PPT-Greedy & Heuristic algorithms in Influence Maximization

Author : tatiana-dople | Published Date : 2018-02-10

Jingtao Zhu May 13rd2016 Efficient Influence Maximization in Social Networks Written by Chen Wei Yajun Wang and Siyu Yang Proceedings of the 15th ACM SIGKDD

Presentation Embed Code

Download Presentation

Download Presentation The PPT/PDF document "Greedy & Heuristic algorithms in Inf..." is the property of its rightful owner. Permission is granted to download and print the materials on this website for personal, non-commercial use only, and to display it on your personal computer provided you do not modify the materials and that you retain all copyright notices contained in the materials. By downloading content from our website, you accept the terms of this agreement.

Greedy & Heuristic algorithms in Influence Maximization: Transcript


Jingtao Zhu May 13rd2016 Efficient Influence Maximization in Social Networks Written by Chen Wei Yajun Wang and Siyu Yang Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. Carmine . Cerrone. , . Raffaele. . Cerulli. , Bruce Golden. GO IX. Sirmione. , Italy. July 2014. 1. Outline. Motivation. The Minimum Label Spanning Tree (MLST) problem. Experimental justification. Introduction to Carousel . Bart Jansen, University of Utrecht. Problem background. Geometrical problem statement. Research. Experimental evaluation of heuristics. Heuristics. Results. Conclusion. Outline. 2. Several types of analysis require accessibility . A Mini-Survey. Chandra . Chekuri. Univ. of Illinois, Urbana-Champaign. Submodular Set Functions. A function . f. : 2. N. . . . R . is submodular if. . f(A. ) + . f(B. ) ≥ . f(A. . B. ) + . Optimization problems, Greedy Algorithms, Optimal Substructure and Greedy choice. Learning & Development Team. http://academy.telerik.com. . Telerik Software Academy. Table of Contents. Optimization Problems. to . Greedy Routing Algorithms . in Ad-Hoc Networks. ○. Truong . Minh . Tien. Joint work with. Jinhee. . Chun, . Akiyoshi. . Shioura. , . and Takeshi . Tokuyama. Tohoku University. Japan. Our . Problem. Hamed Pirsiavash, Deva . Ramanan. , . Charless. . Fowlkes. Department of Computer Science, UC Irvine. 2. Estimate number of tracks and their extent. Do not initialize manually. Estimate birth and death of each track. Initialize. . the . frontier . using the . starting state. While the frontier is not empty. Choose a frontier node to expand according to . search strategy . and take it off the frontier. If the node contains the . A Mini-Survey. Chandra . Chekuri. Univ. of Illinois, Urbana-Champaign. Submodular Set Functions. A function . f. : 2. N. . . . R . is submodular if. . f(A. ) + . f(B. ) ≥ . f(A. . B. ) + . The two key components. Optimal Sub-structure. You solve the problem by solving a sub-problem optimally. Greedy Property. Using the choice that seems best at the moment leads to the optimal result. This is tougher to show!. . the . frontier . using the . starting state. While the frontier is not empty. Choose a frontier node to expand according to . search strategy . and take it off the frontier. If the node contains the . . the . frontier . using the . starting state. While the frontier is not empty. Choose a frontier node to expand according to . search strategy . and take it off the frontier. If the node contains the . Continued. Before We Start. HW1 extended to Monday. Submit online (now working) and bring paper print out. Questions?. Competency Demo next Wednesday. Study Guide Posted. We will have some discussion time on Monday. Fall 20151 Week . 7. CSCI-141. Scott C. Johnson. Say we go to the bank to cash our paycheck. We ask the teller for the fewest bills and coins as possible. Moments later the teller gives us our money and we leave. often, something learned experientially and recalled when needed. Heuristic Function - function applied to a state in a search space to indicate a likelihood of success if that state is selected. heuristic search methods are known as “weak methods” because of their generality and because they do not apply a great deal of knowledge .

Download Document

Here is the link to download the presentation.
"Greedy & Heuristic algorithms in Influence Maximization"The content belongs to its owner. You may download and print it for personal use, without modification, and keep all copyright notices. By downloading, you agree to these terms.

Related Documents