Probability Models of Information Exchange on Networks Lecture 6

Size: px
Start display at page:

Download "Probability Models of Information Exchange on Networks Lecture 6"

Transcription

1 Probability Models of Information Exchange on Networks Lecture 6 UC Berkeley

2 Many Other Models There are many models of information exchange on networks. Q: Which model to chose? My answer good features of models include: Canonical models. Amenable to analysis. Studied intensively before. Ok to invent your own models. Models are always just models

3 Ariel Rubinstein on theoretical economics When talking about economics: Everything I say is personal, based upon the entire range of my life experience which also includes the fact that professionally I engage in economics theory. However, to the best of my understanding, economic theory has nothing to do say about the heart of the issue under discussion here. I am not sure I know what an opinion is. I am not attempting to predict the rate of inflation tomorrow

4 Some other natural models Growth models: percolation models, DLA etc. Competition models: Competing growth. Infection models: Contact process, SIR, SIS Aspects of modeling: Dynamic networks Random networks Today: two examples of percolation based processes.

5 Example1: models of collective behavior examples: joining a riot adopting a product going to a movie model features: binary decision cascade effect network structure

6 viral marketing referrals, word-of-mouth can be very effective ex.: google+ viral marketing goal: mining the network value of potential customers how: target a small set of trendsetters, seeds example [Domingos-Richardson 02] collaborative filtering system use MRF to compute influence of each customer

7 independent cascade model when a node is activated it gets one chance to activate each neighbour probability of success from u to v is p u,v

8 generalized models graph G=(V,E); initial activated set S 0 generalized threshold model [Kempe-Kleinberg-Tardos 03, 05] activation functions: f u (S) where S is set of activated nodes threshold value: θ u uniform in [0,1] dynamics: at time t,set S t to S t-1 and add all nodes with f u (S t-1 ) θ u (note the process stops after (at most) n-1 steps) generalized cascade model [KKT 03, 05] when node u is activated: gets one chance to activate each neighbours probability of success from u to v: p u (v,s) where S is set of nodes who have already tried (and failed) to activate u assumption: the p u (v,.) s are order-independent theorem [KKT 03] - the two models are equivalent

9 influence maximization definition - the influence σ(s) given the initial seed S is the expected size of the infected set at termination σ(s) = E S [ S n 1 ] definition - in the influence maximization problem (IMP), we want to find the seed S of fixed size k that maximizes the influence theorem [KKT 03] - the IMP is NP-hard { } S* = argmax σ(s) : S V, S = k reduction from Set Cover: ground set U = {u 1,,u n } and collection of cover subsets S 1,,S m independent cascade model u 1 u 2 u 3 (u i,s j ) E S 1 S 2 S 3 S, S = k, σ(s) n + k? u n u i S j S m

10 submodularity definition - a set function f : V -> R is submodular if for all A, B in V f (A) + f (B) f (A B) + f (A B) example: f(s) = g( S ) where g is concave interpretation: discrete concavity or diminishing returns, indeed submodularity equivalent to S T, v V, f (T {v}) f (T) f (S {v}) f (S) threshold models: it is natural to assume that the activation functions have diminishing returns supported by observations of [Leskovec-Adamic-Huberman 06] in the context of viral marketing

11 main result theorem [M-Roch 06; first conjectured in KKT 03] - in the generalized threshold model, if all activation functions are monotone and submodular, then the influence is also submodular corollary [M-Roch 06] - IMP admits a (1 - e -1 - ε)-approximation algorithm (for all ε > 0) this follows from a general result on the approximation of submodular functions [Nemhauser-Wolsey-Fisher 78] known special cases [KKT 03, 05]: linear threshold model, independent cascade model decreasing cascade model, normalized submodular threshold model S T, p u (v,s) p u (v,t) or equiv. f u (S {v}) f u (S) 1 f u (S) f u (T {v}) f u (T) 1 f u (T)

12 related work sociology threshold models: [Granovetter 78], [Morris 00] cascades: [Watts 02] data mining viral marketing: [KKT 03, 05], [Domingos-Richardson 02] recommendation networks: [Leskovec-Singh-Kleinberg 05], [Leskovec- Adamic-Huberman 06] economics game-theoretic point of view: [Ellison 93], [Young 02] probability theory Markov random fields, Glauber dynamics percolation interacting particle systems: voter model, contact process

13 proof sketch

14 coupling we use the generalized threshold model arbitrary sets A, B; consider 4 processes: (A t ) started at A (B t ) started at B (C t ) started at A B (D t ) started at A B it suffices to couple the 4 processes in such a way that for all t indeed, at termination C t A t B t D t A t B t A n 1 + B n 1 A n 1 B n 1 + A n 1 B n 1 C n 1 + D n 1 (note this works with. replaced with any w monotone, submodular)

15 proof ideas our goal: C t A t B t (1) D t A t B t (2) antisense coupling obvious way to couple: use same θ u s for all 4 processes satisfies (1) but not (2) antisense : using θ u for (A t ) and (1-θ u ) for (B t ) maximizes union we combine both couplings piecemeal growth seed sets can be introduced in stages we add A B then A\B and finally B\A need-to-know not necessary to pick all θ u s at beginning can unveil only what we need to know: θ v [ f v ( S t 2 ), f v ( S t 1 )]?

16 piecemeal growth process started at S: (S t ) partition of S: S (1),,S (K) consider the process (T t ): pick θ u s run the process with seed S (1) until termination add S (2) and continue until termination add S (3) and so on lemma - the sets S n-1 and T Kn-1 have the same distribution

17 antisense coupling disjoint sets: S, T partition of S: S (1),,S (K) piecemeal process with seeds S (1),,S (K),T: (S t ) consider the process (T t ): pick θ u s run piecemeal process with seeds S (1),,S (K) until termination add T and continue with threshold values θ v '=1 θ v + f v ( ) T Kn 1 lemma - the sets S (K+1)n-1 and T (K+1)n-1 have the same distribution

18 need-to-know proof of lemma run the first K stages identically in both processes note that for all v not in S Kn-1 = T Kn-1, θ v is uniformly distributed in [f v (T Kn-1 ),1] but θ v = 1 - θ v + f v (T Kn-1 ) has the same distribution θ v [ f v ( S t 2 ), f v ( S t 1 )]? simulation 1 simulation 2

19 proof I ANTI 19/31

20 proof II ANTI 20/31

21 proof III new processes have correct final distribution up to time 2n-1, B t = C t and A t = D t so that C t A B t t D t A t B t for time 2n, note that so by monotonicity and submodularity then proceed by induction B 2n 1 D 2n 1 B 2n = B 2n 1 (T \ S) D 2n = D 2n 1 (T \ S) f v (B 2n ) f v (B 2n 1 ) f v (D 2n ) f v (D 2n 1 ) 21/31

22 general result we have proved: theorem [Mossel-R 06] - in the generalized threshold model, if all activation functions are submodular, then for any monotone, submodular function w, the generalized influence is submodular σ w (S) = E S [w(s n 1 )] Note: A closure property for sub-modular functions! 22/31

23 Competing first passage percolation on random regular graphs University of California, Berkeley July 24, 2013 Based on a joint work with Tonći Antunović Yael Dekel, and Yuval Peres

24 First passage percolation First passage percolation: Fix a graph G = (V, E), consider iid edge lengths (l e ) e E. Define the random metric on V d(x, y) = inf Γ l(γ), where the infimum is taken over all paths Γ connecting x and y and l(γ) is the sum of lengths of the edges on Γ. An important case: l e exp(λ). Process r B(0, r) evolves as a Markov process, new vertices are added at the rate λ the number of neighbors in B(0, r).

25 First passage percolation

26 First passage percolation

27 First passage percolation

28 First passage percolation

29 First passage percolation

30 First passage percolation

31 First passage percolation

32 First passage percolation

33 First passage percolation

34 First passage percolation

35 First passage percolation

36 First passage percolation

37 First passage percolation

38 First passage percolation

39 First passage percolation

40 First passage percolation

41 First passage percolation

42 First passage percolation

43 First passage percolation

44 First passage percolation

45 First passage percolation

46 First passage percolation

47 First passage percolation

48 First passage percolation

49 First passage percolation

50 First passage percolation

51 First passage percolation

52 First passage percolation

53 First passage percolation Theorem (Cox-Durrett shape theorem) There exists a compact convex set A such that for any δ > 0 lim P( (1 δ)ra B(0, r) (1 + δ)ra ) = 1. r

54 Competing first passage percolation Competing first passage percolation (also called Two-type Richardson Model by Häggström, Pemantle): Start with one red vertex and one blue vertex, other uncolored. Uncolored vertices become red at the rate (λ R the number of red neighbors) and blue at the rate (λ B the number of blue neighbors). Once colored, vertices never change the color.

55 Competing first passage percolation

56 Competing first passage percolation

57 Competing first passage percolation

58 Competing first passage percolation

59 Competing first passage percolation

60 Competing first passage percolation

61 Competing first passage percolation

62 Competing first passage percolation

63 Competing first passage percolation

64 Competing first passage percolation

65 Competing first passage percolation

66 Competing first passage percolation

67 Competing first passage percolation

68 Competing first passage percolation

69 Competing first passage percolation

70 Competing first passage percolation

71 Competing first passage percolation

72 Competing first passage percolation

73 Competing first passage percolation

74 Competing first passage percolation

75 Competing first passage percolation

76 Competing first passage percolation

77 Competing first passage percolation

78 Competing first passage percolation

79 Competing first passage percolation

80 Competing first passage percolation

81 Competing first passage percolation Theorem (Häggström, Pemantle) On 2D lattice, for λ R = λ B for at most countable set S P(both red and blue ) > 0; λ R λ B / S P(both red and blue ) = 0.

82 Random regular graphs Random regular graphs Have only bounded number of short cycles. Neighborhoods or typical vertices are trees. Expander properties. Configuration model

83 Competing process on random graphs Let G n be random d-regular graph on n vertices. Uniformly choose r(n) vertices of G n and color it red and b(n) vertices and color it blue (r(n) and b(n) are given functions). Run the same dynamics as in the competing first passage percolation model with rates λ R and λ B. Consider the number of red and blue vertices Rn final when the graphs is exhausted. Question: Can we estimate R final n and B final n? and B final n

84 Compare with the Torus

85 Compare with the Torus

86 Compare with the Torus

87 Compare with the Torus

88 Compare with the Torus

89 Compare with the Torus Both processes occupy Θ(n) = Θ(k 2 ) vertices.

90 Results - asymptotics Theorem (Antunović, Dekel, M, Peres) Up to a constant factor with high probability R total n ( n ) λr /λ B r(n) n. b(n) In particular if r(n) = n ρ and b(n) = n β then R total n { n ρ+(1 β)λ R /λ B, for ρ < 1 (1 β)λ R /λ B, n, for ρ 1 (1 β)λ R /λ B. Balance occurs at (1 ρ)λ B = (1 β)λ R.

91 Configuration model

92 Configuration model

93 Configuration model

94 Configuration model

95 Configuration model

96 Configuration model

97 Configuration model

98 Configuration model

99 Configuration model

100 Configuration model

101 Configuration model

102 Configuration model

103 Configuration model

104 Configuration model

105 Configuration model P(Bad configuration) is bounded away from 1.

106 Configuration model P(Bad configuration) is bounded away from 1. Conditioned that there are no Bad configuration the algorithm generates a random regular graph.

107 Couple CFPP and the configuration model

108 Couple CFPP and the configuration model

109 Couple CFPP and the configuration model

110 Couple CFPP and the configuration model

111 Couple CFPP and the configuration model

112 Couple CFPP and the configuration model

113 Couple CFPP and the configuration model

114 Couple CFPP and the configuration model

115 Couple CFPP and the configuration model

116 Couple CFPP and the configuration model

117 Couple CFPP and the configuration model

118 Couple CFPP and the configuration model

119 Couple CFPP and the configuration model

120 Couple CFPP and the configuration model

121 Couple CFPP and the configuration model We will keep track of: R t and B t... number of red and blue half-edges at step t.

122 Couple CFPP and the configuration model We will keep track of: R t and B t... number of red and blue half-edges at step t. Transition probabilities: (R t + d 2, B t ), w.p. λ R R t dn 2t R t B t λ R R t+λ B B t dn 2t 1 (R t+1, B t+1 ) = (R t, B t + d 2), w.p. (R t 2, B t ), w.p. λ B B t dn 2t R t B t λ R R t+λ B B t dn 2t 1 λ R R t R t 1 λ R R t+λ B B t dn 2t 1 (R t, B t 2), w.p. λ B B t B t 1 λ R R t+λ B B t dn 2t 1 (R t 1, B t 1), w.p. (λ R +λ B )B tr t (λ R R t+λ B B t)(dn 2t 1)

123 Couple CFPP and the configuration model To control R t and B t we use martingale techniques to control X t = R t + B t and Y t = R t B λ R/λ B t

124 Couple CFPP and the configuration model To control R t and B t we use martingale techniques to control X t = R t + B t and Y t = R t B λ R/λ B t X t... number of active half-edges in the configuration model

125 Couple CFPP and the configuration model To control R t and B t we use martingale techniques to control X t = R t + B t and Y t = R t B λ R/λ B t X t... number of active half-edges in the configuration model Y t... is the continuous time martingale when both processes evolve without any interactions (and self-interactions)

126 Couple CFPP and the configuration model X t = R t + B t Process (X t, dn 2t X t ) evolves as an urn model ( 2 0 ) d 2 d

127 Couple CFPP and the configuration model X t = R t + B t Process (X t, dn 2t X t ) evolves as an urn model ( 2 0 ) d 2 d As n X t = (1 ± o(1)) for all 0 t < dn/2. ( ( dn 2t (dn X 0 ) 1 2t ) ) d/2, dn

128 Couple CFPP and the configuration model X t = R t + B t Process (X t, dn 2t X t ) evolves as an urn model ( 2 0 ) d 2 d As n X t = (1 ± o(1)) for all 0 t < dn/2. ( ( dn 2t (dn X 0 ) 1 2t ) ) d/2, dn

129 Couple CFPP and the configuration model As long as X t is large Y t = R t B λ R/λ B t ( Y t = (1 ± o(1))y 0 1 2t ) λ B λ R 2λ B. dn

130 Couple CFPP and the configuration model As long as X t is large Y t = R t B λ R/λ B t ( Y t = (1 ± o(1))y 0 1 2t ) λ B λ R 2λ B. dn Observe the extra advantage of the faster process.

131 THANKS!!!

132 Speakers: Organizers: Laurent, Lionel, Tasia Heather Peterson You! Thank you!

On the Submodularity of Influence in Social Networks

On the Submodularity of Influence in Social Networks On the Submodularity of Influence in Social Networks Elchanan Mossel Dept. of Statistics U.C. Berkeley mossel@stat.berkeley.edu Sebastien Roch Dept. of Statistics U.C. Berkeley sroch@stat.berkeley.edu

More information

Diffusion of Innovation and Influence Maximization

Diffusion of Innovation and Influence Maximization Diffusion of Innovation and Influence Maximization Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics

More information

A Note on Maximizing the Spread of Influence in Social Networks

A Note on Maximizing the Spread of Influence in Social Networks A Note on Maximizing the Spread of Influence in Social Networks Eyal Even-Dar 1 and Asaf Shapira 2 1 Google Research, Email: evendar@google.com 2 Microsoft Research, Email: asafico@microsoft.com Abstract.

More information

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03

Maximizing the Spread of Influence through a Social Network. David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Maximizing the Spread of Influence through a Social Network David Kempe, Jon Kleinberg, Éva Tardos SIGKDD 03 Influence and Social Networks Economics, sociology, political science, etc. all have studied

More information

Submodularity of Infuence in Social. Networks: From Local to Global

Submodularity of Infuence in Social. Networks: From Local to Global Submodularity of Infuence in Social Networks: From Local to Global arxiv:math/0612046v2 [math.pr] 28 Jul 2009 Elchanan Mossel and Sebastien Roch July 28, 2009 Abstract Social networks are often represented

More information

9. Submodular function optimization

9. Submodular function optimization Submodular function maximization 9-9. Submodular function optimization Submodular function maximization Greedy algorithm for monotone case Influence maximization Greedy algorithm for non-monotone case

More information

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University

CS 322: (Social and Information) Network Analysis Jure Leskovec Stanford University CS 322: (Social and Inormation) Network Analysis Jure Leskovec Stanord University Initially some nodes S are active Each edge (a,b) has probability (weight) p ab b 0.4 0.4 0.2 a 0.4 0.2 0.4 g 0.2 Node

More information

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24

CSCI 3210: Computational Game Theory. Cascading Behavior in Networks Ref: [AGT] Ch 24 CSCI 3210: Computational Game Theory Cascading Behavior in Networks Ref: [AGT] Ch 24 Mohammad T. Irfan Email: mirfan@bowdoin.edu Web: www.bowdoin.edu/~mirfan Course Website: www.bowdoin.edu/~mirfan/csci-3210.html

More information

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence

ECS 289 F / MAE 298, Lecture 15 May 20, Diffusion, Cascades and Influence ECS 289 F / MAE 298, Lecture 15 May 20, 2014 Diffusion, Cascades and Influence Diffusion and cascades in networks (Nodes in one of two states) Viruses (human and computer) contact processes epidemic thresholds

More information

Viral Marketing and the Diffusion of Trends on Social Networks

Viral Marketing and the Diffusion of Trends on Social Networks University of Pennsylvania ScholarlyCommons Technical Reports (CIS) Department of Computer & Information Science May 2008 Viral Marketing and the Diffusion of Trends on Social Networks Jennifer Wortman

More information

Diffusion of Innovation

Diffusion of Innovation Diffusion of Innovation Leonid E. Zhukov School of Data Analysis and Artificial Intelligence Department of Computer Science National Research University Higher School of Economics Social Network Analysis

More information

Optimization of Submodular Functions Tutorial - lecture I

Optimization of Submodular Functions Tutorial - lecture I Optimization of Submodular Functions Tutorial - lecture I Jan Vondrák 1 1 IBM Almaden Research Center San Jose, CA Jan Vondrák (IBM Almaden) Submodular Optimization Tutorial 1 / 1 Lecture I: outline 1

More information

Cascading Behavior in Networks: Algorithmic and Economic Issues

Cascading Behavior in Networks: Algorithmic and Economic Issues CHAPTER 24 Cascading Behavior in Networks: Algorithmic and Economic Issues Jon Kleinberg Abstract The flow of information or influence through a large social network can be thought of as unfolding with

More information

ECS 253 / MAE 253, Lecture 13 May 15, Diffusion, Cascades and Influence Mathematical models & generating functions

ECS 253 / MAE 253, Lecture 13 May 15, Diffusion, Cascades and Influence Mathematical models & generating functions ECS 253 / MAE 253, Lecture 13 May 15, 2018 Diffusion, Cascades and Influence Mathematical models & generating functions Last week: spatial flows and game theory on networks Optimal location of facilities

More information

The Minesweeper game: Percolation and Complexity

The Minesweeper game: Percolation and Complexity The Minesweeper game: Percolation and Complexity Elchanan Mossel Hebrew University of Jerusalem and Microsoft Research March 15, 2002 Abstract We study a model motivated by the minesweeper game In this

More information

Topological properties

Topological properties CHAPTER 4 Topological properties 1. Connectedness Definitions and examples Basic properties Connected components Connected versus path connected, again 2. Compactness Definition and first examples Topological

More information

Maximizing the Spread of Influence through a Social Network

Maximizing the Spread of Influence through a Social Network Maximizing the Spread of Influence through a Social Network David Kempe Dept. of Computer Science Cornell University, Ithaca NY kempe@cs.cornell.edu Jon Kleinberg Dept. of Computer Science Cornell University,

More information

Lecture 5. If we interpret the index n 0 as time, then a Markov chain simply requires that the future depends only on the present and not on the past.

Lecture 5. If we interpret the index n 0 as time, then a Markov chain simply requires that the future depends only on the present and not on the past. 1 Markov chain: definition Lecture 5 Definition 1.1 Markov chain] A sequence of random variables (X n ) n 0 taking values in a measurable state space (S, S) is called a (discrete time) Markov chain, if

More information

Bayesian Learning in Social Networks

Bayesian Learning in Social Networks Bayesian Learning in Social Networks Asu Ozdaglar Joint work with Daron Acemoglu, Munther Dahleh, Ilan Lobel Department of Electrical Engineering and Computer Science, Department of Economics, Operations

More information

Lecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales.

Lecture 2. We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales. Lecture 2 1 Martingales We now introduce some fundamental tools in martingale theory, which are useful in controlling the fluctuation of martingales. 1.1 Doob s inequality We have the following maximal

More information

Lecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma

Lecture 11: Generalized Lovász Local Lemma. Lovász Local Lemma Lecture 11: Generalized Recall We design an experiment with independent random variables X 1,..., X m We define bad events A 1,..., A n where) the bad event A i depends on the variables (X k1,..., X kni

More information

A Game-theoretic Analysis of a Competitive Diffusion Process over Social Networks

A Game-theoretic Analysis of a Competitive Diffusion Process over Social Networks A Game-theoretic Analysis of a Competitive Diffusion Process over Social Networks Vasileios Tzoumas Christos Amanatidis Evangelos Markakis Abstract We study a game-theoretic model for the diffusion of

More information

Nonamenable Products are not Treeable

Nonamenable Products are not Treeable Version of 30 July 1999 Nonamenable Products are not Treeable by Robin Pemantle and Yuval Peres Abstract. Let X and Y be infinite graphs, such that the automorphism group of X is nonamenable, and the automorphism

More information

Lecture 11 October 11, Information Dissemination through Social Networks

Lecture 11 October 11, Information Dissemination through Social Networks CS 284r: Incentives and Information in Networks Fall 2013 Prof. Yaron Singer Lecture 11 October 11, 2013 Scribe: Michael Tingley, K. Nathaniel Tucker 1 Overview In today s lecture we will start the second

More information

CSE541 Class 22. Jeremy Buhler. November 22, Today: how to generalize some well-known approximation results

CSE541 Class 22. Jeremy Buhler. November 22, Today: how to generalize some well-known approximation results CSE541 Class 22 Jeremy Buhler November 22, 2016 Today: how to generalize some well-known approximation results 1 Intuition: Behavior of Functions Consider a real-valued function gz) on integers or reals).

More information

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan

Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks. Osman Yağan Modeling, Analysis, and Control of Information Propagation in Multi-layer and Multiplex Networks Osman Yağan Department of ECE Carnegie Mellon University Joint work with Y. Zhuang and V. Gligor (CMU) Alex

More information

Probability Models of Information Exchange on Networks Lecture 1

Probability Models of Information Exchange on Networks Lecture 1 Probability Models of Information Exchange on Networks Lecture 1 Elchanan Mossel UC Berkeley All Rights Reserved Motivating Questions How are collective decisions made by: people / computational agents

More information

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash

CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash CS 781 Lecture 9 March 10, 2011 Topics: Local Search and Optimization Metropolis Algorithm Greedy Optimization Hopfield Networks Max Cut Problem Nash Equilibrium Price of Stability Coping With NP-Hardness

More information

Hard-Core Model on Random Graphs

Hard-Core Model on Random Graphs Hard-Core Model on Random Graphs Antar Bandyopadhyay Theoretical Statistics and Mathematics Unit Seminar Theoretical Statistics and Mathematics Unit Indian Statistical Institute, New Delhi Centre New Delhi,

More information

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process

Social Influence in Online Social Networks. Epidemiological Models. Epidemic Process Social Influence in Online Social Networks Toward Understanding Spatial Dependence on Epidemic Thresholds in Networks Dr. Zesheng Chen Viral marketing ( word-of-mouth ) Blog information cascading Rumor

More information

Greedy Maximization Framework for Graph-based Influence Functions

Greedy Maximization Framework for Graph-based Influence Functions Greedy Maximization Framework for Graph-based Influence Functions Edith Cohen Google Research Tel Aviv University HotWeb '16 1 Large Graphs Model relations/interactions (edges) between entities (nodes)

More information

Game Theory and its Applications to Networks - Part I: Strict Competition

Game Theory and its Applications to Networks - Part I: Strict Competition Game Theory and its Applications to Networks - Part I: Strict Competition Corinne Touati Master ENS Lyon, Fall 200 What is Game Theory and what is it for? Definition (Roger Myerson, Game Theory, Analysis

More information

A TWO-SPECIES COMPETITION MODEL ON Z D

A TWO-SPECIES COMPETITION MODEL ON Z D A TWO-SPECIES COMPETITION MODEL ON Z D GEORGE KORDZAKHIA AND STEVEN P. LALLEY Abstract. We consider a two-type stochastic competition model on the integer lattice Z d. The model describes the space evolution

More information

Packing nearly optimal Ramsey R(3, t) graphs

Packing nearly optimal Ramsey R(3, t) graphs Packing nearly optimal Ramsey R(3, t) graphs He Guo Joint work with Lutz Warnke Context of this talk Ramsey number R(s, t) R(s, t) := minimum n N such that every red/blue edge-coloring of complete n-vertex

More information

Limit shapes outside the percolation cone

Limit shapes outside the percolation cone jointly with Tuca Auffinger and Mike Hochman Princeton University July 14, 2011 Definitions We consider first-passage percolation on the square lattice Z 2. x γ - We place i.i.d. non-negative passage times

More information

Monotone Submodular Maximization over a Matroid

Monotone Submodular Maximization over a Matroid Monotone Submodular Maximization over a Matroid Yuval Filmus January 31, 2013 Abstract In this talk, we survey some recent results on monotone submodular maximization over a matroid. The survey does not

More information

Notes 6 : First and second moment methods

Notes 6 : First and second moment methods Notes 6 : First and second moment methods Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Roc, Sections 2.1-2.3]. Recall: THM 6.1 (Markov s inequality) Let X be a non-negative

More information

Submodular Functions Properties Algorithms Machine Learning

Submodular Functions Properties Algorithms Machine Learning Submodular Functions Properties Algorithms Machine Learning Rémi Gilleron Inria Lille - Nord Europe & LIFL & Univ Lille Jan. 12 revised Aug. 14 Rémi Gilleron (Mostrare) Submodular Functions Jan. 12 revised

More information

Tree-width and algorithms

Tree-width and algorithms Tree-width and algorithms Zdeněk Dvořák September 14, 2015 1 Algorithmic applications of tree-width Many problems that are hard in general become easy on trees. For example, consider the problem of finding

More information

Rate of Convergence of Learning in Social Networks

Rate of Convergence of Learning in Social Networks Rate of Convergence of Learning in Social Networks Ilan Lobel, Daron Acemoglu, Munther Dahleh and Asuman Ozdaglar Massachusetts Institute of Technology Cambridge, MA Abstract We study the rate of convergence

More information

Social Choice and Networks

Social Choice and Networks Social Choice and Networks Elchanan Mossel UC Berkeley All rights reserved Logistics 1 Different numbers for the course: Compsci 294 Section 063 Econ 207A Math C223A Stat 206A Room: Cory 241 Time TuTh

More information

Probability Models of Information Exchange on Networks Lecture 5

Probability Models of Information Exchange on Networks Lecture 5 Probability Models of Information Exchange on Networks Lecture 5 Elchanan Mossel (UC Berkeley) July 25, 2013 1 / 22 Informational Framework Each agent receives a private signal X i which depends on S.

More information

Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process

Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process Time-Critical Influence Maximization in Social Networks with Time-Delayed Diffusion Process Wei Chen Microsoft Research Asia Beijing, China weic@microsoft.com Wei Lu University of British Columbia Vancouver,

More information

4: The Pandemic process

4: The Pandemic process 4: The Pandemic process David Aldous July 12, 2012 (repeat of previous slide) Background meeting model with rates ν. Model: Pandemic Initially one agent is infected. Whenever an infected agent meets another

More information

First Passage Percolation

First Passage Percolation First Passage Percolation (and other local modifications of the metric) on Random Planar Maps (well... actually on triangulations only!) N. Curien and J.F. Le Gall (Université Paris-Sud Orsay, IUF) Journées

More information

LECTURE 15: COMPLETENESS AND CONVEXITY

LECTURE 15: COMPLETENESS AND CONVEXITY LECTURE 15: COMPLETENESS AND CONVEXITY 1. The Hopf-Rinow Theorem Recall that a Riemannian manifold (M, g) is called geodesically complete if the maximal defining interval of any geodesic is R. On the other

More information

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1

< k 2n. 2 1 (n 2). + (1 p) s) N (n < 1 List of Problems jacques@ucsd.edu Those question with a star next to them are considered slightly more challenging. Problems 9, 11, and 19 from the book The probabilistic method, by Alon and Spencer. Question

More information

Learning to Predict Opinion Share in Social Networks

Learning to Predict Opinion Share in Social Networks Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence AAAI-10 Learning to Predict Opinion Share in Social Networks Masahiro Kimura Department of Electronics and Informatics Ryukoku

More information

Propp-Wilson Algorithm (and sampling the Ising model)

Propp-Wilson Algorithm (and sampling the Ising model) Propp-Wilson Algorithm (and sampling the Ising model) Danny Leshem, Nov 2009 References: Haggstrom, O. (2002) Finite Markov Chains and Algorithmic Applications, ch. 10-11 Propp, J. & Wilson, D. (1996)

More information

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap

ECS 253 / MAE 253, Lecture 15 May 17, I. Probability generating function recap ECS 253 / MAE 253, Lecture 15 May 17, 2016 I. Probability generating function recap Part I. Ensemble approaches A. Master equations (Random graph evolution, cluster aggregation) B. Network configuration

More information

Nash-solvable bidirected cyclic two-person game forms

Nash-solvable bidirected cyclic two-person game forms DIMACS Technical Report 2008-13 November 2008 Nash-solvable bidirected cyclic two-person game forms by Endre Boros 1 RUTCOR, Rutgers University 640 Bartholomew Road, Piscataway NJ 08854-8003 boros@rutcor.rutgers.edu

More information

FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS

FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS FIRST ORDER SENTENCES ON G(n, p), ZERO-ONE LAWS, ALMOST SURE AND COMPLETE THEORIES ON SPARSE RANDOM GRAPHS MOUMANTI PODDER 1. First order theory on G(n, p) We start with a very simple property of G(n,

More information

Asymptotic Learning on Bayesian Social Networks

Asymptotic Learning on Bayesian Social Networks Asymptotic Learning on Bayesian Social Networks Elchanan Mossel Allan Sly Omer Tamuz January 29, 2014 Abstract Understanding information exchange and aggregation on networks is a central problem in theoretical

More information

CSC 373: Algorithm Design and Analysis Lecture 12

CSC 373: Algorithm Design and Analysis Lecture 12 CSC 373: Algorithm Design and Analysis Lecture 12 Allan Borodin February 4, 2013 1 / 16 Lecture 12: Announcements and Outline Announcements Term test 1 in tutorials. Need to use only two rooms due to sickness

More information

General Power Series

General Power Series General Power Series James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University March 29, 2018 Outline Power Series Consequences With all these preliminaries

More information

An introduction to Mathematical Theory of Control

An introduction to Mathematical Theory of Control An introduction to Mathematical Theory of Control Vasile Staicu University of Aveiro UNICA, May 2018 Vasile Staicu (University of Aveiro) An introduction to Mathematical Theory of Control UNICA, May 2018

More information

Lecture 3: Probability Measures - 2

Lecture 3: Probability Measures - 2 Lecture 3: Probability Measures - 2 1. Continuation of measures 1.1 Problem of continuation of a probability measure 1.2 Outer measure 1.3 Lebesgue outer measure 1.4 Lebesgue continuation of an elementary

More information

Modern Discrete Probability Branching processes

Modern Discrete Probability Branching processes Modern Discrete Probability IV - Branching processes Review Sébastien Roch UW Madison Mathematics November 15, 2014 1 Basic definitions 2 3 4 Galton-Watson branching processes I Definition A Galton-Watson

More information

Lecture 5: Counting independent sets up to the tree threshold

Lecture 5: Counting independent sets up to the tree threshold CS 7535: Markov Chain Monte Carlo Algorithms Fall 2014 Lecture 5: Counting independent sets up to the tree threshold Lecturer: Richard Brooks and Rakshit Trivedi Date: December 02 In this lecture, we will

More information

EC 521 MATHEMATICAL METHODS FOR ECONOMICS. Lecture 1: Preliminaries

EC 521 MATHEMATICAL METHODS FOR ECONOMICS. Lecture 1: Preliminaries EC 521 MATHEMATICAL METHODS FOR ECONOMICS Lecture 1: Preliminaries Murat YILMAZ Boğaziçi University In this lecture we provide some basic facts from both Linear Algebra and Real Analysis, which are going

More information

arxiv: v1 [math.co] 13 Dec 2014

arxiv: v1 [math.co] 13 Dec 2014 SEARCHING FOR KNIGHTS AND SPIES: A MAJORITY/MINORITY GAME MARK WILDON arxiv:1412.4247v1 [math.co] 13 Dec 2014 Abstract. There are n people, each of whom is either a knight or a spy. It is known that at

More information

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V.

Dynamic Programming on Trees. Example: Independent Set on T = (V, E) rooted at r V. Dynamic Programming on Trees Example: Independent Set on T = (V, E) rooted at r V. For v V let T v denote the subtree rooted at v. Let f + (v) be the size of a maximum independent set for T v that contains

More information

Information Dissemination in Social Networks under the Linear Threshold Model

Information Dissemination in Social Networks under the Linear Threshold Model Information Dissemination in Social Networks under the Linear Threshold Model Srinivasan Venkatramanan and Anurag Kumar Department of Electrical Communication Engineering, Indian Institute of Science,

More information

Info-Cluster Based Regional Influence Analysis in Social Networks

Info-Cluster Based Regional Influence Analysis in Social Networks Info-Cluster Based Regional Influence Analysis in Social Networks Chao Li,2,3, Zhongying Zhao,2,3,JunLuo, and Jianping Fan Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen

More information

High dimensional ising model selection using l 1 -regularized logistic regression

High dimensional ising model selection using l 1 -regularized logistic regression High dimensional ising model selection using l 1 -regularized logistic regression 1 Department of Statistics Pennsylvania State University 597 Presentation 2016 1/29 Outline Introduction 1 Introduction

More information

Efficiency, Fairness and Competitiveness in Nash Bargaining Games

Efficiency, Fairness and Competitiveness in Nash Bargaining Games Efficiency, Fairness and Competitiveness in Nash Bargaining Games Deeparnab Chakrabarty, Gagan Goel 2, Vijay V. Vazirani 2, Lei Wang 2 and Changyuan Yu 3 Department of Combinatorics and Optimization, University

More information

7.1 Coupling from the Past

7.1 Coupling from the Past Georgia Tech Fall 2006 Markov Chain Monte Carlo Methods Lecture 7: September 12, 2006 Coupling from the Past Eric Vigoda 7.1 Coupling from the Past 7.1.1 Introduction We saw in the last lecture how Markov

More information

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods

University of Chicago Autumn 2003 CS Markov Chain Monte Carlo Methods University of Chicago Autumn 2003 CS37101-1 Markov Chain Monte Carlo Methods Lecture 4: October 21, 2003 Bounding the mixing time via coupling Eric Vigoda 4.1 Introduction In this lecture we ll use the

More information

Biased random walk on percolation clusters. Noam Berger, Nina Gantert and Yuval Peres

Biased random walk on percolation clusters. Noam Berger, Nina Gantert and Yuval Peres Biased random walk on percolation clusters Noam Berger, Nina Gantert and Yuval Peres Related paper: [Berger, Gantert & Peres] (Prob. Theory related fields, Vol 126,2, 221 242) 1 The Model Percolation on

More information

CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis

CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis CS155: Probability and Computing: Randomized Algorithms and Probabilistic Analysis Eli Upfal Eli Upfal@brown.edu Office: 319 TA s: Lorenzo De Stefani and Sorin Vatasoiu cs155tas@cs.brown.edu It is remarkable

More information

Lecture 5: Probabilistic tools and Applications II

Lecture 5: Probabilistic tools and Applications II T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will

More information

Probability Models of Information Exchange on Networks Lecture 2. Elchanan Mossel UC Berkeley All rights reserved

Probability Models of Information Exchange on Networks Lecture 2. Elchanan Mossel UC Berkeley All rights reserved Probability Models of Information Exchange on Networks Lecture 2 Elchanan Mossel UC Berkeley All rights reserved Lecture Plan We will see the first simple models of information exchange on networks. Assumptions:

More information

Web Structure Mining Nodes, Links and Influence

Web Structure Mining Nodes, Links and Influence Web Structure Mining Nodes, Links and Influence 1 Outline 1. Importance of nodes 1. Centrality 2. Prestige 3. Page Rank 4. Hubs and Authority 5. Metrics comparison 2. Link analysis 3. Influence model 1.

More information

XVI International Congress on Mathematical Physics

XVI International Congress on Mathematical Physics Aug 2009 XVI International Congress on Mathematical Physics Underlying geometry: finite graph G=(V,E ). Set of possible configurations: V (assignments of +/- spins to the vertices). Probability of a configuration

More information

1 Overview. 2 Multilinear Extension. AM 221: Advanced Optimization Spring 2016

1 Overview. 2 Multilinear Extension. AM 221: Advanced Optimization Spring 2016 AM 22: Advanced Optimization Spring 26 Prof. Yaron Singer Lecture 24 April 25th Overview The goal of today s lecture is to see how the multilinear extension of a submodular function that we introduced

More information

PERCOLATION IN SELFISH SOCIAL NETWORKS

PERCOLATION IN SELFISH SOCIAL NETWORKS PERCOLATION IN SELFISH SOCIAL NETWORKS Charles Bordenave UC Berkeley joint work with David Aldous (UC Berkeley) PARADIGM OF SOCIAL NETWORKS OBJECTIVE - Understand better the dynamics of social behaviors

More information

Erdős-Renyi random graphs basics

Erdős-Renyi random graphs basics Erdős-Renyi random graphs basics Nathanaël Berestycki U.B.C. - class on percolation We take n vertices and a number p = p(n) with < p < 1. Let G(n, p(n)) be the graph such that there is an edge between

More information

Notes 1 : Measure-theoretic foundations I

Notes 1 : Measure-theoretic foundations I Notes 1 : Measure-theoretic foundations I Math 733-734: Theory of Probability Lecturer: Sebastien Roch References: [Wil91, Section 1.0-1.8, 2.1-2.3, 3.1-3.11], [Fel68, Sections 7.2, 8.1, 9.6], [Dur10,

More information

Dynamics in network games with local coordination and global congestion effects

Dynamics in network games with local coordination and global congestion effects Dynamics in network games with local coordination and global congestion effects Gianluca Brero, Giacomo Como, and Fabio Fagnani Abstract Several strategic interactions over social networks display both

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu Find most influential set S of size k: largest expected cascade size f(s) if set S is activated

More information

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis) Sourav Chakraborty Thesis Advisor: László Babai February, 2005 Abstract We discuss several complexity measures

More information

Cographs; chordal graphs and tree decompositions

Cographs; chordal graphs and tree decompositions Cographs; chordal graphs and tree decompositions Zdeněk Dvořák September 14, 2015 Let us now proceed with some more interesting graph classes closed on induced subgraphs. 1 Cographs The class of cographs

More information

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8

Lecture 20: LP Relaxation and Approximation Algorithms. 1 Introduction. 2 Vertex Cover problem. CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 CSCI-B609: A Theorist s Toolkit, Fall 2016 Nov 8 Lecture 20: LP Relaxation and Approximation Algorithms Lecturer: Yuan Zhou Scribe: Syed Mahbub Hafiz 1 Introduction When variables of constraints of an

More information

From trees to seeds:

From trees to seeds: From trees to seeds: on the inference of the seed from large random trees Joint work with Sébastien Bubeck, Ronen Eldan, and Elchanan Mossel Miklós Z. Rácz Microsoft Research Banff Retreat September 25,

More information

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs

Applications of the Lopsided Lovász Local Lemma Regarding Hypergraphs Regarding Hypergraphs Ph.D. Dissertation Defense April 15, 2013 Overview The Local Lemmata 2-Coloring Hypergraphs with the Original Local Lemma Counting Derangements with the Lopsided Local Lemma Lopsided

More information

Topics in Theoretical Computer Science April 08, Lecture 8

Topics in Theoretical Computer Science April 08, Lecture 8 Topics in Theoretical Computer Science April 08, 204 Lecture 8 Lecturer: Ola Svensson Scribes: David Leydier and Samuel Grütter Introduction In this lecture we will introduce Linear Programming. It was

More information

1 Continuous extensions of submodular functions

1 Continuous extensions of submodular functions CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: November 18, 010 1 Continuous extensions of submodular functions Submodular functions are functions assigning

More information

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University http://cs224w.stanford.edu 10/24/2012 Jure Leskovec, Stanford CS224W: Social and Information Network Analysis, http://cs224w.stanford.edu

More information

Set, functions and Euclidean space. Seungjin Han

Set, functions and Euclidean space. Seungjin Han Set, functions and Euclidean space Seungjin Han September, 2018 1 Some Basics LOGIC A is necessary for B : If B holds, then A holds. B A A B is the contraposition of B A. A is sufficient for B: If A holds,

More information

4 Countability axioms

4 Countability axioms 4 COUNTABILITY AXIOMS 4 Countability axioms Definition 4.1. Let X be a topological space X is said to be first countable if for any x X, there is a countable basis for the neighborhoods of x. X is said

More information

Computing Competing Cascades on Signed Networks

Computing Competing Cascades on Signed Networks Noname manuscript No. (will be inserted by the editor Computing Competing Cascades on Signed Networks Ajitesh Srivastava Charalampos Chelmis Viktor K. Prasanna Received: date / Accepted: date Abstract

More information

Admin and Lecture 1: Recap of Measure Theory

Admin and Lecture 1: Recap of Measure Theory Admin and Lecture 1: Recap of Measure Theory David Aldous January 16, 2018 I don t use bcourses: Read web page (search Aldous 205B) Web page rather unorganized some topics done by Nike in 205A will post

More information

TUG OF WAR INFINITY LAPLACIAN

TUG OF WAR INFINITY LAPLACIAN TUG OF WAR and the INFINITY LAPLACIAN How to solve degenerate elliptic PDEs and the optimal Lipschitz extension problem by playing games. Yuval Peres, Oded Schramm, Scott Sheffield, and David Wilson Infinity

More information

Continuity. Matt Rosenzweig

Continuity. Matt Rosenzweig Continuity Matt Rosenzweig Contents 1 Continuity 1 1.1 Rudin Chapter 4 Exercises........................................ 1 1.1.1 Exercise 1............................................. 1 1.1.2 Exercise

More information

High-dimensional graphical model selection: Practical and information-theoretic limits

High-dimensional graphical model selection: Practical and information-theoretic limits 1 High-dimensional graphical model selection: Practical and information-theoretic limits Martin Wainwright Departments of Statistics, and EECS UC Berkeley, California, USA Based on joint work with: John

More information

Assignment 2 : Probabilistic Methods

Assignment 2 : Probabilistic Methods Assignment 2 : Probabilistic Methods jverstra@math Question 1. Let d N, c R +, and let G n be an n-vertex d-regular graph. Suppose that vertices of G n are selected independently with probability p, where

More information

Lecture 18: March 15

Lecture 18: March 15 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 18: March 15 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

Tractable Models for Information Diffusion in Social Networks

Tractable Models for Information Diffusion in Social Networks Tractable Models for Information Diffusion in Social Networks Masahiro Kimura 1 and Kazumi Saito 2 1 Department of Electronics and Informatics, Ryukoku University Otsu, Shiga 520-2194, Japan 2 NTT Communication

More information

Stochastic Dynamic Programming: The One Sector Growth Model

Stochastic Dynamic Programming: The One Sector Growth Model Stochastic Dynamic Programming: The One Sector Growth Model Esteban Rossi-Hansberg Princeton University March 26, 2012 Esteban Rossi-Hansberg () Stochastic Dynamic Programming March 26, 2012 1 / 31 References

More information

Project in Computational Game Theory: Communities in Social Networks

Project in Computational Game Theory: Communities in Social Networks Project in Computational Game Theory: Communities in Social Networks Eldad Rubinstein November 11, 2012 1 Presentation of the Original Paper 1.1 Introduction In this section I present the article [1].

More information