Organizing an Influential Social Event Under a Budget Constraint

被引:2
|
作者
Han, Kai [1 ]
He, Yuntian [1 ]
Xiao, Xiaokui [2 ]
Tang, Shaojie [3 ]
Gui, Fei [1 ]
Xu, Chaoting [1 ]
Luo, Jun [4 ]
机构
[1] Univ Sci & Technol China, Sch Comp Sci & Technol, Suzhou Inst Adv Study, Hefei 230000, Anhui, Peoples R China
[2] Natl Univ Singapore, Sch Comp, Singapore 119077, Singapore
[3] Univ Texas Dallas, Naveen Jindal Sch Management, Richardson, TX 75080 USA
[4] Nanyang Technol Univ, Sch Comp Sci & Engn, Singapore 639798, Singapore
关键词
Approximation algorithms; Organizations; Social network services; Time complexity; Optimization; Electronic mail; Integrated circuit modeling; Event-based social networks; influence; event organization; ALGORITHM;
D O I
10.1109/TKDE.2018.2875914
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Recently, the proliferation of event-based social services has made it possible for organizing personalized offline events through the users' information shared online. In this paper, we study the budget-constrained influential social event organization problem, where the goal is to select a group of influential users with required features to organize a social event under a budget $B$B. We show that our problem is NP-hard and can be formulated as a submodular maximization problem with mixed packing and covering constraints. We then propose several polynomial time algorithms for our problem with provable approximation ratios, which adopt a novel "surrogate optimization" approach and the method of reverse-reachable set sampling. Moreover, we also consider the case where the influence spread function is unknown and can be arbitrarily selected from a set of candidate submodular functions, and extend our algorithms to address a "robust influential event organization" problem under this case. Finally, we conduct extensive experiments using real social networks to test the performance of our algorithms, and the experimental results demonstrate that our algorithms significantly outperform the prior studies both on the running time and on the influence spread.
引用
收藏
页码:2379 / 2392
页数:14
相关论文
共 50 条
  • [41] Team formation with influence maximization for influential event organization on social networks
    Cheng-Te Li
    Mei-Yuan Huang
    Rui Yan
    World Wide Web, 2018, 21 : 939 - 959
  • [42] Event Detection and Identification of Influential Spreaders in Social Media Data Streams
    Shi, Leilei
    Wu, Yan
    Liu, Lu
    Sun, Xiang
    Jiang, Liang
    BIG DATA MINING AND ANALYTICS, 2018, 1 (01): : 34 - 46
  • [43] Team formation with influence maximization for influential event organization on social networks
    Li, Cheng-Te
    Huang, Mei-Yuan
    Yan, Rui
    WORLD WIDE WEB-INTERNET AND WEB INFORMATION SYSTEMS, 2018, 21 (04): : 939 - 959
  • [44] THE SOFT BUDGET CONSTRAINT
    KORNAI, J
    KYKLOS, 1986, 39 (01) : 3 - 30
  • [45] Minimizing the Spread of Misinformation on Online Social Networks with Time and Budget Constraint
    Vu, Manh M.
    Hoang, Huan X.
    2017 9TH INTERNATIONAL CONFERENCE ON KNOWLEDGE AND SYSTEMS ENGINEERING (KSE 2017), 2017, : 160 - 165
  • [46] The world budget constraint
    Lianos T.P.
    Environment, Development and Sustainability, 2013, 15 (6) : 1543 - 1553
  • [47] GOVERNMENT BUDGET CONSTRAINT
    FRAZER, WJ
    PUBLIC FINANCE QUARTERLY, 1978, 6 (03): : 381 - 387
  • [48] Catching Social Butterflies: Identifying Influential Users of an Event-Based Social Networking Service
    Popa, Jonathan
    Nezafati, Kusha
    Gel, Yulia R.
    Zweck, John
    Bobashev, Georgiy
    2016 IEEE INTERNATIONAL CONGRESS ON BIG DATA - BIGDATA CONGRESS 2016, 2016, : 198 - 205
  • [49] CrowdTasker: Maximizing Coverage Quality in Piggyback Crowdsensing under Budget Constraint
    Xiong, Haoyi
    Zhang, Daqing
    Chen, Guanling
    Wang, Leye
    Gauthier, Vincent
    2015 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS (PERCOM), 2015, : 55 - 62
  • [50] Portfolio balancing and risk adjusted values under constraint budget conditions
    E&P Technology Div, Houston, United States
    Energy Explor Exploit, 2 (197-224):