WO2016206095A1 - Social influence determination - Google Patents
Social influence determination Download PDFInfo
- Publication number
- WO2016206095A1 WO2016206095A1 PCT/CN2015/082504 CN2015082504W WO2016206095A1 WO 2016206095 A1 WO2016206095 A1 WO 2016206095A1 CN 2015082504 W CN2015082504 W CN 2015082504W WO 2016206095 A1 WO2016206095 A1 WO 2016206095A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- user
- probability
- social influence
- processor
- social
- Prior art date
Links
- 238000000034 method Methods 0.000 claims abstract description 98
- 230000009471 action Effects 0.000 claims abstract description 31
- 230000000694 effects Effects 0.000 claims description 83
- 230000000875 corresponding effect Effects 0.000 description 13
- 230000006399 behavior Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 230000006870 function Effects 0.000 description 5
- 230000003993 interaction Effects 0.000 description 5
- 235000019640 taste Nutrition 0.000 description 5
- 230000009916 joint effect Effects 0.000 description 4
- 230000001143 conditioned effect Effects 0.000 description 3
- 230000006855 networking Effects 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000001427 coherent effect Effects 0.000 description 2
- 230000003247 decreasing effect Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000000137 annealing Methods 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 230000003542 behavioural effect Effects 0.000 description 1
- 230000002457 bidirectional effect Effects 0.000 description 1
- 230000010267 cellular communication Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000002596 correlated effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000008451 emotion Effects 0.000 description 1
- 210000003746 feather Anatomy 0.000 description 1
- 244000144992 flock Species 0.000 description 1
- 238000009434 installation Methods 0.000 description 1
- 238000005259 measurement Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000004044 response Effects 0.000 description 1
- 230000000192 social effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
Definitions
- FIG. 1 is a block diagram of an example computing environment in which social influence determination may be useful
- FIG. 2 is a graphical representation of an example model of a joint activity and relation framework
- FIG. 3 is a flowchart of an example method for social influence and topic determination
- FIG. 4 is a flowchart of an example method for social influence determination
- FIG. 5 is a flowchart of an example method for social influence determination
- FIG. 6 is a block diagram of an example system for social influence determination.
- FIG. 7 is a block diagram of an example system for social influence determination.
- BMI Bidirectional mutual interactions
- Kate’s behavior could in turn impact her relationships with others such as Bob. If Kate and Bob have similar behaviors, there is a likelihood that Kate and Bob will create a user-user relationship.
- the social influence determination systems and methods discussed herein are not limited to users of online social networks, but may be applied to users of any platform.
- the mechanism that drives the characteristics and dynamics of BMI may be expressed as the underlying social influence.
- Social influence refers to the phenomenon that a user follows an opinion from others, which may or may not deviate from the user’s own interests.
- the user’s activities are not solely dependent on the user’s own preferences but also influenced by the tastes of other people.
- the social relationship between two users depends not only on their prior impressions to each other but also their behavior agreement.
- Social influence may be expressed quantitatively as the probability that a user follows an opinion from others, for both the user’s activities and the user’s relationships to others.
- the influences from different users are essentially different. Furthermore, some people with different interests may be very influential to a user, while some other people with very similar interests may not contribute too much to this user.
- Example social influence determination systems determine social influence quantitatively to capture BMI for joint and enhanced user activity prediction and user-user relationship discovery.
- Example social influence determination systems may use a unified probabilistic approach, such as a joint activity and relation (JAR) , for modeling and predicting users’ activities and user-user relationships simultaneously in a single coherent framework. Instead of incorporating social influence in an ad hoc manner, the example social influence determination systems may capture social influence quantitatively.
- JAR joint activity and relation
- the example social influence determination systems determine social influence between users and users’ personal preferences for both user activity prediction and user-user relation discovery through statistical inference.
- Example social influence determination systems may use learning algorithms based on expectation maximization (EM) to address the challenges of the introduced multiple layers of hidden variables in JAR. In this manner, the example social influence determination systems use JAR to exploits mutual interactions and benefits, by taking advantage of the learned social influence and users’ personal preferences for enhanced user activity prediction and user-user relation discovery.
- EM expectation maximization
- Example social influence determination systems may determine the probability that a user activity corresponding to that content, such as affirming or “liking” the content is attributed to the user’s personal preference as opposed to the probability that the user activity is attributed to the social influence on the user from one or more other users of the social network.
- example social influence determination systems may determine the probability that a user-user relationship established by a user is attributed to the user’s prior impression as opposed to the probability that the user activity is attributed to the social influence on the user from one or more other users of the social network.
- An example method for determining social influence may include generating a set of user characteristics corresponding to a user.
- the user characteristics may include user preferences and/or prior impressions.
- the example method may include determining a social influence on the user.
- the social influence may be probability that the user will be influenced by a second user.
- the example method may include generating an independence factor describing an independence of the user in making a user action.
- Example user actions may include user activities and/or user-user relationships.
- the example method may include determining an attribution probability that the user action is attributed to the social influence. The attribution probability is based on the set of user characteristics, the social influence and the independence factor.
- FIG. 1 is an example environment 100 in which various examples may be implemented as a social influence determination system 110.
- Social influence determination system 110 may comprise various components, including a user characteristic engine 112, a social influence engine 114, an independence factor engine 116, a probability engine 118, a topic engine 120, a user activity probability engine 122, a user-user relationship engine 124, and/or other components.
- Environment 100 may also include various components including a server computing device 120 and a client computing device 122.
- the client computing device 122 may communicate requests to and/or receive responses from the server computing device 120.
- the server computing device 120 may receive and/or respond to requests from the client computing device 122.
- the client computing device 122 may be any type of computing device providing a user interface through which a user can interact with a software application.
- the client computing device 122 may include a laptop computing device, a desktop computing device, an all-in-one computing device, a tablet computing device, a mobile phone, and/or other electronic device suitable for displaying a user interface and processing user interactions with the displayed interface.
- the server computing device 120 is depicted as a single computing device, the server computing device 120 may include any number of integrated or distributed computing devices serving at least one software application for consumption by the client computing device 122.
- Network 124 may comprise any infrastructure or combination of infrastructures that enable electronic communication between the components.
- the network 124 may include at least one of the Internet, an intranet, a PAN (Personal Area Network) , a LAN (Local Area Network) , a WAN (Wide Area Network) , a SAN (Storage Area Network) , a MAN (Metropolitan Area Network) , a wireless network, a cellular communications network, a Public Switched Telephone Network, and/or other network.
- social influence determination system 110 and the various components described herein may be implemented in hardware and/or a combination of hardware and programming that configures hardware. Furthermore, in FIG. 1 and other Figures described herein, different numbers of components or entities than depicted may be used.
- social influence determination system 110 may comprise various components, including a user characteristic engine 112, a social influence engine 114, an independence factor engine 116, a probability engine 118, a topic engine 120, a user activity probability engine 122, a user-user relationship engine 124, and/or other components.
- the components of the social influence determination system 110 as described herein, may refer to a hardware or a combination of hardware and instructions that performs a designated function.
- the hardware of the various components of social influence determination system 110 may include one or both of a processor and a machine-readable storage medium, while the instructions are code stored on the machine-readable storage medium and executable by the processor to perform the designated function.
- User characteristic engine 112 may generate a set of user characteristics corresponding to a user.
- the user may be a member or otherwise belong to a social network.
- online social networks are just one example of platforms with users and the social influence determination systems and methods discussed herein may be applied to and/or used with users of any platform, group, etc.
- the set of user characteristics may include user preferences corresponding to a user of a social network, such as topics, products, etc.
- the set of characteristics may also include prior impressions from a first user of a social network on a second user of the social network. For example, a first user may have influence on a second user in creating a relationship, creating content, etc.
- the user characteristics may include additional and/or alternate elements associated with a user.
- Social influence engine 114 may determine a social influence between one or more users.
- the social influence may be a probability that a first user will be influenced by the second user.
- the independence factor engine 116 may generate an independence factor for a user of the social network.
- the independence factor may describe an independence of the user in performing a user action, such as a user activity and/or a user-user relationship.
- the independence factor may weight the probability of a user’s own interests affecting the user’s activity.
- the independence factor may additionally and/or alternatively weight the probability of a user’s own interests affecting the likelihood of the user creating a user-user relationship.
- the independence factor may be a value from 0.0 to 1.0 with an incremental step of 0.1.
- Probability engine 118 may determine an attribution probability that the user activity is attributed to the user influence.
- the attribution probability may be based on: the set of user characteristics (e.g., as discussed herein with respect to user characteristic engine 112) , the social influence (e.g., as discussed herein with respect to social influence engine 114) , and the independence factor (e.g., as discussed herein with respect to independence factor engine 116) .
- the probability engine 118 may determine a first attribution probability that the user action is attributed to the social influence as well as a second probability that the user action is attributed to the user characteristics.
- the first and second probabilities may be compared and/or otherwise analyzed.
- the comparison and/or analysis may generate a third attribution probability.
- the probability engine 118 may incorporate one or more models in determining the attribution probability.
- the probability engine 118 may incorporate a joint activity and relation (JAR) model.
- JAR joint activity and relation
- FIG. 2 shows a graphical representation of a model 200 of a joint activity and relation (JAR) framework.
- the model 200 explores several important factors, such as user preferences and social influence, contributing to user actions.
- User actions may include actions taken by a user on a social network, such as user activities and user-user relationships.
- user-user relationship may refer to a relationship between two or more users of a social network.
- the model enables quantified social influence among individuals for both users’ activities and user-user relationships.
- the model 200 models activity of a user u (left portion 202) , activity of user v (right portion 204) , and user-user relationship between user u and user v (middle portion 206) .
- the left portion 202 and the right portion 204 of the model 200 have a similar structure, the left portion 202 (modeling the activity of user u) is described to illustrate user activity.
- Example user activities may include generating content, such as a post, sharing content, affirming content, commenting, etc.
- the preference of user u may be captured through a set of latent topics t and the activities y of user u and corresponding tags w are correlated with user u through the set of latent topics t.
- the user activity y (y ⁇ Y) (y is associated with a tag w) of user u (u ⁇ V ) is subject to the preference of user u (the latent topic t) for the independent selection of user u and the social influence s from others.
- the social influence variable s represents any user directly connected to user u in the social graph G.
- a connection of user u may be another user of the social network that user u has a relationship with, via, for example, a user activity, a direct user relationship, etc. Connections may include close friends, family members, colleagues, acquaintances, etc. Let be the set of three users directly connected to user u.
- the social influence from s in S (u) to u is measured as the probability of the preferences of the social influence s that contribute to user activities of user u and/or user u’s relationship to v.
- user u’s independent choice and user u’s own tastes may play a more important role for a user action (such as user activity y, user u’s relationship to user v, etc. ) than the social influence and preferences from S (u) .
- Both the user activity y of user u and the relationship of user u to user v are probabilistically determined based on the interests of user u or the preferences of s (s ⁇ S (u) ) via social influence.
- u) is defined as the probability of user u to be influenced by user s.
- a topic t may be randomly selected from the interests of user s based on the conditional probability P (t
- the topic t generates an activity y and a tag w based on activity distribution of topic t (P (y
- a topic t may be selected for the tastes of user u based on P (t
- u) the relationship probability from u to v is measured as P (s
- the relationship probability from u to v is measured based on u’s prior impression as P (v
- Both user activities and user-user relationships are modeled in a single coherent framework via social influence to capture the BMI between them.
- the social influence from S (u) may be measured quantitatively and efficiently and the effect of social influence for both user activities and user-user relations may be analyzed.
- the probability engine 118 may also incorporate one or more algorithms, equations, etc., in conjunction with the one or more models in determining the attribution probability.
- the probability engine 118 may optimize the joint conditional probability P (y, v
- u) may be calculated as:
- Equation (1)
- Equation (2)
- equation (2) can be rewritten as follows:
- Equation (3) Equation (3)
- Equation (3) may be transformed into the following equation as:
- Equation (4)
- Equation (4) several model parameters of JAR are estimated, including P (u
- JAR jointly incorporates several important factors for simultaneous user activity prediction and user-user relationship inference, including the distribution of social influence P(u
- Topic engine 120 may determine a social influence topic corresponding to an interest of the social influence and determine the effect of the social influence topic on the user action. Topic engine 120 may further determine a user topic corresponding to an interest of the user and determine the effect of the user topic on the user action. Topic engine 120 may use one or more algorithms, equations, models, etc. For example, topic engine 120 may implement a learning algorithm based on expectation maximization (EM) to determine multiple hidden variables s and t. The learning algorithm may maximize the complete log-likelihood of the social data as:
- EM expectation maximization
- s represents social influence variables
- t latent topic variables
- ⁇ represents the parameters of a JAR model, such as the model 200 illustrated in FIG. 2, including P (u
- Topic engine 120 may maximize the lower bound L ( ⁇ ) of the log-likelihood according to Jensen’s inequality as
- Equation (6)
- the E-step includes computing the expected value of the log-likelihood objective function L ( ⁇ ) with respect to the conditional distribution of latent variables s and t, under the current estimate of the model parameters.
- This step can be performed according to Equation (4) and Equation (6) , in which s and t are computed simultaneously such that P (s
- the M-step includes estimating all the parameters ⁇ to maximize L ( ⁇ ) in the E-step.
- L ( ⁇ ) is maximized with its parameters by the Lagrangian multiplier method. For example, take the derivation of L ( ⁇ ) with respect to p (u
- Equation (7)
- s) ] represents terms containing P (u
- Equation (8)
- the EM-based algorithm optimizes the model parameters iteratively via E-step and M-step until converging to a local optimum.
- a generalization of the EM-based algorithm can be used, which is known as annealing and is based on an entropic regularization term.
- the EM procedure in JAR could be obtained by minimizing a common objective function (also called the free energy) as follows:
- Equation (14) is the variational distribution and ⁇ is the control parameter called inverse computational temperature.
- s, t) P (s, t) amounts to the standard M-step.
- Topic engine 120 may verify that the posteriors are obtained by minimizing F w.r.t.
- the E-step in Equation (4) may be modified as follows:
- Equation (15) becomes the standard E-step, while for ⁇ 1 the likelihood in Equation (15) is discounted.
- a held-out data technology may be used by first performing EM iterations and then decreasing ⁇ until held-out performance deteriorates.
- FIG. 3 is a flowchart of an example method 300 for social influence and topic determination.
- Method 300 summarizes the overall learning procedure of the learning algorithm based on expectation maximization (EM) to determine multiple hidden variables s and t discussed above.
- Method 300 may be described below as being executed or performed by a system, for example, system 110 of FIG. 1, system 600 of FIG. 6 or system 700 of FIG. 7. Other suitable systems and/or computing devices may be used as well.
- Method 300 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of the system and executed by at least one processor of the system. Alternatively or in addition, method 300 may be implemented in the form of electronic circuitry (e.g., hardware) .
- one or more steps of method 300 may be executed substantially concurrently or in a different order than shown in FIG. 3.
- method 300 may include more or less steps than shown in FIG. 3.
- one or more of the steps of method 300 may, at certain times, be ongoing and/or may repeat.
- Method 300 may start at step 302 and continue to step 304, where the method may set ⁇ 1 and perform EM iterations with early stopping.
- ⁇ is the control parameter called inverse computational temperature.
- the method may decrease ⁇ by ⁇ ⁇ with ⁇ 1 and perform an E-Step Equation, for example, Equation (15) described above.
- the method may determine if the performance on the held out data is improving. If the method determines that the performance on the held out data is not improving (NO branch of step 308) , the method may return to step 306. If the method determines that the performance on the held out data is improving (YES branch of step 308) the method may go to step 310.
- the method may continue to perform the E-Step Equation with the current value of ⁇ .
- the method may determine that decreasing ⁇ does not produce further improvements.
- the method may perform final iterations using both training and held-out social data. Method 300 may eventually continue to step 316, where method 300 may stop.
- user activity probability engine 122 may determine an attribution probability that the user activity is attributed to the social influence.
- the attribution probability may be based on the set of user preferences, the social influence and the independence factor.
- the user activity of user u is probabilistically determined based on the user preferences of user u or the preferences of s via the social influence. Both the user’s personal preference and social influence are relevant to accurate user action prediction.
- User activity probability engine 122 may determine conditional probability of user u’s activity y as follows:
- u) is user u’s user activity based on the personal preference
- u) is user u’s user activity based on social influence.
- the independence factor ⁇ (0 ⁇ 1) is used to weight the probability of user u’s own tastes on user activity.
- An example independence factor ⁇ may be 0.8, although the independence factor may vary based on the user and/or other data.
- the probability of social influence on user activity is measured as 1- ⁇ .
- a topic t is directly drawn for u’s own tastes based on P (t
- u) can be calculated as:
- Equation (17) P (t
- u) is calculated as:
- User-user relationship probability engine 124 may determine an attribution probability that the user-user relationship is attributed to the social influence.
- the attribution probability may be based on the set of prior impressions, the social influence and the independence factor.
- the user-user relationship of user u is probabilistically determined based on the prior impressions of user u or the preferences of s via the social influence. Both the user’s prior impressions and social influence are relevant to accurate user-user relationship prediction.
- User-user relationship probability engine 124 may calculate the conditional probability P (v
- u) measures the relationship from u to v based on u’s prior impressions to v
- u) measures the relationship from u to v based on social influence
- ⁇ (0 ⁇ 1) is another weighting factor.
- An example independence factor ⁇ may be 0.7, although the independence factor may vary based on the user and/or other data.
- u) is easy to compute.
- u) can also be computed efficiently as:
- FIG. 4 is a flowchart of an example method 400 for a determining social influence.
- Method 400 may be described below as being executed or performed by a system, for example, system 110 of FIG. 1, system 600 of FIG. 6 or system 700 of FIG. 7. Other suitable systems and/or computing devices may be used as well.
- Method 400 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of the system and executed by at least one processor of the system.
- method 400 may be implemented in the form of electronic circuitry (e.g., hardware) .
- one or more steps of method 400 may be executed substantially concurrently or in a different order than shown in FIG. 4.
- method 400 may include more or less steps than shown in FIG. 4.
- one or more of the steps of method 400 may, at certain times, be ongoing and/or may repeat.
- Method 400 may start at step 402 and continue to step 404, where the method may include generating a set of user characteristics corresponding to a user.
- the techniques in block 404 may be performed similarly to the techniques described in relation to user characteristic engine 112 discussed above in reference to FIG. 1.
- the method may also include determining that the user is a member of a social network.
- the user characteristics may include user preferences corresponding to a user of a social network, such as topics, products, etc.
- the set of characteristics may also include prior impressions from a first user on a second user. For example, a first user may have influence on a second user in creating a relationship, creating content, etc.
- the method may include determining a user characteristic probability that the set of user characteristics affects the user action.
- the method may include determining a social influence on the user.
- the techniques in block 406 may be performed similarly to the techniques described in relation to social influence engine 114 discussed above in reference to FIG. 1.
- the method may also include determining a social influence probability that the social influence affects the user action. Determining the social influence may include determining a probability that the user will be influenced by a second user corresponding to the social influence. The second user may be connected to the user on the social network.
- the method may include generating an independence factor.
- the techniques in block 408 may be performed similarly to the techniques described in relation to independence factor engine 116 discussed above in reference to FIG. 1.
- the independence factor may describe an independence of the user in making a user action.
- a user action may include a user activity, a user-user relationship, etc.
- the method may include determining an attribution probability that the user action is attributed to the social influence.
- the techniques in block 410 may be performed similarly to the techniques described in relation to probability engine 118 discussed above in reference to FIG. 1 and may incorporate one or more formulas described in relation to probability engine 118, such as formulas (1) , (2) , (3) and (4) .
- the attribution probability may be based on the set of user characteristics, the social influence and the independence factor.
- the attribution probability may also be based on the user characteristic probability and the social influence probability.
- the attribution probability may be expressed quantitatively.
- the method may also include determining a user activity and/or a user-user relationship that optimizes the attribution probability. Method 400 may eventually continue to step 412, where method 400 may stop.
- FIG. 5 is a flowchart of an example method 500 for determining social influence.
- Method 500 may be described below as being executed or performed by a system, for example, system 110 of FIG. 1, system 600 of FIG. 6 or system 700 of FIG. 7. Other suitable systems and/or computing devices may be used as well.
- Method 500 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of the system and executed by at least one processor of the system.
- method 500 may be implemented in the form of electronic circuitry (e.g., hardware) .
- one or more steps of method 500 may be executed substantially concurrently or in a different order than shown in FIG. 5.
- method 500 may include more or less steps than shown in FIG. 5.
- one or more of the steps of method 500 may, at certain times, be ongoing and/or may repeat.
- Method 500 may start at step 502 and continue to step 504, where the method may include determining a social influence topic corresponding to an interest of a social influence.
- the techniques in block 504 may be performed similarly to the techniques described in relation to topic engine 120 discussed above in reference to FIG. 1 and may incorporate one or more formulas described in relation to topic engine 120.
- the method may include determining the effect of the social influence topic on a user action.
- the techniques in block 506 may be performed similarly to the techniques described in relation to topic engine 120 discussed above in reference to FIG. 1 and may incorporate one or more formulas described in relation to topic engine 120.
- the method may include determining a user topic corresponding to an interest of a user.
- the techniques in block 508 may be performed similarly to the techniques described in relation to topic engine 120 discussed above in reference to FIG. 1 and may incorporate one or more formulas described in relation to topic engine 120.
- the method may include determining the effect of the user topic on the user action.
- the techniques in block 510 may be performed similarly to the techniques described in relation to topic engine 120 discussed above in reference to FIG. 1 and may incorporate one or more formulas described in relation to topic engine 120.
- Method 500 may eventually continue to step 512, where method 500 may stop.
- FIG. 6 is a block diagram of an example social influence system 600.
- System 600 may be similar to system 110 of FIG. 1, for example.
- system 600 includes prior impression handler 602, social influence handler 604, independence factor generator 606 and probability handler 608.
- Prior impression handler 602 may determine a prior impression on a user of the social network.
- the prior impression may be from the user of the social network to a second user of the social network.
- the prior impression may also be from the second user of the social network to the user of the social network.
- the prior impression handler may also determine a prior impression probability that the prior impression affects the user activity.
- Prior impression handler 602 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of system 600 and executed by at least one processor of system 600.
- prior impression handler 602 may be implemented in the form of one or more hardware devices including electronic circuitry for implementing the functionality of prior impression handler 602.
- Social influence handler 604 may determine a social influence between the user and the second user.
- the social influence may be a probability that the user will be influence by the second user.
- Social influence handler 604 may also determine a social influence probability that the social influence affects the user activity.
- Social influence handler 604 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of system 600 and executed by at least one processor of system 600.
- social influence handler 604 may be implemented in the form of one or more hardware devices including electronic circuitry for implementing the functionality of social influence handler 604.
- independence factor generator 606 may generate an independence factor describing an independence of the user in making a user-user relation.
- Independence factor generator 606 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of system 600 and executed by at least one processor of system 600.
- independence factor generator 606 may be implemented in the form of one or more hardware devices including electronic circuitry for implementing the functionality of independence factor generator 606.
- Probability handler 608 may determine an attribution probability that the user-user relation is attributed to the social influence of the second user. The attribution probability may be based on the prior impression, the social influence and the independence factor. The attribution probability may also be based on the prior impression probability and the social influence probability. Probability handler 608 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of system 600 and executed by at least one processor of system 600. Alternatively or in addition, probability handler 608 may be implemented in the form of one or more hardware devices including electronic circuitry for implementing the functionality of probability handler 608.
- FIG. 7 is a block diagram of an example system 700 for social influence determination.
- System 700 may be similar to system 110 of FIG. 1, for example.
- system 700 includes a processor 702 and a machine-readable storage medium 704.
- the following descriptions refer to a single processor and a single machine-readable storage medium, the descriptions may also apply to a system with multiple processors and multiple machine-readable storage mediums.
- the instructions may be distributed (e.g., stored) across multiple machine-readable storage mediums and the instructions may be distributed (e.g., executed by) across multiple processors.
- Processor 702 may be one or more central processing units (CPUs) , microprocessors, and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 704. In the particular embodiment shown in FIG. 7, processor 702 may fetch, decode, and execute instructions 706, 708, 710 and 712 to perform social influence determination. As an alternative or in addition to retrieving and executing instructions, processor 702 may include one or more electronic circuits comprising a number of electronic components for performing the functionality of one or more of the instructions in machine-readable storage medium 704.
- CPUs central processing units
- microprocessors and/or other hardware devices suitable for retrieval and execution of instructions stored in machine-readable storage medium 704.
- processor 702 may fetch, decode, and execute instructions 706, 708, 710 and 712 to perform social influence determination.
- processor 702 may include one or more electronic circuits comprising a number of electronic components for performing the functionality of one or more of the instructions in machine-readable storage medium 704.
- executable instruction representations e.g., boxes
- executable instructions and/or electronic circuits included within one box may, in alternate embodiments, be included in a different box shown in the figures or in a different box not shown.
- Machine-readable storage medium 704 may be any electronic, magnetic, optical, or other physical storage device that stores executable instructions.
- machine-readable storage medium 704 may be, for example, Random Access Memory (RAM) , an Electrically-Erasable Programmable Read-Only Memory (EEPROM) , a storage drive, an optical disc, and the like.
- Machine-readable storage medium 704 may be disposed within system 700, as shown in FIG. 7. In this situation, the executable instructions may be “installed” on the system 700.
- machine-readable storage medium 704 may be a portable, external or remote storage medium, for example, that allows system 700 to download the instructions from the portable/external/remote storage medium. In this situation, the executable instructions may be part of an “installation package” .
- machine-readable storage medium 704 may be encoded with executable instructions for a web technology responsive to mixtures of emotions.
- user preference instructions 706, when executed by a processor (e.g., 702) may cause system 700 to determine a set of user preferences corresponding to a user.
- the user may be a member of a social network.
- User preference instructions 706, when executed by a processor (e.g., 702) may also cause system 700 to determine a user preference probability that the set of user preferences affects the user activity.
- User preference instructions 706, when executed by a processor (e.g., 702) may also cause system 700 to determine a topic categorizing the user activity, instructions to determine a content generated by the user activity and determine a distribution of the content for the topic.
- Social influence instructions 708, when executed by a processor (e.g., 702) may also cause system 700 to determine a social influence probability that the social influence affects the user activity.
- Independence factor instructions 710 when executed by a processor (e.g., 702) , may cause system 700 to generate an independence factor describing an independence of the user in performing a user activity.
- the independence factor is used to weight the probability of the user’s own interests affecting the user activity.
- Attribution probability instructions 712 when executed by a processor (e.g., 702) , may cause system 700 to determine, based on the set of user preferences, the social influence and the independence factor, an attribution probability that the user activity is influenced by the second user.
- the attribution probability may also be based on the user preference probability and the social influence probability.
- the foregoing disclosure describes a number of examples for social influence determination.
- the disclosed examples may include systems, devices, computer-readable storage media, and methods for social influence determination.
- certain examples are described with reference to the components illustrated in FIGS. 1-7.
- the functionality of the illustrated components may overlap, however, and may be present in a fewer or greater number of elements and components. Further, all or part of the functionality of illustrated elements may co-exist or be distributed among several geographically dispersed locations. Further, the disclosed examples may be implemented in various environments and are not limited to the illustrated examples.
- sequence of operations described in connection with FIGS. 1-7 are examples and are not intended to be limiting. Additional or fewer operations or combinations of operations may be used or may vary without departing from the scope of the disclosed examples. Furthermore, implementations consistent with the disclosed examples need not perform the sequence of operations in any particular order. Thus, the present disclosure merely sets forth possible examples of implementations, and many variations and modifications may be made to the described examples.
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Marketing (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Entrepreneurship & Innovation (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Data Mining & Analysis (AREA)
- Game Theory and Decision Science (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Tourism & Hospitality (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A method for social influence determination includes generating a set of user characteristics corresponding to a user(404). The method includes determining a social influence on the user(406) and generating an independence factor describing an independence of the user in making a user action(408). The method includes determining an attribution probability that the user action is attributed to the social influence(410). The attribution probability is based on the set of user characteristics, the social influence and the independence factor.
Description
The advent of social networking sites on the Internet has led an unprecedented number of users registered with social networking sites to engage in interesting user activities such as commenting on, liking, and re-sharing content as well as interacting with each other to share thoughts. The exponential growth of information repositories and the diversity of users on these social networking sites provide great challenges for analyzing and understanding user actions and user-user relationships.
The following detailed description references the drawings, wherein:
FIG. 1 is a block diagram of an example computing environment in which social influence determination may be useful;
FIG. 2 is a graphical representation of an example model of a joint activity and relation framework;
FIG. 3 is a flowchart of an example method for social influence and topic determination;
FIG. 4 is a flowchart of an example method for social influence determination;
FIG. 5 is a flowchart of an example method for social influence determination;
FIG. 6 is a block diagram of an example system for social influence determination; and
FIG. 7 is a block diagram of an example system for social influence determination.
Techniques for social analysis typically consider influence by heuristics for coarse and limited measurement. Such techniques do not measure social influence to take into account core factors for prediction tasks. Thus, the effect of social influence on prediction tasks is unclear and largely unexplored. Behavioral evidences may be leveraged to infer social relations and at the same time exploit relations to predict user behaviors in a unified framework. Moreover, social influence may be determined quantitatively to capture interactions for joint and enhanced user activity prediction and user-user relationship discovery.
The widespread social phenomenon of homophily suggests that socially acquainted users tend to behave similarly. The homophily social effect is also called the theory of “birds of a feather flock together” –people tend to follow the behaviors of their friends, and people tend to create relationships with other people who are already similar to them. This phenomenon illustrates a high correlation and mutual interactions between users’ activities and user-user relations. Bidirectional mutual interactions (BMI) can be explained through an illustrative example involving two users of an example online social network. The behavior of first user, Kate, (such as “liking” a particular phone model) can be influenced by the opinion of a second user, Kate’s friend Bob. Since Kate and Bob are friends, it is likely that they have the same behavior. On the other hand, Kate’s behavior could in turn impact her relationships with others such as Bob. If Kate and Bob have similar behaviors, there is a likelihood that Kate and Bob will create a user-user relationship. Although the illustrative example above is discussed in terms of users on an
online social network, the social influence determination systems and methods discussed herein are not limited to users of online social networks, but may be applied to users of any platform.
The mechanism that drives the characteristics and dynamics of BMI may be expressed as the underlying social influence. Social influence refers to the phenomenon that a user follows an opinion from others, which may or may not deviate from the user’s own interests. Thus, the user’s activities are not solely dependent on the user’s own preferences but also influenced by the tastes of other people. Similarly, the social relationship between two users depends not only on their prior impressions to each other but also their behavior agreement. Social influence may be expressed quantitatively as the probability that a user follows an opinion from others, for both the user’s activities and the user’s relationships to others. The influences from different users are essentially different. Furthermore, some people with different interests may be very influential to a user, while some other people with very similar interests may not contribute too much to this user.
Example social influence determination systems determine social influence quantitatively to capture BMI for joint and enhanced user activity prediction and user-user relationship discovery. Example social influence determination systems may use a unified probabilistic approach, such as a joint activity and relation (JAR) , for modeling and predicting users’ activities and user-user relationships simultaneously in a single coherent framework. Instead of incorporating social influence in an ad hoc manner, the example social influence determination systems may capture social influence quantitatively. Based on JAR, the example social influence determination systems determine social influence between users and users’ personal preferences for both user activity prediction and user-user relation discovery through statistical inference. Example social influence determination systems may use learning algorithms based on expectation maximization (EM) to address the challenges of the introduced multiple layers of hidden variables in JAR. In this manner, the example social influence determination systems use JAR to exploits mutual interactions and benefits, by taking advantage of the learned social influence
and users’ personal preferences for enhanced user activity prediction and user-user relation discovery.
For example, a user may generate content for a social network and have numerous connections to other users on the social network. Example social influence determination systems may determine the probability that a user activity corresponding to that content, such as affirming or “liking” the content is attributed to the user’s personal preference as opposed to the probability that the user activity is attributed to the social influence on the user from one or more other users of the social network. Similarly, example social influence determination systems may determine the probability that a user-user relationship established by a user is attributed to the user’s prior impression as opposed to the probability that the user activity is attributed to the social influence on the user from one or more other users of the social network.
An example method for determining social influence may include generating a set of user characteristics corresponding to a user. The user characteristics may include user preferences and/or prior impressions. The example method may include determining a social influence on the user. The social influence may be probability that the user will be influenced by a second user. The example method may include generating an independence factor describing an independence of the user in making a user action. Example user actions may include user activities and/or user-user relationships. The example method may include determining an attribution probability that the user action is attributed to the social influence. The attribution probability is based on the set of user characteristics, the social influence and the independence factor.
FIG. 1 is an example environment 100 in which various examples may be implemented as a social influence determination system 110. Social influence determination system 110 may comprise various components, including a user characteristic engine 112, a social influence engine 114, an independence factor engine 116, a probability engine 118, a topic engine 120, a user activity probability engine 122, a user-user relationship engine 124, and/or other components. Environment 100 may also include various components
including a server computing device 120 and a client computing device 122. The client computing device 122 may communicate requests to and/or receive responses from the server computing device 120. The server computing device 120 may receive and/or respond to requests from the client computing device 122. The client computing device 122 may be any type of computing device providing a user interface through which a user can interact with a software application. For example, the client computing device 122 may include a laptop computing device, a desktop computing device, an all-in-one computing device, a tablet computing device, a mobile phone, and/or other electronic device suitable for displaying a user interface and processing user interactions with the displayed interface. While the server computing device 120 is depicted as a single computing device, the server computing device 120 may include any number of integrated or distributed computing devices serving at least one software application for consumption by the client computing device 122.
The various components (e.g., components 120 and/or 122) depicted in FIG. 1 may be coupled to at least one other component via a network 124. Network 124 may comprise any infrastructure or combination of infrastructures that enable electronic communication between the components. For example, the network 124 may include at least one of the Internet, an intranet, a PAN (Personal Area Network) , a LAN (Local Area Network) , a WAN (Wide Area Network) , a SAN (Storage Area Network) , a MAN (Metropolitan Area Network) , a wireless network, a cellular communications network, a Public Switched Telephone Network, and/or other network. According to various implementations, social influence determination system 110 and the various components described herein may be implemented in hardware and/or a combination of hardware and programming that configures hardware. Furthermore, in FIG. 1 and other Figures described herein, different numbers of components or entities than depicted may be used.
As described above, social influence determination system 110 may comprise various components, including a user characteristic engine 112, a social influence engine 114, an independence factor engine 116, a probability engine 118, a topic engine 120, a user activity probability engine 122, a
user-user relationship engine 124, and/or other components. The components of the social influence determination system 110 as described herein, may refer to a hardware or a combination of hardware and instructions that performs a designated function. As is illustrated with respect to FIG. 7, the hardware of the various components of social influence determination system 110, for example, may include one or both of a processor and a machine-readable storage medium, while the instructions are code stored on the machine-readable storage medium and executable by the processor to perform the designated function.
User characteristic engine 112 may generate a set of user characteristics corresponding to a user. The user may be a member or otherwise belong to a social network. However, online social networks are just one example of platforms with users and the social influence determination systems and methods discussed herein may be applied to and/or used with users of any platform, group, etc. The set of user characteristics may include user preferences corresponding to a user of a social network, such as topics, products, etc. The set of characteristics may also include prior impressions from a first user of a social network on a second user of the social network. For example, a first user may have influence on a second user in creating a relationship, creating content, etc. In other examples, the user characteristics may include additional and/or alternate elements associated with a user.
The probability engine 118 may incorporate one or more models in determining the attribution probability. For example, the probability engine 118 may incorporate a joint activity and relation (JAR) model.
FIG. 2 shows a graphical representation of a model 200 of a joint activity and relation (JAR) framework. The model 200 explores several important factors, such as user preferences and social influence, contributing to user actions. User actions may include actions taken by a user on a social network, such as user activities and user-user relationships. As used herein, the term “user-user relationship” may refer to a relationship between two or more users of a social network. The model enables quantified social influence among individuals for both users’ activities and user-user relationships.
The model 200 models activity of a user u (left portion 202) , activity of user v (right portion 204) , and user-user relationship between user u and user v (middle portion 206) . As the left portion 202 and the right portion 204 of the model 200 have a similar structure, the left portion 202 (modeling the activity of user u) is described to illustrate user activity. Example user activities may include generating content, such as a post, sharing content, affirming content, commenting, etc. The preference of user u may be captured through a set of latent topics t and the activities y of user u and corresponding tags w are correlated with user u through the set of latent topics t.
Each activity y is associated with a set of tags w= {w1, w2, ···, wm} (w ∈ W) representing the content of this activity. The latent topic set t= {t1, t2, ···, tl} (t ∈ T) is introduced to capture the interests and/or preferences of user u, and also to characterize user activities y and their content w. The user activity y (y ∈ Y) (y is associated with a tag w) of user u (u ∈ V ) is subject to the preference of user u (the latent topic t) for the independent selection of user u and the social influence s from others.
Similarly, in the middle portion 206 of the model 200, user u’s relationship to user v is attributed to user u’s own prior impression to user v and the social influence s. Without loss of generality, the social influence variable s represents any user directly connected to user u in the social graph G. A connection of user u, may be another user of the social network that user u has a relationship with, via, for example, a user activity, a direct user relationship, etc. Connections may include close friends, family members, colleagues, acquaintances, etc. Letbe the set of three users directly connected to user u. The social influence from s in S (u) to u is measured as the probability of the preferences of the social influence s that contribute to user activities of user u and/or user u’s relationship to v. In some situations user u’s independent choice and user u’s own tastes may play a more important role for a user action (such as user activity y, user u’s relationship to user v, etc. ) than the social influence and preferences from S (u) .
Both the user activity y of user u and the relationship of user u to user v are probabilistically determined based on the interests of user u or the preferences of s (s ∈ S (u) ) via social influence. The social influence dependency P (s|u) is defined as the probability of user u to be influenced by user s. For user activity, once s is selected based on P (s|u) , a topic t may be randomly selected from the interests of user s based on the conditional probability P (t|s) . The topic t generates an activity y and a tag w based on activity distribution of topic t (P (y|t) ) and the content distribution of topic t P (w|t) . Otherwise, a topic t may be selected for the tastes of user u based on P (t|u) . For a user-user relationship, once s is selected based on P (s|u) , the relationship probability from u to v is measured as P (s|u) P (v|s) . Otherwise, the relationship
probability from u to v is measured based on u’s prior impression as P (v|u) . Both user activities and user-user relationships are modeled in a single coherent framework via social influence to capture the BMI between them. Thus, the social influence from S (u) may be measured quantitatively and efficiently and the effect of social influence for both user activities and user-user relations may be analyzed.
Referring again to FIG. 1, the probability engine 118 may also incorporate one or more algorithms, equations, etc., in conjunction with the one or more models in determining the attribution probability.
For example, the probability engine 118 may optimize the joint conditional probability P (y, v|u) for most likely activity prediction and relationship discovery. P (y, v|u) may be calculated as:
Based on the model 200 illustrated in FIG. 2, user activities y and tags w are independently conditioned on the topics t. Consequently the joint probability dependency P (y, w, s, t, u, v) over all factors is decomposed as:
Equation (2) :
P (y, w, s, t, u, v) =P (v) P (u|v) P (s|u) P (t|s) P (y|t) P (w|t)
As further depicted in the model 200 illustrated in FIG. 2, user u and topic t are independently conditioned on social influence s, and social influence s, user activity y and tags w are independently conditioned on topic t. Accordingly, equation (2) can be rewritten as follows:
Equation (3) :
P (y, w, s, t, u, v) =P (u|v) P (v) [P (s|u) P (t|s) P (y|t) P (w|t) ]
=P (v|u) P (u) [P (s|u) P (t|s) P (y|t) P (w|t) ]
=P (v|u) [P (t) P (u|s) P (s|t) P (y|t) P (w|t) ]
Social influence s and topics t are hidden variables which are unobserved in the social data. Accordingly, in order to model the probability P (y, w, s, t, u, v) in terms of social influence s and t, Equation (3) may be transformed into the following equation as:
According to Equation (4) , several model parameters of JAR are estimated, including P (u|s) , P (s|t) , P (y|t) , P (w|t) and P (t) , in order to calculate probabilities P (y, w, s, t, u, v) and P (y, v, u) . In summary, JAR jointly incorporates several important factors for simultaneous user activity prediction and user-user relationship inference, including the distribution of social influence P(u|s) from s to u; the distribution of u’s own preference P (t|u) over the latent topics t; the distribution of s’s preference P (s|t) over the latent topics t; the distribution of activity P (y|t) for each topic t; and the distribution of generated content P (w|t) for each topic t.
Topic engine 120 may determine a social influence topic corresponding to an interest of the social influence and determine the effect of the social influence topic on the user action. Topic engine 120 may further determine a user topic corresponding to an interest of the user and determine the effect of the user topic on the user action. Topic engine 120 may use one or more algorithms, equations, models, etc. For example, topic engine 120 may implement a learning algorithm based on expectation maximization (EM) to determine multiple hidden variables s and t. The learning algorithm may maximize the complete log-likelihood of the social data as:
Equation (5) :
In Equation (5) , s represents social influence variables, t represents latent topic variables, and θ represents the parameters of a JAR model, such as the model 200 illustrated in FIG. 2, including P (u|s) , P (s|t) , P(y|t) , P (w|t) , and P (t) . Topic engine 120 may maximize the lower bound L (θ) of the log-likelihood according to Jensen’s inequality as
Equation (6) :
In the example EM based algorithm, the E-step includes computing the expected value of the log-likelihood objective function L (θ) with respect to the conditional distribution of latent variables s and t, under the current estimate of the model parameters. This step can be performed according to Equation (4) and Equation (6) , in which s and t are computed simultaneously such that P (s|t) can be estimated in the M-step. The M-step includes estimating all the parameters θ to maximize L (θ) in the E-step. L (θ) is maximized with its parameters by the Lagrangian multiplier method. For example, take the derivation of L (θ) with respect to p (u|s) for the following equation:
In Equation (7) , L[P (u|s) ] represents terms containing P (u|s) in the objective function L. This can be expressed as:
The updated formula of P (u|s) can be expressed as:
Similarly, the updated formulas of P (s|t) , P (y|t) , P (w|t) , and P(t) can be derived as follows:
The EM-based algorithm optimizes the model parameters iteratively via E-step and M-step until converging to a local optimum. To obtain a better model fitting that generalizes well on the unseen testing social data, a generalization of the EM-based algorithm can be used, which is known as
annealing and is based on an entropic regularization term. The EM procedure in JAR could be obtained by minimizing a common objective function (also called the free energy) as follows:
Equation (14) :
In Equation (14) ,is the variational distribution and γ is the control parameter called inverse computational temperature. In the case ofminimizing F w.r.t. the probabilities defining P (u, v, y, w|s, t) P (s, t) amounts to the standard M-step. Topic engine 120 may verify that the posteriors are obtained by minimizing F w.r.t.The E-step in Equation (4) may be modified as follows:
Equation (15) :
If γ=1 Equation (15) becomes the standard E-step, while for γ<1 the likelihood in Equation (15) is discounted. A held-out data technology may be used by first performing EM iterations and then decreasing γ until held-out performance deteriorates.
FIG. 3 is a flowchart of an example method 300 for social influence and topic determination. Method 300 summarizes the overall learning procedure of the learning algorithm based on expectation maximization (EM) to determine multiple hidden variables s and t discussed above. Method 300 may be described below as being executed or performed by a system, for example, system 110 of FIG. 1, system 600 of FIG. 6 or system 700 of FIG. 7. Other suitable systems and/or computing devices may be used as well. Method 300 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of the system and executed by at least one processor of the system. Alternatively or in addition, method 300 may be
implemented in the form of electronic circuitry (e.g., hardware) . In alternate embodiments of the present disclosure, one or more steps of method 300 may be executed substantially concurrently or in a different order than shown in FIG. 3. In alternate embodiments of the present disclosure, method 300 may include more or less steps than shown in FIG. 3. In some embodiments, one or more of the steps of method 300 may, at certain times, be ongoing and/or may repeat.
Turning again to FIG. 1, user activity probability engine 122 may determine an attribution probability that the user activity is attributed to the social influence. The attribution probability may be based on the set of user preferences, the social influence and the independence factor. In other words, the user activity of user u is probabilistically determined based on the user preferences of user u or the preferences of s via the social influence. Both the user’s personal preference and social influence are relevant to accurate user action prediction. User activity probability engine 122 may determine conditional probability of user u’s activity y as follows:
Equation (16) : P (y|u) =αPself (y|u) + (1-α) Psocinf (y|u)
In Equation (16) , Pself (y|u) is user u’s user activity based on the personal preference, and Psocinf (y|u) is user u’s user activity based on social influence. The independence factor α (0≤α≤1) is used to weight the probability of user u’s own tastes on user activity. An example independence factor α may be 0.8, although the independence factor may vary based on the user and/or other data. Thus the probability of social influence on user activity is measured as 1-α. Based on user u’s personal preference, a topic t is directly drawn for u’s own tastes based on P (t|u) in the JAR model. Pself (y|u) can be calculated as:
Equation (17) :
In Equation (17) , P (t|u) , P (y|t) , and P (w|t) can be computed efficiently from the learned model parameters. And Psocinf (y|u) is calculated as:
Equation (18) :
User-user relationship probability engine 124 may determine an attribution probability that the user-user relationship is attributed to the social influence. The attribution probability may be based on the set of prior impressions, the social influence and the independence factor. In other words, the user-user relationship of user u is probabilistically determined based on the prior impressions of user u or the preferences of s via the social influence. Both the user’s prior impressions and social influence are relevant to accurate user-user relationship prediction. User-user relationship probability engine 124 may calculate the conditional probability P (v|u) of user u’s relationship to user v as:
Equation (19) : P (v|u) =βPself (v|u) + (1-β) Psocinf (v|u)
In Equation (19) , Pself (v|u) measures the relationship from u to v based on u’s prior impressions to v, Psocinf (v|u) measures the relationship from u to v based on social influence, and β (0≤β≤1) is another weighting factor. An example independence factor β may be 0.7, although the
independence factor may vary based on the user and/or other data. For a given social data, Pself (v|u) is easy to compute. And Psocinf (v|u) can also be computed efficiently as:
Equation (20) :
FIG. 4 is a flowchart of an example method 400 for a determining social influence. Method 400 may be described below as being executed or performed by a system, for example, system 110 of FIG. 1, system 600 of FIG. 6 or system 700 of FIG. 7. Other suitable systems and/or computing devices may be used as well. Method 400 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of the system and executed by at least one processor of the system. Alternatively or in addition, method 400 may be implemented in the form of electronic circuitry (e.g., hardware) . In alternate embodiments of the present disclosure, one or more steps of method 400 may be executed substantially concurrently or in a different order than shown in FIG. 4. In alternate embodiments of the present disclosure, method 400 may include more or less steps than shown in FIG. 4. In some embodiments, one or more of the steps of method 400 may, at certain times, be ongoing and/or may repeat.
At step 406, the method may include determining a social influence on the user. The techniques in block 406 may be performed similarly to the techniques described in relation to social influence engine 114 discussed above in reference to FIG. 1. The method may also include determining a social influence probability that the social influence affects the user action. Determining the social influence may include determining a probability that the user will be influenced by a second user corresponding to the social influence. The second user may be connected to the user on the social network. At step 408, the method may include generating an independence factor. The techniques in block 408 may be performed similarly to the techniques described in relation to independence factor engine 116 discussed above in reference to FIG. 1. The independence factor may describe an independence of the user in making a user action. A user action may include a user activity, a user-user relationship, etc.
At step 410, the method may include determining an attribution probability that the user action is attributed to the social influence. The techniques in block 410 may be performed similarly to the techniques described in relation to probability engine 118 discussed above in reference to FIG. 1 and may incorporate one or more formulas described in relation to probability engine 118, such as formulas (1) , (2) , (3) and (4) . The attribution probability may be based on the set of user characteristics, the social influence and the independence factor. The attribution probability may also be based on the user characteristic probability and the social influence probability. The attribution probability may be expressed quantitatively. The method may also include determining a user activity and/or a user-user relationship that optimizes the attribution probability. Method 400 may eventually continue to step 412, where method 400 may stop.
FIG. 5 is a flowchart of an example method 500 for determining social influence. Method 500 may be described below as being executed or performed by a system, for example, system 110 of FIG. 1, system
600 of FIG. 6 or system 700 of FIG. 7. Other suitable systems and/or computing devices may be used as well. Method 500 may be implemented in the form of executable instructions stored on at least one machine-readable storage medium of the system and executed by at least one processor of the system. Alternatively or in addition, method 500 may be implemented in the form of electronic circuitry (e.g., hardware) . In alternate embodiments of the present disclosure, one or more steps of method 500 may be executed substantially concurrently or in a different order than shown in FIG. 5. In alternate embodiments of the present disclosure, method 500 may include more or less steps than shown in FIG. 5. In some embodiments, one or more of the steps of method 500 may, at certain times, be ongoing and/or may repeat.
FIG. 6 is a block diagram of an example social influence system 600. System 600 may be similar to system 110 of FIG. 1, for example. In the embodiment of FIG. 6, system 600 includes prior impression handler 602, social influence handler 604, independence factor generator 606 and probability handler 608.
FIG. 7 is a block diagram of an example system 700 for social influence determination. System 700 may be similar to system 110 of FIG. 1, for example. In the embodiment of FIG. 7, system 700 includes a processor 702 and a machine-readable storage medium 704. Although the following descriptions refer to a single processor and a single machine-readable storage medium, the descriptions may also apply to a system with multiple processors and multiple machine-readable storage mediums. In such examples, the instructions may be distributed (e.g., stored) across multiple machine-readable storage mediums and the instructions may be distributed (e.g., executed by) across multiple processors.
Machine-readable storage medium 704 may be any electronic, magnetic, optical, or other physical storage device that stores executable instructions. Thus, machine-readable storage medium 704 may be, for example, Random Access Memory (RAM) , an Electrically-Erasable Programmable Read-Only Memory (EEPROM) , a storage drive, an optical disc, and the like. Machine-readable storage medium 704 may be disposed within system 700, as shown in FIG. 7. In this situation, the executable instructions may be “installed” on the system 700. Alternatively, machine-readable storage medium 704 may be a portable, external or remote storage medium, for example, that allows system 700 to download the instructions from the portable/external/remote storage medium. In this situation, the executable instructions may be part of an “installation package” . As described herein, machine-readable storage medium 704 may be encoded with executable instructions for a web technology responsive to mixtures of emotions.
Referring to FIG. 7, user preference instructions 706, when executed by a processor (e.g., 702) , may cause system 700 to determine a set of user preferences corresponding to a user. The user may be a member of a social network. User preference instructions 706, when executed by a processor (e.g., 702) may also cause system 700 to determine a user preference probability that the set of user preferences affects the user activity. User preference instructions 706, when executed by a processor (e.g., 702) may also cause system 700 to determine a topic categorizing the user activity, instructions to determine a content generated by the user activity and determine a distribution of the content for the topic.
The foregoing disclosure describes a number of examples for social influence determination. The disclosed examples may include systems, devices, computer-readable storage media, and methods for social influence determination. For purposes of explanation, certain examples are described with reference to the components illustrated in FIGS. 1-7. The functionality of the illustrated components may overlap, however, and may be present in a fewer or greater number of elements and components. Further, all or part of the functionality of illustrated elements may co-exist or be distributed among several geographically dispersed locations. Further, the disclosed examples may be implemented in various environments and are not limited to the illustrated examples.
Further, the sequence of operations described in connection with FIGS. 1-7 are examples and are not intended to be limiting. Additional or fewer operations or combinations of operations may be used or may vary without departing from the scope of the disclosed examples. Furthermore, implementations consistent with the disclosed examples need not perform the sequence of operations in any particular order. Thus, the present disclosure
merely sets forth possible examples of implementations, and many variations and modifications may be made to the described examples.
Claims (15)
- A method for determining social influence, the method comprising:generating, by a processor, a set of user characteristics corresponding to a user;determining, by the processor, a social influence on the user;generating, by the processor, an independence factor describing an independence of the user in making a user action; anddetermining, by the processor, an attribution probability that the user action is attributed to the social influence, wherein the attribution probability is based on the set of user characteristics, the social influence and the independence factor.
- The method of claim 1 further comprising:determining, by the processor, a user characteristic probability that the set of user characteristics affects the user action;determining, by the processor, a social influence probability that the social influence affects the user action; anddetermining, by the processor, the attribution probability based on the user characteristic probability and the social influence probability.
- The method of claim 1 further comprising:determining, by the processor, that the user is a member of a social network;determining, by the processor, a probability that the user will be influenced by a second user corresponding to the social influence, wherein the second user is connected to the user on the social network.
- The method of claim 1 further comprising:expressing, by the processor, the attribution probability quantitatively.
- The method of claim 1 further comprising:determining, by the processor, a prior impression on the user corresponding to the social influence.
- The method of claim 1 further comprising:determining, by the processor, a social influence topic corresponding to an interest of the social influence; anddetermining, by the processor, an effect of the social influence topic on the user action.
- The method of claim 1 further comprising:determining, by the processor, a user topic; anddetermining, by the processor, an effect of the user topic on the user action.
- The method of claim 1, wherein the user action is a user activity, the method further comprising:determining, by the processor, the user activity that optimizes the attribution probability.
- The method of claim 1, wherein the user action is a user-user relationship, further comprising:determining, by the processor, the user-user relationship that optimizes the attribution probability.
- A system for determining social influence, the system comprising:a prior impression handler to determine a prior impression on a user of the social network;a social influence handler to determine a social influence between the user and a second user;an independence factor generator to generate an independence factor describing an independence of the user in making a user-user relation; anda probability handler to determine an attribution probability that the user-user relation is attributed to the social influence of the second user, wherein the attribution probability is based on the prior impression, the social influence and the independence factor.
- The system of claim 10 wherein:the prior impression handler further determines a prior impression probability that the prior impression affects the user activity;the social influence handler further determines a social influence probability that the social influence affects the user activity; andthe probability handler further determines the attribution probability based on the prior impression probability and the social influence probability.
- The system of claim 10, wherein the social influence is a probability that the first user will be influenced by the second user.
- A non-transitory machine-readable storage medium comprising instructions executable by a processor of a computing device for determining social influence, the machine-readable storage medium comprising:instructions to determine a set of user preferences corresponding to a user;instructions to determine a social influence on the user, wherein the social influence is a probability that the user will be influenced by a second user;instructions to generate an independence factor describing an independence of the user in performing a user activity, wherein the independence factor is used to weight the probability of the user’s own interests affecting the user activity; andinstructions to determine, based on the set of user preferences, the social influence and the independence factor, an attribution probability that the user activity is influenced by the second user.
- The non-transitory machine-readable storage medium of claim 13 further comprising:instructions to determine a user preference probability that the set of user preferences affects the user activity;instructions to determine a social influence probability that the social influence affects the user activity; andinstructions to determine the attribution probability based on the user preference probability and the social influence probability.
- The non-transitory machine-readable storage medium of claim 13, further comprising:instructions to determine a topic categorizing the user activity;instructions to determine a content generated by the user activity; andinstructions to determine a distribution of the content for the topic.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/082504 WO2016206095A1 (en) | 2015-06-26 | 2015-06-26 | Social influence determination |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2015/082504 WO2016206095A1 (en) | 2015-06-26 | 2015-06-26 | Social influence determination |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016206095A1 true WO2016206095A1 (en) | 2016-12-29 |
Family
ID=57584619
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/082504 WO2016206095A1 (en) | 2015-06-26 | 2015-06-26 | Social influence determination |
Country Status (1)
Country | Link |
---|---|
WO (1) | WO2016206095A1 (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080301118A1 (en) * | 2007-06-01 | 2008-12-04 | Shu-Yao Chien | User Interactive Precision Targeting Principle |
CN102880691A (en) * | 2012-09-19 | 2013-01-16 | 北京航空航天大学深圳研究院 | User closeness-based mixed recommending system and method |
US20130159325A1 (en) * | 2010-02-03 | 2013-06-20 | Gartner, Inc. | Bi-model recommendation engine for recommending items and peers |
CN103745105A (en) * | 2014-01-06 | 2014-04-23 | 中国科学院计算技术研究所 | Method and system for predicting user property in social network |
-
2015
- 2015-06-26 WO PCT/CN2015/082504 patent/WO2016206095A1/en active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20080301118A1 (en) * | 2007-06-01 | 2008-12-04 | Shu-Yao Chien | User Interactive Precision Targeting Principle |
US20130159325A1 (en) * | 2010-02-03 | 2013-06-20 | Gartner, Inc. | Bi-model recommendation engine for recommending items and peers |
CN102880691A (en) * | 2012-09-19 | 2013-01-16 | 北京航空航天大学深圳研究院 | User closeness-based mixed recommending system and method |
CN103745105A (en) * | 2014-01-06 | 2014-04-23 | 中国科学院计算技术研究所 | Method and system for predicting user property in social network |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10922609B2 (en) | Semi-supervised learning via deep label propagation | |
Sewell et al. | Latent space models for dynamic networks | |
Wang et al. | Collaborative filtering with entropy‐driven user similarity in recommender systems | |
Budak et al. | Inferring user interests from microblogs | |
Snijders | Longitudinal methods of network analysis | |
US11379726B2 (en) | Finite rank deep kernel learning for robust time series forecasting and regression | |
Hossain et al. | Active deep learning for activity recognition with context aware annotator selection | |
US20190222542A1 (en) | Systems and method for communications routing based on electronic communication data | |
Hu et al. | A unified family of covariate-adjusted response-adaptive designs based on efficiency and ethics | |
CN111651671B (en) | User object recommendation method, device, computer equipment and storage medium | |
Chen et al. | Learning multiple similarities of users and items in recommender systems | |
Zhan et al. | A novel trust computing system for social networks | |
Li et al. | Lrbm: A restricted boltzmann machine based approach for representation learning on linked data | |
Wu et al. | QF-RNN: QI-matrix factorization based RNN for time-aware service recommendation | |
Du et al. | A new trust model for online social networks | |
KR20110096488A (en) | Collaborative networking with optimized inter-domain information quality assessment | |
Xu et al. | Online data valuation and pricing for machine learning tasks in mobile health | |
Devi et al. | Smoothing approach to alleviate the meager rating problem in collaborative recommender systems | |
Tegen et al. | Activity recognition through interactive machine learning in a dynamic sensor setting | |
US20180225685A1 (en) | Identifying impending user-competitor relationships on an online social networking system | |
CN110955840B (en) | Joint optimization of notifications and pushes | |
US20160042277A1 (en) | Social action and social tie prediction | |
CN112270571B (en) | Meta-model training method for cold-start advertisement click rate estimation model | |
WO2016206095A1 (en) | Social influence determination | |
Zheng et al. | A robust collaborative filtering algorithm using ordered logistic regression |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15895993 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15895993 Country of ref document: EP Kind code of ref document: A1 |