Abstract
Introduction
Recently, as the developments of techniques of communications and computing, modern smart phones have huge increase and rapid popularization in the whole world. According to the reports, until 2015, the size of mobile phone users in the world has reached 4.45 billion and 42.9% of them are using smart phones (about 2 billion). By the reports from China, the size of mobile smart phone users has reached 5 billion in 2014. In addition, as the emergence of more devices, such as tablet and smart watch, more and more smart mobile devices are popularized now. Because of the developments of embedded computing, sensing, and communicating techniques, the smart mobile devices have more and more powerful abilities and they are not only tools for communications any more. In many applications, they have performed to be powerful tools for mobile sensing, computing, and so on. For example, iPhone 6 has integrated at least eight types of sensors such as ALS (ambient light sensor), PS (proximity sensor), and GPS (Global Positioning System), and it takes a 2.6 GHz 64-bit processor, besides common modules for telecommunication, and it also has powerful WiFi and bluetooth devices.
As the size and power of smart mobile devices increase, more and more online social applications are being used in mobile environments, and the traditional social networks have evolved to be mobile social networks. The typical applications of mobile social networks include Facebook, Twitter, Google+, and Sina Weibo. According to the reports, until 2014, the number of month average users (MAU for short) of Facebook is about 1.3 billion, and in 2015, the MAU size for Sina Weibo has reached 212 million only in China. As more and more mobile applications are utilized, more and more natural mobile social networks are being created.
The emergence of mobile social networks changes the way of information diffusion and provides opportunities for viral marketing as shown in the work by Chen et al. 1 Different from traditional methods for marketing, viral marketing can utilize the “word-of-mouth” advantages of mobile social networks and diffuse advertising information more efficiently. It has attracted lots of research interests from both mobile and social computing areas. Influence maximization problem is one of the most popular topics in the area of mobile social network. It has been formally investigated by Kempe et al. 2 and obtained lots of attentions from many researchers.3–5 However, there are still important challenges not solved in real applications of influence maximization problem when facing more complex scenarios. One of them is that the influence ability between nodes in real world may usually dynamically change, which is also the motivation of this article, while most of current research efforts on influence maximization problem always assume that the influence ability is static.
For general social networks, they are at least composed of nodes and edges like general networks. Usually, each node represents one social actor (e.g. one person in physical world and one user of Facebook) and the edges represent the social interactions between social actors (e.g. two persons are friends and one user is following the other one on Facebook). When considering the influence maximization problem on mobile social networks, usually, the edges have special meanings related to influence (e.g. one user accepts the advice of another one). The most popular methods proposed by previous works are as follows. First, a model is built to describe the information diffusion procedure on mobile social networks; then, the algorithms for finding special seed set with maximized influence are designed. In classic models, whether user
Let us consider an example in real life to show the dynamic influence phenomenon during the process of diffusing information which has been also observed by only few previous works.6–8 Assume that there is one user
Actually, the examples above show two important sources of dynamic influence, locations and time delay. In a mobile social network, if two nodes have same or similar locations, the influence probability between them tends to become larger. If one information has long time delay or has been reposted several times by users sequentially, after receiving such information, the influence probability between two users tends to become smaller. Here, the
In this article, we address the problem of diffusing information under dynamic influence in mobile social networks. Following the methods of previous works, we also use influence maximization problem to describe the procedure of diffusing information over mobile social networks. To overcome the challenge of dynamic influence, we modify the classic models to support describing the change in influence under considerations of
We identify the dynamic influence as new challenges of information diffusion on mobile social networks. To overcome them, we propose new information diffusion (ID) models to support dynamic influence and formulate the new influence maximization problem based on new model.
We show the hardness for influence maximization problem under dynamic influence. It is achieved by proving that classic influence maximization problems is a special case of the new problem.
We design efficient approximation algorithms for the new influence maximization problem. By showing the monotone and submodular properties of the new problem, a (1 − 1/
More efficient approximation algorithms for the new influence maximization problem are designed. Also, several optimizing strategies are discussed.
The experimental results on real data sets show that the proposed method can solve the information diffusion problem with dynamic influence on mobile social networks.
The rest parts of the article are organized as follows. In section “Related work,” the related works are discussed. Then, some preliminaries and new definitions will be introduced in section “Notations and definitions.” In section “Approximation algorithm for IMD problem,” theoretical analysis and approximation algorithms for influence maximization problems are introduced. Also, an improved algorithm is given in section “Improving Algorithm G
Related work
The influence maximization is an important problem in the research area of online social networking, which has many applications such as viral marketing and computational advertising. It is first studied by Domingos and Richardson,9,10 and the formalized definitions and comprehensive theoretical analysis are given by Kempe et al.
2
The standard formal definition of influence maximization can be explained as follows: given the constraint that at most
Many research efforts have been made for the problem of finding the node set with maximum influence. Kempe proposed an algorithm for influence maximization based on greedy ideas which has constant approximation ratio (1 − 1/
Kimura and Saito
16
proposed new models of information propagation based on the idea of finding shortest paths, which assume that the information is mainly transferred through shortest paths, and designed new heuristic algorithms for influence maximization problems. Using this model, Chen et al.
1
proposed heuristic algorithms based on maximum broadcast paths, which assume that the information propagated on the network is not transferred by shortest path but maximum broadcast paths. Based on the influence probabilities between users, for each single node, an influence tree is built by computing the maximum broadcast paths, which can be used to estimate the influence range of each user. By assigning threshold for each user, the influence tree can be controlled to ignore nodes which contribute little for the computation of influence set and reduce the size of nodes computed by the influence computation. Also, Chen et al.
1
proved the submodularity of influence functions defined based on maximum broadcast paths and designed approximation algorithms with 1 − 1/
There are also many works which try to extend the classic influence maximization methods to other application settings. Li et al.
22
study the problem of influence maximization under location-based social networks. In those networks, one node can be influenced by the other node if and only if they are neighbors according to their location information, and Li et al.
22
focus on the problem of finding
Obviously, the influence models are usually defined based on several parameters which are utilized to describe the key properties in real applications. The parameter selection problem is essential to the influence maximization methods. Tang et al. 5 propose topic factor graph (TFG) models to determine different parameters between users and topics. Liu et al. 4 determine different influence parameters among users using probabilistic models to analyze the relationships of distributions between topics of users and influence relations of users. Weng et al. 28 utilize the latent Dirichlet allocation (LDA) models to describe the topic distributions of user topics and propose TwitterRank methods to determine the influence probabilities between users and topics.
Notations and definitions
In this section, classical information diffusing models are introduced first; then, to integrate the two challenge aspects of diffusing information on mobile social networks, new model is proposed by modifying the classical one. Finally, based on the new ID model, we give the new definition of influence maximization problem. In fact, the problem of influence maximization depends on the definition of diffusing models. For all diffusing models, the related influence maximization problems are based on the same idea, but they are different on the aspect of computational hardness.
Traditional ID models
In this article, information diffusion can be described as the propagating procedure of information over some network. A network is usually denoted by a graph
LT model
Given a network
IC model
IC model is a probabilistic model. Instead of
New model for diffusing information
All previous models for information diffusion do not consider dynamic influence; this part will propose a new model integrating both “location” and “time” factors which are major sources of dynamic influence in mobile social network.
ID model for dynamic influence
In ID model, the mobile social network can be represented by a graph
To integrate the dynamic influence caused by “location” factors, we use the function
To integrate the dynamic influence caused by “time” factors, we use the function
Therefore, in ID model, to describe the information diffusion on some mobile social network, we need one four-tuple 〈
In ID model, given the network 〈
The idea of integrating dynamic influence into information diffusion procedure can be explained as follows. The function
Let us consider a real example of ID model shown in Figure 1.

ID model for mobile social network and its possible worlds: (a) original graph
The definition of function
The definition of function
Given {

Information diffusion procedure on ID model.
In steps
Influence maximization problem on ID model
Based on the observations of ID model above, it is easy to find that we can partition the result set
The object of general influence maximization problem is to maximize the node set influenced by the seed node set. Obviously, in ID model, information diffusion is a probabilistic process, in which node can become active during the procedure is uncertain. Therefore, we need to understand the procedure based on possible world semantics.
Let Ω be the set of all different possible worlds of given ID model. In fact, each possible world
It should be noted that in ID model, two different processes may reach the same possible world. Therefore, the probabilities of each single process and possible world are different. Formally, given an information diffusion process
Let
Therefore, by combining those probabilities, we have
Obviously, not all edges in
Usually, we use the function
It can be found that for each possible world
In the following parts, we will use
Approximation algorithm for IMD problem
In this section, first, the computational complexity of
Hardness of solving IMD problem
Since the influence maximization problem on classic models is usually NP-
For
Simplifying the ID model
By Example 3, it is easy to find that the computation of possible world probability is tricky and it is hard to process in solving IMD problem. In this part, we propose a method to simplify ID model by integrating the
Given an instance
Let the threshold be
For each edge (
For each edge (
For each edge (
After such transformation, the new instance will only contain zero-value
While in
Obviously, all edges in the possible world have same probabilities to be chosen. Therefore, each possible world in
As shown above, the ID instance after transformation has zero-value
Efficient approximation algorithm
According to Theorem 1, it is almost impossible to solve IMD problem in polynomial time; therefore, in the following parts, our aim is to find efficient approximation algorithms with performance guarantee. As shown in the work by Kempe et al.,
2
monotone and submodular properties allow us to develop greedy algorithms to achieve (1 − 1/
We proposed an algorithm based on greedy idea which can produce approximation algorithms with ratio 1 − 1/

Algorithm G
In the G
Finally, based on the observation that the main procedure of Algorithm 3 is to iterate among all nodes and the G
Analysis of Algorithm Greedy IMD
In this part, we will show that Algorithm G
First, we introduce another kind of view of the information diffusion on ID model. According to the results in the work by Kempe et al.,
2
an equivalent view of information diffusion process on IC model is as follows: each edge (
Second, we introduce a new representation for the influence function
where
In equation (1), given network
In the following, we will show the monotone and submodular property of
Naturally, it is hoped that

An example of
For another example, let us modify the original graph
Finally, we can obtain the result that
Since
Observing that those combinations of
Here, we use
The set
Based on the above observations and equation (4),
Using the similar idea of the proof of Theorem 2, let us consider equation (4), we will explain the proof based on the function
The first case is that
The second case is that there are paths between
By combining the above two results and equation (4), we have
Improving Algorithm Greedy IMD
In Algorithm G
Based on the idea above, propose improved version of

Algorithm for getting influence.
Experimental evaluation
Based on real data sets, we evaluate the performance of Algorithm G
Experiment setup
We ran our experiments on four real data sets, whose summary information is shown in Table 1. The digital bibliography & library project (DBLP) data set is a large network of research collaboration maintained by Michael Ley. In the network of DBLP, the nodes represent the authors of academic papers and there exist one edge between two nodes if and only if the two corresponding authors have collaborations. For DBLP, we use the coauthor relationships to compute the influence probability between two authors.
Statistics of real data sets.
Experimental results and analysis
We compare the algorithms proposed in this article on qualities of seed sets and running time costs based on the four real data sets.
We use different parameters of
Effects of seed sets
The effect of given seed set can be evaluated by the influenced nodes size. On four data sets, we compare four algorithms with different parameters on seed node sets with different sizes. The results are shown in Figure 6. It can be observed that as the size of seed nodes set increases, the size of influenced nodes increases almost with linear speed. The result is expected since in a large enough network, all nodes tend to perform uniformly during the information diffusion. Also, it can be found that when increasing the value of

Influence spread against seed set size on four data sets: (a) DBLP, (b) Epinions, (c) Wikivote, and (d) Twitter.
Effects of function L
The effect of function

Influence spread against value of
Effects of function C
The effect of function

Influence spread against value of
Running time
For two data sets, we ran the original greedy algorithm and improved greedy algorithm proposed in this article for different sizes of seeds set. The running time results are shown in Figure 9. It can be found that as the size of seeds set increases, the running time cost also increases; when seed node size becomes larger, the increasing speed of running time cost becomes slow. Also, we can find that the improved algorithms are three times in average faster than the original algorithms. This is because of the reduction in computation cost and optimizing strategies.

Running time against seed set size on two data sets: (a) DBLP and (b) Twitter.
Conclusion
In this article, based on the observations of information diffusion process on mobile social networks, the ID model for diffusing information under dynamic influence is proposed. By theoretical analysis, we determine the complexities of solving influence maximization on the new model and design efficient algorithms with approximation performance guarantee. By experiments over real data set, the performances of ID model and the algorithms proposed are verified. One possible further question is how to design more efficient algorithms for dynamic influence in social networks. Another question comes from the methods of modeling dynamic influence in this article. Obviously, our methods cannot cover all possibilities of dynamic influences, and we need to investigate more typical representations for dynamic influences and study how to design algorithms for the related influence maximization problem.
