CH 06
CH 06
CH 06
Network Analysis
5
ICM algorithm
6
ICM example
0.6
Inactive Node
Newly active
X 0.1 U
0.4 node
Successful
0.5 0.3 0.2
attempt
Unsuccessful
0.5 attempt
w
v
Algorithm should stop after all active
Stop! nodes had a one-time shot at activating
their neighbors.
8
Linear Threshold Model (LTM)
• A node 𝑣 has random threshold 𝜃𝑣 ∼ 𝑈 0,1
• Node 𝑣 is influenced by each neighbor 𝑤 according
to a weight 𝑏𝑣,𝑤 such that
𝑏𝑣,𝑤 ≤ 1
𝑤∈𝑁𝑣
• A node 𝑣 becomes active when at least
(weighted) 𝜃𝑣 fraction of its neighbors are active
𝑏𝑣,𝑤 ≤ 1
(active)
𝑤∈𝑁𝑣 𝑁𝑣 : all neighbors of 𝑣.
(active)
𝑁𝑣 : all active neighbors of 𝑣.
9
LTM example
Inactive Node
0.6
Active Node
X Active neighbors
0.1
0.4 U
0.5 0.3
0.2 Stop!
0.5
w v
v
The stoppage of the algorithm is less
clear. What now?
10
Spread of viral messages
12
Constrained optimization
• Problem:
– Given a parameter 𝑘 (budget), find a 𝑘-node set 𝑆 to maximize
𝑓(𝑆)
– A constrained optimization problem with 𝑓(𝑆) as the objective
function.
13
f(S) properties
1. Non-negative (obviously)
2. Monotone
f (S v) f (S )
3. Submodular
– Let 𝑁 be a finite set
– A set function 𝑓 is submodular if and only if
f : 2N
S T N , v N \ T ,
f ( S v ) f ( S ) f (T v ) f (T )
14
NP-completeness
• Bad News
– For a submodular function monotone non-negative 𝑓, finding a 𝑘-
element set 𝑆 for which 𝑓(𝑆) is maximized is an NP-hard problem.
– It is NP-hard to determine the optimum for influence maximization
for independent cascade.
• Good News
– We can use a greedy algorithm:
• Start with an empty set 𝑆
• For 𝑘 iterations:
Add node 𝑣 to 𝑆 that maximizes 𝑓(𝑆 ∪ {𝑣}) − 𝑓(𝑆).
– How good (or bad) it is?
• Theorem: the greedy algorithm provides a (1 – 1/𝑒)
approximation
• The resulting set 𝑆 activates at least (1 − 1/𝑒) > 63% of the
number of nodes that any size-𝑘 set 𝑆 could activate. 15
Greedy algorithm
16
Network game
17
Choose with friends
• 𝑑 neighbors
• 𝑝 fraction play basketball
(A)
• 1 − 𝑝 fraction play soccer
(B)
• Decide based on
expected payoff. Choose
A if
𝑝𝑑𝑎 ≥ 1 − 𝑝 𝑑𝑏
𝑏
i.e. 𝑝 ≥ 𝑎+𝑏
19
Equilibrium
• example:
– a = 3, b = 2
21
Epidemics
Cured
• The network consists of nodes (individual)
and edges (links between nodes). S I
• Each node is in one of two states
– Susceptible (in other words, healthy) Infected by neighbor
– Infected
• Susceptible-Infected-Susceptible (SIS)
model
– Cured nodes immediately become susceptible
and may get infected at some point.
– New infection may take place any time.
23
Birth/death rates
Healthy
N2
Prob. δ
Prob. β
N1 X
Infected
N3
24
SIR vs. SIS
Cured and
• Susceptible-Infected-Removed become immune
– Sometimes called Recovered.
• Cured users become immune, so S I R
they will never be infected again.
Infected by neighbor
• Homogeneous death rate 𝛿 for
infected nodes.
25
Modeling SI
𝐼
• 𝑁: size of the crowd S I
𝑁 = 𝑆(𝑡) + 𝐼(𝑡)
26
Modeling SI, cont’d
𝐼0 : initial
number of
infected.
(𝑆 + 𝐼 = 𝑁)
27
SI graph
Logistic growth function compared to the HIV/AIDS growth in the United States
28
Modeling SIR
𝐼 𝛾𝐼
• 𝑁: size of the crowd S I R
(𝑅0 = 0)
30
SIR graph
S R
31
Modeling SIS
𝛾𝐼
𝐼
S I
• The SIS model is the same as the SI
model with the addition of infected nodes
recovering and becoming susceptible
again.
32
Modeling SIS, cont’d
𝛾
Case 1: When 𝑵 ≤ 𝜸 (or when 𝑁 ≤ ):
– The first term will be at most zero or negative
– The whole term becomes negative
– In the limit, I(t) will decrease exponentially to zero
𝛾
Case 2: When 𝑵 > 𝜸 (or when 𝑁 > ):
– We will have a logistic growth function like the SI model
33
SIS graph
S I
34
SIS model simulated with S0 = 99, I0 = 1, = 0.01, and = 0.1
Modeling SIRS
𝜆𝑅
• The individuals who have recovered
will lose immunity after a certain 𝐼 𝛾𝐼
S I R
period of time and will become
susceptible again.
35
SIRS graph
S
R
I
37