Chiaramente, ogni formato ha i propri vantaggi e svantaggi acquista antibiotici online per effettuare un acquisto, non è necessario fornire la prescrizione medica.
WWW 2011 – Tutorial
March 28–April 1, 2011, Hyderabad, India
Tutorial: Game Theoretic Models for Social Network
Electronic Commerce Laboratory
IBM India Research Lab
Dept. of Computer Science and Automation
Indian Institute of Science, Bangalore, India
ten, the individuals in the network exhibit strategic
The existing methods and techniques for social network anal-
ysis are inadequate to capture both the behavior (such asrationality and intelligence) of individuals and the strate-
2. They do not explicitly capture the dynamics of strate-
gic interactions that occur among these individuals. Game
gic interaction among the individual in the networks.
theory is a natural tool to overcome this inadequacy since
Game theory [12, 13] is a natural tool to overcome these
it provides rigorous mathematical models of strategic inter-
fundamental problems, as it provides a rich suite of mathe-
action among autonomous, intelligent, and rational agents.
matical models of strategic interaction among autonomous,
Motivated by the above observation, this tutorial provides
intelligent, and rational individuals (or players). Game the-
the conceptual underpinnings of the use of game theoretic
oretic models are thus best suited to capture the strategic
models in social network analysis. In the ﬁrst part of the tu-
nature of individuals making up a social network. Game
torial, we provide rigorous foundations of relevant concepts
theoretic models are also complementary to the current SNA
in game theory and social network analysis.
approaches and hence they add a new dimension to the area
ond part of the tutorial, we present a comprehensive study
of SNA. Recently there have been several eﬀorts in following
of four contemporary and pertinent problems in social net-
a game theoretic approach to social network modeling [18,
works: social network formation, determining in inﬂuential
7, 5, 10, 15, 6, 11, 9, 2, 1, 17, 16].
individuals for viral marketing, query incentive networks,
In our view, game theoretic models are appropriate for
and community detection.
social network analysis from two perspectives:(a) Game theoretic models are very natural for several prob-
Categories and Subject Descriptors
lems in social network analysis. A few such problems include
F.2.2 [Analysis of Algorithms and Problem Complex-
social network formation [7, 5, 10, 15], social network mon-
]: Nonnumerical Algorithms and Problems
etization , and bargaining on networks .
(b) Game theoretic models are useful as a tool to solve cer-tain interesting problems in social network analysis. This
leads to not only a deeper understanding of those problems
but also eﬃcient algorithms. A few examples of this kindinclude query incentive networks [9, 2], discovering commu-
nities in networks [1, 17], determining inﬂuential individualsfor viral marketing , etc.
Social networks, game theory, viral marketing, network for-mation, query incentive networks, community detection
CONTENT OF THE TUTORIAL
Here we present a brief description of the material and the
results that we discuss in this tutorial.
Social network analysis (SNA)  comprises a well devel-
oped suite of measures and metrics based on techniques such
Social Network Analysis: A Quick Primer
as graph theory, spectral theory, optimization theory. Allthis machinery in SNA is useful to measure the structural
First, we present a quick primer on social network analysis
and statistical properties of social networks. In fact, gen-
from Easley and Kleinberg . We deﬁne important metrics
erative models can reproduce networks with similar/same
for social network analysis, prominent approaches for social
structural properties. However, the current SNA approaches
network analysis, and list a few benchmark problems.
are inadequate for the following reasons:
Foundational Concepts in Game Theory
1. They do not satisfactorily capture the behavior of the
Here we ﬁrst present the basic concepts from both non-
individuals in social networks. For example, very of-
cooperative game theory and cooperative game theory. Ma-jority of this content is covered from Myerson . We then
Copyright is held by the author/owner(s).
present the foundational principles of mechanism design the-
March 28–April 1, 2011, Hyderabad, India.
ory from Narahari, Garg, Ramasuri, and Hastagiri .
WWW 2011 – Tutorial
March 28–April 1, 2011, Hyderabad, India
Social Network Formation
cial network analysis. We then motivate the need for a game
The behavior of networks is driven by the actions of a
theoretic approach to community detection and present two
large number of autonomous individuals, each motivated by
game theoretic models for community detection Chen, Liu,
self-interest and individual objectives. As a consequence of
Sun, and Wang  and Ramasuri and Narahari .
this, the global performance of such networks, which arethe equilibrium outcomes of decentralized strategic interac-
tions, can be worse than that of a network that is enforced
 W. Chen, Z. Liu, X. Sun, and Y. Wang. A game
by a central authority. In the literature, networks that are
theoretic framework to identify overlapping
enforced by a central authority are known as eﬃcient net-
communities in social networks
. DMKD, 21:224-240,
works. Understanding the compatibility between the equi-
librium networks and eﬃcient networks is the primary focus
 D. Dikshit and Y. Narahari. Truthful and Quality
of research in network formation. Most of the results that we
Conscious Query Incentive Networks.
In Workshop on
cover in this context are primarily from Jackson , Goyal
Internet and Network Economics (WINE), 2009.
, Kleinberg, Suri, Tardos, and Wexler , and Ramasuri
 P. Domingos and M. Richardson. Mining the network
and Narahari .
value of customers.
In ACM SIGKDD, 2001.
Discovering Influential Individuals for Vi-
 D. Easley and J. Kleinberg. Networks, Crowds, and
Markets: Reasoning about a Highly Connected World.
Cambridge University Press, Cambridge, UK, 2010.
Viral Marketing is based on the conceptual framework of
 S. Goyal. Connections: An Introduction to the
diﬀusion of information. In this context, given a integer
Economics of Networks
. Princeton University Press,
, it is very challenging to determine top-k
Princeton and Oxford, 2007.
individuals to maximize the volume of information cascade.
Formally, we deﬁne an objective function σ
) as follows. We
 J.D. Hartline, V.S. Mirrokni, M. Sundararajan.
note that an individual is active if he/she adopts the product
Optimal marketing strategies over social networks.
or technology. If S
is the set of initially active nodes, then
) is the expected number of active nodes at the end of the
 M. O. Jackson. Social and Economic Networks
diﬀusion process. For a given constant k
, the top-k
Princeton University Press, 2008.
problem seeks to ﬁnd a subset of nodes S
 D. Kempe, J. Kleinberg, and E. Tardos. Maximizing
that maximizes the value of σ
). In this setting, we
the spread of inﬂuence through a social network.
ﬁrst cover certain fundamental results from Domingos and
ACM SIGKDD, 2003.
Richardson , Kempe, Kleinberg, and Tardos . Then
 J.M. Kleinberg and P. Raghavan. Query Incentive
we present a game theoretic approach to address the top-k
In IEEE FOCS, pages 132-141, 2005.
nodes problem and we present a few results from Ramasuri
 J. Kleinberg, S. Suri, E. Tardos, and T. Wexler.
and Narahari .
Strategic network formation with structural holes
. InACM EC, pages 284-293, 2008.
Query Incentive Networks
 J.M. Kleinberg and E. Tardos. Balanced outcomes in
We consider scenarios where a person in a social network
social exchange networks.
In STOC, 2008.
is seeking some information from the social network and the
 R.B. Myerson. Game Theory: Analysis of Conﬂict.
other connected individuals forward the query down in the
Harvard University Press, 1997.
network as well as report back the answer, if any. Since ev-
 Y. Narahari, Dinesh Garg, Ramasuri Narayanam,
ery individual is an intelligent and rational agent and since
Hastagiri Prakash. Game Theoretic Problems in
forwarding the query (and then reporting back the answer)
Network Economics and Mechanism Design Solutions.
requires a certain amount of eﬀort on her part, she may not
In Series: Advance Information & Knowledge
be willing to do so. While oﬀering an appropriate incen-
Processing (AIKP), Springer Verlag, London, 2009.
tive to the intermediate nodes will increase the total reward
 Prabhakar Raghavan and Jon Kleinberg. Query
which must be oﬀered by the person posing the query, it
In IEEE FOCS, 2005.
will also increase the exposure of the query. This concept
 Ramasuri Narayanam and Y. Narahari. Topologies of
was captured by the model of Raghavan and Kleinberg 
Strategically Formed Social Networks Based on a
who called these query incentive networks
. In the tutorial,
Generic Value Function - Allocation Rule Model.
we will bring out the role of game theory and mechanism
appear in Social Networks (Elsevier), 2011.
design in the design of incentives in such networks [14, 2].
 Ramasuri Narayanam and Y. Narahari. A Shapley
Community Detection in Social Networks
Value based Approach to Discover Inﬂuential Nodes inSocial Networks.
In IEEE TASE, 8(1):130-147, 2011.
A community structure in a network is a division of net-
 Ramasuri Narayanam and Y. Narahari. Nash Stable
work nodes into groups within which the network connec-
Partitioning of Graphs with Application to Community
tions are dense, but between which the connections are sparse.
Detection in Social Networks.
Under Review, 2010.
Detecting communities in networks helps to understand theunderlying characteristics of large networks. We ﬁrst men-
 S. Suri. The Eﬀects of Network Topology on Strategic
tion several variants of community detection in networks
. PhD thesis, Dept. of Computer and
such as graph partitioning, ﬁnding the most dense subgraph
Information Science, University of Pennsylvania, 2007.
in a given graph. Next we brieﬂy mention various techniques
 S. Wasserman and K. Faust. Social Network Analysis
for community detection like spectral methods, multi-level
Cambridge University Press, Cambridge, 1994.
methods, optimization methods, and methods based on so-
YTAAP-12785; No. of pages: 10; 4C: 3 J. Hamdam et al. / Toxicology and Applied Pharmacology xxx (2013) xxx–xxx Contents lists available at Toxicology and Applied Pharmacology Invited Review Article Safety pharmacology — Current and emerging concepts Junnat Hamdam , Swaminathan Sethu , Trevor Smith , Ana Alﬁrevic Mohammad Alhaidari , Jeffrey Atkinson , Mimieveshiofou Ayala Helen Box Michael Cross Annie Delaunois Ailsa Dermody ,
HP ProBook 440 G2 Notebook PC HP ProBook 450 G2 Notebook PC HP ProBook 440 G2 Notebook PC WLAN antennas (available on select models Media Card Reader Hard drive activity LED indicator Dual-microphone array* USB 3.0 ports (2) RJ-45 (network) jack RJ-45 (network) lights (2) Wireless on/off button VGA monitor port Speaker mute button