期刊文献+

加权社会网络中重要节点发现算法 被引量:10

Algorithm for discovering influential nodes in weighted social networks
在线阅读 下载PDF
导出
摘要 从社会网络中发现重要节点是一个很有意义的研究问题,目前多数重要节点发现方法是基于不加权网络。由于在社会网络中,节点之间的关系具有强弱差异,社会网络本质上是一个加权网络。对于加权社会网络中的重要节点发现较少有研究。利用节点交互,提出了节点间关系强度的一种度量方法,该方法考虑了节点局部有向交互特征与全局交互特征。利用节点的行为特征定义了节点活跃度。采用关系强度作为边的权重,活跃度作为节点权重形成了加权社会网络。基于PageRank算法的思想,提出了两个改进算法,算法采用节点权值作为阻尼系数,在迭代式过程用边的权重代替了PageRank算法中的入边和。分别选择国内外具有代表性的2个社交网络上的数据集进行大量实验,并分别选择了不同的方法作为比较,实验结果表明改进算法能较好地发现加权社会网络中的重要节点。 Key nodes discovery is very important for social network. Nowadays, most of methods of key nodes discovery do not take relationship strength of nodes into account. Social networks, in essence, are weighted networks because relationship strengths of nodes are different. In this paper, a new method to compute relationship strength of nodes based on node interactions was proposed, and the niethod combined local features with global features. A node activity degree using user behavior features was defined; as a result, social networks were represented as dual-weighted networks by taking relationship strength as edge weight and node activity as node weight. Based on PageRank algorithm, two improved algorithms were proposed. The node weights were used as damping coefficient, and the weight of the edges was used to compute importance of nodes during iterative process. Two datasets from different sources were selected and comprehensive experiments were conducted. The experimental results show that proposed algorithms can effectively discover key nodes in real social networks.
出处 《计算机应用》 CSCD 北大核心 2013年第6期1553-1557,1562,共6页 journal of Computer Applications
基金 国家自然科学基金资助项目(61170112) 北京市属高等学校科学技术与研究生教育创新工程建设项目(PXM2012_014213_000037)
关键词 社会网络 重要节点 关系强度 页面排序 social network key node relationship strength PageRank
  • 相关文献

参考文献13

  • 1ALBERT R, JEONG H, BARABASI A L. Error and attack toler- ance of complex networks[ J]. Nature, 2000, 406(6794) : 378 - 482.
  • 2PASTOR-SATORRAS R, VESPIGNANI A. Epidemic spreading in scale-free networks[ J]. Physical Review Letters, 2001, 86 (14) : 3200 - 3203.
  • 3COHEN R, EREZ K, BEN-AVRAHAM D, et ol. Breakdown of the Interact under intentional attack [ J]. Physical Review Letters, 2001,86(16) : 3682 -3685.
  • 4FREEMAN L C. Centrality in social networks: Conceptual clarifica- tion[ J]. Social Networks, 1979, 1 (3) : 215 - 239.
  • 5LAPPAS T, TERZI E, GUNOPULOS D, et 01. Finding effectors in social networks[ C]//Proceedings of the 16th ACM SIGKDD Inter- national Conference on Knowledge Discovery and Data Mining. New York: ACM, 2010: 1059-1068.
  • 6KITSAK M, GALLOS L K, HAVLIN S, et al. Identification of influential spreaders in complex networks [ J ]. Nature Physics, 2010,6( 11 ) : 888 -893.
  • 7CENTOLA D. The spread of behavior in an online social network experiment[J]. Science, 2010,329(5996) :1194 - 1197.
  • 8UGANDER J, BACKSTROM L, MARLOW C, et al. Structural diversity in social contagion [ J ]. Proceedings of the National Academy of Sciences, 2012,109 (16) :5962 - 5966.
  • 9CHEN W, WANG Y J, YANG S Y. Efficient influence maximization in social networks [ C ]//Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2009 : 199 -208.
  • 10LU L Y, ZHANG Y C, YEUNG C H, et al. Leaders in social networks,the delicious case [J]. PLoS ONE, 2011, 6 (6):e21202.

同被引文献109

引证文献10

二级引证文献82

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部