How to choose friends strategically
Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person v in the network has a certain threshold t(v) for activation, i.e. adoption of the product or idea. If v has at least t(v) activated neighbors, then v will also become activated. If Alice...
Saved in:
Published in | Theoretical computer science Vol. 811; pp. 99 - 111 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
02.04.2020
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person v in the network has a certain threshold t(v) for activation, i.e. adoption of the product or idea. If v has at least t(v) activated neighbors, then v will also become activated. If Alice wants to make k new friends in the network, and thereby activate the most number of people, how should she choose these friends? We study the problem of choosing the k people in the network to befriend, who will in turn activate the maximum number of people. This Maximum Influence with Links Problem has applications in viral marketing and the study of epidemics. We show that the solution can be quite different from the related and widely studied influence maximization problem where the objective is to choose a seed or target set with maximum influence. We prove that the Maximum Influence with Links problem is NP-complete even for bipartite graphs in which all nodes have threshold 1 or 2. In contrast, we give polynomial time algorithms that find optimal solutions for the problem for trees, paths, cycles, and cliques. |
---|---|
AbstractList | Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person v in the network has a certain threshold t(v) for activation, i.e. adoption of the product or idea. If v has at least t(v) activated neighbors, then v will also become activated. If Alice wants to make k new friends in the network, and thereby activate the most number of people, how should she choose these friends? We study the problem of choosing the k people in the network to befriend, who will in turn activate the maximum number of people. This Maximum Influence with Links Problem has applications in viral marketing and the study of epidemics. We show that the solution can be quite different from the related and widely studied influence maximization problem where the objective is to choose a seed or target set with maximum influence. We prove that the Maximum Influence with Links problem is NP-complete even for bipartite graphs in which all nodes have threshold 1 or 2. In contrast, we give polynomial time algorithms that find optimal solutions for the problem for trees, paths, cycles, and cliques. |
Author | Wu, Kangkang Narayanan, Lata |
Author_xml | – sequence: 1 givenname: Lata surname: Narayanan fullname: Narayanan, Lata email: lata@cs.concordia.ca – sequence: 2 givenname: Kangkang surname: Wu fullname: Wu, Kangkang |
BookMark | eNp9j01Lw0AURQepYFv9Ae4CrhPfy2S-cCVFW6HgRtdDnLzRhJiRmaD03zulrr2buzqXe1ZsMYWJGLtGqBBQ3g7V7FJVA-oKVAXIz9gStTJlXZtmwZbAoSm5UeKCrVIaIEcouWQ3u_BTzKFwHyEkKnzsaepSkebYzvTeu3YcD5fs3Ldjoqu_XrPXx4eXza7cP2-fNvf70vEG5tJLaYw2qpGgOq8MyjcBHjVK0RIH7Uz-g7qpkUCQbIwEoY1owTuskXu-ZnjadTGkFMnbr9h_tvFgEezR0g42W9qjpQVls2Vm7k4M5WPfPUWbXFZw1PWR3Gy70P9D_wKoO1mr |
CitedBy_id | crossref_primary_10_1016_j_cor_2021_105441 crossref_primary_10_1007_s10878_024_01164_4 crossref_primary_10_1016_j_knosys_2023_110827 crossref_primary_10_1007_s12652_018_1002_1 |
Cites_doi | 10.14778/2047485.2047492 10.1137/080714452 10.1109/TNET.2013.2290714 10.1023/A:1011122126881 10.1016/S0012-365X(97)00213-6 10.1007/s13278-012-0062-z 10.1016/j.disopt.2010.09.007 10.1086/209118 10.1007/s13278-012-0067-7 |
ContentType | Journal Article |
Copyright | 2018 |
Copyright_xml | – notice: 2018 |
DBID | AAYXX CITATION |
DOI | 10.1016/j.tcs.2018.07.013 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DatabaseTitleList | |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Mathematics Computer Science |
EISSN | 1879-2294 |
EndPage | 111 |
ExternalDocumentID | 10_1016_j_tcs_2018_07_013 S0304397518304948 |
GrantInformation_xml | – fundername: NSERC funderid: https://doi.org/10.13039/501100000038 |
GroupedDBID | --K --M -~X .DC .~1 0R~ 123 1B1 1RT 1~. 1~5 4.4 457 4G. 5VS 7-5 71M 8P~ 9JN AABNK AACTN AAEDW AAFTH AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAXUO AAYFN ABAOU ABBOA ABJNI ABMAC ABYKQ ACAZW ACDAQ ACGFS ACRLP ACZNC ADBBV ADEZE AEBSH AEKER AENEX AFKWA AFTJW AGUBO AGYEJ AHHHB AHZHX AIALX AIEXJ AIKHN AITUG AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ AOUOD ARUGR AXJTR BKOJK BLXMC CS3 DU5 EBS EFJIC EFLBG EO8 EO9 EP2 EP3 F5P FDB FEDTE FIRID FNPLU FYGXN G-Q GBLVA GBOLZ HVGLF IHE IXB J1W KOM LG9 M26 M41 MHUIS MO0 N9A O-L O9- OAUVE OK1 OZT P-8 P-9 P2P PC. Q38 ROL RPZ SCC SDF SDG SES SPC SPCBC SSV SSW T5K TN5 WH7 YNT ZMT ~G- 0SF 29Q 6I. AAEDT AAQXK AAXKI AAYXX ABEFU ABFNM ABTAH ABVKL ABXDB ACNNM ADMUD ADVLN AEXQZ AFJKZ AGHFR AKRWK ASPBG AVWKF AZFZN CITATION EJD FGOYB G-2 G8K HZ~ NCXOZ R2- RIG SEW SSZ TAE WUQ XJT ZY4 |
ID | FETCH-LOGICAL-c340t-f66998974607df7916b50f18165ae308c987918421e05e649605895a0fc1213f3 |
IEDL.DBID | AIKHN |
ISSN | 0304-3975 |
IngestDate | Thu Sep 26 19:02:17 EDT 2024 Fri Feb 23 02:48:29 EST 2024 |
IsDoiOpenAccess | false |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Keywords | Influence maximization Social networks NP-complete Polytime algorithms for trees, paths, and cliques Dynamic programming |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c340t-f66998974607df7916b50f18165ae308c987918421e05e649605895a0fc1213f3 |
OpenAccessLink | https://doi.org/10.1016/j.tcs.2018.07.013 |
PageCount | 13 |
ParticipantIDs | crossref_primary_10_1016_j_tcs_2018_07_013 elsevier_sciencedirect_doi_10_1016_j_tcs_2018_07_013 |
PublicationCentury | 2000 |
PublicationDate | 2020-04-02 |
PublicationDateYYYYMMDD | 2020-04-02 |
PublicationDate_xml | – month: 04 year: 2020 text: 2020-04-02 day: 02 |
PublicationDecade | 2020 |
PublicationTitle | Theoretical computer science |
PublicationYear | 2020 |
Publisher | Elsevier B.V |
Publisher_xml | – name: Elsevier B.V |
References | Mossel, Roch (br0300) 2010; 39 Gunnec, Raghavan, Zhang (br0210) 2013 Tang, Shi, Xiao (br0350) 2015 Lv, Pan (br0290) 2014; vol. 8710 He, Ji, Beyah, Cai (br0220) 2014 Tang, Yuan (br0340) 2016 Yang, Mao, Pei, He (br0370) 2016 Demaine, Hajiaghayi, Mahini, Malec, Raghavan, Sawant, Zadimoghadam (br0100) 2014 Gunnec, Raghavan (br0200) 2012 de Caen (br0090) 1998; 185 Cicalese, Cordasco, Gargano, Milanic, Peters, Vaccaro (br0060) 2014; vol. 8496 Cicalese, Cordasco, Gargano, Milanic, Vaccaro (br0070) 2013; vol. 7921 Ben-Zwi, Hermelin, Lokshtanov, Newman (br0010) 2011; 8 Cordasco, Gargano, Rescigno, Vaccaro (br0080) 2015 Leskovec, Adamic, Huberman (br0270) 2006 Eftekhar, Ganjali, Koudas (br0130) 2013 Dinh, Zhang, Nguyen, Thai (br0110) 2014; 22 Goldenberg, Libai, Muller (br0160) 2001; 12 Lamba, Pfeffer (br0260) 2016 Gargano, Hell, Peters, Vaccaro (br0150) 2013; vol. 8179 Goyal, Bonchi, Lakshmanan, Venkatasubramanian (br0180) 2013; 3 Lafond, Narayanan, Wu (br0250) 2016 Lu, Bonchi, Goyal, Lakshmanan (br0280) 2013 Brown, Reingen (br0030) 1987 Tang, Xiao, Shi (br0360) 2014 Kempe, Kleinberg, Tardos (br0230) 2003 Goyal, Bonchi, Lakshmanan (br0170) 2011; 5 Kempe, Kleinberg, Tardos (br0240) 2005 Nichterlein, Niedermeier, Uhlmann, Weller (br0320) 2012; 3 Goyal, Lu, Lakshmanan (br0190) 2011 Richardson, Domingos (br0330) 2002 Fazli, Ghodsi, Habibi, Khalilabadi, Mirrokni, Sadeghabad (br0140) 2012; vol. 7256 Nguyen, Thai, Dinh (br0310) 2016 Chen, Wang, Yang (br0050) 2009 Borgs, Brautbar, Chayes, Lucier (br0020) 2014 Chen (br0040) 2008 Domingos, Richardson (br0120) 2001 Lv (10.1016/j.tcs.2018.07.013_br0290) 2014; vol. 8710 Lafond (10.1016/j.tcs.2018.07.013_br0250) 2016 Leskovec (10.1016/j.tcs.2018.07.013_br0270) 2006 Nguyen (10.1016/j.tcs.2018.07.013_br0310) 2016 Kempe (10.1016/j.tcs.2018.07.013_br0230) 2003 Kempe (10.1016/j.tcs.2018.07.013_br0240) 2005 Tang (10.1016/j.tcs.2018.07.013_br0340) de Caen (10.1016/j.tcs.2018.07.013_br0090) 1998; 185 Goyal (10.1016/j.tcs.2018.07.013_br0170) 2011; 5 Richardson (10.1016/j.tcs.2018.07.013_br0330) 2002 Goyal (10.1016/j.tcs.2018.07.013_br0190) 2011 Gargano (10.1016/j.tcs.2018.07.013_br0150) 2013; vol. 8179 He (10.1016/j.tcs.2018.07.013_br0220) 2014 Lamba (10.1016/j.tcs.2018.07.013_br0260) 2016 Cicalese (10.1016/j.tcs.2018.07.013_br0060) 2014; vol. 8496 Borgs (10.1016/j.tcs.2018.07.013_br0020) 2014 Brown (10.1016/j.tcs.2018.07.013_br0030) 1987 Demaine (10.1016/j.tcs.2018.07.013_br0100) 2014 Yang (10.1016/j.tcs.2018.07.013_br0370) 2016 Goldenberg (10.1016/j.tcs.2018.07.013_br0160) 2001; 12 Tang (10.1016/j.tcs.2018.07.013_br0350) 2015 Chen (10.1016/j.tcs.2018.07.013_br0040) 2008 Chen (10.1016/j.tcs.2018.07.013_br0050) 2009 Domingos (10.1016/j.tcs.2018.07.013_br0120) 2001 Mossel (10.1016/j.tcs.2018.07.013_br0300) 2010; 39 Nichterlein (10.1016/j.tcs.2018.07.013_br0320) 2012; 3 Tang (10.1016/j.tcs.2018.07.013_br0360) 2014 Goyal (10.1016/j.tcs.2018.07.013_br0180) 2013; 3 Gunnec (10.1016/j.tcs.2018.07.013_br0210) 2013 Gunnec (10.1016/j.tcs.2018.07.013_br0200) 2012 Lu (10.1016/j.tcs.2018.07.013_br0280) 2013 Dinh (10.1016/j.tcs.2018.07.013_br0110) 2014; 22 Ben-Zwi (10.1016/j.tcs.2018.07.013_br0010) 2011; 8 Cicalese (10.1016/j.tcs.2018.07.013_br0070) 2013; vol. 7921 Fazli (10.1016/j.tcs.2018.07.013_br0140) 2012; vol. 7256 Eftekhar (10.1016/j.tcs.2018.07.013_br0130) 2013 Cordasco (10.1016/j.tcs.2018.07.013_br0080) 2015 |
References_xml | – start-page: 1539 year: 2015 end-page: 1554 ident: br0350 article-title: Influence maximization in near-linear time: a martingale approach publication-title: Proceedings of the ACM SIGMOD International Conference on Management of Data contributor: fullname: Xiao – start-page: 1029 year: 2008 end-page: 1037 ident: br0040 article-title: On the approximability of influence in social networks publication-title: Proceedings of the Symposium on Discrete Algorithms contributor: fullname: Chen – start-page: 137 year: 2003 end-page: 146 ident: br0230 article-title: Maximizing the spread of influence through a social network publication-title: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining contributor: fullname: Tardos – start-page: 695 year: 2016 end-page: 710 ident: br0310 article-title: Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks publication-title: Proceedings of the International Conference on Management of Data contributor: fullname: Dinh – start-page: 57 year: 2001 end-page: 66 ident: br0120 article-title: Mining the network value of customers publication-title: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining contributor: fullname: Richardson – start-page: 1127 year: 2005 end-page: 1138 ident: br0240 article-title: Influential nodes in a diffusion model for social networks publication-title: Proceedings of the International Conference on Automata, Languages and Programming contributor: fullname: Tardos – volume: vol. 8496 start-page: 100 year: 2014 end-page: 112 ident: br0060 article-title: How to go viral: cheaply and quickly publication-title: Fun with Algorithms contributor: fullname: Vaccaro – volume: 8 start-page: 702 year: 2011 end-page: 715 ident: br0010 article-title: Treewidth governs the complexity of target set selection publication-title: Discrete Optim. contributor: fullname: Newman – start-page: 350 year: 1987 end-page: 362 ident: br0030 article-title: Social ties and word-of-mouth referral behavior publication-title: J. Consum. Res. contributor: fullname: Reingen – start-page: 75 year: 2014 end-page: 86 ident: br0360 article-title: Influence maximization: near-optimal time complexity meets practical efficiency publication-title: Proceedings of the ACM SIGMOD International Conference on Management of Data contributor: fullname: Shi – volume: 22 year: 2014 ident: br0110 article-title: Cost-effective viral marketing for time-critical campaigns in large-scale social networks publication-title: IEEE/ACM Trans. Netw. contributor: fullname: Thai – start-page: 228 year: 2006 end-page: 237 ident: br0270 article-title: The dynamics of viral marketing publication-title: Proceedings of the ACM Conference on Electronic Commerce contributor: fullname: Huberman – start-page: 93 year: 2014 end-page: 102 ident: br0220 article-title: Minimum-sized influential node set selection for social networks under the independent cascade model publication-title: Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing contributor: fullname: Cai – volume: 39 start-page: 2176 year: 2010 end-page: 2188 ident: br0300 article-title: Submodularity of influence in social networks: from local to global publication-title: SIAM J. Comput. contributor: fullname: Roch – start-page: 199 year: 2009 end-page: 208 ident: br0050 article-title: Efficient influence maximization in social networks publication-title: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining contributor: fullname: Yang – volume: vol. 8179 start-page: 141 year: 2013 end-page: 152 ident: br0150 article-title: Influence diffusion in social networks under time window constraints publication-title: Proceedings of SIROCCO contributor: fullname: Vaccaro – year: 2012 ident: br0200 article-title: Integrating Social Network Effects in the Share-of-Choice Problem contributor: fullname: Raghavan – start-page: 946 year: 2014 end-page: 957 ident: br0020 article-title: Maximizing social influence in nearly optimal time publication-title: Proceedings of the ACM–SIAM Symposium on Discrete Algorithms contributor: fullname: Lucier – year: 2016 ident: br0340 article-title: Going viral: optimizing discount allocation in social networks for influence maximization contributor: fullname: Yuan – volume: vol. 8710 start-page: 23 year: 2014 end-page: 34 ident: br0290 article-title: Influence maximization in independent cascade model with limited propagation distance publication-title: Web Technologies and Applications contributor: fullname: Pan – start-page: 727 year: 2016 end-page: 741 ident: br0370 article-title: Continuous influence maximization: what discounts should we offer to social network users? publication-title: Proceedings of the International Conference on Management of Data contributor: fullname: He – start-page: 937 year: 2014 end-page: 948 ident: br0100 article-title: How to influence people with partial incentives publication-title: Proceedings of the International Conference on World Wide Web contributor: fullname: Zadimoghadam – start-page: 67 year: 2016 end-page: 68 ident: br0260 article-title: Maximizing the spread of positive influence by deadline publication-title: Proceedings of the International Conference Companion on World Wide Web contributor: fullname: Pfeffer – volume: vol. 7256 start-page: 315 year: 2012 end-page: 326 ident: br0140 article-title: On the non-progressive spread of influence through social networks publication-title: LATIN 2012: Theoretical Informatics contributor: fullname: Sadeghabad – volume: 185 start-page: 245 year: 1998 end-page: 248 ident: br0090 article-title: An upper bound on the sum of squares of degrees in a graph publication-title: Discrete Math. contributor: fullname: de Caen – year: 2013 ident: br0210 article-title: The Least Cost Influence Problem contributor: fullname: Zhang – volume: 3 start-page: 179 year: 2013 end-page: 192 ident: br0180 article-title: On minimizing budget and time in influence propagation over social networks publication-title: Soc. Netw. Anal. Min. contributor: fullname: Venkatasubramanian – volume: 3 start-page: 233 year: 2012 end-page: 256 ident: br0320 article-title: On tractable cases of target set selection publication-title: Soc. Netw. Anal. Min. contributor: fullname: Weller – start-page: 61 year: 2002 end-page: 70 ident: br0330 article-title: Mining knowledge-sharing sites for viral marketing publication-title: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining contributor: fullname: Domingos – volume: 12 start-page: 211 year: 2001 end-page: 223 ident: br0160 article-title: Talk of the network: a complex systems look at the underlying process of word-of-mouth publication-title: Mark. Lett. contributor: fullname: Muller – volume: 5 start-page: 73 year: 2011 end-page: 84 ident: br0170 article-title: A data-based approach to social influence maximization publication-title: Proc. VLDB Endow. contributor: fullname: Lakshmanan – volume: vol. 7921 start-page: 65 year: 2013 end-page: 77 ident: br0070 article-title: Latency-bounded target set selection in social networks publication-title: The Nature of Computation. Logic, Algorithms, Applications contributor: fullname: Vaccaro – start-page: 47 year: 2011 end-page: 48 ident: br0190 article-title: Celf++: optimizing the greedy algorithm for influence maximization in social networks publication-title: Proceedings of the International Conference Companion on World Wide Web contributor: fullname: Lakshmanan – start-page: 928 year: 2013 end-page: 936 ident: br0280 article-title: The bang for the buck: fair competitive viral marketing from the host perspective publication-title: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining contributor: fullname: Lakshmanan – start-page: 401 year: 2013 end-page: 409 ident: br0130 article-title: Information cascade at group scale publication-title: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining contributor: fullname: Koudas – year: 2016 ident: br0250 article-title: Whom to befriend to influence people publication-title: Proceedings of SIROCCO contributor: fullname: Wu – start-page: 119 year: 2015 end-page: 134 ident: br0080 article-title: Optimizing spread of influence in social networks via partial incentives publication-title: Proceedings of SIROCCO contributor: fullname: Vaccaro – ident: 10.1016/j.tcs.2018.07.013_br0340 contributor: fullname: Tang – volume: vol. 8710 start-page: 23 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0290 article-title: Influence maximization in independent cascade model with limited propagation distance contributor: fullname: Lv – start-page: 727 year: 2016 ident: 10.1016/j.tcs.2018.07.013_br0370 article-title: Continuous influence maximization: what discounts should we offer to social network users? contributor: fullname: Yang – volume: 5 start-page: 73 year: 2011 ident: 10.1016/j.tcs.2018.07.013_br0170 article-title: A data-based approach to social influence maximization publication-title: Proc. VLDB Endow. doi: 10.14778/2047485.2047492 contributor: fullname: Goyal – start-page: 946 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0020 article-title: Maximizing social influence in nearly optimal time contributor: fullname: Borgs – start-page: 199 year: 2009 ident: 10.1016/j.tcs.2018.07.013_br0050 article-title: Efficient influence maximization in social networks contributor: fullname: Chen – year: 2013 ident: 10.1016/j.tcs.2018.07.013_br0210 contributor: fullname: Gunnec – start-page: 57 year: 2001 ident: 10.1016/j.tcs.2018.07.013_br0120 article-title: Mining the network value of customers contributor: fullname: Domingos – start-page: 93 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0220 article-title: Minimum-sized influential node set selection for social networks under the independent cascade model contributor: fullname: He – volume: vol. 7256 start-page: 315 year: 2012 ident: 10.1016/j.tcs.2018.07.013_br0140 article-title: On the non-progressive spread of influence through social networks contributor: fullname: Fazli – start-page: 228 year: 2006 ident: 10.1016/j.tcs.2018.07.013_br0270 article-title: The dynamics of viral marketing contributor: fullname: Leskovec – start-page: 119 year: 2015 ident: 10.1016/j.tcs.2018.07.013_br0080 article-title: Optimizing spread of influence in social networks via partial incentives contributor: fullname: Cordasco – volume: vol. 8179 start-page: 141 year: 2013 ident: 10.1016/j.tcs.2018.07.013_br0150 article-title: Influence diffusion in social networks under time window constraints contributor: fullname: Gargano – volume: 39 start-page: 2176 year: 2010 ident: 10.1016/j.tcs.2018.07.013_br0300 article-title: Submodularity of influence in social networks: from local to global publication-title: SIAM J. Comput. doi: 10.1137/080714452 contributor: fullname: Mossel – start-page: 137 year: 2003 ident: 10.1016/j.tcs.2018.07.013_br0230 article-title: Maximizing the spread of influence through a social network contributor: fullname: Kempe – year: 2012 ident: 10.1016/j.tcs.2018.07.013_br0200 contributor: fullname: Gunnec – volume: 22 issue: 6 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0110 article-title: Cost-effective viral marketing for time-critical campaigns in large-scale social networks publication-title: IEEE/ACM Trans. Netw. doi: 10.1109/TNET.2013.2290714 contributor: fullname: Dinh – volume: 12 start-page: 211 year: 2001 ident: 10.1016/j.tcs.2018.07.013_br0160 article-title: Talk of the network: a complex systems look at the underlying process of word-of-mouth publication-title: Mark. Lett. doi: 10.1023/A:1011122126881 contributor: fullname: Goldenberg – start-page: 1539 year: 2015 ident: 10.1016/j.tcs.2018.07.013_br0350 article-title: Influence maximization in near-linear time: a martingale approach contributor: fullname: Tang – start-page: 401 year: 2013 ident: 10.1016/j.tcs.2018.07.013_br0130 article-title: Information cascade at group scale contributor: fullname: Eftekhar – volume: 185 start-page: 245 year: 1998 ident: 10.1016/j.tcs.2018.07.013_br0090 article-title: An upper bound on the sum of squares of degrees in a graph publication-title: Discrete Math. doi: 10.1016/S0012-365X(97)00213-6 contributor: fullname: de Caen – start-page: 937 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0100 article-title: How to influence people with partial incentives contributor: fullname: Demaine – volume: 3 start-page: 179 year: 2013 ident: 10.1016/j.tcs.2018.07.013_br0180 article-title: On minimizing budget and time in influence propagation over social networks publication-title: Soc. Netw. Anal. Min. doi: 10.1007/s13278-012-0062-z contributor: fullname: Goyal – year: 2016 ident: 10.1016/j.tcs.2018.07.013_br0250 article-title: Whom to befriend to influence people contributor: fullname: Lafond – volume: vol. 7921 start-page: 65 year: 2013 ident: 10.1016/j.tcs.2018.07.013_br0070 article-title: Latency-bounded target set selection in social networks contributor: fullname: Cicalese – volume: vol. 8496 start-page: 100 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0060 article-title: How to go viral: cheaply and quickly contributor: fullname: Cicalese – start-page: 61 year: 2002 ident: 10.1016/j.tcs.2018.07.013_br0330 article-title: Mining knowledge-sharing sites for viral marketing contributor: fullname: Richardson – start-page: 928 year: 2013 ident: 10.1016/j.tcs.2018.07.013_br0280 article-title: The bang for the buck: fair competitive viral marketing from the host perspective contributor: fullname: Lu – volume: 8 start-page: 702 year: 2011 ident: 10.1016/j.tcs.2018.07.013_br0010 article-title: Treewidth governs the complexity of target set selection publication-title: Discrete Optim. doi: 10.1016/j.disopt.2010.09.007 contributor: fullname: Ben-Zwi – start-page: 350 year: 1987 ident: 10.1016/j.tcs.2018.07.013_br0030 article-title: Social ties and word-of-mouth referral behavior publication-title: J. Consum. Res. doi: 10.1086/209118 contributor: fullname: Brown – start-page: 1029 year: 2008 ident: 10.1016/j.tcs.2018.07.013_br0040 article-title: On the approximability of influence in social networks contributor: fullname: Chen – start-page: 67 year: 2016 ident: 10.1016/j.tcs.2018.07.013_br0260 article-title: Maximizing the spread of positive influence by deadline contributor: fullname: Lamba – volume: 3 start-page: 233 issue: 2 year: 2012 ident: 10.1016/j.tcs.2018.07.013_br0320 article-title: On tractable cases of target set selection publication-title: Soc. Netw. Anal. Min. doi: 10.1007/s13278-012-0067-7 contributor: fullname: Nichterlein – start-page: 47 year: 2011 ident: 10.1016/j.tcs.2018.07.013_br0190 article-title: Celf++: optimizing the greedy algorithm for influence maximization in social networks contributor: fullname: Goyal – start-page: 1127 year: 2005 ident: 10.1016/j.tcs.2018.07.013_br0240 article-title: Influential nodes in a diffusion model for social networks contributor: fullname: Kempe – start-page: 695 year: 2016 ident: 10.1016/j.tcs.2018.07.013_br0310 article-title: Stop-and-stare: optimal sampling algorithms for viral marketing in billion-scale networks contributor: fullname: Nguyen – start-page: 75 year: 2014 ident: 10.1016/j.tcs.2018.07.013_br0360 article-title: Influence maximization: near-optimal time complexity meets practical efficiency contributor: fullname: Tang |
SSID | ssj0000576 |
Score | 2.3553457 |
Snippet | Alice wants to join a new social network, and influence its members to adopt a new product or idea. Each person v in the network has a certain threshold t(v)... |
SourceID | crossref elsevier |
SourceType | Aggregation Database Publisher |
StartPage | 99 |
SubjectTerms | Dynamic programming Influence maximization NP-complete Polytime algorithms for trees, paths, and cliques Social networks |
Title | How to choose friends strategically |
URI | https://dx.doi.org/10.1016/j.tcs.2018.07.013 |
Volume | 811 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LS8NAEB5qe9GDj6pYHyWgJyE2j93N5tgWS2prEbXS25LHLlSkLSYiXvztzubhA_TiKbBhIHyz-80MM_kW4MxzYoVxQJqUJ9IkkjMzkkiGfsLwfLgJ94tpiwkLpuRqRmc16Ff_wuixypL7C07P2bpc6ZRodlbzeedON_UwmlLclLnIyRo0MBwRUodGdzgKJl-ETL2iZambAGhQNTfzMa8s1qLdNs8lPG339_D0LeQMtmGzzBWNbvE5O1CTiyZsVfcwGOWxbMLG9af2aroLp8Hy1ciWhpbXTKWhtJBxkhppKUOLPnl624Pp4PK-H5jlVQhm7BIrMxVjWBdh7s8sL1Ee5nQRtRRGZ0ZD6Vo89jkucuLY0qKSEV93O30aWirWmm3K3Yf6YrmQB2D4biiV61An9CISJoQnToRmWKhKZEYWteC8QkCsCsULUY2CPQqES2i4hOUJhKsFpMJI_HCbQEb-2-zwf2ZHsO7oclcPzjjHUM-eX-QJ5gRZ1Ia1i3e7jZ7vPYzG-tm_Hd-0y52Ab4ez3gfLQLY9 |
link.rule.ids | 315,786,790,3525,4521,24144,27600,27955,27956,45618,45696,45712,45907 |
linkProvider | Elsevier |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEB5qe1APPqpifS7oSVi6jySbPZZi2drHxRZ6C_tIoCJtcVfEf-9kN-sD9OI1MBC-Sb6ZYSZfAG4DL1UYB6RNeSZtIjmzE4lkGGYM74ef8bCatpiyaE4eFnTRgH79FkaPVRrurzi9ZGuz0jVodjfLZfdRN_UwmlI8lKXIyRa0CA1crwmt3nAUTb8ImQZVy1I3AdCgbm6WY15FqkW7XV5KeLr-7-HpW8gZHMCeyRWtXrWdQ2jIVRv2638YLHMt27A7-dRezY_gJlq_WcXa0vKaubSUFjLOcis3MrTok-f3Y5gP7mf9yDZfIdipT5zCVoxhXYS5P3OCTAWY0yXUURidGY2l7_A05LjIiedKh0pGQt3tDGnsqFRrtin_BJqr9UqeghX6sVS-R704SEicEZ55CZphoSqRGVnSgbsaAbGpFC9EPQr2JBAuoeESTiAQrg6QGiPxw20CGflvs7P_mV3DdjSbjMV4OB2dw46nS189RONdQLN4eZWXmB8UyZXx_wed7bQB |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=How+to+choose+friends+strategically&rft.jtitle=Theoretical+computer+science&rft.au=Narayanan%2C+Lata&rft.au=Wu%2C+Kangkang&rft.date=2020-04-02&rft.issn=0304-3975&rft.volume=811&rft.spage=99&rft.epage=111&rft_id=info:doi/10.1016%2Fj.tcs.2018.07.013&rft.externalDBID=n%2Fa&rft.externalDocID=10_1016_j_tcs_2018_07_013 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0304-3975&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0304-3975&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0304-3975&client=summon |