• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Yu Yaxin, Wang Lei. An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068
Citation: Yu Yaxin, Wang Lei. An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network[J]. Journal of Computer Research and Development, 2019, 56(6): 1302-1311. DOI: 10.7544/issn1000-1239.2019.20180068

An Advertising Game Theory Decision-Making Mechanism for Overlapping Seeds in Geo-Social Network

Funds: This work was supported by the National Key Research and Development Plan of China (2016YFC0101500) and the National Natural Science Foundation of China (61871106).
More Information
  • Published Date: May 31, 2019
  • Social advertising (or social promotion), one of the most important application for influence maximization (IM), has become a hot industry. The purpose of social advertising is to identify a seed set of k nodes for maximizing the expected influence spread to make businesses promote products by utilizing the cascade effect. However, most existing works concerning influence maximization problem were confined to behaviors that were observed mostly in the virtual world and neglected the location information. In fact, the distance between users can also affect propagation probability during information propagation. Thus, a problem of location-aware influence maximization (LAIM) in geo-social network is formally defined in this paper. Further, a location-aware influence maximization algorithm based on greedy frame is proposed, which introduces the promotion location information into the existing IM definition and solves the problem that influence spread is not in line with actual demand in traditional IM. Due to the overlapping seeds problem caused by inevitable competition, some of the selected nodes may not work well in practice. Thus we first conduct a decision-making game from overlapping seed’s perspective to obtain Nash equilibrium by analyzing the payoff matrix of overlapping seeds and their neighbors so that the overlapping ratio of seed set and influence loss will be reduced. Finally, comprehensive experiments demonstrate the effectiveness of our algorithm and strategy.
  • Related Articles

    [1]Fu Liguo, Pang Jianmin, Wang Jun, Zhang Jiahao, Yue Feng. Formal Model of Correctness and Optimization on Binary Translation[J]. Journal of Computer Research and Development, 2019, 56(9): 2001-2011. DOI: 10.7544/issn1000-1239.2019.20180513
    [2]Zhou Zhibin, Wang Guojun, Liu Qin, Jia Weijia. A RFID Anonymous Grouping Proof Protocol Using Dual-Layer Verification[J]. Journal of Computer Research and Development, 2018, 55(12): 2674-2684. DOI: 10.7544/issn1000-1239.2018.20170787
    [3]Fu Yanyan, Zhang Min, Chen Kaiqu, Feng Dengguo. Proofs of Data Possession of Multiple Copies[J]. Journal of Computer Research and Development, 2014, 51(7): 1410-1416.
    [4]Li Tao, Zhang Jingzhong. Machine Proofs in Geometry Based on Complex Number Method[J]. Journal of Computer Research and Development, 2013, 50(9): 1963-1969.
    [5]Ma Yanfang, Zhang Min, Chen Yixiang. Formal Description of Software Dynamic Correctness[J]. Journal of Computer Research and Development, 2013, 50(3): 626-635.
    [6]Wang Yong, Fang Juan, Ren Xingtian, and Lin Li. Formal Verification of TCG Remote Attestation Protocols Based on Process Algebra[J]. Journal of Computer Research and Development, 2013, 50(2): 325-331.
    [7]Wang Changjing. Verifying the Correctness of Loop Optimization Based on Extended Logic Transformation System μTS[J]. Journal of Computer Research and Development, 2012, 49(9): 1863-1873.
    [8]Jing Shuxu, He Fazhi, Cai Xiantao, Cheng Yuan. A Method for Object Reference in Collaborative Modeling System[J]. Journal of Computer Research and Development, 2011, 48(11): 2031-2038.
    [9]Si Tiange, Tan Zhiyong, and Dai Yiqi. A Security Proof Method for Multilevel Security Models[J]. Journal of Computer Research and Development, 2008, 45(10): 1711-1717.
    [10]Wang Guilin, Qing Sihan. Security Notes on Two Cheat-Proof Secret Sharing Schemes[J]. Journal of Computer Research and Development, 2005, 42(11): 1924-1927.

Catalog

    Article views (898) PDF downloads (338) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return