=Paper= {{Paper |id=Vol-1720/full11 |storemode=property |title=Active Spreading in Networks |pdfUrl=https://ceur-ws.org/Vol-1720/full11.pdf |volume=Vol-1720 |authors=Gennaro Cordasco,Luisa Gargano,Adele A. Rescigno |dblpUrl=https://dblp.org/rec/conf/ictcs/CordascoGR16 }} ==Active Spreading in Networks== https://ceur-ws.org/Vol-1720/full11.pdf
                   Active Spreading in Networks

                   G. Cordasco2 , L. Gargano1 , and A. A. Rescigno1
               1
                Department of Informatics, University of Salerno, Italy,
          2
              Department of Psychology, Second University of Naples, Italy.



      Abstract. Identifying the most influential spreaders is an important
      issue for the study of the dynamics of information diffusion in complex
      networks. In this paper we analyze the following spreading model. Initially,
      a few nodes know a piece of information and are active spreaders of it.
      At subsequent rounds, spreaders communicate the information to their
      neighbors. Upon receiving the information, a node becomes aware of it
      but does not necessarily become a spreader; it starts spreading only if
      it gets the information from a sufficiently large number of its neighbors.
      We study the problem of choosing the smallest set of initial spreaders
      that guarantee that all the nodes become aware of the information. We
      provide hardness results and show that the problem becomes tractable
      on trees. In case of general graphs, we provide an efficient algorithm
      and validate its effectiveness (in terms of the solution size) on real-life
      networks.


1    Introduction
During the past decade spreading processes in complex networks have experienced
a particular surge of interest. A large part of research activity in the area deals
with the analysis of influence spreading in social networks. There are many
situations where members of a network may influence their neighbors’ behavior
and decisions, by swaying their opinions, by suggesting what products to buy,
or simply by passing on a misinformation [7,23,30]. A key research question,
related to understand and control the spreading dynamics, is how to efficiently
identify a set of users that can diffuse information within the network. This is the
problem addressed in this paper. Our scenario posits a population consisting of
n individuals that, with respect to the information, are subdivided into ignorant,
aware, and spreading. Initially, all individuals are ignorant. Then an initial set of
spreaders is selected. When a spreader informs an ignorant node v, the ignorant
node v becomes aware; as soon as the individual v is informed by a number of
spreaders greater than a threshold t(v), it starts spreading the information itself.
The motivations that lead us to consider such a scenario come from experimental

Copyright c by the paper’s authors. Copying permitted for private and academic pur-
poses.
V. Biló, A. Caruso (Eds.): ICTCS 2016, Proceedings of the 17th Italian Conference on
Theoretical Computer Science, 73100 Lecce, Italy, September 7–9 2016, pp. 149–162
published in CEUR Workshop Proceedins Vol-1720 at http://ceur-ws.org/Vol-1720
150       G. Cordasco, L. Gargano, and A. A. Rescigno

studies of how information spread in social networks. Indeed, information doesn’t
flow freely in the network but it requires active sharing which, in turn, depends
on individual conviction to pass it on. We refer to [2] for a study of how exposure
to social signals affects diffusion.
    We model the network as an undirected graph G = (V, E), where V is the
set of individuals and the set of edges E represents the relationships among
members of the network, i.e., (u, v) ∈ E if individuals u and v can directly
communicate. We posit a threshold function t : V → {0, 1, 2, . . .}, and we denote
by N (v) the neighborhood of v ∈ V . An active diffusion process starting at
S ⊆ V is a sequence of node subsets: SpreaderG [S, τ ], τ = 0, 1, . . . , such that
SpreaderG [S, 0] = S and
                                          n                                          o
SpreaderG [S, τ ] = SpreaderG [S, τ − 1] ∪ u s.t. N (u) ∩ SpreaderG [S, τ − 1] ≥ t(u) ,

for τ ≥ 1. The process terminates when SpreaderG [S, ρ] = SpreaderG [S, ρ − 1]
for some ρ > 1. We denote by SpreaderG [S] = SpreaderG [S, ρ]. Hence, when the
process stops the set of aware nodes is
                                     n                                 o
         AwareG [S] = SpreaderG [S] ∪ u s.t. N (u) ∩ SpreaderG [S] 6= ∅ .

Given G, a threshold function t(·), we aim to identify a small node set S ⊆ V
such that AwareG [S] = V .3 Namely, we consider the following problem,

      P e r f e c t Awa r e n e s s ( PA ).
      Instance: A graph G = (V, E), node thresholds t : V −→ N0 .
      Question: Find a seed set S ⊆ V of minimum size such that Aware[S] = V .

We refer to the set S for which Aware[S] = V as a perfect seed set and to the
nodes in S as seeds.

1.1     Related Work and Our Results
The above algorithmic problem has its roots in the area of the spread of influ-
ence in Social Networks. Maximizing the spread of viral information across a
network naturally suggests many interesting optimization problems (see [7,17]
and references quoted therein). The first authors to study spread of influence
in networks from an algorithmic point of view were Kempe et al. [19,20,21].
Chen [6] studied the following minimization problem: given a graph G and fixed
thresholds t(v), for each vertex v in G, find a set of minimum size that even-
tually influences all (or a fixed fraction of) the nodes of G. This problem is
usually referred as the Target Set Selection Problem (TSS). He proved a strong
inapproximability result that makes unlikely the existence of an algorithm with
                                         1−
approximation factor better than O(2log |V | ). Chen’s result stimulated a series
3
    In the rest of the paper we omit the subscript G whenever the graph is clear from
    the contex.
                                                    Active Spreading in Networks           151

of papers [1,3,5,8,9,10,11,12,18,27,28] that isolated interesting cases in which the
problem (and variants thereof) become tractable. Heuristics for the TSS problem
that work for general graphs have been proposed in the literature [13,16,29].
    However, the papers appeared in the scientific literature considered the basic
model in which any node, as soon as it is influenced by its neighbors, it immedi-
ately starts spreading influence. In this paper we consider a more refined model
that differentiates among spreaders and plain aware node. This model has been
first considered in [14], where the Awareness Maximization Problem in which
one asks for a set S, with |S| ≤ β, that achieves the maximum awareness in the
network has been studied.
    In Section 2, we study the computational complexity of the PA problem and
extend the TSS problem hardness result to the PA problem. In Section 3, we give
an algorithm that outputs a perfect seed set for any input graph. Experimental
evaluation of the proposed algorithm is given in Section 4; it shows that the
proposed algorithm outperforms some heuristics developed for related problems.
Finally, we show that our problem becomes tractable if the graph is a tree (Section
5).
    We would like to remark that if the threshold t(v) is equal to the node degree
d(v), for each v ∈ V , then a perfect target set for G is, indeed, a dominating
set for G. Hence, the proposed algorithm outputs a dominating set for G and
computational experiments suggest that it performs very well in practice.


2    Complexity

We prove the hardness of the PA problem by constructing a gap-preserving
reduction from the TSS problem. We recall that the TSS problems, given G =
(V, E) with threshold function t : V → N , asks to identify a minimum size S ⊆ V
such that Spreader[S] = V . Our Theorem 1 follows from the inapproximability
results for the TSS problem given in [6].
                                                                                           1−
Theorem 1. The PA problem cannot be approximated within a ratio of O(2log                        n
                                                                                                     ),
for any  > 0, unless NP⊆DTIME(npolylog(n) ).

Proof. We give a reduction from the Ta rg e t S e t S e l e c t i o n problem.
Consider an instance of the TSS problem consisting in a graph G = (V, E) with
threshold function t(·). Let V = {v1 , . . . , vn }, we build a graph G0 = (V 0 , E 0 ) as
follows:

 – Replace each vi ∈ V by a triangle in which the node set is Vi0 = {vi,0 , vi,1 , vi,2 }.
   Formally,
             Sn
     – V 0 = i=1 Vi0 = {vi,j | 1 ≤ i ≤ n, 0 ≤ j ≤ 2}
     – E 0 = {(vi,0 , v`,0 ) | 1≤i<`≤n, (vi , v` ) ∈ E }
                                                          S
             {(vi,j , vi,` ) | i = 1, . . . , n, 0≤j<`≤2 };
 – the thresholds are t0 (vi,0 ) = t(vi ) and t0 (vi,1 ) = t0 (vi,2 ) = 2, for i = 1, . . . , n.
152      G. Cordasco, L. Gargano, and A. A. Rescigno

 Notice that G corresponds to the subgraph of G0 induced by the set {vi,0 |1 ≤
i ≤ n}. We show that there exists a target set S ⊆ V for G iff there exists a
perfect seed set S 0 ⊆ V 0 for G0 such that |S 0 | = |S|.
Assume first that S ⊆ V is a target set for G. Since SpreaderG [S] = V , then all
the nodes vi,0 ∈ Vi0 will become spreaders in G0 when the seed set is S 0 = {vi,0 ∈
V 0 |vi ∈ S}. Once a node vi,0 becomes a spreader the nodes vi,1 , vi,2 are aware in
the next round. Hence, S 0 is a perfect seed set for G0 , that is AwareG0 [S 0 ] = V 0 .
Assume now that S 0 ⊆ V 0 is a perfect seed set for G0 . Let S 00 = {vi,0 ∈ V 0 | S 0 ∩
Vi0 6= ∅}. It is easy to observe that AwareG0 [S 00 ] = AwareG0 [S 0 ] = V 0 . Let V00 =
{vi,0 | 1 ≤ i ≤ n}. A node in V00 can influence at most 2 nodes in V 0 − V00 —the
other vertices of the triangle its belongs to. Hence, in order to influence all the
nodes in V 0 − V00 all nodes in V00 must be spreaders, that is, SpreaderG0 [S 00 ] = V00 .
As a consequence, recalling that G is isomorphic to the subgraph of G0 induced
by V00 , we get SpreaderG [{vi | S 0 ∩ Vi0 6= ∅}] = V .                                t
                                                                                       u
     We notice that the Target Set Selection problem remains hard when each
node has threshold upper bounded by a constant; in particular, it was proved
in [6] that approximating it when each node has threshold at most 2 is as hard
as approximating the problem in the general setting, even for constant degree
graphs. Our reduction allows to extend this result as well, namely one has that
the PA problem remains hard to approximate even if all nodes have threshold
at most 2.


3     A general algorithm for the PA problem

In this section we propose an algorithm for the PA problem in case of arbitrary
graphs and thresholds. The algorithm PA(G, t), given in Algorithm 1, works
greedily by iteratively deprecating nodes from the input graph G unless a certain
condition occurs which makes a node be added to the seed set S; it stops when
all nodes have either been discarded or selected as seed.
    The algorithm maintains five sets of nodes: S that represents the current
seed set; U that represents the set of nodes in the surviving graph (i.e., nodes
not removed from the initial graph); T emp which is a set of nodes moved into
a temporary waiting state (such nodes still belong to U but their neighbors will
not count on them for being influenced); R that represents a set of nodes that
must become spreaders (but will not do so with the current seed); A is the set
of aware nodes (assuming that all the nodes in R will be indeed spreaders).
    The algorithm proceeds as follows: As long as there exists at least a non-aware
node or there is a node in R, a node v is selected according to a certain function
(see Case 3) and is moved into a temporary waiting state, represented by the set
T emp. As a consequence of being in T emp, all the neighbors of v will not count
on v for being influenced (for each u ∈ N (v) the value δ(u), which denotes the
degree of u restricted to the nodes in the U − T emp, is reduced by 1).
    Due to this update, some nodes in the surviving graph may remain with less
“usable” neighbors (if a node v ∈ / A has δ(v) = 0 or v ∈ R has δ(v) < t(v)); in
such a case (see Case 2) the nodes are added to the seed set and removed from
                                                Active Spreading in Networks           153

the graph, while the thresholds of their neighbors are decreased by 1 (since they
receive v’s influence).
   If (see Case 1) the surviving graph contains a node v whose threshold has
been decreased down to 0 (which means that the nodes which have been already
added to the seed set S – see Case 2 – suffice to make v a spreader), v is deleted
from the graph and the thresholds of its neighbors are decreased by 1 (since once
v becomes a spreader, they will receive its influence). Notice that Case 1 can also
apply to nodes in T emp.

 Algorithm 1: PA(G, t) //G = (V, E) is a graph with thresholds t(v) for v ∈ V
 1 S = ∅; T emp = ∅; U = V ; R = ∅; A = ∅;
 2 foreach v ∈ V do
 3    k(v) = t(v);
 4    δ(v) = |N (v)|;
 5   while A 6= V OR R 6= ∅ do
 6     if ∃v ∈ U s.t. k(v) = 0 then         // Case 1): v is a spreader, thanks to its
         neighbors outside U
 7         foreach u ∈ N (v) ∩ U do
 8            k(u) = max(k(u) − 1, 0); A = A ∪ {u};
 9            if v ∈
                   / T emp then δ(u) = δ(u) − 1;
10         U = U − {v}; R = R − {v}; A = A ∪ {v};
11      else
12         if ∃v ∈ (U −T emp) ∩ R s.t. δ(v) δλ (vλ )) or (vλ ∈ / Aλ
    and δλ (vλ ) = 0) and consequently Sλ = {vλ } and Rλ ⊆ SpreaderG[Uλ ] [Sλ ].
  – Finally we show that case 3 cannot hold at the last iteration of the algorithm.
    Indeed if Rλ = ∅ then vλ ∈ / Aλ (otherwise the algorithm cannot terminate at
    round λ). In this case a new node is added to R at the line 22 of the algorithm
    and the algorithm cannot terminate at round λ. We notice that this node
    must exists, otherwise δλ (vλ ) = 0 and Case 2 holds. On the other hand, if
    Rλ = {vλ } then Uλ − T empλ − Rλ = ∅ and we have Uλ − T empλ = {vλ }
    and consequently δλ (vλ ) = 0. Since we are in case tree we also know that
    kλ (vλ ) > 0 and Case 2 holds.
Consider now i < λ and suppose the algorithm be correct on G[Ui+1 ], that is,
Ri+1 ⊆ SpreaderG[Ui+1 ] [Si+1 ]. We show that the algorithm is correct on G[Ui ]
with thresholds ki (u) for u ∈ Ui .
By the algorithm PA, for each u ∈ Ui we have
               (
                 max(ki (u)−1, 0) if Case 1 or 2 hold and u ∈ N (vi ) ∩ Ui
    ki+1 (u)=                                                                    (1)
                 ki (u)             otherwise,
156      G. Cordasco, L. Gargano, and A. A. Rescigno

where vi is the node selected at iteration i.
   We distinguish three cases on the selected node vi .
 – (Case 3 holds). In this case Ui = Ui+1 and Si+1 = Si . Moreover by (1),
   ki+1 (u) = ki (u) for each u ∈ Ui+1 . If vi ∈
                                               / Ri then Ri ⊆ Ri+1 and conse-
   quently Ri = Ri+1 ⊆ SpreaderG[Ui+1 ] [Si+1 ] = SpreaderG[Ui ] [Si ].
   Otherwise (vi ∈ Ri ) we have Ri ⊆ Ri+1 ∪ {vi }, Ui − T empi − Ri = ∅ and by
   3. of Fact 1 , we have Ui − T empi = Ri . Hence,

                             (N (v) ∩ (Ui − T empi )) ⊆ Ri+1                        (2)

    Since we are in Case 3 and vi ∈ Ri then δi (v) ≥ ki (v). Using this, Fact 2 and
    equation (2), we have that since Ri+1 ⊆ SpreaderG[Ui+1 ] [Si+1 ] then Si+1 = Si
    is able to make vi a spreader in G[Ui ] and we have Ri ⊆ SpreaderG[Ui ] [Si ].
  – (Case 2 holds). In this case Ui+1 = Ui − {vi }, Ri ⊆ Ri+1 ∪ {vi } and Si =
    Si+1 ∪ {vi }. Hence vi ∈ Spreader[Si ]. Moreover by (1), it follows that for
    any u ∈ N (vi ) ∩ Ui , if u ∈ Spreader[Si+1 ] then u ∈ Spreader[Si ]. Hence
    Ri ⊆ Spreader[Si ].
  – (Case 1 holds). In this case we have ki (vi ) = 0, Ui+1 = Ui −{vi }, Ri ⊆ Ri+1 ∪
    {vi } and Si = Si+1 . Since ki (vi ) = 0, node vi is immediately spreader in G[Ui ].
    Hence by (1), each neighbor u of vi in G[Ui ] is influenced by vi and its thresh-
    old is updated according to (1). Therefore, since Ri+1 ⊆ SpreaderG[Ui+1 ] [Si+1 ],
    we have that Ri ⊆ SpreaderG[Ui ] [Si ].
The statement follows since G[U1 ] = G.
    The theorem follows by observing that a node is moved to the set A only if
(v ∪ N (v)) ∩ R1 6= ∅ and that the algorithm terminates when all nodes are aware
(A = V ) and the set R is empty.
   The PA algorithm can be implemented to run in O(|E| log |V |) time. Indeed
we need to process the nodes v ∈ V —each one at most two times (see Lemma
1)—according to the metrics δ(v) and k(v)/(δ(v)(δ(v) + 1)), and the updates,
that follows each processed node v ∈ V involve at most |N (v)| neighbors of v.


4     Experimental Results
Due to Theorem 1, we cannot aim to any significant performance guaranteed
on the seed set size for general graphs and threshold functions. Nonetheless,
extensive experiments show that our algorithm performs very well on large real
networks, both in terms of efficiency of the solution and of the running time.
    We conducted experiments on 12 real networks of various sizes from the
Stanford Large Network Data set Collection (SNAP) [24], the Social Computing
Data Repository at Arizona State University [31] and Newman’s Network data
[26]. The main characteristics of the studied networks are shown in Table 1.
    The active information diffusion problem is a novel model of information
diffusion and, to the best of our knowledge, no heuristic is known for the PA
problem. For this reason we decided to evaluate the effectiveness of our algorithm
(PA) with two heuristics that respectively solve two problems related to the PA
                                                  Active Spreading in Networks   157

      Name                # of nodes # of edges  Max Size of Clust. Modularity
                                               degree the LCC Coeff.
      BlogCatalog3 [31]       10312     333983 3992      10312 0.4756  0.2374
      Ca-AstroPh [24]         18772     198110    504    17903 0.6768  0.3072
      Ca-CondMath [24]        23133      93497    279    21363 0.7058  0.5809
      Ca-GrQc [24]             5242      14496     81     4158 0.6865  0.7433
      Ca-HepPh [24]           10008     118521    491    11204 0.6115  0.5085
      Ca-HepTh [24]            9877      25998     65     8638 0.5994  0.6128
      Cit-HepTh [24]          27770     352807     64    24700 0.3120  0.7203
      Douban [31]            154907     327162    287 154908 0.048     0.5773
      Facebook [24]            4039      88234 1045       4039 0.6055  0.8093
      Jazz [26]                 198       2742    100      198 17899   0.6334
      Karate [26]                34         78     17        5     45  0.5879
      Power grid [26]          4941       6594     19     4941 0.1065  0.6105
                                 Table 1. The networks.



problem. The first heuristic, named MTS [15], is devoted to the minimum target
set selection (TSS) problem where the aim is to have each node become a spreader.
We have chosen this TSS heuristics since it experimentally outperforms the other
known algorithms [13,22,29] for the TSS problem, see [15].
     The rationale of this comparison is to show that by relaxing the goal of the
TSS model for the new model (which only aims to make each node aware) we
are able to identify significantly smaller seed sets.
On the other hand, when all the thresholds t(v) are equal to the node degrees
d(v), the PA problem is equivalent to the well known Dominating Set problem.
For this reason we will compare our algorithm with the (best known) heuristic
[4], named DOM, for the Dominating Set problem.
Thresholds values. We tested the three algorithms using two categories of
threshold function:
 – Random thresholds where t(v) is chosen uniformly at random in the interval
   [1, d(v)]. Since the random thresholds test settings involve some randomiza-
   tion, we executed each test 10 times. The results were compared using means
   of target set sizes (the observed variance was negligible);
 – Proportional thresholds, where for each v the threshold t(v) is set as α ×
   d(v) with α = 0.1, 0.2, . . . , 1. Notice that for α = 0.5 we are considering
   a particular version of the activation process named “majority” thresholds,
   while for α = 1 we are considering the D o m i n at i n g S e t problem.


4.1      Test Results
Random Thresholds. Table 2 depicts the results of the Random threshold test set-
ting. Each number represents the average size of the perfect seed set generated by
PA and MTS algorithms on each network using random thresholds (for each test
setting, the same thresholds values have been used for both the algorithms). The
158     G. Cordasco, L. Gargano, and A. A. Rescigno

                         Name          PA           MTS
                         BlogCatalog3   10     12 (20%)
                         Ca-AstroPh    919 1157 (25.9%)
                         Ca-CondMath 1573 1810 (15.07%)
                         Ca-GrQc       636 661 (3.93%)
                         Ca-HepPh      790 901 (14.05%)
                         Ca-HepTh      964 945 (-1.97%)
                         Cit-HepTh     955 1045 (9.42%)
                         Douban       2374 2343 (-1.31%)
                         Facebook        9 213 (2267%)
                         Jazz            4       7 (75%)
                         Karate          3        3 (0%)
                         Power grid    352 340 (-3.41%)

Table 2. Random Thresholds Results: For each network and each algorithm, the average
size of the perfect seed set is depicted.



value in bracket represents the overhead percentage of MTS algorithm compared
to the PA algorithm.

Constant and Proportional thresholds. Figures 1 and 2 report the results for
the proportional thresholds settings. For each network the plot depicts the size
of the perfect seed set (Y-axis), for each value of α ∈ [0.1, 1] (X-axis) and for
each algorithm (series). We present the results only for 4 networks because of
space limits; the experiments performed on the other networks exhibit similar
behaviors.
The results in Fig. 1 and 2 confirm our hypothesis. The size of the initial seed
set provided by our PA algorithm is in general significantly smaller than the size
of the set provided by the other strategies. We notice that the gap between the
PA and the MTS algorithms increase with the value of the node thresholds (this
result was expected: the larger the value of t(), the larger the difference between
the models). The PA algorithm is always better than the DOM algorithm, when
t(v) < d(v). Moreover when t(v) = d(v) (that is, when the PA problems becomes
the Dominating Set Problem), the two algorithms provide comparable results,
hence the PA algorithm could be considered as an effective alternative heuristics
for the dominating set problem.



5     Trees.
Let T = (V, E) be a tree rooted at any node r, and let T (v) the subtree rooted
at v, for any v ∈ V . We can prove that the algorithm PA outputs an optimal
perfect seed set whenever the input graph is a tree.

Theorem 3. PA(T, t) returns an optimal perfect seed set for any tree T .
                                             Active Spreading in Networks       159




Fig. 1. Proportional Thresholds Results: CA-GrQc network and Power grid network




 Fig. 2. Proportional Thresholds Results: Douban network and Ca-HepTh network.




Fig. 3. Numbers inside circles are the node thresholds, double–circled denote seeds,
dashed–circled lines denote aware nodes, solid–circled nodes denote spreaders.
160        G. Cordasco, L. Gargano, and A. A. Rescigno

If T is the tree in Fig. 3 one can see that the algorithm PA(T, t) returns a optimal
seed set—consisting of the three double-circled nodes in the figure.
    In order to evaluate the time complexity for trees, we report as TREE-PA
the rewriting of the general PA algorithm in Section 3 in case the input graph
is known to be a tree. One can see that the algorithm essentially computes the
seed set while performing a visit (in BFS reverse order) of the tree. We can then
show that
Theorem 4. The PA problem can be solved in linear time for any tree.

    Algorithm 2: TREE-PA(T , t), T = (V, E) is a tree with thresholds t(v) for
    v∈V
 1 S = ∅; A = ∅; P = ∅;
 2 foreach v ∈ V in a BFS reverse order do
 3    if v 6= r then                                // v is not the root node
 4        if t(v) = 0 then
 5            t(fv ) = t(fv ) − 1;                   // fv denotes v’s father
 6            A = A ∪ {fv }
 7        else
 8            if v ∈ P AND t(v) ≥ 2 then
 9                S = S ∪ {v};
10                t(fv ) = t(fv ) − 1;
11                A = A ∪ {fv }
12            else
13                if v ∈/ A OR (v ∈ P AND t(v) = 1) then
14                    P = P ∪ {fv }                        // fv must spread


15        if v = r AND t(v) > 0 AND v ∈
                                      / A − P then S = S ∪ {v}
16    return S


6      Conclusion and Open Problems

We have studied some algorithmic aspects of a recently introduced information
diffusion model, that differentiates among spreaders and aware nodes [14]. Many
interesting questions related to this model remain open and might be interesting
to study:
- Real life social networks are characterized by the existence of highly connected
communities and it was observed that in real networks, having high modularity
[25], it is often difficult for information to flow from one community to another.
This suggests that one should consider each (dense) community separately. From
a result in [14], we know that it is possible to relate the minimum graph degree
to the size of a perfect seed set. Namely, in any graph G with t(v) ≤ t and
d(v) ≥ |V |+t−3
             2    , for each v ∈ V , any independent set which is either maximal
or has size 2t − 2 is a perfect seed set for G. Establishing a significant lower
                                               Active Spreading in Networks        161

bound on the size of the seed set of a dense graph has (so far) eluded our efforts.
However, we recall that deciding if there exists a perfect seed set of size less than
t is a hard problem in general. It would be interesting to establish to what extent
such an hardness result still holds for dense graphs.
- More generally, are there class of graphs, other then trees and cliques, for which
the problem can be either efficiently solved or admits a small approximation
factor?
- It would also be interesting to determine a significant upper bound on the size
of a perfect seed set in terms of node degree and threshold, in the spirit of the
bound derived in [1] for the TSS problem.


References
 1. Eyal Ackerman, Oren Ben-Zwi, and Guy Wolfovitz. Combinatorial model and
    bounds for target set selection. Theoretical Computer Science, 411(44–46):4017–
    4022, 2010.
 2. Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. The role of
    social networks in information diffusion. In Proceedings of the 21st International
    Conference on World Wide Web, pages 519–528, 2012.
 3. Oren Ben-Zwi, Danny Hermelin, Daniel Lokshtanov, and Ilan Newman. Treewidth
    governs the complexity of target set selection. Discrete Optimization, 8(1):87–96,
    2011.
 4. Alina Campan, Traian Marius Truta, and Matthew Beckerich. Fast dominating set
    algorithms for social networks. In MAICS, 2015.
 5. Carmen C. Centeno, Mitre C. Dourado, Lucia Draque Penso, Dieter Rautenbach,
    and Jayme L. Szwarcfiter. Irreversible conversion of graphs. Theoretical Computer
    Science, 412(29):3693–3700, 2011.
 6. Ning Chen. On the approximability of influence in social networks. SIAM Journal
    on Discrete Mathematics, 23(3):1400–1415, 2009.
 7. Wei Chen, Carlos Castillo, and Laks Lakshmanan. Information and Influence
    Propagation in Social Networks. Morgan & Claypool, 2013.
 8. Chun-Ying Chiang, Liang-Hao Huang, and Hong-Gwa Yeh. Target set selec-
    tion problem for honeycomb networks. SIAM Journal on Discrete Mathematics,
    27(1):310–328, 2013.
 9. Morgan Chopin, André Nichterlein, Rolf Niedermeier, and Mathias Weller. Constant
    thresholds can make target set selection tractable. Theory of Computing Systems,
    55(1):61–83, 2014.
10. Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, Martin Milanič, Joseph
    Peters, and Ugo Vaccaro. Spread of influence in weighted networks under time and
    budget constraints. Theoretical Computer Science, 586:40–58, 2015.
11. Ferdinando Cicalese, Gennaro Cordasco, Luisa Gargano, Martin Milanič, and Ugo
    Vaccaro. Latency-bounded target set selection in social networks. Theoretical
    Computer Science, 535:1 – 15, 2014.
12. Amin Coja-Oghlan, Uriel Feige, Michael Krivelevich, and Daniel Reichman. Con-
    tagious sets in expanders. In Proceedings of the Twenty-Sixth Annual ACM-SIAM
    Symposium on Discrete Algorithms, pages 1953–1987, 2015.
13. Gennaro Cordasco, Luisa Gargano, Marco Mecchia, Adele A. Rescigno, and Ugo
    Vaccaro. A fast and effective heuristic for discovering small target sets in social
    networks. In Proc. of COCOA 2015, volume 9486, pages 193–208, 2015.
162      G. Cordasco, L. Gargano, and A. A. Rescigno

14. Gennaro Cordasco, Luisa Gargano, Adele A. Rescigno, and Ugo Vaccaro. Evange-
    lism in social networks. In proceedings of 27th International Workshop on Combi-
    natorial Algorithms (To Appear), 2016.
15. Gennaro Cordasco, Luisa Gargano, and Adele Anna Rescigno. Influence propagation
    over large scale social networks. In Proceedings of ASONAM 2015, Paris, France,
    pages 1531–1538, 2015.
16. Thang N. Dinh, Huiyuan Zhang, Dzung T. Nguyen, and My T. Thai. Cost-
    effective viral marketing for time-critical campaigns in large-scale social networks.
    IEEE/ACM Trans. Netw., 22(6):2001–2011, December 2014.
17. David Easley and Jon Kleinberg. Networks, Crowds, and Markets: Reasoning About
    a Highly Connected World. Cambridge University Press, New York, NY, USA, 2010.
18. Luisa Gargano, Pavol Hell, Joseph G. Peters, Ugo Vaccaro. Influence diffusion in
    social networks under time window constraints. Theor. Comput. Sci., 584(C):53–66,
    2015.
19. David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence
    through a social network. In Proc. of the ACM SIGKDD KDD 2003, pages 137–146,
    2003.
20. David Kempe, Jon Kleinberg, and Éva Tardos. Influential nodes in a diffusion
    model for social networks. In Proc. of ICALP 2005, pages 1127–1138, 2005.
21. David Kempe, Jon Kleinberg, and Éva Tardos. Maximizing the spread of influence
    through a social network. Theory of Computing, 11(4):105–147, 2015.
22. Suman Kundu and Sankar K. Pal. Deprecation based greedy strategy for target set
    selection in large scale social networks. Information Sciences, 316:107–122, 2015.
23. Jure Leskovec, Lada A. Adamic, and Bernardo A. Huberman. The dynamics of
    viral marketing. ACM Trans. Web, 1(1), May 2007.
24. Jure Leskovec and Andrej Krevl. SNAP Datasets: Stanford large network dataset
    collection. http://snap.stanford.edu/data, 2015.
25. Mark E. J. Newman. Modularity and community structure in networks. Proc. Natl.
    Acad. Sci. U.S.A. 103 (23): 8577âĂŞ8582.
26. Mark Newman. Network data, http://www-personal.umich.edu/~mejn/netdata/,
    2015.
27. André Nichterlein, Rolf Niedermeier, Johannes Uhlmann, Mathias Weller. On
    tractable cases of target set selection. Social Network Analysis and Mining, 3(2):233–
    256, 2013.
28. T. V. Thirumala Reddy and C. Pandu Rangan. Variants of spreading messages. J.
    Graph Algorithms Appl., 15(5):683–699, 2011.
29. Paulo Shakarian, Sean Eyre, and Damon Paulo. A scalable heuristic for viral
    marketing under the tipping model. Social Network Analysis and Mining, 3(4):1225–
    1248, 2013.
30. Michela Del Vicario, Alessandro Bessi, Fabiana Zollo, Fabio Petroni, Antonio Scala,
    Guido Caldarelli, Eugene Stanley and Walter Quattrociocchi. The spreading of
    misinformation onlines. PNAS, 113(3):554–559, 2016.
31. Reza Zafarani and Huan Liu.             Social computing data repository at ASU.
    http://socialcomputing.asu.edu, 2009.