๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Modeling Information Diffusion in Implicit Networks

โœ Scribed by Yang J., Leskovec J.


Tongue
English
Leaves
11
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Article published in the "Proceedings of the 2010 IEEE International Conference on Data Mining December 13-17, 2010" โ€” 2010 โ€” p.599-608 โ€” doi:10.1109/ICDM.2010.22

Social media forms a central domain for the production and dissemination of real-time information. Even though such flows of information have traditionally been thought of as diffusion processes over social networks, the underlying phenomena are the result of a complex web of interactions among numerous participants. Here we develop a Linear Influence Model where rather than requiring the knowledge of the social network and then modeling the diffusion by predicting which node will influence which other nodes in the network, we focus on modeling the global influence of a node on the rate of diffusion through the (implicit) network. We model the number of newly infected nodes as a function of which other nodes got infected in the past. For each node we estimate an influence function that quantifies how many subsequent infections can be attributed
to the influence of that node over time. A nonparametric formulation of the model leads to a simple least squares problem that can be solved on large datasets. We validate our model on a set of 500 million tweets and a set of 170 million news articles and blog posts.We show that the Linear Influence Model accurately models influences of nodes and reliably predicts the temporal dynamics of information diffusion. We find that patterns of influence of individual participants differ significantly depending on the type of the node and the topic of the information.

โœฆ Subjects


ะกะพั†ะธะพะปะพะณะธั‡ะตัะบะธะต ะดะธัั†ะธะฟะปะธะฝั‹;ะกะพั†ะธะพะปะพะณะธั ะผะฐััะพะฒั‹ั… ะบะพะผะผัƒะฝะธะบะฐั†ะธะน


๐Ÿ“œ SIMILAR VOLUMES


Networked Information Technologies: Diff
โœ Damsgaard J., Henriksen H.Z. ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐ŸŒ English

Software systems that used to be relatively autonomous entities such as e.g. accounting systems, order-entry systems etc. are now interlinked in large networks comprising extensive information infrastructures. What earlier used to be stand-alone proprietary systems are now for the most part replaced

Modeling Information Diffusion in Online
โœ Haiyan Wang, Feng Wang, Kuai Xu ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› Springer ๐ŸŒ English

<span>The book lies at the interface of mathematics, social media analysis, and data science. Its authors aim to introduce a new dynamic modeling approach to the use of partial differential equations for describing information diffusion over online social networks. The eigenvalues and eigenvectors o

Diffusion in Social Networks
โœ Paulo Shakarian, Abhivav Bhatnagar, Ashkan Aleali, Elham Shaabani, Ruocheng Guo ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p>This book presents the leading models of social network diffusion that are used to demonstrate the spread of disease, ideas, and behavior. It introduces diffusion models from the fields of computer science (independent cascade and linear threshold), sociology (tipping models), physics (voter mode

Networked Information Technologies : Dif
โœ Jan Damsgaard ๐Ÿ“‚ Library ๐Ÿ“… 2004 ๐ŸŒ English

Software systems that used to be relatively autonomous entities such as e.g. accounting systems, order-entry systems etc. are now interlinked in large networks comprising extensive information infrastructures. What earlier used to be stand-alone proprietary systems are now for the most part replaced

Malware Diffusion Models for Wireless Co
โœ Karyotis, Vasileios; Khouzani, M.H.R ๐Ÿ“‚ Library ๐Ÿ“… 2016 ๐Ÿ› Elsevier : Morgan Kaufman ๐ŸŒ English

Malware Diffusion Models for Wireless Complex Networks: Theory and Applications provides a timely update on malicious software (malware), a serious concern for all types of network users, from laymen to experienced administrators. As the proliferation of portable devices, namely smartphones and tabl