and an integer B. All a j and c j

More information

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University

Algorithms. NP -Complete Problems. Dong Kyue Kim Hanyang University Algorithms NP -Complete Problems Dong Kyue Kim Hanyang University dqkim@hanyang.ac.kr The Class P Definition 13.2 Polynomially bounded An algorithm is said to be polynomially bounded if its worst-case

More information

Vertex Identifying Code in Infinite Hexagonal Grid

Vertex Identifying Code in Infinite Hexagonal Grid Gexin Yu gyu@wm.edu College of William and Mary Joint work with Ari Cukierman Definitions and Motivation Goal: put sensors in a network to detect which machine failed Definitions and Motivation Goal: put

More information

Submodular Functions Properties Algorithms Machine Learning

Submodular Functions Properties Algorithms Machine Learning Submodular Functions Properties Algorithms Machine Learning Rémi Gilleron Inria Lille - Nord Europe & LIFL & Univ Lille Jan. 12 revised Aug. 14 Rémi Gilleron (Mostrare) Submodular Functions Jan. 12 revised

More information

Fundamentals of optimization problems

Fundamentals of optimization problems Fundamentals of optimization problems Dmitriy Serdyuk Ferienakademie in Sarntal 2012 FAU Erlangen-Nürnberg, TU München, Uni Stuttgart September 2012 Overview 1 Introduction Optimization problems PO and

More information