<?xml version="1.0" encoding="UTF-8" standalone="no"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD Journal Publishing DTD v2.3 20070202//EN" "journalpublishing.dtd">
<article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" article-type="research-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Big Data</journal-id>
<journal-title>Frontiers in Big Data</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Big Data</abbrev-journal-title>
<issn pub-type="epub">2624-909X</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fdata.2019.00016</article-id>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Big Data</subject>
<subj-group>
<subject>Original Research</subject>
</subj-group>
</subj-group>
</article-categories>
<title-group>
<article-title>Choosing Optimal Seed Nodes in Competitive Contagion</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>Kumar</surname> <given-names>Prem</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/709268/overview"/>
</contrib>
<contrib contrib-type="author" corresp="yes">
<name><surname>Verma</surname> <given-names>Puneet</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c002"><sup>&#x0002A;</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/709205/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Singh</surname> <given-names>Anurag</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/724985/overview"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Cherifi</surname> <given-names>Hocine</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<uri xlink:href="http://loop.frontiersin.org/people/74967/overview"/>
</contrib>
</contrib-group>
<aff id="aff1"><sup>1</sup><institution>Department of Computer Science and Engineering, National Institute of Technology Delhi</institution>, <addr-line>New Delhi</addr-line>, <country>India</country></aff>
<aff id="aff2"><sup>2</sup><institution>LIB EA 7534, University of Burgundy</institution>, <addr-line>Dijon</addr-line>, <country>France</country></aff>
<author-notes>
<fn fn-type="edited-by"><p>Edited by: Andrea Tagarelli, University of Calabria, Italy</p></fn>
<fn fn-type="edited-by"><p>Reviewed by: Francesco Gullo, UniCredit, Italy; Martin Atzmueller, Tilburg University, Netherlands</p></fn>
<corresp id="c001">&#x0002A;Correspondence: Prem Kumar <email>kprem193&#x00040;gmail.com</email></corresp>
<corresp id="c002">Puneet Verma <email>puneetverma866&#x00040;gmail.com</email></corresp>
<fn fn-type="other" id="fn001"><p>This article was submitted to Data Mining and Management, a section of the journal Frontiers in Big Data</p></fn></author-notes>
<pub-date pub-type="epub">
<day>20</day>
<month>06</month>
<year>2019</year>
</pub-date>
<pub-date pub-type="collection">
<year>2019</year>
</pub-date>
<volume>2</volume>
<elocation-id>16</elocation-id>
<history>
<date date-type="received">
<day>25</day>
<month>03</month>
<year>2019</year>
</date>
<date date-type="accepted">
<day>28</day>
<month>05</month>
<year>2019</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2019 Kumar, Verma, Singh and Cherifi.</copyright-statement>
<copyright-year>2019</copyright-year>
<copyright-holder>Kumar, Verma, Singh and Cherifi</copyright-holder>
<license xlink:href="http://creativecommons.org/licenses/by/4.0/"><p>This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</p></license>
</permissions>
<abstract><p>In recent years there has been a growing interest in simulating competitive markets to find out the efficient ways to advertise a product or spread an ideology. Along this line, we consider a binary competitive contagion process where two infections, A and B, interact with each other and diffuse simultaneously in a network. We investigate which is the best centrality measure to find out the seed nodes a company should adopt in the presence of rivals so that it can maximize its influence. These nodes can be used as the initial spreaders or advertisers by firms when two firms compete with each other. Each node is assigned a price tag to become an initial advertiser which varies according to their importance in the network. Considering their fixed budgets, they initially determine the payoff of their products and the number of their initial seeds in the network. Under this setting, we study the question of whether to choose a small number of influential nodes or a larger number of less influential nodes.</p></abstract>
<kwd-group>
<kwd>competitive contagion</kwd>
<kwd>complex networks</kwd>
<kwd>game theory</kwd>
<kwd>seed nodes</kwd>
<kwd>competitive marketing</kwd>
<kwd>centrality measures</kwd>
</kwd-group>
<counts>
<fig-count count="2"/>
<table-count count="2"/>
<equation-count count="7"/>
<ref-count count="12"/>
<page-count count="6"/>
<word-count count="4120"/>
</counts>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<title>1. Introduction</title>
<p>Contagion in general life means the communication of disease from one person or organism to another by close contact. This definition can be extended by replacing the disease with a product or an ideology. Competitive Contagion is a type of contagion which deals with conflict and race of multiple firms who want to influence or infect more people than others. There are a lot of situations that can be described in such a way, for example: Two political parties trying to influence the citizens by giving incentives to some influential people in the country and directing them to advertise their ideology, Two mobile phone manufactures competing to advertise their mobile phones of same segment by hiring celebrities or tech reviewers and giving them incentives. So, it is important to simulate such an environment and provide algorithms and properties for optimal seed selection for the competitive contagion process. While doing such competition this work can be used by firms to select the initial spreaders or advertisers by analyzing their network topological properties.</p>
<p>Diffusion on networks is a fundamental process which involves spreading of an ideology (or infection) in a population, e.g., epidemic disease contagion, spread of innovation by word-of-mouth. Considering a network diffusion model, the influence maximization problem consists of finding a set of initial seed nodes so that the expected size of the resulting cascade is maximized. Supposing that there is a limit k on the number of nodes to target (e.g., due to advertising budgets), the goal is to efficiently find an appropriate set of k nodes with which to &#x0201C;seed&#x0201D; a diffusion process. Classical works by Kempe et al. (<xref ref-type="bibr" rid="B7">2003</xref>, <xref ref-type="bibr" rid="B8">2005</xref>), on this subject are competitive unaware. They focused on designing models of spreading of a single influence (or idea) and algorithms to find out the optimal seed nodes for maximal adoption of a product of a single firm only. However in real life scenarios, several firms compete in the same market and multiple infections can occur simultaneously in the same network. This has led to the increase in effort toward finding seeds for more realistic settings. Recent works by Bharathi et al. (<xref ref-type="bibr" rid="B1">2007</xref>) and Goyal et al. (<xref ref-type="bibr" rid="B4">2014</xref>) focused on the modeling the competitive contagion of multiple firms using game theory. They proposed an algorithm to select the seed nodes in a network and discussed the Nash equilibrium when multiple firms compete against each other. Despite the considerable progress made toward finding the seeds in the social network in competitive settings, some very basic questions remain unanswered. Indeed, one approach used to make the influence maximization is to reduce the problem into the ranking of the nodes according to the centrality measures. In other words, the seed nodes are selected by mentioning its ranks using various centrality measure. This raises an important question as to which of the centrality measures should firms use to rank the nodes while selecting them as seed nodes. To answer this question, we compare various centrality methods for finding the rank of nodes. In order to do so, for all the centralities under investigation, we assign a seed strategy based on a centrality to one firm and another to the other one and we compare their spreading efficiency. We also address the question whether a firm should select a small number of highly influential nodes or a larger number of less influential nodes. To answer this question we assign each node a price tag using the best centrality measure found during our analysis and give a fixed and same amount of budget to both firms. Then one firm stakes his funds in buying large number of cheap seed nodes and other in buying small number of expensive seed nodes and then we compare their influence or number of nodes infected when stability is achieved.</p>
<p>The rest of paper is organized as follows: In section 2 basic terminologies and definitions mentioned in the paper are recalled. In section 3, the diffusion model is presented. Section 4 deals with comparing the efficiency of classical centrality measures in the competitive contagion in order to choose the seed nodes. Section 5 compares the strategies of using few highly influential seeds rather than a higher number of less influential seeds with the same budget. Section 6 concludes the paper.</p>
</sec>
<sec id="s2">
<title>2. Background</title>
<p>We can classify the contagion processes (Dassios and Zhao, <xref ref-type="bibr" rid="B2">2011</xref>) into three categories based on the dependency of one disease A to another disease B:</p>
<list list-type="order">
<list-item><p>Competitive: This type of process occurs only if there are multiple diseases (or information about products or ideologies) to propagate. Here, if a node is already infected by a disease <italic>A</italic> it resists the infection by another disease <italic>B</italic>, e.g., diffusion of ideology of two political parties.</p></list-item>
<list-item><p>Cooperative: It is just the opposite of competitive contagion. Here, if a node is already infected by a disease <italic>A</italic>, and another infection <italic>B</italic> is trying to infect it, disease <italic>A</italic> helps disease <italic>B</italic> to infect the node. e.g., : Diffusion of two diseases (Tuberculosis and common flu).</p></list-item>
<list-item><p>Independent: As the name suggests in this type of contagion no infection (or information about product) interacts with each other and are independent.</p></list-item>
</list>
<p>We need to calculate the importance of a node in the network to assign its price. Higher rank nodes will be considered costlier in comparison with lower rank nodes. Centrality is a measure for calculating the importance of a node based on its topological properties in the network. There are numerous centrality measures based on various topological properties of nodes which are used in order to assign a score of importance to every node (Gupta et al., <xref ref-type="bibr" rid="B5">2015</xref>, <xref ref-type="bibr" rid="B6">2016</xref>). In this work we restrain our attention to the most influential measures. Their definitions are given below:</p>
<list list-type="order">
<list-item><p>Degree Centrality: It considers that the node centrality is linked to the size of its neighborhood. It is simply the number of nodes at a distance of one edge.</p></list-item>
<list-item><p>Closeness Centrality: It considers nodes having smaller distance with all other nodes to be more central.
<disp-formula id="E1"><mml:math id="M1"><mml:mi>C</mml:mi><mml:mi>l</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mo stretchy='false'>(</mml:mo><mml:mi>v</mml:mi><mml:mo stretchy='false'>)</mml:mo><mml:mo>=</mml:mo><mml:mfrac><mml:mn>1</mml:mn><mml:mrow><mml:mstyle displaystyle='true'><mml:msub><mml:mo>&#x02211;</mml:mo><mml:mrow><mml:mi>i</mml:mi><mml:mo>&#x02260;</mml:mo><mml:mi>v</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:msub><mml:mi>d</mml:mi><mml:mrow><mml:mi>v</mml:mi><mml:mi>i</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mstyle></mml:mrow></mml:mfrac></mml:math></disp-formula>
<list list-type="bullet">
<list-item><p>where <italic>d</italic><sub><italic>vi</italic></sub> is distance between node v to i.</p></list-item>
</list></p></list-item>
<list-item><p>Betweenness Centrality: It works on the concept that the more often a node acts as a bridge along the shortest path between any two nodes, the more central it is.
<disp-formula id="E2"><mml:math id="M2"><mml:mrow><mml:mi>B</mml:mi><mml:mi>e</mml:mi><mml:mi>t</mml:mi><mml:mi>w</mml:mi><mml:mi>e</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>e</mml:mi><mml:mi>s</mml:mi><mml:mi>s</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>v</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>=</mml:mo><mml:mstyle displaystyle="true"><mml:munder class="msub"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>s</mml:mi><mml:mo>&#x02260;</mml:mo><mml:mi>v</mml:mi><mml:mo>&#x02260;</mml:mo><mml:mi>t</mml:mi><mml:mo>&#x02208;</mml:mo><mml:mi>V</mml:mi></mml:mrow></mml:munder></mml:mstyle><mml:mfrac><mml:mrow><mml:msub><mml:mrow><mml:mi>&#x003C3;</mml:mi></mml:mrow><mml:mrow><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>v</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:msub><mml:mrow><mml:mi>&#x003C3;</mml:mi></mml:mrow><mml:mrow><mml:mi>s</mml:mi><mml:mi>t</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<list list-type="bullet">
<list-item><p>where &#x003C3;<sub><italic>st</italic></sub> is total number of shortest paths from node s to node t and &#x003C3;<sub><italic>st</italic></sub>(<italic>v</italic>) is the number of those paths that pass through v.</p></list-item>
</list></p></list-item>
<list-item><p>EigenVector Centrality: It works on the concept that connections to high-scoring nodes contribute more to the score of the node in question than equal connections to low-scoring nodes. For a given graph <italic>G</italic>: &#x0003D; (<italic>V, E</italic>), Let <italic>A</italic> be the adjacency matrix.
<disp-formula id="E3"><mml:math id="M3"><mml:mrow><mml:mi>A</mml:mi><mml:mi>x</mml:mi><mml:mo>=</mml:mo><mml:mo>&#x003BB;</mml:mo><mml:mi>x</mml:mi></mml:mrow></mml:math></disp-formula>
<list list-type="bullet">
<list-item><p>where &#x003BB; is the eigenvalue and x is the resulting eigenvector which contains the centrality measure of <italic>ith</italic> node at <italic>ith</italic> row.</p></list-item>
</list></p>
<p>There will be multiple eigenvalues &#x003BB; for which non-zero solution exists. However, (by the Perron, <xref ref-type="bibr" rid="B12">1907</xref>; Frobenius, <xref ref-type="bibr" rid="B3">1912</xref> theorem) only the greatest eigenvalue results in desired centrality measure.</p></list-item>
<list-item><p>Page Rank Centrality (Page et al., <xref ref-type="bibr" rid="B11">1999</xref>): It is a variant of the EigenVector Centrality. It works on the assumption that more important nodes are likely to receive more links from other nodes.</p></list-item></list>
<disp-formula id="E4"><mml:math id="M4"><mml:mrow><mml:mi>P</mml:mi><mml:mi>R</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>u</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow><mml:mo>&#x0221D;</mml:mo><mml:mstyle displaystyle="true"><mml:munder class="msub"><mml:mrow><mml:mo>&#x02211;</mml:mo></mml:mrow><mml:mrow><mml:mi>v</mml:mi><mml:mo>&#x02208;</mml:mo><mml:msub><mml:mrow><mml:mi>B</mml:mi></mml:mrow><mml:mrow><mml:mi>u</mml:mi></mml:mrow></mml:msub></mml:mrow></mml:munder></mml:mstyle><mml:mfrac><mml:mrow><mml:mi>P</mml:mi><mml:mi>R</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>v</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow><mml:mrow><mml:mi>L</mml:mi><mml:mrow><mml:mo stretchy="false">(</mml:mo><mml:mrow><mml:mi>v</mml:mi></mml:mrow><mml:mo stretchy="false">)</mml:mo></mml:mrow></mml:mrow></mml:mfrac></mml:mrow></mml:math></disp-formula>
<p>i.e., the PageRank value for a page <italic>u</italic> is dependent on the PageRank values for each page <italic>v</italic> contained in the set <italic>B</italic><sub><italic>u</italic></sub> (the set containing all pages linking to page <italic>u</italic>), divided by the number <italic>L</italic>(<italic>v</italic>) of links from page <italic>v</italic>. The algorithm involves a damping factor for the calculation of the pagerank.</p>
</sec>
<sec id="s3">
<title>3. Diffusion Process</title>
<p>We study a competitive process of adoption of multiple products made by multiple firms who use their respective monetary resources for advertisement of their product to the consumers located in a network. Each firm has a fixed budget to advertise their products to the users in a social network. Therefore, each firm needs to optimally choose a set of seed nodes using the assigned budget for maximum adoption of their product. We use the generic game theoretic model (Osborne and Rubinstein, <xref ref-type="bibr" rid="B10">1994</xref>) for the study of competition between firms. In view of game theoretic scenario in competitive market, we propose a diffusion algorithm for the spreading of any information about a product.</p>
<p><bold>The proposed game theoretic model may be represented as:</bold></p>
<list list-type="simple">
<list-item><p><bold>Players:</bold> The firms (A and B).</p></list-item>
<list-item><p><bold>Actions:</bold> Each firm&#x00027;s set of actions is to choose the initial seed nodes or their advertisers.</p></list-item>
<list-item><p><bold>Preferences:</bold> Each firm&#x00027;s preference is to maximize the adoption of their product in the network or to infect the maximum number of nodes possible.</p></list-item>
</list>
<p>Multiple firms may try to spread information about their products in the underlying social network. Here, in this work two firms are considered for spreading information about their two products, respectively. As the only action provided to firms is to choose the seed nodes at the beginning, so the result of the entire game depends on the strategy to choose the set of starting spreader (or seed) nodes. Each of the firms (<italic>A</italic> and <italic>B</italic>) comes into the open market to advertise their product with limited budget <italic>C</italic><sub><italic>A</italic></sub> and <italic>C</italic><sub><italic>B</italic></sub>. They have their node ranking algorithm using which they rank the nodes present in the network and then select the nodes whose price is less than their remaining budget, starting from highest rank (numerically lowest: Rank 1) till the funds remained are not enough to hire any node. The proposed diffusion Algorithm 1 used to simulate the dynamics is an extension of a previous work on simulating epidemic and rumor spreading (Kumar et al. <xref ref-type="bibr" rid="B9">2018</xref>) in which we proposed a simple cascade algorithm for diffusion, discussed various characteristics of epidemic and rumor spreading and the relation among various attributes of epidemic and rumor spreading. This algorithm is a cascade based algorithm in which at each timestamp all the infected nodes try to transmit their disease (or ideology) to their direct connections and the probability that infection will transmit depends upon &#x003BB;<sub><italic>A</italic></sub>, &#x003BB;<sub><italic>B</italic></sub>, <italic>c</italic><sub><italic>iA</italic></sub>, and <italic>c</italic><sub><italic>iB</italic></sub>. <xref ref-type="fig" rid="F1">Figure 1</xref> shows the conversion model of nodes based on Algorithm 1.</p>
<fig id="F1" position="float">
<label>Figure 1</label>
<caption><p>The model of spreading. The transparent node labeled as S is a Susceptible node which is not yet influenced by either firms. Initially all the nodes except seed nodes are Susceptible and they can be influenced by A or B. Once infected by either A or B, they will stay infected. As the scenario is competitive, a node infected by A can be converted to a node infected by B and vice versa, if the required condition is satisfied. The value along the arrow is the probability of infection. The node is assumed as the <italic>i</italic>th labeled node.</p></caption>
<graphic xlink:href="fdata-02-00016-g0001.tif"/>
</fig>
<p>&#x003BB;<sub><italic>A</italic></sub> and &#x003BB;<sub><italic>B</italic></sub> are the infection rates of infection A and infection B which are constant. <italic>c</italic><sub><italic>iA</italic></sub> and <italic>c</italic><sub><italic>iB</italic></sub> are the competitive measures of node <italic>i</italic>. It is 1 at time <italic>t</italic> &#x0003D; 0 for every node and changes when the node is infected by any infection. When <italic>ith</italic> node is infected by A, <italic>c</italic><sub><italic>iA</italic></sub> gets multiplied by &#x003B1;<sub><italic>A</italic></sub> and if <italic>jth</italic> node is infected by B, <italic>c</italic><sub><italic>jB</italic></sub> gets multiplied by &#x003B1;<sub><italic>B</italic></sub>. &#x003B1;<sub><italic>A</italic></sub> and &#x003B1;<sub><italic>B</italic></sub> are the competitive constants, larger the &#x003B1;<sub><italic>X</italic></sub> more is the resistance of a node infected by X for another infection.</p>
<p>The population is divided into two compartments: Susceptible and Infected and infected is further divided into two compartments: Infected by A and Infected by B. Let N be the total population, <italic>S</italic> be the number of Susceptible nodes, <italic>X</italic><sub><italic>A</italic></sub> and <italic>X</italic><sub><italic>B</italic></sub> be the number of seed nodes of <italic>A</italic> and <italic>B</italic>, <italic>I</italic><sub><italic>A</italic></sub> and <italic>I</italic><sub><italic>B</italic></sub> be the number of nodes infected by <italic>A</italic> and <italic>B</italic> respectively. At the start of simulation <italic>I</italic><sub><italic>A</italic></sub> &#x0003D; <italic>X</italic><sub><italic>A</italic></sub> and <italic>I</italic><sub><italic>B</italic></sub> &#x0003D; <italic>X</italic><sub><italic>B</italic></sub>.</p>
<disp-formula id="E5"><mml:math id="M5"><mml:mtable class="eqnarray" columnalign="right center left"><mml:mtr><mml:mtd><mml:mi>T</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:mi>l</mml:mi><mml:mi>a</mml:mi><mml:mi>w</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:mi>o</mml:mi><mml:mi>f</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mi>s</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>v</mml:mi><mml:mi>a</mml:mi><mml:mi>t</mml:mi><mml:mi>i</mml:mi><mml:mi>o</mml:mi><mml:mi>n</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:mi>w</mml:mi><mml:mi>i</mml:mi><mml:mi>l</mml:mi><mml:mi>l</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:mi>b</mml:mi><mml:mi>e</mml:mi><mml:mo>:</mml:mo><mml:mi>N</mml:mi><mml:mo>=</mml:mo><mml:mi>S</mml:mi><mml:mo>&#x0002B;</mml:mo><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mo>&#x0002B;</mml:mo><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mtext>&#x000A0;</mml:mtext></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<disp-formula id="E6"><label>(1)</label><mml:math id="M6"><mml:mtable class="eqnarray" columnalign="right center left"><mml:mtr><mml:mtd><mml:mi>w</mml:mi><mml:mi>h</mml:mi><mml:mi>e</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi><mml:msub><mml:mrow><mml:mtext>&#x000A0;</mml:mtext><mml:mi>X</mml:mi></mml:mrow><mml:mrow><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02282;</mml:mo><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>A</mml:mi></mml:mrow></mml:msub><mml:mtext>&#x000A0;</mml:mtext><mml:mi>&#x00026;</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:msub><mml:mrow><mml:mi>X</mml:mi></mml:mrow><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub><mml:mo>&#x02282;</mml:mo><mml:msub><mml:mrow><mml:mi>I</mml:mi></mml:mrow><mml:mrow><mml:mi>B</mml:mi></mml:mrow></mml:msub></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
</sec>
<sec id="s4">
<title>4. Finding the Optimal Centrality Measure</title>
<p>The agents present in the network take a fixed amount to advertise or spread the product of the firms and that value is decided in accordance to centrality value of the agents. To find out which centrality measure is more effective for finding the most influential nodes in a competitive contagion scenario, we compare the following five centrality measures: Page Rank, Degree, Betweenness, Closeness, EigenVector. To do so, we consider each method as a node ranking algorithm of a firm trying to advertise its product. Therefore, there are total <inline-formula><mml:math id="M7"><mml:mrow><mml:mo>(</mml:mo><mml:mrow><mml:mtable><mml:mtr><mml:mtd><mml:mn>5</mml:mn></mml:mtd></mml:mtr><mml:mtr><mml:mtd><mml:mn>2</mml:mn></mml:mtd></mml:mtr></mml:mtable></mml:mrow><mml:mo>)</mml:mo></mml:mrow></mml:math></inline-formula> matches (<italic>Match of every centrality against every other centrality</italic>. Each firm ranks the top 10 nodes according to their node ranking algorithm and put them in their seed nodes set. As there are cases in which both competing centralities have common nodes in their top 10 list, we assign only unique nodes to each. An example of this distribution is given in <xref ref-type="supplementary-material" rid="SM1">Table S2</xref>. <xref ref-type="supplementary-material" rid="SM1">Table S2</xref> contains the list of seed nodes for competitions of various centrality measures. After making the set of seeds for each match, we run the simulation for dynamics of infection using the Algorithm 1.</p>
<table-wrap position="float">
<caption><p>Algorithm 1 Diffusion algorithm.</p></caption>
<table frame="hsides" rules="groups">
<tbody>
<tr>
<td align="right" valign="top">1:</td>
<td align="left" valign="top">&#x000A0;<italic>G</italic>: Population (Graph).</td></tr>
<tr>
<td align="right" valign="top">2:</td>
<td align="left" valign="top">&#x000A0;<italic>S</italic><sub><italic>A</italic></sub>, <italic>S</italic><sub><italic>B</italic></sub>: The set of seed nodes of firms <italic>A</italic> and <italic>B</italic> respectively.</td></tr>
<tr>
<td align="right" valign="top">3:</td>
<td align="left" valign="top">&#x000A0;&#x003BB;<sub><italic>A</italic></sub>, &#x003BB;<sub><italic>B</italic></sub>: Probability of spreading information about the product of <italic>A</italic> and <italic>B</italic> firms respectively.</td></tr>
<tr><td align="right" valign="top">4:</td>
<td align="left" valign="top">&#x000A0;<italic>c</italic><sub><italic>iA</italic></sub>, <italic>c</italic><sub><italic>iB</italic></sub>: competitive measures for Firms <italic>A</italic> and <italic>B</italic> respectively.</td></tr>
<tr><td align="right" valign="top">5:</td>
<td align="left" valign="top">&#x000A0;&#x003B1;<sub><italic>A</italic></sub>, &#x003B1;<sub><italic>B</italic></sub>: competitive constant for respectively of <italic>A</italic> and <italic>B</italic>.</td></tr>
<tr><td align="right" valign="top">6:</td>
<td align="left" valign="top">&#x000A0;For each node, i other than the initial seeds <italic>S</italic><sub><italic>A</italic></sub>&#x0222A;<italic>S</italic><sub><italic>B</italic></sub>:</td></tr>
<tr><td align="right" valign="top">7:</td>
<td align="left" valign="top">&#x000A0;<bold>procedure</bold> (<italic>G</italic>, <italic>S</italic><sub><italic>A</italic></sub>, <italic>S</italic><sub><italic>B</italic></sub>, &#x003BB;<sub><italic>A</italic></sub>, &#x003BB;<sub><italic>B</italic></sub>, <italic>c</italic><sub><italic>iA</italic></sub>, <italic>c</italic><sub><italic>iB</italic></sub>, &#x003B1;<sub><italic>A</italic></sub>, &#x003B1;<sub><italic>B</italic></sub>)</td></tr>
<tr><td align="right" valign="top">8:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; Count the number of neighbors infected by A (<italic>n</italic><sub><italic>A</italic></sub>) and B (<italic>n</italic><sub><italic>B</italic></sub>) and respectively</td></tr>
<tr><td align="right" valign="top">9:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <italic>x</italic> &#x02190; <italic>n</italic><sub><italic>A</italic></sub> &#x0002A; &#x003BB;<sub><italic>A</italic></sub> &#x0002A; <italic>c</italic><sub><italic>iA</italic></sub>/<italic>c</italic><sub><italic>iB</italic></sub></td></tr>
<tr><td align="right" valign="top">10:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <italic>y</italic> &#x02190; <italic>n</italic><sub><italic>B</italic></sub> &#x0002A; &#x003BB;<sub><italic>B</italic></sub> &#x0002A; <italic>c</italic><sub><italic>iB</italic></sub>/<italic>c</italic><sub><italic>iA</italic></sub></td></tr>
<tr><td align="right" valign="top">11:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <bold>if</bold> <italic>x</italic> &#x0003E; <italic>y</italic> <bold>then</bold></td></tr>
<tr><td align="right" valign="top">12:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; Generate a random number (<italic>r</italic><sub>0</sub>) between 1 and 100.</td></tr>
<tr><td align="right" valign="top">13:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>if</bold> <italic>r</italic><sub>0</sub> &#x0003C; &#x003BB;<sub><italic>A</italic></sub>&#x0002A;<italic>c</italic><sub><italic>iA</italic></sub>/<italic>c</italic><sub><italic>iB</italic></sub> <bold>then</bold></td></tr>
<tr><td align="right" valign="top">14:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>node</italic><sub><italic>i</italic></sub> gets infected by A</td></tr>
<tr><td align="right" valign="top">15:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>c</italic><sub><italic>iA</italic></sub> &#x02190; <italic>c</italic><sub><italic>iA</italic></sub>&#x0002A;&#x003B1;<sub><italic>A</italic></sub></td></tr>
<tr><td align="right" valign="top">16:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>end if</bold></td></tr>
<tr><td align="right" valign="top">17:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <bold>else</bold></td></tr>
<tr><td align="right" valign="top">18:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; generate another random number (<italic>r</italic><sub>1</sub>) between 1 and 100.</td></tr>
<tr><td align="right" valign="top">19:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>if</bold> <italic>r</italic><sub>1</sub> &#x0003C; &#x003BB;<sub><italic>B</italic></sub>&#x0002A;<italic>c</italic><sub><italic>iB</italic></sub>/<italic>c</italic><sub><italic>iA</italic></sub> <bold>then</bold></td></tr>
<tr><td align="right" valign="top">20:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>node</italic><sub><italic>i</italic></sub> gets infected by B</td></tr>
<tr><td align="right" valign="top">21:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>c</italic><sub><italic>iB</italic></sub> &#x02190; <italic>c</italic><sub><italic>iB</italic></sub>&#x0002A;&#x003B1;<sub><italic>B</italic></sub></td></tr>
<tr><td align="right" valign="top">22:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>end if</bold></td></tr>
<tr><td align="right" valign="top">23:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <bold>end if</bold></td></tr>
<tr><td align="right" valign="top">24:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <bold>if</bold> <italic>x</italic> &#x0003C; <italic>y</italic> <bold>then</bold></td></tr>
<tr><td align="right" valign="top">25:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; Generate a random number (<italic>r</italic><sub>2</sub>) between 1 and 100.</td></tr>
<tr><td align="right" valign="top">26:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>if</bold> <italic>r</italic><sub>2</sub> &#x0003C; &#x003BB;<sub><italic>B</italic></sub>&#x0002A;<italic>c</italic><sub><italic>iB</italic></sub>/<italic>c</italic><sub><italic>iA</italic></sub> <bold>then</bold></td></tr>
<tr><td align="right" valign="top">27:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>node</italic><sub><italic>i</italic></sub> gets infected by B</td></tr>
<tr><td align="right" valign="top">28:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>c</italic><sub><italic>iB</italic></sub> &#x02190; <italic>c</italic><sub><italic>iB</italic></sub>&#x0002A;&#x003B1;<sub><italic>B</italic></sub></td></tr>
<tr><td align="right" valign="top">29:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>end if</bold></td></tr>
<tr><td align="right" valign="top">30:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0; <bold>else</bold></td></tr>
<tr><td align="right" valign="top">31:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; generate another random number (<italic>r</italic><sub>3</sub>) between 1 and 100.</td></tr>
<tr><td align="right" valign="top">32:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>if</bold> <italic>r</italic><sub>3</sub> &#x0003C; &#x003BB;<sub><italic>A</italic></sub>&#x0002A;<italic>c</italic><sub><italic>iA</italic></sub>/<italic>c</italic><sub><italic>iB</italic></sub> <bold>then</bold></td></tr>
<tr><td align="right" valign="top">33:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>node</italic><sub><italic>i</italic></sub> gets infected by A</td></tr>
<tr><td align="right" valign="top">34:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <italic>c</italic><sub><italic>iA</italic></sub> &#x02190; <italic>c</italic><sub><italic>iA</italic></sub>&#x0002A;&#x003B1;<sub><italic>A</italic></sub></td></tr>
<tr><td align="right" valign="top">35:</td>
<td align="left" valign="top">&#x000A0;&#x000A0;&#x000A0;&#x000A0;&#x000A0; <bold>end if</bold></td></tr>
<tr><td align="right" valign="top">36:</td>
<td align="left" valign="top">&#x000A0;&#x000A0; <bold>end if</bold></td></tr>
<tr><td align="right" valign="top">37:</td>
<td align="left" valign="top">&#x000A0;<bold>end procedure</bold></td></tr>
</tbody>
</table>
</table-wrap>
</sec>
<sec id="s5">
<title>5. Choosing the Type and Number of Seeds</title>
<p>A general confusion among the firms is whether to choose small number of highly influential advertisers or large number of less or average influential advertisers. To solve this problem, we simulate a competition between a large group of less (or average) influential nodes and a small group of highly influential nodes both needing nearly same amount of budget.</p>
<p>For ranking the nodes while simulating the competition between group of small number of highly influential nodes and group of large number of less influential nodes we will use the most optimal centrality method found during the simulation discussed in section 4. We select the two sets such that both of them cost nearly same.</p>
<disp-formula id="E7"><label>(2)</label><mml:math id="M8"><mml:mtable class="eqnarray" columnalign="right center left"><mml:mtr><mml:mtd><mml:mi>C</mml:mi><mml:mi>o</mml:mi><mml:mi>s</mml:mi><mml:mi>t</mml:mi><mml:mo>&#x0221D;</mml:mo><mml:mi>C</mml:mi><mml:mi>e</mml:mi><mml:mi>n</mml:mi><mml:mi>t</mml:mi><mml:mi>r</mml:mi><mml:mi>a</mml:mi><mml:mi>l</mml:mi><mml:mi>i</mml:mi><mml:mi>t</mml:mi><mml:mi>y</mml:mi><mml:mtext>&#x000A0;</mml:mtext><mml:mi>s</mml:mi><mml:mi>c</mml:mi><mml:mi>o</mml:mi><mml:mi>r</mml:mi><mml:mi>e</mml:mi></mml:mtd></mml:mtr></mml:mtable></mml:math></disp-formula>
<p>To investigate the <italic>high-less</italic> (highly influential nodes in small numbers) vs. <italic>low-more</italic> (low influential nodes in large number) competition. We took a set of less influential nodes mostly from different clusters in the <italic>low-more</italic> set and most influential nodes in the <italic>high-less</italic> set such that the cost of both is same.</p>
</sec>
<sec id="s6">
<title>6. Results and Analysis</title>
<p>We use three empirical network data-sets to perform the experiments [the wikipedia vote network which is available on: SNAP Stanford<xref ref-type="fn" rid="fn0001"><sup>1</sup></xref>, the chess interaction network which is available on KONECT<xref ref-type="fn" rid="fn0002"><sup>2</sup></xref>], and the human contact network available on KONECT<xref ref-type="fn" rid="fn0003"><sup>3</sup></xref>. We have used the Wikipedia Vote Network as our primary data-set and others for verification. The results for networks other than chess interaction is added in the <xref ref-type="supplementary-material" rid="SM1">Supplementary Material</xref>. Details of the basic topological properties of all networks is given below in <xref ref-type="table" rid="T1">Table 1</xref>.</p>
<table-wrap position="float" id="T1">
<label>Table 1</label>
<caption><p>Properties of data-sets used.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Network</bold></th>
<th valign="top" align="center"><bold>Nodes</bold></th>
<th valign="top" align="center"><bold>Edges</bold></th>
<th valign="top" align="center"><bold>Av. Clustering Coe</bold>.</th>
<th valign="top" align="center"><bold>Diameter</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Wikipedia vote</td>
<td valign="top" align="center">7,115</td>
<td valign="top" align="center">103,689</td>
<td valign="top" align="center">0.1409</td>
<td valign="top" align="center">7</td>
</tr>
<tr>
<td valign="top" align="left">Chess interaction</td>
<td valign="top" align="center">7,301</td>
<td valign="top" align="center">65,053</td>
<td valign="top" align="center">0.126</td>
<td valign="top" align="center">13</td>
</tr>
<tr>
<td valign="top" align="left">Human interaction</td>
<td valign="top" align="center">410</td>
<td valign="top" align="center">2,765</td>
<td valign="top" align="center">0.436</td>
<td valign="top" align="center">9</td>
</tr>
</tbody>
</table>
</table-wrap>
<sec>
<title>6.1. Finding the Optimal Centrality Measure</title>
<p>The simulation proposed in section 4 is run on a fixed rate of spreading (&#x003BB;<sub><italic>A</italic></sub> &#x0003D; &#x003BB;<sub><italic>B</italic></sub> &#x0003D; 0.6) and fixed competitive constant (&#x003B1;<sub><italic>A</italic></sub> &#x0003D; &#x003B1;<sub><italic>B</italic></sub> &#x0003D; 1.1) for both firms for 100 timestamps and for each timestamp, average of 50 iterations are considered. Output of the simulation is the ratio of nodes infected by each firm after each timestamp. <xref ref-type="table" rid="T2">Table 2</xref> shows the results of matches among various centrality methods when simulated with various data sets. The individual curves for the matches (Fraction of nodes infected by each firm vs. time) is provided in <xref ref-type="supplementary-material" rid="SM1">Supplementary Material</xref>.</p>
<table-wrap position="float" id="T2">
<label>Table 2</label>
<caption><p>Results of various competitions on various network datasets.</p></caption>
<table frame="hsides" rules="groups">
<thead><tr>
<th valign="top" align="left"><bold>Player 1</bold></th>
<th valign="top" align="left"><bold>Player 2</bold></th>
<th valign="top" align="left"><bold>Winner-Wiki</bold></th>
<th valign="top" align="left"><bold>Winner-Chess</bold></th>
<th valign="top" align="left"><bold>Winner-Human</bold></th>
</tr>
</thead>
<tbody>
<tr>
<td valign="top" align="left">Pagerank</td>
<td valign="top" align="left">EigenVector</td>
<td valign="top" align="left"><bold>EigenVector</bold></td>
<td valign="top" align="left"><bold>Eigenvector</bold></td>
<td valign="top" align="left"><bold>Pagerank</bold></td>
</tr>
<tr>
<td valign="top" align="left">Closeness</td>
<td valign="top" align="left">EigenVector</td>
<td valign="top" align="left"><bold>Closeness</bold></td>
<td valign="top" align="left"><bold>Closeness</bold></td>
<td valign="top" align="left"><bold>Closeness</bold></td>
</tr>
<tr>
<td valign="top" align="left">Betweenness</td>
<td valign="top" align="left">EigenVector</td>
<td valign="top" align="left"><bold>EigenVector</bold></td>
<td valign="top" align="left"><bold>Eigenvector</bold></td>
<td valign="top" align="left"><bold>Betweenness</bold></td>
</tr>
<tr>
<td valign="top" align="left">Degree</td>
<td valign="top" align="left">EigenVector</td>
<td valign="top" align="left"><bold>EigenVector</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
</tr>
<tr>
<td valign="top" align="left">Pagerank</td>
<td valign="top" align="left">Betweenness</td>
<td valign="top" align="left"><bold>Betweenness</bold></td>
<td valign="top" align="left"><bold>Pagerank</bold></td>
<td valign="top" align="left"><bold>Pagerank</bold></td>
</tr>
<tr>
<td valign="top" align="left">Betweenness</td>
<td valign="top" align="left">Closeness</td>
<td valign="top" align="left"><bold>Closeness</bold></td>
<td valign="top" align="left"><bold>Closesness</bold></td>
<td valign="top" align="left"><bold>Tie</bold></td>
</tr>
<tr>
<td valign="top" align="left">Degree</td>
<td valign="top" align="left">Betweenness</td>
<td valign="top" align="left"><bold>Degree</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
</tr>
<tr>
<td valign="top" align="left">Degree</td>
<td valign="top" align="left">Closeness</td>
<td valign="top" align="left"><bold>Closeness</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
</tr>
<tr>
<td valign="top" align="left">Pagerank</td>
<td valign="top" align="left">Degree</td>
<td valign="top" align="left"><bold>Degree</bold></td>
<td valign="top" align="left"><bold>Degree</bold></td>
<td valign="top" align="left"><bold>Pagerank</bold></td>
</tr>
<tr>
<td valign="top" align="left">Pagerank</td>
<td valign="top" align="left">Closeness</td>
<td valign="top" align="left"><bold>Closeness</bold></td>
<td valign="top" align="left"><bold>Closeness</bold></td>
<td valign="top" align="left"><bold>Pagerank</bold></td>
</tr>
</tbody>
</table>
<table-wrap-foot>
<p><italic>Bold column values show the winners of respective matches</italic>.</p>
</table-wrap-foot>
</table-wrap>
<p>The simulation results (<xref ref-type="table" rid="T2">Table 2</xref>) shows that no centrality performs best in competitive setting of contagion and it is data dependent.</p>
</sec>
<sec>
<title>6.2. Choosing the Type and Number of Seeds</title>
<p>As proposed in section 5, we simulated the competition between two firms, one having higher number of less influential node and one having small number of highly influential node using all the three datasets. As we have seen that none of centrality is best for all datasets but it is data dependent so, we will use the centrality method which performed best for that particular dataset. So for Wikipedia Vote Network it will be Closeness, for Chess Interaction it will be Degree, and for Human Interaction network it will be Pagerank.</p>
<p>As the <xref ref-type="fig" rid="F2">Figure 2</xref> depicts for all three datasets, the number of infected (or influenced) nodes remains same for both the sets up to few timestamps, but after that <italic>High-less</italic> set takes over then, stabilization is achieved. Overall winner is <italic>High-less</italic> (less number of highly influential nodes) if we use the better performing centrality measure as per datasets to assign the costs of nodes. For further verification we used a synthetic dataset, but in the case of synthetic dataset all the centralities demand the nearly the same nodes at each rank to it is not possible to allocate the nodes to any centrality and simulate the competition of centralities.</p>
<fig id="F2" position="float">
<label>Figure 2</label>
<caption><p>Competition of High-Less vs. Low-More for various datasets. <bold>(A)</bold> Wikipedia Vote Network. <bold>(B)</bold> Chess interaction network. <bold>(C)</bold> Human interaction network.</p></caption>
<graphic xlink:href="fdata-02-00016-g0002.tif"/>
</fig>
</sec>
</sec>
<sec sec-type="conclusions" id="s7">
<title>7. Conclusion</title>
<p>In this paper, we investigate empirically two linked issue in a competitive contagion setting. First, we simulate a set of competitions between strategies based on ranking according to various centrality measures. The goal is to choose the best centrality method to rank the nodes for initial adoption with a motive to maximize the adoption of the product or ideology. Results show that no centrality is universally best but it depends on the network properties of the network dataset used. The second part deals with solving the general dilemma of whether to choose group of small number of highly influential nodes or a group of large number of less influential nodes. We conclude that it is better to select a small number of highly influential nodes than a higher number of less influential nodes. We can extend this work by taking variable rate of spreading, cooperativity and competitive constant of the diffusion model. Future works could also be done by considering more sophisticated alternative network properties for selecting the seed nodes.</p>
</sec>
<sec id="s8">
<title>Data Availability</title>
<p>The datasets analyzed for this study can be found <ext-link ext-link-type="uri" xlink:href="http://snap.stanford.edu/data/ego-Facebook.html">http://snap.stanford.edu/data/ego-Facebook.html</ext-link>.</p>
</sec>
<sec id="s9">
<title>Author Contributions</title>
<p>PK and PV discussed the idea with AS. PK, PV, AS, and HC designed the methodology for the experiments. PK did the simulation and data pre-processing. PV did the data representation and image editing. AS and HC guided and helped with bugs and theoretical understanding. All authors wrote the article.</p>
<sec>
<title>Conflict of Interest Statement</title>
<p>The authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
</sec>
</body>
<back>
<sec sec-type="supplementary-material" id="s10">
<title>Supplementary Material</title>
<p>The Supplementary Material for this article can be found online at: <ext-link ext-link-type="uri" xlink:href="https://www.frontiersin.org/articles/10.3389/fdata.2019.00016/full#supplementary-material">https://www.frontiersin.org/articles/10.3389/fdata.2019.00016/full#supplementary-material</ext-link></p>
<supplementary-material xlink:href="Data_Sheet_1.PDF" id="SM1" mimetype="application/pdf" xmlns:xlink="http://www.w3.org/1999/xlink"/>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Bharathi</surname> <given-names>S.</given-names></name> <name><surname>Kempe</surname> <given-names>D.</given-names></name> <name><surname>Salek</surname> <given-names>M.</given-names></name></person-group> (<year>2007</year>). <article-title>Competitive influence maximization in social networks</article-title>, in <source>International Workshop on Web and Internet Economics</source> (<publisher-loc>Berlin; Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>306</fpage>&#x02013;<lpage>311</lpage>.</citation></ref>
<ref id="B2">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Dassios</surname> <given-names>A.</given-names></name> <name><surname>Zhao</surname> <given-names>H.</given-names></name></person-group> (<year>2011</year>). <article-title>A dynamic contagion process</article-title>. <source>Adv. Appl. Probabil.</source> <volume>43</volume>, <fpage>814</fpage>&#x02013;<lpage>846</lpage>. <pub-id pub-id-type="doi">10.1239/aap/1316792671</pub-id></citation></ref>
<ref id="B3">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Frobenius</surname> <given-names>G.</given-names></name></person-group> (<year>1912</year>). <article-title>&#x000DC;ber Matrizen aus nicht negativen Elementen</article-title>, in <source>Preussische Akademie der Wissenschaften Berlin: Sitzungsberichte der Preu&#x000DF;ischen Akademie der Wissenschaften zu Berlin</source> (<publisher-loc>Reichsdr</publisher-loc>).</citation></ref>
<ref id="B4">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Goyal</surname> <given-names>S.</given-names></name> <name><surname>Heidari</surname> <given-names>H.</given-names></name> <name><surname>Kearns</surname> <given-names>M.</given-names></name></person-group> (<year>2014</year>). <article-title>Competitive contagion in networks</article-title>. <source>Games Econ. Behav</source>. <volume>113</volume>, <fpage>58</fpage>&#x02013;<lpage>79</lpage>. <pub-id pub-id-type="doi">10.1016/j.geb.2014.09.002</pub-id></citation></ref>
<ref id="B5">
<citation citation-type="web"><person-group person-group-type="author"><name><surname>Gupta</surname> <given-names>N.</given-names></name> <name><surname>Singh</surname> <given-names>A.</given-names></name> <name><surname>Cherifi</surname> <given-names>H.</given-names></name></person-group> (<year>2015</year>). <article-title>Community-based immunization strategies for epidemic control</article-title>, in <source>7th International Conference on Communication Systems and Networks</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://ieeexplore.ieee.org/abstract/document/7098709">https://ieeexplore.ieee.org/abstract/document/7098709</ext-link></citation></ref>
<ref id="B6">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Gupta</surname> <given-names>N.</given-names></name> <name><surname>Singh</surname> <given-names>A.</given-names></name> <name><surname>Cherifi</surname> <given-names>H.</given-names></name></person-group> (<year>2016</year>). <article-title>Centrality measures for networks with community structure</article-title>. <source>Phys. A Statist. Mech. Appl.</source> <volume>452</volume>, <fpage>46</fpage>&#x02013;<lpage>59</lpage>. <pub-id pub-id-type="doi">10.1016/j.physa.2016.01.066</pub-id></citation></ref>
<ref id="B7">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kempe</surname> <given-names>D.</given-names></name> <name><surname>Kleinberg</surname> <given-names>J.</given-names></name> <name><surname>Tardos</surname> <given-names>&#x000C9;.</given-names></name></person-group> (<year>2003</year>). <article-title>Maximizing the spread of influence through a social network</article-title>, in <source>Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining</source> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>ACM</publisher-name>), <fpage>137</fpage>&#x02013;<lpage>146</lpage>.</citation></ref>
<ref id="B8">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kempe</surname> <given-names>D.</given-names></name> <name><surname>Kleinberg</surname> <given-names>J.</given-names></name> <name><surname>Tardos</surname> <given-names>&#x000C9;.</given-names></name></person-group> (<year>2005</year>). <article-title>Influential nodes in a diffusion model for social networks</article-title>, in <source>International Colloquium on Automata, Languages, and Programming</source> (<publisher-loc>Berlin; Heidelberg</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>1127</fpage>&#x02013;<lpage>1138</lpage>.</citation></ref>
<ref id="B9">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Kumar</surname> <given-names>P.</given-names></name> <name><surname>Verma</surname> <given-names>P.</given-names></name> <name><surname>Singh</surname> <given-names>A.</given-names></name></person-group> (<year>2018</year>). <article-title>A study of epidemic spreading and rumor spreading over complex networks</article-title>, in <source>Towards Extensible and Adaptable Methods in Computing</source> (<publisher-loc>Singapore</publisher-loc>: <publisher-name>Springer</publisher-name>), <fpage>131</fpage>&#x02013;<lpage>143</lpage>.</citation></ref>
<ref id="B10">
<citation citation-type="book"><person-group person-group-type="author"><name><surname>Osborne</surname> <given-names>M. J. and Rubinstein, A.</given-names></name></person-group> (<year>1994</year>). <source>A Course in Game Theory</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>MIT Press</publisher-name>.</citation></ref>
<ref id="B11">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Page</surname> <given-names>L.</given-names></name> <name><surname>Brin</surname> <given-names>S.</given-names></name> <name><surname>Motwani</surname> <given-names>R.</given-names></name> <name><surname>Winograd</surname> <given-names>T.</given-names></name></person-group> (<year>1999</year>). <source>The Pagerank Citation Ranking: Bringing Order to the Web.</source> Technical report, Stanford InfoLab.</citation></ref>
<ref id="B12">
<citation citation-type="journal"><person-group person-group-type="author"><name><surname>Perron</surname> <given-names>O.</given-names></name></person-group> (<year>1907</year>). <article-title>Zur theorie der matrices</article-title>. <source>Math. Annalen</source> <volume>64</volume>, <fpage>248</fpage>&#x02013;<lpage>263</lpage>.</citation></ref>
</ref-list>
<fn-group>
<fn id="fn0001"><p><sup>1</sup>(accessed February 3, 2019). <italic>SNAP: Network datasets: Social circles</italic>.</p></fn>
<fn id="fn0002"><p><sup>2</sup>(accessed February 25, 2019). <italic>KONECT Networks</italic>.</p></fn>
<fn id="fn0003"><p><sup>3</sup>(accessed May 13, 2019). <italic>KONECT Networks</italic>.</p></fn>
</fn-group>
</back>
</article>