16
Whom to follow: Efficient followee selection for cascading outbreak detection on online social networks Junzhou Zhao a,, John C.S. Lui b , Don Towsley c , Xiaohong Guan a a MOEKLINNS Lab, Xi’an Jiaotong University, China b Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kong c School of Computer Science, University of Massachusetts at Amherst, United States article info Article history: Received 30 November 2013 Received in revised form 8 July 2014 Accepted 11 August 2014 Available online 5 October 2014 Keywords: Follow model Followee selection Outbreak detection Submodularity abstract Online social networks (OSNs), such as Twitter and Sina Weibo, have become important platforms for generating and spreading information on the Internet. On these OSNs, the ‘‘follow model’’ has become a popular way to discover information; i.e., a user subscribes to content generated by others by following them as information sources. The content producers are called followees. Due to human beings’ limited attention capacity and the constraints imposed by OSNs, a user can only follow a few followees. The question then arises: which subset of followees shall we follow so that we can discover the most infor- mation in an OSN in a timely fashion? To solve this problem, we present a randomized method that does not require complete OSN data and is well suited for third parties who do not own OSN data. Our method is based on the birthday paradox and is mathematically tractable for analysing its solution quality and computational efficiency. Moreover, we find that the power-law structure of real-world OSNs can further improve the solution quality of our method. Experiments conducted on two real datasets demonstrate that our method can create a good trade-off between solution quality and computational efficiency. Ó 2014 Elsevier B.V. All rights reserved. 1. Introduction As platforms for communicating with friends, updating status and sharing information, online social networks (OSNs), such as Twitter and Sina Weibo, have become extremely popular. These platforms provide users with near-real-time services that can be accessed across multiple devices at any Internet-enabled venue. Due to their large user bases and ubiquitous services, microblogs, where users act as sensors reporting events happening around them, become essential news sources, i.e., the so-called social media [1,2]. In fact, social media have attracted surveillance from conventional media outlets to discover breaking news and from governments to detect signals of riots. For example, the death of Osama bin Laden was first reported on Twitter rather than traditional news media [3], and, during the period of England riots, people used social media to organize [4]. The emergence of social media has changed the way we discover information. Traditional ways, such as information retrieval, rely on user-specified queries (e.g., keywords) to retrieve the information from indexed data [5–7]. However, specifying explicit queries might be difficult, as keywords for time-evolving and emerging information are highly dynamic [8] and unpredictable (e.g., the death of bin Laden [3]). In recent years, the follow model [9] has become a convenient way to discover information. A microblog user, say, Alice, obtains information mainly from her timeline, which comprises tweets generated by http://dx.doi.org/10.1016/j.comnet.2014.08.024 1389-1286/Ó 2014 Elsevier B.V. All rights reserved. Corresponding author. Tel.: +86 29 8266 3330; fax: +86 29 8266 4603. E-mail address: [email protected] (J. Zhao). Computer Networks 75 (2014) 544–559 Contents lists available at ScienceDirect Computer Networks journal homepage: www.elsevier.com/locate/comnet

Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

Whom to follow: Efficient followee selection for cascadingoutbreak detection on online social networks

Junzhou Zhao a,⇑, John C.S. Lui b, Don Towsley c, Xiaohong Guan a

a MOEKLINNS Lab, Xi’an Jiaotong University, Chinab Department of Computer Science and Engineering, The Chinese University of Hong Kong, Hong Kongc School of Computer Science, University of Massachusetts at Amherst, United States

a r t i c l e i n f o

Article history:Received 30 November 2013Received in revised form 8 July 2014Accepted 11 August 2014Available online 5 October 2014

Keywords:Follow modelFollowee selectionOutbreak detectionSubmodularity

a b s t r a c t

Online social networks (OSNs), such as Twitter and Sina Weibo, have become importantplatforms for generating and spreading information on the Internet. On these OSNs, the‘‘follow model’’ has become a popular way to discover information; i.e., a user subscribesto content generated by others by following them as information sources. The contentproducers are called followees. Due to human beings’ limited attention capacity and theconstraints imposed by OSNs, a user can only follow a few followees. The question thenarises: which subset of followees shall we follow so that we can discover the most infor-mation in an OSN in a timely fashion? To solve this problem, we present a randomizedmethod that does not require complete OSN data and is well suited for third parties whodo not own OSN data. Our method is based on the birthday paradox and is mathematicallytractable for analysing its solution quality and computational efficiency. Moreover, we findthat the power-law structure of real-world OSNs can further improve the solution qualityof our method. Experiments conducted on two real datasets demonstrate that our methodcan create a good trade-off between solution quality and computational efficiency.

! 2014 Elsevier B.V. All rights reserved.

1. Introduction

As platforms for communicating with friends, updatingstatus and sharing information, online social networks(OSNs), such as Twitter and Sina Weibo, have becomeextremely popular. These platforms provide users withnear-real-time services that can be accessed acrossmultiple devices at any Internet-enabled venue. Due totheir large user bases and ubiquitous services, microblogs,where users act as sensors reporting events happeningaround them, become essential news sources, i.e., theso-called social media [1,2]. In fact, social media haveattracted surveillance from conventional media outlets to

discover breaking news and from governments to detectsignals of riots. For example, the death of Osama bin Ladenwas first reported on Twitter rather than traditional newsmedia [3], and, during the period of England riots, peopleused social media to organize [4].

The emergence of social media has changed the way wediscover information. Traditional ways, such as informationretrieval, rely on user-specified queries (e.g., keywords) toretrieve the information from indexed data [5–7].However, specifying explicit queries might be difficult, askeywords for time-evolving and emerging informationare highly dynamic [8] and unpredictable (e.g., the deathof bin Laden [3]). In recent years, the follow model [9]has become a convenient way to discover information. Amicroblog user, say, Alice, obtains information mainlyfrom her timeline, which comprises tweets generated by

http://dx.doi.org/10.1016/j.comnet.2014.08.0241389-1286/! 2014 Elsevier B.V. All rights reserved.

⇑ Corresponding author. Tel.: +86 29 8266 3330; fax: +86 29 8266 4603.E-mail address: [email protected] (J. Zhao).

Computer Networks 75 (2014) 544–559

Contents lists available at ScienceDirect

Computer Networks

journal homepage: www.elsevier .com/locate /comnet

Page 2: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

users she follows, called her followees1 in the follow model.Once a new tweet is posted by a user, it spreads to the user’sfollowers and their followers iteratively, depending onwhether users retweet the message. Finally, the tweetappears in Alice’s timeline with a certain probability and timedelay. Such probability and time delay mainly depend onwhich subset of followees Alice chooses to follow. Bychoosing different followees as her information sources,Alice can discover varied information with different timedelay from the aggregated tweets in her timeline.

In the current information era, common goals thatpeople want to achieve are to discover as much informa-tion as possible, i.e., maximize information coverage, andto obtain the information as soon as possible, i.e., minimizetime delay. To achieve this, it seems that if Alice can followall microblog users, then she will discover all informationwith zero time delay. However, due to human beings’ lim-ited attention capacity [11] and the constraints imposed byOSNs (e.g., a user on Twitter and Sina Weibo can follow atmost 2000 users, in general [12,13]), Alice can only follow afew followees (or budgeted followees). Consequently, aproblem arises: how to optimally choose these budgetedfollowees as information sources to maximize informationcoverage and minimize time delay?

The above problem is challenging. Selecting a subset ofitems from a population to maximize some specified utilityfunction is a classical combinational optimization problemthat has been studied for decades, e.g., the set cover prob-lem [14], knapsack problem [15], influence maximizationproblem [16,17], and sensor placement problem [18,19].These problems have been proven to be NP-hard, and wecan only obtain suboptimal solutions using approximatealgorithms. However, as we will see in Section 3, thesealgorithms cannot be applied to our problem and they donot scale to handle modern large-scale OSNs which havehundreds of millions of users.

Another challenge we face is that we are constrainedto solving the problem from the perspective of a thirdparty. A third party does not own OSN data. OSN compa-nies own users’ data, but there is a lack of cooperationfrom OSN companies due to user privacy and businesssecrecy concerns. Thus, third parties can only use thepublic APIs to crawl the data. However, OSN companiesusually impose barriers to limit large-scale crawling bythird parties [20] and restrict the request rate of APIs.For example, Twitter and Sina Weibo allow a user to issueat most 350 and 150 requests per hour, respectively[21,22]. As a result, it is practically impossible for thirdparties to crawl the complete data, and one has toconsider the query cost (i.e., the number of API calls)while achieving the goal of selecting budgeted followees.We would like to note that most of the existing works[18,19,23] have ignored this second challenge andassumed that the complete data are available in advance.This assumption limits the practical application of exist-ing methods, and the goal of this work is to fill thisresearch gap.

In this work, we present a framework to select a subsetof users as followees to maximize the information cover-age and minimize the time delay from incomplete dataobtained via graph sampling methods. Our method guar-antees both solution quality and computational efficiency(under the worst-case situation) that enable it to be usedin large-scale OSNs. (Note that the proposed approach doesnot replace but instead supplements existing methods, andwe elaborate on this point in Section 8). The basic ideabehind our method is based upon the birthday paradox,which states that with more than 50% chance, there willbe a birthday match among a handful of 23 people, and,for merely 70 people, the chance of matching increasesto 99.9%. In our scenario, the randomized greedy algo-rithm, which is the main component of our framework,chooses one user in each iteration from a set of user sam-ples, which is substantially smaller than the population,and the user samples contain at least one optimal followeewith high probability according to the birthday paradox.Due to the significant reduction of search space, weachieve a major speedup in obtaining the solution. Thequality of the final solution can be proven to be lowerbounded when user samples are chosen uniformly atrandom in each iteration, which actually is the worst-casesituation because we do not use any strategy in sampling(see Section 5).

Moreover, we find that if we bias user samples towardhigh degree nodes (i.e., users) in the network using graphsampling methods such as random walk [24], we needfewer user samples than when using uniform sampling,thereby improving efficiency. We present an in-depthanalysis in Section 6 and reveal another important finding.For power-law networks, information cascades are not uni-formly dispersed among nodes, but rather, high degreenodes are more likely to be infected by an information dif-fusion process than low degree nodes. Therefore, if thesampling is biased toward high degree nodes, we achievea higher probability of detecting information cascades. Thisis related to the generalized birthday paradox, i.e., whenpeople’s birthdates are not uniformly distributed, theprobability of matching increases [25]. Our numericalsolutions in Section 6 and experiments in Section 7 bothdemonstrate the finding.

The rest of the paper is structured as follows. We reviewthe related literature in Section 2 and formulate the prob-lem in Section 3. Then, we motivate a randomized methodthrough empirical observations in Section 4. The detailedanalysis of our method is given in Section 5. In Section 6,we study how the power-law structure of real-worldnetworks can benefit this method. We conductexperiments on real datasets to validate the method inSection 7 and conclude in Section 8.

2. Related work

Both Twitter and Sina Weibo provide the ‘‘whom-to-follow’’ services to recommend ‘‘interesting persons’’ to users[26]. This function is related to a large body of research onlink prediction [27]. However, algorithms in link predictionare mainly based on common friends, shared interests, and

1 The Oxford dictionary defines a followee as a person who is beingtracked on a social media website or application [10].

J. Zhao et al. / Computer Networks 75 (2014) 544–559 545

Page 3: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

other factors [28–30], which are not directly related to ourgoal.

Optimal sensing [19,31] is the problem of selecting asubset of informative observations or sensors from adomain to maximize some utility for environment moni-toring [31,32] or event detection [18]. For OSNs like Twit-ter and Sina Weibo, their ubiquitous services enable usersto report events happening around them at any Internet-enabled venue at any time by tweeting. Because OSN users’behaviours are exactly like physical sensors reporting mea-surements of environments, they can be considered associal sensors [2]. Therefore, our followee selection prob-lem is related to this research area. Leskovec et al. [18]studied the optimal sensing problem for city water moni-toring (i.e., select a few locations to install sensors in orderto detect water pollutions) and blog selection (i.e., select asubset of blogs to read to catch the most stories). They pro-posed the Cost-Effective Lazy Forward (CELF) approach tofind the approximate solution. CELF is similar to the Accel-erated Greedy (AG) approach posed by Minoux [33], whichexploits the submodularity of utility functions. It is impor-tant to note the fundamental contrast between our settingand theirs: their methods are designed based on the neces-sity of complete data, which is impractical for third partieson contemporary large-scale OSNs, and their methods donot guarantee computational efficiency, which we willanalyse in detail in Section 3.

Recently, several empirical studies have leveraged thefriendship paradox to select users for the purpose of pre-dicting contagious outbreaks in a university [34], a city[35], and detecting events on Twitter [36]. In this method,a user set is returned by repeatedly selecting a randomfriend of a randomly sampled user, and friendship paradox[37,38] guarantees selected users to have high degrees onaverage. Intuitively, high degree nodes in a network areeasier to be infected by contagions than low degree nodesbecause of higher contact rate. That is why this approachworks. However, this approach only uses topology infor-mation of a network and does not use contagion data onthe network. For example, in Twitter, besides connectionsamong users, we also know from history data which userretweeted which tweet at what time, and such informationcan be used to obtain better solutions. In addition, theseempirical studies lack an analysis of bounding their solu-tion quality with respect to the optimal solution. We fillthis gap via a randomized method that is mathematicallytractable to analyse.

It is also worth noting that our randomized method ismotivated by an optimization method called ordinal opti-mization (OO) [39], which has been widely applied in theoptimization of discrete event dynamic systems [40],power systems [41], and other areas [42]. OO considersthe problem of searching for an optimal strategy in a verylarge strategy space (which is similar to our setting in deal-ing with a large-scale OSN). Other than finding an optimalstrategy, OO defines a ‘‘good enough’’ subset which con-tains acceptable good strategies, and softens the goal tofind one strategy in this good enough set. Often, a littlesoftening of the goal, a major speedup in search can beachieved. We were inspired by this goal softening idea

and have designed a randomized method, which can tradeoff between solution quality and computational efficiency.

3. Problem definition

In this section, we first introduce some terminology andnotations (a notation table can be found in Appendix A).Then, we formulate the problem and analyse variousstate-of-the-art methods. Finally, we introduce two real-world datasets as our ground-truth data.

3.1. Terminology and notations

We model an OSN by a graph, GðV ; E;CÞ, with jV j ¼ nnodes and jEj ¼ m edges. Each node represents a user,and each edge represents a relation between twousers. We assume G is undirected for ease of presentingour idea.

Here, C denotes a set of information cascades on thenetwork. Information cascades (or cascades for short) arephenomena in which actions or ideas become widelyadopted by people due to the influence of others (typically,people are influenced by their neighbours in the network)[43]. For example, if a tweet is retweeted by many Twitterusers or many users tweet the same hashtag, then we say itforms a cascade because many people have adopted thesame action. If Alice also retweets the tweet or tweetsthe same hashtag, we say that Alice has joined the cascade.Here, we simplify a cascade c 2 C by a vector of user jointimes, ½tuc%u2V , where tuc denotes the time that user u joinedc, and tuc ¼1 if u never joins c. The start time of cascade cis the earliest join time, denoted by tc , i.e., tc ¼minu2V tuc .Then, the time delay for user u to join c is tuc & tc . In ourprevious example, if Alice follows u, then she can obtainc from her timeline with time delay tuc & tc . Hence, differ-ent followees will experience different time delays for dis-covering cascades. Furthermore, we define the size of acascade as the number of unique users that join it, i.e.,sizeðcÞ ¼ jfu : tuc <1^ u 2 Vgj, and it will be used to indi-cate the importance of c. In other words, the larger the sizeof a cascade is, the more important it is among all cascades.

3.2. Followee selection for cascading outbreak detection

Having defined the terminology, our problem becomeswhich subset of users Alice should follow so that she canobtain as many important cascades as possible in her time-line, and with time delays as small as possible. In otherwords, if Alice chooses the right followees, she can discoverthe majority of important cascades with small averagetime delay in her timeline. We call this problem the cas-cading outbreak detection problem, and formally define itas follows.

Definition 1 (Cascading outbreak detection problem). Finda subset S of V containing at most B nodes to maximize aprespecified reward function FðSÞ without the completeknowledge of G. Here, B < n is a given budget, andF : 2V # RP0 is a non-decreasing submodular function,such that FðSÞP 0;8S # V and Fð;Þ ¼ 0.

546 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 4: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

If a set function F satisfies FðSÞ þ FðTÞP FðS [ TÞþFðS \ TÞ for all S; T # V , then F is submodular [44]. The sub-modular objective function captures the notion of a utilityfunction with diminishing returns, and it arises naturallyin many applications [14,17–19]. As an example (onewhich is used in our experiments), we consider

FðSÞ ¼X

c2CðSÞ

sizeðcÞ1þminu2Sftuc & tcg

; ð1Þ

where CðSÞ denotes the set of cascades joined by users in S.FðSÞ yields large values when users in S join many impor-tant cascades with small time delay. It is easy to verify thatEq. (1) meets all of the conditions in Definition 1.

The above definition contains a major difference fromthose in existing works [18,19]; i.e., here, we do not havethe complete knowledge of G, neither topology norcascades. In practice, we are only allowed to explore G byquerying each user by account ID one at a time throughthe OSN APIs, e.g., SELECT ⁄ FROM USERS WHERE UID = ID,equivalently.2 When a user u is queried, the cascades he hasjoined and his neighbours are returned simultaneously. Weassume a query incurs one unit query cost. Therefore, exist-ing works [18,19] actually implicitly assume that we havecollected the complete data (by traversing thewhole account ID space). As a result, their methods areoften unfeasible and suffer from drastically expensive querycosts.

3.3. Submodularity and greedy algorithm (GA)

Even when the complete data are available, maximizinga submodular function is proven to be NP-complete[44,14]. The non-decreasing submodular property of Fallows us to use a greedy algorithm (GA) to obtain anapproximate solution that is at least 1& 1=e ( 63% of theoptimal solution [44]. GA is well studied and it can be sta-ted as follows. It runs for at most B rounds to obtain a set Sof size jSj 6 B. In each round, it selects a node s 2 V n S thatmaximizes the reward gain, dsðSÞ , FðS [ fsgÞ & FðSÞ, andinserts s into S in this round. This process repeats for atmost B rounds until jSj ¼ B or dsðSÞ ¼ 0.3 The computationalcomplexity of this algorithm is OðnBÞ. However, for a verylarge population n, even GA is still inefficient.

To improve its efficiency, Minoux [33] proposed theAccelerated Greedy (AG) approach to reduce the calcula-tions of dsðSÞ in each round by further utilizing the sub-modularity of F (also called the Cost-Effective LazyForward approach, or CELF, in [18]). The basic idea is thatthe reward gain of a node in the current round cannot behigher than its gain in previous rounds, i.e., if k > l, thendsðSkÞ 6 dsðSlÞ; 8s 2 V n Sk (where Sk is the set of selectednodes after round k). Unfortunately, AG and CELF do notguarantee an improvement in computational efficiency,and, in the worst case, it is as inefficient as the naivegreedy approach [33]. To make matters even worse, GA isnot suitable for our setting, as it requires complete

knowledge of G, which is practically impossible to acquirefor real-world OSNs.

3.4. Two ground-truth datasets as testbeds

Before we move forward, we introduce two real-worlddatasets that will be used as ground-truth data in this work(see Table 1). Sina Weibo (http://weibo.com), which is sim-ilar to Twitter, is one of the most popular microbloggingsites in China. We collect a small portion of the Weibonetwork using the breath-first-search method along thefollow relationships. We store the tweets of each user thatwere tweeted between January 1, 2012 and September 1,2012. URL links and hashtags contained in these tweetsare extracted and considered the representation ofcascades. In other words, if two tweets tweeted by twousers contain the same hashtag or URL link, then the twousers have joined the same cascade. Another dataset isfrom Twitter. This dataset contains a large fraction ofnetwork and tweet data from Twitter in June 2009, whichare from [1,45] respectively. Similar to our handling ofWeibo, URL links and hashtags contained in tweets areextracted to form cascades.

4. Motivation for a randomized framework andempirical evidence

In this section, we first discuss the motivation behind arandomized framework, which is simple at this stage andwill be enriched in the following sections. Later, we con-duct measurements on two real-world datasets to supportour claim.

4.1. A randomized framework

We consider a simple randomized framework compris-ing the following two steps:

Step 1: A set of nodes is randomly sampled from thenetwork.Step 2: Followees are chosen from these sampled nodes.

If we sample all of the nodes in the network in Step 1,the above framework becomes solving the original prob-lem with complete data. Therefore, this framework is gen-eral. Here, we are interested in how Step 1 impacts thequality of solutions obtained in Step 2. Suppose the opti-mal followees are uniformly distributed in the network;then, after Step 1, these optimal nodes are included in sam-ples (uniformly sampled) with the same probability. As wewill show in the next section, we can prove that the finalsolution quality is lower bounded for this case. However,if we are able to sample the optimal nodes with higherprobability than that of uniform sampling, then the qualityof samples obtained during Step 1 will be improved, andwe can obtain a much-improved solution in Step 2.

Here, we claim that good followees are correlated withnodes of high centrality in networks. Therefore, they can besampled with higher probability if we prefer to samplehigh centrality nodes. The reason for this is that high

2 In Sina Weibo, given a user ID, we obtain his tweets and neighbours viaaccessing http://weibo.com/u/ID.

3 Once dsðSÞ ¼ 0, GA obtains the optimal solution [44].

J. Zhao et al. / Computer Networks 75 (2014) 544–559 547

Page 5: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

centrality nodes are located at important positions of thenetwork and they are more likely to participate in cas-cades. Although there are many node centrality measures[46], we use the degree centrality due to its simplicity.To support our claim, we conduct measurements on tworeal-world datasets in the follow subsection.

4.2. Empirical observations on Sina Weibo and Twitter

We first show that high degree nodes can detect manycascades. We measure the probability of a node withdegree d joining a cascade, which can be expressed asfollows

ProbabilityðdÞ ¼ 1ndjC 0j

X

c2C0 ;u2V

1 tuc <1^ du ¼ df g:

Here, 1 )f g is the indicator function, nd is the number ofnodes with degree d; du denotes the degree of node u,and C0 # C. We set C0 to be the top 0:1% largest cascades,top 1% largest cascades and all cascades. Fig. 1 shows theprobability with respect to degree d. From the figure, it isclear that higher degree nodes are more likely to joincascades than smaller degree nodes. Therefore, choosinghigher degree nodes as followees can result in the discov-ery of more cascades.

We next show that high degree nodes can discovercascades in a timely fashion. We measure the probabilityof a node with degree d joining a cascade within some timedelay Dt. That is

ProbabilityðdÞ ¼ 1ndjCj

X

c2C;u2V

1 tuc & tc 6 Dt ^ du ¼ df g:

We set Dt to be 1 day, 1 h, and 30 min. Fig. 2 shows theresults. Generally speaking, high degree nodes are morelikely to join cascades earlier than small degree nodes

(although with a large variance). Therefore, high degreenodes can discover cascades in a timely manner.

In conclusion, empirical evidence indicates that theredoes exist a correlation between good information sourcesand high centrality nodes in OSNs; therefore, our previousclaim is supported. Now, we are ready to show that such asimple randomized framework can guarantee bothsolution quality and computational efficiency due to sub-modularity of the reward function and the birthday para-dox. The detailed analysis will be covered in the nextsection.

5. Analysing the randomized framework under theworst-case situation

In this section, we study the solution quality and com-putational efficiency of the randomized framework intro-duced in the previous section. Our purpose is todemonstrate that this simple randomized framework canlower bound the solution quality and guarantee computa-tional efficiency. We analyse its solution quality lowerbound by randomizing a well-studied greedy algorithm(GA) and show its computational efficiency by exploitingthe birthday paradox.

5.1. Randomizing the greedy algorithm

Because we are allowed to query nodes in an OSNthrough their account IDs, if we know the scope of theaccount ID range,4 we can randomly generate test IDs in thisrange and easily test their validity by polling them on OSNs.This way, we can construct a set of node samples X # V with

Table 1Ground-truth datasets.

Dataset Nodes Edges Cascades Time

Sina Weibo 339,130 1,697,888 11,439,756 January–August 2012Twitter 1,705,243 21,639,326 7,077,596 June 2009

10-1210-1110-1010-910-810-710-610-510-410-310-210-1

100 101 102 103 104 105

Pro

babi

lity

Degree

top 0.1% cascadestop 1% cascadesall cascades

10-1010-910-810-710-610-510-410-310-210-1

100 101 102 103 104

Pro

babi

lity

Degree

top 0.1% cascadestop 1% cascadesall cascades

(a) SinaWeibo (b) Twitter

Fig. 1. Probability of a user joining a cascade, in the top 0.1%, 1% largest and all cascades, respectively.

4 For example, a valid Weibo user has an identity code of 10 digitsranging from ‘‘1000000000’’ to ‘‘5058913818’’ by March 25, 2014.

548 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 6: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

sufficient size. To imitate GA, we consider executing Steps 1and 2 iteratively, and this forms our randomized greedy algo-rithm (RG), which is described in Algorithm 1.

Algorithm 1. Randomized greedy algorithm (RG)

In the original GA, at round k, one selects a node s*k fromV n Sk&1 to maximize the reward gain dsðSk&1Þ. In RG, at eachround k, we generate a set of node samples Xk # V n Sk&1

and select s*k from Xk to maximize dsðSk&1Þ. As X ! V n Sin each round,5 the performance of RG can be arbitrarilyclose to that of GA.6 RG has two advantages over GA: (1) itdoes not require complete knowledge of G; and (2) it isn=jXj times faster than GA.

It is known that GA has an approximation factor1& 1=e, i.e., the value of the GA solution is at least1& 1=e ( 0:63 times the optimal value. The following the-orem states that RG has a similar performance bound.

Theorem 1 (Lower bound on solution quality of RG). Let OPTdenote K 6 B optimal nodes of the problem, andSk ¼ fs*1; . . . ; s*kg be the set of nodes obtained by RG after krounds, 1 6 k 6 B. Suppose X is uniformly sampled from V;then, there exists a constant k P jXj=n, s.t.

E FðSBÞ½ %P E FðSKÞ½ %P 1& 1ek

! "FðOPTÞ:

Proof. By utilizing the non-decreasing property of rewardfunction F, we have

FðOPTÞ & FðSk&1Þ 6 FðOPT [ Sk&1Þ & FðSk&1Þ¼ FðOPT n Sk&1 [ Sk&1Þ & FðSk&1Þ: ð2Þ

Assume OPT n Sk&1 ¼ fz1; . . . ; zJg; J 6 K , let j ¼ 1; . . . ; J, anddefine

Zj , FðSk&1 [ fz1; . . . ; zjgÞ & FðSk&1 [ fz1; . . . ; zj&1gÞ: ð3Þ

Then Ineq. (2) becomes

FðOPTÞ & FðSk&1Þ 6XJ

j¼1

Zj: ð4Þ

In order to obtain the expectation of FðSk&1Þ, we require theexpectation of Zj. According to Eq. (3) and the submodular-ity of F, we have

E Zj# $6 E FðSk&1 [ fzjgÞ & FðSk&1Þ

# $¼ E dzj ðSk&1Þ

h i: ð5Þ

In fact, E dzj ðSk&1Þh i

is upper bounded by E ds*kðSk&1Þ

h i=k

where 0 < k 6 1 is a constant. To see this, we define twosets C1 and C2 by

C1 , fX : 9x 2 X ^ dxðSk&1ÞP dzj ðSk&1Þg 8j;

C2 , fX : 8x 2 X ^ dxðSk&1Þ < dzj ðSk&1Þg 8j:

Let k , PðX 2 C1Þ, and note that

k ¼ PðX 2 C1ÞP Pðzj 2 XÞ ¼ jXjn& kþ 1

PjXjn: ð6Þ

Now,

E ds*kðSk&1Þ

h i¼ E FðSk&1 [ fs*kgÞ & FðSk&1Þ

# $

¼ PðX 2 C1ÞE FðSk&1 [ fs*kgÞjX 2 C1# $

þ PðX 2 C2ÞE FðSk&1 [ fs*kgÞjX 2 C2# $

& E FðSk&1Þ½ %

¼ PðX 2 C1ÞE ds*kðSk&1ÞjX 2 C1

h i

þ PðX 2 C2ÞE ds*kðSk&1ÞjX 2 C2

h i

P PðX 2 C1ÞE ds*kðSk&1ÞjX 2 C1

h i

P kE dzj ðSk&1Þh i

:

Finally, from Eq. (5) we get

E Zj# $6 E dzj ðSk&1Þ

h i6 1

kE ds*

kðSk&1Þ

h i:

10-7

10-6

10-5

10-4

10-3

100 101 102 103 104

Pro

babi

lity

Degree

<1 day<1 hour<30 min

10-7

10-6

10-5

10-4

10-3

100 101 102 104 105

Pro

babi

lity

103

Degree

<1 day<1 hour<30 min

(a) Sina Weibo (b) Twitter

Fig. 2. Probability of a user joining a cascade within 1 day, 1 h and 30 min, respectively.

5 We sometimes omit subscript k if there is no ambiguity.6 However, we cannot guarantee whether RG is better or worse than GA

due to the approximation nature of GA.

J. Zhao et al. / Computer Networks 75 (2014) 544–559 549

Page 7: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

Combining with Eq. (4), we get the following iterativeformula,

FðOPTÞ & E FðSk&1Þ½ % 6XJ

j¼1

E Zj# $6 K

kE FðSkÞ & FðSk&1Þ½ %;

from which we can derive the following relationship,

E FðSkÞ½ %P 1& 1& kK

! "k" #

FðOPTÞ:

Finally, letting k ¼ K , and using the non-decreasing prop-erty of F, we have

E FðSBÞ½ %P E FðSKÞ½ %P 1& 1& kK

! "K" #

FðOPTÞ

P 1& 1ek

! "FðOPTÞ: !

Theorem 1 exploits the non-decreasing submodularproperty of the reward function and illustrates that theproposed randomized framework can obtain quality guar-anteed solutions when samples are uniformly picked fromthe OSN. Due to the lack of complete data, the solutionquality lower bound for RG is smaller than that of GA,and, more importantly, Theorem 1 describes the methodto improve the solution quality of RG. The performancelower bound is related to the parameter k, which relatesto the probability of including an optimal node in thesample set X (see Ineq. (6)). Therefore, if we can increasethis probability, we can obtain better solutions. As dis-cussed in Section 4, this can be achieved by includinghigh centrality nodes (e.g., high degree nodes) in samplesbecause high centrality nodes are more likely to be opti-mal nodes; then, the solution quality lower bound of RGincreases.

Because RG is n=jXj times faster than the naive GA, atoo-large sample size will harm RG’s computationalefficiency. In the following, we show that the sample sizeneeds not be very large according to the birthday paradoxargument.

5.2. Quantifying the sample size via cover ratio analysis

To determine the sample size, we need a relationbetween FðSÞ and jXj. However, establishing such a relationis non-trivial. Here, we determine jXj by quantifying theoverlap between samples

SKk¼1Xk and OPT. Let g denote

the ratio of nodes in OPT covered by samplesSK

k¼1Xk, i.e.,g , 1

K jSK

k¼1Xk \ OPTj. Intuitively, if the samples used inRG can cover a large fraction of nodes in OPT, we can finda good solution with high probability. To show that RGdoes guarantee a lower bound for the cover ratio g usingonly moderate-sized samples, we first study the probabil-ity that at least x nodes in the set OPT fall into set X inone round of RG. Remember that jV j ¼ n and jOPTj ¼ K;therefore,

ProbfjX \ OPTjP xg ¼XK

i¼x

Ki

! "n& KjXj& i

! "

njXj

! " :

Let x ¼ 1 and the expression above becomes

ProbfjX \ OPTjP 1g ¼ 1& ð1& K=nÞjXj:

If we want to guarantee that the above probability is atleast p, i.e., that X can cover at least one node in OPT withprobability at least p, we finally obtain

jXjP lnð1& pÞlnð1& K=nÞ

% &:

Fig. 3 shows the relation between the smallest samplesize jXj and K=n with p ¼ 0:90;0:95 and 0:99. One interest-ing observation is that sample size drops quickly when K=nvaries from 0 to 0.01; this shows that we do not need verylarge samples if OPT is moderate in size. For example, if wewant to make sure that at least one node in OPT falls in Xwhen K=n ¼ 0:01, then one only needs to generate 458samples, and the resulting success probability is greaterthan 0.99. This is a counter-intuitive result that is relatedto the birthday paradox.

The above result can be generalized to the situation ofcovering at least one node in a subset of a set of size n,where the subset contains a fraction a of the nodes ofthe set. To guarantee that this event occurs with probabil-ity at least p, we can use nXða; pÞ samples, where

nXða; pÞ ¼lnð1& pÞlnð1& aÞ

% &:

Now we show that RG can bound the cover ratio g withonly moderate-sized samples in each round. It is importantto note that as the RG algorithm proceeds, the fraction ofuncovered nodes in OPT shrinks, and therefore one needsmore samples to guarantee the cover probability p. Never-theless, the following theorem shows that even if we usefixed size samples in each round, the cover ratio g after Krounds is still bounded.

Theorem 2 (Lower bound on the cover ratio). Given a and p,if we use nXða; pÞ samples in each round of RG to cover Koptimal nodes, then, after K rounds in RG, we have

E g½ %P1& 1

epb ; b 6 1;1& 1

be1&ð1&pÞb ; b > 1;

(

whereb ¼ Kan

:

0

1

2

3

4

5

0 0.002 0.004 0.006 0.008 0.01

smal

lest

sam

ple

size

|X|

K/n

x104

p=0.90p=0.95p=0.99

012345

0.002 0.004 0.006 0.008 0.01

x103

Fig. 3. The smallest sample size. Inset shows the same plot ranging from0:001 to 0:01.

550 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 8: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

Proof. Let yk denote the number of nodes in OPT that havebeen covered after the k-th round and !yk be its expectation.Further, let qk denote the probability that an uncoverednode in OPT will be covered in the k-th round. Then !yk

satisfies!yk ¼ !yk&1 þ qk: ð7Þ

+ Case 1: b 6 1In this case, an P K , it means that using nXða; pÞ sam-ples can only guarantee that the probability of coveringa larger set of size an P K is larger than or equal to p.At round k, an uncovered node in OPT belongs to aset of size an ¼ K=b with probability ðK & !yk&1Þ=an ¼bðK & !yk&1Þ=K . Therefore,

qk P pbK & !yk&1

K:

Substituting this into Eq. (7), yields

!yk P !yk&1 þ pbK & !yk&1

K;

which can be solved to yield

!yk P 1& pbK

! "k

!y0 þ K 1& 1& pbK

! "k" #

¼ K 1& 1& pbK

! "k" #

P K 1& 1ekpb=K

! ": ð8Þ

Setting k ¼ K , yields

E g½ % ¼!yK

KP 1& 1

epb:

+ Case 2: b > 1In this case, using nXða; pÞ samples can guarantee the prob-ability of covering a set of size an < K. Since jOPTj ¼ K , forthe first few rounds in RG, we are always able to cover atleast one node in OPT with probability greater than orequal to p, until jOPT n Sk* j ¼ an, where k* can be deter-mined by

k* ¼ K & anp

¼ Kðb& 1Þbp

:

Hence, in the first k* rounds, we have covered K & annodes in OPT with probability at least p. After k*, wecan use only K & k* rounds to cover the remainingan ¼ K=b nodes with sample size nXða; pÞ. This situationhas been discussed in Case 1 (replacing K by K=b and kby K & k* in (8)). Therefore,

!yk P K & Kbþ K

b1& 1

e1&ð1&pÞb

! "¼ K & K

be1&ð1&pÞb :

Hence,

E g½ % ¼!yK

KP 1& 1

be1&ð1&pÞb : !

We depict the relation between E g½ % and b in Fig. 4.When b increases (or a decreases and, therefore, samplesize increases), we observe that the cover ratio increases.As an illustration, to cover a set containing K nodes, if we

set a ¼ K=n and p ( 1, we can obtain a cover ratio of63%; if we reduce a to K=ð2nÞ, the cover ratio increasesto 82%. In practice, we can use Theorem 2 to determinethe sample size guaranteeing a proper coverage on OPT,and the sample size needs not be too large. Therefore,our randomized framework is computationally efficient.

In conclusion, our analysis in this section demonstratesthat the randomized framework can guarantee both solu-tion quality and computational efficiency under the condi-tion that user samples are sampled uniformly at random.Note that this condition actually is the worst-case situationbecause we do not use any strategy in sampling nodes. Infact, we can explore structural properties of OSNs to obtainhigh quality samples, which we discuss in the next section.

6. Benefiting from power-law networks

Power-law networks (i.e., the fraction of degree-dnodes in the graph is proportional to d&c, where c is aconstant) are very common in real world such as onlinesocial networks, biological networks, citation networksand communication networks. In this section, our goal isto show that power-law structures can bring extra bene-fits to the randomized framework by investigating thepatterns of cascading diffusion processes on power-lawnetworks. Our result reveals that power-law networkscan easily cause collisions between diffusion processesand a simple random walk sampler when the networkstructure satisfies some mild conditions, i.e., the networkhas high degree moments. Therefore, the result indicatesthat the randomized framework in conjunction with arandom walk sampler can detect information cascadeseffectively in such networks.

6.1. Diffusion models

Our analysis is focused on three diffusing models forthey generalize a large variety of diffusion processes in realworld. We briefly describe them here.

+ Random Walk (RW) model. Petition letter delivering[47] and drug smuggling [48] are examples of diffu-sions that the total amount of the diffusible objectsdoes not change over time (e.g., there is always one

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

0.2 0.4 0.6 0.8 1.0 1.2 1.4 1.6 1.8 2.0

E [η

]

β

p=0.90p=0.95p=0.99

Fig. 4. Cover ratio lower bound.

J. Zhao et al. / Computer Networks 75 (2014) 544–559 551

Page 9: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

letter or one package of drug on the network whilediffusing). We model this kind of diffusion, called con-servative diffusion [49], by a simple random walk. Thatis, a diffusible object starts from an initial infectednode, and recursively, it infects a randomly chosenneighbour and moves to that node at the next step.+ Independent Cascade (IC) model. The IC model is widely

used to model information cascades in social net-works [17,43], such as tweets retweeting and videossharing in OSNs. In the IC model, each cascade startsfrom an initial seed. When node u first becomesactive at step t, it is given only one chance to activateits neighbours NbðuÞ with success probability puvwhere v 2 NbðuÞ. If u succeeds in activating v, thenv will become active at step t þ 1; but whether u suc-ceeds, it cannot make any further attempts to activateits neighbours.+ Susceptible-Infective (SI) model. The SI model is widely

used in epidemiology [50, Chapter 9]. In the networkscenario, we consider a variation of the common SImodel. In this model, at each time step, an edgeðu;vÞ 2 E, that connects an infective node u and a sus-ceptible node v, is chosen uniformly at random; then,node v becomes infected at this time step. This processrepeats until all nodes are infected. The differencebetween the SI model and the IC model is that, aninfected node in the SI model can keep on infecting itssusceptible neighbours.

6.2. Observations from diffusion models

To motivate our further analysis, we first simulatethese models on the HEPTH citation network (refer toTable 2). The fractions of infected nodes by diffusionsare controlled: for the RW and SI model, we stop the dif-fusions after having infected 1%, 5% and 10% nodes; forthe IC model, we set puv ¼ 0:01; 0:012 and 0:015 on eachedge. We depict the degree distribution of the originalgraph, and compare it with the degrees of the uninfectednodes after diffusions in Fig. 5. We observe that whenmore nodes are infected, the tails of CCDF curves dropmore quickly than the heads. This indicates that largedegree nodes are easier to be infected than small degreenodes, which is consistent with our claims in Section 4.Therefore, if a sampler can sample large degree nodeswith higher probability, it has higher chance to discovera cascading diffusion. Random walk (RW) is such a sam-pler that prefers to visit large degree nodes in networks.In the following discussion, we theoretically show whya RW sampler can effectively discover diffusions inpower-law networks, and one condition that the networkshould satisfy.

6.3. Using A RW sampler to probe diffusions

Let I denote the set of infected nodes, and Id # I is the setof infected nodes of degree d. Let R denote the set of nodesvisited by a RW sampler, and Rd # R is the set of visitednodes of degree d by RW. Let i; id; r and rd denote theircardinalities respectively. Then the probability that a RWsampler fails to discover the diffusion is

PðR \ I ¼ ;Þ ¼Y

d

PðRd \ Id ¼ ;Þ: ð9Þ

Furthermore, remember that nd is the number of nodesof degree d in the graph. We obtain

PðRd \ Id ¼ ;Þ ¼

0 rd þ id > nd;

nd & id

rd

! "

nd

rd

! " otherwise:

8>>>>><

>>>>>:

Substituting it to Eq. (9), we have

PðR \ I ¼ ;Þ 6Y

d

nd & id

rd

! "

nd

rd

! " 6Y

d

1& id

nd

! "rd

: ð10Þ

A RW sampler visits a node of degree d with probabilitydhd=hdi in G, where hd is the fraction of nodes of degree din the graph, and hdi denotes the average degree of nodesin G. For an l-length random walk, it contains ldhd=hdisamples of degree d. Note that these samples may haveduplicates because a node may be visited more than onetime by the random walker. Nevertheless, it can be proventhat the number of duplicated nodes can be ignored when lis small [51], i.e., l ( r. Therefore, rd ( ldhd=hdi, and Eq. (10)becomes

PðR \ I ¼ ;Þ 6Y

d

1& id

nd

! "ldhd=hdi

:

If we want to guarantee that the above probability is smal-ler than !, we have

l Plog !

Pd

dhdhdi log 1& id

nd

' ( ¼ log !P

ddhdhdi log 1& iqd

nhd

' ( , llow; ð11Þ

where qd ¼ id=i, is the fraction of infected nodes of degreed.

Consequently, llow is the minimum number of steps awalker should walk. If llow is small, we can conclude thatthe RW sampler is effective to discover the cascading diffu-sions. Note that several factors will impact llow: (a) thedegree distribution of G, i.e., fhdgd>0; (b) the fraction ofinfected nodes i=n; and (c) fqdgd>0. Among them, we aremost interested in (c). qd ¼ id=i describes the fraction ofinfected nodes of degree d, and it is closely related to thenature of a diffusion model. We refer fqdgd>0 as the diffu-sion profile of a diffusion model. In order to understandthe value of llow, we need to calculate the diffusion profilesfor different models.

Table 2Summary statistics of networks.

Network HEPTH Enron Slashdot Gnutella

Nodes 27,400 33,696 77,360 62,586Edges 352,040 180,811 507,833 147,892

552 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 10: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

6.3.1. Diffusion profile for the RW modelThe RW model has a very simple diffusion profile, i.e.,

qðRWÞd ¼ dhd=hdi. Using the Taylor series logð1& xÞ ¼&P1

j¼1xj=j, for 0 6 x < 1, Eq. (11) becomes

lðRWÞlow ¼ & log !

P1j¼1

1j

in

) *jPd

dhdhdi

qðRWÞdhd

! "j ¼& log !

P1j¼1

1j

in

) *j hdjþ1ihdijþ1

:

For power-law networks, we know that hdji convergesonly when scaling exponent c P jþ 1. Empirically, it isknown that 2 6 c < 3 in real-world networks [52,53]. Thisindicates that hdjþ1i; j P 1, will increase drastically as themaximum degree of the network increases, and causeslðRWÞlow to be small in real-world networks.

6.3.2. Diffusion profile for the IC modelNext we provide a mean-field analysis for fqðICÞd gd to

facilitate numerical calculation on a given network sincethere is no closed form solution for qðICÞd and lðICÞlow in the caseof IC model.

For the IC model, uninfected nodes can only be infectedby active nodes (i.e., nodes become infected at last step).Let pdðtÞ be the fraction of active nodes of degree d at stept. By definition, we have pdðtÞ ¼ ½idðtÞ & idðt & 1Þ%=nd. Underthe configuration model [54], the probability, that a nodeof degree d is connected to a node of degree h, ispdh ¼ dh=ð2mÞ. Then a node of degree d will have nhpdh

neighbours of degree h on average. (It is easy to verify thatPhnhpdh ¼ d.) Since a node of degree h got infected at step t

has probability phðtÞ, a node of degree d will have on aver-age nhpdhphðtÞ active neighbours of degree h at step t. Thus,a node of degree d becomes infected at step t þ 1 withprobability 1&

Qhð1& pÞnhpdhphðtÞ (assume puv ¼ p;8u;v).

Finally, we obtain the probability that a randomly chosennode of degree d becomes active at step t þ 1 by

pdðt þ 1Þ ¼ 1& idðtÞnd

! "1&

Y

h

ð1& pÞnhpdhphðtÞ

!; ð12Þ

where the first item 1& idðtÞ=nd is the probability that arandomly chosen node of degree d is not infected atprevious steps. Thus far, we obtain the total infected nodestill step t þ 1 by

idðt þ 1Þ ¼ idðtÞ þ ndpdðt þ 1Þ: ð13Þ

The fraction of nodes of degree d in the infected nodes atstep t, i.e., the diffusion profile, can be readily obtained by

qðICÞd ðtÞ ¼idðtÞPdidðtÞ

: ð14Þ

Combining Eqs. (12)–(14), we can numerically calculateqðICÞd for a given graph with initial condition pdðtÞjt¼0 given,and lðICÞlow is obtained by Eq. (11).

6.3.3. Diffusion profile for the SI modelIn the SI model, because an infectious node can keep on

infecting the susceptible neighbours at every time step,then the probability, that a node of degree d is infectedat step t, is pdðtÞ ¼ idðtÞ=nd. At time step t þ 1, an edgeðu;vÞ 2 E s.t. u 2 IðtÞ and v 2 V n IðtÞ is chosen uniformlyat random. According to the inspection paradox [55], theprobability that node v has degree d is

qdðt þ 1Þ ¼ dhdð1& pdðtÞÞPhhhhð1& phðtÞÞ

: ð15Þ

Then, the fraction of infected nodes of degree d afterstep t þ 1 is

pdðt þ 1Þ ¼ pdðtÞ þqdðt þ 1Þ

nd: ð16Þ

Finally, the diffusion profile of SI model is

qðSIÞd ðtÞ ¼

ndpdðtÞPhnhphðtÞ

: ð17Þ

Combining Eqs. (15)–(17), we can numerically calculateqðSIÞ

d for a given graph with given initial condition pdðtÞjt¼0,and lðSIÞ

low will be obtained by Eq. (11) thereafter.

6.4. Numerical solutions for the minimum number of steps

We consider different networks such as citation net-work HEPTH, communication network Enron, social net-work Slashdot, and P2P technology network Gnutella,and we numerically calculate llow on these networks. Abrief summary of these networks is given in Table 2. Allthe four networks reveal power-law degree distributions(Fig. 6(a)), but with different moment distributions(Fig. 6(b)). Note that Gnutella has smaller moments thanthe others.

For each network and diffusion model, Fig. 7 depicts llow

with respect to the fraction of infected nodes i=n underthree different !’s. We can observe that when more nodesbecome infected (i.e., i=n increases), RW sampler is easierto discover the diffusion process (i.e., llow drops quickly).

10 -610 -510 -410 -310 -210 -110 0

10 0 10 1 10 2 10 3 10 4

CC

DF

Degree

(a) RW (b) IC (c) SI

i/ n=0.01i/ n=0.05i/ n=0.10whole graph 10 -6

10 -510 -410 -310 -210 -110 0

10 0 10 1 10 2 10 3 10 4

CC

DF

Degree

p=0.010p=0.012p=0.015whole graph 10 -6

10 -510 -410 -310 -210 -1100

10 0 10 1 10 2 10 3 10 4

CC

DF

Degree

i/ n=0.01i/ n=0.05i/ n=0.10whole graph

Fig. 5. An example on the HEPTH network. Degree distributions of the original graph, and uninfected nodes in the graph under different diffusion models(averaged over 50 runs).

J. Zhao et al. / Computer Networks 75 (2014) 544–559 553

Page 11: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

Comparing the Gnutella network with the other networks,we find that the sampler needs relatively longer steps todiscover the diffusion process because the Gnutella net-work has smaller moments than the others (as shown inFig. 6(b)).

In summary, we demonstrate that the RW sampler caneasily discover cascading diffusion processes in power-lawnetworks with large degree moments, and actually, thiscondition is easily satisfied in real-world OSNs due to thedivergences of hdji; j P 2 when 2 6 c < 3. Therefore, therandomized framework in conjunction with a RW samplercan detect information cascades effectively in real-worldOSNs.

7. Experiments

In this section, we conduct experiments to verify theprevious analysis. The goal is to demonstrate the efficiencyof the randomized method and the trade-off between

solution quality and computational efficiency. We firstintroduce our evaluation methods, and then analyze theexperimental results based on the two ground-truthdatasets which we have introduced in Section 3.

7.1. Evaluation methods

7.1.1. Solution quality evaluation methodBecause it is difficult to obtain an optimal solution OPT,

we compare our solution quality with the solutionobtained by GA on complete ground-truth data. Since ourmethod only uses incomplete data, its solution quality isusually worse than that of GA. Thus, we mainly evaluatehow close our method can approximate GA, e.g., within90% or 95% to GA.

7.1.2. Computational efficiency evaluation methodWe use the number of times of calculating reward gains

to measure the time complexity of a method. The naive GA

10-5

10-4

10-3

10-2

10-1

100

100 101 102 103 104

CC

DF

degree

HEPTHEnron

SlashdotGnutella

(a) Degree distribution.

100102104106108

101010121014

1 2 3 4 5

< dj >

j

HEPTHEnronSlashdotGnutella

(b) j-th order moments in degree.

Fig. 6. Degree and moment distributions.

012345

l low

/ n (%

) ε=0.10ε=0.05ε=0.01

00.20.40.60.8

1

l low

/ n (%

)

00.20.40.60.8

l low

/n (%

)

0

10

20

30

0.2 0.4 0.6 0.8 1

l low

/ n (%

)

i/n (%)0.2 0.4 0.6 0.8 1

i/n (%)0.2 0.4 0.6 0.8 1

i/n (%)

RW IC SI

HEP

THEn

ron

Slas

hdot

Gnu

tella

Fig. 7. Numerical solutions for llow with different diffusion models. We use initial condition p1ð0Þ ¼ 1=n1 and pdð0Þ ¼ 0 for d > 1 in both IC and SI model. Forthe IC model, we set puv ¼ 0:02 in the first three graphs and puv ¼ 0:1 in Gnutella. Note that llow=n is relatively large on Gnutella network.

554 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 12: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

requires OðnBÞ calculations, and hence we can evaluate thespeed-up of a method A in terms of the reduction of rewardgain calculations with respect to naive GA, by

Speed-upðAÞ¼ #of calculationsof rewardgainbynaiveGA#of calculationsof rewardgainbymethodA

:

We will compare RG with two state-of-the-art methods AGand CELF, which are two most efficient implementations ofGA. Note that AG and CELF are actually the same, so weonly compare RG with AG.

7.2. Experiments on Sina Weibo and Twitter

7.2.1. Evaluating RG under the worst-case situationIn the first experiment, we implement RG as described

in Algorithm 1. In each round of RG, we use a smaller sam-ple size nXðK=n;0:9Þ at each round that guarantees about59% of coverage on OPT, and a larger sample sizenXðK=ð2nÞ;0:9Þ at each round that guarantees about 78%of coverage on OPT, respectively. We compare the solutionquality and computational efficiency, and these results areshown in Fig. 8.

In Fig. 8(a) and (c), because AG uses the complete data,it achieves the highest reward. RGs in fact also performvery well, which are within 95% to AG, and if we increasethe sample size with guaranteed cover ratio changing from59% to 78%, the performance of RG also improvessignificantly.

The main appeal of the randomized framework is that itis more computationally efficient than the other state-of-the-art methods. In Fig. 8(b) and (d), we compare thespeed-up of RG and AG with naive GA. Firstly, we observethat RGs are faster than AG. Secondly, it is much faster thannaive GA on both datasets. If we increase the sample sizeused in each round (and cover ratio increases accordingly),RG becomes slower. Therefore, cover ratio can be used totrade off between the solution quality and computationalefficiency in RG.

In fact, the superiority of RG’s efficiency is not obviousfrom Fig. 8(b) and (d); i.e., RG is only about two times fas-ter than AG. This is because we do not implement RG in anefficient manner. RG can also be implemented more effi-ciently by exploiting the submodularity of reward functionas AG and CELF do. So what we observe here is actually theworst-case performance of RG, and it is still more efficientthan state-of-the-art methods. We will see RG’s true powerof efficiency in the following experiments.

7.2.2. A more efficient implementation of RG and using node’sattributes

In here, we explore a more efficient implementation ofRG. In particular, we mimic the AG and CELF in having alazy update in reward gains. Moreover, instead of samplingin each round, we conduct the sampling procedure at thevery beginning and choose final nodes from enough sam-ples. We call such a form of sampling as batch sampling,and it is easy to prove that this modification will improve

1.0

1.5

2.0

2.5

3.0

0.2% 0.4% 0.6% 0.8% 1.0%

F (S

)

Fraction of chosen nodes (K/n)

95%90%

x106AG with complete dataRG nX(K/n,0.9),E[η]=59%RG nX(K/2n,0.9),E[η]=78%

(a) Reward (Weibo)

0 1 2 3 4 5 6 7 8 9

0.2% 0.4% 0.6% 0.8% 1.0%

Spee

d-up

Fraction of chosen nodes (K/n)

x103AG with complete dataRG nX(K/n,0.9),E[η]=59%RG nX(K/2n,0.9),E[η]=78%

(b) Speed-up (Weibo)

0.4

0.6

0.8

1.0

1.2

1.4

1.6

0.2% 0.4% 0.6% 0.8% 1.0%

F (S

)

Fraction of chosen nodes (K/n)

95%90%

x105AG with complete dataRG nX(K/n,0.9),E[η]=59%RG nX(K/2n,0.9),E[η]=78%

(c) Reward (Twitter)

0.0

0.2

0.4

0.6

0.8

1.0

1.2

0.2% 0.4% 0.6% 0.8% 1.0%

Spee

d-up

Fraction of chosen nodes (K/n)

x104AG with complete dataRG nX(K/n,0.9),E[η]=59%RG nX(K/2n,0.9),E[η]=78%

(d) Speed-up (Twitter)

Fig. 8. Performance of RG with respect to different sample size (averaged over 50 runs).

J. Zhao et al. / Computer Networks 75 (2014) 544–559 555

Page 13: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

1.0

1.5

2.0

2.5

3.0

3.5

200 400 600 800 1000 1200 1400

F (S

)

Query costs

95%90%

x105

AG with complete dataRG (uniform)RG (degree)RG (activity)

(a) Reward (Weibo S 100)

0 1 2 3 4 5 6 7 8 9

200 400 600 800 1000 1200 1400

Spee

d-up

Query costs

x104AG with complete data

RG (uniform)RG (degree)RG (activity)

(b) Speed-up (Weibo)

0

2

4

6

8

10

200 400 600 800 1000 1200 1400

F (S

)

Query costs

95%90%

x103

AG with complete dataRG (uniform)RG (degree)RG (activity)

(c) Reward (Twitter S 100)

0.00.20.40.60.81.01.21.41.6

200 400 600 800 1000 1200 1400

Spee

d-up

Query costs

x106AG with complete data

RG (uniform)RG (degree)RG (activity)

(d) Speed-up (Twitter)

Fig. 9. Improving sample quality by using node’s attributes (B ¼ 100, averaged over 50 runs).

1.5

2.0

2.5

3.0

3.5

200 400 600 800 1000 1200 1400

F (S

)

Query costs

95%90%

x105

AG with complete dataRG (uniform)RG (degree)RG (activity)

(a) Reward (Weibo S 100)

0.0

0.5

1.0

1.5

2.0

200 400 600 800 1000

Spee

d-up

Query costs

x104AG with complete data

RG (uniform)RG (degree)RG (activity)

(b) Speed-up (Weibo)

2.0

4.0

6.0

8.0

10.0

200 400 600 800 1000 1200 1400

F (S

)

Query costs

95%90%

x103

AG with complete dataRG (uniform)RG (degree)RG (activity)

(c) Reward (Twitter S 100)

0.0

0.5

1.0

1.5

2.0

2.5

3.0

3.5

200 400 600 800 1000 1200 1400

Spee

d-up

Query costs

x104AG with complete data

RG (uniform)RG (degree)RG (activity)

(d) Speed-up (Twitter)

Fig. 10. Improving sample quality by exploring structure of networks (B ¼ 100, averaged over 50 runs).

556 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 14: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

the solution quality lower bound because the probability ofincluding an optimal node increases in each round.

In this experiment, we fix B ¼ 100 and evaluate the per-formance of RG with respect to query costs, i.e., samplesize. We consider three sampling strategies: (1) select anode uniformly at random; (2) select a node with probabil-ity proportional to its degree; and (3) select the node withprobability proportional to its activity (#posts). Fig. 9shows the results.

In Fig. 9(a) and (c), we can see that the solution qualityincreases as sample size increases, and sampling by degreeis the best strategy follows by sampling by activity, anduniform sampling is the worst. From the speed-up curvesin Fig. 9(b) and (d), we can see that uniform node samplingis the most efficient among the three strategies. All thesestrategies are in general much more efficient than that ofAG, e.g., with 1000 query costs, RG is about 40 to 187 timesfaster than AG.

7.2.3. Improving sample quality by random walkWe now evaluate the benefits of exploiting network

structures by using RW samplers. We set B ¼ 100 and con-duct three RW samplers: (1) select a neighbour uniformlyat random; (2) select a neighbour with probability propor-tional to its degree; and (3) select a neighbour with prob-ability proportional to its activity. Fig. 10 shows the results.

Both the reward curves in Fig. 10(a) and (c) speed-upcurves in Fig. 10(b) and (d) shows similar results as in pre-vious experiment: RW biased by degree generates the bestsolution but at a higher computational cost, then followsby activity, and uniform RW is the worst but the most effi-cient. If we compare the reward curves in Fig. 9(a) and (c)with Fig. 10(a) and (c), respectively, we can find that theRW can obtain better reward than node sampling, whichcoincides with our analysis in Section 6.

8. Summary and discussion

We summarize the paper in this section.As the follow model is adopted by many OSNs, which

subset of followees one should follow is a practical prob-lem for OSN users. In this work, we study the followeeselection problem for the purpose of maximizing informa-tion coverage and minimizing time delay. In other words,we want to detect important information in an OSN asmuch as possible and as soon as possible by following afew followees. However, this problem is NP-complete,and we lack the complete OSN data. To solve these chal-lenges, we design a randomized method that guaranteesboth solution quality and computational efficiency.

The solution quality is guaranteed by exploiting thenon-decreasing submodular property of the reward func-tion as stated in Theorem 1. The importance of Theorem 1lies not only in its statements on the existence of a

solution quality lower bound of RG, but also in that itdescribes the method to obtain better solutions, i.e., byincreasing the probability of including optimal followeesin samples.

The computational efficiency lies in the fact that RG canleverage the birthday paradox to reduce the search spacesignificantly. Although we lose solution quality lightly, amajor speedup of computational efficiency can beachieved. We also find that the power-law structure ofreal-world networks can facilitate a random walk to detectinformation cascades efficiently.

It is interesting to see how RG behaves when K=n! 0(or B=n! 0). From Fig. 3, we observe that when K=n! 0,the number of samples required in each round increasesdrastically. Because a large sample size hurts RG’s compu-tational efficiency, RG is not suitable for very small budgetB. For example, to select B ¼ 103 users from an OSN havingn ¼ 108 users, or B=n ¼ 10&5, we need to generate as manyas 105 samples in each round of RG.

Thus, we hasten to give an explanation. The aim ofintroducing RG is not to replace but supplement existingmethods. The main contribution of RG is in significantlyreducing the search space, and it assists existing methodsto obtain the final solution from a reduced search space.In practice, we should use the randomized method tochoose a small fraction of OSN users as candidates and thenuse existing methods to choose final information sourcesfrom candidates (because they guarantee better solutionquality), as illustrated in Fig. 11. In the previous example,we can use RG to choose 0:1% of the population, or 105

users, as candidates, and then use existing methods tochoose 103 users from these candidates. A conservativeestimation of the computational efficiency reveals that thisapproach is at least 103 faster than applying GA over theentire OSN directly, without considering the expensivequery cost of GA.

One limitation of this work is that we assume everyuser has the same cost of being followed, and thus we onlyconsider the optimization problem with a cardinalityconstraint, i.e., jSj 6 B. In fact, different users usually havedifferent costs of being followed. For example, if a userposts too many tweets, we need to spend much more timeor attention to read them if we choose to follow that user,i.e., the cost is large. Therefore, a more general problem isto consider that each user u has a cost cu, and the cardinal-ity constraint is generalized to a knapsack constraint, i.e.,P

u2Scu 6 B. How to design a randomized method for sucha constraint offers an opportunity for future work.

Acknowledgements

The authors thank the editors and reviewers for theirconstructive comments and suggestions that greatlyimproved the quality of this paper. This work wassupported in part by the National Natural ScienceFoundation (61103240, 61103241, 61221063, 91118005,61221063, U1301254), 863 High Tech DevelopmentPlan (2012AA011003), 111 International CollaborationProgram, of China, and the Application FoundationResearch Program of SuZhou (SYG201311).

Input Randomized method Existing methods Output

Fig. 11. The proposed randomized method supplements existingmethods.

J. Zhao et al. / Computer Networks 75 (2014) 544–559 557

Page 15: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

Appendix A. Notations and abbreviations

See Table A.3.

References

[1] H. Kwak, C. Lee, H. Park, S. Moon, What is Twitter, a social network ora news media? in: WWW’10: Proceedings of the 19th InternationalWorld Wide Web Conference, 2010.

[2] T. Sakaki, M. Okazaki, Y. Matsuo, Earthquake shakes Twitter users:real-time event detection by social sensors, in: WWW’10:Proceedings of the 19th International World Wide WebConference, 2010.

[3] A. Tsotsis, First credible reports of bin Laden’s death spread likewildfire on Twitter. <http://techcrunch.com/2011/05/01/news-of-osama-bin-ladens-death-spreads-like-wildfire-on-twitter> (May2011).

[4] 2011 England riots. <http://en.wikipedia.org/wiki/2011_England_riots> (March 2014).

[5] M. Efron, Information search and retrieval in microblogs, J. Am. Soc.Inf. Sci. Technol. 62 (6) (2011) 996–1008.

[6] M. Efron, Improving retrieval of short texts through documentexpansion, in: SIGIR’12: Proceedings of the 35th International ACMSIGIR Conference on Research and Development in InformationRetrieval, 2012.

[7] R. McCreadie, C. Macdonald, Relevance in microblogs: Enhancingtweet retrieval using hyperlinked documents, in: OAIR’13:Proceedings of the 10th Conference on Open Research Areas inInformation Retrieval, 2013.

[8] N. Kanhabua, W. Nejdl, Understanding the diversity of tweets in thetime of outbreaks, in: the 1st International Web ObservatoryWorkshop at WWW, 2013.

[9] J. Zhao, J.C. Lui, D. Towsley, X. Guan, Y. Zhou, Empirical analysis of theevolution of follower network: a case study on Douban, in:NetSciCom’11: The 3rd IEEE International Workshop on NetworkScience for Communication Networks, 2011.

[10] Followee. <http://www.oxforddictionaries.com/definition/english/followee> (June 2014).

[11] L. Weng, A. Flammini, A. Vespignani, F. Menczer, Competition amongmemes in a world with limited attention, Sci. Rep. 2 (335) (2012)1–8.

[12] Twitter follow limit. <http://support.twitter.com/articles/66885-why-can-t-i-follow-people> (March 2014).

[13] Sina Weibo follow limit. <http://help.weibo.com/faq/q/77> (March2014).

[14] S. Khuller, A. Moss, J.S. Naor, The budgeted maximum coverageproblem, Inf. Process. Lett. 70 (1999) 39–45.

[15] H. Kellerer, U. Pferschy, D. Pisinger, Knapsack Problems, Springer,2004.

[16] P. Domingos, M. Richardson, Mining the network value of customers,in: KDD’01: Proceedings of the 9th ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining, 2001.

[17] D. Kempe, J. Kleinberg, E. Tardos, Maximizing the spread of influencethrough a social network, in: KDD’03: Proceedings of the 11th ACMSIGKDD International Conference on Knowledge Discovery and DataMining, 2003.

[18] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, N.Glance, Cost-effective outbreak detection in networks, in: KDD’07:Proceedings of the 13th ACM SIGKDD International Conference onKnowledge Discovery and Data Mining, 2007.

[19] A. Krause, C. Guestrin, Submodularity and its applications inoptimized information gathering, J. ACM Trans. Intell. Syst.Technol. 2 (4) (2011) 1–20.

[20] M. Mondal, B. Viswanath, P. Druschel, K.P. Gummadi, A. Clement, A.Mislove, A. Post, Defending against large-scale crawls in online socialnetworks, in: CoNEXT’12: Proceedings of the 8th InternationalConference on Emerging Networking EXperiments andTechnologies, 2012.

[21] Twitter API limits. <https://dev.twitter.com/docs/rate-limiting>(March 2014).

[22] Sina Weibo API limits. <http://open.weibo.com/wiki/Rate-limiting>(March 2014).

[23] B. Cui, S. Moskal, H. Du, S.J. Yang, Who shall we follow in Twitter forcyber vulnerability? in: SBP’13: The 6th International Conference onSocial Computing, Behavioral-Cultural Modeling, and Prediction,2013.

[24] L. Lovász, Random walks on graphs: a survey, Comb. Paul ErdösEighty 2 (1993) 353–397.

[25] D. Bloom, A birthday problem, Am. Math. Mon. 80 (1973) 1141–1142.

[26] P. Gupta, A. Goel, J. Lin, A. Sharma, D. Wang, R. Zadeh, WTF: the whoto follow service at Twitter, in: WWW’13: Proceedings of the 22edInternational World Wide Web Conference, 2013.

[27] D. Liben-Nowell, J. Kleinberg, The link prediction problem for socialnetworks, in: CIKM’03: Proceedings of the 12th ACM InternationalConference on Information and Knowledge Management, 2003.

[28] L. Backstrom, J. Leskovec, Supervised random walks: predicting andrecommending links in social networks, in: WSDM’11: Proceedingsof the 4th International ACM Conference on Web Search and DataMining, 2011.

[29] D. Yin, L. Hong, X. Xiong, B.D. Davison, Link formation analysis inmicroblogs, in: SIGIR’11: Proceedings of the 34th International ACMSIGIR Conference on Research and Development in InformationRetrieval, 2011.

[30] J. Cheng, D. Romero, B. Meeder, J. Kleinberg, Predicting reciprocity insocial networks, in: SocialCom’11: Proceedings of the 4th IEEEInternational Conference on Social Computing, 2011.

[31] A. Krause, Optimizing Sensing Theory and Applications, Ph.D. thesis,School of Computer Science Carnegie Mellon University, 2008.

[32] W.E. Hart, R. Murray, Review of sensor placement strategies forcontamination warning systems in drinking water distributionsystems, J. Water Resour. Plan. Manage. 136 (2010) 611–619.

[33] M. Minoux, Accelerated greedy algorithms for maximizingsubmodular set functions, Optim. Tech. 7 (1978) 234–243.

[34] N.A. Christakis, J.H. Fowler, Social network sensors for earlydetection of contagious outbreaks, PLoS ONE 5 (9) (2010) 1–8.

[35] L. Sun, K.W. Axhausen, D.-H. Lee, M. Cebrian, Efficient detection ofcontagious outbreaks in massive metropolitan encounter networks,Sci. Rep. 4 (5099) (2014) 1–6.

[36] M. Garcia-Herranz, E.M. Egido, M. Cebrian, N.A. Christakis, J.H.Fowler, Using friends as sensors to detect global-scale contagiousoutbreaks, PLoS ONE 9 (4) (2014) 1–7.

[37] S.L. Feld, Why your friends have more friends than you do, Am. J. Soc.96 (6) (1991) 1464–1477.

[38] J. Ugander, B. Karrer, L. Backstrom, C. Marlow, The anatomy of theFacebook social graph, in: ICWSM’11: Proceedings of the 5thInternational AAAI Conference on Weblogs and Social Media, 2011.

Table A.3Summary of some frequently used notations.

Sign Description

G An undirected graphV ; E;C Sets of nodes, edges and cascadesn;m Number of nodes/edges in Gtuc The time user u joins cascade ctc Start time of cascade csizeðcÞ Size of cascade c; sizeðcÞ ¼ jfu : tuc <1gjS; Sk Sets of selected nodes (after round k)X;Xk Sets of node samples (in round k)OPT An optimal node setF A non-decreasing submodular function, Fð;Þ ¼ 0dsðSÞ Reward gain, i.e., dsðSÞ ¼ FðS [ fsgÞ & FðSÞB Budget, i.e., jSj < BK Number of nodes in OPT;K 6 Bg Cover ratioa A subset contains a fraction items of a setc The scaling exponent of power-law distributionp Confidence probabilitynXða; pÞ Number of samples to guarantee a cover ratiodu Degree of node und Number of nodes of degree d in GI; Id Sets of infected nodes (of degree d) by diffusionsR;Rd Sets of sampled nodes (of degree d) by random walki; id ; r; rd Cardinalities of sets I; Id;R, and Rd

GA Greedy algorithmAG Accelerated greedy [33]CELF Cost-effective lazy forward approach [18]RG Randomized greedyRW Random walk

558 J. Zhao et al. / Computer Networks 75 (2014) 544–559

Page 16: Whom to follow: Efficient followee selection for ...cslui/PUBLICATION/computer_networ… · Whom to follow: Efficient followee selection for cascading outbreak detection on online

[39] Y.-C. Ho, Q. Zhao, Q. Jia, Ordinal Optimization: Soft Optimization forHard Problems, Springer, 2007.

[40] Y.-C. Ho, R.S. Sreenivas, P. Vakili, Ordinal optimization of DEDS,Discrete Event Dyn. Syst.: Theory Appl. 2 (1992) 61–88.

[41] X. Guan, Y.-C. Ho, F. Lai, An ordinary optimization based biddingstrategy for electric power suppliers in the daily energy market, IEEETrans. Power Syst. 16 (4) (2001) 788–797.

[42] T.W.E. Lau, Y.-C. Ho, Universal alignment probabilities and subsetselection for ordinal optimization, J. Optim. Theory Appl. 93 (3)(1997) 455–489.

[43] S. Bikhchandani, D. Hirshleifer, I. Welch, A theory of fads, fashion,custom, and cultural change as informational cascades, J. Polit. Econ.100 (5) (1992) 992–1026.

[44] G. Nemhauser, L. Wolsey, M. Fisher, An analysis of approximationsfor maximizing submodular set functions – I, Math. Programming 14(1978) 265–294.

[45] 476 million Twitter tweets, 2011. <http://snap.stanford.edu/data/twitter7.html>.

[46] L.C. Freeman, Centrality in social networks: conceptual clarification,Soc. Networks 1 (1978) 215–239.

[47] D. Liben-Nowell, J. Kleinberg, Tracing information flow on a globalscale using internet chain-letter data, Proc. Natl. Acad. Sci. USA 105(12) (2008) 4633–4638.

[48] M. Dell, Trafficking networks and the Mexican drug war, in:Proceedings of the 2011 NEUDC Conference, 2011.

[49] R. Ghosh, K. Lerman, T. Surachawala, K. Voevodski, S. Teng, Non-conservative diffusion and its application to social network analysis,in: CoRR 1102.4639, 2011.

[50] A. Barrat, M. Barthelemy, A. Vespignani, Dynamical Processes onComplex Networks, Cambridge University Press, 2008.

[51] B. Ribeiro, P. Basu, D. Towsley, Multiple random walks to uncovershort paths in power law networks, in: NetSciCom’12: The 4th IEEEInternational Workshop on Network Science for CommunicationNetworks, 2012.

[52] H. Jeong, S.P. Mason, A.-L. Barabasi, Z.N. Oltvai, Lethality andcentrality in protein networks, Nature 411 (6833) (2001) 41–42.

[53] S. Lehmann, B. Lautrup, A.D. Jackson, Citation networks in highenergy physics, Phys. Rev. E 68 (2003) 026113.

[54] M. Molloy, B. Reed, A critical point for random graphs with a givendegree sequence, Random Struct. Algor. 6 (1995) 161–179.

[55] S.M. Ross, The inspection paradox, Probab. Eng. Inf. Sci. 17 (2003)47–51.

Junzhou Zhao received the B.S. degree inautomatic control from Xi’an Jiaotong Uni-versity, Xi’an, China, in 2008. He is currently aPh.D. candidate with the Systems EngineeringInstitute and MOE Key Lab for IntelligentNetworks and Network Security, Xi’an Jiao-tong University under the supervision of Prof.Xiaohong Guan. His research interests includeonline social network measurement andmodelling.

John C.S. Lui received the Ph.D. degree incomputer science from UCLA. He is currently aprofessor in the Department of ComputerScience and Engineering at The Chinese Uni-versity of Hong Kong. His current researchinterests include communication networks,networksystem security (e.g., cloud security,mobile security, etc.), network economics,network sciences (e.g., online social networks,information spreading, etc.), cloud computing,large-scale distributed systems and perfor-mance evaluation theory. He serves in the

editorial board of IEEEACM Transactions on Networking, IEEE Transac-tions on Computers, IEEE Transactions on Parallel and Distributed

Systems, Journal of Performance Evaluation and International Journal ofNetwork Security. He was the chairman of the CSE Department from 2005to 2011. He received various departmental teaching awards and theCUHK Vice-Chancellors Exemplary Teaching Award. He is also a core-cipient of the IFIP WG 7.3 Performance 2005 and IEEEIFIP NOMS 2006Best Student Paper Awards. He is an elected member of the IFIP WG 7.3,fellow of the ACM, fellow of the IEEE, and croucher senior research fellow.His personal interests include films and general reading.

Don Towsley holds a B.A. in Physics (1971)and a Ph.D. in Computer Science (1975) fromUniversity of Texas. From 1976 to 1985 hewas a member of the faculty of the Depart-ment of Electrical and Computer Engineeringat the University of Massachusetts, Amherst.He is currently a Distinguished Professor atthe University of Massachusetts in theDepartment of Computer Science. He has heldvisiting positions at IBM T.J. Watson ResearchCenter, Yorktown Heights, NY; LaboratoireMASI, Paris, France; INRIA, Sophia-Antipolis,

France; AT&T Labs-Research, Florham Park, NJ; and Microsoft ResearchLab, Cambridge, UK. His research interests include networks and perfor-mance evaluation. He currently serves as Editor-in-Chief of IEEE/ACMTransactions on Networking and on the editorial boards of Journal of theACM, and IEEE Journal on Selected Areas in Communications, and haspreviously served on numerous other editorial boards. He was ProgramCo-chair of the joint ACM SIGMETRICS and PERFORMANCE 92 conferenceand the Performance 2002 conference. He is a member of ACM and ORSA,and Chair of IFIP Working Group 7.3. He has received the 2007 IEEE KojiKobayashi Award, the 2007 ACM SIGMETRICS Achievement Award, the1998 IEEE Communications Society William Bennett Best Paper Award,and numerous best conference/workshop paper awards. Last, he has beenelected Fellow of both the ACM and IEEE.

Xiaohong Guan received the B.S. and M.S.degrees in automatic control from TsinghuaUniversity, Beijing, China, in 1982 and 1985,respectively, and the Ph.D. degree in electricalengineering from the University of Connecti-cut, Storrs, US, in 1993. From 1993 to 1995, hewas a consulting engineer at PG&E. From 1985to 1988, he was with the Systems EngineeringInstitute, Xi’an Jiaotong University, Xi’an,China. From January 1999 to February 2000,he was with the Division of Engineering andApplied Science, Harvard University, Cam-

bridge, MA. Since 1995, he has been with the Systems EngineeringInstitute, Xi’an Jiaotong University, and was appointed Cheung KongProfessor of Systems Engineering in 1999, and dean of the School ofElectronic and Information Engineering in 2008. Since 2001 he has beenthe director of the Center for Intelligent and Networked Systems, Tsing-hua University, and served as head of the Department of Automation,2003–2008. He is an Editor of IEEE Transactions on Power Systems and anAssociate Editor of Automata. His research interests include allocationand scheduling of complex networked resources, network security, andsensor networks. He has been elected Fellow of IEEE.

J. Zhao et al. / Computer Networks 75 (2014) 544–559 559