Skip to main content

Recovering Social Networks from Contagion Information

  • Conference paper
Theory and Applications of Models of Computation (TAMC 2010)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 6108))

Abstract

Many algorithms for analyzing social networks assume that the structure of the network is known, but this is not always a reasonable assumption. We wish to reconstruct an underlying network given data about how some property, such as disease, has spread through the network. Properties may spread through a network in different ways: for instance, an individual may learn information as soon as one of his neighbors has learned that information, but political beliefs may follow a different type of model. We create algorithms for discovering underlying networks that would give rise to the diffusion in these models.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, pp. 708–766. MIT Press and McGraw Hill (2009)

    Google Scholar 

  2. Granovetter, M.: Threshold Models of Collective Behavior. Am. J. Sociol. 83(6), 1420–1443 (1978)

    Article  Google Scholar 

  3. Kleinberg, J.: Cascading Behavior in Networks: Algorithmic and Economic Issues. In: Algorithmic Game Theory, ch. 24. Cambridge Universisty Press, Cambridge (2007)

    Google Scholar 

  4. Krebs, V.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2001)

    Google Scholar 

  5. Miller, J.C., Hyman, J.M.: Effective Vaccination Strategies for Realistic Social Networks. Physica A 386(2), 780–785 (2007)

    Article  MathSciNet  Google Scholar 

  6. Xu, J., Chen, H.: Criminal Network Analysis and Visualization. Communications of the ACM 48(6), 100–107 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Soundarajan, S., Hopcroft, J.E. (2010). Recovering Social Networks from Contagion Information. In: Kratochvíl, J., Li, A., Fiala, J., Kolman, P. (eds) Theory and Applications of Models of Computation. TAMC 2010. Lecture Notes in Computer Science, vol 6108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13562-0_38

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13562-0_38

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13561-3

  • Online ISBN: 978-3-642-13562-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics