๐”– Bobbio Scriptorium
โœฆ   LIBER   โœฆ

[ACM Press the third ACM international conference - New York, New York, USA (2010.02.04-2010.02.06)] Proceedings of the third ACM international conference on Web search and data mining - WSDM '10 - Learning influence probabilities in social networks

โœ Scribed by Goyal, Amit; Bonchi, Francesco; Lakshmanan, Laks V.S.


Book ID
124058228
Publisher
ACM Press
Year
2010
Weight
945 KB
Category
Article
ISBN
160558889X

No coin nor oath required. For personal study only.

โœฆ Synopsis


Recently, there has been tremendous interest in the phenomenon of influence propagation in social networks. The studies in this area assume they have as input to their problems a social graph with edges labeled with probabilities of influence between users. However, the question of where these probabilities come from or how they can be computed from real social network data has been largely ignored until now. Thus it is interesting to ask whether from a social graph and a log of actions by its users, one can build models of influence. This is the main problem attacked in this paper. In addition to proposing models and algorithms for learning the model parameters and for testing the learned models to make predictions, we also develop techniques for predicting the time by which a user may be expected to perform an action. We validate our ideas and techniques using the Flickr data set consisting of a social graph with 1.3M nodes, 40M edges, and an action log consisting of 35M tuples referring to 300K distinct actions. Beyond showing that there is genuine influence happening in a real social network, we show that our techniques have excellent prediction performance.


๐Ÿ“œ SIMILAR VOLUMES


[ACM Press the third ACM international c
โœ Dang, Van; Croft, Bruce W. ๐Ÿ“‚ Article ๐Ÿ“… 2010 ๐Ÿ› ACM Press โš– 551 KB

Query reformulation techniques based on query logs have been studied as a method of capturing user intent and improving retrieval effectiveness. The evaluation of these techniques has primarily, however, focused on proprietary query logs and selected samples of queries. In this paper, we suggest tha