Meme ranking to maximize posts virality in microblogging platforms

Microblogging is a modern communication paradigm in which users post bits of information, or “memes” as we call them, that are brief text updates or micromedia such as photos, video or audio clips. Once a user post a meme, it become visible to the user community. When a user finds a meme of another user interesting, she can eventually repost it, thus allowing memes to propagate virally trough the social network. In this paper we introduce the meme ranking problem, as the problem of selecting which k memes (among the ones posted by their contacts) to show to users when they log into the system. The objective is to maximize the overall activity of the network, that is, the total number of reposts that occur. We deeply characterize the problem showing that not only exact solutions are unfeasible, but also approximated solutions are prohibitive to be adopted in an on-line setting. Therefore we devise a set of heuristics and we compare them trough an extensive simulation based on the real-world Yahoo! Meme social graph, using parameters learnt from real logs of meme propagations. Our experimentation demonstrates the effectiveness and feasibility of these methods.

[1]  Krishna P. Gummadi,et al.  Measuring User Influence in Twitter: The Million Follower Fallacy , 2010, ICWSM.

[2]  Lada A. Adamic,et al.  Social influence and the diffusion of user-created content , 2009, EC '09.

[3]  Yun Chi,et al.  Information flow modeling based on diffusion rate for prediction and ranking , 2007, WWW '07.

[4]  Jon M. Kleinberg,et al.  Feedback effects between similarity and social influence in online communities , 2008, KDD.

[5]  Lada A. Adamic,et al.  Information flow in social groups , 2003, cond-mat/0305305.

[6]  Krishna P. Gummadi,et al.  A measurement-driven analysis of information propagation in the flickr social network , 2009, WWW '09.

[7]  John Yen,et al.  Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 workshop on Web mining and social network analysis , 2007, KDD 2007.

[8]  Jure Leskovec,et al.  Patterns of Influence in a Recommendation Network , 2006, PAKDD.

[9]  Lada A. Adamic,et al.  Tracking information epidemics in blogspace , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).

[10]  James A. Hendler,et al.  Inferring binary trust relationships in Web-based social networks , 2006, TOIT.

[11]  Philip S. Yu,et al.  Identifying the influential bloggers in a community , 2008, WSDM '08.

[12]  Noah E. Friedkin,et al.  A Structural Theory of Social Influence: List of Tables and Figures , 1998 .

[13]  Jon M. Kleinberg,et al.  Group formation in large social networks: membership, growth, and evolution , 2006, KDD '06.

[14]  Matthew Richardson,et al.  Mining knowledge-sharing sites for viral marketing , 2002, KDD.

[15]  Morteza Amini,et al.  Trust Inference in Web-Based Social Networks Using Resistive Networks , 2008, 2008 Third International Conference on Internet and Web Applications and Services.

[16]  Eli Upfal,et al.  Probability and Computing: Randomized Algorithms and Probabilistic Analysis , 2005 .

[17]  Ching-Yung Lin,et al.  Personalized recommendation driven by information flow , 2006, SIGIR.

[18]  Jure Leskovec,et al.  Meme-tracking and the dynamics of the news cycle , 2009, KDD.

[19]  Wei Chen,et al.  Efficient influence maximization in social networks , 2009, KDD.

[20]  Juan Julián Merelo Guervós,et al.  NectaRSS, an RSS feed ranking system that implicitly learns user preferences , 2006, ArXiv.

[21]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[22]  Leslie G. Valiant,et al.  The Complexity of Enumeration and Reliability Problems , 1979, SIAM J. Comput..

[23]  Christos Faloutsos,et al.  Graphs over time: densification laws, shrinking diameters and possible explanations , 2005, KDD '05.

[24]  Ramanathan V. Guha,et al.  Information diffusion through blogspace , 2004, WWW '04.

[25]  Timothy W. Finin,et al.  Why we twitter: understanding microblogging usage and communities , 2007, WebKDD/SNA-KDD '07.

[26]  Noah E. Friedkin,et al.  A Structural Theory of Social Influence: List of Tables and Figures , 1998 .

[27]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[28]  Mohammed J. Zaki Efficiently mining frequent trees in a forest: algorithms and applications , 2005, IEEE Transactions on Knowledge and Data Engineering.

[29]  Qi He,et al.  TwitterRank: finding topic-sensitive influential twitterers , 2010, WSDM '10.

[30]  Andreas Krause,et al.  Cost-effective outbreak detection in networks , 2007, KDD '07.

[31]  Matthew Richardson,et al.  Mining the network value of customers , 2001, KDD '01.

[32]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[33]  Noah E. Friedkin A Structural Theory of Social Influence: Measures of the Theoretical Constructs , 1998 .

[34]  Georg Lausen,et al.  Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.

[35]  Jimeng Sun,et al.  Social influence analysis in large-scale networks , 2009, KDD.

[36]  Kristina Lerman,et al.  Social Browsing on Flickr , 2006, ICWSM.

[37]  Laks V. S. Lakshmanan,et al.  Learning influence probabilities in social networks , 2010, WSDM '10.

[38]  Yifei Yuan,et al.  Scalable Influence Maximization in Social Networks under the Linear Threshold Model , 2010, 2010 IEEE International Conference on Data Mining.

[39]  Wei Chen,et al.  Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.