1,147 research outputs found

    Exact Computation of Influence Spread by Binary Decision Diagrams

    Full text link
    Evaluating influence spread in social networks is a fundamental procedure to estimate the word-of-mouth effect in viral marketing. There are enormous studies about this topic; however, under the standard stochastic cascade models, the exact computation of influence spread is known to be #P-hard. Thus, the existing studies have used Monte-Carlo simulation-based approximations to avoid exact computation. We propose the first algorithm to compute influence spread exactly under the independent cascade model. The algorithm first constructs binary decision diagrams (BDDs) for all possible realizations of influence spread, then computes influence spread by dynamic programming on the constructed BDDs. To construct the BDDs efficiently, we designed a new frontier-based search-type procedure. The constructed BDDs can also be used to solve other influence-spread related problems, such as random sampling without rejection, conditional influence spread evaluation, dynamic probability update, and gradient computation for probability optimization problems. We conducted computational experiments to evaluate the proposed algorithm. The algorithm successfully computed influence spread on real-world networks with a hundred edges in a reasonable time, which is quite impossible by the naive algorithm. We also conducted an experiment to evaluate the accuracy of the Monte-Carlo simulation-based approximation by comparing exact influence spread obtained by the proposed algorithm.Comment: WWW'1

    Computational fact checking from knowledge networks

    Get PDF
    Traditional fact checking by expert journalists cannot keep up with the enormous volume of information that is now generated online. Computational fact checking may significantly enhance our ability to evaluate the veracity of dubious information. Here we show that the complexities of human fact checking can be approximated quite well by finding the shortest path between concept nodes under properly defined semantic proximity metrics on knowledge graphs. Framed as a network problem this approach is feasible with efficient computational techniques. We evaluate this approach by examining tens of thousands of claims related to history, entertainment, geography, and biographical information using a public knowledge graph extracted from Wikipedia. Statements independently known to be true consistently receive higher support via our method than do false ones. These findings represent a significant step toward scalable computational fact-checking methods that may one day mitigate the spread of harmful misinformation

    Computing a T-transitive lower approximation or opening of a proximity relation

    Get PDF
    Fuzzy Sets and Systems. IMPACT FACTOR: 1,181. Fuzzy Sets and Systems. IMPACT FACTOR: 1,181. Since transitivity is quite often violated even by decision makers that accept transitivity in their preferences as a condition for consistency, a standard approach to deal with intransitive preference elicitations is the search for a close enough transitive preference relation, assuming that such a violation is mainly due to decision maker estimation errors. In some way, the more number of elicitations, the more probable inconsistency is. This is mostly the case within a fuzzy framework, even when the number of alternatives or object to be classified is relatively small. In this paper we propose a fast method to compute a T-indistinguishability from a reflexive and symmetric fuzzy relation, being T any left-continuous t-norm. The computed approximation we propose will take O(n3) time complexity, where n is the number of elements under consideration, and is expected to produce a T-transitive opening. To the authors¿ knowledge, there are no other proposed algorithm that computes T-transitive lower approximations or openings while preserving the reflexivity and symmetry properties

    An algorithm to compute the transitive closure, a transitive approximation and a transitive opening of a fuzzy proximity

    Get PDF
    A method to compute the transitive closure, a transitive opening and a transitive approximation of a reflexive and symmetric fuzzy relation is given. Other previous methods in literature compute just the transitive closure, some transitive approximations or some transitive openings. The proposed algorithm computes the three different similarities that approximate a proximity for the computational cost of computing just one. The shape of the binary partition tree for the three output similarities are the same.Peer ReviewedPostprint (published version

    Algorithms for Galois extensions of global function fields

    Get PDF
    In this thesis we consider the computation of integral closures in cyclic Galois extensions of global function fields and the determination of Galois groups of polynomials over global function fields. The development of methods to efficiently compute integral closures and Galois groups are listed as two of the four most important tasks of number theory considered by Zassenhaus. We describe an algorithm each for computing integral closures specifically for Kummer, Artin--Schreier and Artin--Schreier--Witt extensions. These algorithms are more efficient than previous algorithms because they compute a global (pseudo) basis for such orders, in most cases without using a normal form computation. For Artin--Schreier--Witt extensions where the normal form computation may be necessary we attempt to minimise the number of pseudo generators which are input to the normal form. These integral closure algorithms for cyclic extensions can lead to constructing Goppa codes, which can correct a large proportion of errors, more efficiently. The general algorithm we describe to compute Galois groups is an extension of the algorithm of Fieker and Klueners to polynomials over function fields of characteristic p. This algorithm has no restrictions on the degrees of the polynomials it can compute Galois groups for. Previous algorithms have been restricted to polynomials of degree at most 23. Characteristic 2 presents additional challenges as we need to adjust our use of invariants because some invariants do not work in characteristic 2 as they do in other characteristics. We also describe how this algorithm can be used to compute Galois groups of reducible polynomials, including those over function fields of characteristic p. All of the algorithms described in this thesis have been implemented by the author in the Magma Computer Algebra System and perform effectively as is shown by a number of examples and a collection of timings
    corecore