{"id":263325,"date":"2015-10-15T07:16:03","date_gmt":"2015-10-15T14:16:03","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-research-item&p=263325"},"modified":"2018-10-16T19:56:05","modified_gmt":"2018-10-17T02:56:05","slug":"%e7%a4%be%e4%ba%a4%e7%bd%91%e7%bb%9c%e5%bd%b1%e5%93%8d%e5%8a%9b%e4%bc%a0%e6%92%ad%e7%a0%94%e7%a9%b6-research-influence-diffusion-social-networks","status":"publish","type":"msr-research-item","link":"https:\/\/www.microsoft.com\/en-us\/research\/publication\/%e7%a4%be%e4%ba%a4%e7%bd%91%e7%bb%9c%e5%bd%b1%e5%93%8d%e5%8a%9b%e4%bc%a0%e6%92%ad%e7%a0%94%e7%a9%b6-research-influence-diffusion-social-networks\/","title":{"rendered":"\u793e\u4ea4\u7f51\u7edc\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76 (Research on influence diffusion in social networks)"},"content":{"rendered":"
\u968f\u7740\u4e92\u8054\u7f51\u548c\u5927\u6570\u636e\u7684\u7814\u7a76\u5e94\u7528\u65e5\u76ca\u5e7f\u6cdb\uff0c\u5bf9\u793e\u4ea4\u7f51\u7edc\u5f71\u54cd\u529b\u4f20\u64ad\u7684\u7814\u7a76\u6210\u4e3a\u6570\u636e\u6316\u6398\u548c\u793e\u4ea4\u7f51\u7edc\u5206\u6790\u4e2d\u7684\u70ed\u70b9\u3002\u4ece\u5f71\u54cd\u529b\u4f20\u64ad\u6a21\u578b\u3001\u5f71\u54cd\u529b\u4f20\u64ad\u5b66\u4e60\u548c\u5f71\u54cd\u529b\u4f20\u64ad\u4f18\u53163\u4e2a\u65b9\u9762\u603b\u7ed3\u4e86\u8fd1\u4e9b\u5e74\u8ba1\u7b97\u673a\u79d1\u5b66\u9886\u57df\u5bf9\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\u7684\u4e3b\u8981\u6210\u679c\uff0c\u5c55\u793a\u4e86\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\u4e2d\u5bf9\u968f\u673a\u6a21\u578b\u3001\u6570\u636e\u6316\u6398\u3001\u7b97\u6cd5\u4f18\u5316\u548c\u535a\u5f08\u8bba\u7b49\u6280\u672f\u7684\u7efc\u5408\u8fd0\u7528\u3002\u6700\u540e\uff0c\u7b80\u8981\u8ba8\u8bba\u4e86\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\u548c\u5e94\u7528\u4e2d\u5b58\u5728\u7684\u95ee\u9898\u3001\u6311\u6218\u53ca\u4eca\u540e\u7684\u7814\u7a76\u65b9\u5411\u3002<\/p>\n
With the wide spread of Internet and big data research and applications, influence diffusion research in social networks becomes one of the hot topics in data mining and social networks analysis in recent years. The main results on social influence diffusion research from the field of computer science in the last decade, which covers the three main areas — influence diffusion modeling, influence diffusion learning, and influence diffusion optimization, were summarized. Different techniques, such as stochastic modeling, data mining, algorithmic optimization, and game theory, were demonstrated in their application to influence diffusion research. Finally, some discussions on the current issues, challenges and future directions in influence diffusion research and applications were provided.<\/p>\n","protected":false},"excerpt":{"rendered":"
\u968f\u7740\u4e92\u8054\u7f51\u548c\u5927\u6570\u636e\u7684\u7814\u7a76\u5e94\u7528\u65e5\u76ca\u5e7f\u6cdb\uff0c\u5bf9\u793e\u4ea4\u7f51\u7edc\u5f71\u54cd\u529b\u4f20\u64ad\u7684\u7814\u7a76\u6210\u4e3a\u6570\u636e\u6316\u6398\u548c\u793e\u4ea4\u7f51\u7edc\u5206\u6790\u4e2d\u7684\u70ed\u70b9\u3002\u4ece\u5f71\u54cd\u529b\u4f20\u64ad\u6a21\u578b\u3001\u5f71\u54cd\u529b\u4f20\u64ad\u5b66\u4e60\u548c\u5f71\u54cd\u529b\u4f20\u64ad\u4f18\u53163\u4e2a\u65b9\u9762\u603b\u7ed3\u4e86\u8fd1\u4e9b\u5e74\u8ba1\u7b97\u673a\u79d1\u5b66\u9886\u57df\u5bf9\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\u7684\u4e3b\u8981\u6210\u679c\uff0c\u5c55\u793a\u4e86\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\u4e2d\u5bf9\u968f\u673a\u6a21\u578b\u3001\u6570\u636e\u6316\u6398\u3001\u7b97\u6cd5\u4f18\u5316\u548c\u535a\u5f08\u8bba\u7b49\u6280\u672f\u7684\u7efc\u5408\u8fd0\u7528\u3002\u6700\u540e\uff0c\u7b80\u8981\u8ba8\u8bba\u4e86\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\u548c\u5e94\u7528\u4e2d\u5b58\u5728\u7684\u95ee\u9898\u3001\u6311\u6218\u53ca\u4eca\u540e\u7684\u7814\u7a76\u65b9\u5411\u3002 With the wide spread of Internet and big data research and applications, influence diffusion research in social networks becomes one of the hot topics in data mining and social networks analysis in recent years. The main results on social influence diffusion research from the field of computer science in the last decade, which covers […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"msr-content-type":[3],"msr-research-highlight":[],"research-area":[13561,13548,13559],"msr-publication-type":[193715],"msr-product-type":[],"msr-focus-area":[],"msr-platform":[],"msr-download-source":[],"msr-locale":[268875],"msr-post-option":[],"msr-field-of-study":[],"msr-conference":[],"msr-journal":[],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-263325","msr-research-item","type-msr-research-item","status-publish","hentry","msr-research-area-algorithms","msr-research-area-economics","msr-research-area-social-sciences","msr-locale-en_us"],"msr_publishername":"","msr_edition":"\u5927\u6570\u636e\uff0c\u7b2c\u4e09\u671f\uff0c2015 \uff08Big Data Research, No.3 2015)","msr_affiliation":"","msr_published_date":"2015-10-15","msr_host":"","msr_duration":"","msr_version":"","msr_speaker":"","msr_other_contributors":"","msr_booktitle":"","msr_pages_string":"","msr_chapter":"3","msr_isbn":"","msr_journal":"\u5927\u6570\u636e (Big Data Research)","msr_volume":"1","msr_number":"","msr_editors":"","msr_series":"","msr_issue":"","msr_organization":"","msr_how_published":"","msr_notes":"","msr_highlight_text":"","msr_release_tracker_id":"","msr_original_fields_of_study":"","msr_download_urls":"","msr_external_url":"","msr_secondary_video_url":"","msr_longbiography":"","msr_microsoftintellectualproperty":1,"msr_main_download":"263331","msr_publicationurl":"","msr_doi":"","msr_publication_uploader":[{"type":"file","title":"2015026-\u9648\u536b-\u793e\u4ea4\u7f51\u7edc\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\uff08\u6700\u7ec8\u7248\uff09","viewUrl":"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/07\/2015026-\u9648\u536b-\u793e\u4ea4\u7f51\u7edc\u5f71\u54cd\u529b\u4f20\u64ad\u7814\u7a76\uff08\u6700\u7ec8\u7248\uff09-1.pdf","id":263331,"label_id":0}],"msr_related_uploader":"","msr_attachments":[],"msr-author-ordering":[{"type":"user_nicename","value":"weic","user_id":34795,"rest_url":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/microsoft-research\/v1\/researchers?person=weic"}],"msr_impact_theme":[],"msr_research_lab":[199560],"msr_event":[],"msr_group":[802999],"msr_project":[],"publication":[],"video":[],"download":[],"msr_publication_type":"article","related_content":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/263325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-research-item"}],"version-history":[{"count":1,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/263325\/revisions"}],"predecessor-version":[{"id":513029,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-item\/263325\/revisions\/513029"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=263325"}],"wp:term":[{"taxonomy":"msr-content-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-content-type?post=263325"},{"taxonomy":"msr-research-highlight","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-research-highlight?post=263325"},{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=263325"},{"taxonomy":"msr-publication-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-publication-type?post=263325"},{"taxonomy":"msr-product-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-product-type?post=263325"},{"taxonomy":"msr-focus-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-focus-area?post=263325"},{"taxonomy":"msr-platform","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-platform?post=263325"},{"taxonomy":"msr-download-source","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-download-source?post=263325"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=263325"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=263325"},{"taxonomy":"msr-field-of-study","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-field-of-study?post=263325"},{"taxonomy":"msr-conference","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-conference?post=263325"},{"taxonomy":"msr-journal","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-journal?post=263325"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=263325"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=263325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}