Abstract
Many algorithms for analyzing social networks assume that the structure of the network is known, but this is not always a reasonable assumption. We wish to reconstruct an underlying network given data about how some property, such as disease, has spread through the network. Properties may spread through a network in different ways: for instance, an individual may learn information as soon as one of his neighbors has learned that information, but political beliefs may follow a different type of model. We create algorithms for discovering underlying networks that would give rise to the diffusion in these models.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, pp. 708–766. MIT Press and McGraw Hill (2009)
Granovetter, M.: Threshold Models of Collective Behavior. Am. J. Sociol. 83(6), 1420–1443 (1978)
Kleinberg, J.: Cascading Behavior in Networks: Algorithmic and Economic Issues. In: Algorithmic Game Theory, ch. 24. Cambridge Universisty Press, Cambridge (2007)
Krebs, V.: Mapping Networks of Terrorist Cells. Connections 24(3), 43–52 (2001)
Miller, J.C., Hyman, J.M.: Effective Vaccination Strategies for Realistic Social Networks. Physica A 386(2), 780–785 (2007)
Xu, J., Chen, H.: Criminal Network Analysis and Visualization. Communications of the ACM 48(6), 100–107 (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Soundarajan, S., Hopcroft, J.E. (2010). Recovering Social Networks from Contagion Information. In: Kratochvíl, J., Li, A., Fiala, J., Kolman, P. (eds) Theory and Applications of Models of Computation. TAMC 2010. Lecture Notes in Computer Science, vol 6108. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13562-0_38
Download citation
DOI: https://doi.org/10.1007/978-3-642-13562-0_38
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-13561-3
Online ISBN: 978-3-642-13562-0
eBook Packages: Computer ScienceComputer Science (R0)