期刊文献+

基于友好度的影响力最大化算法

Influence maximization algorithm based on friendliness
下载PDF
导出
摘要 提出一种基于友好度的影响力最大化算法。利用社交网络中用户行为信息计算友好度并构建友好关系网络,通过友好度调整节点的扩散概率,同时启发式地选取友好度积累值较高的节点作为启发节点以此提升算法的实现效率,最后采用CELF++算法计算影响力最大的节点集。实验结果表明,该算法与CELF++算法、TIM算法和DegreeDiscount算法相比,在获得较好的扩散效果的同时亦将执行时间有效的控制在一定范围内。 A new influence maximization algorithm based on friendliness is proposed in this paper and named as Friendliness-based Influence Maximization Method(FIMM).FIMM uses behavior and interaction information of nodes in social network to compute friendliness and to build friendly relationship network.FIMM also adjusts the diffusion probability of nodes through the friendliness and improves the efficiency of implementation of the algorithm by selecting nodes.These nodes have higher accumulation of friendliness and have the most potential influence heuristically based on friendly relationship network.Experiment results show that FIMM can get better diffusion effect than CELF+ +,TIM and DegreeDiscount.FIMM can also limit implement time effectively in a smaller range,which means that using friendliness and selecting nodes heuristically can optimize influence maximization algorithm.
作者 吴旭 胡一清
出处 《西安邮电大学学报》 2016年第6期118-122,共5页 Journal of Xi’an University of Posts and Telecommunications
基金 国家自然科学基金资助项目(71501156) 中国博士后基金资助项目(2014M560796) 陕西省教育厅科研计划资助项目(15JK1679) 西安邮电大学创新基金资助项目(114-602080048)
关键词 影响力最大化 友好关系 社交网络 社会计算 influence maximization friendliness social network social computing
  • 相关文献

参考文献1

二级参考文献18

  • 1田慧蓉,邹仕洪,王文东,程时端.P2P网络层次化信任模型[J].电子与信息学报,2007,29(11):2560-2563. 被引量:10
  • 2Firdhous M,Ghazali O,Vijaykumar P,Hassan S.A trust computing mechanism for cloud computing//Proceedings of the ITU Fully Networked Human Innovations for Future Networks and Services.Cape Town,South Africa,2011:1-7.
  • 3Abawajy J.Establishing trust in hybrid cloud computing environments//Proceedings of the IEEE 10th International Conference on Trust,Security and Privacy in Computing and Communications.Changsha,China,2011:118-125.
  • 4Pawar P S,Rajarajan M,Nair S K,Zisman A.Trust model for optimized cloud services//Proceedings of the 6th IFTP International Conference on Trust Management.Surat,India,2012:97-112.
  • 5Kamvar S D,Schlosser M T,Garcia Molina H.The EigenTrust algorithm for reputation management in P2P networks //Proceedings of the 12th International World Wide Web Conference.Budapest,Hungary,2003:640-651.
  • 6Chhabra S,Damiani E,De Capitani di Vimercati S,et al.A protocol for reputation management in super-peer networks//Proceedings of the 15th International Workshop on Database and Expert Systems Applications.Zaragoza,Spain,2004:973-983.
  • 7LiangZ,ShiW.PET:A personalized trust model with reputation and risk evaluation for P2P resource sharing//Proceedings of the Hawaii International Conference on System Sciences.Hawaii,USA,2005:201-201.
  • 8Zhang J,Shankaran R,Orgun M A,et al.A trust management architecture for hierarchical wireless sensor networks//Proceedings of the 35th Annual IEEE Conference on Local Computer Networks.Denver,USA,2010:264-267.
  • 9Felix G M,Gregorio M P.Providing trust in wireless sensor networks using a bio inspired technique.Telecommunication Systems,2010,46(2):163-180.
  • 10Lopez J,Roman R,Agudo I,Carmen F G.Trust management systems for wireless sensor networks:Best practices.Computer Communications,2010,33(9):1086-1093.

共引文献19

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部