2015
DOI: 10.1016/j.ins.2015.04.024
|View full text |Cite
|
Sign up to set email alerts
|

Deprecation based greedy strategy for target set selection in large scale social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 30 publications
(13 citation statements)
references
References 21 publications
0
13
0
Order By: Relevance
“…Chen et.al come up with two methods [16], named as NewGreedy and MixedGreedy, to improve the greedy algorithm. Kundu and Pal proposed a deprecation based greedy strategy [17], in this strategy, they estimate the performance of each node and mark the nodes to be deprecated. They also proved that if the influence function is monotonic and sub-modular, this strategy can provide a guaranteed seed set.…”
Section: A Related Workmentioning
confidence: 99%
“…Chen et.al come up with two methods [16], named as NewGreedy and MixedGreedy, to improve the greedy algorithm. Kundu and Pal proposed a deprecation based greedy strategy [17], in this strategy, they estimate the performance of each node and mark the nodes to be deprecated. They also proved that if the influence function is monotonic and sub-modular, this strategy can provide a guaranteed seed set.…”
Section: A Related Workmentioning
confidence: 99%
“…[23] developed an improved version of CELF, called CELF++, and showed that it is 35-55% faster than CELF. [24] proposed a deprecation based greedy algorithm for the IMP, called DGS. This algorithm first orders the nodes of a social network by applying three heuristic influence functions, and then selects the most influential nodes from a list of pre-ordered vertices.…”
Section: Greedy Based Approachmentioning
confidence: 99%
“…Then, remove u from S, and select a vertex v from T randomly (for the diversity) and add it to S (lines [17][18]. If the exchanging can produce more influence, then it is viewed as a valid process, and update S* by S and T by T ∪ {u} (for the diversity of solutions) (lines 19-21); otherwise, S is back to the previous state (lines [22][23][24].…”
Section: The Domim Algorithmmentioning
confidence: 99%
“…Amazon0302 [34] D 262111 1234877 420 262111 0.4198 0.6697 BlogCatalog [42] U The competing algorithms. Several heuristics devoted to compute small size target sets have been proposed in the literature; they are typically classified in: additive algorithms [8,9,29] and subtractive algorithms [17,39,31] (depending on whether they focus on the addition of nodes to the target set or removal of nodes from the network). Additive algorithms typically follow a greedy strategy which adds iteratively a node to a set S until S becomes a target set.…”
Section: Namementioning
confidence: 99%