Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Review Help
Search
Information diffusion prediction with network regularized role-based user representation learning
Wang Z., Chen C., Li W. ACM Transactions on Knowledge Discovery from Data13 (3):1-23,2019.Type:Article
Date Reviewed: Sep 12 2019

Wang et al. propose and evaluate the network regularized diffusion representation (NRDR) learning model to tackle the issue of information diffusion prediction. The results show that NRDR works better than other state-of-the-art models.

The NRDR model divides users in an information network into two types: senders and receivers. One user can be in both roles at the same time, that is, a user can be a sender of one piece of information and a receiver of another. In traditional studies on information diffusion, the relationship between receivers and senders is modeled using the first-order relation. One user (ui) is connected to a second user (uj) if a message is directly passed between the two. This model doesn’t catch many real-world situations, for example, uj may be indirectly connected to ui through other users. Thus, in the authors’ proposed NRDR model, users are connected through a 2D graph so that ui may connect with uj through a path of length more than one. Doing so can capture the real-world situations in which a user can receive information indirectly from the source of the information. In addition, the connecting graph is constructed using the positive point-wise mutual information (PPMI) metric, to measure the structural proximity between users.

The authors measure the performance of their model via simulation, using data from MemeTracker, Weibo, and Twitter. The metrics examined include precision, recall, and the F-1 measure. The simulations show that NRDR performs better than three state-of-the-art models in most measures (CTIC, NetRate, and Embedded IC). The authors also show the effectiveness of NRDR in ranking all users, that is, to show the order in which the users would eventually get infected (receive information).

The authors’ work provides a different, more effective way of modeling information diffusion. The model uses role-based representation that separates users into senders and receivers. The model captures the higher-order, sometimes hidden information, resulting in a more accurate representation of information diffusion in the real world.

Reviewer:  Xiannong Meng Review #: CR146689 (1912-0436)
Bookmark and Share
  Featured Reviewer  
 
Network Architecture And Design (C.2.1 )
 
 
Human Factors (H.1.2 ... )
 
Would you recommend this review?
yes
no
Other reviews under "Network Architecture And Design": Date
Designing data networks
Ellis R., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986. Type: Book (9789780132018647)
Apr 1 1986
Internetworking
Pouzin L., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986. Type: Book (9789780131650503)
Feb 1 1987
Broadband network technology: an overview for the data and telecommunications industries
Cooper E., Prentice-Hall, Inc., Upper Saddle River, NJ, 1986. Type: Book (9789780130833792)
Oct 1 1987
more...

E-Mail This Printer-Friendly
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy