SlideShare a Scribd company logo
1 of 27
Download to read offline
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Paper Introduction:
Combinatorial Model and Bounds for Target Set
Selection
Yu Liu
NII Weekly Seminar
April 21, 2014
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
About The Paper
Eyal Ackerman, Oren Ben-Zwi, Guy Wolfovitz: Combinatorial
model and bounds for target set selection. Theor. Comput.
Sci. 411(44-46): 4017-4022 (2010).
a combinatorial model for the dynamic activation process of
influential networks;
representing Perfect Target Set Selection Problem and its
variants by linear integer programs;
combinatorial lower and upper bounds on the size of the
minimum Perfect Target Set
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
influential networks
diffusion models/process
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Influential Network
An influential network represents how the adoption of individuals’
decisions are influenced by recommendations from their friends.
1
2
3
4
5
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Diffusion Models/Process under Threshold Model
Let G = (V , E) be a digraph, S ⊆ V , t : V → N be a threshold
function.
Activation process
is a chain of vertex subsets:
Active[0] ⊂ Active[1] ⊂ Active[2] ⊂ . . . Active[z] ⊆ V .
Where Active[0] = S, ∀i > 0, Active[i] = Active[i − 1] ∪ {u|t(u) ≤
|{v ∈ Active[i − 1]|(v, u) ∈ E}|}
Active[S] =: Active[z], means S can activate set Active[z]
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Diffusion Models/Process under Threshold Model
suppose θ1 = 2, θ2 = 1, θ3 = 1, θ4 = 1, θ5 = 3
1
2
3
4
5
Active[0] = {1}, Active[1] = {1, 2, 3}, Active[2] =
{1, 2, 3, 4}, Active[3] = {1, 2, 3, 4, 5}
this paper only discuss monotone activation process
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Target Set Selection Problem
input: two integers k, l and a digraph G = (V , E) with
thresholds t : V → N.
output: a set S ⊆ V , such that |S| ≤ k, |Active[S]| ≥ l.
When l = |V | and t(v) = deg(v) it reduces to Vertex Cover
problem.
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Minimum Target Set
input: an integers l and a digraph G = (V , E) with thresholds
t : V → N.
output: a smallest set S ⊆ V , such that |Active[S]| ≥ l.
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Maximum Active Set
input: an integers k and a digraph G = (V , E) with
thresholds t : V → N.
output: a set S ⊆ V and |S| = k , such that ∀S ⊆ V and
S = S, |Active[S]| ≥ |Active[S ]|.
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Inapproximability of TSS
Target Set Selection problem is NP-hard, and hard to approximate.
NP-hard to approximate within a factor of n1− , for any
constant > 0 [KKT03].
For the special case where the thresholds are taken uniformly
at random, a constant-factor approximation algorithm
exists[MR07].
No O(2log1− |V |)-approximation algorithm exists, for any
constant > 0, even when all thresholds are set to 2 and the
graph is of constant degree [Che08].
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Some Terminologies
A target set is called perfect if it activates the entire graph.
majority threshold : ∀v ∈ V , t(v) ≥ deg(v)/2
strict majority threshold : ∀v ∈ V , t(v) > deg(v)/2
irreversible dynamic monopoly (dynamo) usually refers to a
perfect target set under majority or strict majority thresholds
G[A] means a subgraph of G induced by a vertex set A
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Main Results
1 bounds on the size of the minimum perfect target set:
the size of the minimum perfect target set is at most 2|V |/3
under strict majority thresholds, for both directed and
undirected graphs
an upper bound of |V |/2 on the size of the minimum perfect
target set under majority thresholds, both for directed and
undirected graphs.
2 a trivial constant factor approximation exists if
∆(G)/δ(G) is bounded (∆(G) and δ(G) are the maximum
and minimum degrees in G,respectively)
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Combinatorial Target Set Selection
Combinatorial Target Set Selection
input: two integers k, l and a digraph G = (V , E) with
thresholds t : V → N.
output: a set S ⊆ V , such that |S| ≤ k and there is a set
A ⊆ V such that S ⊆ A, |A| ≥ l, and one can remove edges
such that G[A] is acyclic and degin(v) ≥ t(v) for every vertex
v ∈ A  S.
S is a solution of Target Set Selection iff it is a solution of
Combinatorial Target Set Selection.
under this model, we can represent the optimization problems
as integer linear programs (IP)
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
IP for Minimum Target Set
The number of variables is Θ(n2) and the number of constraints is
Θ(n3).
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
IP for Maximum Target Set
The number of variables is Θ(n2) and the number of constraints is
Θ(n3).
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Combinatorial Bounds for Strict Majority Thresholds
For a digraph G(V , E), ∀v ∈ V degin(v) > 0,
there is an algorithm which finds in polynomial time a target set of
size at most 2n/3
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Combinatorial Bounds for Majority Thresholds
For a digraph G(V , E), ∀v ∈ V degin(v) > 0,
there is an algorithm which finds in polynomial time a target set of
size at most n/2
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Proof
Suppose A is activated by some S, then S can be found as follows:
π is a random permutation of the vertices in A;
remove edges in G[A] that violate the order of vertices, i.e.,
(u, v), such that π(u) > π(v);
then ∀v ∈ A, v ∈ S or degin(v) ≥ t(v).
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Proof
The expected number of vertices in S is:
E[|S|] =
v∈A
t(v)
degin(v) + 1
(1)
(1) gives an upper bound on the size of S.
for the Minimum Perfect Target Set Problem, A = V .
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Proof
E[|S|] =
v∈A
t(v)
degin(v) + 1
(1)
when t(v) = degin(v)+1
2 , t(v)
degin(v)+1 ≥ 2/3,
when t(v) = degin(v)
2 , t(v)
degin(v)+1 ≥ 1/2
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
More-than-majority thresholds
For undirected graph, if ∀v ∈ V , t(v) ≥ deg(v)/2 + 1, then
the minimum perfect target set is at least |V |/T, where
T = maxv∈V t(v).
finds a perfect target set of size at most 2|V |/3 is a
2T/3-approximation.
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Proof
Let undirected G=(V,E), z be the smallest integer such that
Active[z] = V . For every i, 0 ≤ i ≤ z, define a potential function
Φ(i) =
v /∈Active[i]
t(v) + |E[Active[i]]|,
where E[U] denotes the set of edges in E induced by set U.
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Proof
Φ(i) =
v /∈Active[i]
t(v) + |E[Active[i]]|
Note that Φ(i + 1) ≥ Φ(i) and Φ(z) = |E|, so that Φ(0) ≤ |E|.
Together with Φ(i) ≥ v /∈Active[i] t(v) ⇒ v /∈S t(v) ≤ |E|
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Proof
Finally we have:
|E| + |V | v∈V
deg(v)
2 + 1
v∈V t(v)
v /∈S t(v) + v∈S t(v)
|E| + v∈S t(v)
Thus, |V | ≤ v∈S t(v) .
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Extention for More General Settings
When t(v) = θ ∗ deg(v) , for a constant θ ∈ (1/2, 1],
a lower bound on |S|:
|V |δ(G)(2θ − 1)
∆(G) + δ(G)(2θ − 1)
an approximation ratio:
θ(∆(G) + δ(G)(2θ − 1))
δ(G)(2θ − 1)
= O(
∆(G)
δ(G)
)
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Summary
Simper proof of inapproximability results that same as
[Che08], for TSS
Integer linear programs for TSS
Tighter upper bound for majority / strict majority thresholds
2|V |/3 compared with 0.727|V | (digraphs) and
0.7732|V |(undirected graphs) in [CL13], for strict majority
thresholds
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
Preliminaries
A Combinatorial Model for TSS
Combinatorial Bounds for Perfect TSS
Bibliography
Ning Chen.
On the approximability of influence in social networks.
In Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’08, pages
1029–1037, Philadelphia, PA, USA, 2008. Society for Industrial and Applied Mathematics.
Ching-Lueh Chang and Yuh-Dauh Lyuu.
Bounding the sizes of dynamic monopolies and convergent sets for threshold-based cascades.
Theor. Comput. Sci., 468:37–49, January 2013.
David Kempe, Jon Kleinberg, and ´Eva Tardos.
Maximizing the spread of influence through a social network.
In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data
Mining, KDD ’03, pages 137–146, New York, NY, USA, 2003. ACM.
Elchanan Mossel and Sebastien Roch.
On the submodularity of influence in social networks.
In Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing, STOC ’07, pages
128–134, New York, NY, USA, 2007. ACM.
Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target

More Related Content

What's hot

ABC based on Wasserstein distances
ABC based on Wasserstein distancesABC based on Wasserstein distances
ABC based on Wasserstein distancesChristian Robert
 
CISEA 2019: ABC consistency and convergence
CISEA 2019: ABC consistency and convergenceCISEA 2019: ABC consistency and convergence
CISEA 2019: ABC consistency and convergenceChristian Robert
 
Testing Forest-Isomorphism in the Adjacency List Model
Testing Forest-Isomorphismin the Adjacency List ModelTesting Forest-Isomorphismin the Adjacency List Model
Testing Forest-Isomorphism in the Adjacency List Modelirrrrr
 
ABC convergence under well- and mis-specified models
ABC convergence under well- and mis-specified modelsABC convergence under well- and mis-specified models
ABC convergence under well- and mis-specified modelsChristian Robert
 
prior selection for mixture estimation
prior selection for mixture estimationprior selection for mixture estimation
prior selection for mixture estimationChristian Robert
 
(DL hacks輪読) Variational Inference with Rényi Divergence
(DL hacks輪読) Variational Inference with Rényi Divergence(DL hacks輪読) Variational Inference with Rényi Divergence
(DL hacks輪読) Variational Inference with Rényi DivergenceMasahiro Suzuki
 
Iterative procedure for uniform continuous mapping.
Iterative procedure for uniform continuous mapping.Iterative procedure for uniform continuous mapping.
Iterative procedure for uniform continuous mapping.Alexander Decker
 
(DL hacks輪読) Deep Kernel Learning
(DL hacks輪読) Deep Kernel Learning(DL hacks輪読) Deep Kernel Learning
(DL hacks輪読) Deep Kernel LearningMasahiro Suzuki
 
better together? statistical learning in models made of modules
better together? statistical learning in models made of modulesbetter together? statistical learning in models made of modules
better together? statistical learning in models made of modulesChristian Robert
 
Inference in generative models using the Wasserstein distance [[INI]
Inference in generative models using the Wasserstein distance [[INI]Inference in generative models using the Wasserstein distance [[INI]
Inference in generative models using the Wasserstein distance [[INI]Christian Robert
 
Variational Inference
Variational InferenceVariational Inference
Variational InferenceTushar Tank
 
accurate ABC Oliver Ratmann
accurate ABC Oliver Ratmannaccurate ABC Oliver Ratmann
accurate ABC Oliver Ratmannolli0601
 
Limit in Dual Space
Limit in Dual SpaceLimit in Dual Space
Limit in Dual SpaceQUESTJOURNAL
 
Bregman divergences from comparative convexity
Bregman divergences from comparative convexityBregman divergences from comparative convexity
Bregman divergences from comparative convexityFrank Nielsen
 
Error Estimates for Multi-Penalty Regularization under General Source Condition
Error Estimates for Multi-Penalty Regularization under General Source ConditionError Estimates for Multi-Penalty Regularization under General Source Condition
Error Estimates for Multi-Penalty Regularization under General Source Conditioncsandit
 
Refresher probabilities-statistics
Refresher probabilities-statisticsRefresher probabilities-statistics
Refresher probabilities-statisticsSteve Nouri
 

What's hot (20)

ABC based on Wasserstein distances
ABC based on Wasserstein distancesABC based on Wasserstein distances
ABC based on Wasserstein distances
 
CISEA 2019: ABC consistency and convergence
CISEA 2019: ABC consistency and convergenceCISEA 2019: ABC consistency and convergence
CISEA 2019: ABC consistency and convergence
 
Lecture26
Lecture26Lecture26
Lecture26
 
Testing Forest-Isomorphism in the Adjacency List Model
Testing Forest-Isomorphismin the Adjacency List ModelTesting Forest-Isomorphismin the Adjacency List Model
Testing Forest-Isomorphism in the Adjacency List Model
 
ABC convergence under well- and mis-specified models
ABC convergence under well- and mis-specified modelsABC convergence under well- and mis-specified models
ABC convergence under well- and mis-specified models
 
prior selection for mixture estimation
prior selection for mixture estimationprior selection for mixture estimation
prior selection for mixture estimation
 
(DL hacks輪読) Variational Inference with Rényi Divergence
(DL hacks輪読) Variational Inference with Rényi Divergence(DL hacks輪読) Variational Inference with Rényi Divergence
(DL hacks輪読) Variational Inference with Rényi Divergence
 
Iterative procedure for uniform continuous mapping.
Iterative procedure for uniform continuous mapping.Iterative procedure for uniform continuous mapping.
Iterative procedure for uniform continuous mapping.
 
(DL hacks輪読) Deep Kernel Learning
(DL hacks輪読) Deep Kernel Learning(DL hacks輪読) Deep Kernel Learning
(DL hacks輪読) Deep Kernel Learning
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Appli...
 Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Appli... Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Appli...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Appli...
 
Chapter 24 aoa
Chapter 24 aoaChapter 24 aoa
Chapter 24 aoa
 
better together? statistical learning in models made of modules
better together? statistical learning in models made of modulesbetter together? statistical learning in models made of modules
better together? statistical learning in models made of modules
 
Inference in generative models using the Wasserstein distance [[INI]
Inference in generative models using the Wasserstein distance [[INI]Inference in generative models using the Wasserstein distance [[INI]
Inference in generative models using the Wasserstein distance [[INI]
 
Variational Inference
Variational InferenceVariational Inference
Variational Inference
 
accurate ABC Oliver Ratmann
accurate ABC Oliver Ratmannaccurate ABC Oliver Ratmann
accurate ABC Oliver Ratmann
 
Limit in Dual Space
Limit in Dual SpaceLimit in Dual Space
Limit in Dual Space
 
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
Program on Quasi-Monte Carlo and High-Dimensional Sampling Methods for Applie...
 
Bregman divergences from comparative convexity
Bregman divergences from comparative convexityBregman divergences from comparative convexity
Bregman divergences from comparative convexity
 
Error Estimates for Multi-Penalty Regularization under General Source Condition
Error Estimates for Multi-Penalty Regularization under General Source ConditionError Estimates for Multi-Penalty Regularization under General Source Condition
Error Estimates for Multi-Penalty Regularization under General Source Condition
 
Refresher probabilities-statistics
Refresher probabilities-statisticsRefresher probabilities-statistics
Refresher probabilities-statistics
 

Similar to Paper Introduction: Combinatorial Model and Bounds for Target Set Selection

Secure Domination in graphs
Secure Domination in graphsSecure Domination in graphs
Secure Domination in graphsMahesh Gadhwal
 
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920Karl Rudeen
 
Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...
Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...
Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...Cristiano Longo
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...IOSRJECE
 
Applied Graph Theory Applications
Applied Graph Theory ApplicationsApplied Graph Theory Applications
Applied Graph Theory Applicationsvipin3195
 
Convergence of ABC methods
Convergence of ABC methodsConvergence of ABC methods
Convergence of ABC methodsChristian Robert
 
Curve fitting and Optimization
Curve fitting and OptimizationCurve fitting and Optimization
Curve fitting and OptimizationSyahrul Senin
 
sublabel accurate convex relaxation of vectorial multilabel energies
sublabel accurate convex relaxation of vectorial multilabel energiessublabel accurate convex relaxation of vectorial multilabel energies
sublabel accurate convex relaxation of vectorial multilabel energiesFujimoto Keisuke
 
Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...Sylvain Hallé
 
A Fast Near Optimal Vertex Cover Algorithm (NOVCA)
A Fast Near Optimal Vertex Cover Algorithm (NOVCA)A Fast Near Optimal Vertex Cover Algorithm (NOVCA)
A Fast Near Optimal Vertex Cover Algorithm (NOVCA)Waqas Tariq
 
H infinity optimal_approximation_for_cau
H infinity optimal_approximation_for_cauH infinity optimal_approximation_for_cau
H infinity optimal_approximation_for_cauAl Vc
 
Presentation of daa on approximation algorithm and vertex cover problem
Presentation of daa on approximation algorithm and vertex cover problem Presentation of daa on approximation algorithm and vertex cover problem
Presentation of daa on approximation algorithm and vertex cover problem sumit gyawali
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...mathsjournal
 
Estimating Future Initial Margin with Machine Learning
Estimating Future Initial Margin with Machine LearningEstimating Future Initial Margin with Machine Learning
Estimating Future Initial Margin with Machine LearningAndres Hernandez
 
Value Function Geometry and Gradient TD
Value Function Geometry and Gradient TDValue Function Geometry and Gradient TD
Value Function Geometry and Gradient TDAshwin Rao
 
Cs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer keyCs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer keyappasami
 
test pre
test pretest pre
test prefarazch
 

Similar to Paper Introduction: Combinatorial Model and Bounds for Target Set Selection (20)

Secure Domination in graphs
Secure Domination in graphsSecure Domination in graphs
Secure Domination in graphs
 
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
fb69b412-97cb-4e8d-8a28-574c09557d35-160618025920
 
Project Paper
Project PaperProject Paper
Project Paper
 
ABC-Gibbs
ABC-GibbsABC-Gibbs
ABC-Gibbs
 
Weighted graphs
Weighted graphsWeighted graphs
Weighted graphs
 
Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...
Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...
Herbrand-satisfiability of a Quantified Set-theoretical Fragment (Cantone, Lo...
 
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
Investigation on the Pattern Synthesis of Subarray Weights for Low EMI Applic...
 
Applied Graph Theory Applications
Applied Graph Theory ApplicationsApplied Graph Theory Applications
Applied Graph Theory Applications
 
Convergence of ABC methods
Convergence of ABC methodsConvergence of ABC methods
Convergence of ABC methods
 
Curve fitting and Optimization
Curve fitting and OptimizationCurve fitting and Optimization
Curve fitting and Optimization
 
sublabel accurate convex relaxation of vectorial multilabel energies
sublabel accurate convex relaxation of vectorial multilabel energiessublabel accurate convex relaxation of vectorial multilabel energies
sublabel accurate convex relaxation of vectorial multilabel energies
 
Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...Graph Methods for Generating Test Cases with Universal and Existential Constr...
Graph Methods for Generating Test Cases with Universal and Existential Constr...
 
A Fast Near Optimal Vertex Cover Algorithm (NOVCA)
A Fast Near Optimal Vertex Cover Algorithm (NOVCA)A Fast Near Optimal Vertex Cover Algorithm (NOVCA)
A Fast Near Optimal Vertex Cover Algorithm (NOVCA)
 
H infinity optimal_approximation_for_cau
H infinity optimal_approximation_for_cauH infinity optimal_approximation_for_cau
H infinity optimal_approximation_for_cau
 
Presentation of daa on approximation algorithm and vertex cover problem
Presentation of daa on approximation algorithm and vertex cover problem Presentation of daa on approximation algorithm and vertex cover problem
Presentation of daa on approximation algorithm and vertex cover problem
 
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
A Probabilistic Algorithm for Computation of Polynomial Greatest Common with ...
 
Estimating Future Initial Margin with Machine Learning
Estimating Future Initial Margin with Machine LearningEstimating Future Initial Margin with Machine Learning
Estimating Future Initial Margin with Machine Learning
 
Value Function Geometry and Gradient TD
Value Function Geometry and Gradient TDValue Function Geometry and Gradient TD
Value Function Geometry and Gradient TD
 
Cs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer keyCs6402 design and analysis of algorithms may june 2016 answer key
Cs6402 design and analysis of algorithms may june 2016 answer key
 
test pre
test pretest pre
test pre
 

More from Yu Liu

A TPC Benchmark of Hive LLAP and Comparison with Presto
A TPC Benchmark of Hive LLAP and Comparison with PrestoA TPC Benchmark of Hive LLAP and Comparison with Presto
A TPC Benchmark of Hive LLAP and Comparison with PrestoYu Liu
 
Cloud Era Transactional Processing -- Problems, Strategies and Solutions
Cloud Era Transactional Processing -- Problems, Strategies and SolutionsCloud Era Transactional Processing -- Problems, Strategies and Solutions
Cloud Era Transactional Processing -- Problems, Strategies and SolutionsYu Liu
 
Introduction to NTCIR 2016 MedNLPDoc
Introduction to NTCIR 2016 MedNLPDocIntroduction to NTCIR 2016 MedNLPDoc
Introduction to NTCIR 2016 MedNLPDocYu Liu
 
高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)
高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)
高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)Yu Liu
 
Survey on Parallel/Distributed Search Engines
Survey on Parallel/Distributed Search EnginesSurvey on Parallel/Distributed Search Engines
Survey on Parallel/Distributed Search EnginesYu Liu
 
Paper introduction to Combinatorial Optimization on Graphs of Bounded Treewidth
Paper introduction to Combinatorial Optimization on Graphs of Bounded TreewidthPaper introduction to Combinatorial Optimization on Graphs of Bounded Treewidth
Paper introduction to Combinatorial Optimization on Graphs of Bounded TreewidthYu Liu
 
An accumulative computation framework on MapReduce ppl2013
An accumulative computation framework on MapReduce ppl2013An accumulative computation framework on MapReduce ppl2013
An accumulative computation framework on MapReduce ppl2013Yu Liu
 
An Enhanced MapReduce Model (on BSP)
An Enhanced MapReduce Model (on BSP)An Enhanced MapReduce Model (on BSP)
An Enhanced MapReduce Model (on BSP)Yu Liu
 
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...Yu Liu
 
An Introduction of Recent Research on MapReduce (2011)
An Introduction of Recent Research on MapReduce (2011)An Introduction of Recent Research on MapReduce (2011)
An Introduction of Recent Research on MapReduce (2011)Yu Liu
 
A Generate-Test-Aggregate Parallel Programming Library on Spark
A Generate-Test-Aggregate Parallel Programming Library on SparkA Generate-Test-Aggregate Parallel Programming Library on Spark
A Generate-Test-Aggregate Parallel Programming Library on SparkYu Liu
 
Introduction of A Lightweight Stage-Programming Framework
Introduction of A Lightweight Stage-Programming FrameworkIntroduction of A Lightweight Stage-Programming Framework
Introduction of A Lightweight Stage-Programming FrameworkYu Liu
 
Start From A MapReduce Graph Pattern-recognize Algorithm
Start From A MapReduce Graph Pattern-recognize AlgorithmStart From A MapReduce Graph Pattern-recognize Algorithm
Start From A MapReduce Graph Pattern-recognize AlgorithmYu Liu
 
Introduction of the Design of A High-level Language over MapReduce -- The Pig...
Introduction of the Design of A High-level Language over MapReduce -- The Pig...Introduction of the Design of A High-level Language over MapReduce -- The Pig...
Introduction of the Design of A High-level Language over MapReduce -- The Pig...Yu Liu
 
On Extending MapReduce - Survey and Experiments
On Extending MapReduce - Survey and ExperimentsOn Extending MapReduce - Survey and Experiments
On Extending MapReduce - Survey and ExperimentsYu Liu
 
Tree representation in map reduce world
Tree representation  in map reduce worldTree representation  in map reduce world
Tree representation in map reduce worldYu Liu
 
Introduction to Ultra-succinct representation of ordered trees with applications
Introduction to Ultra-succinct representation of ordered trees with applicationsIntroduction to Ultra-succinct representation of ordered trees with applications
Introduction to Ultra-succinct representation of ordered trees with applicationsYu Liu
 
On Implementation of Neuron Network(Back-propagation)
On Implementation of Neuron Network(Back-propagation)On Implementation of Neuron Network(Back-propagation)
On Implementation of Neuron Network(Back-propagation)Yu Liu
 
ScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on Hadoop
ScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on HadoopScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on Hadoop
ScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on HadoopYu Liu
 
A Homomorphism-based MapReduce Framework for Systematic Parallel Programming
A Homomorphism-based MapReduce Framework for Systematic Parallel ProgrammingA Homomorphism-based MapReduce Framework for Systematic Parallel Programming
A Homomorphism-based MapReduce Framework for Systematic Parallel ProgrammingYu Liu
 

More from Yu Liu (20)

A TPC Benchmark of Hive LLAP and Comparison with Presto
A TPC Benchmark of Hive LLAP and Comparison with PrestoA TPC Benchmark of Hive LLAP and Comparison with Presto
A TPC Benchmark of Hive LLAP and Comparison with Presto
 
Cloud Era Transactional Processing -- Problems, Strategies and Solutions
Cloud Era Transactional Processing -- Problems, Strategies and SolutionsCloud Era Transactional Processing -- Problems, Strategies and Solutions
Cloud Era Transactional Processing -- Problems, Strategies and Solutions
 
Introduction to NTCIR 2016 MedNLPDoc
Introduction to NTCIR 2016 MedNLPDocIntroduction to NTCIR 2016 MedNLPDoc
Introduction to NTCIR 2016 MedNLPDoc
 
高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)
高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)
高性能データ処理プラットフォーム (Talk on July Tech Festa 2015)
 
Survey on Parallel/Distributed Search Engines
Survey on Parallel/Distributed Search EnginesSurvey on Parallel/Distributed Search Engines
Survey on Parallel/Distributed Search Engines
 
Paper introduction to Combinatorial Optimization on Graphs of Bounded Treewidth
Paper introduction to Combinatorial Optimization on Graphs of Bounded TreewidthPaper introduction to Combinatorial Optimization on Graphs of Bounded Treewidth
Paper introduction to Combinatorial Optimization on Graphs of Bounded Treewidth
 
An accumulative computation framework on MapReduce ppl2013
An accumulative computation framework on MapReduce ppl2013An accumulative computation framework on MapReduce ppl2013
An accumulative computation framework on MapReduce ppl2013
 
An Enhanced MapReduce Model (on BSP)
An Enhanced MapReduce Model (on BSP)An Enhanced MapReduce Model (on BSP)
An Enhanced MapReduce Model (on BSP)
 
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
A Homomorphism-based Framework for Systematic Parallel Programming with MapRe...
 
An Introduction of Recent Research on MapReduce (2011)
An Introduction of Recent Research on MapReduce (2011)An Introduction of Recent Research on MapReduce (2011)
An Introduction of Recent Research on MapReduce (2011)
 
A Generate-Test-Aggregate Parallel Programming Library on Spark
A Generate-Test-Aggregate Parallel Programming Library on SparkA Generate-Test-Aggregate Parallel Programming Library on Spark
A Generate-Test-Aggregate Parallel Programming Library on Spark
 
Introduction of A Lightweight Stage-Programming Framework
Introduction of A Lightweight Stage-Programming FrameworkIntroduction of A Lightweight Stage-Programming Framework
Introduction of A Lightweight Stage-Programming Framework
 
Start From A MapReduce Graph Pattern-recognize Algorithm
Start From A MapReduce Graph Pattern-recognize AlgorithmStart From A MapReduce Graph Pattern-recognize Algorithm
Start From A MapReduce Graph Pattern-recognize Algorithm
 
Introduction of the Design of A High-level Language over MapReduce -- The Pig...
Introduction of the Design of A High-level Language over MapReduce -- The Pig...Introduction of the Design of A High-level Language over MapReduce -- The Pig...
Introduction of the Design of A High-level Language over MapReduce -- The Pig...
 
On Extending MapReduce - Survey and Experiments
On Extending MapReduce - Survey and ExperimentsOn Extending MapReduce - Survey and Experiments
On Extending MapReduce - Survey and Experiments
 
Tree representation in map reduce world
Tree representation  in map reduce worldTree representation  in map reduce world
Tree representation in map reduce world
 
Introduction to Ultra-succinct representation of ordered trees with applications
Introduction to Ultra-succinct representation of ordered trees with applicationsIntroduction to Ultra-succinct representation of ordered trees with applications
Introduction to Ultra-succinct representation of ordered trees with applications
 
On Implementation of Neuron Network(Back-propagation)
On Implementation of Neuron Network(Back-propagation)On Implementation of Neuron Network(Back-propagation)
On Implementation of Neuron Network(Back-propagation)
 
ScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on Hadoop
ScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on HadoopScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on Hadoop
ScrewDriver Rebirth: Generate-Test-and-Aggregate Framework on Hadoop
 
A Homomorphism-based MapReduce Framework for Systematic Parallel Programming
A Homomorphism-based MapReduce Framework for Systematic Parallel ProgrammingA Homomorphism-based MapReduce Framework for Systematic Parallel Programming
A Homomorphism-based MapReduce Framework for Systematic Parallel Programming
 

Recently uploaded

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 

Recently uploaded (20)

The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 

Paper Introduction: Combinatorial Model and Bounds for Target Set Selection

  • 1. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Paper Introduction: Combinatorial Model and Bounds for Target Set Selection Yu Liu NII Weekly Seminar April 21, 2014 Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 2. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS About The Paper Eyal Ackerman, Oren Ben-Zwi, Guy Wolfovitz: Combinatorial model and bounds for target set selection. Theor. Comput. Sci. 411(44-46): 4017-4022 (2010). a combinatorial model for the dynamic activation process of influential networks; representing Perfect Target Set Selection Problem and its variants by linear integer programs; combinatorial lower and upper bounds on the size of the minimum Perfect Target Set Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 3. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS influential networks diffusion models/process Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 4. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Influential Network An influential network represents how the adoption of individuals’ decisions are influenced by recommendations from their friends. 1 2 3 4 5 Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 5. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Diffusion Models/Process under Threshold Model Let G = (V , E) be a digraph, S ⊆ V , t : V → N be a threshold function. Activation process is a chain of vertex subsets: Active[0] ⊂ Active[1] ⊂ Active[2] ⊂ . . . Active[z] ⊆ V . Where Active[0] = S, ∀i > 0, Active[i] = Active[i − 1] ∪ {u|t(u) ≤ |{v ∈ Active[i − 1]|(v, u) ∈ E}|} Active[S] =: Active[z], means S can activate set Active[z] Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 6. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Diffusion Models/Process under Threshold Model suppose θ1 = 2, θ2 = 1, θ3 = 1, θ4 = 1, θ5 = 3 1 2 3 4 5 Active[0] = {1}, Active[1] = {1, 2, 3}, Active[2] = {1, 2, 3, 4}, Active[3] = {1, 2, 3, 4, 5} this paper only discuss monotone activation process Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 7. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Target Set Selection Problem input: two integers k, l and a digraph G = (V , E) with thresholds t : V → N. output: a set S ⊆ V , such that |S| ≤ k, |Active[S]| ≥ l. When l = |V | and t(v) = deg(v) it reduces to Vertex Cover problem. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 8. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Minimum Target Set input: an integers l and a digraph G = (V , E) with thresholds t : V → N. output: a smallest set S ⊆ V , such that |Active[S]| ≥ l. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 9. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Maximum Active Set input: an integers k and a digraph G = (V , E) with thresholds t : V → N. output: a set S ⊆ V and |S| = k , such that ∀S ⊆ V and S = S, |Active[S]| ≥ |Active[S ]|. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 10. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Inapproximability of TSS Target Set Selection problem is NP-hard, and hard to approximate. NP-hard to approximate within a factor of n1− , for any constant > 0 [KKT03]. For the special case where the thresholds are taken uniformly at random, a constant-factor approximation algorithm exists[MR07]. No O(2log1− |V |)-approximation algorithm exists, for any constant > 0, even when all thresholds are set to 2 and the graph is of constant degree [Che08]. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 11. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Some Terminologies A target set is called perfect if it activates the entire graph. majority threshold : ∀v ∈ V , t(v) ≥ deg(v)/2 strict majority threshold : ∀v ∈ V , t(v) > deg(v)/2 irreversible dynamic monopoly (dynamo) usually refers to a perfect target set under majority or strict majority thresholds G[A] means a subgraph of G induced by a vertex set A Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 12. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Main Results 1 bounds on the size of the minimum perfect target set: the size of the minimum perfect target set is at most 2|V |/3 under strict majority thresholds, for both directed and undirected graphs an upper bound of |V |/2 on the size of the minimum perfect target set under majority thresholds, both for directed and undirected graphs. 2 a trivial constant factor approximation exists if ∆(G)/δ(G) is bounded (∆(G) and δ(G) are the maximum and minimum degrees in G,respectively) Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 13. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Combinatorial Target Set Selection Combinatorial Target Set Selection input: two integers k, l and a digraph G = (V , E) with thresholds t : V → N. output: a set S ⊆ V , such that |S| ≤ k and there is a set A ⊆ V such that S ⊆ A, |A| ≥ l, and one can remove edges such that G[A] is acyclic and degin(v) ≥ t(v) for every vertex v ∈ A S. S is a solution of Target Set Selection iff it is a solution of Combinatorial Target Set Selection. under this model, we can represent the optimization problems as integer linear programs (IP) Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 14. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS IP for Minimum Target Set The number of variables is Θ(n2) and the number of constraints is Θ(n3). Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 15. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS IP for Maximum Target Set The number of variables is Θ(n2) and the number of constraints is Θ(n3). Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 16. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Combinatorial Bounds for Strict Majority Thresholds For a digraph G(V , E), ∀v ∈ V degin(v) > 0, there is an algorithm which finds in polynomial time a target set of size at most 2n/3 Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 17. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Combinatorial Bounds for Majority Thresholds For a digraph G(V , E), ∀v ∈ V degin(v) > 0, there is an algorithm which finds in polynomial time a target set of size at most n/2 Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 18. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Proof Suppose A is activated by some S, then S can be found as follows: π is a random permutation of the vertices in A; remove edges in G[A] that violate the order of vertices, i.e., (u, v), such that π(u) > π(v); then ∀v ∈ A, v ∈ S or degin(v) ≥ t(v). Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 19. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Proof The expected number of vertices in S is: E[|S|] = v∈A t(v) degin(v) + 1 (1) (1) gives an upper bound on the size of S. for the Minimum Perfect Target Set Problem, A = V . Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 20. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Proof E[|S|] = v∈A t(v) degin(v) + 1 (1) when t(v) = degin(v)+1 2 , t(v) degin(v)+1 ≥ 2/3, when t(v) = degin(v) 2 , t(v) degin(v)+1 ≥ 1/2 Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 21. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS More-than-majority thresholds For undirected graph, if ∀v ∈ V , t(v) ≥ deg(v)/2 + 1, then the minimum perfect target set is at least |V |/T, where T = maxv∈V t(v). finds a perfect target set of size at most 2|V |/3 is a 2T/3-approximation. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 22. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Proof Let undirected G=(V,E), z be the smallest integer such that Active[z] = V . For every i, 0 ≤ i ≤ z, define a potential function Φ(i) = v /∈Active[i] t(v) + |E[Active[i]]|, where E[U] denotes the set of edges in E induced by set U. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 23. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Proof Φ(i) = v /∈Active[i] t(v) + |E[Active[i]]| Note that Φ(i + 1) ≥ Φ(i) and Φ(z) = |E|, so that Φ(0) ≤ |E|. Together with Φ(i) ≥ v /∈Active[i] t(v) ⇒ v /∈S t(v) ≤ |E| Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 24. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Proof Finally we have: |E| + |V | v∈V deg(v) 2 + 1 v∈V t(v) v /∈S t(v) + v∈S t(v) |E| + v∈S t(v) Thus, |V | ≤ v∈S t(v) . Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 25. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Extention for More General Settings When t(v) = θ ∗ deg(v) , for a constant θ ∈ (1/2, 1], a lower bound on |S|: |V |δ(G)(2θ − 1) ∆(G) + δ(G)(2θ − 1) an approximation ratio: θ(∆(G) + δ(G)(2θ − 1)) δ(G)(2θ − 1) = O( ∆(G) δ(G) ) Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 26. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Summary Simper proof of inapproximability results that same as [Che08], for TSS Integer linear programs for TSS Tighter upper bound for majority / strict majority thresholds 2|V |/3 compared with 0.727|V | (digraphs) and 0.7732|V |(undirected graphs) in [CL13], for strict majority thresholds Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target
  • 27. Preliminaries A Combinatorial Model for TSS Combinatorial Bounds for Perfect TSS Bibliography Ning Chen. On the approximability of influence in social networks. In Proceedings of the Nineteenth Annual ACM-SIAM Symposium on Discrete Algorithms, SODA ’08, pages 1029–1037, Philadelphia, PA, USA, 2008. Society for Industrial and Applied Mathematics. Ching-Lueh Chang and Yuh-Dauh Lyuu. Bounding the sizes of dynamic monopolies and convergent sets for threshold-based cascades. Theor. Comput. Sci., 468:37–49, January 2013. David Kempe, Jon Kleinberg, and ´Eva Tardos. Maximizing the spread of influence through a social network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’03, pages 137–146, New York, NY, USA, 2003. ACM. Elchanan Mossel and Sebastien Roch. On the submodularity of influence in social networks. In Proceedings of the Thirty-ninth Annual ACM Symposium on Theory of Computing, STOC ’07, pages 128–134, New York, NY, USA, 2007. ACM. Yu Liu Paper Introduction: Combinatorial Model and Bounds for Target