1 / 25

Cascading Behavior in Networks Andrew Ouzts

Explore algorithmic and economic issues of cascading behavior in networks, studying how behaviors spread in social contexts like epidemic disease, viral marketing, and covert organization exposure. Models and examples illustrate influence maximization and initiation/termination factors in cascades.

csweet
Download Presentation

Cascading Behavior in Networks Andrew Ouzts

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cascading Behavior in NetworksAndrew Ouzts Based on “Cascading Behavior in Networks: Algorithmic and Economic Issues” in Algorithmic Game Theory(Jon Kleinberg, 2007) and Ch.16 and 19 of Networks, Crowds, and Markets: Reasoning about a Highly Connected World (David Easley, Jon Kleinberg, 2010)

  2. Overview • Motivation • Simple Example • Models • Influence Maximization • Similar Work

  3. Motivation • What is a network cascade? • A series of correlated behavior changes • Why do we want to study cascading behavior? • Social Contexts • Epidemic Disease • Viral Marketing • Covert Organization Exposure • What are some of the interesting questions to be raised? • How can we model a cascade? • What can initiate or terminate a cascade? • What are some properties of cascading behavior? • Can we identify subsets of nodes or edges that have greater influence in a cascade than others?

  4. Simple Example – Marble Game • A jar either contains 2 red and 1 blue marble or 2 blue and 1 red marble • People sequentially come and remove 1 marble and verbally announce which configuration they believe to be present (there is an incentive for guessing correctly) • Claim: All guesses beyond the first two are fixed if they match

  5. Marble Game • Recall Bayes’ Rule: • Suppose first student draws blue. His guess is blue. () • If the second student draws blue, their choice is trivial. If it is red, then we have: and they should announce red to break the tie • Third student: suppose first two students drew blue, third draws red, yet he announces blue • All future students have the same information as the third student and a cascade occurs

  6. Models • Simple Model • Consider a social network (such that and if u and v are engaged in an activity or friendship • Now consider a situation in which each node has a choice of behavior – an original behavior, A, or a new behavior, B with the following incentive given an edge (v, w) and parameterized by q, • If v and w both choose A, they receive a payoff of q • If v and w both choose B, they receive a payoff of 1-q • If v and w choose differing behaviors, they receive nothing

  7. First, some definitions… • Let denote the degree of node v anddenote the number of neighbors with behavior A and B, respectively • Aside: A node should adopt behavior A if < q and B otherwise • Each node updates its behavior simultaneously • S- set of nodes adopting behavior B • -set of nodes adopting B after 1 update with threshold q • - set of nodes adopting B after k updates with threshold q • A node w is converted by a set S if for some k, w for all j ≥ k • A set S is contagious if every node is converted by S • Contagion threshold – the maximum q for which there exists a finite contagious set (also sometimes called cascade capacity)

  8. Models • Example • 2-way infinite path • q = ½, • S = {0} t=0 t=1 t=2 -1 0 1 2 -2 -1 0 1 2 -2 -1 0 1 2 -2

  9. Models • Example • 2-way infinite path • q = ½, • S = {-1,0,1} t=0 t=1 -1 0 1 2 -2 -1 0 1 2 -2 The contagion threshold of this graph is ½: any set with larger q can never extend! In fact, we can prove that the maximum contagion threshold of any graph is ½!

  10. Question: what causes cascades to stop?

  11. Models • Definition: a cluster of density p is a set of nodes such that each node in the set has at least a p fraction of its neighbors in the set

  12. Models • Progressive vs. Non-Progressive • Our prior model was non-progressive – nodes could change back and forth between states • A progressive model is also interesting – once a node switches from A to B, it remains B from then on (consider the behavior of pursuing an advanced degree) • Intuition: it is easier to find contagious sets with a progressive model • Actuality: for any graph G, both models have the same contagion threshold

  13. Models • Our model thus far is limited • Threshold is uniform for nodes – everyone is just as predisposed to study algorithms as you are • All neighbors have equal weight – all your facebook friends are just as important as your immediate family • Undirected graph – the influence you have on your boss is the same as he has on you • We will now introduce several models to ameliorate these limitations

  14. Models • Linear threshold model • Goal: allow nodes to weigh influence of their neighbors differently, and assume that each node’s threshold is chosen uniformly at random • Non-negative weights b representing influence • 1 • Each node has a threshold θv chosen uniformly at random from [0,1] indicating the fraction of v’s neighbors that must adopt the behavior before he does • Definition: a node is activated when it switches from behavior A to B • A node becomes active when θv • Problem: neighbor influence is strictly additive.

  15. Models • General threshold model • Each node v now has a function gv defined on subsets of N(v). • Furthermore, if • A node now becomes active when • Cascade model • Idea of ‘catching’ behavior from your friends • Probabilistic – whenever an edge (u,v) exists such that u is active and v is not, u is given a chance to activate v that depends on u, v, and also the set of nodes that have already tried and failed to activate v.

  16. Models • Cascade Model, cont. • Replace the g function from the General Threshold Model with an incremental function that returns the probability of success of activating a node v given initiator u and a set of neighbors X that already attempted and failed • Provably equivalent to general threshold model in utility • Independent Cascade Model • Incremental function is independent of X and depends only on u andv

  17. Influence Maximization • Domingos and Richardson – influential work that posed the question: if we can convince a subset of individuals to adopt a new product with the goal of triggering a cascade of future adoptions, who should we target? • NP-hard, even for many simple special cases of the models we’ve discussed • Can construct instances of those models for which approximation within a factor of n is NP-hard

  18. Influence Maximization • Proof of inapproximability relies on ‘knife-edge’ property • Kempe et al. – Submodularity of the influence function allows approximation within(about 63%) • A function is submodular if for all sets

  19. Influence Maximization • By identifying instances where the influence function f is submodular and monotone, we can make use of the following theorem of Nemhauser, Wolsey, and Fisher:

  20. Influence Maximization • Identifying instances in which we have a submodular influence function • Any instance of the Cascade Model in which the incremental functions pv exhibit diminishing returns has a submodular influence function • Any instance of the Independent Cascade Model has a submodular influence function • Any instance of the General Threshold Model in which all the threshold functions gv are submodular has a submodular influence function

  21. Similar Work • The anchored k-core problem (Bhawalker et al.) • Model – each user has a cost for maintaining engagement but derives benefits proportional to the number of engaged neighbors • A k-core is the maximal induced subgraph with minimum degree at least k

  22. The Anchored k-Core Problem • Anchoredk-core – the maximal induced subgraph for which every unanchored vertex has minimum degree at least k • Corresponds with the problem of preventing cascades of withdrawals • exact solution to the 2-core problem • NP-hard to even approximate within a factor of for k ≥ 3

  23. Similar Work • Cascade scheduling (Chierichetti et al.) • Ordering nodes in a cascade to maximize a particular outcome • Identifying failure susceptibility (Blume et al.) • Notion of cascading failure • μ-risk – maximum failure probability of any node in the graph • What about the structure of the underlying graph causes it to have high μ-risk?

  24. References • Lawrence Blume, David Easley, Jon Kleinberg, Robert Kleinberg, and ÉvaTardos. 2011. Which Networks are Least Susceptible to Cascading Failures?. In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS '11). IEEE Computer Society, Washington, DC, USA, 393-402. • K. Bhawalkar, J. Kleinberg, K. Lewi, T. Roughgarden, and A. Sharma. Preventing Unraveling in Social Networks: The Anchored k-Core Problem. In ICALP '12. • Flavio Chierichetti, Jon Kleinberg, Alessandro Panconesi. How to Schedule a Cascade in an Arbitrary Graph. In Proceedings of EC 2012. • Pedro Domingos and Matt Richardson. Mining the network value of customers. In Proc. 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 57–66, 2001. • D. Easley, J. Kleinberg. Networks, Crowds, and Markets: Reasoning About a Highly Connected World. Cambridge University Press, 2010. • David Kempe, Jon Kleinberg, andEva Tardos. Maximizing the spread of influence ina social network. InProc. 9th ACM SIGKDD International Conference on KnowledgeDiscovery and Data Mining, pages 137–146, 2003. • J. Kleinberg. Cascading Behavior in Networks: Algorithmic and Economic Issues. In Algorithmic Game Theory (N. Nisan, T. Roughgarden, E. Tardos, V. Vazirani, eds.), Cambridge University Press, 2007.

More Related