Next Article in Journal
GA-Adaptive Template Matching for Offline Shape Motion Tracking Based on Edge Detection: IAS Estimation from the SURVISHNO 2019 Challenge Video for Machine Diagnostics Purposes
Next Article in Special Issue
Adding Edges for Maximizing Weighted Reachability
Previous Article in Journal / Special Issue
Constrained Connectivity in Bounded X-Width Multi-Interface Networks
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Latency-Bounded Target Set Selection in Signed Networks

by
Miriam Di Ianni
1,* and
Giovanna Varricchio
2
1
Dipartimento di Matematica, Università degli Studi di Roma “Tor Vergata”, 00133 Roma, RM, Italy
2
Gran Sasso Science Institute, 67100 L’Aquila, Italy
*
Author to whom correspondence should be addressed.
Submission received: 22 December 2019 / Revised: 27 January 2020 / Accepted: 27 January 2020 / Published: 29 January 2020
(This article belongs to the Special Issue Approximation Algorithms for NP-Hard Problems)

Abstract

:
It is well-documented that social networks play a considerable role in information spreading. The dynamic processes governing the diffusion of information have been studied in many fields, including epidemiology, sociology, economics, and computer science. A widely studied problem in the area of viral marketing is the target set selection: in order to market a new product, hoping it will be adopted by a large fraction of individuals in the network, which set of individuals should we “target” (for instance, by offering them free samples of the product)? In this paper, we introduce a diffusion model in which some of the neighbors of a node have a negative influence on that node, namely, they induce the node to reject the feature that is supposed to be spread. We study the target set selection problem within this model, first proving a strong inapproximability result holding also when the diffusion process is required to reach all the nodes in a couple of rounds. Then, we consider a set of restrictions under which the problem is approximable to some extent.

1. Introduction

The study of diffusion processes is a widely investigated topic in the complex networks setting. It aims at analyzing how local interactions among nearby nodes may lead to the diffusion, possibly over the whole network, of some feature (opinion/information/disease) starting from a limited set of initiator (or seed) nodes. The problem known as Influence Maximization has been introduced by Domingos and Richardson [1,2] for the design of viral marketing campaigns on social networks by using a small (let us say, given) number of initiators (for example by providing a limited set of people free samples of a product to be merchandised), starting from which a cascade is triggered maximizing the overall spreading of information (see also [3,4,5,6,7,8,9]). Dually, the target set selection problem aims at finding out a minimum size set of initiators able to spread the feature over the whole network [3,10,11,12,13,14,15,16,17] or over a large (let us say, given) portion of the network; such a set of initiators is called a target set.
Diffusion processes are usually modeled by graphs in which each vertex may be in one out of two states: informed or unaware. Initially, only nodes in a given set I 0 are informed, while all the others are unaware; while the diffusion process goes on, nodes may change their states according to the diffusion rule of the process. A diffusion rule may be reversible, if changes from informed to unaware are allowed, or irreversible if a node can no longer change its state once it becomes informed. In a discrete diffusion model, nodes (eventually) change their state at discrete time steps. In the rest of this paper, we shall only deal with discrete irreversible diffusion processes.
Several rules to govern the transition from unaware to informed have been proposed, and many papers have studied the dynamics of these systems mostly in stochastic scenarios (see [18,19] and references quoted therein). In the Independent Cascade Model [6,20] an edge-weighted graph is assumed and, as soon as a node u becomes informed, each currently unaware neighbor v of u changes its state to informed with probability equal to the ratio between the weight of arc ( u , v ) and the sum of weights of all arcs incident on u. A deterministic counterpart of this model is that of a Majority Process [21,22,23] in which, at each time step, a vertex changes its state if and only if at least half of its neighbors are in the opposite state.
The Linear Threshold Model [5,6,24,25,26] is based on the association of a threshold θ ( v ) to each node v and of a weight w ( u , v ) to each arc ( u , v ) : node u becomes informed if and only if v N ( u ) I w ( u , v ) θ ( u ) , where N ( u ) is the set of neighbors of u and I is the set of the already informed nodes. In other words, the Linear Threshold Model assumes that any unaware node becomes informed if the weight of its informed neighbors is above a certain threshold (i.e., the node is subject to a large enough amount of “social pressure”). In [25,27] a special case of the Linear Threshold Model is considered, in which all arc weights are 1 and all nodes have the same threshold θ ; in this case, the threshold value just stands for the number of neighbors that have to be informed in order to induce a node to become informed. In that paper, the authors prove that deciding if a graph has a target set of size d is an NP-complete problem for θ 3 . Chen [13] then strengthened such result by showing the NP-hardness of the problem even for θ = 2 and proved that, in the same hypothesis, no polynomial-time algorithm exists with approximation factor better than O ( 2 log 1 ϵ | V | ) also when all nodes have constant degrees, unless NP D T I M E ( n p o l y l o g n ) ; in the same paper a polynomial-time algorithm to find an optimal solution has been provided when the underlying graph is a tree. Other interesting cases in which the problems become tractable are studied in [16]. In [3], Ben-Zwi et al. proved that the problem can be solved in time O ( M w | V | ) where M is the maximum threshold value and w is the treewidth of the graph: since M cannot exceed the maximum node degree, this proves that the problem is fixed-parameter tractable if parametrized with respect to both treewidth and the maximum node degree of the graph.
The aforementioned papers did not consider the issue of the number of time steps necessary for the feature diffusion. However, this is a relevant point in many settings: in viral marketing, for instance, it is quite important to spread information quickly. Indeed, research in Behavioural Economics shows that humans make decisions mostly on the basis of very recent events [28,29]; furthermore, marketing strategies are more effective when the time needed to reach all the target individuals is short. Hence, it is a worthwhile goal to study diffusion processes while taking into account the number of time steps within which it is required to have all the nodes informed and, actually, this topic has already received some attention. Indeed, as pointed out by the authors, the inapproximability result proved in [13] for general graphs still holds when the diffusion process is required to end in a bounded number of time steps (16 time steps, in fact). In [24] a polynomial-time algorithm spreading a feature over a set of required size within a constant number of time steps in graphs of bounded clique-width has been proposed. Following [24], in this paper, diffusion processes with an available fixed number of time steps within which informing all the nodes will be called latency-bounded diffusion processes.
All diffusion rules considered so far assume that nodes are always positively influenced by their neighbors, that is, any node always has increased its support in favor of the feature being spread throughout the network whenever one of its neighbors becomes informed. However, in most network settings also negative link effects are to be considered.
One way to take into account negative feedbacks is that pursued in [30,31,32,33] where it is assumed that individuals may also develop a negative opinion about the feature to be spread and, in this case, they may negatively influence their neighbors. In [30] a generalization of the Independent Cascade model is proposed in which each initiator turns positive (experiencing good quality of the feature) with probability q and turns negative (disliking the feature) with probability 1 q , and then, at each time step, a node having become positively informed in the previous step tries to inform each of its unaware neighbors: if successful (with success probability p) the neighbor becomes positively informed with probability q and negatively informed with probability 1 q ; meanwhile, a negatively informed node in the previous step tries to negatively inform its unaware neighbors, and if successful the neighbors become negatively informed. In [33], instead, a generalization of the Linear Threshold model is proposed in which each node (which can be inactive, positively active or negatively active) v has a belief score r ( v ) (measuring the amount of trust that the node places on its own judgment) and a threshold θ ( v ) , and each arc has a weight w ( u , v ) ; a node is activated the first time the sum of weights from its active neighbors plus its own belief score exceeds its threshold and, after being activated, the node decides on its attitude (positive or negative) based on the ratio between the positive influence (sum of weights from positively activated friends) and negative influence (sum of weights from negatively activated friends).
A different approach to negative feedbacks is tackled in [34,35] taking into account the possibility that some relations between individuals are ruled by, for instance, antagonism and distrusting (see [36] and references quoted therein). Actually, in all papers cited so far, it is assumed that nodes always trust their neighbors and, hence, they get support in favor to accept the feature by their neighbors having a positive opinion about it and they get support in favor to discard the feature by their neighbors having a negative opinion about it. Conversely, it is now assumed that node opinions about the feature to be spread are always positive but that receiving positive feedback from an untrusted/antagonist neighbor results in increasing the support to discard the feature. Ahmed et al. [34] presented a new threshold model to incorporate positive and negative influences among individuals in which the effect of negative influence is the tendency of individuals in not adopting a product adopted by their opponent: each arc ( u , v ) has a weight p ( u , v ) [ 0 , 1 ] , each node v has a couple of threshold values, θ + ( v ) and θ ( v ) and, at any time step, if S + and S are, respectively, the sets of the trusted and untrusted active neighbors of v at that time step, v becomes active if 1 Π u S + ( 1 p ( u , v ) ) > θ + ( v ) and 1 Π u S ( 1 p ( u , v ) ) < θ ( v ) . In [35], echoing the principles that “the friend of my enemy is my enemy” and “the enemy of my enemy is my friend”, a reversible model is presented in which positive relationships carry the influence in a positive manner, i.e., you would more likely trust and adopt your friends’ opinions, while negative relationships often carry influence in a reverse direction (if your foe chooses one opinion or votes for one candidate, you would more likely be influenced to do the opposite): at each step, every node randomly picks one of its neighbors, and if the arc from this neighbor is positive the node adopts the neighbor’s decision (to accept the feature or not), while if the edge is negative the node adopts the opposite of the neighbor’s decision.
In [37,38] the two approaches (positive/negative opinions and positive/negative relationships) are jointly considered. In [37], an extension of the independent cascade model is proposed in which each node u has an opinion o u [ 1 , 1 ] , each link ( u , v ) has a probability of interaction φ u , v [ 0 , 1 ] and a probability of activation p ( u , v ) : as soon as u becomes active, it gets a unique chance of turning v active with probability p ( u , v ) ; if v is activated by u, then the probability that v gets informed with the same orientation of u is φ u , v , and the probability that v gets informed with the opposite orientation is 1 φ u , v . In [38] another extension of the independent cascade model is introduced in which nodes may be in one of the three states: positively active, negatively active or inactive; when node v becomes somehow active, it tries to activate each one of its inactive neighbor nodes with its same opinion (positive if it is positively active or negative if it is negatively active) in the case its relation with that neighbor is positive, with opposite opinion in the case its relation with that neighbor is negative.
The interest of most of the cited papers is in the Influence Maximization problem with the goal, in case positive/negative opinions are considered, of maximizing the spread of positive opinions. We also notice that most of the proposed models taking into account negative feedback effects are stochastic.
In this paper we follow the same approach to negative feedback effects as in [34,35], introducing a deterministic diffusion model in which nodes’ opinions about the feature to be spread are always positive but the relationships between nodes may be positive or negative. In more detail, we consider a generalization of the Linear Threshold Model in which the set of neighbors of each node is partitioned into two subsets: one subset of trusty neighbors (or friends), containing the neighbors able to positively influence the node, and one subset of unreliable neighbors (or enemies), containing the neighbors able to negatively influence the node. Informally speaking, in our model an unaware node becomes informed at some time step only if at that time step the cumulative influence coming from its informed trusty neighbors is at least as large as the node threshold, and at that time step as well as at any previous time step the cumulative influence coming from its informed unreliable neighbors is less than the node threshold. Notice that, as in [30], positive and negative influences are slightly asymmetric in that negative feedback effects are more powerful than positive ones in influencing a node: indeed, in [30] a negatively informed node always tries to negatively inform its unaware neighbors (while there is a chance that a node gets negatively informed by a positively informed neighbor), and in our model an unaware node will never become informed if at some time step the cumulative influence from its enemies exceeds the threshold (also if in the same time step the cumulative influence from its friends exceeds the threshold too). In fact, several studies in social psychology (e.g., [39,40,41,42]) point out that negative impact is usually stronger and much more dominant than positive impact in shaping people’s decisions. Notice also that our rule according to which an unaware node becomes informed is quite similar to that in [34], discussed above (although [34] deals with the Influence Maximization problem). The main difference between the two rules is that, while the rule herein defined directly generalizes that in in the Linear Threshold model in its considering the cumulative amount of information reaching an unaware node (i.e., we sum up the weights of informed neighbors), the rule in [34] is somehow related to that in the Independent Cascade model: in fact, in that paper, the function associated to the set S + of the informed friends (and similarly as to the informed enemies) is 1 Π u S + ( 1 p ( u , v ) ) which denotes the probability of accepting, let’s say, the suggestion coming from at least one informed friend in the hypothesis of independent probabilities of accepting the suggestion from any of them.
Within this setting, we consider a problem that is closely related to that studied in [24], that is, computing a minimum size set able to spread a feature to all the network nodes within a given number k of time steps. We shall call such a set a k-target set.

2. Results and Discussion

After providing the formal definitions in Section 3, in Section 4 we prove that computing both a minimum size 2-target set and a minimum size target set (of unbounded latency) with respect to our diffusion rule is Min Horn Deletion-complete with respect to a reduction preserving approximability properties of (NPO) optimization problems (we shortly and informally recall that a problem P is Q -complete with respect to some reduction α , for some problem Q , if P is α -reducible to Q and P is α -reducible to Q . If this happens, for any property π preserved by α , P satisfies π if and only if Q satisfies π . Needless to say, P is Q -complete if and only is Q is P -complete). Hence, the two problems are both contained in the class poly-APX and NP-hard to approximate to within 2 log 1 ϵ | V | for any ϵ > 0 , also when node thresholds and arc weights are all equal to 1, that is, when the diffusion rule is a direct generalization of the one in [25].
In Section 5, we start the study of the problem in which a minimum size 1-target set has to be computed. Such a problem is trivially Set Cover-hard also when node thresholds and arc weights are all equal to 1. We start by showing that the same reduction used to upper bound the complexity of the unbounded latency and of the latency 2 cases actually yields a ( Δ + + 1 ) -approximation for the latency 1 diffusion processes, where Δ + is the maximum in-degree in the graph of the positive relations. We notice that the ( Δ + + 1 ) -approximation does not depend in any way on the topology of the graph of the negative relations.
The study of the way the complexity of the search for 1-target sets is related to the topology of the graph of the negative relations is started in Section 5.1: we first show the problem is in PO when restricted to instances such that the graph of the negative relations is a generalized chain (that is, the graph obtained by replacing each of its strongly connected components by a node is a directed chain), then we get a non-polynomial time ( log | V | + 1 ) -approximation algorithm for general graph by reducing to weighted Set Cover. Finally, we show that such algorithm runs in polynomial time when the graph of the negative relations is a generalized source tree, that is when the graph obtained by replacing its strongly connected components by nodes is a source tree, thus yielding a polynomial-time ( log | V | + 1 ) -approximation algorithm for generalized source trees. It is worthwhile to remark that the results in Section 5.1 hold whatever topology of the graph of the positive relations is considered.
We observe that the study of diffusion processes of duration 1 is also of some interest in the graph-theoretic setting. In fact, the search for a minimum 1-target set with respect to the Linear Threshold rule can be seen also as the search for some kind of dominating set. As an example, 1-target sets with respect to the diffusion rule in [25], in which an unaware node becomes informed as soon as θ of its neighbors are informed, are just θ -dominating sets [43]. Similarly, 1-target sets with respect to our unweighted diffusion rule correspond to a sort of dominating sets with constrained pairs: given a graph G = ( V , E ) and a set C of pairs of nodes, a constrained dominating set is D V of nodes such that i) for any u V D there is v V such that ( v , u ) E and ii) for any ( u , v ) C either u D and v D or u D and v D .

3. Model and Problems Definitions

A signed graph G = ( V , A + A ) is the overlapping of two directed graphs, G + = ( V , A + ) and G = ( V , A ) , over the same set of nodes. For an example of the definitions to follow, refer to Figure 1.
For any u V , we denote as N i n + ( u ) and N i n ( u ) , respectively, the sets of in-friends and of in-enemies of u, that is, the in-neighbors of u in G + and in G :
N i n + ( u ) = { v V : ( v , u ) A + } and N i n ( u ) = { v V : ( v , u ) A } .
Similarly, for each u V , we define the sets of out-friends and out-enemies of u as
N o u t + ( u ) = { v V : ( u , v ) A + } and N o u t ( u ) = { v V : ( u , v ) A } .
A path in G + between any pair of nodes in V is called a positive path and D + denotes the maximum length of a shortest positive path. For u V , we denote as π + ( u ) the set of nodes such that, for any v π + ( u ) , G contains a positive path from v to u and, for v π + ( u ) , as d + ( v , u ) the length of a shortest positive path in G from v to u. Finally, for u V and V V ,
d + ( V , u ) = min { d + ( v , u ) : v V π + ( u ) } if V π + ( u ) , D + + 1 otherwise .
Negative paths, D , π ( u ) , d ( u , v ) and d ( V , u ) are defined similarly.
Let θ : V N + and w : A + A N + be, respectively, a node-weight and an arc-weight function. A set I 0 V of initially informed nodes (all the remaining nodes in V I 0 being unaware) may eventually start a ( θ , w ) -diffusion process: at time step 1 any node u V I 0 becomes informed if the cumulative weight of its in-friends is at least θ ( u ) while the cumulative weight of its in-enemies is less than θ ( u ) , that is
v N i n + ( u ) I 0 w ( v , u ) θ ( u ) and v N i n ( u ) I 0 w ( v , u ) < θ ( u ) ;
We denote as I 1 the set of nodes becoming informed at time step 1.
Conversely, if the cumulative weight of u’s in-enemies is at least θ ( u ) , then the negative influence that u receives from N i n ( u ) will induce it to remain in the unaware state forever, that is, at any successive time step u will never become informed. We say u becomes refractory. Needless to say, if neither the cumulative weight of u’s in-friends nor the cumulative weight of u’s in-enemies reaches θ ( u ) , u does not change its state.
Inductively, if I j denotes the set of nodes becoming informed at time step j, an unaware node u V j = 0 t 1 I j becomes refractory at time step t > 1 if
v N i n ( u ) I 0 I 1 I t 1 w ( v , u ) θ ( u ) ,
while it becomes informed if (1) does not hold and
v N i n + ( u ) ( I 0 I 1 I t 1 ) w ( v , u ) θ ( u ) .
A set I 0 V is a target set for G = ( V , A + A ) , θ , w if t 0 I t = V . Needless to say, the size of a target set I 0 V is | I 0 | .
The Signed Target Set Selection problem (STSS) asks for computing a minimum size target set for a given signed graph G = ( V , A + A ) with node- and arc-weight functions θ and w. The Unweighted Signed Target Set Selection problem (USTSS) is the restriction of STSS in which all node- and arc-weights equal 1.
Notice that, if I t = for some t 0 , then I s = for all s > t . The latency of a diffusion process is, therefore, defined as the integer t N + such that I t and I t + 1 = . The t-TSS (t-USTSS) problem asks for computing minimum size target sets yielding diffusion processes of latency t.

4. Complexity of Approximation of USTSS and 2-USTSS

We shortly recall that an A-reduction (see [44]) is a reduction between a pair of (NPO) optimization problems transforming (in polynomial time) instances of a problem P to instances of a problem Q so that a solution for an instance x P of P can be recovered in polynomial time from a solution x Q of the corresponding instance of Q and, for some α > 0 , a r-approximate solution for x Q is a α r -approximate solution for x P . Informally speaking, A-reductions preserve the approximability properties of (NPO) optimization problems. In this section, we shall prove that 2-USTSS and USTSS are both Min Horn Deletion-complete with respect to A-reductions. Such a result will follow by a couple of A-reductions involving the weakly positive-minimum ones problem proved to be Min Horn Deletion-complete with respect to A-reductions in [44].
In more detail, we first A-reduce the weakly positive-minimum ones problem to 2-USTSS in Section 4.1, and this together with the results in [44], and Lemmas 1 and 2, will prove the following theorem.
Theorem 1.
For any ϵ > 0 , 2-USTSS (and, hence, USTSS) is NP-hard to approximate to within 2 log 1 ϵ | V | .
Then, in Section 4.2 we A-reduce USTSS to weakly positive-minimum ones in order to get the Min Horn Deletion-completeness of both USTSS and 2-USTSS. In turn, this implies that 2-USTSS and USTSS are in poly-APX.
Let X = { x 1 , , x n } be a set of boolean variables; a set of clauses (i.e., disjunction of literals) f = { c 1 , , c m } on X such that, for each c j f , c j contains at most one negative variable is said weakly positive. If f is a set of weakly positive clauses, a clause in f will be called positive if all literals it contains are positive variables, and it will be called negative if it contains one negated variable.
An instance of weakly positive-minimum ones is a pair X , f , where X = { x 1 , , x n } is a set of boolean variables and f = { c 1 , , c m } is a weakly positive set of clauses; the weakly positive-minimum ones problem asks for computing a minimum size subset of X to be set to true in order to satisfy all clauses in f.
In what follows, with a slight abuse of notation, we shall sometimes write x i c j ( ¬ x i c j ) as a shorthand to mean that x i ( ¬ x i ) is a literal of clause c j (so that c j is considered as a set of literals, instead of their disjunction). We shall say that a variable x i is positively contained in a clause c j if x i c j , and that x i is negatively contained in c j if ¬ x i c j .
Let X , f be an instance of weakly positive-minimum ones; without loss of generality, in what follows we shall always assume that at least one clause in f is positive (otherwise all clauses in f would be satisfied by setting to true no variable in X) and that each clause in f contains at least a couple of variables (one of which positive). Indeed, if some clause in f consists of a single positive variable then such variable has to be necessarily set to true in order to satisfy f, and a smaller set of clauses f can be derived by removing from f all clauses containing that variable and an optimum solution for f is obtained by adding the variable to an optimum solution for f . Similarly, if some clause in f consists of a single negative variable then such variable has to be necessarily set to false in order to satisfy f, and a smaller set of clauses f can be derived by removing from f all clauses containing that negative variable and an optimum solution for f is an optimum solution for f . Hence, f is satisfied by assigning true to all the n variables in X, and f is not satisfied by assigning false to all the n variables in X.

4.1. weakly positive-minimum ones A 2-USTSS

We now derive from an instance X , f of weakly positive-minimum ones a signed network G = ( V , A + A ) (see Figure 2):
  • we set V = V X V X ¯ V f , where V X = { u i : x i X } , V X ¯ = { u i ¯ : x i X } and V f = { v j : c j f } ;
  • for each x i X , ( u i , u i ¯ ) is an arc in A + and ( u i ¯ , u i ) is an arc in A ;
  • for each u i , u j V X , ( u i , u j ) is an arc in A + and ( u j , u i ) is an arc in A + (that is, nodes in V X form a clique of positive arcs);
  • for each clause c j and for each x i positively contained in c j , ( u i , v j ) is an arc in A + and ( v j , u i ) is an arc in A ;
  • if c j is a negative clause and ¬ x h is its negative variable, then ( u ¯ h , v j ) is an arc in A ;
  • if c j f is a positive clause then, for any x i X { x k : x k c j } , ( u ¯ i , v j ) is an arc in A .
Needless to say, computing G requires polynomial time in | f | .
The next lemma proves that it suffices to search in V X for a target set for G.
Lemma 1.
For any target set I V for G there exists a target set I 0 for G such that | I 0 | | I | and I 0 V X .
Proof. 
Recall that each clause in f contains at least one positive variable.
Let I V be a target set for G. Notice that, since all in-friends of any node in V X are contained in V X (that is, N i n + ( u ) V X for any u V X ), then nodes in V X can get informed by nodes in V X only; consequently, it must be I V X .
Suppose there exists i { 1 , , n } such that u ¯ i I : since ( u ¯ i , u i ) A , it must be u i I (or u i could not be informed, contradicting that I is a target set). On the other hand, since ( u i , u ¯ i ) A + and N i n ( u i ¯ ) = , u i is able to inform u ¯ i . Finally, since N o u t + ( u i ¯ ) = , u ¯ i is unable to inform any node, this proves that I { u ¯ i } is still a target set for G. So, I 1 = I V X ¯ is a target set for G.
Similarly, if there exists v j V f I 1 , then, since ( v j , u i ) A for any x i X positively contained in c j , I 1 is a target set for G only if u i I 1 . On the other hand, since ( u i , v j ) A + , since N i n ( v j ) V X ¯ , and since I 1 V X ¯ = , then u i is able to inform v j . Since N o u t + ( v j ) = , v j is unable to inform any other node, and, hence, I 1 { v j } is still a target set for G, and so is I 0 = I 1 V f . □
The next lemma shows that the construction defined in this subsection is actually an A-reduction, so completing the proof that weakly positive-min ones A USTSS.
Lemma 2.
For any k N + , with 1 k n , f is satisfiable by assigning true to k variables in X if and only if there exists a target set for G of size k.
Proof. 
Suppose f is satisfiable by the truth assignment a assigning true to k 1 variables in X. We show that the set I 0 = { u i V X : a ( x i ) = true } is a target set for G.
We start by noticing that all nodes in V X I 0 become informed at time step 1, and that all nodes in V X ¯ become informed at time step 1 or 2 so that they cannot negatively influence any node at time step 1. Since a satisfies f, any positive clause c j contains a (positive) variable x i such that a ( x i ) = true ; hence, u i I 0 and v j becomes informed at time step 1. Hence, all nodes in V f corresponding to positive clauses become informed at time step 1.
Let c j be a negative clause and let u h be its negative variable: a satisfies c j either by assigning false to u h or by assigning true both to its negative variable and to at least one of its positive variables. In the former case, u ¯ h becomes informed at time step 2 and, since all nodes corresponding to positive variables in c j become informed at time step 0 or 1 (whether they are in I 0 or not), it cannot forbid v j to get informed at time step 2. In the latter case, both v j and u h become informed at time step 1 so that u ¯ h cannot forbid v j to get informed.
Hence, all nodes in G are informed (by time step 2), that is, I 0 is a target set for G, and | I 0 | = k .
Conversely, let I 0 V be a target set for G. By Lemma 1, we can assume I 0 V X .
a ( x i ) = true if u i I 0 , false if u i I 0 .
Let c j be a positive clause in f. If, u i I 0 for any x i c j , then v j could become informed only at time step 2; since I 0 V X , then there exists u I 0 c j so that u ¯ is informed at time step 1 and, since ( u ¯ , v j ) A , it would forbid v j to become informed, contradicting that I 0 is a target set. Hence, for any positive clause c j in f there exists x i c j such that a ( x i ) = true .
Let c j be a negative clause in f, let x h be its negative variable and let x j 1 , , x j q be its positive variables. If a ( x j i ) = false for any i = 1 , , q , and, hence, { u j 1 , , u j q } I 0 = , then, as already noticed, v j could become informed only at time step 2. In this case it must be u h I 0 : indeed, if u h I 0 then u ¯ h would get informed at time step 1 and, since ( u ¯ h , v j ) A , this would forbid v j to become informed, so contradicting that I 0 is a target set for G. Hence, if a ( x j i ) = false for any 1 i q , then it must be a ( x h ) = false too.
Summarizing, a satisfies each clause in f, that is, a satisfies f, and a assigns true to | I 0 | variables. □
We finally observe that the latency of any cascade occurring in the signed graph in the reduction here described is at most 2. This proves that, for any t 2 , t-USTSS is min Horn Deletion-hard.

4.2. USTSS A weakly positive-minimum ones

We now derive from a signed graph G = ( V , A + A ) a set f G of weakly positive clauses.
Before proceeding, we need a preliminary lemma.
Lemma 3.
A set I 0 V is a target set for G = ( V , A + A ) if and only if for any u V I 0
  • π + ( u ) I 0 , and
  • for any v N i n ( u ) , it holds that d + ( I 0 , u ) d + ( I 0 , v ) .
Proof. 
We start by noticing that, since node thresholds and arc weights are all equal to 1, the diameter D + of G + upper bounds the latency of any diffusion process in G: indeed, for any u V , if any of the u’s neighbors is informed at time step t, either u becomes informed at time step t + 1 or it will never become informed. As a consequence, for any target set I 0 and for any u V , u may become informed at time step t D + only if d + ( I 0 , u ) = t .
Suppose I 0 V is a target set for G; hence, V I 0 can be partitioned into at most D + subsets I 1 , , I D + such that all individual-nodes in I t become informed at time step t, for any 1 t D + . This implies that, for any t = 1 , , D + and for any u I t , d + ( I 0 , u ) = t and, hence, π + ( u ) I 0 .
Let u I t , for some t = 1 , , D + : if there exists v N i n ( u ) I s for some s t 1 , v would forbid u to get influenced at time step t. Hence, for any v N i n ( u ) , it must hold that v s t I s , that is, d + ( I 0 , u ) d + ( I 0 , v ) . This proves the first part of the assertion.
Conversely, suppose that, for any u V I 0 , π + ( u ) I 0 and, for any v N i n ( u ) , it holds that d + ( I 0 , u ) d + ( I 0 , v ) . For any 1 t D + , denote as V t the set of nodes u V I 0 such that d + ( I 0 , u ) = t . Since for any node u V 1 , N i n ( u ) I 0 = by hypothesis, all nodes in V 1 are influenced at time step 1. Inductively, it can then be proved that, for any t D + , all nodes in V t , are influenced at time step t. This proves that I 0 is a target set for G. □
To model G = ( V , A + A ) by a weakly positive set of clauses f G , we start by defining the set X = { x u : u V } of boolean variables, each of which witnesses whether the corresponding node is initially informed or not. Then, we describe the set of clauses defining f G , which is partitioned into a set P of positive clauses and a set Q of negative clauses: that is, f G = P Q .
Let u be any node and let π + ( u ) be the set { v 1 , , v j } . P contains a single clause c u associated to u which models the requirement that u is initially informed or it can become informed in a further step:
c u = x u x v 1 x v 2 x v j .
Similarly, for any u V , Q contains a set Q u of clauses associated to u, modeling the requirement that u is initially informed or it can become informed earlier than any node in N i n ( u ) . For each v N i n ( u ) , Q u contains the clause
( ¬ x v x u )
and, for each 1 t D + and for each z π + ( v ) such that d + ( z , v ) = t , Q u contains the clause
( ¬ x z x u x w 1 x w 2 x w k ) ,
where { w 1 , w 2 , , w k } = { w V : d + ( w , u ) t } .
Summarizing, f G = P Q , with P = { c u : u V } and Q = u V Q u . Needless to say, f G is computable in polynomial time from G. Furthermore, there is a one-to-one correspondence among subsets of V and truth assignments for X: for any V V , we denote as a V the truth assignment corresponding to V , that is,
a V ( x u ) = true if   u V , false if   u V V .
The next lemma proves that the just described construction is actually an A-reduction from USTSS to weakly positive-minimum ones.
Lemma 4.
Let G = ( V , A + A ) be a signed graph. I 0 V is a target set for G if and only if the truth assignment a I 0 satisfies f G .
Proof. 
Let I 0 V be a target set for G.
For any u I 0 , since x u c u and, for any clause c Q u , x u c , then a I 0 satisfies c u and every clause in Q u .
For any u V I 0 , since I 0 is a target set for G, then, by Lemma 3, π + ( u ) I 0 : let z u π + ( u ) I 0 be such that d + ( z u , u ) = min { d + ( w , u ) : w π + ( u ) I 0 } . By construction, x z u c u , and, hence, c u is satisfied by a I 0 . Furthermore, for any v N i n ( u ) , let y v π + ( v ) I 0 be such that d + ( y v , v ) = min { d + ( w , v ) : w π + ( v ) I 0 } : by Lemma 3, for any v N i n ( u ) , d + ( z u , u ) d V ( y v , v ) and, hence, for any v N i n ( u ) , and for any w π + ( v ) I 0 , x z u is contained in every clause in Q u containing ¬ x w . As a consequence, every clause c Q u containing ¬ x w as its negative variable such that a I 0 ( x w ) = true , also contains x z u ; since z u I 0 , a ( x z u ) = true and, hence, c is satisfied by a I 0 . This proves that every clause c Q u containing ¬ x w as its negative variable such that a ( x w ) = false is satisfied by a.
In conclusion, for any u V , a I 0 satisfies c u and all clauses in Q u .
Conversely, suppose a I 0 satisfies f G . For any u V I 0 , since a I 0 satisfies c u , there must exist at least one node z π + ( u ) such that a ( x z ) = true and, hence, z I 0 . This proves that π + ( u ) I 0 .
Furthermore, for any u V I 0 and v N i n ( u ) , and for any y π + ( v ) I 0 (that is, a I 0 ( x y ) = true and v may become informed by a path from y), any clause in Q u containing ¬ x y has also to contain a positive variable x z such that a I 0 ( x z ) = true . By construction of the clauses in Q u , this implies that d + ( z , u ) d + ( y , v ) , that is, d + ( I 0 , u ) d + ( I 0 , v ) .
By Lemma 3, this proves that I 0 is a target set for G. □

5. The 1-USTSS Problem

The 1-USTSS problem is trivially Set Cover-hard: actually, a dominating set of a graph G = ( V , E ) is also a 1-target set for the signed graph G = ( V , A + A ) where A + = { ( u , v ) , ( v , u ) : { u , v } E } and A = . Hence, 1-USTSS is non-approximable within c log | V | for some c > 0 .
In the remainder of this section, we study the approximability of 1-USTSS.
We start by noticing that if a diffusion process of latency 1 is required to occur, then the A-reduction described in Section 4.2 yields a weakly positive set of clauses such that all its negative clauses have size 2 (that is, they contain exactly one positive literal and one negative literal). In fact, it directly follows from Lemma 3 that I 0 V is 1-target set for a signed graph G = ( V , A + A ) if and only if for any u V I 0
  • N i n + ( u ) I 0 , and
  • for any v N i n ( u ) , it holds that v V I 0 .
As a consequence, for any u V the set of the negative clauses associated to u (as defined in Section 4.2) is
Q u = { ( ¬ x v x u ) : v N i n ( u ) } .
This proves that the A-reduction shown in Section 4.2 works also as an A-reduction from 1-USTSS to weakly positive minimum ones such that the set of clauses corresponding to a signed graph, besides being weakly positive, has all its negative clauses of size 2. In [44] it is shown that the weakly positive minimum ones problem is B-approximable when restricted to such instances, where B is the maximum size of a positive clause in the set.
The size of the positive clauses in the set f G described in Section 4.2 is very large: for u V , | c u | = 1 + | π + ( u ) | , since c u had to state that u is in I 0 or there exists some node in I 0 connected to u by a path (of any length). However, when diffusion processes of latency 1 are to be described, f G can be slightly modified in order to decrease the size of its positive clauses: more precisely, condition a above implies that, for each u V , c u = x u x v 1 x v j where { v 1 , , v j } = N i n + ( u ) , that is, | c u | = | N i n + ( u ) | + 1 .
Hence, by denoting as Δ + the maximum in-degree of a node in G + , that is, Δ + = max { | N i n + ( u ) | : u V } , the next theorem follows from Lemma 4, from definition (3) and from the already cited result in [44].
Theorem 2.
The 1-USTSS problem is ( Δ + + 1 ) -approximable, where Δ + = max { | N i n + ( u ) | : u V } .
We remark that the result in Theorem 2 only depends on the topology of G + , no matter which is the topology of G . Throughout the next subsection we shall follow the opposite way, that is, we shall study the complexity of 1-USTSS in relation to the topology of G , no matter which is the topology of G + .

5.1. 1-USTSS and G

Let G = ( V , A + A ) be a signed graph. Notice that any I V is a target set for G only if, for each u I , it holds that N o u t ( u ) I . In turn, if I is a target set for G containing u and, hence, N o u t ( u ) , then I must contain also N o u t ( v ) , for any v N o u t ( u ) . More precisely, if we define, for each u V , the set E ( u ) containing u and all the nodes reachable from u by a path in G , that is,
E ( u ) = { u } { v V : u π ( v ) } ,
then the next fact holds, which follows from the previous observation by a simple inductive argument.
Fact 1: If I V is a target set for G = ( V , A + A ) then, for any u I , E ( u ) I .
Observe now that, if G is strongly connected, then, for any u V , it holds that E ( u ) = V ; hence, by Fact 1, we get
Fact 2: If G is strongly connected, then the only target set for G (no matter about its latency) is V.
For any E V , we define the set
S ( E ) = E { u V : d + ( E , u ) = 1 } = E { u V : z E N i n + ( u ) } ,
that is, the set of nodes that are or may become informed within time step 1 whenever all nodes in E are contained in the set of the initially informed nodes.
Lemma 5.
I V is a 1-target set for G = ( V , A + A ) if and only if S ( I ) = V and, for any u I , E ( u ) I .
Proof. 
If I V is a 1-target set for G = ( V , A + A ) , then, trivially, S ( I ) = V and, by Fact 1, for any u I , E ( u ) I .
Conversely, suppose that S ( I ) = V and, for any u I , E ( u ) I . Then, for any node x V I ,
  • since S ( I ) = V , there exists y I such that ( y , x ) A + (that is, y may inform x at time step 1) and, furthermore,
  • since for any u I , E ( u ) I , then, for any z V such that ( z , x ) A , since x π ( z ) and x I , z I (that is, any node that could forbid x to become informed is not in I). □
Lemma 5 allows us to prove membership to PO of 1-USTSS when restricted to chain and generalized chain graphs. The chain graph over the node set V = { v 1 , , v n } is made of the set of arcs { ( v j , v j 1 ) : j = 2 , , n } . A generalized chain graph consists of a set C 1 , , C n of strongly connected components linked to each other in a chain-like topology, that is, for any j = 2 , , n 1 and for any u C j , arc ( u , v ) exists only if v C j 1 .
Theorem 3.
The 1-USTSS problem restricted to instances G = ( V , A + A ) such that G = ( V , A ) is a chain or a generalized chain graph is in PO.
Proof. 
If G is a chain, that is, V = { v 1 , , v n } and A = { ( v j , v j 1 ) : j = 2 , , n } , then E ( v 1 ) = { v 1 } , E ( v 2 ) = { v 1 , v 2 } = { v 2 } E ( v 1 ) and, in general, for i 2 , E ( v i ) = { v i } E ( v i 1 ) . Hence, E ( v 1 ) E ( v n ) .
Correspondingly, S ( E ( v 1 ) ) S ( E ( v n ) ) : indeed, for any i = 1 , , n 1 ,
S ( E ( v i ) ) = E ( v i ) { u V : z E ( v i ) N i n + ( u ) } E ( v i + 1 ) { u V : z E ( v i + 1 ) N i n + ( u ) } .
As a consequence, by Lemma 5, E ( v m ) is a minimum size 1-target set for G, where m = min { j { 1 , , n } : S ( E ( v j ) ) = V } .
Let G be a generalized chain and let C 1 , , C n be its strongly connected components. As already stated in the observation leading to Fact 2, for any j = 1 , , n and for any u , v C j , it holds that E ( u ) = E ( v ) : hence, in what follows we shall use the notation E j to refer to any set E ( u ) for u C j .
By the same argument holding for chain graphs, for any j = 1 , , n , we get that E j contains all nodes in any C i with i j . Hence, again by a similar reasoning to that holding in the chain case, since E 1 E n , we get that E m is a minimum size 1-target set for G, where m = min { j { 1 , , n } : S ( E j ) = V } . □
Lemma 5 shows that any 1-target set is actually obtained by choosing a subcollection of sets in the collection E = { E ( u ) : u V } . We now introduce the collection E ¯ as the closure of E under non-empty intersections: that is, E E ¯ , and, for each E 1 , E 2 E ¯ such that E 1 E 2 , E 1 E 2 E ¯ .
The introduction of E ¯ allows us to describe any target set for G as the union of pairwise disjoint subsets, that is:
Fact 3: For any target set I for G = ( V , A + A ) , there exists B E ¯ such that I = B B B and, for any B 1 , B 2 B , B 1 B 2 = .
Based on fact 3, we now show how to get in over polynomial time a ( 1 + log | V | ) -approximate solution for 1-USTSS by a (non-polynomial-time) reduction from 1-USTSS to minimum Weighted Set Cover (WSC) and by the ( 1 + log | V | ) -approximation algorithm for WSC [45]. Later in this section, we shall discuss cases in which the procedure overall runs in polynomial time.
Recall that an instance of WSC is a triple X , S , w where S 2 X , S S S = X , and w : S N + ; the goal is finding a minimum weight set C S such that C C C = X , where the weight of C is defined as w ( C ) = C C w ( C ) .
Let G = ( V , A + A ) be a signed graph; the corresponding instance X G , S G , w G of WSC is obtained by setting X G = V , S G = { S ( E ) : E E ¯ } and, for each E E ¯ , w G ( S ( E ) ) = | E | .
Lemma 6.
Let G = ( V , A + A ) be a signed graph and E 1 , , E k E ¯ ; I 0 = j = 1 k E j , is a 1-target set for G if and only if C = { S ( E 1 ) , , S ( E k ) } is a set cover for X G . Furthermore, if E 1 , , E k are pairwise disjoint then | I 0 | = w G ( C ) .
Proof. 
Let E 1 , , E k be elements of E ¯ and let I 0 = j = 1 k E j . By definition, I 0 is a 1-target set for G if and only if S ( I 0 ) = V . Hence,
S ( I 0 ) = j = 1 k S ( E j ) = V = X G ,
that is, C = { S ( E 1 ) , , S ( E k ) } is a set cover of X.
If E 1 , , E k are pairwise disjoint, then
| I 0 | = j = 1 k E j = j = 1 k | E j | = j = 1 k w G ( S ( E j ) ) = w G ( C ) .
 □
The previous lemma shows that the proposed transformation is actually a reduction and that, if a 1-target set for G is described as the union of pairwise disjoint elements of E ¯ , then its size equals the weight of the corresponding set cover of X G .
Notice that, if C * is an optimal solution for the instance X G , S G , w G of WSC corresponding to G then, for any S ( E 1 ) , S ( E 2 ) C * , it holds that E 1 E 2 = : indeed, if there exist S ( E 1 ) , S ( E 2 ) C such that E 1 E 2 , since E 1 E 2 E ¯ and, thus, S ( E 1 E 2 ) S G and, moreover, S ( E 1 ) S ( E 2 ) = S ( E 1 E 2 ) , then the set C = C * { S ( E 1 ) , S ( E 2 ) } { S ( E 1 E 2 ) } would still be a set cover for X G and
C C w G ( C ) = C C * w G ( C ) w G ( S ( E 1 ) ) w G ( S ( E 2 ) ) + w G ( S ( E 1 E 2 ) ) = C C * w G ( C ) | E 1 | | E 2 | + | E 1 E 2 | < C C * w G ( C ) ,
so contradicting that C * is an optimal solution for X G , S G , w G .
As a consequence of the previous reasoning and of Lemma 6, if C * is an optimal solution for the instance X G , S G , w G of WSC corresponding to G then the set I * = { E E ¯ : S ( E ) C * } is an optimal 1-target set for G.
Consider now the following procedure to compute a 1-target set of a signed graph G = ( V , A + A ) : first compute set E ¯ , then the instance X , S , w of WSC and, finally apply to it Chvatal’s algorithm in [45] to get a solution C = { S ( E 1 ) , , S ( E k ) } such that w G ( C ) ( 1 + log | X G | ) w G ( C * ) , where C * is an optimal solution for X G , S G , w G .
Needless to say, it may well happen that the sets E 1 , , E k are not pairwise disjoint, so that the second part of Lemma 6 cannot be exploited to bound the size of the so found 1-target set. In this case, we derive from C a new set cover C = { S ( E 1 ) , , S ( E h ) } for X G such that w G ( C ) w G ( C ) and E 1 , , E h are pairwise disjoint: set C = C and then, while there exist S ( E ) , S ( F ) C such that E F , replace in C the pair S ( E ) , S ( F ) by S ( E F ) . Notice that, at any replacement, C is still a set cover for X G , S G , w G and its weight does not increase since w G ( S ( E F ) ) ( w G ( S ( E ) ) + w G ( S ( F ) ) ) = | E F | ( | E | + | F | ) 0 .
Hence, in p o l y ( | G | , | E ¯ | ) -time we have computed a 1-target set I 0 = { E 1 , , E h } for G such that
| I 0 | = w G ( C ) w G ( C ) ( 1 + log | X G | ) w G ( C * ) = ( 1 + log | V | ) | I * | .
This proves the following theorem.
Theorem 4.
It is possible to find an ( 1 + log | V | ) -approximate solution for an instance G = ( V , A + A ) of 1-USTSS in p o l y ( | G | , | E ¯ | ) -time.
In general, the algorithm described so far does not run in polynomial time since the size of E ¯ is not polynomially bounded by | G | . Actually, the size of E ¯ is strongly related to the topology of G and in what follows we shall consider topologies yielding families of polynomial size. Without loss of generality, we shall only consider (weakly) connected graphs.
A source tree is a weakly connected directed graph containing one source node s connected to each other node of the graph by exactly one path and such that, for any pair of nodes u and v, if there is a path from u to v then such a path is contained in the path from s to v. Similarly as for the generalized chains, a generalized source tree consists of a set of strongly connected components linked to each other in a source tree-like topology. This means that, if we replace each strongly connected component in G by a single node, we get a source tree.
Corollary 1.
1-USTSS is ( 1 + log | V | ) -approximable for instances G = ( V , A + A ) such that G is a source tree or a generalized source tree.
Proof. 
When the graph G is a (directed) source tree then, for each u V , E ( u ) is the set of nodes in the subtree of G rooted at u. Hence, if E ( u ) E ( v ) then either E ( u ) E ( v ) or E ( v ) E ( u ) . This proves that E ¯ = { E ( u ) | u V } , that is, | E ¯ | = | V | .
A similar reasoning to that used in Theorem 3 for the case of the generalized chain allows to extend to generalized trees the result about trees. □

6. Conclusions and Open Problems

This paper aims at studying the impact of negative relations (witnessing antagonism or distrusting) to diffusion processes within a network. We first defined a diffusion rule, generalizing the Linear Threshold Model to signed relations, and then we studied the complexity of computing a minimum size target set with respect to it. We finally considered a set of restrictions under which the problem is approximable to some extent.
Our approximability results all refer to 1-target sets. We proved that the lower bound ( log | V | + 1 ) on the approximation ratio is tight for a simple topology of the graph of the negative relations, that is, the generalized source tree, and that our problem is in PO if such graph is a generalized chain. Needless to say, broadening the set of topologies of the graph of the negative relations still yielding reasonable approximation is an interesting research direction. After the results in [3,24], studying the problem restricted to graphs of bounded tree-width or clique-width looks like a worthwhile research direction.
After the discussion in Section 2, we remark that 1-target sets correspond to some kind of dominating sets, that we have called dominating sets with constrained pairs: given a graph G = ( V , E ) and a set C V × V , any node v V is dominated by a set D V if v D or v has a neighbor in D and, for each ( u , v ) C , u D . We have, thus, proved that the bound ( log | V | + 1 ) on the approximation ratio of the Dominating Set problem still holds for our constrained problem when ( V , C ) is a generalized source tree. Again, broadening the set of topologies of the graph of the negative relations still yielding O ( log | V | ) -approximation seems an interesting research direction. Finally, our ( Δ + + 1 ) -approximation ratio is exponentially far from the [ log ( Δ + 1 ) + 1 ] -approximation ratio holding for the minimum Dominating Set problem [43]. Narrowing the gap is an issue deserving attention too.

Author Contributions

Conceptualization, M.D.I. and G.V.; Methodology, M.D.I. and G.V.; Formal analysis, M.D.I. and G.V.; Writing—original draft preparation, M.D.I. and G.V.; Writing—review and editing, M.D.I. and G.V. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Domingos, P.; Richardson, M. Mining the Network Value of Customers. In Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, CA, USA, 26 August 2001; pp. 57–66. [Google Scholar]
  2. Richardson, M.; Domingos, P. Mining Knowledge-sharing Sites for Viral Marketing. In Proceedings of the Eighth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Edmonton, AB, Canada, 23 July 2002; pp. 61–70. [Google Scholar]
  3. Ben-Zwi, O.; Hermelin, D.; Lokshtanov, D.; Newman, I. Treewidth governs the complexity of target set selection. Discret. Optim. 2011, 8, 87–96. [Google Scholar] [CrossRef] [Green Version]
  4. Chen, W.; Wang, C.; Wang, Y. Scalable Influence Maximization for Prevalent Viral Marketing in Large-scale Social Networks. In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 25 July 2010; pp. 1029–1038. [Google Scholar]
  5. Granovetter, M. Threshold Models of Collective Behavior. Am. J. Sociol. 1978, 6, 1420–1443. [Google Scholar] [CrossRef] [Green Version]
  6. Kempe, D.; Kleinberg, J.; Tardos, É. Maximizing the Spread of Influence Through a Social Network. In Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 24 August 2003; pp. 137–146. [Google Scholar]
  7. Kempe, D.; Kleinberg, J.; Tardos, É. Influential Nodes in a Diffusion Model for Social Networks. In Automata, Languages and Programming; Caires, L., Italiano, G.F., Monteiro, L., Palamidessi, C., Yung, M., Eds.; Springer: Berlin, Germany, 2005; Volume 3580, pp. 1127–1138. [Google Scholar]
  8. Leskovec, J.; Adamic, L.A.; Huberman, B.A. The Dynamics of Viral Marketing. ACM Trans. Web 2007, 1, 5-es. [Google Scholar] [CrossRef] [Green Version]
  9. Contagion, M.S. The Review of Economic Studies; Oxford University Press: New York, NY, USA, 2000; pp. 57–78. [Google Scholar]
  10. Ackerman, E.; Ben-Zwi, O.; Wolfovitzv, G. Combinatorial Model and Bounds for Target Set Selection. Theor. Comput. Sci. 2010, 411, 4017–4022. [Google Scholar] [CrossRef] [Green Version]
  11. Bazgan, C.; Chopin, M.; Nichterlein, A.; Sikora, F. Parameterized approximability of maximizing the spread of influence in networks. J. Discret. Algorithms 2014, 27, 54–65. [Google Scholar] [CrossRef]
  12. Centeno, C.C.; Dourado, M.C.; Penso, L.D.; Rautenbach, D.; Szwarcfiter, J.L. Irreversible conversion of graphs. Theor. Comput. Sci. 2011, 412, 3693–3700. [Google Scholar] [CrossRef] [Green Version]
  13. Chen, N. On the approximability of influence in social networks. SIAM J. Discret. Math. 2009, 23, 1400–1415. [Google Scholar] [CrossRef]
  14. Chiang, C.Y.; Huang, L.H.; Li, B.J.; Wu, J.; Yeh, H.G. Some results on the target set selection problem. J. Comb. Optim. 2013, 25, 702–715. [Google Scholar] [CrossRef] [Green Version]
  15. Chiang, C.Y.; Huang, L.H.; Yeh, H.G. Target Set Selection Problem for Honeycomb Networks. SIAM J. Discret. Math. 2013, 27, 310–328. [Google Scholar] [CrossRef] [Green Version]
  16. Chopin, M.; Nichterlein, A.; Niedermeier, R.; Weller, M. Constant Thresholds Can Make Target Set Selection Tractable. Theor. Comput. Syst. 2014, 55, 61–83. [Google Scholar] [CrossRef] [Green Version]
  17. Zaker, M. On dynamic monopolies of graphs with general thresholds. Discret. Math. 2012, 312, 1136–1143. [Google Scholar] [CrossRef] [Green Version]
  18. Bettencourt, L.M.A.; Cintron-Arias, A.; Kaiser, D.I.; Castillo-Chavez, C. The power of a good idea: Quantitative modeling of the spread of ideas from epidemiological models. Phys. Stat. Mech. Appl. 2006, 364, 513–536. [Google Scholar] [CrossRef] [Green Version]
  19. Nekovee, M.; Moreno, Y.; Bianconi, G.; Marsili, M. Theory of rumour spreading in complex social networks. Phys. Stat. Mech. Appl. 2007, 374, 467–470. [Google Scholar] [CrossRef] [Green Version]
  20. Goldenberg, J.; Libai, B.; Muller, E. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Market. Lett. 2001, 12(3), 211–223. [Google Scholar] [CrossRef]
  21. Flocchini, P.; Lodi, E.; Luccio, F.; Pagli, L.; Santoro, N. Irreversible dynamos in tori. In Euro-Par’98 Parallel Processing; Pritchard, D., Reeve, J., Eds.; Springer: Berlin, Germany, 1998; Volume 1470, pp. 554–562. [Google Scholar]
  22. Luccio, F.; Pagli, L.; Sanossian, H. Irreversible dynamos in butterflies. In Proceedings of the 6th Colloquium on Structural Information and Communication Complexity, Lacanau-Ocean, France, 1–3 July 1999; pp. 204–218. [Google Scholar]
  23. Peleg, D. Size bounds for dynamic monopolies. Discret. Appl. Math. 1998, 86, 263–273. [Google Scholar] [CrossRef] [Green Version]
  24. Cicalese, F.; Cordasco, G.; Gargano, L.; Milanic̎, M.; Vaccaro, U. Latency-Bounded Target Set Selection in Social Networks. Theor. Comput. Sci. 2014, 535, 1–15. [Google Scholar] [CrossRef]
  25. Dreyer Jr, P.A.; Roberts, F.S. Irreversible k-threshold processes: Graph-theoretical threshold models of the spread of disease and of opinion. Discret. Appl. Math. 2009, 157, 1615–1627. [Google Scholar] [CrossRef]
  26. Gargano, L.; Hell, P.; Peters, J.G.; Vaccaro, U. Influence Diffusion in Social Networks under Time Window Constraints. Theor. Comput. Sci. 2015, 584, 53–66. [Google Scholar] [CrossRef]
  27. Dreyer, P.A. Applications and Variations of Domination in Graphs. Ph.D. Thesis, Rutgers University, Camden, NJ, USA, 2000. [Google Scholar]
  28. Alba, J.W.; Hutchinson, J.W.; Lynch, J.G. Memory and decision making. In Handbook of Consumer Behavior; Robertson, T.S., Kassarjian, H., Eds.; Prentice-Hall: Englewood Cliffs, NJ, USA, 1991; pp. 1–49. [Google Scholar]
  29. Chen, Y.; Iver, G.; Pazgal, A. Limited Memory, Categorization and Competition. Market. Sci. 2010, 29, 650–670. [Google Scholar] [CrossRef] [Green Version]
  30. Chen, W.; Collins, A.; Cummings, R.; Ke, T.; Liu, Z.; Rincon, D.; Sun, X.; Wang, Y.; Wei, W.; Yuan, Y. Influence maximization in social networks when negative opinions may emerge and propagate. In Proceedings of the 2011 SIAM International Conference on Data Mining, Mesa, AZ, USA, 28–30 April 2011; pp. 379–390. [Google Scholar]
  31. Nazemian, A.; Taghiyareh, F. Influence maximization in independent cascade model with positive and negative word of mouth. In Proceedings of the 6th International Symposium on Telecommunications (IST), Tehran, Iran, 6–8 November 2012; pp. 854–860. [Google Scholar]
  32. Stich, L.; Golla, G.; Nanopoulos, A. Modelling the spread of negative word-of-mouth in online social networks. J. Decis. Syst. 2014, 23, 203–221. [Google Scholar] [CrossRef]
  33. Yang, S.; Wang, S.; Truong, V.A. Online Learning and Optimization Under a New Linear-Threshold Model with Negative Influence. arXiv 2019, arXiv:1911.03276. [Google Scholar]
  34. Ahmed, S.; Ezeife, C.I. Discovering influential nodes from trust network. In Proceedings of the 28th Annual ACM Symposium on Applied Computing, New York, NY, USA, 18 March 2013; pp. 121–128. [Google Scholar]
  35. Li, Y.; Chen, W.; Wang, Y.; Zhang, Z.L. Influence diffusion dynamics and influence maximization in social networks with friend and foe relationships. In Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, Rome, Italy, 4 February 2013; pp. 657–666. [Google Scholar]
  36. Easley, D.; Kleinberg, J. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Significance 2012, 9, 43–44. [Google Scholar]
  37. Galhotra, S.; Arora, A.; Roy, S. Holistic influence maximization: Combining scalability and efficiency with opinion-aware models. In Proceedings of the 2016 International Conference on Management of Data, San Francisco, CA, USA, 14 June 2016; pp. 743–758. [Google Scholar]
  38. Hosseini-Pozveh, M.; Zamanifar, K.; Naghsh-Nilchi, A.R.; Dolog, P. Maximizing the spread of positive influence in signed social networks. Intell. Data Anal. 2016, 20, 199–218. [Google Scholar] [CrossRef]
  39. Baumeister, R.F.; Bratslavsky, E.; Finkenauer, C. Bad is stronger than good. Rev. Gen. Psychol. 2001, 5, 323–370. [Google Scholar] [CrossRef]
  40. Peeters, G.; Czapinski, J. Positive-negative asymmetry in evaluations: The distinction between affective and informational negativity effects. Eur. Rev. Soc. Psychol. 1990, 1, 33–60. [Google Scholar] [CrossRef]
  41. Rozin, P.; Royzman, E.B. Negativity bias, negativity dom- inance, and contagion. Personal. Soc. Psychol. Rev. 2001, 5, 296–320. [Google Scholar] [CrossRef]
  42. Taylor, S.E. Asymmetrical effects of positive and negative events: The mobilization-minimization hypothesis. Psychol. Bull. 1991, 110, 67–85. [Google Scholar] [CrossRef]
  43. Foerster, K.T. Approximating Fault-Tolerant Domination in General Graphs. In Proceedings of the Tenth Workshop on Analytic Algorithmics and Combinatorics (ANALCO), New Orleans, LA, USA, 6 January 2013. [Google Scholar]
  44. Khanna, S.; Sudan, M.; Trevisan, L.; Williamson, D.P. The approximability of constraint satisfaction problems. SIAM J. Comput. 2000, 30(6), 1863–1920. [Google Scholar] [CrossRef] [Green Version]
  45. Chvátal, V. A greedy heuristic for the set covering problem. Math. Oper. Res. 1979, 4, 233–235. [Google Scholar] [CrossRef]
Figure 1. A signed graph G = ( V , A + A ) . Arcs in A + are black, arcs in A are dashed. In this example, N i n + ( u 3 ) = { u 2 } , N i n ( u 3 ) = { u 5 } , N o u t + ( u 3 ) = { u 4 } , N o u t ( u 3 ) = { u 1 } , π + ( u 3 ) = { u 1 , u 2 , u 6 } and π ( u 3 ) = { u 5 } . Again, d + ( u 1 , u 5 ) = 2 , d ( u 5 , u 6 ) = 1 , and, by setting V = { u 1 , u 5 } , d + ( V , u 3 ) = 2 and d ( V , u 3 ) = 1 . Finally, D + = 4 (a maximum length positive shortest path being u 6 , u 1 , u 2 , u 3 , u 4 ) and D = 3 (a maximum length negative shortest path being u 2 , u 1 , u 4 , u 6 ).
Figure 1. A signed graph G = ( V , A + A ) . Arcs in A + are black, arcs in A are dashed. In this example, N i n + ( u 3 ) = { u 2 } , N i n ( u 3 ) = { u 5 } , N o u t + ( u 3 ) = { u 4 } , N o u t ( u 3 ) = { u 1 } , π + ( u 3 ) = { u 1 , u 2 , u 6 } and π ( u 3 ) = { u 5 } . Again, d + ( u 1 , u 5 ) = 2 , d ( u 5 , u 6 ) = 1 , and, by setting V = { u 1 , u 5 } , d + ( V , u 3 ) = 2 and d ( V , u 3 ) = 1 . Finally, D + = 4 (a maximum length positive shortest path being u 6 , u 1 , u 2 , u 3 , u 4 ) and D = 3 (a maximum length negative shortest path being u 2 , u 1 , u 4 , u 6 ).
Algorithms 13 00032 g001
Figure 2. Reducing WEAKLYmathsizesmall POSITIVEmathsizesmall MINIMUMmathsizesmall ONESmathsizesmall to USTSS: f = { c 1 , c 2 } , with c 1 = ¬ x 3 x 1 x 2 and c 2 = x 3 x 4 . Arcs in A are dashed.
Figure 2. Reducing WEAKLYmathsizesmall POSITIVEmathsizesmall MINIMUMmathsizesmall ONESmathsizesmall to USTSS: f = { c 1 , c 2 } , with c 1 = ¬ x 3 x 1 x 2 and c 2 = x 3 x 4 . Arcs in A are dashed.
Algorithms 13 00032 g002

Share and Cite

MDPI and ACS Style

Di Ianni, M.; Varricchio, G. Latency-Bounded Target Set Selection in Signed Networks. Algorithms 2020, 13, 32. https://0-doi-org.brum.beds.ac.uk/10.3390/a13020032

AMA Style

Di Ianni M, Varricchio G. Latency-Bounded Target Set Selection in Signed Networks. Algorithms. 2020; 13(2):32. https://0-doi-org.brum.beds.ac.uk/10.3390/a13020032

Chicago/Turabian Style

Di Ianni, Miriam, and Giovanna Varricchio. 2020. "Latency-Bounded Target Set Selection in Signed Networks" Algorithms 13, no. 2: 32. https://0-doi-org.brum.beds.ac.uk/10.3390/a13020032

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop