paper_id
stringlengths
9
16
version
stringclasses
26 values
yymm
stringclasses
311 values
created
timestamp[s]
title
stringlengths
6
335
secondary_subfield
sequencelengths
1
8
abstract
stringlengths
25
3.93k
primary_subfield
stringclasses
124 values
field
stringclasses
20 values
fulltext
stringlengths
0
2.84M
1606.02319
1
1606
2016-06-07T20:10:20
Community detection in networks: Modularity optimization and maximum likelihood are equivalent
[ "cs.SI", "physics.soc-ph" ]
We demonstrate an exact equivalence between two widely used methods of community detection in networks, the method of modularity maximization in its generalized form which incorporates a resolution parameter controlling the size of the communities discovered, and the method of maximum likelihood applied to the special case of the stochastic block model known as the planted partition model, in which all communities in a network are assumed to have statistically similar properties. Among other things, this equivalence provides a mathematically principled derivation of the modularity function, clarifies the conditions and assumptions of its use, and gives an explicit formula for the optimal value of the resolution parameter.
cs.SI
cs
Modularity optimization and maximum likelihood are equivalent Community detection in networks: Department of Physics and Center for the Study of Complex Systems, University of Michigan, Ann Arbor, MI 48109 M. E. J. Newman We demonstrate an exact equivalence between two widely used methods of community detection in networks, the method of modularity maximization in its generalized form which incorporates a resolution parameter controlling the size of the communities discovered, and the method of max- imum likelihood applied to the special case of the stochastic block model known as the planted partition model, in which all communities in a network are assumed to have statistically similar properties. Among other things, this equivalence provides a mathematically principled derivation of the modularity function, clarifies the conditions and assumptions of its use, and gives an explicit formula for the optimal value of the resolution parameter. I. INTRODUCTION maximization. Community detection, sometimes called network clus- tering, is the division of the nodes of an observed network into groups such that connections are dense within groups but sparser between them [1–3]. Not all networks support such divisions, but many do, and the existence of good divisions is often taken as a hint of underlying semantic structure or possible mechanisms of network formation, making community detection a useful tool for interpret- ing network data. The development of methods or algorithms to perform community detection on empirical networks has been a popular pursuit among researchers in physics, mathe- matics, statistics, and computer science-a tremendous number of such algorithms have been published in the last decade or so [1–4]. In this paper we study two of the most popular and widely used methods for commu- nity detection in simple undirected networks, the method of modularity maximization and the method of maxi- mum likelihood as applied to the stochastic block model. Building on previous work by ourselves and others [5– 7], we show that, different though they at first appear, these two methods are in fact exactly equivalent, for ap- propriate choices of models and parameters, which we specify. This sheds light in particular on the modular- ity maximization method, which is generally motivated with heuristic arguments [8–10] (although there are some rigorous results [11, 12]). Our results provide a rigor- ous derivation for the modularity and demonstrate that modularity maximization is optimal under appropriate conditions, but also highlight the method's limitations. In particular, we show that modularity maximization ef- fectively assumes that communities in a network are sta- tistically similar, and it is not guaranteed to give good results for networks where this is not true. II. COMMUNITY DETECTION We begin by describing the two methods of commu- nity detection that we study, in their most widely ac- cepted forms, beginning with the method of modularity A. Modularity maximization Modularity maximization is perhaps the most widely used method for community detection for networks. It operates by defining a benefit function, called the modu- larity, that measures the quality of divisions of a network into communities. One optimizes this benefit function over possible divisions of the network of interest to find the one that gives the highest score, taking this to be the definitive division of the network. Since the number of possible divisions of a network is exponentially large, we normally cannot perform the optimization exhaustively, so we turn instead to approximate optimization meth- ods, of which many have been tried, including greedy algorithms [9, 13], extremal optimization [14], spectral relaxation [15], genetic algorithms [16], simulated an- nealing [17, 18], and belief propagation [7]. The popular Louvain algorithm for community detection [19], which is built into a number of network analysis software pack- ages, uses a multiscale modularity optimization scheme and is one of the fastest community detection methods in practice. The definition of the modularity function is straight- forward [8]. We desire a benefit function which, given a network and a candidate division of that network into groups, returns a score that is larger if the division is a "good" one and smaller if it is "bad." The heuristic no- tion used to define the modularity is that a good division is one that places most of the edges of a network within groups and only a few of them between groups. Let us represent our network by its adjacency matrix. For an undirected network of n nodes the adjacency ma- trix A is the real symmetric n × n matrix with elements Aij = 1 if there is an edge between nodes i and j and 0 otherwise. Further, let us consider a division of the network into q nonoverlapping groups, numbered (in any order) from 1 to q, and let us denote by gi the num- ber of the group to which node i is assigned. Thus the complete vector g of group assignments specifies the di- vision of the network. Then the number of edges that fall within groups, for this particular division, is equal to 1 2 Pij Aij δgigj , where δij is the Kronecker delta and the leading factor of a half prevents double counting of edges. The number of in-group edges alone, however, is not a good measure of the quality of a division, since it can be trivially maximized by putting all the nodes in one of the q groups and none in any of the others. This would put 100% of edges inside groups but clearly doesn't consti- tute a useful division of the network. Instead, therefore, modularity measures not just the number of edges within groups but the difference between that number and the expected number of such edges, were edges placed at ran- dom within the network. Suppose we take our observed network and random- ize the positions of its edges. We keep the total num- ber of edges the same but we reposition them between the nodes at random, in a manner to be determined shortly. And suppose that, following this randomization, the probability that nodes i and j are connected by an edge is Pij . Then the expected number of edges within groups, post-randomization, is 1 ularity is then proportional to the actual minus expected number of edges thus: 2 Pij Pij δgigj . The mod- Q = = 1 2 Xij m(cid:18) 1 2 Xij Aijδgigj − 1 2m Xij (cid:0)Aij − Pij(cid:1)δgigj 1 Pijδgigj(cid:19) (1) where m is the total number of edges in the network and is included here by convention only-it makes Q equal to a fraction of edges rather than an absolute number, which makes modularity values more easily comparable between networks of different sizes. For the purposes of maximizing the modularity, which is our main concern here, the factor of m makes no difference at all. The posi- tion of the maximum does not depend on overall constant factors. Note that if we now put all nodes in the same group, then δgigj = 1 for all i, j and Q = 1 2m Xij (cid:0)Aij − Pij(cid:1) = 0, (2) since, as we have said, the number of edges in the net- work is held constant during randomization, and hence Pij Pij = Pij Aij = 2m. Thus we no longer get a high modularity score for putting all nodes in a single group together. The maximum of modularity occurs for some other (nontrivial) division of the nodes, which we take to be the best division of the network. This is the method of modularity maximization. It remains to determine what Pij is. The value de- pends on the particular scheme we use to randomize the positions of the edges. The simplest scheme would be just to reposition the edges uniformly at random, every position having the same probability as every other. For a network of n nodes there are (cid:0)n 2(cid:1) places to put an edge, and hence the probability of filling any of them with one of the m edges is 2 (3) Pij = m . (cid:0)n 2(cid:1) probability, but normally m ≪ (cid:0)n (Technically this is the expected number of edges not the 2(cid:1) so that probability and expected number are essentially the same.) In practice, however, this choice does not work very well because it fails to respect the degrees of the nodes in the network. The probabilities of connections between nodes depend strongly on the total number of connec- tions nodes have-their degrees-with nodes of high de- gree being much more likely to be connected than nodes of low degree. For reasons that will become clear in this paper, it is important to include this effect in the defini- tion of modularity if things are to work correctly. Instead, therefore, we consider a constrained random- ization of the edges in the network in which we preserve the degree of every node, but otherwise position the edges at random. This kind of randomization is well known in the study of networks: it gives rise to the random graph ensemble known as the configuration model [20, 21]. Af- ter randomization, the probability of connection between two nodes is equal to Pij = kikj 2m , (4) where ki = Pj Aij is the degree of node i and m is once again the number of edges in the network. (Again, this is technically the expected number of edges, but the prob- ability and expected number are essentially the same.) This is the choice that is most commonly used in the definition of the modularity. With this choice the modu- larity is given by Q = 1 2m Xij (cid:18)Aij − kikj 2m (cid:19)δgigj , (5) which is the form in which it is most commonly written. There is a further twist, however, because even this def- inition does not always work well. As shown by Fortunato and Barth´el´emy [22], community detection by modularity maximization using the definition of (5), while it works in many situations, has one specific shortcoming: it is un- able to find community structure in large networks with many small communities. In particular, if the number of communities in a network is greater than about √2m, then the maximum modularity will not correspond to the correct division. The maximum will instead tend to com- bine communities into larger groups and fail to resolve the smallest divisions in the network. To address this problem, Reichardt and Bornholdt [10] proposed a generalized modularity function Q(γ) = 1 2m Xij (cid:18)Aij − γ kikj 2m (cid:19)δgigj . (6) When the parameter γ = 1, this is the same as the traditional modularity of Eq. (5), but other choices al- low us to vary the relative weight given to the observed and randomized edge terms. If one places more weight on the observed edge term (by making γ smaller), the maximum modularity division favors, and the method therefore tends to find, larger communities. If one places more weight on the randomized edge term (larger γ), the method finds smaller communities. There has not previ- ously been any fundamental theory dictating what value of γ one should use, but this is one of the questions on which we will shed light in this paper. B. Statistical inference The other method of community detection we con- sider is the method of statistical inference, as applied to the stochastic block model and its variants. With this method, one fits a generative model of a network to ob- served network data, and the parameters of the fit tell us about the structure of the network in much the same way that fitting a straight line through a set of data points tells us about their slope. The model most commonly used in this context is the so-called stochastic block model, which is a random graph model of a network with community structure [12, 23, 24]. One takes some number n of nodes, initially without any edges, and divides them into q groups in some way, with gi being the group to which node i is assigned, as pre- viously. Then one places edges between nodes indepen- dently at random, with the probability, which we de- note ωrs, of an edge between a particular pair of nodes depending on the groups r and s to which the nodes be- long. Thus there is a symmetric q × q matrix of parame- ters ωrs which determine the probabilities of edges within and between every pair of groups. If the diagonal ele- ments ωrr of this matrix are larger than the off-diagonal elements, then networks generated by the model have a higher probability of edges within groups than between them and hence have traditional community structure. In fact, the stochastic block model is often studied in a slightly different formulation in which one places not just a single edge between any pair of nodes but a Pois- son distributed number of edges with mean ωrs. Thus ωrs is the expected number, rather than the probability, of edges between nodes in groups r and s, and the networks generated by the model can in principle have multiedges, meaning there can be more than one edge between the same pair of nodes. Moreover, one typically also allows the network to contain self-edges, edges that connect a node to itself, which are also Poisson distributed in num- ber, with mean 1 2 ωrr for a node in group r. (The factor of half is included solely because it makes the algebra sim- pler.) The inclusion of multiedges and self-edges in the model is unrealistic in the sense that most network data encountered in the real world contain neither. However, most real-world networks are also very sparse, meaning 3 that only a tiny fraction of all possible edges that could exist actually do, and hence the values of the edge prob- abilities ωrs are very small. In this situation, the density of multiedges and self-edges in the network will itself be small and the Poisson version of the model is virtually in- distinguishable from the first (Bernoulli) version defined above. At the same time, the Poisson version is techni- cally easier to handle than the Bernoulli version. In this paper we use the Poisson version. Similar results can be derived for the Bernoulli version, but the formulas are more complicated and the end result is little different. The definition of the model above is in terms of its use to generate networks. As applied to community detec- tion, however, the model is used in the "reverse" direc- tion to infer structure by fitting it to data. In this con- text, one hypothesizes that an observed network, with adjacency matrix A, was generated from the stochastic block model, and attempts to work out what values of the model parameters must have been used in the generation. The parameters in this case are the edge probabilities ωrs and the group memberships gi. Given particular values of the parameters we can write down the probability, or likelihood, that the observed network was generated from the block model thus: P (AΩ, g) = Yi 2 ωgigi)Aii/2 ( 1 ( 1 2 Aii)! e−ωgi gi /2Yi<j ωAij gigj Aij ! e−ωgi gj , (7) where Ω denotes the complete matrix of values ωrs and we have adopted the standard convention that a self- edge is represented by a diagonal adjacency matrix ele- ment Aii = 2 (and not 1 as one might at first imagine). The position of the maximum of this quantity with respect to Ω and g tells us the values of the parameters most likely to have generated the observed network. Typ- ically we are interested only in the group assignments g, which tell us how the network divides into groups. The probabilities Ω are usually uninteresting and can be dis- carded once the likelihood has been maximized. Alternatively (and usually more conveniently), we can maximize the logarithm of the likelihood: logP (AΩ, g) = Xi (cid:2) 1 2 ωgigj(cid:1) − 1 2 ωgigj − log(cid:0) 1 2 Aii log(cid:0) 1 +Xi<j(cid:0)Aij log ωgigj − ωgigj − log Aij !(cid:1). 2 Aij !(cid:1)(cid:3) (8) 2 , log( 1 2 Aii log 1 The terms 1 2 Aij!), and log Aij ! are all in- dependent of the parameters and do not affect the posi- tion of the maximum, so they can be ignored, and the log-likelihood then simplifies to log P (AΩ, g) = 1 2 Xij (cid:0)Aij log ωgigj − ωgigj(cid:1). (9) The optimal division of the network into communities is then given by maximizing this quantity with respect to both g and Ω. C. Degree-corrected block model As with the modularity, however, this is not the whole story. This approach fares poorly when applied to most real-world networks because it doesn't respect the node degrees in the network. The stochastic block model as described here (in either Bernoulli or Poisson versions) generates networks that have a Poisson degree distribu- tion, which is very different from the broad distributions seen in empirical networks. This means that, typically, the model does not fit observed networks well for any choice of parameter values. It's as if one were trying to fit a straight line through an inherently curved set of data points. Even the best fit of such a line will not be a good fit. There are no good fits when the model you are fitting is simply wrong. The conventional solution to this problem, in the present situation, is to use a slightly different model, the degree-corrected block model [25], which can fit networks with any degree distribution. In this model the nodes are again assigned to groups gi and edges placed indepen- dently at random between them, but now the expected number of edges between nodes i and j is (kikj/2m)ωrs (where as before r, s are the groups to which the nodes belong and ki, kj are the degrees) or a half that number for self-edges. The factor of 2m in the denominator is op- tional, but convenient since, as we have said, kikj/2m is the probability of an edge in the configuration model and hence, with this definition, ωrs quantifies the probability of edges relative to the configuration model. Following the same line of reasoning as before, and again neglecting constants that have no effect on the po- sition of the likelihood maximum, the log-likelihood for this model is log P (AΩ, g) = 1 2 Xij (cid:18)Aij log ωgigj − kikj 2m ωgigj(cid:19). (10) Community detection now involves the maximization of this quantity with respect to the parameters Ω, g to find the best fit of the model to the observed network. This maximization can be achieved in a number of ways. As with the modularity, there are too many possible group assignments g to maximize exhaustively on any but the smallest of networks, but researchers have suc- cessfully applied a variety of approximate methods, in- cluding label switching algorithms [12], Kernighan–Lin style greedy algorithms [25, 26], spectral methods [6], Monte Carlo [24, 27], and belief propagation [28, 29]. III. THE PLANTED PARTITION MODEL AND MODULARITY MAXIMIZATION 4 the context of work on spectral algorithms [5, 6] and it has also been discussed by Zhang and Moore [7] in the context of work on finite-temperature ensembles of graph partitions. Building on these works, our purpose in this paper is to make explicit the exact equivalence of the two approaches and investigate some of its consequences. The planted partition model [30, 31] is a special case of the stochastic block model in which the parameters ωrs describing the community structure take only two differ- ent values: ωrs = (cid:26) ωin ωout if r = s, if r 6= s. (11) This is a less flexible model than the full stochastic block model. It effectively assumes that all communities in the network are similar in the sense of having the same in- group and between-group connection rates. Nonetheless, for networks that do have this property, fits to the model should recover the community structure accurately, and indeed it has been proved that such fits are optimal in that case [28, 32, 33]. In practice, if one wanted to apply the planted parti- tion model, one should in almost all cases use a degree- corrected version of the kind described in Section II C. Let us explore the form of the log-likelihood, Eq. (10), for such a model. Following [5, 6] we note that Eq. (11) implies that ωrs = (ωin − ωout)δrs + ωout, log ωrs = (log ωin − log ωout)δrs + log ωout, (12) (13) where δrs is the Kronecker delta, as previously. Sub- stituting these forms into Eq. (10), we find the log- likelihood for the degree-corrected planted partition model to be log P (AΩ, g) = 1 Aij(cid:20)δgigj log ωin ωout + log ωout(cid:21) 2 Xij 2 Xij − 1 (cid:18)Aij − kikj 2m (cid:2)(ωin − ωout)δgigj + ωout(cid:3) 2m (cid:19)δgigj (ωin − ωout) kikj (log ωin − log ωout) = 1 2 log ωin ωout Xij + m(cid:0)ωout + log ωout(cid:1) (cid:18)Aij − γ 2m (cid:19)δgigj + C, kikj = B 1 2m Xij (14) where B and C are constants that depend on ωin and ωout but not on g, and γ = ωin − ωout log ωin − log ωout . (15) We now come to the central result of this paper, the equivalence of modularity maximization to a particular case of the maximum likelihood method described above. We previously discussed a version of this equivalence in We have also made use of Pij Aij = Pi ki = 2m in the second equality of (14). To perform community detection, one would now max- imize this expression with respect to both the group as- signments gi and the parameters ωin and ωout. But sup- pose for a moment that we already know the correct val- ues of ωin and ωout, leaving us only to maximize with re- spect to the group assignments. Comparing Eq. (14) with Eq. (6), we see that, apart from overall constants, (14) is precisely the generalized modularity Q(γ), and hence the likelihood and the modularity have their maxima with respect to the gi in the same place. Thus community de- tection by maximization of the likelihood for the planted partition model with known values of ωin and ωout is equivalent to maximizing the generalized modularity for the appropriate value of γ, given by Eq. (15). (We leave it as a exercise for the reader to show that a similar equivalence applies-with the same value of γ-between maximizing the likelihood for the non-degree-corrected stochastic block model and the modularity when one makes the choice (3) for Pij .) Among other things, this result tells us what the cor- rect value of the resolution parameter γ is for the gen- eralized modularity, an issue that has hitherto been un- decided. The correct value is given by Eq. (15). An immediate corollary is that in most cases the conven- tional choice γ = 1, corresponding to the original, non- generalized modularity function of Eq. (5), is not correct. Unfortunately, however, we cannot normally employ Eq. (15) directly to calculate γ, since we do not know the values of the parameters ωin and ωout. We present one possible solution to this problem in Section III A, but for the moment let us proceed under the assumption that we know the correct value of γ. The equivalence between modularity maximization and maximum-likelihood methods has a number of imme- diate implications. First of all, it provides a derivation of the modularity that is more rigorous and principled than the usual heuristic arguments: modularity maximization (with the correct choice of γ) is equivalent to fitting a network to a degree-corrected version of the planted par- tition model using the method of maximum likelihood. It also explains why the standard degree-dependent choice, Eq. (4), for the definition of the modularity is better than the uniform choice of Eq. (3). It is for the same rea- son that the degree-corrected block model is the correct choice for the analysis of most real-world networks: the uniform choice effectively assumes a network with a Pois- son degree distribution, which is a poor approximation to most empirical networks. The degree-dependent choice, by contrast, fits networks of any degree distribution. The equivalence of modularity and maximum- likelihood methods also implies that modularity maxi- mization is a consistent method of community detection, i.e., that under suitable conditions it will correctly and without bias find community structure where present. This follows because maximum-likelihood fits to stochas- tic block models are also known to be consistent: when the maximum-likelihood method is applied to networks that were themselves generated from the same block model (either the traditional or degree-corrected model), it will return correct assignments of nodes to groups in 5 the limit of large node degrees [12]. The consistency of modularity maximization has been demonstrated previ- ously by other means [7, 34], but the equivalence with likelihood maximization makes the physical intuition be- hind it particularly clear. A further point of interest is that while the value of γ in Eq. (15) is always positive, regardless of the values of ωin and ωout, the value of the constant B = m log(ωin/ωout) in Eq. (14) changes sign depending on which of ωin and ωout is larger. This means that maximization of the like- lihood becomes equivalent to minimization of the mod- ularity when ωout > ωin, i.e., when the network has so- called disassortative structure, in which connections are more common between groups than within them. The minimization of modularity to find such structure has been proposed previously on heuristic grounds [35], but the derivation here gives a rigorous foundation for the procedure. On the other hand, the equivalence of maximum like- lihood and maximum modularity methods also reveals some hidden assumptions and limitations of the modu- larity. The planted partition model, with its assumption, Eq. (11), that the edge parameters ωrs take the same values for every community, is less powerful than the full stochastic block model and modularity maximization is similarly less powerful as a result. In effect, modularity maximization assumes all communities in a network to be statistically similar. This may be a good assumption in some networks, but there are certainly examples where it is not, and we would expect the modularity maximiza- tion method to perform less well in such cases than more general methods. Some variants of the maximum-likelihood method also include additional parameters that allow for heteroge- neous group sizes, but the version used here, to which modularity maximization is equivalent, includes no such embellishments, meaning that modularity maximization implicitly favors groups of uniform size, which could also hurt performance. A. Value of the resolution parameter A drawback of the equivalence we have demonstrated is that it applies only when we use the correct value of the resolution parameter γ, which normally we do not know. One can, however, make an empirical estimate of the value of γ using an iterative scheme as follows. First, one makes an initial guess about the value of γ. This guess need not be particularly accurate: γ = 1 usu- ally works fine. Then one finds the communities in the network by modularity maximization using this choice. This gives us some set of assignments gi of nodes to groups-likely not optimal-from which we can then make an estimate of the parameters ωin and ωout by not- ing that the expected total number of in-group edges min γ r e t e m a r a p n o i t u l o s e R 3 2 1 0 Estimated value True value 4 6 8 10 12 14 Number of communities q FIG. 1: Resolution parameter γ, estimated using the method described here, for a set of synthetic networks with varying numbers of communities. The networks were generated using the standard (non-degree-corrected) planted partition model with q equally sized groups of 250 nodes each and parame- ters ωin and ωout chosen so that each node has an average of 16 connections within its own group and 8 to every other group. Modularity was maximized using simulated annealing. The circles represent the estimated values of γ and the solid line represents the true values calculated from Eq. (15). in the (degree-corrected) planted partition model is min = 1 2 Xr Xij kikj 2m ωrrδgi,rδgj ,r = ωin 4m Xr κ2 r, (16) where κr = Pi kiδgi,r is the sum of the degrees of the nodes in group r. Hence we can estimate ωin from ωin = , (17) 2min r/2m Pr κ2 using the observed value of min as an estimate of the expected value. Similarly for ωout we have ωout = 2mout Pr6=s κrκs/2m = 2m − 2min 2m −Pr κ2 r/2m , (18) where mout is the number of edges running between dis- tinct groups. Using these estimates of ωin and ωout we can now cal- culate a new value of γ from Eq. (15). Then we repeat the process, maximizing the modularity and recalculat- ing ωin, ωout, and γ until we achieve convergence. The consistency of modularity maximization, mentioned ear- lier, implies that this procedure should converge to the correct value of γ (and the correct community structure) for sufficiently dense networks that actually are generated from the planted partition model. For all other networks (meaning, in practice, for all real-world applications of the method) we have no formal guarantees of correctness or convergence, though the same is also true of all other Network Karate club Dolphin social network Political blogs Books about politics Characters from Les Miserables American college football Jazz collaborations Email messages 6 n m q γ 34 62 2 0.78 78 2 0.59 159 2 0.67 1225 16780 2 0.59 441 254 6 1.36 614 11 2.27 2742 16 1.19 5451 26 3.63 105 77 115 198 1133 TABLE I: Number of nodes n, number of edges m, number of communities q, and estimated value of the resolution parame- ter γ for a range of networks studied in the previous literature. The networks are the karate club network of Zachary [36], the dolphin social network of Lusseau et al. [37], the network of political weblogs studied by Adamic and Glance [38], the network of books about politics studied by Krebs (unpub- lished, but see for instance [15]), the network of interactions between fictional characters in the novel Les Miserables by Victor Hugo [8], the network of regular season games between Division I-A college football teams in the year 2000 [8], the network of collaborations between jazz musicians studied by Gleiser and Danon [39], and the network of email messages between university students of Ebel et al. [40]. The value of q used for each network is the generally accepted one, except for the last two networks, for which there does not appear to be a consensus. For these two networks we estimate the number of communities using the inference method of [41]. methods of community detection, including, but not lim- ited to, community detection by statistical inference. One might imagine that this would not be a very effi- cient method for calculating γ: it requires repeated max- imization of different modularity functions until the cor- rect value of γ is reached. In practice, however, we have found that it converges very quickly. In most cases we have examined, γ is calculated to within a few percent after just one iteration, and in no case have we found a need for more than ten iterations, so the method may in fact be quite serviceable. Figure 1 shows an example application to a set of artificially generated ("synthetic") networks for which the true value of γ is known and, as the figure shows, the algorithm is able to determine that value accurately in every case. Table I gives val- ues of γ calculated using the algorithm for a number of real-world networks that have been used as test cases in previous community detection studies. The values of γ vary in size, but there is an overall trend towards larger values in networks with larger num- bers of communities, both among the synthetic networks and the real ones. This is perhaps not unexpected given that the resolution parameter γ was originally introduced precisely in order to deal with networks with larger num- bers of communities. Recall that larger values of γ, and specifically values larger than the traditional value of 1, are needed in networks where the number of communi- ties exceeds the resolution limit at √2m. None of the networks studied here approach this limit, but nonethe- less we should not find it surprising that the larger values of q in both Fig. 1 and Table I are best treated using val- ues γ > 1. Whether the algorithm given here is in fact a useful one in practice is a debatable point. As we have shown, it does no more than the likelihood maximization method, and the latter in principle gives better results, since it does not assume that all groups are statistically simi- lar. Modularity maximization does have the advantage of being less nonlinear than maximum-likelihood meth- ods, which allows for some faster algorithms such as spec- tral [6, 15] and multiscale [19] algorithms. Still, the re- sults derived here are primarily of interest not because of the algorithms they suggest, but because of the light they shed on the strengths and weaknesses of modularity maximization. 7 nity detection, as applied to the degree-corrected planted partition model. The equivalence between the two ap- proaches highlights some weaknesses of the modularity maximization method: the method assumes all commu- nities to have statistically similar properties, which may not be the case, and it also contains an undetermined parameter γ. Most often this parameter is assumed to take the value 1, but we have shown that this assump- tion is normally not correct and given an explicit formula for the correct value, along with a simple algorithm for computing it on observed networks. Acknowledgments IV. CONCLUSIONS We have shown that modularity maximization is a spe- cial case of the maximum likelihood method of commu- The author thanks Aaron Clauset, Travis Martin, Cris Moore, and Cosma Shalizi for useful comments. This research was supported in part by the US National Sci- ence Foundation under grants DMS–1107796 and DMS– 1407207. [1] M. A. Porter, J.-P. Onnela, and P. J. Mucha, Communi- ties in networks. Notices of the American Mathematical Society 56, 1082–1097 (2009). [2] S. Fortunato, Community detection in graphs. Phys. Rep. 486, 75–174 (2010). [3] M. E. J. Newman, Communities, modules and large-scale structure in networks. Nature Physics 8, 25–31 (2012). [4] M. Coscia, F. Giannotti, and D. Pedreschi, A classifica- tion for community discovery methods in complex net- works. Statistical Analysis and Data Mining 4, 512–546 (2011). [5] M. E. J. Newman, Community detection and graph par- titioning. Europhys. Lett. 103, 28003 (2013). [6] M. E. J. Newman, Spectral methods for network commu- nity detection and graph partitioning. Phys. Rev. E 88, 042822 (2013). [7] P. Zhang and C. Moore, Scalable detection of statistically significant communities and hierarchies, using message passing for modularity. Proc. Natl. Acad. Sci. USA 111, 18144–18149 (2014). [8] M. E. J. Newman and M. Girvan, Finding and evaluat- ing community structure in networks. Phys. Rev. E 69, 026113 (2004). [9] M. E. J. Newman, Fast algorithm for detecting com- munity structure in networks. Phys. Rev. E 69, 066133 (2004). [10] J. Reichardt and S. Bornholdt, Statistical mechanics of community detection. Phys. Rev. E 74, 016110 (2006). [11] U. Brandes, D. Delling, M. Gaertler, R. Gorke, M. Hoe- fer, Z. Nikoloski, and D. Wagner, On finding graph clus- terings with maximum modularity. In Proceedings of the 33rd International Workshop on Graph-Theoretic Con- cepts in Computer Science, number 4769 in Lecture Notes in Computer Science, Springer, Berlin (2007). [12] P. J. Bickel and A. Chen, A nonparametric view of network models and Newman–Girvan and other modu- larities. Proc. Natl. Acad. Sci. USA 106, 21068–21073 (2009). [13] A. Clauset, M. E. J. Newman, and C. Moore, Finding community structure in very large networks. Phys. Rev. E 70, 066111 (2004). [14] J. Duch and A. Arenas, Community detection in complex networks using extremal optimization. Phys. Rev. E 72, 027104 (2005). [15] M. E. J. Newman, Modularity and community structure in networks. Proc. Natl. Acad. Sci. USA 103, 8577–8582 (2006). [16] L. Shuzhuo, C. Yinghui, D. Haifeng, and M. W. Feld- man, A genetic algorithm with local search strategy for improved detection of community structure. Complexity 15(4), 53–60 (2010). [17] R. Guimer`a, M. Sales-Pardo, and L. A. N. Amaral, Mod- ularity from fluctuations in random graphs and complex networks. Phys. Rev. E 70, 025101 (2004). [18] A. Medus, G. Acuna, and C. O. Dorso, Detection of com- munity structures in networks via global optimization. Physica A 358, 593–604 (2005). [19] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, Fast unfolding of communities in large net- works. J. Stat. Mech. 2008, P10008 (2008). [20] M. Molloy and B. Reed, A critical point for random graphs with a given degree sequence. Random Structures and Algorithms 6, 161–179 (1995). [21] M. E. J. Newman, S. H. Strogatz, and D. J. Watts, Ran- dom graphs with arbitrary degree distributions and their applications. Phys. Rev. E 64, 026118 (2001). [22] S. Fortunato and M. Barth´elemy, Resolution limit in community detection. Proc. Natl. Acad. Sci. USA 104, 8 36–41 (2007). [23] P. W. Holland, K. B. Laskey, and S. Leinhardt, Stochas- tic blockmodels: Some first steps. Social Networks 5, 109–137 (1983). [24] K. Nowicki and T. A. B. Snijders, Estimation and predic- tion for stochastic blockstructures. J. Amer. Stat. Assoc. 96, 1077–1087 (2001). [25] B. Karrer and M. E. J. Newman, Stochastic blockmodels and community structure in networks. Phys. Rev. E 83, 016107 (2011). [26] B. W. Kernighan and S. Lin, An efficient heuristic proce- dure for partitioning graphs. Bell System Technical Jour- nal 49, 291–307 (1970). [27] T. P. Peixoto, Efficient monte carlo and greedy heuristic for the inference of stochastic block models. Phys. Rev. E 89, 012804 (2014). [28] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, In- ference and phase transitions in the detection of modules in sparse networks. Phys. Rev. Lett. 107, 065701 (2011). [29] X. Yan, C. R. Shalizi, J. E. Jensen, F. Krzakala, C. Moore, L. Zdeborova, P. Zhang, and Y. Zhu, Model se- lection for degree-corrected block models. J. Stat. Mech. 2014, P05007 (2014). [30] A. Condon and R. M. Karp, Algorithms for graph par- titioning on the planted partition model. Random Struc- tures and Algorithms 18, 116–140 (2001). [31] F. McSherry, Spectral partitioning of random graphs. In Proceedings of the 42nd IEEE Symposium on the Foun- dations of Computer Science, pp. 529–537, Institute of Electrical and Electronics Engineers, New York (2001). [32] L. Massouli´e, Community detection thresholds and the weak ramanujan property. In Proceedings of the 46th An- nual ACM Symposium on the Theory of Computing, pp. 529–694–703, Associate of Computing Machinery, New York (2014). [33] E. Mossel, J. Neeman, and A. Sly, Reconstruction and es- timation in the planted partition model. Probability The- ory and Related Fields 162, 431–461 (2015). [34] Y. Zhao, E. Levina, and J. Zhu, Consistency of com- munity detection in networks under degree-corrected stochastic block models. Annals of Statistics 40, 2266– 2292 (2011). [35] M. E. J. Newman, Finding community structure in net- works using the eigenvectors of matrices. Phys. Rev. E 74, 036104 (2006). [36] W. W. Zachary, An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33, 452–473 (1977). [37] D. Lusseau, K. Schneider, O. J. Boisseau, P. Haase, E. Slooten, and S. M. Dawson, The bottlenose dolphin community of Doubtful Sound features a large propor- tion of long-lasting associations. Can geographic isola- tion explain this unique trait? Behavioral Ecology and Sociobiology 54, 396–405 (2003). [38] L. A. Adamic and N. Glance, The political blogosphere and the 2004 US election. In Proceedings of the WWW- 2005 Workshop on the Weblogging Ecosystem (2005). [39] P. Gleiser and L. Danon, Community structure in jazz. Advances in Complex Systems 6, 565–573 (2003). [40] H. Ebel, L.-I. Mielsch, and S. Bornholdt, Scale-free topol- ogy of e-mail networks. Phys. Rev. E 66, 035103 (2002). [41] M. E. J. Newman and G. Reinert, Estimating the number of communities in a network. Preprint arXiv:1605.02753 (2016).
1104.0319
1
1104
2011-04-02T14:49:36
Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure
[ "cs.SI", "physics.soc-ph" ]
Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edges represent the "presence" or "absence" of a relationship. Since traditional network measures (e.g., betweenness centrality) utilize a discrete link structure, complex systems must be transformed to this representation in order to investigate network properties. However, in many domains there may be uncertainty about the relationship structure and any uncertainty information would be lost in translation to a discrete representation. Uncertainty may arise in domains where there is moderating link information that cannot be easily observed, i.e., links become inactive over time but may not be dropped or observed links may not always corresponds to a valid relationship. In order to represent and reason with these types of uncertainty, we move beyond the discrete graph framework and develop social network measures based on a probabilistic graph representation. More specifically, we develop measures of path length, betweenness centrality, and clustering coefficient---one set based on sampling and one based on probabilistic paths. We evaluate our methods on three real-world networks from Enron, Facebook, and DBLP, showing that our proposed methods more accurately capture salient effects without being susceptible to local noise, and that the resulting analysis produces a better understanding of the graph structure and the uncertainty resulting from its change over time.
cs.SI
cs
Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure Joseph J. Pfeiffer, III Department of Computer Science Purdue University West Lafayette, IN 47907 [email protected] Jennifer Neville Departments of Computer Science and Statistics Purdue University West Lafayette, IN 47909 [email protected] 1 1 0 2 r p A 2 ] I S . s c [ 1 v 9 1 3 0 . 4 0 1 1 : v i X r a Abstract Much of the past work in network analysis has focused on analyzing discrete graphs, where binary edges represent the "presence" or "absence" of a relationship. Since traditional network measures (e.g., betweenness centrality) utilize a dis- crete link structure, complex systems must be transformed to this representation in order to investigate network prop- erties. However, in many domains there may be uncertainty about the relationship structure and any uncertainty informa- tion would be lost in translation to a discrete representation. Uncertainty may arise in domains where there is moderating link information that cannot be easily observed, i.e., links be- come inactive over time but may not be dropped or observed links may not always corresponds to a valid relationship. In order to represent and reason with these types of uncertainty, we move beyond the discrete graph framework and develop social network measures based on a probabilistic graph rep- resentation. More specifically, we develop measures of path length, betweenness centrality, and clustering coefficient -- one set based on sampling and one based on probabilistic paths. We evaluate our methods on three real-world networks from Enron, Facebook, and DBLP, showing that our proposed methods more accurately capture salient effects without being susceptible to local noise, and that the resulting analysis pro- duces a better understanding of the graph structure and the uncertainty resulting from its change over time. Introduction Much of the past work in network analysis has focused on analyzing discrete graphs, where entities are repre- sented as nodes and binary edges represent the "pres- ence" or "absence" of a relationship between entities. Complex systems of relationships are first transformed to a discrete graph representation (e.g., a friendship graph) and then the connectivity properties of these graphs are used to investigate and understand the characteris- tics of the system. For example, network measures such as the average shortest path length and clustering coef- ficient have been used to explore the properties of bio- logical and information networks (Watts and Strogatz 1998; Leskovec, Kleinberg, and Faloutsos 2005), while measures such as centrality have been used for determining the Copyright c(cid:13) 2018, Association for the Advancement of Artificial Intelligence (www.aaai.org). All rights reserved. most important and/or influential people in social networks (Freeman 1977; Bonacich 1987). The main limitation of measures defined for a discrete representation is that they cannot easily be applied to rep- resent and reason about uncertainty in the link structure. Link uncertainty may arise in domains where graphs evolve over time, as links observed at a earlier time may no longer be present or active at the the time of analysis. For exam- ple in online social networks, users articulate "friendships" with other users and these links often persist over time, re- gardless of whether the friendship is maintained. This can result in uncertainty about whether an observed friendship link is still active at some later point in time. In addition, there may be uncertainty with respect to the strength of the articulated relationships (Xiang, Neville, and Rogati 2010), which can result in uncertainty about whether an observed relationship will be used to transmit information and/or in- fluence. Furthermore, there are other network domains (e.g., gene/protein networks) where relationships can only be in- directly observed so there is uncertainty about whether an observed edge (e.g., protein interaction) actually indicates the presence of a valid relationship. In this work, we formulate a probabilistic graph represen- tation to analyze domains with these types of uncertainty and develop analogues for three standard discrete graph measures -- average shortest path length, betweenness cen- trality, and clustering coefficient -- in the probabilistic set- ting. Specifically, we use probabilities on graph edges to represent link uncertainty and consider the distribution of possible (discrete) graphs that they define, then we develop measures that consider the properties of the graph popula- tion defined by this distribution. Our first set of measures compute expected values over the distribution of graphs, sampling a set of discrete graphs from this distribution in order to efficiently approximate the path length, centrality, and clustering measures. We then de- velop a second set of measures that can be directly computed from the probabilities, which removes the need for graph sampling. The second approach also affords us the oppor- tunity to consider more than just shortest paths in the net- work. We note that previous focus on shortest paths is due in part to an implicit belief that short paths are more likely to result in successful transfer of information and/or influ- ence between two nodes. This has led other works to gener- alize shortest paths to the probabilistic domain for their own purposes (Potamias et al. 2009). However, in a probabilistic framework we can also directly compute the likelihood of a path and consider the most probable paths, which are likely to facilitate information flow in the network. With probabilistic paths, we also introduce a prior to in- corporate the belief that the probability of successful in- formation transfer is a function of path length -- since the existence of a relationship does not necessarily mean that information/influence will be passed across the edge. This formulation, which models the likelihood of information spread throughout the graph, is consistent with the finding in (Onnela et al. 2007), which identified that constricting and relaxing the flow along the edges in the network was neces- sary to model the true patterns of information diffusion in an evolving communication graph. We evaluate our measures on three real world networks: Enron email, Facebook micro communications, and DBLP coauthorships. In these datasets, the network transactions are each associated with timestamps (e.g., email date). Thus we are able to compute the local (node-level) and aggregate (graph-level) measures at multiple time steps, where at each time step t we consider the network information available up to and including t. We compare against two different ap- proaches that use the discrete representation: an aggregate approach, which unions all previous transactions (up to t) into a discrete graph, and a slice approach, where only trans- actions from a small window (i.e., [t − δ, t]) are included in the discrete representation. For our methods, we estimate edge probabilities from the transactions observed up to t, weighting each transaction with an exponential decay func- tion. Our analysis shows that our proposed methods more ac- curately capture the salient changes in graph structure com- pared to the discrete methods without being susceptible to local, temporal noise. Thus the resulting analysis produces a better understanding of the graph structure and its change over time. Related Work The notion of probabilistic graphs have been studied pre- viously, notably by (Frank 1969), (Hua and Pei 2010) and (Potamias et al. 2009). (Frank 1969) showed how for graphs with probability distributions over the weights for each edge, Monte Carlo methods can be used to sample to de- termine the shortest path probabilities between the edges. (Hua and Pei 2010) then extends this to find the shortest weighted paths most likely to complete within a certain time constraint (e.g., the shortest distance across town in under half an hour). In (Potamias et al. 2009), the most probable shortest paths are used to estimate the k-nearest neighbors in the graph for a particular node. Although (Potamias et al. 2009) draws sample graphs based on likeli- hood (i.e., sampling each edge according to its probability), in their estimate of the shortest path distribution they weight each sample graph based on its probability, which is incor- rect unless the samples are drawn uniformly at random from the distribution. In this work, we sample in the same manner as (Potamias et al. 2009), but weight each sample uniformly in our expectation calculations -- since, when the graphs are drawn from the distribution based on their likelihood, the graphs with higher likelihood are more likely to be sampled. There has also been some recent work that has devel- oped measures for time-evolving graphs, e.g., to identify the most central nodes throughout time (Tang et al. 2010) and identify the edges that maximize communication over time (Kossinets, Kleinberg, and Watts 2008). However, these works fail to account for the uncertainty in both the link structure and the the communication across links (as users are unlikely to propagate all information across a sin- gle edge). Our use of a probabilistic graph framework and transmission prior address these two cases of uncertainty. Sampling Probabilistic Graphs Let G = hV, Ei, be a graph where V is a collection of nodes and E ∈ V × V is the set of edges, or re- lationships, between the nodes. In order to represent and reason about relationship uncertainty, we associate each edge eij (which connects node vi and vj) with a prob- ability P (eij). Then we can define G to be a distribu- tion of discrete, unweighted graphs. Assuming indepen- dence among edges, the probability of a graph G ∈ G is: P (G) = Qeij ∈E P (eij )Qeij /∈E [1 − P (eij)]. Since we have assumed edge independence, we can sample a graph GS from G by sampling edges independently according to their probabilities P (eij ). Based on this, we can develop methods to compute the expected shortest path lengths, be- tweenness centrality rankings, and clustering coefficients us- ing sampling. ij Probabilistic Average Shortest Path Length Let ρij = {vk1, vk2 , ..., vkq } refer to a path of q vertices connecting two vertices vi and vj, i.e., vk1 = vi and vkq = vj, and from each vertex to the next there exists an edge: ekiki+1 ∈ E for i = [1, q − 1]. Let V (ρij ) and E(ρij) refer to the set of vertices and edges respectively, in the path and let ρij = E(ρij ) refer to the length of the path. Assum- ing connected graphs, for every unweighted graph G = hV, Ei ∈ G there exists a shortest path ρmin between ev- , we ery pair of nodes vi, vj ∈ V . Letting SPij = ρmin can then define the average shortest path length in G as: SP(G) = ij V ·(V −1)Pi∈V Pj∈V ;j6=i SPij. Now, when there is uncertainty about the edges in G, we can compute the expected average shortest path length by considering the distribution of graphs G. For any reasonable sized graph, the distribution G will be intractable to enumer- ate explicitly, so instead we sample from G to approximate the expected value. More specifically, we sample a graph Gs by sampling edges uniformly at random according to their edge probabilities P (eij ). Each graph that we sample in this manner has equal likelihood, thus we can draw m sample graphs GS = {G1, ..., Gm} and calculate the ex- pected shortest path length with the following: 1 EG(cid:2) SP(cid:3) = XG∈G SP(G) · P (G) ≃ 1 m Xm SP(Gm) (1) Since the sampled graphs are unweighted, O (V E) time to compute SP for it each takes sam- ple (Brandes 2001). This results in an overall cost of O (m · V E) to compute EG(cid:2) SP(cid:3). Sampled Centrality Betweenness centrality for a node vi is defined to be the number of shortest paths between other pairs of nodes which pass through vi: BCi = {ρmin jk ∈ G : vi ∈ V (ρjk) ∧ i 6= j, k}. Vertices that contribute to the existence of many shortest paths will have a higher BC score than other nodes that contribute to fewer shortest paths, thus BC is used a measure of importance or centrality in the network. It is difficult to directly compare BC values across graphs since the number of shortest paths varies with graph size and connectivity. Thus, typically analysis focuses on betweenness centrality rankings (BCR), where the nodes are ranked in descending order of their BC scores and the node with the highest BC score is given a BCR of 1. As discussed above, we can compute the shortest paths for each unweighted graph G ∈ G, then we can also com- pute the BCR values for each unweighted graph G ∈ G. We denote BCRi(G) as the betweenness centrality ranking for node vi in G. Then we can approximate the expected BCR for each node by sampling a set of m graphs from G: EG[BCRi] ≃ 1 m Xm BCRi(Gm) (2) Again, since the sampled graphs are unweighted, it takes O (V E) time to compute the BCR for each sample (Brandes 2001), resulting in an overall cost of O (m · V E). together its clustering coefficient 1 Sampled Clustering Coefficients Clustering coefficient is a measure of how the nodes in a graph clus- (Watts and Strogatz 1998). For a node vi ter with Ni = {vj1 , ..., vjn } neighbors (e.g., eij1 ∈ is defined as CCi = E), IE(ejk), where IE is an Ni(Ni−1) Pvj ∈Ni Pvk∈Ni,k6=j indicator function which returns 1 if vj is connected to vk. CC can be thought of as the fraction connected pairs of neighbors of vi. We denote CCi(G) as the clustering coeffi- cient for node vi in graph G. Similar to paths, we can com- pute clustering coefficients for every graph G ∈ G. Thus we can approximate the expected CC for each node by sampling a set of m graphs from G: EG[CCi] ≃ 1 m Xm CCi(Gm) (3) Under the assumption that the maximum degree in the graph can be bounded by a fixed constant (which is typical for sparse social networks), we can compute the clustering coef- ficient for a single graph in O(V ) time (i.e., O(1) for each node), which results in an overall cost of O(m · V ). Probabilistic Path Length In the previous section, we discussed how to extend the dis- crete notions of shortest paths and centrality into a prob- abilistic graph framework via expected values, and we showed how to estimate approximate values using sampling. While our sampling-based measures are valid and give in- formative results (see section 6 for details), they have two limitations which restrict their applicability. samples First, the effectiveness of the approximation depends on the number of from G. We note that (Potamias et al. 2009) used a Hoeffding Inequality to show that relatively few samples are needed to compute an accu- rate estimate of independent shortest paths in probabilistic graphs. However, since our the calculation of BCR is based on the joint occurrence of shortest paths in the graph, this bound will not hold for our measures. Second, since the expectation is over possible worlds (i.e., G ∈ G), the focus on shortest paths may no longer be the best way to capture node importance. We note that in the discrete framework, where all edges are equally likely, the use of shortest paths as a proxy for importance implies a prior belief that shorter paths are more likely to be used suc- cessfully to transfer information and/or influence in the net- work. In domains with link uncertainty, the flow of infor- mation/influence will depend on both the existence of paths in the network and the use of those paths for communica- tion/transmission. In a probabilistic framework, we have an opportunity to explicitly incorporate the latter, by encoding our prior beliefs about transmission likelihood into mea- sures of node importance. Furthermore, although a prob- abilistic representation enables analysis of more than just shortest paths, as we note above, even to capture shortest paths the sampling methods described previously may need many samples to accurately estimate the joint existence of shortest paths. Thus, a measure that explicitly uses the edge probabilities to calculate most probable paths may more ac- curately highlight nodes that serve to connect many parts of the network. We discuss each of these issues more below. Most Probable Paths To begin, we extend the notion of discrete paths to probabilistic paths in our framework. Specifically, we can calculate the probability of the exis- tence of a path ρij as follows (again assuming edge inde- pendence): P (ρij ) = Qeuv ∈E(ρij ) P (euv). Using the path probabilities, we can now describe the notion of the most probable path. Given two nodes vi, vj, the most proba- ble path path is simply the one with maximum likelihood: ij = argmax P (ρij). We can compute the most likely ρML paths in much the same way that shortest paths are computed on weighted discrete graphs, by applying Dijkstra's short- est path algorithm, but instead of expanding on the shortest path, we expand the most probable path. Thus, all most prob- able paths can be calculated in O(cid:16)V E + V 2 log V (cid:17). Transmission Prior Previous focus on shortest paths for assessing centrality points to an implicit assumption that if an edge connects two nodes that it can be successfully used for transmission of information and/or influence in the network. Although there has been work both in maximiz- ing the spread of information in a network through the use of central nodes (Boragatti 2005; Newman 2005) and in the study of information propagation through the use of trans- mission probabilities (Goldenberg, Libai, and Muller 2001), there has been little prior work that has incorporated trans- mission probabilities into node centrality measures. Cen- trality measures based on random walks and eigenvec- tors (Newman 2005) implicitly penalize longer paths as they consider all paths between nodes in the network. However, in our framework we can incorporate transmission probabili- ties to penalize the probabilities of longer paths in the graph, in order to more accurately capture the role nodes play in the spread of information across multiple paths in the network. Consider the case where there is one path of nine peo- ple where each edge has high probability of existence (e.g., 0.95) and another path of three people where the edge prob- abilities are all moderate (e.g., 0.70), both ending at node v. Here, the longer path is more likely to exist than the shorter path, but in this example we are more interested in which path is used to transfer a virus to v. Even when an edge exists (i.e., the relationship is active), the virus will not be passed with certainty to the next node, thus the trans- mission probability is independent of the edge probability. Moreover, when the transmission probability is less than 1, it is more likely that the virus will be transmitted across the shorter path, since the longer path presents more opportuni- ties for the virus to be dropped. This provides additional in- sight as to why shortest paths have always been considered important -- there is generally a higher likelihood of trans- mission if it is passed through fewer nodes in the network. To incorporate transmission likelihood into our proba- bilistic paths, we assign a probability β of success for every step in a particular path -- corresponding to the probability that information is transmitted across an edge and is received by the neighboring node. If we denote l to be the length of a path ρ, and s to be the number of successful transmissions along the path, we can use a binomial distribution to repre- sent the transmission probability across ρ with: SBin(sβ) = Bin(s = ll, β) = βl Here SBin corresponds to the case where the transmission always succeeds (i.e., across all edges in ρ). Using this bi- nomial distribution as a prior allows us to represent the ex- pected probability of information spread in an intuitive man- ner, giving us a parameter β which we can adjust to fit our expectations for the information spread in the graph. Note that setting β = 1 is equivalent to the most proba- ble paths discussed earlier. The prior effectively handicaps longer paths through the graph. Although, there is a correla- tion between shortest (certain) paths and handicapped (un- certain) paths, these formulations are not equivalent, since the latter produces a different set of paths when the shortest paths have low probability of existence. ML Handicapped Paths Now that we have both the no- tion of a probabilistic path, and an appropriate prior for modeling the probability of information spreading along the edges in the path, we can formulate the maximum likelihood handicapped path between two nodes vi and vj to be: ρMLH ij = argmax ρij [P (ρij) · SBin( ρij β)] (4) To compute the most likely handicapped (MLH) paths, we follow the same formulation as the most probable paths, keeping track of the path length and posterior at each point. In the MLH formulation, probable paths are weighted by likelihood of transmission, thus nodes that lie on paths that are highly likely and relatively short, will have a high BC ranking. To calculate BCR ranking based on MLH paths, we can use a weighted betweenness centrality algorithm. Specifically, we modify Brandes' algorithm (Brandes 2001) to start with the path that has the lowest probability of occur- rence to be the one to backtrack from, enabling computation of the betweenness centrality in O(cid:16)V E + V 2 log V (cid:17). Comparison with Discrete Graphs The formulation of MLH Paths has inherent benefits, most notably with its direct connection to the previously well- studied notions of shortest paths and betweenness central- ity in discrete graphs. In fact, we can view a discrete graph G as being a special case of probabilistic graph with edge probabilities: (5) P (eij) = (cid:26)1 0 if an edge exists if the edge does not exist ij We denote the distribution of graphs defined by these prob- abilities as G1. Note that the only graph in G1 with non-zero probability is G -- since if an edge exists in a discrete graph, then it exists with complete certainty, likewise, if an edge is not present, we are certain it does not exist, thus P (G) = 1. Theorem 1. For every pair of nodes vi and vj, the shortest path in the discrete graph (ρij ∈ G) is equal to the most probable path discovered by the MLH algorithm (ρMLH ∈ G1), for 0 < β < 1. Proof. In G1 every P (eij) is either 1 or 0, thus every case where P (ρij ) > 0 is precisely P (ρij) = 1. If we choose the shortest path from the discrete graph, it will have length l∗ = ρij , and the MLH probability for the same path will be βl∗. Clearly, if a longer path were chosen by MLH, its probability would be less than βl∗ , and we know that no shorter paths exist -- since all paths shorter than ρij would involve an edge than did not exist in G and thus would have probability 0 . Corollary 1. The betweenness centrality using shortest paths on a discrete graph G can be equivalently calculated with most probable handicapped paths over G1, where edge probabilities are defined by Equation 5. Proof. This follows directly from Thm 1. Probabilistic Clustering Coefficient We now outline a probabilistic measure of clustering coefficient that can be computed without the need for sampling. If we assume independence between edges, the probability of a triangle's existence is equal to the product of the probabilities of the three sides. The ex- pected number of triangles is then the sum of the tri- angles probabilities that include a given node vi. De- to be the expected triangles including vi: noting Tri [P (eij) · P (eki) · P (ejk)]. De- noting Coi to be the expected combinations (i.e., coexist- ing pairs) of the neighbors of vi, we then get: EG [Coi] = EG [Tri] =Pvj ,vk∈Ni,vj 6=vk [P (eij ) · P (eki)]. We can then define the Pvj ,vk∈Ni,vj 6=vk probabilistic clustering coefficient to be the expectation of the ratio Tri/Coi, and approximate it via a first order Taylor expansion (Elandt-Johnson and Johnson 1980): CCi = EG (cid:20) Tri Coi(cid:21) ≈ EG [Tri] EG [Coi] (6) Assuming again that the maximum degree in the graph can be bounded by a fixed constant, we can compute the probabilistic clustering coefficient in O(V ) time (O(1) for each node). Additionally, the probabilistic approximation to the clustering coefficient shares connections with the tradi- tional clustering coefficients on discrete graphs. Theorem 2. The probabilistic clustering coefficients com- puted in G1, with probabilities defined by 5 for a discrete graph G, are equal to the discrete clustering coefficients cal- culated on G. Proof. Any triangle from G has probability 1 in G1, while any non-triangle in G clearly has probability 0. The same is true for the combinations of pairs of neighbors. As such, the sums of the numerators and denominators will be equal for both clustering coefficient. Experiments To investigate the performance of our proposed MLH and sampling methods for average path length, betweenness centrality and clustering coefficient, we compare to tradi- tional baseline social network measures on data from Enron, DBLP, and Facebook. These datasets all consist of time- stamped transactions among people (e.g., email, joint au- thorship). We will use the temporal activity information to derive probabilities for use in our methods, and evaluate our measures at multiple time steps to show the evolution of measures in the three datasets. analysis we first use Datasets For our the Enron dataset (Shetty and Adibi 2004). The advantage to this dataset is that it allows us to understand the effects of our prob- abilistic measures because key events and central people have been well documented (Marks ). We consider the subset of the data comprised of the emails sent between employees, resulting in a dataset with 50,572 emails among 151 employees. Our second dataset is a sample from the DBLP computer science citation database. We considered the set of authors who had published more than 75 papers in the timeframe 1967-2006, and the coauthor relationships between them. The resulting subset of data consisted of 1,384 nodes, with 23,748 co-authors relationships. Our third dataset is from the Purdue University Facebook network. Specifically we consider one year's worth of wall- to-wall postings between users in the class of 2011 subnet- work. The sample has 2,648 nodes with 59,565 messages. Methodology We compare four network measures for each timestep t in each dataset. When evaluating at time t, each method is able to utilize the graph edges that have occurred up to and in- cluding t. As baselines, we compare to (1) an aggregate method, which at a particular time t computes standard mea- sures for discrete graphs (e.g., BCR) on the union of edges that have occurred up to and including t, and (2) a time slice method, which again computes the standard measures, but only considers the set of edges that occur within the time window [t − δ, t]. For the Enron and Facebook, we used δ = 14 days and for DBLP, we considered δ = 1 year. We then compare to the sampling and MLH measures. For both the probabilistic methods, we need a measure of relationship strength to use as probabilities in our model. Although any notion of relationship strength can be substi- tuted at this step, in this work we utilize a measure of re- lationship strength based on decayed message counts. More specifically, we define two separate and distinct notions of connection between nodes: edges and messages. We define an edge eij to be the unobservable probabilistic connection between two nodes, indicating whether the nodes have an active relationship. This is in contrast to messages: a mes- sage mij is a concrete and directly measurable communica- tion between two nodes vi and vj, such as a wall posting or email, occurring at a specific time, which we denote t(mij ). We define the probability of of nodes vi and vj having an active relationship at the current timestep tnow, based on observing a message at time t(mij ), to be the exponential decay of a particular message: (tnow − t (mij))(cid:27) P (cid:0)et Note that the scaling parameter λ refers to the adjustment of the basic time unit (e.g. 7 days to 1 week), not the rate parameter which defines the exponential probability density function, which in this case is 1. This allows for assigning a probability of 1 to the case when t (mij) = tnow, but it also assigns reasonable probabilities (i.e., slows the decay) for messages that happened in the recent past, which could still indicate active relationships. ij mij(cid:1) = Exp (mijtnow, λ) = exp(cid:26)− 1 λ Now, we assume we have k messages between vi and vj, and any of the messages m1 ij can contribute to the relationship strength, which is defined to be 1 minus the probability that none of them contribute: ij, . . . , mk ijm1 ij, . . . , mk P (cid:0)et ij(cid:1) = 1 −Yk (cid:0)1 − Exp(cid:0)mk ijtnow(cid:1)(cid:1) In order to choose a scaling parameter λ for the expo- nential decay, we measured the average correlation from the sampling method BCR against the time slice ranking and ag- gregate method for each Enron employee, for different val- ues of λ (see Figure 1.a). Note that a λ close to 0 corresponds to 'forgetting' a transaction quickly and is highly correlated with the slice method, while a large λ corresponds to 're- membering' a transaction for a long time, giving it high cor- relation with the aggregate method. In order to balance be- tween short term change and long term trends we set λ to a 'middle ground' with λ = 28 days. This applies to both the Enron and Facebook datasets. For DBLP, where we evaluate n o i t a l e r r o C 1 0.8 0.6 0.4 0.2 0 Aggregate / Sample Slice / Sample Slice / Aggregate 101 103 Scaling Parameter λ (Days) 102 (a) n o i t a l e r r o C 1 0.8 0.6 0.4 0.2 0 Sampling Aggregate Slice 0 50 100 0 50 100 s g n i k n a R e c i l S 0 50 100 s g n i k n a R e t a g e r g g A . ) 3 = β ( s g n i k n a R L M 0.2 0.4 Handicap Parameter β 0.6 0.8 (b) 1 150 150 100 50 Sample Rankings (c) 0 150 150 100 50 Sample Rankings (d) 0 150 150 100 50 Sample Rankings 0 (e) Figure 1: (a) Correlation between methods for varying values of λ. (b) Correlation of MLH with other methods as β is varied. (c-e) Correlations of Enron employee BCRs across methods, for the time segment ending August 24th, 2001 yearly, λ is set to 2 years to keep the ratio between time slice and λ consistent between Facebook, Enron, and DBLP. In order to choose a value for the β parameter in the MLH method, we measured the average correlation of the BCR from the MLH method and compared them to the sampling, aggregate, and slice rankings for different values of β. We can see in Figure 1.b that as long as β is non-zero, it has minimal effect on the correlations. For the experiments re- ported in this paper, we set β = .3. Note that omission of the prior (i.e., β = 1) in will make the MLH paths similar to the slice paths, with added paths between vertices which are disjoint in a particular time slice. The final parameter setting is the number of samples to consider in each of sampling-based measures. Earlier we discussed how we are computing the joint instances of short- est paths, and that the bound by (Potamias et al. 2009) does not hold. Due of this, we exploit the small size of the En- ron dataset and take 10,000 samples; however, with the two larger graphs we use a smaller sample size of 200 in order to make the experiments tractable. Method Correlations on Enron Data In order to illustrate the differences between the four meth- ods, we analyze their respective BCR on the Enron data for the time window ending August 14th, 2001. Figure 1.c-e shows the correlations of employee BCR across a pair of methods: points on the diagonal green line indicate 'perfect' correlation between the rankings of two methods. Figure 1.c shows that the MLH method closely matches the sampling method, with only a few nodes varying from the diagonal. However, a large number of nodes that the sam- pling method determines to have high centrality are missed by the slice method, due to the slice's inability to see transac- tions that occurred prior to the evaluation time window. Ad- ditionally, we note that August 14th, 2001 is relatively late in the Enron timeline, which results in the aggregate method having little correlation with the sampling method, since the more recent changes are washed out by past transactions in the aggregate approach. Local Trend Analysis Lay and Skilling Here, we analyze two key figures at En- ron: Kenneth Lay and Jeffery Skilling. These two were cen- tral to the Enron scandal -- as first Lay, then Skilling, and then Lay again, assumed the position of CEO. We can an- alyze the BCR for Lay and Skilling during these transition periods, as we expect large changes to affect both of them. (a) (c) (b) (d) Figure 2: BCR of Lay and Skilling over time. Red lines in- dicate Skilling's CEO announcement and resignation. The first event we consider (marked by a vertical red line in Figure 2) is December 13th 2000, when it was announced that Skilling would assume the CEO position at Enron, with Lay retiring but remaining as a chairman (Marks ). In Fig- ure 2.a, both the sampling method and the MLH method identify a spike in BCR for both Lay and Skilling directly before the announcement. This is not surprising, as presum- ably Skilling and Lay were informing the other executives about the transition that was about to be announced. The time slice method (2.c) produces no change in Lay's BCR, despite his central role in the transition. Skilling shows a few random spikes of BCR, which illustrates the variance associated with using the time slices. The aggregate model (2.d) fails to reduce Skilling's BCR to the expected levels following the announcement -- this is fairly early in time and we are already seeing the aggregate method's inability to track current events based on its union of all past transac- tions. Both the sampling method and the MLH methods cap- ture this; MLH has him return to an extremely low centrality, while sampling has fairly low with some variance. The second event we consider (marked by the 2nd verti- cal red line in Figure 2) is August 14th 2001, when, seven months after initially taking the CEO position, Skilling ap- proached Lay about resigning (Marks ). During the entirety of Skilling's tenure, we see that Lay has a slight effect on the sample rankings but is not what would be considered a 'central' node. Not surprisingly, Skilling has a fairly high centrality during his time as CEO; both the sampling method and MLH method capture this. . ) 3 = β ( s g n i k n a R L M 0 500 1000 1500 2000 2500 v a v c 3000 03/08 06/08 09/08 Date (b) v b 12/08 03/09 0 500 1000 1500 2000 2500 s g n i k n a R e c i l S v a v c v b 3000 03/08 06/08 0 500 1000 1500 2000 2500 s g n i k n a R e t a g e r g g A v a v c 12/08 03/09 09/08 Date (d) v b 3000 03/08 06/08 12/08 03/09 09/08 Date (f) (a) (c) (e) Figure 3: (a,c,e) BCR of Kitchen and Lavorato. (b,d,e) BCR for 3 nodes in the Purdue Facebook network. Prior to the announcement of Lay's takeover as CEO, the slice method still had no weight on him, despite his previous involvement with the first transition. Also, we note that the sampling, MLH, and slice methods all agree that after Lay's initial spike from the Skilling resignation, he resumes hav- ing a lower centrality, which the aggregate method misses. In general, the sampling method seems to mirror the slice method, albeit with less variance, but it not as smooth as the MLH method, indicating the utility of considering most probable paths. and (Shetty and Adibi 2004) John Lavorato, who were Kitchen and Lavorato Next we analyze Louise execu- Kitchen for Enron Americas, tives which was the wholesale trading section of Enron (Raghavan, Kranhold, and Barrionuevo ). They are notable because of the extraordinarily high bonuses they received as Enron was being investigated, and were also found to have a high temporal betweenness centrality using the method defined by (Tang et al. 2010). We can see in Figure 3 (a,c,e) the rankings of Kitchen and Lavorato, and can see the bene- fit of using the probabilistic framework's ability to key in on centralities at specific times, rather than using the temporal definition through time proposed by (Tang et al. 2010). We see that while Lavorato might have gotten a large bonus, he is only important during Skilling's tenure as CEO; his centrality drops noticeably otherwise. On the other hand, Kitchen had extremely high rankings throughout. Here, we see that the slice method exhibits high variabil- ity, especially with Kitchen, while the aggregate cannot rec- ognize Lavorato's lack of importance after Skilling's depar- ture. The MLH method is able to smoothly capture Kitchen's centrality, while keeping Lavorato important solely during Skilling's CEO tenure. Facebook Centrality Unlike the Enron dataset, the Pur- due Facebook dataset does not have well-established ground truths, where we can use the known characteristics and be- haviors of particular nodes for evaluation. However, we can examine aspects of a few representative nodes to illustrate the problems that lie with usage of the aggregate or static methods. First, we can see from Figure 3.d that va (red) has a consistently high ranking in the slice method, which the MLH method captures (3b). However, this person has a de- clining ranking in the aggregate method, as the aggregate is unable to capture current events -- past information in the ag- gregate graph results in many paths that bypass va, missing this central node in later timesteps. The next person we consider is denoted by vb (green). In 3.d, we can see that the slice method initially identifies this person as having high centrality, then their BCR bottoms out, and then peaks a few times again approximately mid- way through the timeline. The MLH method also initially identify vb as central, with a degradation over time. In con- trast, the aggregate method fails to detect the inactivity later in the timeframe and continues to give vb a high centrality ranking throughout the entire time window. The final person we consider is denoted by vc (blue) in Figure 3. We can see in 3.d that the slice method exhibits large variability for vc, but that there are many slices in the middle to end of the timeframe where the node is identified as highly central. The aggregate method is unaware of this activity and ranks vc at a relatively low level throughout the timeseries. In contrast, the MLH method is able to recognize the node's growing importance as time evolves, and do so much more smoothly than the slice method (3.d). In doing so, the MLH method can find instances of high centrality when both discrete methods fail. Global Trend Analysis In Figure 4, we report the average path lengths for the var- ious measures: MLH paths, probabilistic shortest paths, the aggregate shortest paths and the slice shortest paths. Ad- ditionally, we report the average sampled clustering coef- ficient, the clustering coefficient approximation, and the ag- gregate and slice discrete clustering coefficients. These are done for each of the three datasets through time, and we investigate changes in these global statistics to understand what, if any, changes occur with respect to the small world network structure of the data (Watts and Strogatz 1998). In Figures 4.a,c,e, we show the clustering coefficients for each of the three datasets. The aggregate graph significantly overestimates the amount of current clustering in the graph, while the slice method is highly variable, especially for En- ron. In general, both probabilistic measures are in between the two extremes, balancing the effects of recent data and decreasing the long term effect of past information, with the MLH performing similarly to the sampled clustering coeffi- cient, and even better on DBLP, where sampling undercuts the clustering (likely due to small sample size). 0.6 Aggregate Slice Sampling ML C C n o r n E 0.3 7 6 5 4 3 2 1 h t g n e L h t a P n o r n E Aggregate Slice Sampling ML 09/21/01 07/05/02 03/07/00 12/13/00 Date (a) Aggregate Slice Sampling ML 0 05/11/99 0.3 0.2 0.1 C C P L B D 0 05/11/99 14 12 10 8 6 4 2 h t g n e L h t a P P L B D 09/21/01 07/05/02 03/07/00 12/13/00 Date (b) Aggregate Slice Sampling ML 0 1967 1976 1986 Date (c) 1996 2006 0 1967 1976 1996 2006 1986 Date (d) Aggregate Slice Sampling ML 0.2 0.1 C C k o o b e c a F 15 10 5 h t g n e L h t a P k o o b e c a F 0 03/08 12/08 03/09 06/08 09/08 Date (e) 0 03/08 Aggregate Slice Sampling ML 12/08 03/09 06/08 09/08 Date (f) Figure 4: Average path lengths and clustering coefficients for Enron (a,b), DBLP (c,d) and Facebook (e,f). of these Next, diameter small world in Figures 4.b,d,f, we examine the shrink- networks ing the (Leskovec, Kleinberg, and Faloutsos 2005). aggregate underestimates the path length at a current point in time. We can see that the most probable paths closely follows the sampling results, with both lying between the slice and aggregate measures while avoiding the variability of the slice method. Here, Conclusions In this paper we investigated the problem of calculating cen- trality and clustering in an uncertain network, and analyzed our methods using time evolving networks. We demon- strated the limitation of using an aggregate graph represen- tation to capture uncertainty in the network structure due to changes over time, as well as the limitation of using a slice- based representation due to its extreme variability. We in- troduced sampling-based measures for average shortest path and betweenness centrality, as well as measures based on the most probable paths, which are more intuitive for cap- turing network flow. We also outlined exact methods for the computation of most probable paths (and by extention, most probable betweenness centrality), and incorporated the no- tion of transmission probability. Additionally, we developed a probabilistic clustering coefficient and gave a first order Taylor expansion approximation for computation. We provided empirical evidence on the Enron, DBLP, and Facebook datasets showing the sampling and MLH's intu- itive centrality rankings for the Enron employees and Face- book members, as well as the global properties for all three. The probabilistic centrality and clustering formulations are inherently smoother than the measures computed from dis- cretized time slices, however they can reason about likely change in graph structure due to changes over time, un- like the aggregate method, which includes all past infor- mation. We see the MLH formulation is smoother than the sampling method, indicating that the most probable paths through the graph may be more important to consider than shortest paths. Finally, we note that our experiments used a relatively simple estimate of relationship strength for the edge probabilities in the network. In future work we will in- vestigate alternative formulations of edge uncertainty. Acknowledgements This material is based in part upon work supported by the In- telligence Advanced Research Projects Activity (IARPA) via Air Force Research Laboratory contract number FA8650-10-C-7060. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright annotation thereon. Disclaimer: The views and conclusions con- tained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of IARPA, AFRL or the U.S. Govern- ment. Pfeiffer is supported by a Purdue University Frederick N. Andrews Fellowship. References [Bonacich 1987] Bonacich, P. 1987. Power and Centrality: A Fam- ily of Measures. The American Journal of Sociology 92(5):1170 -- 1182. [Boragatti 2005] Boragatti, S. P. 2005. Centrality and Network flow. Social Networks (27):55 -- 71. [Brandes 2001] Brandes, U. 2001. A faster algorithm for between- ness centrality. Journal of Mathematical Sociology 25:163 -- 177. [Elandt-Johnson and Johnson 1980] Elandt-Johnson, R. C., and Johnson, N. L. 1980. Survival models and data analysis. John Wiley & Sons, New York :. [Frank 1969] Frank, H. 1969. Shortest paths in probabilistic graphs. In Operations Research, Vol. 17, No. 4 (Jul. - Aug., 1969), pp. 583- 599. [Freeman 1977] Freeman, L. C. 1977. A set of measures of central- ity based on betweenness. Sociometry 40(1):35 -- 41. [Goldenberg, Libai, and Muller 2001] Goldenberg, J.; Libai, B.; and Muller, E. 2001. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth. Marketing Let- ters. [Hua and Pei 2010] Hua, M., and Pei, J. 2010. Probabilistic path queries in road networks: traffic uncertainty aware path selection. In EDBT, 347 -- 358. [Kossinets, Kleinberg, and Watts 2008] Kossinets, G.; Kleinberg, J.; and Watts, D. 2008. The structure of information pathways in a social communication network. In KDD '08, 435 -- 443. [Leskovec, Kleinberg, and Faloutsos 2005] Leskovec, J.; Klein- berg, J.; and Faloutsos, C. 2005. Graphs over time: Densification laws, shrinking diameters and possible explanations. In In KDD, 177 -- 187. [Marks ] Marks, R. Enron timeline. http://www.agsm.edu.au/bobm/ teaching/BE/Enron/timeline.html. [Newman 2005] Newman, M. J. 2005. A measure of betweenness centrality based on random walks. Social Networks 27(1):39 -- 54. [Onnela et al. 2007] Onnela, J.-P.; Saramki, J.; Hyvnen, J.; Szab, G.; Lazer, D.; Kaski, K.; Kertsz, J.; and Barabsi, A.-L. 2007. Struc- ture and tie strengths in mobile communication networks. Proc Natl Acad Sci U S A 104(18):7332 -- 6. [Potamias et al. 2009] Potamias, M.; Bonchi, F.; Gionis, A.; and Kollios, G. 2009. Nearest-neighbor queries in probabilistic graphs. [Raghavan, Kranhold, and Barrionuevo ] Raghavan, A.; Kranhold, K.; and Barrionuevo, A. Full speed ahead: How enron bosses cre- ated a culture of pushing limits. http://academic.udayton.edu/ lawrenceulrich/EnronBossesCreatingCulture.htm. [Shetty and Adibi 2004] Shetty, J., and Adibi, J. 2004. The enron email dataset database schema and brief statistical report. [Tang et al. 2010] Tang, J.; Musolesi, M.; Mascolo, C.; Latora, V.; and Nicosia, V. 2010. Analysing information flows and key medi- ators through temporal centrality metrics. In SNS'10. [Watts and Strogatz 1998] Watts, D. J., and Strogatz, S. H. 1998. Collective dynamics of 'small-world' networks. Nature 393(6684):440 -- 442. [Xiang, Neville, and Rogati 2010] Xiang, R.; Neville, J.; and Ro- gati, M. 2010. Modeling relationship strength in online social networks. In WWW 2010.
1605.08409
1
1605
2016-05-26T19:13:38
Agent-based model of information spread in social networks
[ "cs.SI", "physics.soc-ph" ]
We propose evolution rules of the multiagent network and determine statistical patterns in life cycle of agents - information messages. The main discussed statistical pattern is connected with the number of likes and reposts for a message. This distribution corresponds to Weibull distribution according to modeling results. We examine proposed model using the data from Twitter, an online social networking service.
cs.SI
cs
Agent-based model of information spread in social networks D.V. Lande a,b, A.M. Hraivoronska a, B.O. Berezin a a Institute for Information Recording NASU, Kiev, Ukraine b NTUU "Kyiv Polytechnic Institute", Kiev, Ukraine We propose evolution rules of the multiagent network and determine statistical patterns in life cycle of agents – information messages. The main discussed statistical pattern is connected with the number of likes and reposts for a message. This distribution corresponds to Weibull distribution according to modeling results. We examine proposed model using the data from Twitter, an online social networking service. Keywords: social network, modeling, Weibull distribution, agent-based system, information spread. Introduction The flows of information have a strong influence on opinion formation and other processes in the society. Today social networks play a fundamental role as a medium for the information spread. These facts motivate to explore mechanisms of creation of information flows and influence on them. Dealing with this requires focusing attention on modeling and finding laws or patterns in the spread of information [1]. In this article we present an agent-based model of information spread. The agent in this model is an information message [2]. A message published in social network may cause different types of public reaction. This model involves types of reaction such as positive or negative comments, respect or protest (we will call it like/dislike); message may be shared or copied (repost); also one message may have a link to another one (link). The evolution of the agent is controlled by mentioned above types of reaction. The main attribute of the agent is ―energy‖ (E); that is representation of current relevance of the message or a degree of interest to the topic of the message by people. Naturally, a positive reaction or appearance of link to the message cause increase of energy. In opposite way, energy decreases when the 1 message gets negative feedback. Anyway, energy tends to decrease because information eventually becomes outdated. The agent specification More precisely the rules of agent evolution are as follows. Each agent appears with the initial energy (E0) and dies when its energy becomes 0. The energy varies during the agent's life cycle depending on the types of reaction. Let us list them all and their impact on the energy:  like: energy is incremented;  dislike: energy is decremented;  repost: energy is increased by 2;  reference: energy is incremented; In addition the energy is decremented at every time step (we consider the evolution in discrete time). On the other hand, the more relevance of the message, the more likely people respond and express their opinion about information in this message. It is assumed the probability to get some response depends on current energy of agent. We introduce the probability of getting certain reaction for the agent with energy E as follows . We denote by initial parameters of the model, and by some monotone nondecreasing function from to [0, 1]. The simulation of information spread Earlier we introduced the evolution rules for the agent. The information flow consists of the set of such agents. We simulate the dynamics of the whole information flow as follows. At the initial time only one agent exists. New agents may appear in two ways. Firstly there is a probability of spontaneous generation ( ). It means that new agent may appear with probability at every time step. Such appearance 2 corresponds to the publishing new information by somebody. Secondly a copy of existing agent may be created (repost). Here we describe the life cycle of one agent in terms of variation of its energy. Let denote the value of energy at time t. Suppose is the random variable such that ( ) ( ) ( ) ( ) Let us denote . Then we have It follows that we can consider a change of energy as the random walk on { } with transition probabilities { { } In other words the stochastic sequence is a Markov chain with transition probabilities . A state diagram for this Markov chain is shown on Figure 1, using a directed graph to picture the state transitions. Figure 1. A state diagram for Markov chain. States represent energy of an agent The random walk of energy is useful approach to analysis of properties of the model. 3 Model results Now let us consider the statistical distribution of likes and reposts for messages in the information flow. Note that we can find the probability to get n likes for one agent according to the above theoretical approach. Suppose an agent gets like at time t; then { }, otherwise { }. { }, if t and any vector such that Denote by { } otherwise for . It is easily proved that ∑ { } ∑ ∑ ∏ Data generated by the model is illustrated in Figure 2. Figure 2. Distribution of likes generated by model The frequency distribution of likes (blue line with dots) increases at first, and then decreases. It looks like a density function of the Weibull distribution [4] { ) ( ( ) 4 In Figure 2 a density function of the Weibull distribution with the shape parameter and the scale parameter is shown (red line). We get this density function as an approximation for the frequency distribution of likes using the method of least squares. The frequency distribution of reposts and its approximation are shown in Figure 3. Here a density function of the Weibull distribution has the shape parameter and the scale parameter . Figure 3. Distribution of reposts generated by model Information flows in social networks We study life cycles of news publications in Twitter and compare results with output produced by the model. Data about increase of likes and retweets for special information messages were collected [3]. We found that distributions of likes and retweets from a real social network fit Weibull distribution similarly to the model (Figure 5 and Figure 6). The shape parameter coincides with good accuracy in both situations. 5 Figure 5. Distribution of likes from Twitter Figure 6. Distribution of retweets from Twitter We developed a computer program using R programming language for analyzing statistical data. Processing was carried out in three following steps. At first step the program detected increases in number of retweets for one user in online mode. For example, messages of New York Times newspaper were scanned every 15 minutes. 6 At second step the program treated data accumulated at the first step. We applied Weibull distribution for data approximation, so the scale parameter and the shape parameter were calculated. In addition, we estimated the rate of increase for number of retweets. At third step all gathered data were stored in the external data base for future analysis. To summarize, we collected texts of each message, timestamps for messages, scale and shape parameters, and numerous graphs. These graphs represent number of likes and retweets, the rate of growth for number of likes and retweets, and approximation for number of likes and retweets with Weibull distribution. Conclusion We constructed agent-based model of message life cycle in social networks. The statistical pattern for number of likes and reposts for information messages was found. Distribution of likes and reposts satisfy Weibull distribution according to modeling results. Model output is quite similar to the results from the real social network. It follows that the statistical pattern exists in real social networks and the model captures this pattern. Findings described in this article can be useful for future studying of information spread in social networks. Also the presented results can be applied to detecting anomalies in a life cycle of information messages. 1. Dodonov A.G., Lande D.V., Prischepa V.V., Putiatin V.G. Competitive intelligence in computer networks . – K .: IPRI NAS of Ukraine, 2013. – 248 p. 2. Hraivoronska A.M., Lande D.V. Agent-based approach to investigating dynamics of the information flows // System analysis and information technologies: Materials of the 17th International scientific conference SAIT 2015, Kiev, 22-25 June 2015 / UNK IASA NTUU "KPI". – K .: ESC IASA NTUU "KPI‖, 2015. – C. 62-63. 3. Li R., Lei K.H., Khadiwala R., Chang K.C. TEDAS: A Twitter-based Event Detection and Analysis System // Data Engineering (ICDE), 2012 IEEE 28th International Conference, 2012. - P. 1273-1276. 4. Neshitoy V.V. Mathematical and statistical analysis techniques in library and informationtional activities. – Minsk: Belarus. State. Univ. of Culture and Arts, 2009. – 203 p. 7
1506.01730
1
1506
2015-06-04T21:07:39
Coauthorship and Thematic Networks in AAEP Annual Meetings
[ "cs.SI", "cs.DL" ]
We analyze the coauthorship production of the AAEP Annual Meeting since 1964. We use social network analysis for creating coauthorship networks and given that any paper must be tagged with two JEL codes, we use this information for also structuring a thematic network. Then we calculate network metrics and find main actors and clusters for coauthors and topics. We distinguish a gender gap in the sample. Thematic networks show a cluster of codes and the analysis of the cluster shows the preeminence of the tags related to trade, econometric, distribution/poverty and health and education topics.
cs.SI
cs
Coauthorship and Thematic Networks in AAEP Annual Meetings Juan M.C. Larrosa [email protected] Departamento de Economía, Universidad Nacional del Sur (UNS) Instituto de Investigaciones Económicas y Sociales del Sur (IIESS) ======== First Draft =========== Abstract We analyze the coauthorship production of the AAEP Annual Meeting since 1964. We use social network analysis for creating coauthorship networks and given that any paper must be tagged with two JEL codes, we use this information for also structuring a thematic network. Then we calculate network metrics and find main actors and clusters for coauthors and topics. We distinguish a gender gap in the sample. Thematic networks show a cluster of codes and the analysis of the cluster shows the preeminence of the tags related to trade, econometric, distribution/poverty and health and education topics. 1. Introduction Networks of collaboration among researchers have been presented since early times of science. To co-author a paper means collaboration between at least two authors and is a way of learning, sharing knowledge, and labor division. We construct networks of scientists in which a link between two scientists is established by their coauthorship of one or more scientific papers. These networks are affiliation networks in which actors are linked by their common membership of groups consisting of authors of a paper. They are social networks with more interaction than many affiliation networks (networks where people are connected to an event, for instance); it is probably fair to say that most people who have written a paper together are genuinely acquainted with one another. We study many statistical properties of our networks, including numbers of papers written by coauthors, the timeline of papers presented, the topics that identify each contribution, the typical distance through the network from one scientist to another, and a variety of measures of connectedness within a network. Specifically, we estimate centralities such as closeness, eigenvector and betweennes. 1 These specific networks became popular when mathematicians calculate their own Erdös number by counting how many coauthors they share with any other coauthor of the prolific Paul Erdös. Those who had published a paper with him were given a Erdös number of 1, those who had published with one of those people but not with Erdös, a number of 2, and so on (Newmn). So far, studies of current literature about coauthorship networks mostly give emphasis to understand patterns of scientific collaborations, to capture collaborative statistics, and to propose valid and reliable measures for identifying prominent author(s). Coauthorship network, as an important kind of social network, has been intensively studied (Newman (2001a, 2001b, 2003, 2005); Barabási et al. (2002); Nascimento et al. (2003); Kretschmer (2004); Liu et al. (2005); Yin et al. (2006); Vidgen et al. (2007); Rodriguez and Pepe (2008), Uddin et al. (2012), Rumsey (2006), Paredes (2011), Erfanmanesh et al. (2012), Kurosawa and Takama (2012), Brandao and Moro (2012), Murray et al. (2006), Jahn (2008), Maia et al. (2013), Murray et al. (2006), Day and Shih (2011)). A complex approach to diverse and enormous datasets of different branches of the science is presented in Cotta and Merelo (2005). 2. Coauthor networks What is a co-authorship network? When two authors write a paper, they establish a link between them. As long as other authors collaborate in producing one paper more links are included relating each new co-author with all other previous authors. We study the way coauthorship between economists who present contributions in a periodical professional meeting in Argentina has been evolved in the past decades. The common place for exposing new contributions in the Economics profession in Argentina has been the traditional Annual Meeting of the Asociación Argentina de Economía Política (AAEP) where newly from recently graduated to old school researchers and professors converges yearly for presenting a highly diverse supply of contributions1. Figure 1 shows four examples or real coauthorship networks constructed with data of AAEP annual meetings. The central node of each (star-like) network is the named author. For instance, the coauthorship network of Leonardo Gasparini shows several lines connecting only two nodes (a paper of him and only one coauthor), triangles (a paper with two coauthors), and more complicated forms. In the case of Walter Sosa Escudero’s coauthorship network shows also lineas, triangles, and even a heptagon. This is the case of the largest coauthored paper presented in the AAEP meetings with seven coauthors. 1 Chinchilla-Rodríguez et al. (2012) study a more broad approach to Argentinian scientific authors but focusing on publications in indexed journals. Aguado-López et al. (2009) also find pattern of collaboration among coauthors in Argentina. 2 Figure 1. Examples of AAEP coauthorship networks Coauthorship network of Leonardo Gasparini Coauthorship network of Walter Sosa Escudero Note: Center of the star network is the named author. Source: The Author Other contributions have added information on network of collaboration between economists. Fafchamps et al. (2006) and Goyal et al (2006) present evidence of small world properties in an enormous database of economist contributions. Bukowska et al. (2014) also present a specific study of coauthorship between Polish economists2. These three previous papers focus in structural properties of the network and focus on journal references. The first two conclude, as well as in our case, that the collaboration community of economists represents a small world framework, where most contributors belong to a huge connected component and they coexist with several isolated participants. As shown in Figure 2, the quantity in coauthored contributions in the AAEP Annual Meeting has increased remarkably since the 1990s. Each of the networks depicted in the position upper to the bars represents a ten year window for coauthorship papers. The earliest (network above bars to the extreme left) is for the 60’s, the second for the 70’s, and so on. The last network represent the 5 year- period of 2010-2014. It is clear that networks become larger and more populated. The 90s marks a notorious increment and the last network also shows that the last five years presents a level of activity similar to previous decade in terms of coauthorship. 2 Medical sciences have been prone to use this methodology. Valderrama-Zurián et al. (2007) uses coauthorship network analysis but for a Spanish cardiologist journal and Ramírez Ruiz (2009) for Spanish psychiatrist researchers. González-Alcaide and Navarro-Molina (2008) makes the same approach for reproductive biology's literature. Olmeda‐Gómez et al. (2009) also study Spanish intra and interuniversity and communities coauthorship. Medicis Morel et al. (2009) uses coauthorship for planning purposes in disease prevention. 3 Figure 2. Evolution in the number of coauthorship papers and network of coauthors We want to explore the pattern of co-authorship networks and to describe the collaboration structure between authors, institutions and topics covered by the contributions. We will make use of metrics of social network analysis, from to a network level (structural) and to actor level. We use clustering (indirect approach), graph metrics (such as density, diameter, etc.), centrality indices; cohesion measures (component, cliques)3. A first glance at the data can be observed in Figure 3. The links of three big actors are enlarged in black. 3 Choobdar et al. (2012) use a motif approach for detecting groups in coauthorship networks. 4 Figure 3. Coauthorship network of AAEP Annual Meeting with its three main coauthors remarked (1964-2014) Note: Six main actors labeled and their links are enlarged. Network layout is Harel-Koreln Fast Multiscale (HKFM) 2.1 Methods To undertake this study we identified conference papers published in the AAEP site during 1964-2014. For each paper selected we identified the name and surnames of the authors, as well as their institutional affiliation (institution) and one or two JEL codes of the paper. The network consists in 890 nodes and 1644 edges. We obtained a series of measures to allow for the analysis of structure or social networks. If we take agents (authors or institutions) individually, we present 3 measures of centrality or cohesion that facilitate detailed analysis of the social network studied: degree, and indices of betweenness and closeness. Several social network metrics are employed that enable to measure the characteristics of a network, including components analysis and centrality analysis. Explanations for component analysis and the metrics used are as follows. 5 2.1.1 Component Analysis A component of a network is a substructure in which there is at least a path connecting a node and any other node. A network may include some components which are isolated from each other without any connections. The size of a component indicates the number of nodes it contains. Component analysis is used to study the network structure. The component analysis is employed to study academic circles of the AAEP proceedings in this paper. 2.1.2 Centrality Analysis The earliest pursued category of methodology in the social network analysis is the centrality of individuals and organizations in their social networks. Different kinds of centralities including degree, betweenness and closeness, give rough indications of the social power from several different perspectives of a node based on how well they “connect” the network4. Degree centrality denotes the number of links connected to a node in the network. Important nodes usually have high degree. is the degree of node and is calculated by the equation as follows. where equals 0 or 1, 0 means actor i has no tie with actor j, while 1 means they do have a link. The normalized value of degree centrality of actors in the network can be calculated by the formula as follows. The g represents the total number of the actors in the network. Degree indicates in our case the number of different economists, a specific author or several other authors, that are directly connected with, and is obtained by identifying and subsequently quantifying relationships of coauthorship. It's a measure that reflects the greater or lesser extent of collaboration maintained by authors. Betweenness indicates the extent to which a particular node lies between the various other nodes in the network. For instance, among 3 nodes, A, B and C, A is connected with C and B is connected with C, but no connection exists between A and B. Therefore, C is the key node between A and B when A and B want to connect to each other. The role of broker or gatekeeper is played by the actor with high betweenness who at same time is endowed a potential for control over others. The betweenness centrality of a node in a network is calculated by the following formula. 4 Abbasi et al. (2011) uses these metrics for correlating with coauthor personal academic performance. 6 DiCninDiijijCnXijX1ijDiijXCng The normalized value of the betweenness centrality of a node in a network is calculated by the following formula. Betweenness determines the extent to which an agent is situated in the middle of or between other agents in the network, permitting us to make interconnections. Betweenness measures the prestige of authors and institutions and their capacity to access and control information flow. It is calculated as the sum of the shortest paths between the 2 agents that include between them the agent in question. Eigenvector centrality is calculated by assessing how well connected an individual is to the parts of the network with the greatest connectivity. This information is derived by the eigenvalues of the eigenvector of the adjacency matrix of the network (matrix representation of the graph). Individuals with high eigenvector scores have many connections, and their connections, have many connections as well. The mathematical notion behind eigenvectors is that we can express the matrix of nodes’ connections (adjacency) with a set of characteristic values that are assigned to each individual. Eigenvector centrality scores correspond to the score you get for individuals if you start by constructing the connections node-to-node between all individuals in a network, and then assign a single number to each individual while attempting to keep the distances between these new values equal to the observed distances. Of course this can’t be done with a single numeric value per individual, but in fact you can always represent a set of social connections or distances by assigning as many vectors (strings of numbers for each individual) as there are individuals in the network. High eigenvector centrality individuals are leaders of the network. They are often public figures with many connections to other high-profile individuals. Thus, they often play roles of key opinion leaders and shape public perception. However, these persons are not necessarily associated to another centrality measures (like betweenness and degree). PageRank centrality outputs a probability distribution used to represent the likelihood that by randomly exploring on the links of a network one will arrive to any particular other author. PageRank works by counting the number and quality of links to an author (in our case) to determine a rough estimate of how important the author is. The underlying assumption is that more important authors are likely to receive more links from other coauthors. 7 2BijkijkjkCngng212jkijkjkBigngCngg Figure 4. Total papers presented at the AAEP Annual Meeting (single and coauthored) 2.2 Descriptive Data of the Proceedings As mentioned earlier, the AAEP is the Asociación Argentina de Economía Política (Argentinian Political Economics Association) and congregates most of the professional and academic economists in the country. It has been realized one annual meeting since 1964 in different universities and cities across the country. In 1966 and 1973 the meeting was suspended. As a byproduct of each meeting the association prints the proceedings of each meeting that are actually online. Papers have been primarily single-authored with a decreasing trend. As Figure 4 depicts, most papers were single-authored initially up to mid-seventies but it with the beginning of the nineties where Single authored papers have preeminent in the proceedings of the congress up to 1999 when coauthored contributions surpassed them in quantity. As the ratio Single/Coauthored (S/C) shows in the dashed line coauthorship have been steadily increasing (S/C ratio decreasing) since the 1970s. 2.3 Small world In graph theory, a connected component of an undirected graph (such as our case) is a subgraph (a network inside the network) in which any two vertices are connected to each other by paths (steps of links connecting nodes), and which is connected to no additional vertices in the supergraph (the rest of the network). The whole network has up to 17 connected components but the main component add up the 96% of nodes and 98% of links (see Table 1). This is a case of the small world phenomenon (SWP) with a big connected component that connects most of the nodes. A very simple measure of SWP is that the natural logarithm of the total of nodes (ln(890)=6.74) roughly approximates to the average distance among peers (8.45). The diameter of the larger connected component is high requiring as much as 20 steps for beginning with one 8 node to reach its farthest node. The SWP is the observation that one can find a short chain of colleagues, often of no more than a handful of individuals, connecting almost any two authors on the network. It is equivalent to the statement that most pairs of individuals are connected by a short path through the coauthorship network. Table 1. Graph Metrics of Connected Components Group G1 G2 G3 G4 G5 G6 G7 G8 G9 G10 G11 G12 G13 G14 G15 G16 N 850 5 3 3 3 3 3 2 2 2 2 2 2 2 2 2 UE 1442 10 3 3 3 3 3 1 1 1 1 1 1 1 1 1 EwD 167 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 TE 1609 10 3 3 3 3 3 1 1 1 1 1 1 1 1 1 MGD AGD 20 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 8,45 0,8 0,667 0,667 0,667 0,667 0,667 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 0,5 D 0,004 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 1 0 1 G17 Codification: N = Nodes; UE = Unique edges; EwD = Edges with duplicates; TE = Total edges; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph density (Source: The Author) 0,5 1 1 Another descriptive metric that is interesting to remark is presented in the composite Figure 5. The main figure shows the distribution frequency of the degree among coauthors and the inserted figure represents the same information but in log-log scale. As it’s observed, it is a long tail distribution of degrees (fat-tail distribution). This is an indication for the presence of a structure of diffusion of information congregated in hubs, or persons with many connections that reach farther nodes. A network with fat-tail distribution of degree of nodes has good properties for dissemination of information. 9 Figure 5. Frequency of Degrees and Log-log Representation 2.4 Affiliations Members of the economic community in Argentina work in diverse public and private institutions. These were classified into 19 national universities (Universidad Nacional de Córdoba-UNC-, Universidad Nacional de La Plata –UNLP-, Universidad Nacional del Sur – UNS-, Universidad de Buenos Aires –UBA-, Universidad Nacional de Cuyo –UNCu-, Universidad Nacional de Salta –UNSa-, Universidad Nacional de Rosario –UNR-, Universidad Nacional de Mar del Plata –UNMdP-, Universidad Nacional General Sarmiento –UNGS-, Universidad Nacional del Litoral –UNL-, Universidad Nacional de Río Cuarto –UNRC-, Universidad Nacional de Chilecito -UN Chilecito-, Universidad Nacional de la Patagonia San Juan Bosco –UNPSJB-, Universidad Nacional de San Luis –UNSL-, Universidad nacional de Morón –UNaM-, Universidad Nacional del Centro de la Provincia de Buenos Aires –UNCPBA- , Universidad Nacional de Quilmes –UNQ-, Universidad Nacional de Tucumán –UNSTA-, Universidad Nacional de San Martín –UNSAM-), 9 private universities (Universidad del CEMA –UCEMA-, Universidad de San Andrés –UDESA-, Universidad Torcuato Di Tella –UTDT-, Universidad Argentina de la Empresa –UADE-, Universidad Católica Argentina –UCA-, Universidad Austral –Uaustral-, Universidad de Belgrano –UB-, Universidad Empresarial Siglo 21 -UES21-, Universidad Católica de Santa Fé –UCSF-), several Private/Public Research Center, Foreign Universities, State Entities (ministries and the like), Private/Public Bank, International Entities (UN, CEPAL, among others). Figure 6 shows up the clusters detected by affiliation. Clusters are presented in circular network layout and the thinner links represent intra- group coauthorship and broader links represent extra-group coauthorship. The size of each circle network makes it easy to grasp what affiliations are more prominent than other. 10 Figure 6. Cluster by affiliation 2.4.1 Structural metrics As Table 2 shows up the larger affiliation that engenders coauthorship to the meetings is UNC with 130 coauthors followed in sharp difference by the UNL and UNS, 42 and 44 coauthors below respectively. Table 2. Cluster metrics of groups with more than 20 nodes Label N UE EwD TE CC SVCC MVCC MECC MGD AGD D UNC 130 226 UNLP UNS 88 86 116 155 46 17 6 272 133 161 4 12 3 11 2 9 2 125 269 10 4,23 0,030 73 84 126 161 8 8 3,54 0,032 3,85 0,043 Foreign University Public/Pri vate Research Central/Pr ivate Bank UCEMA UDESA UNT State Entity UBA UNCu UTDT UNSa 63 33 57 31 0 0 33 39 28 31 31 20 41 50 18 68 11 38 34 34 29 29 27 24 22 38 17 40 20 17 30 13 28 2 0 2 2 0 0 4 4 40 17 42 22 17 30 17 32 12 20 8 16 15 6 12 2 7 9 14 5 10 10 4 9 1 7 7 9 7 27 64 21 8 25 5 7 21 11 21 31 10 40 7 9 29 15 32 3 4 5 7 4 8 2 2 8 5 5 1,08 0,017 1,22 0,019 2,23 0,071 2,88 0,055 1,60 0,030 3,37 0,073 0,81 0,052 1,21 0,042 3,29 0,085 2,14 0,054 2,57 0,130 Codification: N = Nodes; UE = Unique edges; EwD = Edges with duplicates; TE = Total edges; CC = Connected components; SVCC = Single-Vertex connected components; MVCC = Maximum vertices in a connected component; MECC = Maximum edges in a connected component; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph density (Source: The Author) After metrics have been estimated we obtain the correlations between them. Table 3 shows the correlation matrix. The size of the cluster (N) is highly correlated with the presence of unique edges (UE) and total edges (TE) for one side, and maximum vertices (MVCC) and edges (MECC) in a connected component, for the other side. The five metrics are logically correlated with the size of the cluster given that larger number of coauthors requires more links and vertices. Density (D) is slightly negative correlated with almost all metrics except with those related to diameter (MGD, AGD). Edges with duplicates (EwD), that represent repeated coauthorships, are also related with the size (N, TE, UE, MVCC, MECC) of the cluster, Table 3. Correlations among cluster metrics N UE EwD TE CC SVCC MVCC MECC MGD AGD D N UE TE CC 1 0,935 1 EwD 0,780 0,838 1 1 0,930 0,996 0,885 -0,062 -0,402 -0,373 -0,406 1 1 1 1 1 SVCC -0,062 -0,402 -0,383 -0,408 0,995 MVCC 0,890 0,988 0,842 0,986 -0,508 -0,502 MECC 0,893 0,990 0,883 0,995 -0,490 -0,489 0,993 MGD 0,567 0,714 0,572 0,707 -0,618 -0,597 0,777 0,742 12 AGD D 0,538 0,732 0,569 0,721 -0,736 -0,710 0,808 0,769 0,974 1 -0,525 -0,267 -0,147 -0,252 -0,632 -0,633 -0,168 -0,179 0,124 0,224 1 Source: The Author 3. Network of Coauthors When analyzing important actors in the coauthorship sample we estimated actor’s centralities. Gender differences emerge. Figure 7 shows the difference in size in male vs. female coauthorship network. Figure 7. Male and Female Coauthorship Sub-Networks a) Male coauthorship network b) Female coauthorship network Source: The Author A way to notice another gender differences we can anticipate that most centrality calculations sensitively differ when considering male or female coauthorship subnetwork5. For instance, Table 4 shows the deviations from the mean in centralities between genders. Male coauthors surpass female colleagues in all centrality measures. Female, on the other hand, shows a slightly upper estimation for clustering coefficient. That would mean women tend to join papers with more coauthors. 5 Yan et al. (2009) use centrality measures for estimating the impact of their publication. 13 Table 4. Mean Deviations of each Metric by Gender Betweenness Degree Centrality Closeness Centrality Eigenvector Centrality PageRank Clustering Coefficient Male Female 3,1% -6,4% 18,2% -37,0% 5,0% -10,9% 18,9% -38,6% 4,4% -8,9% -6,0% 12,3% Sample: Female: 279 individuals, Male: 566 individuals. Source: The Author Before getting into individual actor analysis, we can observe in Figure 8 a matrix of scatterplots between estimated full sample centralities. At first glance, PageRank and degree show a remarkably correlation with a less clear image in the case of betweenness and PageRank and degree. That is to say, actors with high degree tend to have high PageRank and in some cases high betweenness. Figure 8. Matrix of Scatterplots of Coauthor Centralities 14 DegreeBetweennessClosenessEigenvectorPageRank010203001020300500001000000500001000000.510.510.02.040.02.0402460246 Having shown this difference among economists by gender, it is plausible to see more male economists in the top of centrality measures. The following tables will remark this fact. In the top ten considering the entire sample, given the gender gap presented in Table 4, we will observe mostly male economist. So Table 6 to Table 8 show maxima from sample and for male economists at the same time (with some exceptions visible in the table). Table 5 shows up actors with the larger betweenness centrality. Fernando Navajas and Santiago Urbiztondo (both from UCEMA). This centrality remarks economists that tend to connect groups otherwise disconnected. Table 5. Top Ten Betweenness Centrality Authors Author Degree Betweenness Affiliation Navajas, Fernando H. Urbiztondo, Santiago Abdala, Manuel Angel Spiller, Pablo T. Heymann, Daniel Sosa Escudero, Walter Arrufat, José Luis Porto, Alberto Tohmé, Fernando Canavese, Alfredo Juan 13 114033,23 FIEL 6 5 2 19 23 19 19 15 12 88394,89 UCEMA 87869,3 86203,3 85440,2 69798,03 69434,26 68620,18 48178,99 46950,28 UNC UDESA UBA UDESA UNC UNLP UNS UTDT In the cases of degree and eigenvector centralities, Table 6 shows that Leonardo Gasparini (UNLP) has the maximum degree and has the second maximum Walter Sosa Escudero (UNLP and UDESA). This order is reversed when considering eigenvector centrality, where Sosa Escudero has the maximum followed by Gasparini. Higher degree points to coauthor having worked with more other coauthors and eigenvector points out to coauthor having worked with more important (in terms of degree) other coauthors. Table 6. Top Ten Eigenvector Centrality Authors Author Degree Eigenvector Affiliation 23 28 15 19 11 11 9 6 6 6 Sosa Escudero, Walter Gasparini, Leonardo Marchionni, Mariana Porto, Alberto Streb, Jorge Druck, Pablo Rodriguez, Carlos A. Bolzico, Javier Henke, Alejandro Rutman, José UDESA UNLP UNLP UNLP UCEMA Fundación del Tucumán UCEMA UCEMA UCEMA BCRA 0,041 0,04 0,027 0,019 0,019 0,019 0,018 0,017 0,017 0,017 15 PageRank centrality metric highlights authors that are more solicited by other coauthors for producing contributions. Popular authors emerge clearly with this metric, and again, Gasparini (UNLP) and Sosa Escudero (UDESA) jointly with Carrera (UNLP-BCRA) seem to be the most popular coauthors in the event. Table 7. Top Ten PageRank Centrality Authors Author Degree PageRank Affiliation Gasparini, Leonardo Carrera, Jorge Sosa Escudero, Walter Porto, Alberto Heymann, Daniel Gertel, Héctor Galperín, Carlos D´Amato, Laura Arrufat, José Luis Dabús, Carlos 28 20 23 19 19 22 15 20 19 16 6,289 5,227 5,221 4,783 4,766 4,689 4,372 4,269 4,089 4,004 UNLP UNLP UDESA UNLP UBA UNC UBA BCRA UNC UNS It is fair to remark that Sosa Escudero is the coauthor that emerges as the only economist in the Top 10 of all centralities as observed in all the aforementioned tables. Now let’s focus on the gender gap. Tables 9 to 12 show the centrality metrics for female coauthor subnetwork. Specifically, Table 8 shows the top ten female economists sorted by degree. Heading the list are two BCRA economists: Laura D’Amato and Tamara Burdisso. Table 8. Top Ten Degree Centrality Female Coauthors Author Degree Affiliation D´Amato, Laura Burdisso, Tamara Marchionni, Mariana Moscoso, Nebel London, Silvia 20 BCRA 17 BCRA 15 UNLP 15 UNS 12 UNS Picardi de Sastre, Marta Susana 12 UNS Cerro, Ana María Paz Terán, Corina Conte Grand, Mariana Recalde, Maria Luisa 12 UNT 11 UNT 9 UCEMA 9 UNC 16 Table 9 shows a different picture in the top ten of the women economist having the highest betweenness centrality metrics. Corina Paz Terán from UNT and Iris Perlbach de Maradona (UNCu) are first and second, respectively. It is interesting to note that more than half of the main female brokers in the network are from universities of the interior of the country. That would mean that women tend to connect groups geographically disconnected. Table 9. Top Ten Betweenness Centrality Female Coauthors Vertex Degree Centrality Affiliation Betweenness Paz Terán, Corina Perlbach de Maradona, Iris Sarquis, Liliana Juárez de Perona, Hada London, Silvia Navarro, Ana Inés D' Elia, Vanesa Conte Grand, Mariana Burdisso, Tamara Cerro, Ana María 11 7 7 5 12 5 6 9 17 12 41.468 32.301 31.609 31.321 23.854 23.124 UNT UNCu UNC UNC UNS UNR 21.328 ANSES 19.200 UCEMA 17.797 16.327 BCRA UNT In Table 10 we present results from eigenvector centrality estimation. This time, emerge Mariana Marchionni (UNLP) and Hildegart Ahumada (UTDT) as the two more important nodes. It is worthy to note that Ahumada has less than half that Marchionni’s eigenvector centrality and, as noted earlier, Marchionni has only the 65% of the same metric compared to maximum male economist. All of the female economists in the top 10 are affiliated to institution from the Buenos Aires Province. Table 10. Top Ten Eigenvector Centrality Female Coauthors Author Marchionni, Mariana Ahumada, Hildegart D´Amato, Laura Alzúa, María Laura Gabrielli, María Florencia Burdisso, Tamara Serio, Monserrat Edo, María Viollaz, Mariana Conconi, Adriana Degree Eigenvector Centrality Affiliation 15 9 20 7 8 17 4 3 4 3 0,027 0,012 0,009 0,009 0,009 0,008 0,008 0,007 0,006 0,006 UNLP UTDT BCRA UNLP BCRA BCRA UNLP UCEMA UNLP CEDLAS 17 Finally, Table 11 displays the top ten female economists according to PageRank centrality. This metric is also highly correlated with degree in the female subnetwork, so it is unsurprisingly similar to Table 8. D’Amato and Burdisso are the most central economist given by this metric but it is interesting to note that more than half of the top ten are economist from the interior of the country. Table 11. Top Ten PageRank Centrality Female Coauthors Author Degree PageRank Affiliation D´Amato, Laura Burdisso, Tamara Cerro, Ana María Marchionni, Mariana Moscoso, Nebel London, Silvia Conte Grand, Mariana Paz Terán, Corina Bergés, Miriam 20 17 12 15 15 12 9 11 9 4,269 BCRA 3,46 3,441 3,293 3,19 2,921 BCRA UNT UNLP UNS UNS 2,707 UCEMA 2,626 UNT 2,45 UNMdP Picardi de Sastre, Marta Susana 12 2,352 UNS 4. Network of JEL categories Each co-authored contribution is classified according to, at least, one or two JEL codes. This facilitates analyzing what topics is co-present in the economic community that co-authored papers in the AAEP event. We link each paper by the coincidence of its two JEL codes this way providing a picture of the topics that are shared by the contributions. The thematic network has 109 nodes and 451 unique links and 34 self-loop links. The density of the graph is 0.071 and exhibit one connected component. The diameter of the network is 6 with an average geodesic distance of 2.6. We calculate the random walk closeness and betweenness centralities because of the presence of self-loop in the data (Newman (2005)). Actually both centralities are highly correlated (correlation of .98). Figure 9 show the JEL code network. Clusters were made by grouping contributions within each general category (only first letter). Clusters are displayed in circular network. Slimmer links represent intra-cluster links and broader links represent extra-cluster links. 18 Figure 9. Clustering by JEL category Again as in the previous section a descriptive metric about the diffusion property of the network is presented in the composite Figure 10. The main figure shows the distribution frequency of the degree among coauthors and the inserted figure represents the same information but in log-log scale. As observed, it appears to have a long tailed distribution of degrees as in Figure 5. This is too an indication for the presence of a structure of diffusion of information congregated in hubs, or persons with many connections that reach farther nodes. A network with fat-tail distribution of degree of nodes has good properties for dissemination of information. 19 Figure 10. Frequency of Degrees and Log-log Representation Network metrics of the cluster by one-letter JEL code network are presented in Table 12. The three larger clusters (higher N) correspond to C (Mathematical and Quantitative Methods), D (Microeconomics) and L (Industrial Organization). The higher density (D) in E (Macroeconomics and Monetary Economics) implies that macroeconomists tend to repeat the code. The highest diameter (MGD) in C (Mathematical and Quantitative Methods) and O (Economic Development, Technological Change, and Growth) implies that both JEL codes are related to other far diverse JEL codes across contributions. A (General Economics, Handbooks and Teaching), M (Business Administration and Business Economics; Marketing; Accounting), P (Economic Systems), and Z (Other Special Topics) are isolated codes barely used by authors. Table 12. Network metrics for JEL codes network N TE SL CC SVCC MVCC MECC MGD AGD D 2 3 10 10 0 2 13 8 7 14 0 1 3 4 3 2 2 2 6 1 2 1 1 4 0 1 2 9 4 7 20 0 1 13 5 14 0 1 4 3 2 - - 0,40 0,33 1,93 0,22 1,00 0,09 1,27 0,52 JEL Code A B C D E F G H I J K L M N O P Q R Z 6 4 9 4 8 4 10 2 7 6 4 6 6 1 10 5 11 6 15 2 7 0 3 6 0 7 2 0 4 3 3 3 4 1 0 0 2 1 0 1 1 0 2 2 3 1 2 3 3 2 6 1 4 1 5 1 1 1 2 0 1 2 1 2 5 0 4 0 4 1 5 3 7 4 7 2 5 1 2 6 1 6 2 1 10 5 11 6 15 2 4 0 1 6 0 7 2 0 2 2 3 2 2 1 3 0 1 4 0 3 1 0 1,12 0,40 0,89 0,33 1,63 0,22 1,13 0,50 1,27 0,39 0,50 0,17 1,37 0,16 - - 0,33 0,05 1,72 0,33 - - 1,44 0,40 0,50 0,07 - - Labels: A – General Economics, Handbooks and Teaching; B – History of Economic Thought, Methodology, and Heterodox Approaches; C – Mathematical and Quantitative Methods; D – Microeconomics; E – Macroeconomics and Monetary Economics; F – International Economics; G – Financial Economics; H – Public Economics; I – Health, Education, and Welfare; J – Labor and Demographic Economics; K – Law and Economics; L – Industrial Organization; M – Business Administration and Business Economics; Marketing; Accounting; N – Economic History; O – Economic Development, Technological Change, and Growth; P – Economic Systems; Q – Agricultural and Natural Resource Economics; Environmental and Ecological Economics; R – Urban, Rural, and Regional Economics; Z – Other Special Topics. Codification: N = Nodes; SL = Self-Loops; TE = Total edges; CC = Connected components; SVCC = Single-Vertex connected components; MVCC = Maximum vertices in a connected component; MECC = Maximum edges in a connected component; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph density (Source: The Author) The correlation table of these variables is showed in Table 13. It shows that the size of the cluster (N) is not only highly correlated with the number of edges (TE), maximum number of vertices (MVCC) and diameter (MGD). This means that clusters with high number of JEL code links end up connecting more other JEL code contributions. The high correlation between self- loops (SL) and total edges (TE) take into account the repetitiveness of collaborations between same authors. Density (D), on the other hand, is negatively correlated with single vertex components (SVCC) and positively correlated with maximum edges in component, in both cases in an obvious manner. 21 Table 13. Correlation table for JEL codes network metrics N TE SL CC SVCC MVCC MECC MGD AGD D N 1,00 TE 0,75 1,00 SL 0,55 0,78 1,00 CC 0,37 -0,19 0,08 1,00 SVCC 0,10 -0,40 -0,10 0,94 1,00 MVCC 0,75 0,93 0,61 -0,29 -0,49 1,00 MECC 0,64 0,98 0,76 -0,31 -0,47 0,93 1,00 MGD 0,78 0,73 0,51 -0,12 -0,39 0,87 0,67 1,00 AGD 0,75 0,84 0,57 -0,26 -0,51 0,95 0,82 0,96 1,00 D 0,22 0,67 0,58 -0,56 -0,73 0,64 0,70 0,53 0,66 1,00 Codification: N = Nodes; SL = Self-Loops; TE = Total edges; CC = Connected components; SVCC = Single-Vertex connected components; MVCC = Maximum vertices in a connected component; MECC = Maximum edges in a connected component; MGD = Maximum geodesic distance (diameter); AGD = Average geodesic distance; D = Graph density (Source: The Author) Trade (F1) and Welfare and Poverty (I3) are jointly the most chosen JEL codes (higher degree). However, Economic Development (O1) is the pivotal topic of the contributions having both maximum centrality in random walk closeness and betweenness followed by Trade. The code associated to most referenced codes is Econometric Methods (C2) with the higher value in eigenvector centrality. Table 14. Centralities the JEL Codes of Coauthored Papers (sorted by degree) Code-Area F1 – Trade I3 – Welfare and Poverty C2 – Econometric methods: Single equation models; Single variables Q1 – Agriculture E3 – Prices, Business Fluctuations, and Cycles C1 – Econometric and Statistical Methods: General I1 – Health C4 – Econometric and Statistical Methods: Special Topics C6 – Mathematical Methods; Programming Models; Mathematical and Simulation Modeling E2 – Macroeconomics: Consumption, Saving, Production, Employment, and Investment RW- Closeness Centrality Eigenvector Centrality 4,01 1,3 1,27 0,97 1,87 2,31 1,63 2,21 2,01 1,83 3,0 3,0 3,4 2,4 3,1 2,5 2,0 2,3 2,2 2,6 PageR ank 2,895 2,889 2,608 2,749 2,37 2,226 2,421 2,23 2,164 2,013 RW- Degree Betweenness Centrality 24,701 9,814 8,87 7,362 12,068 14,708 9,999 15,084 12,829 12,072 26 26 25 24 23 21 21 20 20 20 22 O4 – Economic Growth and Aggregate Productivity C3 – Econometric Methods: Multiple or Simultaneous Equation Models G2 – Financial institutions and Services H7 – State and Local Government; Intergovernmental Relations O1 – Economic development F4 – Macroeconomic Aspects of International Trade and Finance E5 – Monetary Policy, Central Banking, and the Supply of Money and Credit I2 – Education 18 17 17 17 17 16 15 15 8,114 23,75 6,797 0,956 26,196 3,778 0,391 14,515 1,3 2,84 1,12 0,16 2,87 0,58 0,07 2,05 2,1 2,3 2,2 1,6 2,0 2,2 2,1 1,8 2,113 1,81 1,747 2,019 1,782 1,634 1,485 1,563 Bold figures represent maximum values in each variable. RW-Betweenness Centrality means random walk betweenness and RW-Closeness means random walk closeness. Eigenvector centrality is the original metric multiplied by 100. The analysis of the interaction between the centralities published in Table 14 was made by observing scatter plots viz a viz each pair of centralities. A general positive relation among all centralities is observed, in some cases clearer than in other, as seen in Figure 11. Figure 11. Matrix of Scatter Plots of JEL Codes Centralities 23 DegreeRW-BetweennessEigenvectorCentralityPageRankRW-Closeness01020300102030010203001020300.02.040.02.04012301230.02.040.02.04 All this information is summarizes in the correlation matrix of Table 15. Random walk betweenness and closeness show high correlation meaning that codes more regularly used are close one to the other and they are also the codes that unifies otherwise separate clusters of topics. On the other hand, degree and PageRank and eigenvector also show high correlation, meaning that highly used topics are also more popular directly and indirectly. Table 15. Correlation matrix of centralities Degree RW-Betweenness Eigenvector PageRank RW-closeness Degree RW-Betweenness Eigenvector PageRank RW-closeness 1 0,655 0,966 0,991 0,683 1 0,657 0,641 0,982 1 0,938 0,685 1 0,671 1 4.1 K-cores A k-core in an undirected network is a connected maximal induced subgraph which has minimum degree greater than or equal to k. Moreover in our case, a k-core is a maximal group of JEL codes, all of whom are connected to some number (k) of other codes of the group. The coreness score is the maximum value of k for which it is in a k-core. In our case, the 7-core is the maximum value for k. It means that it takes to sever 7 links for any of the members of the core for disconnecting it off the group. Figure 12 shows the subgraph representing the 7-core. The red links are for the four JEL codes with the highest eigenvector centrality: C2 (Econometric methods: Single equation models; Single variables), E3 (Prices, Business Fluctuations, and Cycles), I3 (Welfare and Poverty), and F1 (Trade). 24 Figure 12. 7-core of the network of JEL Codes In Table 16 we publish the description of the codes for a better intuition about the relatedness of the connections. If we focus on Figure 12 we defined that broader links represent repeated interactions. In this case, at a glance, it seems that C2 and C4 interacts repeatedly with I2. So studies on Education have been supported by empirical evidence analyzed by econometric methods. It also can be noticed that Q1 and C6 are tagged jointly several times, grouping Agriculture studies with mathematical methods. C3 and O4 (with I3) are also jointly marked, given the idea that econometric methods also support evidence on growth poverty studies. A more powerful relation is show between more obviously I3 and D3 where poverty and distributional studies come together. F1 are often related to C2, C6 and Q1, meaning that trade studies have been supported by econometrics and many times focused on agricultural markets. Summarizing, this 7-core indicates a group of highly interconnected topics that are frequently and jointly tagged among the contributions presented in the meeting. 25 Table 16. 7-core of JEL codes description Code C1 – Econometric and Statistical Methods: General C2 – Econometric methods: Single equation models; Single variables C3 – Econometric Methods: Multiple or Simultaneous Equation Models C4 – Econometric and Statistical Methods: Special Topics C6 – Mathematical Methods; Programming Models; Mathematical and Simulation Modeling D3 – Distribution E2 – Macroeconomics: Consumption, Saving, Production, Employment, and Investment E3 – Prices, Business Fluctuations, and Cycles E4 – Money and Interest Rates E5 – Monetary Policy, Central Banking, and the Supply of Money and Credit F1 – Trade F3 - International Finance F4 – Macroeconomic Aspects of International Trade and Finance G1 – General Financial Markets G2 – Financial institutions and Services H5 – National Government Expenditures and Related Policies H7 – State and Local Government; Intergovernmental Relations I1 – Health I2 – Education I3 – Welfare and Poverty J0 – Labor and demographic economics - General J1 – Demographic Economics J2 – Time Allocation, Work Behavior, and Employment Determination and Creation; Human capital J6 – Mobility, Unemployment, and Vacancies L6 – Industry Studies: Manufacturing O1 – Economic development O3 – Technological Change; Research and Development O4 – Economic Growth and Aggregate Productivity Q1 – Agriculture R1 – General Regional economics Source: The Author 5. Conclusions We have presented data and analysis of coauthorship related to the state of the Economics profession in Argentina. We focused our effort in an annual congress where the majority of the community of economists in the country sends its production regularly. In this paper, we pave the way to study the impact of certain measures, such as centralities, densities, degree distributions, gender, location and affiliation in the production of economic contributions. The general features of the networks suggest promotes diffusion and several actors emerge as hubs of prestige. A thematic network is constructed by using the JEL codes (at most two for paper). We find a cluster of repeatedly tagged codes of 30 JEL Codes up to the first digit. It shows the importance of econometrics and mathematic models a supportive discipline of other more 26 theoretical areas such agricultural economics, distributive and educational studies, trade and economic growth and development. This is a first approach to the data and we think it opens a gate for study how the discipline has been evolved in Argentina at the main national event. References Abbasi, A., J. Altmann, and L. Hossain (2011), “Identifying the Effects of Co-Authorship Networks on the Performance of Scholars: A correlation and Regression Analysis of Performance Measures and Social Network Analysis Measures”, TEMEP Discussion Paper No. 2011:76. Aguado-López, E., R. Rogel-Salazar, G. Garduño-Oropeza, A. Becerril-García, M. F. Zúñiga- Roca, and A. Velázquez-Álvarez (2009), “Patrones de colaboración científica a partir de redes de coautoría”. Convergencia Número Especial IA: 225-258. Amblard, F., A. Casteigts, P. Flocchini, W. Quattrociocchi, and N. Santoro (2011), “On the Temporal Analysis of Scientific Network Evolution”, International Conference on Computational Aspects of Social Networks (CASoN): 169 – 174 [DOI: 10.1109/CASON.2011.6085938] Barabási, A. L., Jeong, H., Neda, Z., Ravasz, E., Schubert, A., and Vicsek, T. (2002). “Evolution of the social network of scientific collaborations”. Physica A, 311(3-4), 590- 614. Belik, I. and K. Jornsten (2014), “The Coauthorship Network Analysis of the Norwegian School of Economics”, Discussion Paper 20, Norwegian School of Economics (NHH). Borracci, R.A., H.C. Doval, D. Manente, and C.D. Tajer (2009). “Redes de colaboración científica en las publicaciones cardiológicas argentinas” Revista Argentina de Cardiología, 77 (6): 487-492. Brandao, M.A. and M.M. Moro (2012) “Affiliation Influence on Recommendation in Academic Social Networks” Proceedings of the AMW. Bukowska, G., J. Falkowski, and B. Lopaciuk-Gonczaryk (2014) “Teaming up or writing alone - authorship strategies in leading Polish economic journals” Working Papers 2014-29, Faculty of Economic Sciences, University of Warsaw. Chinchilla-Rodríguez, Z., A. Ferligoj, S. Miguel, L. Kronegger, and F. de Moya-Anegón (2012), “Blockmodeling of co-authorship networks in library and information science in Argentina: A case study”, Scientometrics 93(3): 699-717. Choobdar, S., P. Ribeiro, S. Bugla, and F. Silva (2012), “Comparison of co-authorship networks across scientific fields using motifs” IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 27 Cotta, C. and J-J. Merelo (2005), “The Complex Network of Evolutionary Computation Authors: an Initial Study”, arXiv:physics/0507196v2 [physics.soc-ph] Day, M.-Y. and S.-P. Shih (2011) "Understanding scientific collaboration with social network analysis," The 17th Cross-Strait Conference on Information and Management (CSCIM 2011), 20, Jul 2011, Beijing, China. Ding, Y. (2011). “Scientific collaboration and endorsement: Network analysis of coauthorship and citation networks”, Journal of Informetrics 5(1): 187–203. [DOI:10.1016/j.joi.2010.10.008] Erfanmanesh, M., V.A. Rohani, and A. Abrizah (2012), “Co-authorship network of scientometrics research collaboration”, Malaysian Journal of Library & Information Science 17(3): 73-93. Erman, N. and L. Todorovski (2009), “Mapping the E-Government Research with Social Network Analysis”, Lecture Notes in Computer Science 5693: 13-25 Fafchamps, M., M. van der Leij, and S. Goyal (2006), “Scientific Networks and Co-authorship”, Working Paper No. 256, Department of Economics, University of Oxdord. González-Alcaide, G. and C. Navarro-Molina (2008), “Coauthorship networks and institutional collaboration patterns in reproductive biology” Fertility and Sterility 90 (4): 941-956. Goyal, S., M.J. van der Leij, and J.L. Moraga-González (2006) “Economics: An Emerging Small World”, Journal of Political Economy 114 (2): 403-412. Jahn, N. (2008), “The methodological status of co-authorship networks”, Fourth International Conference on Webometrics, Informetrics and Scientometrics & Ninth COLLNET Meeting, Berlin, 28 July - 1 August 2008. Kurosawa T. and Y. Takama (2012), “Co-Authorship Networks Visualization System for Supporting Survey of Researchers’ Future Activities”, Journal of Emerging Technologies in Web Intelligence 4 (1): 3-14 [doi:10.4304/jetwi.4.1.3-14] Liu, X., J. Bollen, and M. L. Nelson (2005), “Co-authorship networks in the digital library research community”, Information Processing and Management 41: 1462–1480. Maia, G., P. O.S. Vaz de Melo, D.L. Guidoni, F. S.H. Souza, T.H. Silva, J.M. Almeida and A.A.F. Loureiro (2013), “On the Analysis of the Collaboration Network of the Brazilian Symposium on Computer Networks and Distributed Systems”, Journal of the Brazilian Computer Society 19 (3): 361-382 Medicis Morel, C., S. Jacob Serruya, G. Oliveira Penna and R. Guimaraes (2009), “Co- authorship Network Analysis: A Powerful Tool for Strategic Planning of Research, Development and Capacity Building Programs on Neglected Diseases”, PLOS Neglected Tropical Diseases 3(8): e501. [DOI:10.1371/journal.pntd.0000501] Murray, C., W. Ke and K. Borner (2006), “Mapping Scientific Disciplines and Author Expertise Based on Personal Bibliography Files”, Tenth International Conference Information Visualization: 258-263 [DOI: 10.1109/IV.2006.73] 28 Nascimento, M. A., Sander, J., and Pound, J. (2003). “Analysis of SIGMOD’s coauthorship graph”. SIGMOD Record, 32(3), 8-10. Newman, M. E. J. (2001a). “Scientific collaboration networks: I. Network construction and fundamental results”. Physical Review E, 64, 016131. Newman, M. E. J. (2001b). “The structure of scientific collaboration networks”. Proceedings of the National Academy of Science of the United States of America, 98(2), 404-409. Newman, M. E. J. (2003). “The structure and function of complex networks”. SIAM Review, 45(2), 167-256. Newman, M. E. J. (2005). “A measure of betweenness centrality based on random walks”. Social Networks, 27, 39-54. Olmeda‐Gómez, C., A. Perianes‐Rodriguez, M. A. Ovalle‐Perandones, V.P. Guerrero‐Bote, and F. de Moya Anegón (2009), “Visualization of scientific co‐authorship in Spanish universities: From regionalization to internationalization” Aslib Proceedings 61 (1): 83- 100. Paredes, A. (2011). “Publicaciones y militancia político-religiosa latinoamericana. Las redes de coautoría de Mauricio Ignacio Ellacuría en las publicaciones de la editorial Tierra Nueva (década de 1970)”. Cuadernos del CILHA 12 (14): 173-192. Ramírez Ruiz, L. (2009). “Campo científico y redes de coautoría en la psiquiatría. La producción científica psiquiátrica mexicana sobre el trastorno de la personalidad”, REDES- Revista hispana para elanálisis de redes sociales 19 (2) [DOI: http://dx.doi.org/10.5565/rev/redes.255] Rodriguez, M.A. and A. Pepe (2008), “On the relationship between the structural and socioacademic communities of a coauthorship network”, Journal of Informetrics 2 (3): 195-201, [DOI:10.1016/j.joi.2008.04.002] Rumsey, A.R. (2006), “The Association Between Co-authorship Network Structures and Successful Academic Publishing Among Higher Education Scholars” All Theses and Dissertations. Paper 790. Uddin, S., L. Hossain, A. Abbasi and K. Rasmussen (2012), “Trend and efficiency analysis of co-authorship network”, Scientometrics 90 (2): 687-699 Valderrama-Zurián, J.C., G. González-Alcaide, F.J. Valderrama-Zurián, R. Aleixandre- Benaventa, and A. Miguel-Dasitc (2007). “Redes de coautorías y colaboración institucional en Revista Española de Cardiología”, Revista Española de Cardiología 60 (2):117-30 [DOI: 10.1157/13099458] Vargas- Quesada, B., D. Minguillo, Z. Chinchilla-Rodríguez and F. de Moya-Anegón (2010), “Estructura de la colaboración científica española en Biblioteconomía y Documentación (Scopus 1999-2007)”, Revista Interamericana de Bibliotecología 33 (1): 105-123. 29 Yin, L., Kretschmer, H., Hanneman, R. A., and Liu, Z. (2006). “Connection and stratification in research collaboration: An analysis of the COLLNET network”. Information Processing and Management, 42, 1599-1613. Yan, E. and Y. Ding (2009), “Applying centrality measures to impact analysis: A coauthorship network analysis”. Journal of the American Society for Information Science and Technology 60 (10): 2107–2118. [DOI: 10.1002/asi.21128] 30
1111.2018
1
1111
2011-11-08T19:12:43
Intrinsically Dynamic Network Communities
[ "cs.SI", "physics.soc-ph" ]
Community finding algorithms for networks have recently been extended to dynamic data. Most of these recent methods aim at exhibiting community partitions from successive graph snapshots and thereafter connecting or smoothing these partitions using clever time-dependent features and sampling techniques. These approaches are nonetheless achieving longitudinal rather than dynamic community detection. We assume that communities are fundamentally defined by the repetition of interactions among a set of nodes over time. According to this definition, analyzing the data by considering successive snapshots induces a significant loss of information: we suggest that it blurs essentially dynamic phenomena - such as communities based on repeated inter-temporal interactions, nodes switching from a community to another across time, or the possibility that a community survives while its members are being integrally replaced over a longer time period. We propose a formalism which aims at tackling this issue in the context of time-directed datasets (such as citation networks), and present several illustrations on both empirical and synthetic dynamic networks. We eventually introduce intrinsically dynamic metrics to qualify temporal community structure and emphasize their possible role as an estimator of the quality of the community detection - taking into account the fact that various empirical contexts may call for distinct `community' definitions and detection criteria.
cs.SI
cs
Intrinsically Dynamic Network Communities Bivas Mitraa,d, Lionel Tabourierb,d, Camille Rotha,c,d aInstitut des Syst`emes Complexes-Paris-Ile-de-France, 57 rue Lhomond, F-75005 Paris bLIP6, Universit´e Pierre et Marie Curie, 4 place Jussieu, F-75005 Paris cCAMS, CNRS/EHESS, 190 avenue de France, F-75013 Paris dCREA, CNRS/Ecole Polytechnique, 42 bd Victor, F-75015 Paris Abstract Community finding algorithms for networks have recently been extended to dynamic data. Most of these recent methods aim at exhibiting commu- nity partitions from successive graph snapshots and thereafter connecting or smoothing these partitions using clever time-dependent features and sam- pling techniques. These approaches are nonetheless achieving longitudinal rather than dynamic community detection. We assume that communities are fundamentally defined by the repetition of interactions among a set of nodes over time. According to this definition, analyzing the data by con- sidering successive snapshots induces a significant loss of information: we suggest that it blurs essentially dynamic phenomena -- such as communities based on repeated inter-temporal interactions, nodes switching from a com- munity to another across time, or the possibility that a community survives while its members are being integrally replaced over a longer time period. We propose a formalism which aims at tackling this issue in the context of time-directed datasets (such as citation networks), and present several illus- trations on both empirical and synthetic dynamic networks. We eventually introduce intrinsically dynamic metrics to qualify temporal community struc- ture and emphasize their possible role as an estimator of the quality of the community detection -- taking into account the fact that various empirical contexts may call for distinct 'community' definitions and detection criteria. Keywords: community quality metrics community detection, dynamic networks, citation networks, ✩ All authors contributed equally to the manuscript. Preprint submitted to Computer Networks October 5, 2018 1. Introduction The detection of groups from structural interaction datasets has generated a tremendous amount of literature over the past decade [for a recent and comprehensive review, see 1]. These methods essentially aim at partitioning nodes into "communities" in such a way that the density of links within communities is higher than the density of links between them -- thereby adopting one possible structural definition of social communities, that "its members should have many relations with each other and few with non- members" [2, p. 121]. Most corresponding studies are primarily featuring static community finding algorithms, i.e. relying on networks as static graphs, either derived from aggregation of data over the whole crawling period or from a snapshot at a particular point in time -- which is essentially the same. Emphasizing the fact that real-world communities are also time-evolving, a more recent stream of research endeavored at describing the dynamics of such communities [3 -- 19]. In this portion of the literature, communities and their evolution are however being studied in a somewhat independent man- ner: communities are separately extracted from several snapshots and then time-dependent characteristics are introduced to smooth potential differences between the various partitions over time, or to connect various partitions in order to have inter-temporally linked communities. In other words, these approaches are rather proposing a longitudinal community detection. Such methodology may however become inappropriate if some intricate temporal relationships occur, in particular if some nodes which were part of a community at some point are not anymore at a later point in time, while the "underlying group" remains -- e.g. an association, a lab, a company which survives through time without depending on a specific set of perma- nent members.1 More broadly, our first assumption is that communities are fundamentally defined by a certain amount of interaction recurrence among a possibly disparate set of nodes over time. This type of phenomenon is cer- 1This problem was originally framed by G. Simmel in the following qualitative terms: "The most general case in which the persistence of the group presents itself as a problem occurs in the fact that, in spite of the departure and the change of members, the group remains identical. We say that it is the same state, the same association, the same army, which now exists that existed so and so many decades or centuries ago. This, although no single member of the original organization remains." [20, p. 667] 2 tainly roughly detectable through the trace of interactions, as recorded in a static graph, or a series of (snapshot-based) static graphs. We suggest how- ever that the aggregation operation may induce a strong information loss and often requires additional thresholding hypotheses (on link weight and timewindow width, inter alia). Our approach aims at remaining as much as possible faithful to the original empirical data. We therefore propose a simple formalism to detect essentially dynamic communities from a diachronic dataset, and understand their evolution within a unified, single-pass procedure. By "diachronic dataset" we mean that the data we consider features links whose extremities are associated with possi- bly distinct timestamps, like in a citation network or an email network (an item of B made at t′ is cited/answered by A at t > t′). After a presentation of the relevant literature in Sec. 2, we explain (Sec. 3) the principles of this method which consists in a new ontological viewpoint built upon usual concepts of community detection methods. In Sec. 4 we introduce various datasets, both synthetic and empirical (citation) networks, in blog- and science-related contexts. We then discuss results in Sec. 5 and, in particular, we propose a variety of metrics aimed at providing information about the type and quality of detected temporal communities. This leads to a macro-level characterization of empirical datasets through their dynamic community profile. Focusing on the behavior of the individual nodes within communities -- for instance how many times nodes appear or change their community membership -- we later present in Sec. 6 several features of tem- poral communities which are typical of our approach. We discuss eventually (Sec. 7) how this approach exhibits novel stylized facts that are not directly obtainable from existing methods, and how our methodology could be ap- plied, with some tweaking, to other kind of network data where edges are associated with discrete timesteps. In particular, we also suggest a possible improvement of our methodology by introducing an additional "temporal- oriented" step which can suitably complement the 'structure-oriented' ap- proach of our algorithm. 2. Related work The analysis of community evolution in dynamic networks is a recent and increasingly active field. To our knowledge, the first study was carried out by Hopcroft et al. [3] who analyzed several snapshots of a scientific citation 3 database. Using a hierarchical clustering algorithm -- based on the similar- ity of articles -- they defined "natural communities" particularly robust to minor perturbations of the graph. Then they proposed rules based on set theory tools to decide how communities evolve from a snapshot to another. Many variations of this set of rules have been proposed afterwards [4 -- 6], one of the most comprehensive being monic [7]. Since then, such approaches have been widely used and developed. Asur et al. [8] introduced a family of events (merging, splitting etc.) on both communities and individuals to char- acterize the evolution. Falkowski et al. [9] computed groups with a classical divisive algorithm at each timestep, links were created between community instances at different timesteps with a weight depending on monic matching rules. Toyoda and Kitsuregawa [10] studied the evolution of Web communi- ties from a sequence of snapshots. Palla et al. [11] used the clique percolation method to extract communities at each moment and then matched them at consecutive time steps to make statistics on their evolution: sizes, ages, over- laps between two different time steps etc. In [12] three classical algorithms are used to detect communities at every snapshots, and since these methods are unstable, a stabilization of the Louvain algorithm is proposed, achieving simultaneously high modularity and good stability. The above-described approaches are basically two-stage methods: (i) de- tect clusters independently at some period in the graph evolution, then (ii) infer relationships between partitions at different periods. However, this kind of approach is susceptible to edge effects, due to the longitudinal analysis: discrete time periods have to be defined and they sometimes split impor- tant signals into two distinct periods. Significant variations even between partitions close in time may appear, which results in artifactual community structure evolution. It is desirable, instead, to have a unified framework, in which cluster evolution can be deduced both from the current graph struc- ture and from the knowledge of the community structure at previous time steps. More recently, a new kind of clustering concept called "evolutionary clustering" has been proposed to capture the evolutionary process of clusters in temporal data. This framework was introduced by Chakrabarti et al. [13] who assume that short-term community structure alterations are not desir- able and therefore smooth communities over time. The smoothing process consists of a trade-off between the quality of the detection on a snapshot and its consistency with the previous community detection. Chi et al. [14] extended similar ideas and proposed the first evolutionary spectral clustering algorithm. Based on evolutionary clustering, Lin et al. [15] introduced the 4 framework FacetNet, which allows vertices to belong to several communi- ties simultaneously. FacetNet can be extended to handle vertex addition and removal as well as variations of the number of clusters in consecutive timesteps. However, it is not able to account for the creation and disin- tegration of communities, and it is not scalable to large systems because of computational limits. These issues have been addressed in a recent ap- proach by Kim and Han [16]. A uniform community detection methodology called OSLOM (Order Statistics Local Optimization Method) has been re- cently proposed in [21]. It detects clusters in networks accounting for edge directions, edge weights, overlapping communities, hierarchies and commu- nity dynamics. The algorithm is based on the local optimization of a fitness function expressing the statistical significance of clusters with respect to ran- dom fluctuations, which is estimated with tools of Extreme and Order Statis- tics [22, 23]. Instead of separately analyzing the snapshots, this methodology aims at combining information from different time slices, thereby taking ad- vantage of the information from different snapshots to uncover correlations between structures of the system at various time stamps. The temporal information can also be integrated in the graph itself. One attempt in this direction is [17] which uses the community detection algo- rithm Walktrap [18] but changes the input graph to integrate dynamics: they create a temporal graph by duplicating nodes appearing at different timesteps, and by artificially linking a node to itself at the following times- tamp. Communities are then detected on this temporal graph which contains a mix of temporal and classical links. This idea of connecting several snap- shots is extended in [19]: the authors propose a more general way to build the temporal graph and suggest an appropriate modification of the modular- ity. Yet these approaches rely on the arbitrary hypothesis that a connection between two nodes can be compared to the connection of a node with itself across time. The formalism we propose shares some features with these temporal graphs, but avoids ad hoc alterations of the underlying empirical data, to the cost of being restricted -- at least in this paper -- to a certain kind of data where link extremities are explicitly attributed possibly different times- tamps, as is the case e.g. in citation networks. 5 3. Methodology Our methodology explicitly relies on a diachronic dataset, i.e. a set of links connecting a timestamped source to a timestamped destination, where source and destination timestamps may be distinct. This is typically the case in citation networks.2 We define basic notations to represent such citation datasets and describe a graph suited to this kind of data. 3.1. Physical graph vs. temporal graph We call physical nodes the source or destination of the links -- without consideration for timestamps -- let V = {vi}i∈{1,..,n} be the associated set. The timescale is supposed to be discretized so that any timestamp is an element of set T = {ti}i∈I. The empirical data consists of directed links whose extremeties relate to possibly distinct timesteps: Ψ = n(cid:16)(vi, ti), (vj, tj)(cid:17) vi, vj ∈ V , ti, tj ∈ To (1) Typical approaches aim at aggregating this original data over the whole timescale, thereby obtaining a usual directed graph G(V, E) whose edge set is E = {(vi, vj)}, where node vi cites node vj. We will refer to such links as physical links and to G as the physical graph. To our knowledge, most dynamic community detection methods are re- lying on this type of graphs: they ultimately rely on physical graphs based on a particular slicing of the dataset into time periods (usually, a partition of time periods). Our point is to diverge from this significant information reduction by relying directly on the original empirical data. We therefore define a key concept for the following analysis: the temporal graph G = (V, E), defined upon a set of time-labeled vertices, or tempo- ral nodes, V = {(vi, ti)}, and a set of time-labeled links, or temporal links, E = n(cid:16)(vi, ti), (vj, tj)(cid:17)o, such that ∀i, (vi, ti) ∈ V. Practically, the ti and tj associated to vi and vj will be elements of T corresponding to the timestamp when vi cites vj, as defined in Ψ. See an illustration on Fig. 1. 2See Sec. 7 for a discussion on possible extensions of this method. 6 Figure 1: Example of a temporal graph based on four physical nodes A, B, C and D. 3.2. Temporal community detection Contrary to the physical graph G(V, E), the temporal graph G(V, E) built from Ψ provides us with information regarding the appearance as well as disappearance of citation links between specific physical nodes over a period of time. We may now apply a classical community detection algorithm on G to obtain a cover C = {C1, C2, ...., Cm} of the temporal node set V. Each of these Ci is a set of temporal nodes from the temporal graph. Com- bined with G, and more precisely E, each Ci straightforwardly and uniquely defines a subgraph induced by the corresponding subset of V. It will be called a temporal community. In the following practical explorations, we rely on the so-called Louvain algorithm [24] -- essentially for its ability to quickly cluster temporal nodes into cohesive subgraphs. C will be a partition because this very algorithm does output partitions of the underlying graph nodes, as do most network algorithms for community detection. Here we would like to emphasize the fact that our methodology is usable with other typical static community finding algorithms, including overlapping community detection techniques [e.g., 25]. As an evidence, in the next section we illustrate our methodology with two other algorithms such as Girvan-Newman [26] and Walktrap [18] in addition to Louvain algorithm for the synthetic dataset (Fig. 3). 7 4. Data sources 4.1. Synthetic data We implement in this section our methodology on a synthetically gen- erated citation data set, built using an a priori community structure. This synthetic data will be useful as a toy example to demonstrate the effect of the method on a controlled environment, where the level and extent of recurrent, dynamic interaction is a priori known. Synthetic data generation. To produce the synthetic dataset, we first consider nc a priori "communities". We create a set of n = m · nc physical nodes V = {v1, ..., vn} each assigned a community number in such a way that each community has a constant number of m members. We also define a set of timestamps T = {ti}i∈{1,...,tmax}. We thus have a 2D-grid of size n · tmax whose elements are temporal nodes of V. We eventually fix a temporal graph density by tuning the average out-degree of the temporal nodes d. We then synthesize a dynamic citation network Gp by randomly generat- ing a number of temporal links respecting the following constraints: • A link from (v, t) to (v′, t′) must be such that t′ ≤ t. • The total number of outgoing temporal links emanating from all tem- poral nodes at a specific timestamp t is given as d · n. Outgoing links are spread randomly on the n nodes at each timestep t. • An outgoing temporal link has a probability p to reach a temporal node of the same community as the source and probability 1 − p to reach a temporal node assigned to any other a priori community. • We additionally introduce a sliding window of size w so that t − w ≤ t′, ensuring that most sources refer to recent destinations rather than to arbitrarily old ones. Decreasing values of p and d lead to a temporal graph with decaying tem- poral community structure and recurrent interactions being more and more fortuitous. A totally random inter-community linking pattern thus corre- sponds to prandom = 1 . To concretely illustrate this phenomenon and the nc functioning of our approach, we generate a synthetic citation data set Ψ fol- lowing the above-described procedure, with parameters: nc = 4 and m = 5, tmax = 20, w = 10 and d = 3. Applying the Louvain community detection 8 (a) p = 1 (b) p = 0.85 (c) p = 0.5 Figure 2: Temporal graph G constructed from the synthetic data, with nc = 4, m = 5, w = 10, and d = 3 for various probabilities of intra-community linking p. Left to right: p = 1, p = 0.85 and p = 0.5, with respectively 5, 9 and 16 detected temporal communities, each labeled using distinct colors; time goes from left to right, while physical nodes are spread on the y-axis (#0 to #19). algorithm on the corresponding temporal graph yields temporal communities exhibiting a decaying temporal cohesiveness as much as p decreases. Figure 2 provides a simple illustration of how accurately the algorithm describes the temporal community structure, and especially matches the a priori tempo- ral communities when p is high, i.e. when the data effectively obeys such a community structure. In order to show the robustness of our methodol- ogy with respect to the chosen community detection algorithms, we present results with three distinct algorithms namely Louvain, Girvan-Newman and Walktrap, for the synthetic dataset, see Fig. 3. For the empirical dataset and for the remainder of this paper, we carry on with Louvain for its efficiency. (a) Girvan-Newman (b) Louvain (same as above) (c) Walktrap Figure 3: Temporal communities detected for a unique synthetic dataset (p = 0.85) using Louvain, Girvan-Newman and Walktrap algorithms. 9 4.2. Empirical data We now describe the two datasets we used to build empirical temporal graphs, namely scientific and blog citation data, respectively called ACL and Blogs. • ACL. This dataset comes from the Association of Computational Linguistics (ACL). It features the ACL Anthology Network -- a scientific biblio- graphical repository focused on computational linguistics3. The dataset is current as of Nov 2008. It is paper-centered: it describes 13, 706 dif- ferent papers, back to year 1965, such that we know that a paper pub- lished at some date cites some other papers published at some possibly earlier date. We transform this data into a dynamic author-focused dataset featuring which author cites whom at which date, i.e. author A cited at tA a production of author B (possibly A himself) at tB ≤ tA. The database contains a total of 247, 059 dynamic links among the 11, 163 authors of this 43-year collection. • Blogs. This dataset comes from a collection from February 1st to July 1st, 2010, of blog posts of a significant part of the active French-speaking blogosphere, dynamically monitored by Linkfluence, a company spe- cialized in digital community surveys. It features post contents, most importantly who publishes a post, when, which other post this post does cite, and when that other post was pub- lished. In other words, it features links of the form blog A cites at tA a post published by blog B (possibly the same as A) at time tB ≤ tA. We get 49,232 dynamic links among 10,436 blogs during the 151-days crawling period. 5. Results 5.1. Qualitative insights Topical clustering. As expected, communities found on both datasets exhibit a certain consistency regarding their topic: for instance, one large commu- 3It may be browsed from http://aclweb.org/anthology-new -- see also [27]. 10 nity in ACL principally includes authors of papers dealing with "statistical machine translation". As such, it would surely be comforting that temporal communities are consistent with the type of results that static algorithms would usually yield: let us therefore focus on situations specific to temporal communities which are likely to be less accessible through classical static community detection approaches. Events. Communities related to specific events, and therefore characterized by a relative burst of interactions, are also exhibited. For instance, the Blogs dataset features 16 temporal communities which all involve the same core of 3 specific nodes, and sometimes an extra other node. The associated times- tamps for these communities are quite regular: each community is separated of the next one by around one week. A closer examination of the database in- forms us that these communities correspond to the weekly "best of" made by blog filmgeek.fr -- specialized in movie reviews -- which often involves the same group of blogs: blogywoodland.blogspot.com, cinefeed.com and, more rarely, toujoursraison.com. Such quasi-periodic phenomenon is a clear evidence of a specific, recurrent event. Strong recurrent interactions. The temporal approach makes it possible to easily detect interacting "cores" without introducing extra hypotheses on link weights -- "cores" made of, for instance, a small group of strongly interacting nodes, with or without a "periphery" of other weakly interacting nodes. For example, ACL features some small temporal communities consisting of several authors sharing a particularly strong bond, such as a group of 3 Japanese authors (namely S. Yoshida, T. Hitaka and H. Tsurumaru) who published several times together, also citing their previous papers. With a static, unweighted approach, these cores may be overlooked as usual elements of a possibly larger community. 5.2. Temporal metrics and dynamic community profiles We now introduce various temporal metrics in order, and thereby dis- tinguish temporal communities. We show how these metrics can be used to focus on specific types of temporal communities and, at a higher level, how they can be used to discriminate empirical contexts through distinct dynamic community profiles. We essentially suggest that the following dimensions are key in appraising temporal community types: (1) Community size (i.e. extent of the community 11 within the system); (2) Recurrence of interactions; (3) Interactivity (and self- citation); and (4) Balance (i.e. connectedness heterogeneity). Community size (z). Temporal community extent may be measured through the community size, which we define in terms of physical nodes. More for- mally, z(C) denotes the number of unique nodes participating in the temporal community: ∀C ∈ C, (2) z(C) = (cid:12)(cid:12)(cid:12) {vi ∃(vi, ti) ∈ C}(cid:12)(cid:12)(cid:12) On Fig. 4, communities ACL #1 and #26 are respectively of size 3 and 9. Recurrence of interactions: node activity NA. We characterize the recur- rence of node participation in a temporal community in terms of node activ- ity NA. It is a normalized index simply based on the ratio of temporal nodes with respect to physical nodes in the community. Formally, we define: ∀C ∈ C, NA(C) = 1 − z(C) C (3) Hence, a highly active community is more likely to feature a small number of physical nodes (low z(C)) appearing repeatedly over several timestamps (high C), resulting in a NA close to 1. For instance, on Fig. 4 we see that temporal community ACL #1 has a high NA, with only three nodes quite recurrently interacting with each other.4 Note also that the Louvain algo- rithm captures cohesive temporal subgraphs, i.e. dense patterns of either recurrent or multiple interactions. As we see in Fig. 4, low NA communities exhibit an increased branching structure and correspond more to star-like multiple interactions than recurrent ones. In this respect, NA filters tem- porally recurrent patterns among those detected by the Louvain algorithm. 4We may also represent node recurrence within a given temporal community by (i) using the average degree in the corresponding temporal subgraph, i.e. using the ratio between C and the number of temporal links, or (ii) by using repeated appearances of physical links, i.e. the ratio between (the number of temporal links of the temporal subgraph) and (the number of links in the projection of corresponding temporal subgraph projection onto a static, unweighted network). However, we find that the former is empirically correlated to community size z(C) while the latter is fairly correlated to NA(C). 12 NA high low Figure 4: ACL data with two typical communities having respectively a high (left ) and low (right ) node activity NA. Interactivity: self-citation ratio. A temporal community may contain a large number of temporal nodes and links while essentially consisting of a node citing repeatedly itself (a relatively frequent pattern on the blogosphere and, to a lesser extent, in science). The self-citation ratio SC(C) is defined as the ratio between the number of self-citations and the total number of temporal links present in the community. Formally, ∀C ∈ C, SC(C) = {((vi, ti), (vi, tj)) ∈ C 2} {((vi, ti), (vj, tj)) ∈ C 2} (4) This measure primarily targets temporal communities where a pivotal node intensely cites itself over a large number of timestamps, possibly being sparsely cited by other surrounding nodes -- compare high-SC communities "Blogs #1" with "Blogs #69" on Figure 5. Balance: heterogeneity of interactions. Temporal communities, as can be seen on Fig. 5, may possess balanced or unbalanced activity, depending on whether one physical node much more heavily and repeatedly cites other, or all physically nodes eventually cite each other in an even manner. We 13 h(C) = p2 i (5) 1 z(C)Pz(C) i propose to measure this structural heterogeneity using an index based on Herfindahl's index h: where pi(C) is the normalized number of temporal links stemming from a given physical node i within C (it is normalized such that Pz(C) pi(C) = i SC high low high HI low Figure 5: Typical temporal community patterns with respect to SC and HI for "Blogs". When SC is high, temporal communities could look like a long self-citation line (high HI, #1) or a backbone (low HI #69); when SC is low, they could appear as incoming stars (high HI, #428) or outgoing stars (low HI, #325). 14 1, z(C) being the size of community C). Because h(C) ∈ [1/z(C), 1], we eventually rescale it into [0, 1]: HI(C) = z(C)h(C) − 1 z(C) − 1 (6) Put shortly, HI is closer to 1 when temporal communities have an homoge- neous out-going connectivity (e.g. "Blogs #1", as opposed to "Blogs #325"). 5.3. Dynamic profiles First glimpse: synthetic toy model. Fig. 6(a) shows the behavior of the afore- said metrics in synthetic data for various values of the inter-community link- ing probability p. As can be observed, these metrics are unaffected for most values of p, except for the highest values where all metrics NA, HI and SC increase relatively sharply. Inset of Fig. 6(a) shows that in the weakly co- hesive network, temporal communities have an average size which is close to the number of nodes, i.e. they all tend to be spread over a large portion of the physical node set. By contrast, temporal communities for larger values of p are much smaller, and indeed closer to the a priori community attribution, i.e. they are much more focused on a small subset of nodes. (a) Temporal metrics NA, SC, and HI for synthetic data, with respect to intra- community probability p. (Inset: aver- age size of communities in terms of phys- ical nodes.) (b) Dissimilarity5 between a priori com- munity assignment and ex post detected communities. Figure 6: Behavior of metrics on the synthetic toy model with respect to intracommunity probability p. 15 This behavior echoes the match between a priori community assignations and actual node interaction profiles for a given p. Obviously, the original com- munity assignation is likely to vanish as p diverges from 1. Yet, it actually vanishes at around a range of values of p which is similar to the region where the behavior of the above metrics change, as shown on Fig. 6(a). Indeed, if we define a dissimilarity quantity expressing how much the ex post commu- nity detection diverges from the original a priori community assignation5, we indeed notice that there is a sharp change in dissimilarity as p reaches the region around [0.8, 0.9]. See Fig. 6(b) for an illustration. Global temporal landscape. We may now combine some of these temporal metrics to depict general dynamic profiles for each dataset. Fig. 7 represents the positions of all temporal communities in a SC vs. NA plane, together with their size. (Other dimensions could be selected, depending on the fo- cus.) Strong discrepancies appear for each datasets. The synthetic dataset, for instance, exhibits a progression from low- to high- NA temporal com- munity population as p goes to 1, confirming the a priori knowledge that datasets built with higher p values are indeed yielding more cohesive tem- poral communities. Self-citation is relatively rare however in that context, compared with the empirical dataset profiles, especially blogs. In this respect, ACL is principally made of larger temporal communities with globally medium NA indices and non-negligible SC indices (indicating that most of these scientific citation temporal communities are made of a bit of self-citation embedded into a wider web of recurrent non-selfcitations), and a small number of either zero-NA communities (which are basically negligible communities corresponding to one instance of a citation of B by A) or higher SC and NA communities (which are instances of self-citation of a group of authors across a small number of timesteps). On the other hand, Blogs display a much more contrasted profile: there is a large number of highly self-citing communities, with moderate to high NA, and a large number of non-self-interacting communities, with low to medium-high NA. 5More precisely: given (C −)i=1,..,mnctmax a vector such that C − i represents the a priori community of temporal node i, and C + a same-length vector of detected communities, we consider d = Pi,j (cid:0)δ(C − j )(cid:1), where δ(x, y) is the Kronecker function. Put simply, if a pair of temporal nodes is classified differently by the a priori assignment and the ex post detection result, d will be increased by 1. We eventually consider a dis- similarity quantity D which is d normalized with respect to all possible node combinations in the network. i , C − j ) XOR δ(C + i , C + 16 SC 1.0 0.8 0.6 0.4 0.2 SC 1.0 0.8 0.6 0.4 0.2 26 p!0.5 Synthetic SC p!1. 1.0 0.8 0.6 0.4 0.2 0.2 0.4 0.6 0.8 1.0 0.2 0.4 0.6 0.8 1.0 NA NA ACL Empirical SC Blogs 1.0 0.8 0.6 0.4 0.2 1 69 1 0.2 0.4 0.6 0.8 1.0 325 NA 428 0.2 0.4 0.6 0.8 1.0 NA Figure 7: Position of temporal communities for, on top, synthetic data (p = 0.5 and p = 1) and, at bottom, ACL and Blogs. Global profiles are plotted according to NA and SC values (resp. x-axis and y-axis) and their size (represented by a gray disk whose area is logarithmically proportional to z(C)). Framed labels correspond to temporal communities represented in the previous figures. Put differently, Fig. 7 provides a global overview of the temporal inter- action profile of each dataset, plausibly typical of the underlying referencing behavior. It also emphasizes that a single all-purpose temporal community definition is likely to overlook the diversity of recurrent interaction contexts, as datasets are structurally significantly different from one another and rely upon distinct inter-temporal interaction behaviors. 5.4. Impact of graph density / sparsity The level of interaction intensity is likely to affect temporal community structure: admittedly, a sparse graph will exhibit smaller communities, in a more fragmented way. For instance, coming back to the toy synthetic data, 17 (a) d = 2 (b) d = 4 Figure 8: Visual representation of the dynamic community structure of synthetic datasets created using various average degrees d, and a maximal intracommunity probability p = 1. a decrease in the average degree/density leads to a less coherent temporal community landscape: for example, in Fig. 8, we illustrate that in a synthetic dataset with identical parameters as before, except for an average degree of 2, leads to as many as 17 communities even for p = 1 (Fig. 8-left), while an average degree of 4 leads assuredly to the 4 a priori communities (Fig. 8- right). This issue essentially boils down to the fact that sparse graphs may lead to sets of small meaningless communities. It is an issue which is certainly common to community detection methods, and it is typically addressed by an increase in the granularity of the input data, for instance by aggregating data on longer time periods or considering a lower time sampling rate; or by eventually merging communities based on various criteria. Solving this issue in general is beyond the scope of this paper; yet, we may discuss several ways of addressing it in our specific context. In particular: • The temporal grain may be increased in order to take into account a slower pace of linking. This would not be equivalent to longitudinal approaches, as we would still rely on the inter-temporal intertwinement of links across various periods to build communities. For instance, our results on ACL and blogs are robust when time sampling is halved, i.e. when considering that year 1980 and 1981 correspond to a single timestamp, as do 1982 and 1983, but not 1981 and 1982. • Another way of proceeding would be to merge some communities based on the temporal information, using temporal nodes of a single physical node which are present at close timesteps, in a fashion not unfamiliar 18 (a) Node lifetime distri- bution for Blogs (scale in days), inset: for ACL (scale in years). (b) Community mem- bership distribution for (scale in days), Blogs inset: for ACL (scale in years). (c) Correlation between node lifetime and community mem- bership for Blogs; for ACL. inset: Figure 9: Distributions of node lifetimes (number of distinct timesteps of activity in the dataset), community memberships (number of temporal communities a given node belongs to, over the whole dataset), and related correlations. to what has been done in [17, 19] by adding inter-temporal links across temporal nodes. Similarly, temporal metrics of Sec. 5.2 may be used as guidelines to filter out irrelevant temporal communities. We will sketch a few preliminary details of this latter approach in Sec. 7.2. 6. Behavior of nodes inside and across temporal communities The description of temporal communities provides a landscape of the various foci of activity of physical nodes across time: some nodes may be devoted to a given subgroup of nodes, while others may frequently jump from a community to another. We now propose a few simple metrics to measure community membership parameters of individual nodes, and use them on the "Blogs" and "ACL" datasets to characterize different bloggers and authors, as well as the temporal cohesiveness of the respective underlying systems as a whole. 6.1. Physical node lifetime and community membership We define the lifetime of a physical node as the total number of distinct timestamps where it appears in the temporal graph -- it is fundamentally a node property. Fig. 9(a) represents the distribution of node lifetimes, which is similar for ACL and Blogs (it is also similar whether node lifetime is based 19 on link targets only, or on link targets and origins): almost 40% of nodes just appear for a single timestamp; the distribution is heterogeneous with many nodes exhibiting a very weak activity. Physical nodes may belong to different number of communities in their lifetime. Fig. 9(b) shows the fraction of physical nodes belonging to a given number of temporal communities, or community membership. While most nodes belong to a single community throughout their lifetime, a significant number of nodes are members of various communities as well; following, again, a pattern typical of an heterogeneous probability law. There is admit- tedly a relationship between node lifetime and community membership, as a short-lived physical node is likely to belong to few communities. Fig. 9(b) certainly shows that in ACL, around two-thirds of authors belong to one com- munity throughout their lifetime. It is unclear, however, whether all nodes belonging to few communities are short-lived: they may also constantly be- long to a single community. To address this issue, we plot the correlation between node lifetime and community membership on Fig. 9(c). There are indeed few committed nodes belonging to a single temporal community for a very long time (Blogs: maximum 151 timestamps, ACL: 23 years); but the landscape is globally mixed: while nodes appearing only once (trivially) belong to a single community, and few other nodes are members of multiple communities in their lifetime. 6.2. Multiplicity and change in community membership More precisely, we examine the distribution of the multiplicity of com- munity membership CM defined as the ratio of the node membership over its lifetime -- see Fig. 10(a). This value equals 1 when a node belongs to as many different communities as the number of timesteps where it is active, and is closer to zero when it is involved in a smaller number of communities. About 60% of nodes have a CM of 1, while around 10-20% of nodes have a CM ∈ ]0.45; 0.55]. Where nodes with smaller CM certainly migrate seldom from a temporal community to another, nodes with higher CM values might as well be heavily migrating or just short-lived nodes. To concretely appraise these migration or toggling effects, we finally define the "community toggle" CT of a node as the ratio between the number of times it jumps from a temporal community to another in the next active timestep, over the maximum number of toggles it can do, which is its lifetime minus one (when lifetime is 1 there is no possible toggle so CT = 0 by definition). We plot the distribution of CT on 20 (a) Community multiplicity CM distri- bution (b) Community toggle CT distribution Figure 10: Binned distributions of community multiplicity or toggle indices for all nodes. Main figures correspond to "Blogs" data, insets to "ACL". Fig. 10(b). We can observe that it is generally bimodal: there are therefore two types of nodes. Nodes constantly belonging to a community (be it with a short or long lifetime), or nodes belonging to a variety of communities. We can observe that 30% of bloggers exhibit a very low toggle rate (between 0.0- 0.1, mostly 0), whereas a similar proportion of nodes has heavily changing temporal community memberships -- perhaps a typical feature of blogspace. In ACL however, authors exhibit mostly stable behavior with a very low toggle rate for 70%. This last argument underlines a possible issue in usual partitioning algo- rithms, with respect to detecting whether a node is constantly central in a given community, or whether it is sporadically marginal, peripheral or even a bumblebee for a series of communities. Node toggling statistics, possibly coupled with other dimensions such as degree, could be fruitfully used to dis- criminate such kinds of nodes. "Backbone nodes", for instance, are active, often self-citing and have a very low toggling rate, as is the case for exam- ple of developpez.net (rate = 0.024): a forum-like blog which is one of the most important French-speaking website in programming. On the other hand, ump-senat.fr has a high toggling rate (rate = 0.955): this is the blog of the right-wing group at the French Senate, very active yet on a variety topics and, more importantly, never really central on any of them. 21 7. Extension of the methodology In this section, we suggest several different extensions of our methodol- ogy. First we show that our algorithm is also applicable beyond the citation dataset. Next, we propose a possible improvement of our algorithm through a complementary community repairing process. 7.1. Scope: other types of datasets and networks We admittedly focused on citation datasets, where link extremities gen- erally correspond to distinct times (at t, B cites an instance of A at t′ < t). We now suggest that other types of non-strictly citation datasets can be appraised. First, we may use all co-appearance dynamic networks, which are usually well represented by bipartite graphs. In effect, whenever some nodes of one side of the bipartite graph are linked to one node of the other side, at pos- sibly different timesteps, it is possible to link the first-side nodes together. Many monopartite networks are actually projections of bipartite networks [28], where A and B get connected because they were jointly connected to a common r; yet, traditional projections overlook the fact that A and B may have been linked to r at different times. An example would be peer-to-peer exchange networks: if A makes a request for resource r at tA and then B makes a similar request at tB > tA, we can create a timestamped link from (A, tA) to (B, tB). The corresponding temporal graph captures the shared interest/involvement of some nodes across various timesteps. More generally, the analysis we made on diachronic datasets draws bene- fits from the fact that interacting agents are associated with a specific times- tamp. Our approach could nonetheless be used on a dataset which can be expressed as a sequence of interactions such as: ((vi, αi), (vj, αj)) where αi ∈ {αk}k∈K refers to a property of node vi rather than a timestamp. A node may for instance be characterized by its location in space, thus enabling geographically-based communities: this in turn could be useful in order to describe communities embedded in their geographical environment. Commu- nication networks (phone calls, instant messaging, emails) could provide us with such data. 7.2. Reconstruction: using the physical node information Our methodology primarily aims at identifying cohesive cross-temporal interaction patterns in the underlying diachronic data set. This approach 22 Original Step 1 Step 2 Step 3 Step 4 Step 5 Figure 11: Example of a portion of merging process based on N A optimization, leading to physically more cohesive communities, from "primary" temporal communities. focuses on structural properties, and cluster detection does not use contex- tual data yet, such as physical node information, or semantic data. It can thus be further improved by introducing an additional "context-oriented" step which can suitably complement the "structure-oriented" logic of our al- gorithm. This step would consist in reshaping the detected communities to optimize their contextual relevance. A straightforward example of context- aware community repairing process can be described as the merging of differ- ent temporally-cohesive communities into a single physically-cohesive clus- ter. More precisely, temporal nodes duplicated from the same physical node supposedly share common features or interests [17], and this information can suitably be used in a second step to restore or strengthen physical consistency in temporal communities detected by the proposed algorithm. For instance, the synthetic datasets defined in Section 4.1 rely on the assumption that physical nodes remain in a same a priori community throughout their life- time. We may thus reasonably expect that merging temporal communities consisting of similar physical nodes would generate communities closer to the a priori assignment. An illustrative toy example is presented on Fig. 11, where such merging process is being essentially guided by an incremental optimization of physical cohesiveness through node activity NA (it is how- ever outside of the scope of this paper to dig further into such approach). In this framework, dynamic communities as we detect them with our method, could be combined and merged in order to build larger yet physically consis- tent dynamic communities, i.e. where dynamic communities based on similar physical nodes are eventually grouped. This notion of context may also be extended to more context-dependent features, such as semantic properties. 8. Conclusion Many existing dynamic community detection methods are based on suc- cessive snapshots and are therefore essentially longitudinal rather than dy- 23 namic. By contrast, assuming that network communities fundamentally cor- respond to recurrent interaction over time, we proposed a methodology which does not alter the original temporal information of dynamic network data. In other words, it avoids a step where the original interaction data is aggregated into various network snapshots, or where connections are modified to accom- modate relationships between nodes at various timesteps. This requirement primarily led us to focus on a specific type of network data where link ex- tremities naturally correspond to distinct moments, as is typically the case in citation networks. We suggest however that the approach could be applied on several other widespread types of networks -- such as bipartite graphs, or more precisely co-use/co-citation/co-mention/co-appearance networks. We introduced intrinsically dynamic metrics to qualify temporal commu- nity structure: we could therefore single out communities based on specific patterns of repeated inter-temporal interactions, internal hierarchization, and discuss in particular how and to what extent nodes switch from a community to another across time. More broadly, using macro-level visualizations of the whole temporal community structure, we could demonstrate that various empirical contexts exhibit distinct temporal community profiles, addition- ally emphasizing the fact that those various contexts may call for distinct 'community' definitions and detection criteria. Acknowledgements. We would like to thank Thomas Aynaud for his useful com- ments on the state-of-the-art. This work has been partially supported by the French National Agency of Research (ANR) through grant "Webfluence" #ANR- 08-SYSC-009 and by the Future and Emerging Technologies programme FP7- COSI-ICT of the European Commission through project QLectives (grant no.: 231200). References [1] S. Fortunato. Community detection in graphs. Physics Reports, 486:75 -- 174, 2010. [2] R. D. Alba. A graph-theoretic definition of a sociometric clique. Journal of Mathematical Sociology, 3:113 -- 126, 1973. [3] J. Hopcroft, O. Khan, B. Kulis, and B. Selman. Tracking evolving communities in large linked networks. PNAS, 6(188701), 2004. 24 [4] M. Oliveira and J. Gama. Bipartite graphs for monitoring clusters tran- sitions. Advances in Intelligent Data Analysis IX M, 876, (2010). [5] M. Oliveira and J. Gama. Understanding clusters evolution. Workshop on Ubiquitous Data Mining, volume D, (2010). [6] D. Greene and D. Doyle. Tracking the evolution of communities in dynamic social networks. Advances in Social Networks Analysis and Mining (ASONAM), volume D, (2010). [7] M. Spiliopoulou, I. Ntoutsi, Y. Theodoridis, and R. Schult. Monic: modeling and monitoring cluster transitions. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 706 -- 711. ACM, 2006. [8] S. Asur, S. Parthasarathy, and D. Ucar. An event-based framework for characterizing the evolutionary behavior of interaction graphs. Proceed- ings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining (ACM), 2007. [9] T. Falkowski and M. Spiliopoulou. Users in volatile communities: Studying active participation and community evolution. In Cristina Conati, Kathleen McCoy, and Georgios Paliouras, editors, User Mod- eling 2007, volume 4511 of Lecture Notes in Computer Science, pages 47 -- 56. Springer Berlin / Heidelberg, 2007. [10] M. Toyoda and M. Kitsuregawa. Extracting evolution of web commu- nities from a series of web archives. In HyperText '03 Proc. 14th. ACM Conf. Hypertext & hypermedia, volume 5408. ACM, 2003. [11] J. Hopcroft, O. Khan, B. Kulis, and B. Selman. Quantifying social group evolution. Nature, 446(188701), (2007). [12] T. Aynaud and J.-L. Guillaume. Static community detection algorithms for evolving networks. Wireless Networks, (2010). [13] D. Chakrabarti, R. Kumar, and A. Tomkins. An event-based framework for characterizing the evolutionary behavior of interaction graphs. Pro- ceedings of the 13th ACM SIGKDD international conference on Knowl- edge discovery and data mining (ACM), (2007). 25 [14] Y. Chi, S. Zhu, X. Song, J. Tatemura, and B. L. Tseng. Structural and temporal analysis of the blogosphere through community factoriza- tion. Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '07, 163, (2007). [15] Y.-R. Lin, Y. Chi, S. Zhu, H. Sundaram, and B. L. Tseng. Facetnet: A framework for analyzing communities and their evolutions in dynamic networks. Proc. 17th Intl. Conf. on the World Wide Web (WWW), 163, (2008). [16] M. Kim and J. Han. A particle and density based evolutionary clustering method for dynamic networks. In Proceedings of 2009 Int. Conf. on Very Large Data Bases, August 2009. [17] M. B. Jdidia, C. Robardet, and E. Fleury. Communities detection and analysis of their dynamics in collaborative networks. IEEE ICDIM, 163, (2007). [18] P. Pons and M. Latapy. Computing communities in large networks using random walks. Journal of Graph Algorithms and Applications, 163, (2006). [19] P. Mucha, T. Richardson, K. Macon, and M. Porter. Community struc- ture in time-dependent, multiscale, and multiplex networks. Science, 876, (2010). [20] G. Simmel. The persistence of social groups. American Journal of Sociology, 3(5):662, 1898. [21] A. Lancichinetti, F. Radicchi, J. J. Ramasco, and S. Fortunato. Find- ing statistically significant communities in networks. PLoS ONE, 6(4):e18961, 04 2011. [22] A. Lancichinetti, F. Radicchi, and J. J. Ramasco. Statistical significance of communities in networks. Physical Review E, 81:046110, 2010. [23] F. Radicchi, A. Lancichinetti, and J. J. Ramasco. Combinatorial ap- proach to modularity. Physical Review E, 82:026102, 2010. [24] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communites in large networks. Journal of Statistical Me- chanics: Theory and Experiment, page P10008, 2008. 26 [25] T. S. Evans. Clique graphs and overlapping communities. Journal of Statistical Mechanics: Theory and Experiment, page P12037, 2010. [26] M. Girvan and M. E. J. Newman. Community structure in social and biological networks. PNAS, 99:7821 -- 7826, June 2002. [27] D. R. Radev, P. Muthukrishnan, and V. Qazvinian. The ACL Anthol- ogy Network corpus. In Proceedings of the 2009 Workshop on Text and Citation Analysis for Scholarly Digital Libraries, NLPIR4DL '09, pages 54 -- 61, Stroudsburg, PA, USA, 2009. Association for Computational Lin- guistics. [28] J.-L. Guillaume and M. Latapy. Bipartite structure of all complex net- works. Information Processing Letters, 90(5):215 -- 221, 2004. 27
1706.05295
2
1706
2017-06-29T05:48:49
Nonbacktracking Bounds on the Influence in Independent Cascade Models
[ "cs.SI", "cs.CC", "cs.IT", "cs.IT", "math.PR", "stat.ML" ]
This paper develops upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particular, our bounds exploit nonbacktracking walks, Fortuin-Kasteleyn-Ginibre (FKG) type inequalities, and are computed by message passing implementation. Nonbacktracking walks have recently allowed for headways in community detection, and this paper shows that their use can also impact the influence computation. Further, we provide a knob to control the trade-off between the efficiency and the accuracy of the bounds. Finally, the tightness of the bounds is illustrated with simulations on various network models.
cs.SI
cs
Nonbacktracking Bounds on the Influence in Independent Emmanuel Abbe∗ Cascade Models Sanjeev Kulkarni† June 30, 2017 Abstract Eun Jee Lee‡ This paper develops upper and lower bounds on the influence measure in a network, more precisely, the expected number of nodes that a seed set can influence in the independent cascade model. In particular, our bounds exploit nonbacktracking walks, Fortuin–Kasteleyn–Ginibre (FKG) type inequalities, and are computed by message passing implementation. Nonbacktracking walks have recently allowed for headways in community detection, and this paper shows that their use can also impact the influence computation. Further, we provide a knob to control the trade-off between the efficiency and the accuracy of the bounds. Finally, the tightness of the bounds is illustrated with simulations on various network models. 1 Introduction Influence propagation is concerned with the diffusion of information (or viruses) from initially influenced (or infected) nodes, called seeds, in a network. Understanding how information propagates in networks has become a central problem in a broad range of fields, such as viral marketing [17], sociology [8, 19, 22], communication [12], epidemiology [20], and social network analysis [23]. One of the most fundamental questions on influence propagation is to estimate the influence, i.e. the expected number of influenced nodes at the end of the propagation given some seeds. Estimating the influence is central to various research problems related to influence propagation, such as the widely-known influence maximization problem - finding a set of k nodes that maximizes the expected number of influenced nodes. Recent studies in the influence propagation have proposed heuristic algorithms [11, 18, 3, 7, 21] for the influence maximization problem while using Monte Carlo (MC) simulations to approximate the influence. Despite its simplicity, approximating the influence via MC simulations is far from ideal for large networks; in particular, MC may require a large amount of computations in order to stabilize the approximation. 7 1 0 2 n u J 9 2 ] I S . s c [ 2 v 5 9 2 5 0 . 6 0 7 1 : v i X r a ∗Program in Applied and Computational Mathematics, and the Department of Electrical Engineering, Princeton University, Princeton, USA, [email protected]. †The Department of Electrical Engineering, Princeton University, Princeton, USA, [email protected]. ‡Program in Applied and Computational Mathematics, Princeton University, Princeton, USA, [email protected]. 1 To overcome the limitations of Monte Carlo simulations, many researchers have been taking theoretical approaches to approximate the influence of given seeds in a network. Draief et al., [5] introduced an upper bound for the influence by using the spectral radius of the adjacency matrix. Tighter upper bounds were later suggested in [16] which relate the ratio of influenced nodes in a network to the spectral radius of the so-called Hazard matrix. Further, improved upper bounds which account for sensitive edges were introduced in [15]. In contrast, there has been little work on finding a tight lower bound for the influence. A few exceptions include the work by Khim et al. [13], where the lower bound is obtained by only considering the infections through the maximal-weighted paths. In this paper, we propose both upper and lower bounds on the influence using nonback- tracking walks and Fortuin–Kasteleyn–Ginibre (FKG) type inequalities. The bounds can be efficiently obtained by message passing implementation. This shows that nonbacktracking walks can also impact influence propagation, making another case for the use of nonback- tracking walks in graphical model problems as in [14, 9, 2, 1], discussed later in the paper. Further, we provide a parametrized version of the bounds that can adjust the trade-off between the efficiency and the accuracy of the bounds. 2 Background We introduce here the independent cascade model and provide background for the main results. Definition 1 (Independent Cascade Model). Consider a directed graph G = (V, (cid:126)E) with V = n, a transmission probability matrix P ∈ [0, 1]n×n, and a seed set S0 ⊆ V . For all u ∈ V , let N (u) be the set of neighbors of node u. The independent cascade model IC(G,P, S0) sequentially generates the infected set St ⊆ V for each discrete time t ≥ 1 as follows. At time t, St is initialized to be an empty set. Then, each node u ∈ St−1 attempts to infect v ∈ N (u)∩ (V \∪t−1 i=0Si) with probability Puv, i.e. node u infects its uninfected neighbor v with probability Puv. If v is infected at time t, add v to St. The process stops at T if ST = ∅ at the end of the step t = T . The set of the infected nodes at the end of propagation is defined as S = ∪T−1 i=0 St. We often refer as an edge (u, v) being open if node u infects node v. The IC model can also be defined on an undirected graph by replacing each edge e = (u, v) which has the −−−→ transmission probability pe with two directed edges (v, u) and assigning transmission probabilities Puv = Pvu = pe. −−−→ (u, v), The IC model is equivalent to the live-arc graph model, where the infection happens at once, rather than sequentially. The live-arc graph model first decides the state of every edge with a Bernoulli trial, i.e. edge (u, v) is open independently with probability Puv and closed, otherwise. Then, the set of infected nodes is defined as the nodes that are connected to at least one of the seeds by the open edges. Definition 2 (Influence). The expected number of nodes that are infected at the end of the propagation process is called the influence (rather than the expected influence, with a slight abuse of terminology) of IC(G,P, S0), and is defined as 2 (cid:88) v∈V σ(S0) = P(v is infected). (1) It is shown in [4] that computing the influence σ(S0) in the independent cascade model IC(G,P, S0) is #P-hard, even with a single seed, i.e. S0 = 1. Next, we define nonbacktracking (NB) walks on a directed graph. Nonbacktracking walks have already been used for studying the characteristics of networks. To the best of our knowledge, the use of NB walks in the context of epidemics was first introduced in the paper of Karrer et al. [10] and later applied to percolation in [9]. In particular, Karrer et al. reformulate the spread of infections as a message passing process and demonstrate how the resulting equations can be used to calculate the upper bound on the number of nodes that are susceptible at a given time. As we shall see, we take a different approach to the use of the NB walks, which focuses on the effective contribution of a node in infecting another node and accumulates such contributions to obtain upper and lower bounds. More recently, nonbacktracking walks are used for community detection [14, 2, 1]. Definition 3 (Nonbacktracking Walk). Let G = (V, E) be a directed graph. A nonbacktrack- ing walk of length k is defined as w(k) = (v0, v1, . . . , vk), where vi ∈ V and (vi−1, vi) ∈ E for all i ∈ [k], and vi−1 (cid:54)= vi+1 for i ∈ [k − 1]. We next recall a key inequality introduced by Fortuin et. al [6]. Theorem 1 (FKG Inequality). Let Γ be a finite partially ordered set, ordered by ≺ with (Γ,≺) a distributive lattice and µ be a positive measure on Γ satisfying the following condition: for all x, y ∈ Γ, µ(x ∧ y)µ(x ∨ y) ≥ µ(x)µ(y), where x ∧ y = max{z ∈ Γ : z (cid:22) x, z (cid:22) y} and x ∨ y = min{z ∈ Γ : y (cid:22) z, y (cid:22) z}. Let f and g be both increasing (or both decreasing) functions on Γ. Then, ( µ(x))( f (x)g(x)µ(x)) ≥ ( f (x)µ(x))( g(x)µ(x)). (2) (cid:88) x∈Γ (cid:88) x∈Γ (cid:88) x∈Γ (cid:88) x∈Γ FKG inequality is instrumental in studying the influence propagation since the probability that a node is influenced is nondecreasing with respect to the partial order of random variables describing the states, open or closed, of the edges. 3 Nonbacktracking bounds on the influence In this section, we presents upper and lower bounds on the influence in the independent cascade model and explain the motivations and intuitions of the bounds. The bounds are computed efficiently by algorithms which utilize nonbacktracking walks and FKG inequalities. In particular, the upper bound on a network based on a graph G(V, E) runs in O(V 2+V E) and the lower bound runs in O(V + E), whereas Monte Carlo simulation would require O(V 3 + V 2E) computations without knowing the variance of the influence, which is harder to estimate than the influence. The reason for the large computational complexity of MC is that in order to ensure that the standard error of the estimation does not grow with 3 respect to V , MC requires O(V 2) computations. Hence, for large networks, where MC may not be feasible, our algorithms can still provide bounds on the influence. Furthermore, from our computable upper σ+ and lower bounds σ−, we can compute an upper bound on the variance given by (σ+ − σ−)2/4. This could be used to estimate the number of computations needed by MC. Computing the upper bound on the variance with the proposed bounds can be done in O(V 2 + V E), whereas computing the variance with MC simulation requires O(V 5 + V 4E). 3.1 Nonbacktracking upper bounds (NB-UB) We start by defining the following for the independent cascade model IC(G,P, S0), where G = (V, E) and V = n. Definition 4. For any v ∈ V , we define the set of in-neighbors N−(v) = {u ∈ V : (u, v) ∈ E} and the set of out-neighbors N +(v) = {u ∈ V : (v, u) ∈ E}. Definition 5. For any v ∈ V and l ∈ {0, . . . , n − 1}, the set Pl(S0→ v) is defined as the set of all paths with length l from any seed s ∈ S0 to v. We call a path P is open if every edge in P is open. Definition 6. For any u, v ∈ V , l ∈ {0, . . . , n−1}, and S ⊆ V , we define the events A(v) = {v is infected} Al(v) = ∪P∈Pl(S0→v){P is open} Al(u→ v) = ∪P∈Pl(S0→u),P(cid:54)∈v{P is open and edge (u, v) is open} Al,S(v) = ∪P∈{P (cid:48)∈Pl(S0→v):P (cid:48)(cid:54)∈w,∀w∈S}{P is open}, (3) (4) (5) (6) and the probabilities pl(u→ v) = P(Al(u→ v)). p(v) = P(A(v)) pl(v) = P(Al(v)) (7) (8) (9) In other words, Al(v) is the event that node v is infected by open paths of length l, Al(u→ v) is the event that v is infected by node u with open paths of length l + 1, i.e. there exists an open path of length l + 1 from a seed to v that ends with edge (u, v), and Al,S(v) is the event that node v is infected by length l open paths which do not include any node in S. Lemma 1. For any v ∈ V , For any v ∈ V and l ∈ {0, . . . , n − 1}, p(v) ≤ 1 − n−1(cid:89) pl(v) ≤ 1 − (cid:89) l=0 u∈N−(v) 4 (1 − pl(v)). (1 − pl(u→ v)). (10) (11) Proof. Recall that p(v) = P(A(v)), pl(v) = P(Al(v)), and pl(u→ v) = P(Al(u→ v)). p(v) = P(∪n−1 l=0 Al(v)) = 1 − P(∩n−1 l=0 Al(v)C) ≤ 1 − n−1(cid:89) = 1 − n−1(cid:89) l=0 P(Al(v)C) (1 − pl(v)). Equation (14) follows from positive correlation among the events Al(v)C for all v ∈ V , which can be proved by FKG inequality. Similarly, l=0 pl(v) = P(∪u∈N−(v)Al(u→ v)) = 1 − P(∩u∈N−(v)Al(u→ v)C) P(Al(u→ v)C) ≤ 1 − (cid:89) = 1 − (cid:89) u∈N−(v) (1 − pl(u→ v)). u∈N−(v) (12) (13) (14) (15) (16) (17) (18) (19) Lemma 1 suggests that given pl(u→ v), we may compute an upper bound on the influence. Ideally, pl(u→ v) can be computed by considering all paths with length l. However, this results in exponential complexity O(nl), as l gets up to n − 1. Thus, we present an efficient way to compute an upper bound UBl(u→ v) on pl(u→ v), which in turns gives an upper bound UBl(v) on pl(v), with the following recursion formula. Definition 7. For all l ∈ {0, . . . , n − 1} and u, v ∈ V such that (u, v) ∈ E, UBl(u) ∈ [0, 1] and UBl(u→ v) ∈ [0, 1] are defined recursively as follows. Initial condition: For every s∈ S0, s+∈ N +(s), u∈ V \S0, and v∈ N +(u), UB0(s) = 1, UB0(s→ s+) = Pss+ UB0(u) = 0, UB0(u→ v) = 0. (20) (21) Recursion: For every l > 0, s∈ S0, s+∈ N +(s), s−∈ N−(s), u∈ V \S0, and v∈ N +(u)\S0, (22) (23) UBl(s) = 0, UBl(s→ s+) = 0, UBl(s−→ s) = 0 UBl(u) = 1 − (cid:89) w∈N−(u) (1 − UBl−1(w→ u)) (cid:40)Puv(1 − 1−UBl(u) 1−UBl−1(v→u) ), PuvUBl(u), UBl(u→ v) = if v∈ N−(u) otherwise. (24) Equation (22) follows from that for any seed node s ∈ S0 and for all l > 0, pl(s) = 0, pl(s → s+) = 0, pl(s− → s) = 0. A naive way to compute UBl(u → v) is UBl(u → v) = 5 PuvUBl−1(u), but this results in an extremely loose bound due to the backtracking. For a tighter bound, we use nonbacktracking in Equation (24), i.e. when computing UBl(u→ v), we ignore the contribution of UBl−1(v→ u). Theorem 2. For any independent cascade model IC(G,P, S0), σ(S0) ≤ (cid:88) (1 − n−1(cid:89) v∈V l=0 (1 − UBl(v))) =: σ+(S0), (25) where UBl(v) is obtained recursively as in Definition 7. Proof. We provide a proof by induction. The initial condition, for l = 0, can be easily checked. For every s∈ S0, s+∈ N +(s), u∈ V \S0, and v∈ N +(u), p0(s) = 1 ≤ UB0(s) = 1 p0(s→ s+) = Pss+ ≤ UB0(s→ s+) = Pss+ p0(u) = 0 ≤ UB0(u) = 0 p0(u→ v) = 0 ≤ UB0(u→ v) = 0. (26) (27) (28) (29) For each l ≤ L, assume that pl(v) ≤ UBl(v) and pl(u→ v) ≤ UBl(u→ v) for all u, v ∈ V . Since pl(s) = pl(s → s+) = pl(s− → s) = 0 for every l ≥ 1, s ∈ S0, s+∈ N +(s), and s−∈ N−(s), it is sufficient to show pL+1(v) ≤ UBL+1(v) and pL+1(u→ v) ≤ UBL+1(u→ v) for all u∈ V \S0, and v∈ N +(u). For simplicity, for any pair of events (A, B), use the notation AB for A ∩ B. For any v ∈ V \ S0, pL+1(v) = P(∪u∈N−(v)EuvAL,{v}(u)), where Euv denotes the event that edge (u, v) is open, i.e. P(Euv) = Puv. Thus, pL+1(v) = 1 − P(∩u∈N−(v)(EuvAL,{v}(u))C) (1 − P(EuvAL,{v}(u))) ≤ 1 − (cid:89) = 1 − (cid:89) ≤ 1 − (cid:89) u∈N−(v) u∈N−(v) u∈N−(v) (1 − pL(u→ v)) (1 − UBL(u→ v)) = UBL+1(v), (30) (31) (32) (33) (34) where Equation (32) is obtained by the positive correlation among the events EuvAL,{v}(u), and Equation (34) comes from the assumption. For any v ∈ V \ S0 and w ∈ N +(v), pL+1(v→ w) = P(EvwAL+1,{w}(v)). = PvwP(AL+1,{w}(v)) (35) (36) 6 Equation (36) follows from the independence between the events Evw and AL+1,{w}(v). If w ∈ N−(v), pL+1(v→ w) = PvwP(∪u∈N−(v)\{w}EuvAL,{v,w}(u))  1 − (cid:89) 1 − (cid:89) 1 − (cid:89) ≤ Pvw ≤ Pvw ≤ Pvw (1 − P(EuvAL,{v,w}(u))) u∈N−(v)\{w}   , (1 − pL(u→ v)) u∈N−(v)\{w} (1 − UBL(u→ v)) u∈N−(v)\{w} (37) (38) (39) (40) (41) (42) (43) (44) (46) (47) Equation (40) holds, since the two events satisfy EuvAL,{v,w}(u) ⊆ EuvAL,{v}(u). Recall that, if w ∈ N−(v), UBL+1(v→ w) = Pvw(1 − 1 − UBL+1(v) 1 − UBL(w→ v) = Pvw(1 − (cid:89) ) (1 − UBL(u→ v))). u∈N−(v)\{w} Thus, pL+1(v→ w) ≤ UBL+1(v→ w), for all w ∈ N +(v) ∩ N−(v). If w /∈ N−(v), (45) Hence, pL+1(v→ w) ≤ UBL+1(v→ w), for all w ∈ N +(v), concluding the induction proof. Finally, by Lemma 1, 1 −(cid:89) pL+1(v→ w) = PvwP(∪u∈N−(v)EuvAL,{v,w}(u)) ≤ Pvw (1 − UBL(u→ v)) = PvwUBL+1(v) = UBL+1(v→ w), u∈N−(v)  σ(S0) ≤ (cid:88) ≤ (cid:88) v∈V (1 − n−1(cid:89) (1 − n−1(cid:89) l=0 v∈V l=0 (1 − pl(v))) (1 − UBl(v))) = σ+(S0). 3.2 Algorithm for NB-UB Next, we present Nonbacktracking Upper Bound (NB-UB) algorithm which efficiently com- putes UBl(v) and UBl(u→ v) by message passing. At l-th iteration, the variables in NB-UB represent as follows. 7 · Sl : set of nodes that are processed at l-th iteration. · Mcurr(v) = {(u, UBl−1(u→ v)) : u is an in-neighbor of v, and u ∈ Sl−1}, set of pairs (previously processed in-neighbor u of v, incoming message from u to v). · MSrc(v) = {u : u is a in-neighbor of v, and u ∈ Sl−1}, set of in-neighbor nodes of v that were processed at the previous step. · Mcurr(v)[u] = UBl−1(u→ v), the incoming message from u to v. · Mnext(v) = {(u, UBl(u→ v)) : u is an in-neighbor of v, and u ∈ Sl}, set of pairs (currently processed in-neighbor u, next iteration's incoming message from u to v). Algorithm 1 Nonbacktracking Upper Bound (NB-UB) Initialize: UBl(v) = 0 for all 0 ≤ l ≤ n − 1 and v ∈ V Initialize: Insert (v, 1) to Mnext(v) for all v ∈ S0 for l = 0 to n − 1 do for u ∈ Sl do Mcurr(u) = Mnext(u) Clear Mnext(u) UBl(u) = ProcessIncomingMsgUB(Mcurr(u)) for v ∈ N +(u) \ S0 do Sl+1.insert(v) if v ∈ MSrc(u) then else UBl(u→ v) = GenerateOutgoingMsgUB(Mcurr(u)[v], UBl(u),Puv) Mnext(v).insert((u, UBl(u→ v))). UBl(u→ v) = GenerateOutgoingMsgUB(0, UBl(u),Puv) Mnext(v).insert((u, UBl(u→ v))). Output: UBl(u) for all l, u At the beginning, every seed node v ∈ S0 is initialized such that Mcurr(v) = {(v, 1)}. For each l-th iteration, every node u in Sl is processed as follows. First, ProcessIncomingMsgUB(Mcurr(u)) computes UBl(u) as in Equation (23). Second, u passes a message to its neighbor v ∈ N +(u) \ S0 along the edge (u, v), and v stores (inserts) the message in Mnext(v) for the next iteration. The message contains 1) the source of the message, u, and 2) UBl(u→ v), which is computed as in Equation (24), by the function GenerateOutgoingMsgUB. Finally, the algorithm outputs UBl(u) for all u ∈ V and l ∈ {0, . . . , n−1}, and the upper bound σ+(S0) is computed by Equation (25). Next, we illustrate how the algorithm runs on a small network in Figure 1. The inde- pendent cascade model IC(G,P, S0) is defined on an undirected graph G = (V, E), where V = {a, b, c, d}, S0 = {b}, and every edge has the same transmission probability p. For each l, Table 1 shows the values of the key variables, Sl, Mcurr, and UBl, in the algorithm and UBl(u→ v) for every pair u, v such that u ∈ Sl and v ∈ N +(u) \ S0. For example, at l = 2, since S2 = {d}, node d is processed. Recall that, at l = 1, node a sent the message (a, UB1(a→ d)) to d, and node c sent the message (c, UB1(c→ d)) to d. 8 Figure 1: The step-wise illustration of NB-UB algorithm on the example network. l = 0 {b} l = 1 {a, c} l = 2 {d} l = 3 {a, c, e} Sl a b c d e Mcurr {(b, 1)} ∅ ∅ ∅ ∅ UB0 0 1 0 0 0 Mcurr {(b, p)} {(b, p)} ∅ ∅ ∅ UB1 p 0 p 0 0 Mcurr ∅ ∅ ∅ {(a, p2), (c, p2)} Out -Prob UB0(b→ a) = p UB0(b→ c) = p UB1(a→ d) = p2 UB1(c→ d) = p2 UB2 0 0 0 Mcurr {(d, p3)} ∅ {(d, p3)} 2p2 − p4 ∅ UB3 p3 0 p3 0 0 ∅ UB2(d→ a) = p3 UB2(d→ c) = p3 UB2(d→ e) = 2p3 − p5 {(d, 2p3 − p5)} 2p3 − p5 UB3(a→ d) = 0 UB3(c→ d) = 0 UB3(e→ d) = 0 Table 1: The values of the key variables in NB-UB algorithm on the example network in Figure 1. Thus, Mcurr(d) = {(a, UB1(a→ d)), (c, UB1(c→ d))} = {(a, p2), (c, p2)} MSrc(d) = {a, c}, (48) (49) and node d is processed as follows. First, compute UB2(d) as UB2(d) = ProcessIncomingMsgUB(Mcurr(d)) (50) (51) Next, set S3 = N +(d)\S0 = {a, c, e}, and compute UB2(d→ a), UB2(d→ c), and UB2(d→ e) as = 1 − (1 − UB1(a→ d))(1 − UB1(c→ d)) = 2p2 − p4. UB2(d→ a) = GenerateOutgoingMsgUB(UB1(a→ d), UB2(d),Pda) UB2(d→ c) = GenerateOutgoingMsgUB(UB1(c→ d), UB2(d),Pdc) = Pda(1 − 1 − UB2(d) 1 − UB1(a→ d) = Pdc(1 − 1 − UB2(d) 1 − UB1(c→ d) ) = p3 ) = p3 UB2(d→ e) = GenerateOutgoingMsgUB(0, UB2(d),Pde) = Pde(1 − 1 − UB2(d) 1 − 0 ) = PdeUB2(d) = 2p3 − p5. (52) (53) (54) (55) (56) (57) 9 𝒑𝒑𝟐𝒂𝒍=𝟎𝒃𝒄𝒅𝒆𝒍=𝟏𝒍=𝟐𝒍=𝟑𝒑𝒑𝟐𝒑𝟑𝒑𝟑𝟐𝒑𝟑−𝒑𝟓 Then, node d send messages (d, UB2(d→ a)) to a, (d, UB2(d→ c)) to c, and (d, UB2(d→ e)) to e, concluding the process of the l = 2 step. Computational complexity: Notice that for each iteration l∈{0, . . . , n−1}, the algorithm accesses at most n nodes, and for each node, the functions ProcessIncomingMsgUB and GenerateOutgoingMsgUB are computed in O(deg(v)). Therefore, the worst case computa- tional complexity is O(V 2 + V E). 3.3 Nonbacktracking lower bounds (NB-LB) A naive way to compute a lower bound on the influence in a network IC(G,P, S0) is to reduce the network to a (spanning) tree network, by removing edges. Then, since there is a unique path from a node to another, we can compute the influence of the tree network, which is a lower bound on the influence in the original network, in O(V ). We take this approach of generating a subnetwork from the original network, yet we avoid the significant gap between the bound and the influence by considering the following directed acyclic subnetworks, in which there is no backtracking walk. Definition 8 (Min-distance Directed Acyclic Subnetwork). Consider an independent cascade model IC(G,P, S0) with G = (V, E) and V = n. Let d(S0, v) be the minimum distance from a seed in S0 to v. A minimum-distance directed acyclic subnetwork (MDAS), IC(G(cid:48),P(cid:48), S0), where G(cid:48) = (V (cid:48), E(cid:48)), is obtained as follows. · V (cid:48) = {v1, ..., vn} is an ordered set of nodes such that d(S0, vi) ≤ d(S0, vj), for every i < j. · E(cid:48) = {(vi, vj) ∈ E : i < j}, i.e. remove edges from E whose source node comes later in the order than its destination node to obtain E(cid:48). vivj = Pvivj, if (vi, vj) ∈ E(cid:48), and P(cid:48) · P(cid:48) If there are multiple ordered sets of vertices that satisfying the condition, we may choose an order arbitrarily. For any k ∈ [n], let p(vk) be the probability that vk ∈ V (cid:48) is infected in the MDAS, IC(G(cid:48),P(cid:48), S0). Since p(vk) is equivalent to the probability of the union of the events that an in-neighbor ui ∈ N−(vk) infects vk, p(vk) can be computed by the principle of inclusion and exclusion. Thus, we may compute a lower bound on p(vk), using Bonferroni inequalities, if we know the probabilities that in-neighbors u and v both infects vk, for every pair u, v ∈ N−(vk). However, computing such probabilities can take O(kk). Hence, we present LBl(vk) which efficiently computes a lower bound on p(vk) by the following recursion. Definition 9. For all vk ∈ V (cid:48), LB(vk) ∈ [0, 1] is defined by the recursion on k as follows. Initial condition: for every vs ∈ S0, vivj = 0, otherwise. Recursion: for every vk ∈ V (cid:48) \ S0, LB(vk) = m∗(cid:88) i=1 LB(vs) = 1. P(cid:48) uivk LB(ui)(1 − i−1(cid:88) j=1 P(cid:48) uj vk  , ) 10 (58) (59) where N−(vk) ={u1, . . . , um} is the ordered set of in-neighbors of vk in IC(G(cid:48),P(cid:48), S0) and m∗ = max{m(cid:48) ≤ m :(cid:80)m(cid:48)−1 Remark. Since the i-th summand in Equation (59) can utilize(cid:80)i−2 computed in (i−1)-th summand, to compute (cid:80)i−1 j=1 P(cid:48) ≤ 1}. uj vk j=1 P(cid:48) uj vk j=1 P(cid:48) , which is already , the summation takes at most uj vk O(deg(vk)). Theorem 3. For any independent cascade model IC(G,P, S0) and its MDAS IC(G(cid:48),P(cid:48), S0), (60) σ(S0) ≥ (cid:88) LB(vk) =: σ−(S0), vk∈V (cid:48) where LB(vk) is obtained recursively as in Definition 9. Proof. We provide a proof by induction. For any vk ∈ V (cid:48), let A(vk) be the event that node vk is infected in MDAS IC(G(cid:48),P(cid:48), S0), and for every edge (vj, vk), let Evj ,vk be the event that edge (vj, vk) is open, i.e. P(Evj ,vk ) = P(cid:48) The initial condition k = 1 holds, since p(v1) = 1 ≥ LB(v1) = 1 (v1 is a seed). For every k ≤ K, assume p(vk) ≥ LB(vk). For the node vK+1, . Recall that p(vk) = P(A(vk)). vj vk p(vK+1) = P(∪vj∈N−(vK+1)Evj vK+1A(vj)). (61) We re-label vertices in N−(vK+1) = {u1, . . . , um(K+1)} where m(K + 1) = in-deg(vK+1), and let QiK+1 = P(cid:48) . Then, for any integer m ≤ m(K + 1), uivK+1 p(vK+1) = P(∪m(K+1) ≥ P(∪m i=1 ≥ m(cid:88) m(cid:88) ≥ m(cid:88) i=1 = EuivK+1A(ui)) i=1 i=1EuivK+1A(ui)) P(EuivK+1A(ui)) − m(cid:88) i−1(cid:88) i−1(cid:88) QiK+1P(A(ui)) − m(cid:88) QiK+1P(A(ui))(1 − i−1(cid:88) j=1 j=1 i=1 i=1 i=1 j=1 QjK+1). P(EuivK+1A(ui)Euj vK+1A(uj)) QiK+1QjK+1P(A(ui)A(uj)) (62) (63) (64) (65) (66) (67) (68) (69) Equation (64) follows from the principle of inclusion and exclusion. Equation (65) results from the Independence between the event that an edge ending with vK+1 is open and the event that a node vi is infected where i < K + 1. Equation (66) holds since P(A(ui)) ≥ P(A(ui)A(uj)). Now, define m∗ = max{m(cid:48) ≤ m(K + 1) :(cid:80)m(cid:48)−1 j=1 QjK+1 ≤ 1}. Then, p(vK+1) ≥ m∗(cid:88) ≥ m∗(cid:88) i=1 QiK+1P(A(ui))(1 − i−1(cid:88) QiK+1LB(ui)(1 − i−1(cid:88) j=1 QjK+1) QjK+1) i=1 = LB(vK+1). j=1 11 Equation (68) follows since 1−(cid:80)i−1 p(vi) ≥ LB(vi) for all vi ∈ V (cid:48), concluding the induction proof. Finally, j=1 QjK+1 ≥ 0 for all i ≤ m∗ by the definition of m∗. Thus, σ(S0) ≥ n(cid:88) ≥ n(cid:88) i=1 p(vi) LB(vi) = σ−(S0). (70) (71) Equation (70) holds since its right hand side equals to the influence of the MDAS, IC(G(cid:48),P(cid:48), S0). i=1 3.4 Algorithm for NB-LB Next, we present Nonbacktracking Lower Bound (NB-LB) algorithm which efficiently com- putes LB(vk). At k-th iteration, the variables in NB-LB represent as follow. ) : vt is an in-neighbor of vk}, set of pairs (incoming message · M(vk) = {(LB(vt),P(cid:48) from an in-neighbor vt to vk, the transmission probability of edge (vt, vk)). · M(vk)i = (M(vk)i,1, M(vk)i,2), the i-th pair in M(vk), for i ≥ 1. Algorithm 2 Nonbacktracking Lower Bound (NB-LB) vtvk Input: directed acyclic network IC(G(cid:48),P(cid:48), S0) Initialize: σ− = 0 Initialize: Insert (1, 1) to M(vi) for all vi ∈ S0 for k = 1 to n do LB(vk) = ProcessIncomingMsgLB(M(vk)) σ− += LB(vk) for vt ∈ N +(vk) \ S0 do M(vt).insert((LB(vk),P(cid:48) vkvt)) Output: σ− At the beginning, every seed node v ∈ S0 is initialized such that M(v) = {(1, 1)}, and σ− = 0. For each k-th iteration, node vk is processed as follows. First, LB(vk) is computed as in the Equation (59), by the function ProcessIncomingMsgLB, and added to σ−. Second, vk passes the message (LB(vk),P(cid:48) vkvt) to its neighbor vt ∈ N +(vk)\S0, and vt stores (inserts) it in M(vt). Finally, the algorithm outputs σ−, the lower bound on the influence. Figure 2: The step-wise illustration of NB-LB on the example network. In Figure 2, we show an example for the lower bound computation by NB-LB on a small network IC(G,P, S0) defined on an undirected graph G = (V, E), where V = {a, b, c, d}, 12 𝐌𝐃𝐀𝐒𝒌=𝟏𝒌=𝟐𝒌=𝟑𝒂𝒃𝒄𝒅𝒑𝒑𝒑𝟐𝒑𝟐+𝒑𝟑−𝒑𝟒 S0 = {a}, and every edge has the same transmission probability p. For each k, Table 2 shows the values of the key variables, M(vk), LB(vk), and (LB(vk),P(cid:48) vkvt) for the out-neighbors vt ∈ N +(vk) \ S0, and shows the change in σ−. vk M(vk) LB(vk) N +(vk) \ S0 (LB(vk),P(cid:48) vkvt ) to vt σ− k = 1 a {(1, 1)} 1 {b, c} k = 2 b {(1, p)} p {c} (1, p) to b and c (p, p) to c 1 1 + p k = 3 k = 4 c {(1, p), (p, p)} p + p2 − p3 {d} (p + p2 − p3, p) to d 1 + 2p + p2 − p3 d ∅ ∅ p2 + p3 − p4 1 + 2p + 2p2 − p4 Table 2: The values of the key variables in NB-LB on the example network in Figure 2. From the undirected network, we obtain MDAS in Figure 2 as follows. Since d(a, S0) = 0, d(b, S0) = d(c, S0) = 1 and d(d, S0) = 2, we order the vertices as {v1 = a, v2 = b, v3 = c, v4 = d} to satisfy that d(vi, S0) ≤ d(vj, S0), for every i < j. Then, NB-LB algorithm process the nodes {v1 = a, v2 = b, v3 = c, v4 = d} sequentially. (LB(a),P(cid:48) For example, at k = 3, node c is processed. Recall that at k = 1, node a sent the message ac) to node c; at k = 2, node b sent the message (LB(b),P(cid:48) bc) to node c. Thus, M(c) = {(LB(a),P(cid:48) ac), (LB(b),P(cid:48) bc)} = {(1, p), (p, p)}. Then, it computes LB(c) by the function ProcessIncomingMsgLB. LB(c) = ProcessIncomingMsgLB(M(c)) bcLB(b)(1 − P(cid:48) Recall that σ− = 1 + p, at the end of iteration k = 2, so acLB(a) + P(cid:48) = P(cid:48) ac) = p + p2 − p3. (72) (73) (74) σ− = 1 + p + LB(c) = 1 + 2p + p2 − p3. (75) Next, since N +(c) \ S0 = {d}, node c sends the message (LB(c),Pcd) = (p + p2 − p3, p) to node d, concluding the process of the k = 3 step. Computational complexity: Obtaining an arbitrary directed acyclic subnetwork from the original network takes O(V + E). Next, the algorithm iterates through the nodes V (cid:48) ={v1, . . . , vn}. For each node vk, ProcessIncomingMsgLB takes O(deg(vk)) and vk sends messages to its out-neighbors in O(deg(vk)). Hence, the worst case computational complexity is O(V + E). 3.5 Tunable nonbacktracking bounds In this section, we introduce the parametrized version of NB-UB and NB-LB which provide control to adjust the trade-off between the efficiency and the accuracy of the bounds. Tunable nonbacktracking upper bounds (tNB-UB): The algorithm inputs the param- eter t, which indicates the maximum length of the paths that the algorithm considers to 13 compute the exact, rather than the upper bound on, probability of infection. For every node u ∈ V , the algorithm computes p≤t(u) that node u is infected by open paths whose length is less than or equal to t. p≤t(u) = P(∪P∈{∪t i=0Pi(S0→u)}{P is open}). (76) Then, we start (non-parameterized) NB-UB algorithm from l = t + 1 with the new initial conditions: for all u ∈ V and v ∈ N +(u), Finally, the upper bound by tNB-UB is computed as(cid:80) UBt(u) = p≤t(u) UBt(u→ v) = pt(u→ v) v∈V (1 −(cid:81)n−1 l=t (1 − UBl(v))). (77) (78) For higher values of t, the algorithm results in tighter upper bounds, while the computa- tional complexity may increase exponentially for dense networks. Thus, this method is most applicable in sparse networks, where the degree of each node is bounded. We present here the parametrized algorithms for NB-UB. Algorithm 3 Tunable NB-UB (tNB-UB) parameter: non-negative integer t ≤ n − 1 Initialize: UBt(v) = 0 for all t ≤ l ≤ n − 1 and v ∈ V for u ∈ V do UBt(u) = p≤t(u) for v ∈ N +(u) \ S0 do if pt(u→ v) > 0 then St+1.insert(v) Mnext(v).insert(u, pt(u→ v)) for l = t + 1 to n − 1 do for u ∈ Sl do Mcurr(u) = Mnext(u) Clear Mnext(u) UBl(u) = ProcessIncomingMsgUB(Mcurr(u)) for v ∈ N +(u) \ S0 do Sl+1.insert(v) if v ∈ Mcurr(u) then else UBl(u→ v) = GenerateOutgoingMsgUB(Mcurr(u)[v], UBl(u),Puv) Mnext(v).insert((u, UBl(u→ v))). UBl(u→ v) = GenerateOutgoingMsgUB(0, UBl(u),Puv) Mnext(v).insert((u, UBl(u→ v))). Output: UBl(u) for all l = {t, t + 1, . . . , n − 1}, u ∈ V Tunable nonbacktracking lower bounds (tNB-LB): We first order the vertex set as V (cid:48) = {v1, . . . , vn}, which satisfies d(S0, vi) ≤ d(S0, vj), for every i < j. Given a non-negative integer parameter t ≤ n, we obtain a t-size subnetwork IC(G[Vt],P[Vt], S0 ∩ Vt), where G[Vt] is the vertex-induced subgraph which is induced by the set of nodes Vt = {v1, . . . , vt}, and 14 P[Vt] is the corresponding transmission probability matrix. For each vi ∈ Vt, we compute the exact probability pt(vi) that node vi is infected in the subnetwork IC(G[Vt],P[Vt], S0 ∩ Vt). Then, we start (non-parameterized) NB-LB algorithm from k = t + 1 with the new initial condition: for all k ≤ t, Finally, tNB-LB computes the lower bound as(cid:80) LB(vk) = pt(vk). vk∈V (cid:48) LB(vk). (79) Algorithm 4 Tunable NB-LB (tNB-LB) parameter: non-negative integer t ≤ n Initialize: σ− = 0 for k = 1 to t do LB(vk) = pt(vk) σ− += LB(vk) for vi ∈ {N +(vk) ∩ {vj : j > t}} do M(vi).insert((LB(vk),P(cid:48) vkvi)) for k = t + 1 to n do LB(vk) = ProcessIncomingMsgLB(M(vk)) σ− += LB(vk) for vi ∈ N +(vk) \ S0 do M(vi).insert((LB(vk),P(cid:48) vkvi)) Output: σ− For a larger t, the algorithm results in tighter lower bounds. However, the computational complexity may increase exponentially with respect to t, the size of the subnetwork. This algorithm can adopt Monte Carlo simulations on the subnetwork to avoid the large computa- tional complexity. However, this modification results in probabilistic lower bounds, rather than theoretically guaranteed lower bounds. Nonetheless, this can still give a significant improvement, because the Monte Carlo simulations on a smaller size of network require less computations to stabilize the estimation. 4 Experimental results In this section, we evaluate the NB-UB and NB-LB in independent cascade models on a variety of classical synthetic networks. Network generation : We consider 4 classical random graph models with the parameters shown as follows: Erdos Renyi random graphs with ER(n = 1000, p = 3/1000), scale-free networks SF (n = 1000, α = 2.5), random regular graphs Reg(n = 1000, d = 3), and random tree graphs with power-law degree distributions T (n = 1000, α = 3). For each graph model, we generate 100 networks IC(G, pA,{s}) as follows. The graph G is the largest connected component of a graph drawn from the graph model, the seed node s is selected randomly from the vertex set of G, and A is the adjacency matrix of G. Then, the corresponding IC model has the same transmission probability p for every edge. 15 Evaluation of bounds : For each network generated, we compute the following quanti- ties for each p ∈ {0.1, 0.2, . . . , 0.9}. · σmc: the estimation of the influence with 1000000 Monte Carlo simulations. · σ+: the upper bound obtained by NB-UB. · σ+ · σ−: the lower bound obtained by NB-LB. · σ− prob: the probabilistic lower bound obtained by 10 Monte Carlo simulations. spec: the spectral upper bound by [16]. Figure 3: This figure compares the average relative gap of the bounds: NB-UB, the spectral upper bound in [16], NB-LB, and the probabilistic lower bound computed by MC simulations, for various types of networks. The probabilistic lower bound is chosen for the experiments, since there has not been any tight lower bound. The sample size of 10 is determined to overly match the computational complexity of NB-LB algorithm. In Figure 3, we compare the average relative gap of the bounds for every network model and for each transmission probability, where the true value is assumed to be σmc. For example, the average relative gap of NB-UB for 100 Erdos Renyi net- σ+[Ni]−σmc[Ni] works {Ni}100 , where σ+[Ni] and σmc[Ni] denote the NB-UB and the MC estimation, respectively, for the network Ni. i=1 with the transmission probability p is computed by 1 Results : Figure 3 shows that NB-UB outperforms the upper bound in [16] for the Erdos- Renyi and random 3-regular networks, and performs comparably for the scale-free networks. Also, NB-LB gives tighter bounds than the MC bounds on the Erdos-Renyi, scale-free, and random regular networks when the transmission probability is small, p < 0.4. The NB-UB and NB-LB compute the exact influence for the tree networks since both algorithms avoid backtracking walks. (cid:80) σmc[Ni] 100 i∈[100] Next, we show the bounds on exemplary networks. 4.1 Upper bounds Selection of networks : In order to illustrate a typical behavior of the bounds, we have chosen the network in Figure 4a as follows. First, we generate 100 random 3-regular graphs 16 (a) (b) Figure 4: (a) The figure compares various upper bounds on the influence in the 3-regular network in section 4.1. The MC upper bounds are computed with various simulation sizes and shown with the data points indicated with MC(N ), where N is the number of simulations. The spectral upper bound in [16] is shown in red line, and NB-UB is shown in green line. (b) The figure shows lower bounds on the influence of a scale-free network in section 4.2. The probabilistic lower bounds shown with points are obtained from Monte Carlo simulations with various simulation sizes, and the data points indicated with MC(N ) are obtained by N number of simulations. NB-LB is shown in green line. G with 1000 nodes and assign a random seed s. Then, the corresponding IC model is defined as IC(G,P = pA, S0 = {s}), where A is the adjacency matrix, resulting in the same transmission probability p for every edge. For each network, we compute NB-UB and MC estimation of 1000 simulations. We note that with 1000 simulations, the estimation given by MC cannot guarantee stability. Yet, given limited time and resources, it is acceptable for the selection process. Then, we compute the score for each network. The score is defined as the sum of the square differences between the upper bounds and MC estimations over the transmission probability p ∈ {0.1, 0.2, . . . , 0.9}. Finally, a graph whose score is the median from all 100 scores is chosen for Figure 4a. Results : In figure 4a, we compare 1) the upper bounds introduced [16] and 2) the probabilistic upper bounds obtained by Monte Carlo simulations with 99% confidence level, to NB-UB. The upper bounds from MC simulations are computed with the various sample sizes N ∈ {5, 10, 30, 300, 3000}. It is evident from the figure that a larger sample size provides a tighter probabilistic upper bound. NB-UB outperforms the bound by [16] and the probabilistic MC bound when the transmission probability is relatively small. Further, it shows a similar trend as the MC simulations with a large sample size. 4.2 Lower bounds Selection of networks : We adopt a similar selection process as in the selection for upper bounds, but with the scale free networks, with 3000 nodes and α = 2.5. Results : We compare probabilistic lower bounds obtained by MC with 99% confidence level to NB-LB. The lower bounds from Monte Carlo simulations are computed with various sample sizes N ∈ {5, 12, 30, 300, 3000}, which accounts for a constant, log(n), 0.01n, 0.1n, and n = V . NB-LB outperforms the probabilistic bounds by MC with small sample sizes. 17 0010203040506070809010000.050.10.150.20.250.30.350.40.450.5InfluenceTransmission ProbabilityUpper bounds of the influenceMC (5)MC (10)MC (30)MC (300)MC (3000)NB-UBSpectral010203040506070809010000.10.20.30.40.5010020030040050060070080090010000.50.60.70.80.91180.92605.80500100015002000250000.10.20.30.40.50.60.70.80.91InfluenceTransmission ProbabilityLower bounds of the influenceMC (5)MC (12)MC (30)MC (300)MC (3000)NB-LB Recall that the computational complexity of the lower bound in algorithm 2 is O(V + E), which is the computational complexity of a constant number of Monte Carlo simulations. In figure 4b, it shows that NB-LB is tighter than the probabilistic lower bounds with the same computational complexity, and it also agrees with the behavior of the MC simulations. 4.3 Tunable bounds In this section, we present tunable upper and lower bounds on example networks. (a) (b) Figure 5: (a) NB-UB, tNB-UB with t = 3, and MC estimation with 10000 simulations on a 3-regular network with 100 nodes. (b) NB-LB, tNB-LB with various t ∈ {12, 100, 300}, and MC estimation with 3000000 simulations on a scale-free network with 3000 nodes. In Figure 5a, we show tNB-UB on a sample network. We consider a 3-regular network with 100 nodes and a single seed. Since the NB-UB gives a tight bound on p < 0.4, we plot tNB-UB on p ∈ (0.4, 0.5) where it shows some improvements with small t. In Figure 5b, we present tNB-LB on a scale-free network with 3000 nodes, α = 2.5, and a single seed. We compare tNB-LB with various choices of t ∈ {1, 12, 100, 300}, and tNB-LB approaches the MC estimation as t grows. 5 Conclusion In this paper, we propose both upper and lower bounds on the influence in the independent cascade models, and provide algorithms to efficiently compute the bounds. We extend the results by proposing tunable bounds which can adjust the trade off between the efficiency and the accuracy. Finally, the tightness and the performance of bounds are shown with experimental results. One can further improve the bounds considering r-nonbacktracking walks, i.e. avoiding cycles of length r rather than just backtracks, and we leave this for future study. 6 Acknowledgements We would like to thank Colin Sandon for helpful discussions. This research was partly supported by the NSF CAREER Award CCF-1552131 and the ARO grant W911NF-16-1- 0051. 18 0510152025300.40.410.420.430.440.450.460.470.48InfluenceTransmission ProbabilityTunable NB-UBNB-UBtNB-UB(t=3)MCSeries1Series2Series3Series4Series5050010001500200025001234567891011121314151617181920Chart TitleSeries1Series2Series3Series4Series50500100015002000250000.10.20.30.40.50.60.70.80.91InfluenceTransmission Probability Tunable NB-LBNB-LBtNB-LB(t=12)tNB-LB(t=100)tNB-LB(t=300)MC References [1] E. Abbe and C. Sandon. Detection in the stochastic block model with multiple clusters: proof of the achievability conjectures, acyclic bp, and the information-computation gap. arXiv preprint arXiv:1512.09080, 2015. [2] C. Bordenave, M. Lelarge, and L. Massoulié. Non-backtracking spectrum of random graphs: community detection and non-regular ramanujan graphs. In Foundations of Computer Science (FOCS), 2015 IEEE 56th Annual Symposium on, pages 1347–1357. IEEE, 2015. [3] W. Chen, Y. Wang, and S. Yang. Efficient influence maximization in social networks. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 199–208. ACM, 2009. [4] W. Chen, Y. Yuan, and L. Zhang. Scalable influence maximization in social networks under the linear threshold model. In Data Mining (ICDM), 2010 IEEE 10th International Conference on, pages 88–97. IEEE, 2010. [5] M. Draief, A. Ganesh, and L. Massoulié. Thresholds for virus spread on networks. In Proceedings of the 1st international conference on Performance evaluation methodolgies and tools, page 51. ACM, 2006. [6] C. M. Fortuin, P. W. Kasteleyn, and J. Ginibre. Correlation inequalities on some partially ordered sets. Communications in Mathematical Physics, 22(2):89–103, 1971. [7] A. Goyal, W. Lu, and L. V. Lakshmanan. Celf++: optimizing the greedy algorithm for influence maximization in social networks. In Proceedings of the 20th international conference companion on World wide web, pages 47–48. ACM, 2011. [8] M. Granovetter. Threshold models of collective behavior. American journal of sociology, pages 1420–1443, 1978. [9] B. Karrer, M. Newman, and L. Zdeborová. Percolation on sparse networks. Physical review letters, 113(20):208702, 2014. [10] B. Karrer and M. E. Newman. Message passing approach for general epidemic models. Physical Review E, 82(1):016101, 2010. [11] D. Kempe, J. Kleinberg, and É. Tardos. Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 137–146. ACM, 2003. [12] A. Khelil, C. Becker, J. Tian, and K. Rothermel. An epidemic model for information diffusion in manets. In Proceedings of the 5th ACM international workshop on Modeling analysis and simulation of wireless and mobile systems, pages 54–60. ACM, 2002. [13] J. T. Khim, V. Jog, and P.-L. Loh. Computing and maximizing influence in linear threshold and triggering models. In Advances in Neural Information Processing Systems, pages 4538–4546, 2016. 19 [14] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborová, and P. Zhang. Spectral redemption in clustering sparse networks. Proceedings of the National Academy of Sciences, 110(52):20935–20940, 2013. [15] E. J. Lee, S. Kamath, E. Abbe, and S. R. Kulkarni. Spectral bounds for independent cascade model with sensitive edges. In 2016 Annual Conference on Information Science and Systems (CISS), pages 649–653, March 2016. [16] R. Lemonnier, K. Scaman, and N. Vayatis. Tight bounds for influence in diffusion networks and application to bond percolation and epidemiology. In Advances in Neural Information Processing Systems, pages 846–854, 2014. [17] J. Leskovec, L. A. Adamic, and B. A. Huberman. The dynamics of viral marketing. ACM Transactions on the Web (TWEB), 1(1):5, 2007. [18] J. Leskovec, A. Krause, C. Guestrin, C. Faloutsos, J. VanBriesen, and N. Glance. Cost- effective outbreak detection in networks. In Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 420–429. ACM, 2007. [19] D. Lopez-Pintado and D. J. Watts. Social influence, binary decisions and collective dynamics. Rationality and Society, 20(4):399–443, 2008. [20] B. Shulgin, L. Stone, and Z. Agur. Pulse vaccination strategy in the sir epidemic model. Bulletin of Mathematical Biology, 60(6):1123–1148, 1998. [21] C. Wang, W. Chen, and Y. Wang. Scalable influence maximization for independent cascade model in large-scale social networks. Data Mining and Knowledge Discovery, 25(3):545–576, 2012. [22] D. J. Watts. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences, 99(9):5766–5771, 2002. [23] J. Yang and S. Counts. Predicting the speed, scale, and range of information diffusion in twitter. 2010. 20
1206.3933
3
1206
2013-04-04T17:21:58
Prediction of Emerging Technologies Based on Analysis of the U.S. Patent Citation Network
[ "cs.SI", "physics.soc-ph" ]
The network of patents connected by citations is an evolving graph, which provides a representation of the innovation process. A patent citing another implies that the cited patent reflects a piece of previously existing knowledge that the citing patent builds upon. A methodology presented here (i) identifies actual clusters of patents: i.e. technological branches, and (ii) gives predictions about the temporal changes of the structure of the clusters. A predictor, called the {citation vector}, is defined for characterizing technological development to show how a patent cited by other patents belongs to various industrial fields. The clustering technique adopted is able to detect the new emerging recombinations, and predicts emerging new technology clusters. The predictive ability of our new method is illustrated on the example of USPTO subcategory 11, Agriculture, Food, Textiles. A cluster of patents is determined based on citation data up to 1991, which shows significant overlap of the class 442 formed at the beginning of 1997. These new tools of predictive analytics could support policy decision making processes in science and technology, and help formulate recommendations for action.
cs.SI
cs
Scientometrics manuscript No. (will be inserted by the editor) Prediction of Emerging Technologies Based on Analysis of the U.S. Patent Citation Network P´eter ´Erdi · Kinga Makovi · Zolt´an Somogyv´ari · Katherine Strandburg · Jan Tobochnik · P´eter Volf · L´aszl´o Zal´anyi 3 1 0 2 r p A 4 ] I S . s c [ 3 v 3 3 9 3 . 6 0 2 1 : v i X r a Received: date / Accepted: date Correspondence to P´eter ´Erdi, address: Kalamazoo College, 1200 Academy Street, Kalamazoo, MI 49006, USA; phone: +(269) 337-5720; fax: +(269) 337-7101; e-mail: [email protected] Abstract The network of patents connected by citations is an evolving graph, which provides a representation of the innovation process. A patent citing another implies that the cited patent reflects a piece of previously existing knowledge that the citing patent builds upon. A methodology presented here (i) identifies actual clusters of patents: i.e. technological branches, and (ii) gives predictions about the temporal changes of the structure of the clusters. A predictor, called the citation vector, is defined for characterizing technological development to show how a patent cited by other patents belongs to various industrial fields. The clustering technique adopted is able to detect the new emerging recombinations, and predicts emerging new technology clusters. The predictive ability of our new method is illustrated on the example of USPTO subcategory 11, Agriculture, Food, Textiles. PE thanks the Henry Luce Foundation and the Toyota Research Institue for their support. KJS acknowledges the generous support of The Filomen D’Agostino and Max E. Greenberg Research Fund. P. ´Erdi · K. Makovi · J. Tobochnik · L. Zal´anyi Center for Complex Systems Studies, Kalamazoo College, Kalamazoo, MI 49006, USA Tel.: +(269) 337-5720 Fax: +(269) 337-7101 E-mail: [email protected] P. ´Erdi · K. Makovi · Z. Somogyv´ari · P. Volf · L. Zal´anyi Complex Systems and Computational Neuroscience Group, Wigner Research Centre for Physics, Hungarian Academy of Sciences, Budapest, Hungary P. Volf Department of Measurement and Information Systems, Budapest University of Technology and Economics, Budapest, Hungary Network and Subscriber Data Management, Nokia Siemens Networks, Budapest, Hungary K. Makovi Department of Sociology, Columbia University, New York, NY, USA K. Strandburg New York University School of Law, New York, NY, USA 2 P´eter ´Erdi et al. A cluster of patents is determined based on citation data up to 1991, which shows significant overlap of the class 442 formed at the beginning of 1997. These new tools of predictive analytics could support policy decision making processes in science and technology, and help formulate recommendations for action. Keywords patent citation · network · co-citation clustering · technological evolution 1 Introduction In this paper we present a conceptual framework and a computational algorithm for studying the process of technological evolution and making predictions about it by mining the patent citation network. Patent data long has been recognized as a rich and potentially fruitful source of information about innovation and techno- logical change. Besides describing and claiming inventions, patents cite previous patents (and other references) that are relevant to determining whether the inven- tion is sufficiently novel and nonobvious to be patented. Citations are contributed by patentees, patent attorneys, and patent office examiners. Patents, as nodes, and citations between them, as edges, form a growing directed network, which aggre- gates information about technological relationships and progress provided by those players. Our methodology seeks to detect incipient technological trends reflected in the citation network and thus to predict their emergence. The proposed method should also be useful for analyzing the historical evolution of patented technology. Innovation is frequently deemed key to economic growth and sustainability (Saviotti et al, 2003, 2005; Saviotti, 2005). Often, economically significant tech- nologies are the result of considerable investment in basic research and technology development. Basic research is funded by the government and, to a lesser extent, by large firms such as those found in the medical and pharmaceutical industries. Development is carried out by a range of players, including start-up companies spending large fractions of their revenues on innovation. Not surprisingly research and development (R&D) costs have risen rapidly in the past few decades. For example, “worldwide R&D expenditures in 2007 totaled an estimated $1,107 bil- lion.”1 Because innovation is unpredictable, R&D investment is often risky. The prac- tical implications for particular firms are evident: “The continuous emergence of new technologies and the steady growth of most technologies suggest that rely- ing on the status quo is deadly for any firm...” (Sood and Tellis, 2005). As Day and Schoemaker argue (Day and Schoemaker, 2005): “...The biggest dangers to a company are the ones you don’t see coming. Understanding these threats – and anticipating opportunities – requires strong peripheral vision.” In the long term, understanding the emergence of new technological fields could help to orient public policy, direct investment, and reduce risk, resulting in improved economic efficiency. Detecting the emergence of new technological branches is an intrinsically difficult problem, however. Recent improvements in computing power and in the digitization of patent data make possible the type of large-scale data mining methodology we develop in this paper. Our approach belongs to the field of predictive analytics, which 1 http://www.nsf.gov/statistics/seind10/c4/c4s5.htm Prediction of Emerging Technologies 3 is a branch of data mining concerned with the prediction of future trends. The central element of predictive analytics is the predictor, a mathematical object that can be defined for an individual, organization or other entity and employed to predict its future behavior. Here we define a ‘citation vector’ for each patent to play the role of a predictor. Each coordinate of the citation vector is proportional to the relative frequency that the patent has been cited by other patents in a particular technological category at a specific time. Changes in this citation vector over time reflect the changing role that a particular patented technology is playing as a contributor to later technological development. We hypothesize that patents with similar citation vectors will belong to the same technological field. To track the development and emergence of technological clusters, we employ clustering algorithms based on a measure of similarity defined using the citation vectors. We identify the community structure of non-assortative patents – those which receive citations from outside their own technological areas. The formation of new clusters should correspond to the emergence of new technological directions. A predictive methodology should be able to “predict” evolution from the “more distant” past to the “more recent” past. A process, called backtesting checks if this criteria is met, which if true, holds the promise of predictions from the present to the near future. To illustrate the potential of our approach and demonstrate that the emergence of new technological fields can be predicted from patent citation data, we backtested by using our method to “predict” an emerging technological area that was later recognized as a new technological class by the US Patent and Trademark Office (USPTO). Because the patent citation network reflects social activity, the potential scope and limitations of prediction are different from those in the natural sciences. Un- expected scientific discoveries, patent laws, habits of patent examiners, the pace of economic growth and many other factors influence the development of technology and of the patent network that we do not intend to explicitly model. Correspond- ingly, patent grants change the innovative environment, which we also don’t in- corporate in our modeling strategy. Any predictive method can peer only into the relatively short term future, ours is not an exception. The methodology developed here harnesses assessments of technological relationships made by a very large number of participants in the system and attempts to capture the larger picture emerging from those grass root assessments. We hope to show what is possible based on a purely structural analysis of the patent citation data in spite of the above mentioned difficulties. 2 The Patent Citation Network The United States patent system is a very large compendium of information about technology, and its evolution goes back more than two hundred years. It con- tains more than 8 million patents. The system reflects technological developments worldwide. Currently about half of US patents are granted to foreign inventors. Of course, the US patent system is not a complete record of technological evolution: not all technological developments are eligible for patenting and not all eligible advances are patented in the United States or anywhere else, for that matter. Nonetheless, the United States patent system is a well-studied and documented source of data about the evolution of technology. Thus, we have chosen it as the 4 P´eter ´Erdi et al. primary basis of our investigation, keeping in mind that our method potentially could be applied to other patent databases as well. Complex networks have garnered much attention in the last decade. The appli- cation of complex network analysis to innovation networks has provided a new per- spective from which to understand the innovation landscape (Pyka and Scharnhost, 2009). In our study, the patent citation network is comprised of patents (nodes) and the citations between them (links). A patent citation reflects a technological relationship between the inventions claimed in the citing and cited patents. Cita- tions are contributed by patentees and their attorneys and by patent examiners. They reflect references to be considered in determining whether the claimed in- vention meets the patentability requirements of novelty and nonobviousness. Both patentees and patent examiners have incentives to cite materially related prior patents. Patent applicants are legally required to list related patents of which they are aware. Patent examiners seek out the most closely related prior patents so that they can evaluate whether a patent should be granted. Consequently, ci- tation of one patent by another represents a technological connection between them, and the patent citation network reflects information about technological connections known to patentees and patent examiners. Patents sometimes cite scientific journals and other non-patent sources. We ignore those citations here. Taking them into account is not necessary to our goal of identifying emerging technology clusters and is not possible using our current methodology, though it may be possible in the future to improve the method by devising a means to take them into account. In the literature review section we will give a more detailed analysis of what one can infer from the patent network, here we cite only (Duguet and MacGarvie, 2005):”...patent citations are indeed related to firms’ statements about their acquisition and dispersion of new technology...”. As described below, our methodology utilizes a classification system based on the one that USPTO uses in defining our citation vector. However, our method- ology has the promise to predict the emergence of new technological fields not yet captured by the USPTO classification system. The USPTO system has about 450 classes, and over 120,000 subclasses. All patents and published patent appli- cations are manually assigned to primary and secondary classes and subclasses by patent examiners. The classification system is used by patent examiners and by applicants and their attorneys and agents as a primary resource for assisting them in searching for relevant prior art. Classes and sub-classes are subject to ongoing modification, reflecting the USPTO’s assessment of technological change. Not only are new classes added to the system, but patents can be reclassified when a new class is defined. As we discuss later, that reclassification provides us with a natural experiment, which offers an opportunity to test our methodology for de- tecting emerging new fields (Jaffe and Trajtenberg, 2005). Within the framework of a project sponsored by the National Bureau of Economic Research (NBER), a higher-level classification system was developed, in which the 400+ USPTO classes were aggregated into 36 subcategories2, which were further lumped into 2 11 – Agriculture, Food, Textiles; 12 – Coating; 13 – Gas; 14 – Organic Compounds; 15 – Resins; 19 – Miscellaneous-Chemical; 21 – Communications; 22 – Computer Hard- ware&Software; 23 – Computer Peripherials; 24 – Information Storage; 31 – Drugs; 32 – Surgery&Med Inst; 33 – Biotechnology; 39 – Miscellaneous-Drgs&Med; 41 – Electrical De- vices; 42 – Electrical Lighting; 43 – Measuring&Testing; 44 – Nuclear&X-rays; 45 – Power Systems; 46 –Semiconductor Devices; 49 – Miscellaneous-Electric; 51 – Mat.Proc&Handling; Prediction of Emerging Technologies 5 six categories (Computers and Communications, Drugs and Medical, Electrical and Electronics, Chemical, Mechanical and Others). As any classification system, this system reflects ad hoc decisions as to what constitutes a category or a sub- category. However this classification system appears to show sufficient robustness to be of use in our methodology (Jaffe and Trajtenberg, 2005). 3 Literature Review Two strands of literature form the context for our research. First, there is a large literature in which patent citations (and, relatedly, academic journal citations) are used to explore various aspects of technological and scientific development. Second, there is a literature involving attempts to produce predictive roadmaps of the direction of science and technology. Our project, along with a few others, stands at the intersection of these two literatures, using patent citations as a predictive tool. 3.1 Patent citation analysis Patent citation analysis has been used for a variety of different objectives. For example, citation counts have long been used to evaluate research performance (Garfield, 1983; Moed, 2005). Economic studies suggest that patent citation counts are correlated with economic value (Harhoff et al, 1999; Sampat and Ziedonis, 2002; Hagedoorn and Cloodt, 2003; Lanjouw and Schankerman, 2004; Jaffe and Trajtenberg, 2005). More generally, patent citation data has been used in conjunc- tion with other empirical information, such as information about the companies who own patents, interviews with scientists in the field, and analysis of the citation structure of scientific papers, to explore the relationship between innovation and the patent system (Narin, 1994; Milman, 1994; Meyer, 2001; Kostoff and Schaller, 2001; Debackere et al, 2002; Murray, 2002; Verbeek et al, 2002). Patent citations have also been used to investigate knowledge flows and spillovers (Duguet and MacGarvie, 2005; Strumsky et al, 2005; Fleming et al, 2006; Sorenson et al, 2006), though the validity of these studies is called into question by the fact that patent citations are very frequently inserted as a result of a search for relevant prior art by a patentee’s attorney or agent or a patent examiner (Sampat, 2004; Criscuolo and B.Verspagen, 2008; Alcacer and Gittelman, 2006). From previous work the basic idea is that new knowledge comes from combinations of old knowledge. Local com- binations are more effective than distant combinations, which though rare, when they occur provide major new knowledge (Sternitzke, 2009). We ourselves have used the methodologies of modern network science to study the dynamic growth of the patent citation network in an attempt to better understand the patent sys- tem itself and the possible effects of changes in legal doctrine (Strandburg et al, 2007, 2009). 52 – Metal Working; 53 – Motors&Engines+Parts; 54 – Optics; 55 – Transportation; 59 – Miscellaneous-Mechanical; 61 – Agriculture, Husbandry, Food; 62 – Amusement Devices; 63 – Apparel&Textile; 64 – Earth Working&Wells; 65 – Furniture, House, Fixtures; 66 – Heating; 67 – Pipes&Joints, 68 – Receptacles, 69 – Miscellaneous-Others. 6 P´eter ´Erdi et al. Other scholars have used patents as proxies for invention in attempts to de- velop and test theoretical models for the process of technological evolution. For example, Fleming and Sorenson (Fleming, 2001; Fleming and Sorenson, 2001) de- velop a model of technological evolution in which technology evolves primarily by a process of searching for new combinations of existing technologies. In anal- ogy to biological evolution, they imagine a “fitness landscape” and a process of “recombinant search” by which technological evolution occurs. They use citations as a measure of fitness, and conclude that a successful innovation balances be- tween re-using familiar components – an approach which is likely to succeed – and combining elements that have rarely been used together – an approach that often fails, but produces more radical improvements. In a later paper Fleming (Fleming, 2004) uses patent citation data to explore the value of using science to guide technological innovation by tracking the number of patent citations to non-patent sources, and measures the difficulty of an invention by looking at how subclasses related to the patent were previously combined. His main conclusion is that science provides the greatest advantage to those inventions with the great- est coupling between the components (non-modularity). Podolny and Stuart also use patent citations to study the innovative process (Podolny and Stuart, 1995). They define local measures of competitive intensity and competitive crowding in a technological niche based on indirect patent citation ties and use these measures to study the ways in which a technological niche can become crowded and then exhausted as innovative activity proceeds. Most relevant to our work here is that patent citations, as well as academic journal citations, have been used to study the “structure” of knowledge as reflected in different fields and sub-fields. All of these methods rely on some way to measure the similarity or relatedness of patents or journal articles. Co-citation analysis, one approach to this problem, goes back to the now classic works of Small (Small, 1973; Garfield, 1993): “...A new form of document coupling called co-citation is defined as the frequency with which two documents are cited together. The co- citation frequency of two scientific papers can be determined by comparing lists of citing documents in the Science Citation Index and counting identical entries. Networks of co-cited papers can be generated for specific scientific specialties [...] Clusters of co-cited papers provide a new way to study the specialty structure of science...” The assumption of co-citation analysis is that documents that are frequently cited together cover closely related subject matter. Co-citation analysis has been used recently (Chen et al, 2010), as well as more than a decade ago (Mogee and Kolar, 1998b,a, 1999) to study the structure of knowledge in various specific fields, such as nanotechnology (Huang et al, 2003, 2004; Meyer, 2001; Kostoff et al, 2006), semiconductors (Almeida and Kogut, 1997), biotechnology (McMillanm et al, 2000), and tissue engineering (Murray, 2002) providing valuable insight into the development of these technological fields. The main goal of this line of research is to understand in detail the development of a specific industrial sector. Wallace et al. (Wallace et al, 2009) recently adopted a method (Blondel et al, 2008) for using co-citation networks to detect clusters that relies on the topology of the citation- weighted network. Lai and Wu (Lai and Wu, 2005) have argued that co-citation might be used to develop a patent classification system to assist patent managers in understanding the basic patents for a specific industry, the relationships among categories of technologies, and the evolution of a technology category – arguing very much along the lines that we do here. Prediction of Emerging Technologies 7 Researchers are also exploring the use of concepts taken from modern network science and social network studies to illuminate the structure of technology using the patent citation network. For example, Weng et al. (Weng et al, 2010), em- ploy the concept of structural equivalence, a fundamental notion in the classical theory of social networks. They define two patents as “structurally equivalent” in the technological network when they cite the same preceding patents. They use structural equivalence to map out the relationships between 48 insurance business method patents and classify patents as belonging to the technological core or pe- riphery. They compare their results to a classification made by expert inspection of the patents. Our predictor, the ‘citation vector’ described in the following section can be conceived as a tool to get at a weighted version of structural equivalence. Other researchers have measured the distance between patents as defined by the shortest path along the patent citation network. For example, Lee at al. (Lee et al, 2010) recently analyzed a small subset of the patent citation network to study the case of electrical conducting polymer nanocomposites. Chang et al. (Chang et al, 2009) use a measure of “strength” based on the frequency of both direct and indi- rect citation links to define a small set of “basic” patents in the business method arena and then use clustering methods to determine the structure of relationships among those basic patents. For the most part, these studies have been limited to small numbers of patents and many have focused primarily on visualization. Researchers have also used citations between patents and the scientific lit- erature to investigate the relationship between scientific research and patented technology. For example, a comparative study (Shibata et al, 2010) of the struc- tures of the scientific publication and patent citation networks in the field of solar cell technology found a time lag between scientific discovery and its technological application. Other researchers have also considered the role of science in tech- nological innovation by investigating citations between patents and articles in the scientific literature (Mogee and Kolar, 1998b; McMillanm et al, 2000; Meyer, 2001; Tijssen, 2001; Fleming, 2004). One main difference between scientific and patent citations is that they are less likely to have identical references. To account for this difference, it was suggested that the patentee and the patent examiner refer- ence more objectively prior art that is relevant, whereas authors of journal articles have motivation to reference papers that are irrelevant to the subject of the study (Meyer, 2000). Finally, there are various non-citation-based methods of determining the simi- larity between patents (or between academic articles). Researchers have used text mining (Huang et al, 2003; Kostoff et al, 2006), keyword analysis (Huang et al, 2004), and co-classification analysis based on USPTO classifications (Leydesdorff, 2008) in this way. These approaches are usually more time consuming, their im- plementation may be specific to a technological field and involve ad hoc decisions in the classification process and thus they are less systematic than ours. Gener- ally, while we don’t believe that patent citation is the magic bullet to identify the most promising emerging technologies, we see that the more traditional methods of patent trajectory analysis and the new methods are converging (Fontana et al, 2009). 8 P´eter ´Erdi et al. 3.2 Predicting the Direction of Science and Technology There is a large literature concerning various approaches to producing “roadmaps” of science and technology as tools for policy and management based on numerous approaches ranging from citation analysis to expert opinion (see, e.g., Kostoff and Geisler (2007); Kajikawa et al (2008), and references therein). Some of this work seeks to provide direction to specific industrial research and development processes. Recently, for example, OuYang and Weng (OuYang and Weng, 2011) suggested the use of patent citation information, in addition to other information such as expert analysis, during the process of new product design. Citation-based meth- ods, specifically co-citation clustering techniques, have been employed for tracking and predicting growth areas in science using the scientific literature (Small, 2006). Because the patent system is such a rich source of information about the evolution of technology, it has long been hoped that insights into the mechanisms of techno- logical changes can be used to make predictions on emerging fields of technologies (Breitzman, 2007). The extensive work of Kajikawa and his coworkers, which focuses on mining larger scale trends from citation data, is most closely related to the work we report here. These studies use citations to cluster scientific articles in order to detect emerging research areas. These researchers have deployed various clustering techniques based on co-citation and on direct citation networks (Shibata et al, 2008), to explore research evolution in the sustainable energy industry (fuel cell, solar cell) (Kajikawa et al, 2008), the area of biomass and bio-fuels (Kajikawa and Takeda, 2008), and, most recently, in the field of regenerative medicine (Shibata et al, 2011). 4 Research methodology 4.1 Evolving clusters The basic orientation of our research is similar to that of Kaijikawa and co- coworkers. We search for emerging and evolving technology clusters based on a cita- tion network. Our method differs from previous work in several respects, however. All citation-based clustering methods leverage the grass roots, field-specific exper- tise embedded in the citation network. Here, because we are clustering patents we are able to make use of the additional embedded expertise reflected in the assign- ment of patents to USPTO classifications by patent examiners. In our clustering approach, we use evolving patterns of citations to a particular patent by other patents in various technology categories to measure patent similarity. Our method can be used to analyze large subsets of the patent citation network in a systematic fashion and to observe the dynamics of cluster formation and disappearance over time. In the long run we hope to be able to describe these dynamics systematically in terms of birth, death, growth, shrinking, splitting and merging of clusters, anal- ogous to the cluster dynamical elementary events described by Palla et al. (Palla et al, 2007). Figure 1 illustrates these events. Although our method is based on USPTO’s and NBER’s classification of patents, we believe, that any classification system, which covers the whole tech- Prediction of Emerging Technologies 9 Fig. 1 Possible elementary events of cluster evolution. Based on Palla et al. (Palla et al, 2007). nological space and describes it in sufficient detail could serve as the basis for our investigation. 4.2 Construction of a predictor for technological development To capture the time evolution of technological fields, we have constructed a quan- tity, the ‘citation vector’, which we use to define measures of similarity between patents. Specifically, we define the citation vector for a given patent at any given time in the following way: 1. For each patent, we calculate the sum of the citations received by that patent from patents in each of the 36 technological subcategories defined by Hall et al. (Hall et al, 2001); as noted above, these subcategories are aggregations of USPTO patent classifications. This gives us 36 sums for each patent, which we treat as entries in a 36-component vector. In the process of calculating the sums we weight incoming citations with respect to the overall number of citations made by the sender patent, thus, we give more weight to senders which referred to fewer others. The coordinate corresponding to each patent’s own subcategory is set to zero so that the citation vectors focus on the combination of different technological fields. 2. We then normalize the 36-component vector obtained for each patent in the previous step using an Euclidean norm to obtain our citation vector. Patents that have not received any citations are assigned a vector with all zero entries. The citation vector’s components may be interpreted as describing the relative influence that a patent has had on different technological areas at a specific time. The impact of a patent on future technologies changes over time, and thus the citation vector evolves to reflect the changing ways in which a patented invention is reflected in different technological fields. We next seek to group patents into clusters based on their roles in the space of technologies. To do this, we define the similarity between two patents as the Eu- 10 P´eter ´Erdi et al. Table 1 Number of patents in the examined networks and subnetworks in different moments. Patents in the whole database Patents in the subcategory 11 Patents belong to class 442 from 1997 Patents with non-zero citation vector in 11 citations connected to patents in SC 11 01.01.91 01.01.94 01.01.97 12.31.99 4980927 5274846 5590420 6009554 18833 2815 7671 70920 21052 3245 9382 92177 23191 3752 11245 120380 25624 4370 13217 161711 clidean distance of their citation vectors and apply clustering algorithms based on this similarity measure. We thus hypothesize that patents cited in the same propor- tion by patents in other technological areas have similar technological roles. This hypothesis resonates with the hypothesis formulated by the pioneer of co-citation analysis, Henry Small (Small, 1973), that co-cited patents are technologically sim- ilar. Our focus is on those inventions that were influential in technologies other than their own. In other words, we are concentrating on patents that received non-assortative citations (Newman, 2002). Because the high number of patents receiving only intra-subcategory citations tends to mask the recombinant process, citations within the same subcategory are eliminated from the citation vector. Our algorithm for predicting technological development consists of the follow- ing steps: 1. Select a time point t1 between 1975 and 2007 and drop all patents that were issued after t1. 2. Keep some subset of subcategories: c1, c2, . . . , cn – to work with a reasonably sized problem. 3. Compute the citation vector. Drop patents with assortative citation only. 4. Compute the similarity matrix of patents by using the Euclidean distance product between the corresponding citation vectors. 5. Apply a hierarchical clustering algorithm to reveal the functional clusters of patents. 6. Repeat the above steps for several time points t1 < t2 < . . . < tn. 7. Compare the dendrogram obtained by the clustering algorithm for different time points to identify structural changes (such as emergence and/or disap- pearance of groups). The discussion thus far leaves us with two key questions: (i) What algorithms should be chosen to cluster the patents? (ii) How should we link the clustering results from consecutive time steps? The following subsections address these ques- tions. 4.3 Identification of patent clusters Several clustering and graph partitioning algorithms are reasonable candidates for our project. An important pragmatic constraint in choosing clustering algorithms is their computation-time complexity. Given the fact that we are working on a huge database, we face an unavoidable trade-off between accuracy and computa- tion time. Because we do not know a priori the appropriate number of clusters, Prediction of Emerging Technologies 11 hierarchical methods are preferred, as they do not require that the number of clusters be specified in advance. Available clustering methods include the k-means and Ward methods, which are point clustering algorithms (Ward, 1963). Graph clustering algorithms, such as those that use edge-betweenness (Girvan and New- man, 2002; Newman and Girvan, 2004) random walks (Pons and Latapy, 2006) and the MCL method (van Dongen, 2000) are also possible choices. The otherwise celebrated clique-percolation method (Palla et al, 2007) employs a very restrictive concept of a k-clique, making it difficult to mine clusters from the patent citation network. Spectral methods (Newman, 2006) are not satisfactory because they are extremely computation-time intensive in cases like this one, in which one would have to calculate the eigenvalues of a relatively dense matrix. In the application presented here we adopted the Ward method. 4.4 Detecting structural changes in the patent cluster system The structure of dendrograms resulting from hierarchical clustering methods, such as the Ward method, reflects structural relationships between patent clusters. In this hierarchy, each branching point is binary and defined only by its height on the dendrogram, corresponding to the distance between the two branches. Thus, all types of temporal changes in the cluster structure can be divided into four elementary events: 1) increase or 2) decrease in the height of an existing branching point, and 3) insertion of a new or 4) fusion of two existing branching points. To find these substantial, structural changes, we identify the corresponding branching points in the dendrograms representing consecutive time samples of the network and follow their evolution through the time period documented in the database. To test whether our clusters are meaningful, we can compare the emergence of new clusters to the introduction of new classes by the USPTO. Potential new classes can be identified in the clustering results by comparing the dendrogram structure with the USPTO classification. While some of the branching points of the dendrogram are reflected in the current classification structure, we may find significant branches which are not identified by the classification system used at that time point and test our approach by seeing whether clusters that emerge at a particular time are later identified as new classes by the USPTO. 5 Results and model validation We have chosen the NBER subcategory 11, Agriculture, Food, Textiles as an example, to demonstrate our method. The rationals of our choice are: 1. Subcategory 11 (SC 11) has moderate size (compared to other subcategories), which was appropriate to the first test of our algorithm. 2. SC 11 is heterogeneous enough to show non-trivial structure. 3. A new USPTO class, the class 442 was established recently within the subcat- egory 11, which we can use to test our approach. Note, that restriction of the field of investigation does not restrict the possi- bility of cross-technological interactions, because the citation vector remains 36 dimensional, including all the possible interactions between the actually investi- gated and all the other technological fields. 12 P´eter ´Erdi et al. Fig. 2 Cluster structure of patents in the citation space. Two-dimensional represen- tation of patent similarity structure in the subcategory 11 by using the Fruchterman-Reingold algorithm. Local densities corresponding to technological areas can be recognized by the naked eye or identified by clustering methods. The colors encode the US patent classes: red corre- sponds to class 8; green: 19; blue: 71; magenta: 127; yellow: 442; cyan: 504. 5.1 Patent clusters: existence and detectability We begin by demonstrating the existence of local patent clusters based on the citation vector. Such clusters can be seen even with the naked eye by perusing a visualization of the 36 dimensional citation vector space projected onto two dimensions, or can be extracted by a clustering algorithm. See Figure 2. 5.2 Changes in the structure of clusters reflects technological evolution Temporal changes in the cluster structure of the patent system can be detected in the changes of dendrograms. We present the dendrogram structure of the subcate- gory 11 at two different times (Figure 3). Comparing the hierarchical structure in 1994 and 2000, we can observe both quantitative changes, when only the height of the branching point (branch separation distance) changed, and qualitative changes, when a new branching point has appeared. In general, the hierarchical clustering is very sensitive and even the structure of large branches could be changed by changing only a few elements in the basic set. In spite of this general sensitivity, the main branches in the presented den- drograms were remarkably stable through the significant temporal changes during the development - they were easily identifiable from 1991 to 2000, during which time a significant increase took place in the underlying set, as can be seen from Table 1. The main branches and their large scale structure were also stable against minor modifications of the algorithm, such as the weighting method of the given citations during the citation vector calculation. These observations show, that the large branches are well identified real structures. However, this reliability does not Prediction of Emerging Technologies 13 Fig. 3 Temporal changes in the cluster structure of the patent system. Dendrograms representing the results of the hierarchical Ward clustering of patents in subcategory 11, based on their citation vector similarity on Jan. 1, 1994 (18833 patents in graph A) and Dec. 31, 1999 (25624 in graph B). The x axis denotes a list of patents in subcategory 11, while the distances between them, as defined by the citation vector similarity, are drawn on the y axis. (Patents separated by 0 distance form thin lines on the x axis.) The 7 colors of the dendrogram correspond to the 7 most widely separated clusters. While the overall structure is similar in 1994 and 1999, interesting structural changes emerged in this period. The cluster marked with the red color and asterix approximately corresponds to the new class 442, which was established in 1997, but was clearly identifiable by our clustering algorithm as early as 1991. necessarily hold for smaller cluster patterns, which are often the focus of interest. Thus, if a small cluster is identified as a candidate for becoming a new field by our algorithm, it should be considered as a suggestion and should be evaluated by experts to verify the result. really existing structures. Although, this does not necessarily hold for smaller cluster patterns, often in the focus of interest. Thus if a small cluster identified as a candidate becoming a new field by our algorithm, it should be considered as a suggestion and should be revised by experts to verify the result. 5.3 The emergence of new classes: an illustration The most important preliminary validation of our methodology is our ability to “predict” the emergence of a new technology class that was eventually identified by the USPTO. As we mentioned earlier, the USPTO classification scheme not only provides the basis for the NBER subcategories that define our citation vector, it also provides a number of natural experiments to test the predictive power of our clustering method. When the USPTO identifies a new technological category it defines a new class and then may reclassify earlier patents that are now recog- nized to have been part of that incipient new technological category. (Recall that there are many more USPTO classes than NBER subcategories – within a given subcategory there are patents from a number of USPTO classes.) If our clustering method is sensitive to the emergence of new technological fields, we might hope that it will identify new technological branches before the USPTO recognizes their existence and defines new classes. Figures 4 and 5 illustrate the emergence of class 442, which was not defined by the USPTO until 1997. Figure 4 shows how patents that will eventually be reclassified into class 442 can be seen to be splitting off from other patents in 14 P´eter ´Erdi et al. Fig. 4 An example of the splitting process in the citation space, underlying the formation of a new class. In the 2D projection of the 36 dimensional citation space, position of the circles denote the position of the patents in subcategory 11 in the citation space in three different stages of the separation process (Jan. 1,1994, Jan. 1,1997, Dec. 31,1999). Red circles show those patents which were reclassified into the newly formed class 442, during the year 1997. The rest of the patents which preserved their classification after 1997 are denoted by blue circles. Precursors of the separation appear well before the official establishment of the new class. subcategory 11 as early as 1991. The visually recognizable cluster of patents in Figure 4 that will later be reclassified into class 442 can be identified by the Ward method with cutoff at 7 clusters in 1991, as is shown in Figure 5. The histogram in Figure 5 shows the frequency of patents with a given cluster number and USPTO class. Patents that will eventually be reclassified into class 442 are already concentrated in cluster 7. The Pearson-correlation between the class 442 and the correspondig clusters in our analysis resulted in high values: 0.9106 in 1991; 0.9005 in 1994; 0.8546 in 1997 and 0.9177 in the end of 1999. This example thus demonstrates that the citation vector can play the role of a predictor: emerging patent classes can be identified. 6 Discussion Patent citation data seems to be a goldmine of new insights into the develop- ment of technologies, since it represents, even with noise, the innovation process. Scholars have long sought to understand technological change using evolutionary analogies, describing it as a process of recombination of already existing tech- nologies (Schumpeter, 1939; Usher, 1954; Henderson and Clark, 1990; Weitzman, 1996; Hargadon and Sutton, 1997). Inventions are often described as combina- tions of prior technologies. “...For example, one might think of the automobile as a combination of the bicycle, the horse carriage, and the internal combustion en- gine” (Podolny and Stuart, 1995; Podolny et al, 1996; Fleming, 2001; Fleming and Sorenson, 2001). This feature of technological advance is well-recognized in patent law and has been the subject of recent Supreme Court attention, see KSR Int’l Co. v. Teleflex, Inc., 550 U.S. 398 (2007). Our methodology exploits and tests this perspective by using the role a particular patented technology plays in combining existing technological fields to detect the emergence of new technology areas. In this respect our method improves upon clustering methods based entirely on the existence of a citation between two articles or patents by incorporating locally- generated information (the patent category) relevant to the meaning of a given Prediction of Emerging Technologies 15 Fig. 5 Separation of the patents by clustering in the citation space, based on the Jan. 1,1991 data. A: Distribution of the patents issued before 1991 in the subcategory 11, within the 6 official classes in 1997 on the class axis (also marked with different colors) and within the 7 clusters in the citation space. The clustering algorithm collected the majority of those patents which were later reclassified into the newly formed class 442 (orange line) into the cluster 7 (marked with an asterisk). Vice-verse, the cluster 7 contains almost exclusively those patents which were later reclassified. Thus, we were able to identify the precursors of the emerging new class by clustering in the citation space. B: The dendrogram belonging to the hierarchical clustering of the patents in the subcategory 11 in year 1991 shows that the branch which belongs to the cluster 7 is the most widely separated branch of the tree. The coloring here refers to the result of the clustering, unlike graph A where coloring marks the USPTO classes. citation. Here we present a proof of concept for the method. In future work we will scan the patent citation network more broadly to identify clusters that may reflect the incipient development of new technological “hot spots.” We recognize that our method has a number of limitations. An important limitation is the time lag between the birth of a new technology and its appearance in the patent databases as reflected in the accumulation of citations. Cs´ardi et al. (Cs´ardi et al, 2009) showed that the probability that an existing patent will be cited by a new patent peaks about 15 months after issuance. This time lag seems to show little variance across different fields. We may therefore expect that a fair amount of information about the use of a patented technology may have accumulated during that time. It is also the case, however, that the citation probability exhibits a long tail, so that patents may continue to receive additional citations (potentially from different technological areas) over very long times. Clearly the usefulness of the methodology as a predictor will depend on its ability to identify emerging technology areas before they are otherwise recognized. In the specific example we explored here we were able to identify a new class well before its official recognition by the USPTO. In future work, we will seek to determine the time difference between the detection of the first signs that a new cluster is emerging and the official formation of the new class for other cases to determine whether there is a characteristic time lag and, if so, whether it varies among technological categories. The new method combines objective and subjective features. The citations themselves (the links between citing and cited documents) are based on simi- lar technology/application concepts, and can be viewed as more or less objective quantities. The citation vector bases are the manually assigned categories, and can be viewed as more subjective quantities. Thus, in some sense, the approach is a marriage of two types of taxonomies, each having many possible variations. We 16 P´eter ´Erdi et al. suppose that USPTO classification catches sufficient details to reflect in advance some change in its structure. If the resolution is low, i.e. only the larger categories are used we can identify only rare and really deep/fundamental changes. Our methodology also oversimplifies the patent citation network in many ways. For example, technological fields are not homogeneous with respect to number of patents, average number of citations per patent, and so forth. Future work should explore the implications of these differences, especially the consequences of them to the weighting we applied when calculating the citation vector. Finally, because there is no way to determine a priori the appropriate number of clusters for a given subset of the citation network, the method described provides only candidates for the identification of a new technological branch. To put it another way, we offer a decision support system: we are able to identify candidates for hot spots of technological development that are worthy of attention. In future work, we also hope to use the method to examine, from a more theoretical perspective, the specific mechanisms of technological branching. New technological branches can be generated either by a single (cluster dynamical) elementary event or by combinations of such events. For example, a new cluster might arise from a combination of merging and splitting. By examining historical examples, we hope to observe how the elementary events interact to build the recombination process and identify the typical “microscopic mechanisms” under- lying new class formation. This more ambitious research direction is grounded in a hypothesis that social systems are causal systems – complex systems with circular causality and feedback loops (´Erdi, 2007, 2010) – whose statistical properties may allow us to uncover rules that govern their development (for similar attempts see Leskovec and coworkers (2005), and Berlingerio et al (2009)). “...Analogously to what happened in physics, we are finally in the position to move from the anal- ysis of the “social atoms” or “social molecules” (i.e., small social groups) to the quantitative analysis of social aggregate states...” (Vespignani, 2009). Our study of the specific example of the patent citation network may thus help in the long run to advance our understanding of how complex social systems evolve. Acknowledgments PE thanks the Henry Luce Foundation and the Toyota Research Institue for their support. KJS acknowledges the generous support of The Filomen D’Agostino and Max E. Greenberg Research Fund. Thanks for Fulop Bazs´o, Mih´aly B´anyai, Judit Szente, Bal´azs Ujfalussy for discussions. The final publication is available at www.springerlink.com. http://www.springerlink.com/openurl.asp?genre=article&id=doi: 10.1007/s11192-012-0796-4 References Alcacer J, Gittelman M (2006) How do i know what you know? patent examin- ers and the generation of patent citations. Review of Economics and Statistics 88(4):774–779 Almeida P, Kogut B (1997) The exploration of technological diversity and the geographic localization of innovation. Small Business Economics 9:21–31 Berlingerio M, Bonchi F, Bringmann B, Gionis A (2009) Mining graph evolution rules. In: Buntine W, Grobelnik M, Mladenic D, Shawe-Taylor J (eds) Machine Prediction of Emerging Technologies 17 Learning and Knowledge Discovery in Databases, Springer, European Confer- ence on Machine Learning and Knowledge Discovery in Databases, pp 115–130 Blondel V, Guillaume JL, Lambiotte R, Lefebvre E (2008) Fast unfolding of com- munities in large networks. Journal of Statistical Mechanics: Theory and Ex- periment p P10008 Breitzman A (2007) The emerging clusters project. Final Report, 1790 Analytics, www.ntis.gov/pdf/Report-EmergingClusters.pdf Chang S, Lai K, Chang S (2009) Exploring technology diffusion and classification of business methods: using the patent citation network. Technological Forecasting and Social Change 76(1):107–117 Chen C, Ibekwe-SanJuan F, Hou J (2010) The structure and dynamics of co- citation clusters: A multiple-perspective co-citation analysis. Journal of the American Society for Information Science and Technology 61:1386–1409 Criscuolo P, BVerspagen (2008) Does it matter where patent citations come from? inventor versus examiner citations in european patents. Research Policy 37:1892–1908 Cs´ardi G, Strandburg K, Tobochnik J, ´Erdi P (2009) Chapter 10. the inverse problem of evolving networks – with application to social nets. In: Bollob´as B, Kozma R, Mikl´os D (eds) Handbook of Large-Scale Random Networks, Springer- Verlag, Berlin, Heidelberg, New York, pp 409–443 Day G, Schoemaker P (2005) Scanning the periphery. Harvard Business Review pp 1–12 Debackere K, Verbeek A, Luwel M, Zimmermann E (2002) The multiple uses of technometric indicators. International Journal of Management Reviews 4:213– 231 van Dongen S (2000) A cluster algorithm for graphs. Technical Report INS- R0010, National Research Institute for Mathematics and Computer Science in the Netherlands, Amsterdam Duguet E, MacGarvie M (2005) How well do patent citations measure flows of technology? Evidence from French innovation surveys. Economics of Innovation and New Technology 14(5):375–393 ´Erdi P (2007) Complexity Explained. Springer-Verlag, Berlin, Heidelberg ´Erdi P (2010) Scope and limits of predictions by social dynamic models: Crisis, innovation, decision making. Evolutionary and Institutional Economic Review 7:21–42 Fleming L (2001) Recombinant uncertainty in technological search. Management Science 47(1):117–132 Fleming L (2004) Science as a map in technological search. Strategic Management Journal 25:909–928 Fleming L, Sorenson O (2001) Technology as a complex adaptive system: evidence from patent data. Research Policy 30:1019–1039 Fleming L, Juda A, III CK (2006) Small worlds and regional innovation. Harvard Business School Working Paper Series, No. 04–008, available at http://ssrn.com/abstract=892871 Fontana R, Nuvolari A, Verspagen M (2009) Mapping technological trajectories as patent citation networks. an application to data communication standards. Economics of Innovation and New Technology 18:311–336 Garfield E (1983) Citation Indexing – Its Theory and Application in Science, Technology and Humanities. ISI Press, Philadelphia 18 P´eter ´Erdi et al. Garfield E (1993) Co-citation analysis of the scientific literature: Henry small on mapping the collective mind of science. Current Contents 19:3–13 Girvan M, Newman M (2002) Community structure in social and biological net- works. PNAS 99(12):7821–7826 Hagedoorn J, Cloodt M (2003) Measuring innovative performance: Is there an advantage in using multiple indicators? Research Policy 32:1365–1379 Hall B, Jaffe A, Trajtenberg M (2001) The NBER patent citation data file: Lessons, insights and methodological tools. Working Paper 8498, National Bureau of Economic Research Hargadon A, Sutton R (1997) Technology brokering and innovation in a product development firm. Administrative Science Quarterly 42:716–749 Harhoff D, Narin F, Scherer F, Vopel K (1999) Citation frequency and the value of patented inventions. The Review of Economics and Statistics 81:511–515 Henderson R, Clark K (1990) Architectural innovation: The reconfiguration of existing product technologies and the failure of established firms. Administrative Science Quarterly 35(1):9–30 Huang Z, Chen H, Yip A, Ng G, Guo F, Chen ZK, Roco M (2003) Longitudinal patent analysis for nanoscale science and engineering: Country, institution and technology field. Journal of Nanoparticle Research 5:333–363 Huang Z, Chen H, Chen ZK, Roco M (2004) International nanotechnology de- velopment in 2003: Country, institution, and technology field analysis based on uspto patent database. Journal of Nanoparticle Research 6:325–354 Jaffe A, Trajtenberg M (2005) Patents, Citations & Innovations – a Window on the Knowledge Economy. MIT Press, Cambridge Kajikawa Y, Takeda Y (2008) Structure of research on biomass and bio-fuels: A citation-based approach. Technological Forecasting and Social Change 75:1349– 1359 Kajikawa Y, Usui O, Hakata K, Yasunaga Y, Matsushima K (2008) Sructure of knowledge in the science and technology roadmaps. Technological Forecasting and Social Change 75:1–11 Kostoff R, Geisler E (2007) The unintended consequences of metrics in technology evaluation. Journal of Infometrics 1:103–114 Kostoff R, Schaller R (2001) Science and technology roadmaps. IEEE Transactions on Engineering Management 48:132–143 Kostoff R, Stump J, Johnson D, Murday J, Lau C, Tolles W (2006) The structure and infrastructure of the global nanotechnology literature. Journal of Nanopar- ticle Research 8:301–321 Lai K, Wu SJ (2005) Using the patent co-citation approach to establish a new patent classification system. Information Processing and Management 41:313– 330 Lanjouw J, Schankerman M (2004) Patent quality and research productivity: Mea- suring innovation with multiple indicators. The Economic Journal 114(495):441– 465 Lee PC, Su HN, Wu FS (2010) Quantitative mapping of patented technology – the case of electrical conducting polymer nanocomposite. Technological Forecasting and Social Change 77(3):466–478 Leskovec J, Kleinberg J, Faloutsos C (2005) Graphs over time: densification laws, shrinking diameters and possible explanations. In: KDD 2005: Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery Prediction of Emerging Technologies 19 in data mining, ACM, New York, NY, pp 177–187 Leydesdorff L (2008) Patent classifications as indicators of intellectual organiza- tion. Journal of the American Society for Information Science and Technology 59(10):1582–1597 McMillanm G, Narin F, Deeds D (2000) An analysis of the critical role of public science in innovation: the case of biotechnology. Research Policy 29:1–8 Meyer M (2000) What is special about patent citations? differences between sci- entific and patent citations. Scientometrics 49:93–123 Meyer M (2001) Patent citation analysis in a novel field of technology: An explo- ration of nano-science and nano-technology. Scientometrics 51:163–183 Milman B (1994) Individual cocitation clusters as nuclei of complete and dynamic infrometric models of scientific and technological areas. Scientometrics 31:45–57 Moed H (2005) Citation Analysis in Research Evaluation. Springer, Dordrecht, Netherlands Mogee M, Kolar R (1998a) Patent citation analysis of allergan pharmaceutical patents. Expert Opinion on Therapeutic Patents 8(10):1323–1346 Mogee M, Kolar R (1998b) Patent citation analysis of new chemical entities claimed as pharmaceuticals. Expert Opinion on Therapeutic Patents 8(3):213– 222 Mogee M, Kolar R (1999) Patent co-citation analysis of eli lilly & co. patents. Expert Opinion on Therapeutic Patents 9(3):291–305 Murray F (2002) Innovation as co-evolution of scientific and technological net- works: exploring tissue engineering. Research Policy 31:1389–1403 Narin F (1994) Patent bibliometrics. Scientometrics 30:147–155 Newman M (2002) Assortative mixing in networks. Physical Review Letters 89(20):208,701 Newman M (2006) Finding community structure in networks using the eigenvec- tors of matrices. Physical Review E 74:036,104 Newman M, Girvan M (2004) Finding and evaluating community structure in networks. Physical Review E 69(026113) OuYang K, Weng C (2011) A new comprehensive patent analysis approach for new product design in mechanical engineering. Technological Forecasting and Social Change 78(7):1183–1199 Palla G, Barab´asi AL, Vicsek T (2007) Quantifying social group evolution. Nature 446:664–667 Podolny J, Stuart T (1995) A role-based ecology of technological change. The American Journal of Sociology 100(5):1224–1260 Podolny J, Stuart T, Hannan M (1996) Networks, knowledge, and niches: Com- petition in the worldwide semiconductor industry, 1984-1991. The American Journal of Sociology 102(3):659–689 Pons P, Latapy M (2006) Computing communities in large networks using random walks. Journal of Graph Algorithms and Applications 10:191–218 Pyka A, Scharnhost A (2009) Innovation Networks. New Approaches in Modelling and Analyzing. Springer-Verlag, Berlin, Heidelberg Sampat B (2004) Examining patent examination: An analysis of examiner and application generated prior art. Working Paper, Prepared for NBER Summer Institute Sampat B, Ziedonis A (2002) Cite seeing: Patent citations and the economic value of patents. Unpublished manuscript, from the author 20 P´eter ´Erdi et al. Saviotti P (2005) On the co-evolution of technologies and institutions. In: We- ber M, Hemmelskamp J (eds) Towards Environmental Innovations Systems, Springer, Berlin, Hidelberg Saviotti P, de Looze M, Maopertuis M (2003) Knowledge dynamics and the merg- ers of firms in the biotechnology based sectors. International Journal of Biotech- nology 5(3–4):371–401 Saviotti P, de Looze M, Maopertuis M (2005) Knowledge dynamics, firm strat- egy, mergers and acquisitions in the biotechnology based sectors. Economics of Innovation and New Technology 14(1–2):103–124 Schumpeter J (1939) Business Cycles. McGraw-Hill, New York Shibata N, Kajikawa Y, Takeda Y, Matsushima K (2008) Detecting emerging research fronts based on topological measures in citation networks of scientific publications. Technovation 28:758–775 Shibata N, Kajikawa Y, Sakata I (2010) Extracting the commercialization gap between science and technology – case study of a solar cell. Technological Fore- casting and Social Change 77:1147–1155 Shibata N, Kajikawa Y, Takeda Y, Sakata I, Matsushima K (2011) Detecting emerging research fronts in regenerative medicine by the citation network anal- ysis of scientific publications. Technological Forecasting and Social Change 78:274–282 Small H (1973) Cocitation in scientific literature: New measure of relationship be- tween two documents. Journal of The American Society For Information Science 24:265–269 Small H (2006) Tracking and predicting growth areas in science. Scientometrics 68:595–610 Sood A, Tellis G (2005) Technological evolution and radical innovation. Journal of Marketing 69:152–168 Sorenson O, Rivkin J, Fleming L (2006) Complexity, networks and knowledge flow. Research Policy 35(7):994–1017 Sternitzke C (2009) Patents and publications as sources of novel and inventive knowledge. Scientometrics 79:551–561 Strandburg K, Cs´ardi G, Tobochnik J, ´Erdi P, Zal´anyi L (2007) Law and the science of networks: An overview and an application to the “patent explosion”. Berkeley Technology Law Journal 21:1293 Strandburg K, Cs´ardi G, Tobochnik J, ´Erdi P, Zal´anyi L (2009) Patent citation networks revisited: signs of a twenty-first century change? North Carolina Law Review 87:1657–1698 Strumsky D, Lobo J, Fleming L (2005) Metropolitan patenting, inventor agglom- eration and social networks: A tale of two effects. SFI Working Paper No. 05-02- 004, available at http://www.santafe.edu/media/workingpapers/05-02-004.pdf Tijssen R (2001) Global and domestic utilization of industrial relevant science: patent citation analysis of science-technology interactions and knowledge flows. Research Policy 30:35–54 Usher A (1954) A History of Mechanical Invention. Dover, Cambridge Verbeek A, Debackere K, Luwel M, Zimmermann E (2002) Measuring progress and evolution in science and technology – I: The multiple uses of bibliometric indicators. International Journal of Management Reviews 4(2):179–211 Vespignani A (2009) Predicting the behavior of techno-social systems. Science 325(5939):425–428 Prediction of Emerging Technologies 21 Wallace M, Gingras Y, Duhon R (2009) A new approach for detecting scientific specialties from raw cocitation networks. Journal of the American Society for Information Science and Technology 60(2):240–246 Ward J (1963) Hierarchical grouping to optimize an objective function. Journal of the American Statistical Association 58(301):236–244 Weitzman M (1996) Hybridizing growth theory. American Economic Review 86(2):207–12 Weng C, Chen WY, Hsu HY, Chien SH (2010) To study the technological network by structural equivalence. Journal of High Technology Management Research 21:52–63 7 Biographies P´eter ´Erdi is the is the Henry R. Luce Professor of Complex Systems studies in Kalamazoo College, and also a research professor at the Wigner Research Centre for Physics, Hungarian Academy of Sciences He has been working on the fields of computational neuroscience and computational social sciences. Kinga Makovi is a PhD student in the Department of Sociology at Columbia University, and holds an MS in mathematical economics from Corvinus University in Budapest (2010). Her interests include social networks, quantitative methods and simulation techniques in social sciences. Zolt´an Somogyv´ari is a senior research fellow at the Wigner Research Centre for Physics, Hungarian Academy of Sciences. He is an expert in developing new methods of analysing large data sets. Katherine Strandburg is a Professor of Law at New York University School of Law. Her teaching and research activities are in the areas of intellectual property law, cyberlaw, and information privacy law. Prior to her legal caireer, she was a research physicist at Argonne National Laboratory, having received her Ph.D. in Physics from Cornell University. Jan Tobochnik is the Dow Distinguished Professor of Natural Science in Kala- mazoo College. He also served as the Editor of the American Journal of Physics. His research involves using computer simulations to understand a wide variety of systems. In the last decade he has been involved in investigating the structural properties of social networks. P´eter Volf got his master degree in the Department of Measurement and In- formation Systems of the Budapest University of Technology and Economics. His main interest is now developing efficient clustering algorithms. He is now with Nokia Siemens Networks, Budapest. L´aszl´o Zal´anyi is a senior research fellow at the Wigner Research Centre for Physics, Hungarian Academy of Sciences. He is an expert in developing new meth- ods of analysing large data sets. His research areas are the application of stochastic methods to neural and social systems, and network theory.
1802.04472
3
1802
2019-02-22T11:47:03
Community Detection through Likelihood Optimization: In Search of a Sound Model
[ "cs.SI", "math.ST", "math.ST" ]
Community detection is one of the most important problems in network analysis. Among many algorithms proposed for this task, methods based on statistical inference are of particular interest: they are mathematically sound and were shown to provide partitions of good quality. Statistical inference methods are based on fitting some random graph model (a.k.a. null model) to the observed network by maximizing the likelihood. The choice of this model is extremely important and is the main focus of the current study. We provide an extensive theoretical and empirical analysis to compare several models: the widely used planted partition model, recently proposed degree-corrected modification of this model, and a new null model having some desirable statistical properties. We also develop and compare two likelihood optimization algorithms suitable for the models under consideration. An extensive empirical analysis on a variety of datasets shows, in particular, that the new model is the best one for describing most of the considered real-world complex networks according to the likelihood of observed graph structures.
cs.SI
cs
Community Detection through Likelihood Optimization: In Search of a Sound Model∗ Liudmila Prokhorenkova Moscow Institute of Physics and Technology Yandex Moscow, Russia [email protected] Alexey Tikhonov Yandex Berlin, Germany [email protected] 9 1 0 2 b e F 2 2 ] I S . s c [ 3 v 2 7 4 4 0 . 2 0 8 1 : v i X r a ABSTRACT Community detection is one of the most important problems in network analysis. Among many algorithms proposed for this task, methods based on statistical inference are of particular interest: they are mathematically sound and were shown to provide partitions of good quality. Statistical inference methods are based on fitting some random graph model (a.k.a. null model) to the observed network by maximizing the likelihood. The choice of this model is extremely important and is the main focus of the current study. We provide an extensive theoretical and empirical analysis to compare several models: the widely used planted partition model, recently proposed degree-corrected modification of this model, and a new null model having some desirable statistical properties. We also develop and compare two likelihood optimization algorithms suitable for the models under consideration. An extensive empirical analysis on a variety of datasets shows, in particular, that the new model is the best one for describing most of the considered real-world complex networks according to the likelihood of observed graph structures. KEYWORDS Community detection; likelihood optimization; statistical inference; planted partition model; LFR benchmark 1 INTRODUCTION Among various properties shared by many real-world complex networks, community structure is extremely important. It is charac- terized by the presence of highly interconnected groups of vertices (communities or clusters) relatively well separated from the rest of the network. In social networks communities are formed by users with similar interests, in citation networks they represent papers on related topics, etc. The presence of communities highly affects, e.g., the promotion of products via viral marketing, the spreading of infectious diseases, computer viruses and information, and so on. Being able to identify communities in a network could help us to exploit this network more effectively: find similar scientific papers, discover users with similar interests for targeted advertisement, compress or visualize the network, etc. Among other algorithms proposed for community detection, the notable ones are methods based on statistical inference. In such methods, some underlying random graph model is assumed, the evidence is represented by the observed graph, and hidden variables to be inferred are the parameters of the model together with community assignments. Such methods are appealing since ∗This is a preprint for the paper published in Proceedings of the 2019 World Wide Web Conference (WWW'19) under the Creative Commons Attribution 4.0 International (CC-BY 4.0) license. This version contains a few additional technical details. they are theoretically sound and consistent: e.g., it has been proved that when the maximum-likelihood method is applied to networks generated from the same stochastic block model, it returns correct cluster assignments in the limit of large degrees [7]. Also, likelihood can be used to formalize the notion of a community [15]. The choice of the proper null model is essential for statistical in- ference algorithms as it highly affects their performance. There are two types of models: with fixed or non-fixed number of parameters. Direct likelihood optimization for models with non-fixed number of parameters leads to trivial partitions, as discussed in Section 4.1, and additional heuristics are needed to define the number of clus- ters. Hence, in this paper we focus on models with fixed number of parameters. We analyze strengths and weaknesses of two most popular models -- planted partition model and its degree-corrected variant (they are discussed in Section 3). We also propose a new model, which has only one parameter, satisfies a desired statistical property of preserving the expected degree sequence, and shows the best fit for a variety of real-worlds networks according to the likelihood of observed structures. Our research is similar in spirit to the recent paper by Yang and Leskovec [58], where the authors provided an extensive comparison of various community scoring functions. In contrast, we focus solely on the likelihood optimization methods and, particularly, on the comparison of the null models. Note that such models allow to score partitions on the global level instead of individual communities. To the best of our knowledge, we are the first to perform such thorough evaluation of the null models used for community detection. best fit to a variety of real-world complex networks. To sum up, the contributions of this paper are the following: • We theoretically analyze two well-known null models used for community detection. Based on this analysis, we propose a new one-parameter model which has a desirable statistical property of preserving the expected degree sequence. • We empirically demonstrate that the new model gives the • We show that the likelihood based on the proposed model can be used as a new, more reliable, alternative to the well- known modularity measure. • We develop several likelihood optimization algorithms suit- able for all discussed models. We perform an extensive em- pirical comparison of all the algorithms on various synthetic and real-world datasets. • The implementation of the proposed algorithms is available as an open-source library.1 The rest of the paper is organized as follows. In the next section we overview related papers and introduce the required background. 1https://github.com/altsoph/community_loglike Then, in Section 3, we formally define and analyze all null models used in the current research. In Section 4, we discuss the method of statistical inference and present the likelihoods for all models. The proposed likelihood optimization algorithms are discussed in Section 5. Section 6 provides an extensive empirical analysis of all models and algorithms and Section 7 concludes the paper. 2 BACKGROUND AND RELATED WORK 2.1 Community Detection Methods In this section, we briefly overview algorithms used for community detection. However, most of the related work will be discussed in the corresponding background sections: Section 2.2 discusses mod- ularity measure; Section 2.3 defines the LFR bechmark; Sections 3.1 and 3.2 describe standard null models; Section 4.2 discusses papers on statistical inference; Section 5.1 deals with some optimization techniques. For a deeper overview of community detection area, we refer the reader to several survey papers, e.g., [10, 16, 19, 21, 33]. The problem of community detection has recently attracted a lot of attention and many algorithms were proposed to solve this problem. The proposed methods include: spectral algorithms [55]; methods based on statistical inference (see Section 4); methods based on optimization (see Section 5); methods based on dynamical processes on networks, like diffusion, spin dynamics, synchroniza- tion, and so on. Also, existing approaches differ by a particular task at hand: detecting overlapping communities [57], clustering in dynamic [51], directed [48], or weighted [3] networks, community detection in annotated [39] or layered [44] networks, and so on. In this paper, we focus on the basic problem of detecting non- overlapping communities in undirected and unweighted graphs. However, ideas discussed in this paper can be applied to more general cases, since there exist the corresponding generalizations of the null models. We leave this analysis for the future research, since there is a lot to be understood even for the basic case. 2.2 Modularity Throughout this paper we assume that we are given a simple undi- rected graph G = (V(G), E(G)) and the task is to find a partition C = {C1, . . . , Ck} of its vertex set V(G) such that Ci = V(G) and Ci Cj = ∅ for i (cid:44) j. The notation used in the paper is summarized in Table 1. For various problems related to community detection it is ex- tremely important to have a quality function ¯Q(C, G) which mea- sures a goodness of a partition C for a graph G. Having such a function, one can: • Optimize ¯Q(C, G) to detect good communities according to • Use ¯Q(C, G) as a stopping criteria for a community detection algorithm (e.g., to choose the partition level in hierarchical algorithms); • Tune parameters of a parametric community detection algo- • Compare several community detection algorithms when no • Compare several candidate partitions of G. The most well-known such measure is modularity which was first introduced by Newman and Girvan [40]. The basic idea is to ground truth partition is available; this measure; rithm; Variable G V (G) E(G) n = V(G) m = E(G) k = C Q0(C, G, γ) Q1(C, G, γ) c(i) C = {C1, . . . , Ck } Pout = P − Pin min = min(C, G) mout = mout(C, G) P =(cid:0)n 2(cid:1) C∈C(cid:0)C 2(cid:1) Pin = D(C) = Din(C) = dout(i) = d − din(i) i∈C d(i) i∈C din(i) d(i) din(i) m(Cq, Cr) e(i, j) Table 1: Notation Description observed graph, simple and undirected set of vertices set of edges number of vertices in G number of edges in G partition of V (G) number of communities simple modularity defined in (1) standard modularity defined in (2) cluster assignment of vertex i number of intra-community edges number of inter-community edges number of pairs of vertices number of intra-community pairs of vertices number of inter-community pairs of vertices degree of vertex i in G number edges going from i to vertices in Cc(i) number of edges going from i to outside Cc(i) degree of cluster C twice the number of edges induced by C number of edges between Cq and Cr or twice the number of intra-cluster edges if q = r number of edges between i and j consider the fraction of intra-community edges among all edges of G and penalize it in order to avoid trivial partitions like C = {V(G)}. In its general form, modularity is (cid:0)min − γ E(m in)(cid:1) , ′ Q(C, G, γ) = 1 m in = m′ where m = m(G) = E(G) is the number of edges in G; min = min(C, G) is the number of intra-community edges; m′ in(C) is a (random) number of intra-community edges in a graph con- structed according to some underlying random graph model; γ is the resolution parameter [47], which is usually added to get the possibility of varying the number of communities obtained after maximizing Q(C, G, γ). The simplest underlying model is the Erdős -- Rényi random graph, i.e., we assume that G is sampled uniformly at random from the set of all graphs with n vertices and m edges. For this model, E(m′ in) = Pin · m P , where P = (cid:0)n2(cid:1) is the number of pairs of vertices and C∈C(cid:0)C 2(cid:1) is the number of intra-community pairs. So, the Pin = formula for simple modularity is 1 m Q0(C, G, γ) = (cid:18) (cid:19) min − γ Pinm P . (1) However, the Erdős -- Rényi random graph model is known to be not a good descriptor of real-world networks since its Poisson degree distribution significantly differs from heavy-tailed degree distributions observed in real-world networks. A standard solution is to consider a random graph with a given expected degree se- quence [12] as a null model, and to take the degree sequence from the observed graph.2 For this model, the probability that vertices 2At large scale, this model is essentially equivalent to the configuration model [35]: a random graph sampled uniformly from the set of graphs with a given degree sequence.  C∈C , where d(i) is the degree of a i and j are connected equals d(i)d(j) 2m vertex i.3 In this case we have    Em ′ in = where D(C) = 1 2 d(i)d(j) = 1 2m C∈C i∈C d(i) is the degree of cluster C. So, the standard D(C)2 1 4m C∈C i∈C j∈C , expression for modularity is  Q1(C, G, γ) = min m − γ 4m 2 D(C)2 . (2) Originally, modularity was introduced with γ = 1, but is was proven to have a resolution limit [20], i.e., it fails to detect communities smaller than a certain size; varying the resolution parameter helps to overcome this problem, but tuning γ is challenging. Despite some known shortcomings [19], modularity remains the most popular way to measure the quality of a partition and many al- gorithms are based on direct modularity optimization (see Section 5). Also, as we discuss in Section 4, under certain assumptions, modu- larity maximization is equivalent to likelihood optimization [36]. In this paper we also propose a new quality function based on a more consistent one-parametric null model. 2.3 LFR Model Let us now describe the LFR (Lancichinetti-Fortunato-Radicchi) model [29], which is the most widely used synthetic benchmark for comparison of community detection algorithms. LFR generates a graph G on n vertices. The main parameters of the model are: the exponent of the power-law degree distribution γ, the exponent of the power-law community size distribution β, the average degree ¯d, and mixing parameter µ. First, we generate the degrees of vertices by sampling them independently from the power- law distribution with exponent γ and mean ¯d. Each vertex shares a fraction 1 − µ of its edges with the vertices of its community and a fraction µ with the other vertices of the network. The sizes of the communities are sampled from the power-law distribution with exponent β, such that the sum of all sizes equals n. Then, vertices are assigned to communities such that the internal degree of any vertex is less than the size of its community. Finally, the configuration model [35] with rewiring steps is used to construct a graph with the given degree sequence and with the required fraction of internal edges. See [29] for the detailed description of this procedure. 3 NULL MODELS In this section, we analyze several random graph models having community structure and suitable for using as null models for likelihood optimization. 3.1 Stochastic Block Model The most well-known random graph model with community struc- ture is the stochastic block model (SBM) [26]. In this model, the vertices are divided in k clusters and for each pair of vertices i, j 3For technical purposes, it is more convenient (and conventional) to allow the under- lying model to have loops and multiple edges and to assume that the number of edges between vertices i and j follows a Poisson distribution with the mean d(i)d(j) if i (cid:44) i 2m and the expected number of loops for a vertex i is d(i)2 . In particular, in this case 4m we avoid problems when d(i)d(j) > 2m which can possibly occur. Note that usually d(i)d(j) ≪ 2m, so multiple edges rarely appear. we draw an edge between them with probability pc(i),c(j) indepen- dently of all other edges; here c(i) is a community assignment for a vertex i. In other words, the probability of an edge between two vertices depends only on their community assignments. The values pq,r , 1 ≤ q, r ≤ k are parameters of the model, 0 ≤ pq,r ≤ 1 and pq,r = pr,q. The matrix of the probabilities pq,r is called the sto- chastic block matrix. If the diagonal elements are larger than the other ones, then generated graphs have community structure. In many community detection algorithms a simplified version of SBM called planted partition model (PPM) is used [14]. PPM is a special case of SBM, where pq,q = pin for 1 ≤ q ≤ k and pq,r = pout for 1 ≤ q, r ≤ k, q (cid:44) r, pin and pout are parameters of PPM. 3.2 Degree-Corrected Stochastic Block Model Similarly to the Erdős -- Rényi random graph, SBM is unable to model heavy-tailed degree distributions, so community detection algo- rithms based on this model may have a poor quality. To overcome this issue, Karrer and Newman proposed the degree-corrected sto- chastic block model (DCSBM) [28]. In this model the vertices are again assigned to k clusters and edges are placed independently at random. The number of edges between vertices i and j follows a Poisson distribution with the mean d(i)d(j) 2m pc(i),c(j) or a half that number for self-loops. Let us show that DCSBM is able to generate graphs with desired expected degrees. Proposition 1. There exist such pq,r that in DCPPM we have E(d′(i)) = d(i) for all i. Proof. Let us set pq,r = 2 m m(Cq , Cr) D(Cq) D(Cr) , where m(Cq , Cr) is the number of edges between clusters Cq and Cr or twice the number of intra-cluster edges if q = r. Note that these parameters maximize the likelihood for DCSBM [28]. For such parameters we get the desired condition: d(i)d(j) 2m pc(i),c(j) d(i) D(cid:0)Cc(i)(cid:1)  C∈C m(cid:0)C, Cc(i)(cid:1) D(C)  j∈C d(j) = d(i) . = So, we proved that in its general form DCSBM is able to preserve the desired degree sequence. □ The degree-corrected planted partition model (DCPPM) [36] is a simplified version of DCSBM, where pq,q = pin for 1 ≤ q ≤ k and pq,r = pout for 1 ≤ q, r ≤ k, q (cid:44) r. Let us prove the following "negative" proposition. Proposition 2. If pin (cid:44) pout and for some q, r we have D(Cq) (cid:44) D(Cr), then E(d′(i)) (cid:44) d(i) for some i. Proof. Let us compute the expected degree of i: n j=1 E(d ′(i)) = E(d ′(i)) = d(i) 2m pin  j∈Cc(i) = d(i) 2m   pout d(j) + d(i) (cid:16) D(cid:0)Cc(i)(cid:1)(pin − pout) + 2m pout 2m C(cid:44)Cc(i) d(j) j∈C (cid:17) . To get E(d′(i)) = d(i) for all i, we need to have, for any cluster C, D(C)(pin − pout) + 2m pout = 2m . As we have at least two clusters with different values D(C), we have to take pin = pout = 1 , which leads to the standard config- uration model without any community structure and contradicts the statement of the proposition. □ As a result, we obtain that the standard method of limiting the number of parameters in DCSBM leads to inability of the obtained model to preserve the expected degree sequence. 3.3 Independent LFR Model Motivated by Proposition 2, we developed a one-parameter model which preserves the expected degree sequence. It is a special case of DCSBM and we call it independent LFR model (ILFR) due to its analogy to the LFR benchmark. The core problem of DCPPM is the assumption that the probabil- ity of an internal edge is independent of the size of its community, so the fraction of internal edges for a vertex depends on the commu- nity size. On the contrary, we propose using the mixing parameter µ to control this fraction. Namely, we consider DCSBM with the following expected number of edges between two vertices i and j: µd(i)d(j) if c(i) (cid:44) c(j) , 2m (1 − µ)d(i)d(j) D(Cc(i)) µd(i)d(j) 2m + if c(i) = c(j) (or half this number for the self loops). Note that making the proba- bility of an internal edge dependent on the size of the community is very natural: e.g., if a community of people is very small, one would expect that its members are much closer related to each other than members of large communities. The following proposition holds for the proposed model. Proposition 3. In ILFR we have E(d′(i)) = d(i) for all i. Proof. Indeed, let us compute the expected degree of i: ′(i)) = d(i)(cid:169)(cid:173)(cid:171)(1 − µ)  j∈Cc(i) E(d d(j) D(Cc(i)) + µ  j∈V (G) (cid:170)(cid:174)(cid:172) = d(i) . d(j) 2m □ So, this model solves the problem with expected degrees. Another advantage of ILFR is that it has only one parameter µ instead of pin and pout in planted partition models. 4 STATISTICAL INFERENCE 4.1 Method Having discussed possible options for the null models, we are ready to describe the statistical inference method. For community detec- tion problem, this method consists of two ingredients: the evidence, expressed by a graph G, and a random graph null model with pa- rameters θ (θ include community assignments and µ or pin and pout for the models under consideration). The goal is to find such parameters θ that maximize the posterior distribution P(θG) = P(Gθ)P(θ) P(G) , ∫ P(G¯θ)P(¯θ) d θ ¯θ is independent of θ, therefore arg max where P(θ) is the prior distribution of parameters and P(G) = P(θG) = P(Gθ)P(θ) . The choice of the prior distribution P(θ) is arg max θ usually not obvious. Therefore, in the community detection liter- ature, the likelihood P(Gθ) that the model is consistent with the observed graph structure is often maximized. Let us also stress that in Section 3 we discussed two types of models: SBM/DCSBM having non-fixed number of parameters and PPM/DCPPM/ILFR with a fixed number of parameters. If the num- ber of parameters is fixed, then the likelihood optimization can be applied directly. Otherwise, one needs another tool to find the optimal number of clusters, since direct likelihood maximization would lead to a trivial partition with all vertices forming their own clusters and the probability of an edge between two vertices equals 1 if they are connected and 0 otherwise. To avoid this problem, we further focus only on the models with fixed number of parameters. 4.2 Related Work on Statistical Inference Let us briefly describe previous literature on statistical inference in community detection. Hastings [24] considers PPM, as defined in Section 3.1. He shows a connection between the obtained likelihood and the Hamiltonian of a Potts model with short- and long-range interactions. For pin > pout , the model is a spin glass with ferro- magnetic nearest-neighbor interactions and antiferromagnetic long- range interactions. Belief propagation is used to find the ground state of the spin model. Another method based on the directed SBM is presented by Newman and Leicht [41], they use the expectation- maximization technique to optimize the parameters. These ideas are close to the a posteriori blockmodel proposed in [42]. A varia- tional approach to parameter estimation is adopted in [17]. Some improvements and modifications of these approaches are intro- duced in, e.g., [11, 25, 45, 60]. A generalization to the overlapping SBM is proposed by McDaid and Hurley [34]. As we discussed, DCSBM is defined in [28] and communities are detected based on the likelihood in this model. Copic et al. [15] define an axioma- tization for the problem of community detection based on PPM. Likelihood is used as a quality function to define rankings between graph partitions and it is shown that such rankings satisfy a number of desired properties. The authors also propose an algorithm to find (approximately) the maximum likelihood partition. Finally, if the number of parameters in the model is not fixed, some additional tools are required to figure out the optimal number of clusters. Here the average entropy of the classification [45] or the Integrated Classification Likelihood [17, 60] can be used. 4.3 Likelihood for PPM and Simple Modularity The log-likelihood for PPM can be easily written: log L ′ P P M(C, G, pin, pout) = min log pin + mout log pout + (Pin − min) log(1 − pin) + (Pout − mout) log(1 − pout) . Although it can be optimized directly using the algorithms discussed further in the paper, in order to demonstrate a connection of the log- likelihood to simple modularity defined in (1) and to deal with all models in a unified way, we use the conventional trick and say that the number of edges between i and j follows a Poisson distribution with parameter pin or pout . Then we get: −pin p LP P M(C, G, pin, pout) =  ·  −Pout pout p min in p mout out , e(i, j) out = e i, j:i <j, c(i)=c(j) −Pinpin e −pout p e(i, j) in e e i, j:i <j, c(i)(cid:44)c(j) where e(i, j) is the number of edges between i and j, so log LP P M(C, G, pin, pout) = min log pin + mout log pout − Pinpin − Pout pout . Note that the values pin and pout maximizing (3) are pin = min Pin , pout = mout Pout . In a resent paper by Newman [36] it was shown that if we as- sume pin and pout to be fixed, then maximizing (3) is equivalent to maximizing simple modularity (1). Indeed, log LP P M(C, G, pin, pout) = min(log pin−log pout)+m log pout − Pin(pin − pout) − P pout = m log pout − P pout pin − pout + (log pin − log pout) So, we get the equivalence with min − Pin log pin − log pout (cid:18) (cid:19) γ = P(pin − pout) m(log pin − log pout) . 4.4 Likelihood for DCPPM and Modularity Let us compute the log-likelihood for the DCPPM [36]: d(i)d(j)pout 2m  = −1 2 i, j: c(i)=c(j) d(i)d(j)pin log LDCP P M(C, G, pin, pout) 2m log d(i)d(j)pin −  +  +  (i, j)∈E(G), (i, j)∈E(G), i <j,c(i)=c(j) i <j,c(i)(cid:44)c(j) = min(log pin − log pout) − pin − pout + i, j: i <j, c(i)(cid:44)c(j) 4m 2m D(C)2 d(i) log d(i) + m log pout − mpout − m log(2m) . C∈C log d(i)d(j)pout  2m i (3) (4) . (5) (6)  The values of parameters maximizing this likelihood are: pin = 4 m min C D(C)2 , pout = (7) As shown in [36], if pin and pout are fixed, then maximizing log LDCP P M(C, G, pin, pout) is exactly equivalent to maximizing modularity (2) with C D(C)2 . 4 m mout 4m 2 − γ = pin − pout log pin − log pout . (8) 4.5 Likelihood for ILFR Let us compute the likelihood for the proposed ILFR model:  (cid:18) µd(i)d(j) log LI LF R(C, G, µ) = −1 +  2 =  2m log µd(i)d(j) (i, j)∈E(G), i <j,c(i)=c(j) i, j:c(i)=c(j) log d(i)d(j) d(i)d(j) Din(C) 2 log C∈C 2m + mout log µ + D(Cc(i)) + (cid:18) (1 − µ) (cid:18) (1 − µ) (cid:18)(1 − µ) D(Cc(i)) + D(C) + (cid:19) (cid:19)(cid:19) (cid:19) µ 2m µ 2m µ 2m i, j:i <j, c(i)(cid:44)c(j) (i, j)∈E(G), i <j,c(i)(cid:44)c(j) −  +  where Din(C) = (cid:18)(1 − µ) since(cid:12)(cid:12)(cid:12)log 1−µ D(C) i log d(i) log d(i) − mout log 2m − m , (9) i∈C din(i) is twice the number of edges induced by C. Note that the optimal value of µ is hard to find analytically, but it can be approximated numerically by optimizing (9). D(C) + algorithms and to make formulas more concise: The following approximation helps to speed up the optimization (cid:19) µ D(C) (1 − µ) 2 m ≈ log (1 − µ) D(C) , (cid:19) = log (1 − µ) D(C) + log ≈ log (1 − µ) (cid:12)(cid:12)(cid:12) ≫ µD(C) D(C) + (1−µ) 2 m . This leads to another quality function, − log D(C) + log LI LF RS(C, G, µ) = min log(1− µ) +mout log µ−mout log 2m (10) 1 + µD(C) (1 − µ) 2 m which we further refer to as ILFRS (S stands for "simplified"): d(i) log d(i) − m . Din(C) µ 2m (cid:18) 2 C i The optimal µ according to (10) can now be computed analytically: (11) Note that now we can substitute µ in (10) by the optimal value (11) µ = mout m . and obtain a non-parametric quality function: log LI LF RS(C, G) = min log min m − mout log 2m − Din(C) log D(C) + + mout log mout m − m d(i) log d(i) . (12) 2 C i The obtained function is fairly simple and, as we show by further experiments, it can successfully replace the standard modularity function in many applications. Let us also note that in contrast to ILFR, the likelihood for the standard LFR model cannot be computed. First, LFR is based on the configuration model, which introduces complex dependences between all edges, making the likelihood intractable. Second, and most importantly, the number of iter-community edges for each vertex is deterministic (the fraction of such edges is µ); as a result, for most of graphs and partitions the likelihood is equal to zero. 5 OPTIMIZATION 5.1 Related Work on Modularity Optimization First, let us discuss some optimization approaches used in commu- nity detection. The most widely used measure to be optimized is modularity (2). The following types of approaches are known. Greedy optimization. Newman and Girvan [40] proposed a greedy algorithm for modularity optimization, where the clusters are it- eratively merged by choosing the pair which leads to a greater modularity increase (while it is positive). A speedup of the greedy algorithm was proposed by Clauset et al. [13]. Some other modi- fications were also suggested in, e.g., [49, 56]. Probably the most well-known and widely used greedy algorithm is called Louvain [8]. At the beginning each vertex forms its own cluster. Then we cre- ate the first level of the partition by iterating through all vertices: for each vertex i we compute the gain in modularity coming from putting i to the community of its neighbor and pick the community with the largest gain, as long as it is positive. After that the first level is formed and we replace the obtained communities by super- vertices, and two supervertices are connected by a (weighted) edge if there is at least one edge between vertices of the corresponding communities. Then the process is repeated with the supervertices, and so on, as long as modularity increases. This algorithm was shown to be fast and provide partitions of good quality. We choose Louvain algorithm as the basis for our experiments, the detailed description of its application to our problem is given in Section 5.2. Simulated annealing. Simulated annealing was first applied to modularity optimization in [23]. This method combines two types of moves: local moves, where a single vertex is shifted from one cluster to another; global moves, consisting of merges and splits of communities. Methods based on simulated annealing are relatively slow and cannot be applied to large datasets. Spectral optimization. Spectral methods are quite popular in mod- ularity optimization. Such methods use the eigenvalues and eigen- vectors of a so-called modularity matrix. Some examples can be found in [37, 53]. Many other algorithms exist, among them are methods based on extremal optimization [18], mathematical programming [2], mean field annealing [30], genetic algorithms [54], etc. 5.2 Proposed Likelihood Optimization Methods In Section 4, we presented four quality functions based on the likeli- hood: PPM (3), DCPPM (6), ILFR (9), and ILFRS (10). All functions are parametric: PPM and DCPPM have parameters pin and pout , ILFR and ILFRS have one parameter µ. In this section, we discuss the pos- sible ways to maximize these likelihoods. Below we assume that we are given an arbitrary algorithm FindPartition( ¯Q, G) which is able to find a partition by maximizing some quality function ¯Q(C, G). Although the optimization strategies proposed below are able to work with any algorithm FindPartition, let us first discuss our particular choice. As we already mentioned, we choose Louvain algorithm [8], which is arguably the most widely used method for community detection. Louvain is fast and allows to process large datasets. Importantly, it can be adapted to all quality functions discussed in this paper. Initially the method is designed to optimize modularity, so it can be directly applied to the likelihood of DCPPM due to their equivalence. To adapt Louvain to other likelihoods, we have to change one part of the original algorithm: when we try to remove a vertex (or supervertex) from one community an add to another, we need to efficiently compute the difference in likelihood. This can be done for any of the considered quality functions: for ILFR and ILFRS the differences can be computed using (9) and (10); for PPM we have to additionally store the sizes of supervertices in order to compute the difference for Pin in (1). The rest of the Louvain algorithm remains the same.4 Therefore, the asymptotic time complexity of our Louvain-based FindPartition and of the original Louvain are the same, up to a constant multiplier (the complexity of Louvain is empirically evaluated to be O(n log n)). Note that both the original Louvain and our modifications can be applied to the likelihoods with fixed values of parameters pin, pout or µ. Therefore, the key question is how to find the optimal values of these parameters. Iterative strategy. The simplified version of this strategy was initially proposed in [36] for PPM and DCPPM models. Detailed de- scription of our method is presented in Algorithm 1. Initially, we fix γ = 1 or µ = 0.5 depending on the null model. Then, we apply Find- Partition to the corresponding log-likelihood function. Using the obtained partition we can re-estimate the parameters and continue this procedure until convergence or until some maximum allowed number of steps is reached. In our experiments we noticed that for any null model the parameters may end up cyclically varying near some value. Therefore, at each iteration we additionally check if we obtain an already seen parameter and stop in this case. This additional trick allows to significantly reduce the overall number of iterations. In our experiments we observed that we never need more than 50 iterations and the mean value is much smaller, see Section 6 for more details. Maximization strategy. An alternative strategy is to directly search for parameters which maximize likelihood of the obtained partition. Here we can use any black-box optimization method. At each iteration of optimization, for some value of γ or µ, we run FindPartition to obtain a partition C, then, using C, we find the optimal parameters according to (4), (7), (11) or by optimizing (9). Finally, we compute the likelihood to be maximized using (3), (6), (9), or (10). In our experiments, for simplicity and reproducibility, we use grid search in this strategy. However, any other method of black-box parameter optimization can be used instead, e.g., random search [5], Bayesian optimization [50], Gaussian processes [22], sequential model-based optimization [6, 27], and so on. 4To make our results reproducible, we made the source code publicly available at https://github.com/altsoph/community_loglike. Algorithm 1: Iterative strategy input : graph G, Model, algorithm FindPartition, N , ε Initialize param = 1 (γ for PPM, DCPPM) or param = 0.5 (µ for ILFR, ILFRS), Params = ∅; for i ← 1 to N do Define ¯Q according to (1) for PPM, (2) for DCPPM, (9) for ILFR, (10) for ILFRS with parameter param; C = FindPartition( ¯Q, G); if Model is PPM or DCPPM then Compute pin and pout according to (4) or (7); Compute paramnew according to (5) or (8); if Model is ILFRS then Compute paramnew according to (11); if Model is ILFR then Compute paramnew by optimizing (9); if param − paramnew < ε or paramnew ∈ Params then break; Add paramnew to Params; param ← paramnew ; return C To summarize, the maximization strategy directly maximizes the obtained likelihood, while the iterative one searches for a "sta- ble" parameter, i.e., the one which does not change after applying FindPartition. Note that the convergence of the iterative strategy is not guaranteed for real-world networks. Therefore, initially we expected the maximization strategy to be more stable. However, our experiments show that these two strategies demonstrate similar performance, but the iterative one is faster. Let us mention another possible optimization strategy, which we do not use in our experiments. Given a partition C, for each likelihood function except ILFR, we can compute the optimal values of parameters according to (4), (7), and (11). Therefore, for the cor- responding models we can substitute these parameters and obtain non-parametric likelihoods, as we did in (12) for ILFRS. Namely, for PPM we can replace pin and pout in (3) by (4) and obtain − log LP P M(C, G) = min log min Pin + mout log mout Pout − m . C D(C)2 d(i) log d(i) For DCPPM, we replace pin and pout in (6) by (7) and get (cid:18) min − mout 2 − 4m 2 − 4 m mout C D(C)2 − log LDCP P M(C, G) = min log min C D(C)2 C D(C)2 4 m (cid:0)4m C D(C)2(cid:1) 2 − mout (cid:19) + 2 − C D(C)2 − m log(2m). All obtained non-parametric quality functions can potentially be optimized directly since they do not have free parameters. However, we do not consider such strategy since: 1) it cannot be applied to ILFR as there is no analytical formula for optimal µ, 2) this strategy cannot be easily combined with the Louvain algorithm. The reason is that Louvain has several partition levels and partitions obtained + m log 4m i 2 mout 4m on earlier levels cannot be changed later. At the beginning of the algorithm our estimates of µ, pin, and pout are far from optimal: all vertices form their own communities, so µ = 1, pout = 1, and pin = 0. As a result, the first level of the partition, which has a big impact on the final quality, is constructed based on non-optimal parameters. In fact, in most cases the algorithm does not even start optimization due to the huge overestimate of µ or pout . 6 EXPERIMENTS In this section, we conduct an extensive experimental study to com- pare the discussed models. We start with some preliminaries and discuss evaluation metrics and datasets. In Section 6.3, we measure how well the models describe various real-world networks. Next, we compare all proposed community detection algorithms. Finally, Section 6.5 presents some negative results on the limits of statistical inference algorithms when applied to real-world networks. 6.1 Evaluation Metrics In order to evaluate the performance of any algorithm, we have to compare the partition C obtained by this algorithm with the ground truth partition CGT . The problem of choosing a good similarity measure for this comparison does not have any standard solution in community detection literature. Different similarity measures can possibly give preferences to different algorithms. Usually, a suitable measure is chosen according to a practical problem at hand. That is why in this work we compute and compare several standard similarity measures. In particular, we use Normalized Mutual Information (NMI) of two partitions C and CGT , which is often used for the comparison of community detection algorithms [4, 19]. The idea behind NMI is that if two partitions are similar, one needs very little information to infer CGT given C. Assume that cluster labels for CGT and C are values of two random variables ξGT and ξ. Then, NMI(CGT , C) = 2 I(ξGT , ξ) H(ξGT ) + H(ξ) , where I(ξGT , ξ) = H(ξ) − H(ξGT ξ) is the mutual information of ξGT and ξ, H(ξ) is the Shannon entropy of ξ, H(ξGT ξ) is the conditional entropy of ξGT given ξ . We also use two well-known similarity measures based on count- ing correctly and incorrectly classified pairs of vertices. Let n11 denote the number of pairs of vertices which are in the same com- munity in both partitions C and CGT , n01 (n10) the number of pairs which are in the same community in C (CGT ) and in different communities in CGT (C), and n00 the number of pairs that are in different communities in both partitions. By combining the intro- duced values one can obtain several similarity measures. We use two most popular ones, the first is Rand index [46]: , n11+n10+n01+n00 i.e., the fraction of the number of correctly classified pairs of ver- tices to the total number of pairs. One problem of the Rand index is that its value is usually close to 1, since n00 is typically very high. The well-known Jaccard index does not suffer from this problem, it is defined as , i.e., the fraction of the number of vertex pairs classified in the same cluster in both partitions to the number of pairs classified in the same cluster in at least one partition. n11+n10+n01 n11+n00 n11 Table 2: Real-world datasets; µ, γ0, and γ1 are computed for ground truth partitions according to (11), (4, 5) and (7, 8) Table 4: Log-likelihoods: datasets without ground truth Dataset Karate club [59] Dolphins [32] Football [40] Political books [38] Political blogs [1] email-Eu-core [31] Cora citation [52] AS [9] n 34 62 115 105 1224 986 24166 23752 m 78 159 613 441 16715 16064 89157 58416 k 2 2 11 3 2 42 70 176 µ 0.128 0.038 0.325 0.159 0.094 0.664 0.458 0.561 γ1 0.78 0.54 2.39 0.86 0.72 2.74 5.46 1.15 γ0 0.78 0.55 2.57 0.89 0.72 2.80 6.21 1.40 Table 3: Log-likelihoods: datasets with ground truth Dataset Karate Dolphins Football Political books Political blogs Eu-core Cora AS log LP P M log LDC P P M log LI LF R -206.12 -168.63 -483.50 -428.64 -1428.4 -1384.1 -1243.3 -1363.8 -73912 -50750 -65559 -48483 -678306 -584730 -542952 -329784 -168.65 -439.52 -1426.7 -1235.0 -50756 -48783 -593358 -351537 6.2 Datasets Synthetic networks. We use the LFR model described in Sec- 6.2.1 tion 2.3 to generate synthetic networks. The parameters of the generated graphs are the following: the number of vertices n = 104; the parameter of the power-law degree distribution γ = 2.5; the average degree ¯d = 30; the parameter of the community size distri- bution β = 1.5, with the minimum cluster size 50 and the maximum 600; the mixing parameter µ is varied in range [0, 1]. We additionally experimented with synthetic graphs of different edge densities obtained by varying the average degree. The results are omitted since the only difference observed is that the qualities of all algorithms are usually larger for denser graphs. Finally, note that there are other benchmark models proposed in the literature. However, community detection in synthetic networks is not the main focus in this paper, therefore we do not consider such models. 6.2.2 Real-world networks. We collected several networks with dif- ferent structural properties (see Table 2). In addition to widely used networks, such as Zachary's karate club, dolphin social network, and American college football, we also used annotated books about politics5 and political blogs [1]. The dataset email-Eu-core is ob- tained from SNAP,6 here the ground truth communities correspond to the departments of a research institute. In Cora citation dataset communities correspond to subjects of research papers, while in AS [9] the vertices are annotated with their countries. These are all publicly available datasets we found for non-overlapping commu- nity detection.7 5V. Krebs, unpublished, http://www.orgnet.com/ 6http://snap.stanford.edu/data/email-Eu-core.html 7It is easier to find datasets with ground truth overlapping communities, see, e.g., http://snap.stanford.edu/data/index.html#communities Dataset Karate Dolphins Football Political books Political blogs Eu-core Cora AS Ca-GrQc Ego-Facebook p2p-Gnutella09 Wiki-vote Email-Enron Soc-Epinions1 Soc-Slashdot0811 ego-Twitter n 34 62 115 105 1224 986 24K 24K 5242 4039 8114 7115 37K 76K 77K 81K log LP P M log LDC P P M log LI LF R -191.182 -160.154 -417.240 -394.538 -1406.79 -1364.38 -1182.90 -1088.77 -60653.8 -49702.3 -57421.1 -45469.2 -512556 -425463 -449088 -227917 -50258.2 -42259.3 -241708 -207910 -167995 -144711 -504395 -388380 -1192893 -803161 -2825138 -2000906 -4011399 -2949833 -6979664 -5314782 -163.990 -398.718 -1407.43 -1135.57 -49912.3 -46020.9 -450154 -244745 -53393.9 -234311 -148594 -388044 -862315 -2087117 -3120963 -5781209 6.3 Comparison of Likelihoods Since the main aim of this paper is to analyze and compare sev- eral null models having community structure, we start with the following research question: Which model gives the best fit for real- world complex networks? To answer this question, we compare the probabilities that real-world networks were generated by each of the null models. Namely, we compared the log-likelihoods (3) for PPM, (6) for DCPPM and (9) for ILFR.8 Note that (10) is a simplified expression for (9), so we consider it only as a quality function but not as log-likelihood. In the first experiment, we took the datasets described in Sec- tion 6.2.2 and assumed that the partitions are defined by the ground truth cluster assignments provided for these datasets. Then, we computed the optimal parameters pin, pout or µ and used them to compute the corresponding log-likelihood (see Table 3). One can see that PPM is the best model describing the Football dataset, DCPPM is the best for Pol-books, while for all other datasets ILFR has the largest likelihood. Note that ILFR has only one parameter to be tuned while DCPPM has two. Therefore, we initially expected that for many datasets DCPPM may have a larger likelihood. In this case, to decide which model better describes the data, we would have to adapt some information criterion (e.g., the Bayesian information criterion) to our problem, which is a nontrivial task for the models under consideration. Surprisingly, for most of the datasets ILFR has a larger likelihood, which clearly indicates that this model is more suitable for describing real-world networks.9 However, even though for each dataset under consideration we have a ground truth partition (a.k.a. attributes or metadata), this partition can be not an ideal division of vertices into communities and also can be not the only ground truth partition possible. For example, many complex networks have hierarchical community 8We intentionally do not consider synthetic networks in this experiment: likelihoods are expected to be heavily affected by the particular synthetic model used. For example, LFR benchmark could give a preference to ILFR null model. 9Note that using these results we cannot compare ILFR and DCPPM with PPM since ILFR and DCPPM are based on the observed degree sequences, while PPM only uses the cluster assignments. structure: e.g., for Cora dataset we can use original attributes (/Ar- tificial_Intelligence/Machine_Learning/Probabilistic_Methods/), or second-level ones (/Artificial_Intelligence/Machine_Learning/), or just first-level (Artificial_Intelligence).10 We further discuss this problem in Section 6.4.2. Fortunately, likelihoods can be compared even for datasets with- out any knowledge about community structure, which allows to compare null models on a much larger variety of datasets. In or- der to measure the likelihood for any graph, we first have to find a partition that maximizes this value (among all possible parti- tions), which is feasible only for very small datasets. However, the optimal partition (and the corresponding likelihood) can be ap- proximately found by applying the corresponding maximization algorithm: PPM-max, DCPPM-max or ILFR-max. We performed such comparison on the datasets introduced in Section 6.2.2 as well as on 8 new datasets of various nature downloaded from http://snap.stanford.edu/data/index.html (see Table 4). According to this experiment, for almost all datasets the largest likelihood is again obtained for ILFR model, despite it has fewer free parameters, which means that this model is the best one for describing real- world datasets, which is the main empirical result supporting the introduction of ILFR and the corresponding log-likelihood quality function. Let us note that the log-likelihoods presented in Table 4 can be underestimated, since we cannot guarantee that our optimization algorithms find exactly the maximum likelihood partition. However, we believe that this does not introduce any bias into this experiment (i.e., does not change the conclusions) since the same optimization procedure is applied for all models. Also, note that in all cases the log-likelihoods in Table 3 are smaller than the corresponding ones in Table 4, which means that our optimization algorithms found partitions providing better likelihoods for the corresponding models than the ground truth ones, which is expected (since partitions were tuned). 6.4 Community Detection Algorithms In this section, we compare all algorithms proposed in Section 5.2. Note that we intentionally use only methods based on the like- lihood optimization since this paper focuses on the analysis and comparison of null models. Synthetic networks. First, we compared all algorithms on syn- 6.4.1 thetic networks described in Section 6.2.1. For each µ we generated 5 random samples of LFR and averaged the results. Figure 1 shows the results obtained for all similarity measures under consideration (Rand, Jaccard and NMI). Note that in most cases these similarity measures are consistent, i.e., for a given mixing parameter they rank the algorithms similarly. However, Jaccard index is less descriptive for large mixing parameters. Based on the obtained results, several important observations can be made. For all values of µ, the best (or very close to the best) quality is obtained by ILFRS-max and ILFR-max strategies. For both ILFR and ILFRS it turns out that maximizing the likelihood is better than iteratively estimating the parameters, which supports 10By measuring the likelihood for all such partitions of Cora, we notices that original attributes provide the highest likelihood for all null models, therefore we further analyze only this partition. Figure 1: Comparison on synthetic networks our intuition that better partitions are expected to have higher likelihoods. For small values of µ the worst results are obtained by PPM (both strategies), while for large values Louvain algorithm is the worst. We also measured statistical significance of the obtained im- provements: for each µ, we applied the algorithms to 5 random samples of LFR and used the paired t-test. For instance, it turns out that according to NMI ILFRS-max never looses significantly and it is significantly better (p-value < 0.05) than: DCPPM-max for µ ∈ {0.7, 0.9, 1}; DCPPM-iterate for µ ∈ {0.7, 0.8}; PPM-max and PPM-iterate for all µ ∈ [0.2, 1]; ILFR-iterate and ILFRS-iterate for 0.82 0.84 0.86 0.88 0.9 0.92 0.94 0.96 0.98 1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1Rand indexmixing parameterLouvainPPM-maxPPM-iterateDCPPM-maxDCPPM-iterateILFRS-maxILFRS-iterateILFR-maxILFR-iterate 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1Jaccard indexmixing parameterLouvainPPM-maxPPM-iterateDCPPM-maxDCPPM-iterateILFRS-maxILFRS-iterateILFR-maxILFR-iterate 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1NMImixing parameterLouvainPPM-maxPPM-iterateDCPPM-maxDCPPM-iterateILFRS-maxILFRS-iterateILFR-maxILFR-iterate Table 5: Maximization strategies (Rand index / Jaccard index / NMI) Louvain PPM DCPPM ILFR ILFRS 0.732 / 0.470 / 0.586 0.634 / 0.351 / 0.499 0.970 / 0.720 / 0.922 0.831 / 0.616 / 0.545 0.886 / 0.788 / 0.641 0.869 / 0.218 / 0.584 0.943 / 0.127 / 0.460 0.821 / 0.198 / 0.489 0.707 / 0.397 / 0.585 0.529 / 0.153 / 0.386 0.993 / 0.916 / 0.972 0.722 / 0.331 / 0.449 0.574 / 0.153 / 0.234 0.942 / 0.207 / 0.661 0.978 / 0.044 / 0.547 0.826 / 0.009 / 0.422 0.766 / 0.523 / 0.667 0.600 / 0.286 / 0.483 0.993 / 0.916 / 0.972 0.817 / 0.583 / 0.536 0.904 / 0.823 / 0.705 0.964 / 0.434 / 0.740 0.978 / 0.050 / 0.533 0.826 / 0.026 / 0.461 0.774 / 0.535 / 0.687 0.594 / 0.274 / 0.472 0.993 / 0.916 / 0.972 0.719 / 0.347 / 0.437 0.860 / 0.738 / 0.570 0.953 / 0.371 / 0.727 0.978 / 0.063 / 0.551 0.826 / 0.018 / 0.438 0.774 / 0.535 / 0.687 0.584 / 0.256 / 0.454 0.993 / 0.916 / 0.972 0.772 / 0.477 / 0.490 0.879 / 0.778 / 0.625 0.960 / 0.410 / 0.739 0.978 / 0.060 / 0.551 0.826 / 0.018 / 0.438 Table 6: Iterative strategies (Rand index / Jaccard index / NMI) Louvain PPM DCPPM ILFR ILFRS 0.732 / 0.470 / 0.586 0.634 / 0.351 / 0.499 0.970 / 0.720 / 0.922 0.831 / 0.616 / 0.545 0.886 / 0.788 / 0.641 0.869 / 0.218 / 0.584 0.943 / 0.127 / 0.460 0.821 / 0.198 / 0.489 0.743 / 0.480 / 0.612 0.548 / 0.190 / 0.403 0.993 / 0.916 / 0.972 0.740 / 0.377 / 0.464 0.582 / 0.171 / 0.240 0.939 / 0.205 / 0.656 0.978 / 0.049 / 0.547 0.826 / 0.011 / 0.426 0.750 / 0.502 / 0.612 0.600 / 0.286 / 0.481 0.993 / 0.916 / 0.972 0.843 / 0.651 / 0.554 0.902 / 0.820 / 0.694 0.965 / 0.439 / 0.742 0.978 / 0.052 / 0.534 0.826 / 0.025 / 0.460 0.766 / 0.523 / 0.667 0.576 / 0.238 / 0.449 0.993 / 0.916 / 0.972 0.760 / 0.445 / 0.481 0.862 / 0.743 / 0.576 0.948 / 0.351 / 0.713 0.978 / 0.058 / 0.549 0.826 / 0.017 / 0.436 0.760 / 0.519 / 0.633 0.575 / 0.238 / 0.448 0.993 / 0.916 / 0.972 0.770 / 0.475 / 0.489 0.877 / 0.773 / 0.618 0.955 / 0.387 / 0.725 0.978 / 0.061 / 0.550 0.826 / 0.017 / 0.435 Dataset Karate Dolphins Football Pol-books Pol-blogs Eu-core Cora AS Dataset Karate Dolphins Football Pol-books Pol-blogs Eu-core Cora AS Table 7: Quality functions: ground truth vs optimization log LP P M PPM-max log LDCP P M DCPPM-max log LI LF RS ILFRS-max log LI LF R ILFR-max Dataset Karate Dolphins Football Pol-books Pol-blogs Eu-core Cora AS Modularity GT 0.3715 0.3735 0.5877 0.4149 0.4053 0.3138 0.5165 0.1708 Louvain 0.4188 0.5233 0.6043 0.5205 0.4267 0.4211 0.7875 0.6307 GT -206 -483 -1384 -1364 -73913 -65559 -678306 -542952 GT -169 -439 -1427 -1235 -50756 -48783 -593358 -351537 -191 -417 -1364 -1183 -60654 -57421 -512556 -449088 -164 -399 -1407 -1136 -49912 -46021 -450154 -244745 GT -176 -434 -1447 -1285 -51843 -49073 -585837 -338397 -168 -405 -1425 -1125 -50614 -46202 -425657 -227192 GT -169 -429 -1428 -1243 -50750 -48483 -584730 -329784 -160 -395 -1407 -1089 -49702 -45469 -425463 -227917 µ = 0.7; and Louvain for µ ∈ [0.4, 1]. These results additionally sup- port the choice of the quality function LI LF RS (12) for community detection instead of the standard modularity function. 6.4.2 Real-world complex networks. It is argued in several papers that ground truth community labels (a.k.a. metadata) available for some real-world networks should not be used to analyze and com- pare community detection algorithms [43]. Indeed, such labels are usually obtained using some discrete-valued vertex attributes which are not guaranteed to be reasonable community assignments. For example, users in a social network can be split by gender, city, or interests, and each of these partitions could be treated as ground truth cluster assignments. An algorithm performing better for "city" labels can be worse for "interests" ones. As a result, no meaningful conclusion can be made based on such comparison. However, for the sake of completeness, we compare all algorithms on real-world networks, since it is still a standard practice in community detection literature. Tables 5 and 6 present the results for the iterative and maxi- mization strategies, respectively (in both cases we add Louvain for comparison).11 Note that we cannot properly measure statistical significance since we cannot sample several copies for each dataset. However, we can account for the randomness included in the al- gorithms: they all order vertices at each iteration randomly. To do this, for each dataset we run all algorithms 5 times and then apply the unpaired t-test to compare them. We put numbers in bold in Tables 5 or 6 if there is a group of algorithms without significant differences (p-value > 0.05) inside the group and with significant differences with the rest of the algorithms. 11Recall that Louvain optimizes modularity, so it is similar to DCPPM but with fixed values of pin and pout . The results in general are not consistent: although DCPPM is often the best, the winning model may depend on a graph under consideration and on a target metric. For example, Louvain wins on Cora and AS according to Jaccard index, but it is the worst on the same datasets according to Rand index. This supports the claim that ground truth community assignments can be noisy or irrelevant. We also noticed that iterative and maximization strategies usu- ally have similar performance and the choice between them is not straightforward. For example, for ILFRS it is often better to ap- ply maximization strategy, while for PPM iterative one should be preferred. Based on this observation, we propose using the itera- tive strategy, which is faster (it converges after a small number of iteration, as discussed below). The performance of ILFRS is in general slightly better than of ILFR. Taking into account our results on synthetic networks, we propose using the faster ILFRS instead of ILFR in all practical appli- cations. Finally, we analyzed the speed of convergence for iterative strate- gies on real-world datasets. Namely, we measured the number of iterations made by Algorithm 1 before some stopping criteria is reached. Note that the algorithm never stopped because of reaching the maximum allowed number of iterations N = 50, so we either observed a convergence or applied the cycling criteria (i.e., encoun- tered an already seed parameter). The average number of iterations obtained for PPM is 12.6 (in all cases the algorithm converged). For DCPPM we got 6.2 (converged in all cases except AS, where we applied cycling stopping criteria after 18 iterations). For ILFRS we have 5.4 iterations (cycling criteria is applied to 3 datasets). For ILFR we got 4.4 (again, with 3 applications of cycling criteria). 6.5 Statistical Inference, Negative Result Having noticed unstable results for real-world datasets, we tried to answer the following research question: Is any of the null models suitable for community detection in real-world graphs? In order to answer this question, for each quality function we compare its value for the ground truth partition with its value for the partition obtained by the corresponding maximization algo- rithm (see Table 7). For all quality functions, including the widely used modularity, and for all datasets the ground truth partition has a lower value of the quality function. This means that further optimization of any quality function would not lead us towards the ground truth partition, which is a negative observation. In par- ticular, there is no hope in improving the results obtained by our algorithms by replacing Louvain-based FindPartition with some more effective maximization algorithm. Note that in the literature it is often assumed that a partition with larger modularity is better and, as a result, an algorithm which leads to a partition with larger modularity is better. However, our observation above demonstrates that on the considered real-world datasets it is not the case. We also performed additional experiments and noticed that in almost all cases the value of a quality function for the ground truth partition is lower than for the partition obtained by any discussed optimization algorithm (not necessary optimizing the same quality function), which is an even stronger negative observation. The following conclusion can be made: either the ground truth metadata contained in the considered real-world networks is not a good descriptor for a community structure or statistical inference algorithms based on all null models discussed in this paper are unable to detect real-world communities. 7 CONCLUSION In this paper, we focused on the comparison of null models which can be used by likelihood optimization algorithms for community detection. We compared two well-known models, PPM and DCPPM, and a new model, ILFR, which has only one parameter and is proved to preserve the desired expected degree sequence. For the new model we have written the log-likelihood, both in parametric and self-contained forms. To maximize the parametric log-likelihood functions, we proposed and compared two optimization strategies: maximization and iterative. The most important conclusion is that the proposed model, ILFR, is the best one for describing most of the considered real-world complex networks according to the likelihood of the observed graph structures, despite the fact that it has only one free parameter. We argue that the likelihood can be considered as the main argument in evaluating the null models instead of the direct comparison of community detection algorithms. The reason is that one cannot fully rely on ground truth cluster labels available for real-world networks. Also, we demonstrated that ILFR-based algorithms have the best performance on synthetic networks. Based on the obtained results, we believe that the proposed ILFR-based quality function (12) can be successfully used as a target for optimization algorithms, instead of the widely adopted modularity. A natural direction for the future research is to analyze null models for overlapping community detection. This would be use- ful since many observed networks have overlapping communities. However, fundamental analysis of this problem is complicated by the fact that null models with overlapping communities are less developed and more complex for mathematical analysis. ACKNOWLEDGMENTS This study was funded by RFBR according to the research project 18-31-00207. REFERENCES [1] Lada A Adamic and Natalie Glance. 2005. The political blogosphere and the 2004 US election: divided they blog. In Proceedings of the 3rd international workshop on Link discovery. ACM, 36 -- 43. [2] Gaurav Agarwal and David Kempe. 2008. Modularity-maximizing graph com- munities via mathematical programming. The European Physical Journal B 66, 3 (2008), 409 -- 418. [3] Christopher Aicher, Abigail Z Jacobs, and Aaron Clauset. 2014. Learning latent block structure in weighted networks. Journal of Complex Networks 3, 2 (2014), 221 -- 248. [4] James P Bagrow. 2008. Evaluating local community methods in networks. Journal [5] James Bergstra and Yoshua Bengio. 2012. Random search for hyper-parameter of Statistical Mechanics: Theory and Experiment 2008, 05 (2008), P05001. optimization. Journal of Machine Learning Research 13, Feb (2012), 281 -- 305. [6] James S Bergstra, Rémi Bardenet, Yoshua Bengio, and Balázs Kégl. 2011. Al- gorithms for hyper-parameter optimization. In Advances in neural information processing systems. 2546 -- 2554. [7] Peter J Bickel and Aiyou Chen. 2009. A nonparametric view of network mod- els and Newman -- Girvan and other modularities. Proceedings of the National Academy of Sciences 106, 50 (2009), 21068 -- 21073. [8] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of statistical [9] Marián Boguná, Fragkiskos Papadopoulos, and Dmitri Krioukov. 2010. Sustaining [18] Jordi Duch and Alex Arenas. 2005. Community detection in complex networks mechanics: theory and experiment 2008, 10 (2008), P10008. the internet with hyperbolic mapping. Nature communications 1 (2010), 62. [10] Tanmoy Chakraborty, Ayushi Dalmia, Animesh Mukherjee, and Niloy Ganguly. 2017. Metrics for community analysis: A survey. ACM Computing Surveys (CSUR) 50, 4 (2017), 54. [11] Yi Chen, XL Wang, Xin Xiang, BZ Tang, and JZ Bu. 2015. Network structure exploration via Bayesian nonparametric models. Journal of Statistical Mechanics: Theory and Experiment 2015, 10 (2015), P10004. [12] Fan Chung and Linyuan Lu. 2002. Connected components in random graphs with given expected degree sequences. Annals of combinatorics 6, 2 (2002), 125 -- 145. [13] Aaron Clauset, Mark EJ Newman, and Cristopher Moore. 2004. Finding commu- nity structure in very large networks. Physical review E 70, 6 (2004), 066111. [14] Anne Condon and Richard M Karp. 2001. Algorithms for graph partitioning on the planted partition model. Random Structures and Algorithms 18, 2 (2001), 116 -- 140. [15] Jernej Copic, Matthew O Jackson, and Alan Kirman. 2009. Identifying community structures from network data via maximum likelihood methods. The BE Journal of Theoretical Economics 9, 1 (2009). [16] Michele Coscia, Fosca Giannotti, and Dino Pedreschi. 2011. A classification for community discovery methods in complex networks. Statistical Analysis and Data Mining: The ASA Data Science Journal 4, 5 (2011), 512 -- 546. [17] J-J Daudin, Franck Picard, and Stéphane Robin. 2008. A mixture model for random graphs. Statistics and computing 18, 2 (2008), 173 -- 183. using extremal optimization. Physical review E 72, 2 (2005), 027104. (2010), 75 -- 174. [19] Santo Fortunato. 2010. Community detection in graphs. Physics reports 486, 3 [20] Santo Fortunato and Marc Barthélemy. 2007. Resolution limit in community detection. Proceedings of the National Academy of Sciences 104, 1 (2007), 36 -- 41. [21] Santo Fortunato and Darko Hric. 2016. Community detection in networks: A user guide. Physics Reports 659 (2016), 1 -- 44. [22] D. Golovin, B. Solnik, S. Moitra, G. Kochanski, J. Karro, and D. Sculley. 2017. Google vizier: A service for black-box optimization. In International Conference on Knowledge Discovery and Data Mining. ACM, 1487 -- 1495. [23] Roger Guimera and Luis A Nunes Amaral. 2005. Functional cartography of complex metabolic networks. nature 433(7028), 7028 (2005), 895 -- 900. Physical Review E 74, 3 (2006), 035102. modularity. Physical review letters 100, 25 (2008), 258701. chastic blockmodels: First steps. Social networks 5, 2 (1983), 109 -- 137. [27] Frank Hutter, Holger H Hoos, and Kevin Leyton-Brown. 2011. Sequential model- based optimization for general algorithm configuration. In International Confer- ence on Learning and Intelligent Optimization. Springer, 507 -- 523. [28] Brian Karrer and Mark EJ Newman. 2011. Stochastic blockmodels and community structure in networks. Physical Review E 83, 1 (2011), 016107. [29] Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark graphs for testing community detection algorithms. Physical review E 78, 4 (2008), 046110. [30] Sune Lehmann and Lars Kai Hansen. 2007. Deterministic modularity optimization. The European Physical Journal B-Condensed Matter and Complex Systems 60, 1 (2007), 83 -- 88. [31] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2007. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data (TKDD) 1, 1 (2007), 2. [32] David Lusseau, Karsten Schneider, Oliver J Boisseau, Patti Haase, Elisabeth Slooten, and Steve M Dawson. 2003. The bottlenose dolphin community of Doubtful Sound features a large proportion of long-lasting associations. Behav- ioral Ecology and Sociobiology 54, 4 (2003), 396 -- 405. [33] Fragkiskos D Malliaros and Michalis Vazirgiannis. 2013. Clustering and com- munity detection in directed networks: A survey. Physics Reports 533, 4 (2013), 95 -- 142. [34] Aaron McDaid and Neil Hurley. 2010. Detecting highly overlapping communities with model-based overlapping seed expansion. In Advances in Social Networks [26] Paul W Holland, Kathryn Blackmond Laskey, and Samuel Leinhardt. 1983. Sto- [24] Matthew B Hastings. 2006. Community detection as an inference problem. [25] Jake M Hofman and Chris H Wiggins. 2008. Bayesian approach to network [38] Mark EJ Newman. 2006. Modularity and community structure in networks. Analysis and Mining (ASONAM), 2010 International Conference on. IEEE, 112 -- 119. [35] Michael Molloy and Bruce Reed. 1995. A critical point for random graphs with a given degree sequence. Random structures & algorithms 6, 2-3 (1995), 161 -- 180. [36] MEJ Newman. 2016. Community detection in networks: Modularity optimization and maximum likelihood are equivalent. arXiv preprint arXiv:1606.02319 (2016). [37] Mark EJ Newman. 2006. Finding community structure in networks using the eigenvectors of matrices. Physical review E 74, 3 (2006), 036104. Proceedings of the national academy of sciences 103, 23 (2006), 8577 -- 8582. networks. Nature communications 7 (2016). structure in networks. Physical review E 69, 2 (2004), 026113. [41] Mark EJ Newman and Elizabeth A Leicht. 2007. Mixture models and exploratory analysis in networks. Proceedings of the National Academy of Sciences 104, 23 (2007), 9564 -- 9569. [42] Krzysztof Nowicki and Tom A B Snijders. 2001. Estimation and prediction for [40] Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating community [39] Mark EJ Newman and Aaron Clauset. 2016. Structure and inference in annotated small groups. Journal of anthropological research 33, 4 (1977), 452 -- 473. [60] Hugo Zanghi, Christophe Ambroise, and Vincent Miele. 2008. Fast online graph clustering via Erdős -- Rényi mixture. Pattern recognition 41, 12 (2008), 3592 -- 3599. stochastic blockstructures. J. Amer. Statist. Assoc. 96, 455 (2001), 1077 -- 1087. [43] Leto Peel, Daniel B Larremore, and Aaron Clauset. 2017. The ground truth about metadata and community detection in networks. Science advances 3, 5 (2017), e1602548. [44] Tiago P Peixoto. 2015. Inferring the mesoscale structure of layered, edge-valued, [51] Myra Spiliopoulou. 2011. Evolution in social networks: A survey. [45] José J Ramasco and Muhittin Mungan. 2008. Inversion method for content-based [47] Jörg Reichardt and Stefan Bornholdt. 2006. Statistical mechanics of community [46] William M Rand. 1971. Objective criteria for the evaluation of clustering methods. and time-varying networks. Physical Review E 92, 4 (2015), 042807. networks. Physical Review E 77, 3 (2008), 036122. Journal of the American Statistical association 66, 336 (1971), 846 -- 850. detection. Physical Review E 74, 1 (2006), 016110. [48] Martin Rosvall and Carl T Bergstrom. 2008. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences 105, 4 (2008), 1118 -- 1123. [49] Philipp Schuetz and Amedeo Caflisch. 2008. Efficient modularity optimization by multistep greedy algorithm and vertex mover refinement. Physical Review E 77, 4 (2008), 046112. [50] Jasper Snoek, Oren Rippel, Kevin Swersky, Ryan Kiros, Nadathur Satish, Narayanan Sundaram, Mostofa Patwary, Mr Prabhat, and Ryan Adams. 2015. Scalable bayesian optimization using deep neural networks. In International Conference on Machine Learning. 2171 -- 2180. In Social network data analytics. Springer, 149 -- 175. [52] Lovro Šubelj and Marko Bajec. 2013. Model of complex networks based on citation dynamics. In Proceedings of the 22nd international conference on World Wide Web. ACM, 527 -- 530. [53] Yudong Sun, Bogdan Danila, K Josić, and Kevin E Bassler. 2009. Improved commu- nity structure detection using a modified fine-tuning strategy. EPL (Europhysics Letters) 86, 2 (2009), 28004. [54] Mursel Tasgin, Amac Herdagdelen, and Haluk Bingol. 2007. Community detection in complex networks using genetic algorithms. arXiv preprint arXiv:0711.0491 (2007). [55] Ulrike Von Luxburg. 2007. A tutorial on spectral clustering. Statistics and computing 17, 4 (2007), 395 -- 416. [56] Ken Wakita and Toshiyuki Tsurumi. 2007. Finding community structure in mega- scale social networks. In Proceedings of the 16th international conference on World Wide Web. ACM, 1275 -- 1276. [57] Jaewon Yang and Jure Leskovec. 2014. Structure and overlaps of ground-truth communities in networks. ACM Transactions on Intelligent Systems and Technology (TIST) 5, 2 (2014), 26. [58] Jaewon Yang and Jure Leskovec. 2015. Defining and evaluating network commu- nities based on ground-truth. Knowledge and Information Systems 42, 1 (2015), 181 -- 213. [59] Wayne W Zachary. 1977. An information flow model for conflict and fission in
1808.02784
1
1808
2018-08-08T14:00:16
Schools are segregated by educational outcomes in the digital space
[ "cs.SI" ]
The Internet provides students with a unique opportunity to connect and maintain social ties with peers from other schools, irrespective of how far they are from each other. However, little is known about the real structure of such online relationships. In this paper, we investigate the structure of interschool friendship on a popular social networking site. We use data from 36,951 students from 590 schools of a large European city. We find that the probability of a friendship tie between students from neighboring schools is high and that it decreases with the distance between schools following the power law. We also find that students are more likely to be connected if the educational outcomes of their schools are similar. We show that this fact is not a consequence of residential segregation. While high- and low-performing schools are evenly distributed across the city, this is not the case for the digital space, where schools turn out to be segregated by educational outcomes. There is no significant correlation between the educational outcomes of a school and its geographical neighbors; however, there is a strong correlation between the educational outcomes of a school and its digital neighbors. These results challenge the common assumption that the Internet is a borderless space, and may have important implications for the understanding of educational inequality in the digital age.
cs.SI
cs
Schools are segregated by educational outcomes in the digital space Ivan Smirnov1∗ 1 Institute of Education; National Research University Higher School of Economics, Myasnitskaya ul., 20, Moscow 101000, Russia The Internet provides students with a unique opportunity to connect and maintain social ties with peers from other schools, irrespective of how far they are from each other. However, little is known about the real structure of such online relationships. In this paper, we investigate the structure of interschool friendship on a popular social networking site. We use data from 36, 951 students from 590 schools of a large European city. We find that the probability of a friendship tie between students from neighboring schools is high and that it decreases with the distance between schools following the power law. We also find that students are more likely to be connected if the educational outcomes of their schools are similar. We show that this fact is not a consequence of residential segregation. While high- and low-performing schools are evenly distributed across the city, this is not the case for the digital space, where schools turn out to be segregated by educational outcomes. There is no significant correlation between the educational outcomes of a school and its geographical neighbors; however, there is a strong correlation between the educational outcomes of a school and its digital neighbors. These results challenge the common assumption that the Internet is a borderless space, and may have important implications for the understanding of educational inequality in the digital age. Keywords: schools, social networks, educational outcomes, digital inequality Even Pope said so [1]. The Internet creates unique op- portunities for people to connect with each other. It may, therefore, be significantly beneficial for its users because social ties are known to play a significant role in human well-being including life-satisfaction [2], health [3, 4], and professional development [5, 6]. There is grow- ing evidence that these findings apply not only to offline social ties but to online friendship as well [7, 8]. This role of the internet may be particularly important for underprivileged groups of people such as students from low-performing schools who lack resources in their im- mediate environment. Connections with students from high-performing schools might potentially influence their university aspirations [9], improve educational outcomes [10], and promote positive behavioral change [11]. People from underprivileged backgrounds tend not to benefit as much as their peers from the Internet (a phe- nomenon usually referred to as digital inequality [12]). While well-educated people often use the Internet for medical or juridical advice, job seeking or education, their less educated peers use it predominantly for enter- tainment [13 -- 15]. The use of social media by students is known to be differentiated in a similar way depending on their academic performance. High-performing students use it for information seeking while low-performing stu- dents for chatting and entertainment [16, 17]. It may be expected that online social ties would also depend on academic achievements and that students might be seg- regated by the educational outcomes in the digital space. At a general level, segregation is the degree to which several groups of people are separated from each other [18]. In this paper, we investigate whether students from ∗[email protected] high- and low-performing schools are separated (i.e. not connected via online friendship) in the digital space. Figure 1: The school network. Circles represent schools. Different colors correspond to administrative districts of Saint Petersburg. Two schools are connected if there is a friendship tie between their students. For visual clarity, only strong connections (at least three friendship ties) are shown. 8 1 0 2 g u A 8 ] I S . s c [ 1 v 4 8 7 2 0 . 8 0 8 1 : v i X r a We use data from 36, 951 15-year-old students from 590 schools of Saint Petersburg, Russia, registered on a pop- ular social networking site VK1 (see Methods for details about the sample). VK is the Russian analog of Face- book and the largest European social networking site. It is ubiquitous among young Russians: more than 90% of 18-24-year-olds use it regularly [19]. The information in users' public profiles includes their age and the schools they are studying in. This information is available via the open application programming interface (API) of VK. We use the VK API to download information about all students who indicate that they study in one of Saint Pe- tersburg's schools and who were born in 2001 (i.e. that students were 15 years old at the time of data collection). Similar to other social networking sites, users might be- come "friends" on VK if they mutually confirm this sta- tus. We use information about such online friendships to construct a weighted network of schools (Fig. 1), where two schools are connected if there is at least one friend- ship tie between their students (see Methods for details), and the weight corresponds to the number of such ties. For each school, the information about its geographical coordinates along with the performance of its graduates on the unified state examination (USE) is available (see Methods). The USE scores serve as a proxy for schools' educational outcomes. Residential segregation by income is believed to be an important source of variation in schools' educational out- comes in some countries [20 -- 22]. It means that low- performing schools are concentrated in less affluent neigh- borhoods and the educational outcomes of a school could be effectively predicted from the socioeconomic status of its district [23]. The situation might be different in Saint Petersburg thanks to the egalitarian nature of the Rus- sian educational system inherited from the Soviet period. To account for potential effects of residential segregation, we collect data from 11, 034 apartments from the largest Russian real estate site CIAN2 and use average apart- ment price as a proxy of neighborhood affluence. We then check whether schools' educational outcomes are corre- lated with the affluence of their neighborhood. We measure geographical segregation of schools as a cor- relation between the educational outcomes of a school and those of its closest geographical neighbors. We then compare this segregation with that in the digital space. In this case, instead of the closest geographical neighbors, we examine the educational outcomes of schools' closest digital neighbors. We assume that the distance between two schools in the digital space is inversely proportional to the number of online friendship ties between them. The probability of an online friendship between two peo- ple is known to be strongly dependent on the geograph- ical distance between them [24 -- 27]. It is, therefore, im- 1 http://vk.com 2 http://cian.ru 2 Figure 2: Probability of a friendship tie between two schools as a function of distance between these schools. For close schools, the probability is 0.75 and it then declines with distance following the power law (inset). portant to ensure that any observed effect for the digital network of schools is not solely driven by the geographi- cal constraints. To achieve this, we use a random graph model that preserves geographical constraints -- namely, the probability of a friendship tie between two schools given the geographical distance between them. We then compare the results obtained for such random networks with the observed results for the real network. Results Distance and online relationships We find that geographical distance plays an important role in the formation of an interschool friendship. The probability of a friendship tie between two close schools is high (0.75) but it declines rapidly with distance following the power law (Fig. 2). The best fit is provided by the exponent −0.62 (Fig. 2 inset), which is similar to the previously observed results [27]. Geographical segregation We find that the educational outcomes of schools do not depend on their distance from the city center (Pearson correlation coefficient between USE scores of schools and their distance from the center is 0.018, P = 0.65). The distance from the center may be, however, a poor proxy for neighborhood affluence. Hence, we additionally col- lect information about average apartment prices across the city (see Fig. S1 for the corresponding heat map). 010203040Distance between schools (d), km0.00.20.40.60.8Probability of frienship tie1251020400.10.20.40.6d0.62 3 Figure 3: Correlation between educational outcomes of schools and their 20 closest geographical (a) and digital neighbors (b). While there is no correlation for physical neighbors, there is a relatively strong correlation for digital neighbors. These results hold true regardless of the number of neighbors used in the analysis. We then compute the correlation between schools' USE scores and neighborhood affluence, Sn(R) (see Methods). The exact value depends on R (see Fig. S2), and the max- imum value is Sn = 0.12 (P = 0.007), indicating a weak correlation between educational outcomes and neighbor- hood affluence. Finally, we compute a correlation be- tween USE scores of schools and average USE score of their N closest geographical neighbors, Sg(N ) (see Meth- ods). We find no correlation Sg(N ) = 0.01 (P = 0.73) for N = 20 (Fig. 3a); this result holds true for all values of N (Fig. S3). We therefore find that there is only a weak if any relationship between educational outcomes of a school and its location in physical space. However, as we show in the next section, this result does not apply for the school location in the digital space. Digital segregation We find that there is a relatively strong correlation be- tween the educational outcomes of schools and their N closest digital neighbors (see Methods). Sd(N ) = 0.47 (P < 10−33) for N = 20 (Fig 3b). The correlation is significant for all N (Fig. S3). To rule out the role of geographical constraints in the observed digital segregation, we use a random graph model that preserves relationships between distance and probability of a friendship tie from the observed net- work (i.e. we create a tie between two schools with a probability from distribution represented in Figure 2 that depends on distance between schools). We com- pute Srand (1) for generated random networks and com- pare it with Sd(1). After 10, 000 simulations we obtain (cid:104)Srand (1)) = 0.04. The (1)) = 0.14 < Sd(1). This maximum value max(Srand (1)(cid:105) = −0.0005 and SD(Srand d d d d result makes the observed digital segregation significant with P < 10−4. We also find that high-performing schools not only tend to be connected with each other but also have more con- nections on average than low-performing schools. The correlation between the degree centrality of schools in the network and their educational outcomes is 0.49. Note that this simple network property explains as much vari- ation in the educational outcomes as the socioeconomic status of students [28], which is one of the key context variables used in educational studies [29]. We show, therefore, that the educational outcomes of a school are closely related to its location in the digital space. More central schools tend to be high performing. We also show that schools with similar academic perfor- mance tend to be connected in the digital space. We demonstrate that these results cannot be explained by schools' locations in the physical space. Discussion Both for research and policy-making purposes, it is cru- cial to understand the context in which schools operate. This requirement traditionally means collecting informa- tion about school resources and the socioeconomic status of its students. Today, students spend much of their time online [30], and it may be warranted to consider students' online environment on a par with their home environ- ment. In this paper, we focus only on one dimension of such an online environment, namely interschool friend- ship on a social networking site. We find that school position in an online friendship network could explain as much variation in the educational outcomes of its stu- 406080Educational outcomes556065Educational outcomes(physical neigbours)r = 0.01a)406080Educational outcomes556065Educational outcomes(digital neigbours)r = 0.47b) 4 this way for research purposes. We also use data from the largest Russian real estate site CIAN to collect information about the prices of all 2-room apartments in Saint Petersburg listed on the site. For each apartment, its price per square meter was calculated. CIAN team approved the use of this data for research purposes. Network of schools We define a 36, 951×36, 951 adjacency matrix F that rep- resents the friendship network of students (i.e. Fi,j = 1 if students i and j are friends on VK and Fi,j = 0 oth- erwise). We assume that student i studies in school s(i), and construct a weighted network of schools by counting the number of all friendship ties between two schools. This network is represented by 590× 590 matrix A where (cid:88) Ak,l = Fi,j. {i,js(i)=k,s(j)=l} dents as their socioeconomic status, indicating the im- portance of the digital context. Online inequalities might merely reflect existing socioeconomic inequality or rather complement it. Future research is required to clarify this relationship. Social media have become the main source of information for young people. In Russia, VK is referred to as the main source of information about the country and the world by 70.3% of respondents (cid:22) more than any other information source [31]. It is also considered more trust- worthy than traditional media [31]. The news feed of the social network mainly comprises posts shared by online friends. The friends from different schools may, therefore, be an important source of diversity in the information environment of students. In particular, the connections with students from high-performing schools could have a positive impact on students from low-performing schools. However, our results suggest that interschool friendship ties mainly exist between schools with similar educational outcomes. Intriguingly, this digital separation cannot be explained by the geographical location of schools. This result means that the digital environment not only fails to remove segregation, but rather might amplify it. Methods Data collection According to the open data government portal3, there are 638 high schools in Saint Petersburg. This number ex- cludes specific types of schools such as boarding schools, cadet schools, and educational centers. We use open VK API to find these schools in the VK database. We find VK IDs for 628 of the schools. We exclude school №1 from the sample because it has an unreasonable number of users (more than 1000 per cohort). We also exclude two pairs of schools with identical names. We then use data from the web portal "Schools of Saint Petersburg"4 to obtain the average performance of schools' graduates at the Unified State Examination. This is a mandatory state examination that all school graduates should pass in Russia. This information was available for 590 schools from our sample. We then perform requests to VK API to obtain the lists of all users who were born in 2001 and indicate that they are studying in one of the schools from our sample. To exclude users who provided false information about their school, we remove profiles with no friends from the same school, as previously recommended [32]. We also exclude students who indicate several schools in their profiles. Finally, we download the lists of all VK friends for users from our sample. All collected data is publicly available. The VK team confirmed to us that we can use its API in One potential disadvantage of this definition is that two schools could be considered as closely connected when only one student from the first school has a lot of friends from the other. We therefore also use an alternative way to define the weight of the school tie. In this case, instead of friendship ties, we count the number of students from one school that have friends from another (i.e. we define Ak,l = {is(i) = k and ∃j : Fi,j = 1, s(j) = l}). We symmetric matrix Ak,l = min( Ak,l, Al,k). This alternative metric leads to the same results, and therefore we opted for the first more straightforward approach. construct a could then Segregation measures If Ui is the average performance on the Unified State Examination of graduates from school i, we could then define segregation based on the affluence of school neigh- borhoods in the following way: Sn(R) = corr(Ui, Pj/{jd(i, j) < R}), (cid:88) {jd(i,j)<R} where Pj is the price of apartment j in rubles per square meter and d(i, j) is the distance between school i and apartment j. We denote geographical neighbors of school i by Ng(i). Ng(i) = (si,1, ..., si,590) is an ordered list of all schools such as d(i, si,k) <= d(i, si,k+1), where d is the geo- graphical distance between schools. We then denote the list of k-closest geographical neighbors by N k g (i) = (si,1, ..., si,k). We define the k-closest digital neighbors d (i) by replacing geographical distance with the digital N k distance that is equal to 1/Ai,j. We then define geographical and digital segregations by academic performance in the following manner: (cid:88) 3 http://data.gov.spb.ru 4 http://www.shkola-spb.ru Sg(k) = corr(Ui, Uj/k) {jj∈N k g (i)} Sd(k) = corr(Ui, (cid:88) {jj∈N k d (i)} Uj/k) Note that in the case of digital segregation, there could be several schools with exactly the same distance from a certain school. In this case, N k d (i) is not uniquely defined. In our computations, we randomly select with equal prob- abilities one of the possible N k d (i). 5 for 6 [17] Ivan Smirnov. Predicting PISA scores from students' In International Conference on Web on digital traces. Social Media, pages 360 -- 364, 2018. [18] Rebecca Allen and Anna Vignoles. What should an in- dex of school segregation measure? Oxford Review of Education, 33(5):643 -- 668, 2007. [19] Public Opinion Foundation. Online practices of Russians: http://fom.ru/SMI-i-internet/ social networks. 12495, 2016. [Accessed 01.08.2018]. [20] Carolina Andrea Flores. Residential segregation and the geography of opportunites: a spatial analysis of hetero- geneity and spillovers in education. PhD thesis, The Uni- versity of Texas at Austin, 2008. [21] Ian Gordon and Vassilis Monastriotis. Urban size, spatial segregation and educational outcomes. London: London School of Economics, 2003. [22] Ann Owens. Income segregation between school districts and inequality in students' achievement. Sociology of Ed- ucation, 91(1):1 -- 27, 2018. [23] Sean F Reardon, Demetra Kalogrides, and Ken Shores. The geography of racial/ethnic test score gaps. CEPA Working Paper No. 16-10., 2017. [24] Yuri Takhteyev, Anatoliy Gruzd, and Barry Well- man. Geography of twitter networks. Social networks, 34(1):73 -- 81, 2012. [25] Won-Yong Shin, Bikash C Singh, Jaehee Cho, and Andr´e M Everett. A new understanding of friendships in space: Complex networks meet twitter. Journal of Information Science, 41(6):751 -- 764, 2015. [26] Bal´azs Lengyel, Attila Varga, Bence S´agv´ari, ´Akos Jakobi, and J´anos Kert´esz. Geographies of an online so- cial network. PloS one, 10(9):e0137248, 2015. [27] Przemyslaw A Grabowicz, Jose J Ramasco, Bruno Gon¸calves, and V´ıctor M Egu´ıluz. Entangling mobility and interactions in social media. PloS one, 9(3):e92196, 2014. [28] Gordey Yasterbov, Alexey Bessudnov, Marina Pinskaya, and Sergey Kosaretsky. Contextualizing academic perfor- mance in russian schools: School characteristics, the com- position of student body and local deprivation. Higher School of Economics Research Paper, 2014. [29] Selcuk R Sirin. Socioeconomic status and academic achievement: A meta-analytic review of research. Re- view of educational research, 75(3):417 -- 453, 2005. [30] Diana Koroleva. Always online: Using mobile technol- ogy and social media at home and at school by modern teenagers. Educational Studies, 1:205 -- 224, 2016. [31] Kasamara, Valeria and Sorokina, Anna. Russian stu- http://tass.ru/obschestvo/4255020, dents' values. 2017. [Accessed 02.08.2018]. [32] Ivan Smirnov, Elizaveta Sivak, and Yana Kozmina. In search of lost profiles: The reliability of vkontakte data and its importance in educational research. Educational Studies, 4:106 -- 122, 2016. the Message day. Francis. communications [1] Pope world vatican.va/content/francesco/en/messages/ communications/documents/papa-francesco_ 20140124_messaggio-comunicazioni-sociali.html, 2014. [Accessed 02.08.2018]. 48th https://w2. [2] Ed Diener, Eunkook M Suh, Richard E Lucas, and Heidi L Smith. Subjective well-being: Three decades of progress. Psychological bulletin, 125(2):276, 1999. [3] Julianne Holt-Lunstad, Timothy B Smith, and J Bradley Layton. Social relationships and mortality risk: a meta- analytic review. PLoS medicine, 7(7):e1000316, 2010. [4] Ichiro Kawachi and Lisa F Berkman. Social ties and mental health. Journal of Urban health, 78(3):458 -- 467, 2001. [5] Joel M Podolny and James N Baron. Resources and rela- tionships: Social networks and mobility in the workplace. American sociological review, 62(5):673 -- 693, 1997. [6] Thomas WH Ng, Lillian T Eby, Kelly L Sorensen, and Daniel C Feldman. Predictors of objective and subjective career success: A meta-analysis. Personnel psychology, 58(2):367 -- 408, 2005. [7] William R Hobbs, Moira Burke, Nicholas A Christakis, and James H Fowler. Online social integration is associ- ated with reduced mortality risk. Proceedings of the Na- tional Academy of Sciences, 113(46):12980 -- 12984, 2016. [8] Adriana M Manago, Tamara Taylor, and Patricia M Greenfield. Me and my 400 friends: The anatomy of college students' Facebook networks, their communica- tion patterns, and well-being. Developmental psychology, 48(2):369, 2012. [9] Jere Cohen. Peer influence on college aspirations with initial aspirations controlled. American Sociological Re- view, 48(5):728 -- 734, 1983. [10] Alessandro Lomi, Tom AB Snijders, Christian EG Steglich, and Vanina Jasmine Torl´o. Why are some more peer than others? evidence from a longitudinal study of social networks and individual academic performance. Social Science Research, 40(6):1506 -- 1520, 2011. [11] Kimberly A Maxwell. Friends: The role of peer influence across adolescent risk behaviors. Journal of Youth and adolescence, 31(4):267 -- 277, 2002. [12] Paul DiMaggio, Eszter Hargittai, Coral Celeste, and Steven Shafer. From unequal access to differentiated use: A literature review and agenda for research on digital in- equality. Social inequality, pages 355 -- 400, 2004. [13] Katy E Pearce and Ronald E Rice. Somewhat sepa- rate and unequal: digital divides, social networking sites, and capital-enhancing activities. Social Media+ Society, 3(2):2056305117716272, 2017. [14] Moritz Buchi, Natascha Just, and Michael Latzer. Mod- eling the second-level digital divide: A five-country study of social differences in internet use. New Media & Society, 18(11):2703 -- 2722, 2016. [15] Alexander JAM Van Deursen and Jan AGM Van Dijk. The digital divide shifts to differences in usage. New media & society, 16(3):507 -- 526, 2014. [16] Reynol Junco. Too much face and not enough books: The relationship between multiple indices of Facebook use and academic performance. Computers in human behavior, 28(1):187 -- 198, 2012. 7 Figure S3: Digital Sd(N ) and geographical Sg(N ) segre- gations as functions of the number of the neighbors N used in the analysis. Figure S1: The heat map of average apartment price in Saint Petersburg. The price is the highest in the city center, near Krestovsky Island, and along the Moscow avenue. Figure S2: Segregation Sn(R) as a function of the radius R that defines school neighborhood. 05101520Radius, km0.000.040.080.12Segregation5100200Number of neigbours0.00.20.4Segregationdigitalgeographical
1905.02762
1
1905
2019-05-07T18:33:24
Displaying Things in Common to Encourage Friendship Formation: A Large Randomized Field Experiment
[ "cs.SI" ]
Friendship formation is important to online social network sites and to society, but can suffer from informational friction. In this study, we demonstrate that social networks may effectively use an IT-facilitated intervention -- displaying things in common (TIC) between users (mutual hometown, interest, education, work, city) -- to encourage friendship formation. Displaying TIC updates an individual's belief about the shared similarity with another and reduces information friction that may be hard to overcome in offline communication. In collaboration with an online social network, we conduct a randomized field experiment that randomly varies the prominence of different things in common when a user is browsing a non-friend's profile. The dyad-level exogenous variation, orthogonal to any (un)observed structural factors in viewer-profile's network, allows us to cleanly isolate the role of preferences for TIC in driving network formation and homophily. We find that displaying TICs to viewers can significantly increase their probability of sending a friend requests and forming friendships, and is especially effective for pairs of people who have little in common. We also find that displaying TIC can improve friendship formation for a wide range of viewers with different demographics and is more effective when the TICs are more surprising to the viewer.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Displaying Things in Common to Encourage Friendship Formation: A Large Randomized Field Experiment Tianshu Sun · Sean J. Taylor 9 1 0 2 y a M 7 ] I S . s c [ 1 v 2 6 7 2 0 . 5 0 9 1 : v i X r a Abstract Friendship formation is of central importance to online social network sites and to society, but can suffer from significant and unequal frictions. In this study, we demonstrate that social networks and policy makers may use an IT-facilitated intervention -- displaying things in common (TIC) between users (mutual hometown, interest, education, work, city) -- to encourage friendship formation, especially among people who are different from each other. Displaying TIC may update an individual's belief about the shared similar- ity with another and reduce information friction that may be hard to overcome in offline communication. In collaboration with an online social network, we design and implement a randomized field experiment, which randomly varies the prominence of different types of things in common information when a user (viewer) is browsing a non-friend's profile. The dyad-level exogenous variation, orthogonal to any (un)observed struc- tural factors in viewer-profile's network, allows us to cleanly isolate the role of individuals' preference for TIC in driving network formation and homophily. We find that displaying TIC to viewers may significantly increase their probability of sending a friend request and forming a friendship, and is especially effective for pairs of people who have little in common. Such findings suggest that information intervention is a very effective and zero-cost approach to encourage the formation of weak ties, and also provide the first experi- mental evidence on the crucial role of individuals' preference (versus structural embeddedness) in network formation. We further demonstrate that displaying TIC could improve friendship formation for a wide range of viewers with different demographics and friendship status, and is more effective when the TIC information is more surprising to the viewer. Our study offers actionable insights to social networks and policy makers on the design of information intervention to encourage friendship formation and improve the diversity of the friendship, at both an aggregate and an individual level. Keywords Network Formation · Social Interactions · Field Experiment · Things in Common · Homophily · Information Theory · Diversity Tianshu Sun Marshall School of Business, University of Southern California E-mail: [email protected] Sean Taylor Facebook E-mail: [email protected] 2 1. Introduction and Motivation Tianshu Sun, Sean J. Taylor Friendship formation is of central importance to online social network sites (SN) and to society. For social networks such as Facebook, Instagram, and Linkedin, encouraging friendship formation among users is vi- tally important: first, articulated friendships provide infrastructure for the spread of information (Granovetter 1977, Yoganarasimhan 2012, Peng et al. 2018), influence (Aral and Walker 2011, Bapna and Umyarov 2015, Ugander et al. 2012, Eckles et al. 2016), and support (Burke and Kraut 2016) on the network. In addition, user engagement and retention on SN sites exhibits a strong local network effect (Sundararajan 2007, Hart- mann 2010, Tucker 2008) and friendship formation is primarily what enables this effect: with more friends, a user may use the SN more frequently, share more and create more content (Shriver et al. 2013, Goes et al. 2014, Toubia and Stephen 2013). Recognizing the significant benefits users gain from having more friends, most major SN sites invest significantly in encouraging friendship formation among their users1. The same considerations and emphasis on friendship formation have also been prevalent among public and private or- ganizations in the society: policy makers in schools and corporations recognize the importance of friendship for the stability and performance of the students and employees (Marmaros and Sacerdote 2006, Carrell et al. 2013, Mayer and Puller 2008, Mollica et al. 2003, Ibarra 1992), and strive to facilitate tie formation within their organizations. Besides the absolute volume of friendship formation among individuals, there is also a surging interest and an increasing emphasis by both SN sites and policy makers on the diversity of friendships (Fischer 2008, Eagle et al. 2010). A diverse friendship, formed by weak ties (i.e. people who share little in common in terms of mutual friends, origin, past experience, as defined in Easley and Kleinberg (2010), Aral and Walker (2014)) may increase information novelty (Bakshy et al. 2012b), facilitate the spread of valuable information (Gee et al. 2017, Shi et al. 2014), and promote mutual understanding among different parties (Bakshy et al. 2015). Despite the importance of the volume and diversity of friendships, there are significant frictions in the friendship formation process (e.g. information friction) and these frictions are unequally distributed -- they are often higher among people who are different from each other. Previous research in Marketing, Informa- tion Systems, Economics and Sociology have been focused on understanding the preference and mechanisms underlying network formation (Katona and Sarvary 2008, Jackson 2008, Mayzlin and Yoganarasimhan 2012, Ameri et al. 2017, Phan and Airoldi 2015, McPherson et al. 2001, Altenburger and Ugander 2018), but no systematic research has been done on how policy makers can actively encourage friendship formation, es- pecially for people who are very different (with little in common). In this study, we propose to address the challenge using a novel IT-facilitated information intervention: displaying 'things in common' computed from big data of users' digital profile on social networks (origin, past experience, likes, check-ins). The IT-facilitated TIC intervention is motivated by theories on friendship formation and enabled by recent advances in big data and computing technology. When making a friending decision, individuals search for shared attributes or experiences with the other party (Fisman et al. 2008, Currarini et al. 2009), such as common origin (hometown), experiences (work, education), contexts (current city), or interests (likes). Information about TIC can help reduce cognitive cost (Mollica et al. 2003, Forman et al. 2008), increase trust (Lin and Viswanathan 2015), and allow individuals to derive more utility from the friendship in the long run (Felmlee et al. 1990). However, discovering similarity is often costly and suffer from informational friction in offline communication: it may take multiple conversations and a non-trivial amount of time before two people realize they share something in common. In contrast, with recent development in data infrastructure and technology, online social networks can now compute, synthesize and display things in common between 1 Several major SNs have made increasing the number of friends a key goal in their operations (Price 2012): e.g. Linkedin aims to get a user to reach X friends in Y days, and Facebook and Twitter use similar goal metrics. Displaying Things in Common to Encourage Friendship Formation 3 any pair of users in real time (when a viewer is browsing a non-friend profile). Displaying TIC updates the viewer's belief about shared similarities with another2 and can significantly reduce information friction in the friending process, generating substantial value in network formation. Interestingly, such information intervention we suggest can be applicable in any IT-mediated friendship formation process in both online social platforms and offline organizations (e.g. through enterprise social network like Slack, Workplace, Jive and Yammer). And the potential of TIC intervention is only increasing because of the accumulation of rich data and the advances of computing technology (Yadav and Pavlou 2014). To the best of our knowledge, our study is the first to identify the unique opportunity and propose the information intervention in both industry practice and academic research. The promise of displaying TIC is huge: as envisioned by Zuckerberg in Facebook's new mission statement "If we connect with people about what we have in common, it is easier to have dialogue about what we disagree on. When we do this well, we give billions of people the ability to share new perspectives...and bring the world closer together" (Zuckerberg 2017) Despite the practical importance and technical feasibility, no study has systematically examined the effectiveness of displaying things in common on friendship formation. Very little is known about its causal effect on users' friending behaviors, friendship formation, and friendship diversity. Specifically, we want to understand: (Q1, effectiveness) Can displaying 'things in common' encourage a viewer's friend request and increase the probability of friendship formation? (Q2, heterogeneity) Is displaying TIC effective in encouraging the friendship formation of weak ties, i.e. pairs of individuals who are different (with no mutual friends and who share few TICs)? Is displaying TIC effective for viewers with different demographics and friendship status? (Q3, mechanism) What is the potential mechanism underlying the effect of displaying TIC on view- ers' friending decision? When will the display of a TIC be more effective? Will there be substitution or complementarity when showing multiple TICs and why? The answers to these questions provide immediate managerial implications on how to facilitate users' friending decision and cultivate tie formation in social networks -- a policy question that is important not just for large SN and organizations but for any site or firm building social features. To address the questions, we carefully design and conduct a randomized experiment at the level viewer- profile pairs, and find that displaying TIC may significantly increase friendship formation, especially for weak ties (by 7.1-10.3%). We demonstrate that TIC intervention works for a wide range of users and is more effective when TIC creates more 'surprisal' to the viewers. As a result, the proposed TIC intervention is implemented at full scale. In this way, our experiment contributes to the practice and the Marketing, Information Systems and Economics literature, in few ways. First, a large stream of literature on social influence (or peer effect) have intensively studied IT-mediated social influence on existing friendship ties (Iyengar et al. 2011, Tucker 2008, Aral and Walker 2012, Susarla et al. 2012, Wang et al. 2018). However, little is known about how IT can help facilitate and shape friendship formation. Understanding IT-enabled tie formation is crucial as friendship ties serve as the infrastructure underlying influence processes and have a significant impact on information diffusion (Shi et al. 2014, Peng et al. 2018). Our study is among the first to address this gap and suggests that SN sites may creatively leverage IT-facilitated information intervention to overcome challenges in friendship formation, especially 2 The viewer may either have little information about the profile's interest, or have an biased perceptionGoel et al. (2010). In both scenarios, the displayed TIC information would help update the viewer's belief. 4 Tianshu Sun, Sean J. Taylor among weak ties3. In this way, information and influence can better spread on the network infrastructure (Phan and Godes 2018, Gee et al. 2017). Second, recent efforts by researchers, policy makers and SN sites to improve friendship formation have focused on 'recommending the right people' for interaction (e.g. 'People You May Know' feature, (Linkedin 2016, Su et al. 2016, Brzozowski and Romero 2011). In this study, we argue that it is equally important to 'show the right information' upon interaction. Regardless of the friend recommendation algorithm, a user will spend a limited amount of time browsing another user's profile on Facebook and Twitter (Lerman et al. (2013), few seconds). Providing better information to viewers allows them to understand what they share in common with other users and make more informed friending decisions. In addition, unlike friend recommendation/link prediction algorithms which generally rely on the existence of mutual ties (Moricz et al. 2010, Dhar et al. 2014), information provision can operate independently of social network structure thus can help connect people who share no mutual ties (i.e. weak ties formation).4 Third, despite a recent surge of interest in diversity at schools and workplaces and an increasing empha- sis on friendship diversity (Fischer 2008), little is understood about how platforms and policy makers can foster such diversity on platforms or within organizations. Our study proposes and demonstrates that dis- playing TIC information, distilled from existing data accumulated on the platform (or in the organization), could reduce information friction in social interaction process and increase friendship diversity. We envision that TIC information may also reduce bias in other forms of social interaction such as hiring and increase diversity within an organization. Besides managerial relevance and immediate applicability, our study also makes several contributions to social network literature and improve our theoretical understanding of the origin of network formation and homophily. First, our experiment cleanly isolates the causal effect of users' preferences for different types of TIC on tie formation. This is the first experimental evidence in the network literature. Second, the origin of homophily is notoriously hard to identify (Currarini et al. 2010), as the preference factor (over TIC) and structural factor (e.g. network embeddedness or mutual friends) always entangles with each other in observational data. By randomizing the display of TIC (which is orthogonal to any structural factor), we are now able to measure the relative importance of individuals' preferences versus structural factors in network formation process. We further detail the contributions to network theory in 'Results and Discussion' and in Appendix D. 2. Identification Challenges and Strategy While important to both practice and theory, identifying the causal effect of displaying things in common on friendship formation is empirically challenging (Figures 1 and 2). First, one cannot identify the treatment effect by simply comparing friending decisions across ego-alter pairs with different numbers of TIC: it is possible that the ego may be more likely to friend an alter that shares more similar traits due to unobserved confounding (Ui j in Figure 1, e.g. existence of mutual friend), regardless of whether the 'things in common' 3 Despite lively discussions on the importance of friendship diversity (Kossinets and Watts 2009, Eagle et al. 2010, Granovetter 1977) in facilitating interactions among different groups (Bakshy et al. 2015), very little is understood about how online social networks can actively help 'build' the weak ties among people with different background. 4 Finally, our study also extends a large stream of literature in Marketing and IS on the reduction of information friction in online platforms and marketplaces. Previous literature has focused on how IT artifacts (online reviews, product recommendations) can be used to reduce friction in user-product interactions (Fradkin 2017, Forman et al. 2008, Oestreicher-Singer and Sundararajan 2012, Fleder and Hosanagar 2009). Our study suggests a new route in which IT could reduce the friction in user-user interaction, and open up a new area of research on the role of IT in moderating the structure, evolution and value of user-user network (Oestreicher-Singer et al. 2013, Hosanagar et al. 2013). Displaying Things in Common to Encourage Friendship Formation 5 are actually shown on the alter profile or not. In other words, when observing a correlation between the presence of TIC (i.e. Xi j) and an increase in friendship formation (i.e. Yi j), one can not differentiate structural factors versus treatment effect (of displaying TIC)5. This identification problem is fundamentally rooted in unobserved confounding present in observational data (Hartmann et al. 2008, Phan and Airoldi 2015, Kossinets and Watts 2009, Aral et al. 2009, Shalizi and Thomas 2011, Kwon et al. 2017)6. Second, structural factor may complement or substitute the effect of preferences over TIC in the network formation process. It would be interesting to understand the importance of displaying TIC with or without the presence of mutual friends. Finally, the baseline probability of friendship formation in online social interaction process is generally very low. Less than 0.1% of the viewer-profile pairs form a friendship in the social interactions (viewer browsing the profile). Thus, a very large sample of pairs is needed to detect statistical significance of a reasonable treatment effect (Lewis and Rao 2015). Fig. 1: Identification Challenge. In observational data, it is extremely hard to identify the effect of displaying TIC in driving friendship formation (Yi j), as the actual TIC (Xi j) for viewer-profile pair is endogenously correlated (dashed line) with confounding factors (Ui j) such as the existence of mutual friend, thus the estimated effect of Xi j on Yi j is biased. (formally, in econometric equation Yi j = γ ∗ Xi j +Ui j,γ is biased) In order to address these challenges, we leverage a large-scale randomized experiment on a large SN site involving over 50 million viewer-profile pairs. This product test was designed to help choose the best combination of TIC for the SN site to display, randomly varying the prominence of 'things in common' information when a viewer is browsing another's profile card. The treatment (to display certain TIC infor- mation or not) is randomly assigned only thus are independent to both observed and unobserved structural 5 For instance, those viewer-profile pairs with 2 TIC may have a higher friendship formation rate than those with only 1 TIC, not because of the additional TIC at display, but because pairs with 2 TIC are likely to have more mutual friends and more interaction opportunities (i.e. structural factors) than pairs with 1 TIC. In Online Appendix C, we confirm the above insight and empirically demonstrate that the correlation between number of things in common in a pair and the corresponding friendship formation rate is not only biased, but even opposite to the true causal effect in sign (Figure C.1) 6 Observational data often lacks of detailed information on the structural factor such as interaction history and friendship structure (McPherson et al. 2001), which is needed to control for meeting bias and triadic closure. Even more fundamentally, the endogenous correlation between things in common, meeting bias, and network structure makes it almost impossible to isolate the role of preference in friendship formation from observational studies (Currarini et al. 2010). 6 Tianshu Sun, Sean J. Taylor Fig. 2: Identification Strategy. Randomization process in the experiment creates exogenous variation in the displayed things in common (Di j), therefore allows us to identify the causal effect of showing TIC and isolate the effect of displaying TIC in driving friendship formation. The display of a certain type of things in common 'a' (i.e. Di ja) is independent of Ui j, thus the estimated coefficient for Di ja is unbiased. The exogenous assignment of Di ja allows us to identify effect of each type of things in common. (formally, Yi j = σa ∗ Di ja + γ ∗ Xi j +Ui j, where σa is the causal effect of displaying a type of TIC 'a'. σa is identified and unbiased because corr(Di ja,Ui j) = 0). factor between the viewer-profile dyad (e.g. mutual friend(s), interaction opportunity). The exogenous vari- ation created in the displayed TIC (Di j) boosted the salience of TIC to the viewer and allows us to identify the role of preference in driving friendship formation (Figure 2), and understand its effect with or without the presence of structural factors (i.e. the existence of mutual friend) in a real network environment. The scale of our experiment ensures that we have sufficient statistical power to detect the treatment effect, and to explore heterogeneity in effects for different categories of TIC and for different subgroups of viewer-profile pairs. We present the experiment and data in detail as below. 3. Experiment Design and Data We collaborated with a large global SN site which features a user profile page where registered users can report a wide range of information that they want to share with others, including current city, current work, hometown, past education, past experience and so on. Users on the SN site can also participate in several kinds of activities, including browsing and interacting with friends' updates and public pages, and posting updates and content on their own profile. The SN site, like most other SN sites, has a function on its mobile platform in which users can discover new friends. Specifically, a user (who we will refer to as the 'viewer') may view the profile cards of other users -- one at a time on the mobile screen (Figure 4). The profile card includes a subset of information that the alter has shared on her or his public profile on the social network site, including current work, education, current city, hometown, as well as recent photos and updates s/he has shared publicly (Figure 4 for a wireframe of the design). The viewer may swipe right or left to see the next or previous profile card in the sequence, and can tap on "Add Friend" to send a friend request to the alter. If the alter approves Displaying Things in Common to Encourage Friendship Formation 7 Fig. 3: Process. Step-by-step illustration of friendship formation process. the request in the notification, then an articulated friendship between the pair is formed (Figure 3)7. When browsing the profile card for a specific alter, the viewer may also see whether s/he share any mutual friends with the profile, and if so, how many. Finally, the site may also display things in common for the viewer- profile pair (Figure 4 right pane) based on their public profile information (city, work, hometown, education) and page like behavior in the past8. There are five types of things in common: mutual city, mutual work, mutual hometown, mutual education, and mutual interest (page likes). Depending on the characteristics and past behaviors of both the viewer and profile, each viewer-profile pair may have zero, one, or up to five things in common. Thus, the eligible things in common that the SN site can display for each viewer-profile pair may vary across pairs. We randomly sampled a portion of viewer-profile pairs with at least one TIC (and at most five TIC) and conduct a randomized field experiment over the representative sample. Over a period of few weeks, over 50 million viewer-profile pairs were randomly assigned into different test conditions. Specifically, for each viewer-profile pair, we randomly and independently vary whether to display each type of things in common that the pair may share, with a 50% chance of showing or not (Step 1 in Figure 3). For instance, for all pairs with two TIC (e.g. mutual city and mutual like), in expectation 25% of pairs would see two TIC, 50% would see one (with 25% see mutual like and 25% see mutual city), and 25% would see none. In expectation, the number of TIC shown should follow a binomial distribution determined by number of actual things in common shared by the viewer-profile pairs. Figure 5 confirms the empirical distribution perfectly matches our randomization strategy, providing the randomization check9. Finally, the randomization is performed at viewer-profile pair level, i.e. the same viewer may be assigned to different condition when browsing 7 We use 'articulated friendship' to denote that the friendship on SN sites is a unique type of social network connection, which is valuable by itself (in the creation and spread of information) and may differ from the offline friendship. For instance, the interaction frequency and tie strength of articulated friendship on average may be lower (weaker) as compared to the offline friendship. 8 Specifically, the viewer and profile can be represented as two high-dimensional n× 1 vectors: each row representing the value of a profile field entry or a page like decision. Their TIC are calculated from the intersect of the two vectors. 9 We also check the balance of a series of user covariates (e.g. viewer/profile gender, friend count) across the control and treatment groups and do not find any significant differences. All tables are available upon request. 8 Tianshu Sun, Sean J. Taylor Fig. 4: Control and Treatment Group. A wireframe of the user interface for the experiment. Control group is on the left and treatment group on the right. In this example, the two types of TIC between the profile and the viewer -- mutual city and mutual like -- are both displayed different profiles. We choose to randomize at viewer-profile level because the primary outcomes of interest, friend request and friendship formation, are measured at that level. Besides the randomized display of TIC, we also controlled the information environment of viewer-profile interaction in our experiment in two ways: first, upon the viewer sending out a friend request, the alter in both control and treatment group will see exactly the same notification (Step 3 in Figure 3), and no information about TIC is displayed to the alter in the notification. In this way, we isolate the treatment to viewers and all effects of displaying TIC on friendship formation should be driven by changes in viewers' decision. Second, the profile sequence that the viewers browse was generated in the same way across the control and treatment groups, and the test group is only assigned after the creation of profile sequence for each viewer. Such additional efforts help us isolate the effect of displayed TIC on the friendship formation process and eliminate confounding. The randomized experiment creates exogenous variation so that the displayed TIC in a pair a) is de- coupled from actual TIC (i.e. exogenous variations of displayed TIC within each group in Figure 5), and b) is independent of the interaction history and network structure for any viewer-profile pair. As a result, any unobserved confounding factors that may drive friendship formation for a viewer-profile pair (Figure 1), such as unobserved interaction (Currarini et al. 2009) and structural factor (sharing mutual friend or not), are orthogonal to treatment assignment. Any difference in the friendship formation between viewer-profile pairs in control and treatment groups (with the same actual things in common) can be attributed to difference Displaying Things in Common to Encourage Friendship Formation 9 Fig. 5: Randomization. Number of TIC shown to the viewer follows a binomial distribution, grouped by number of actual TIC shared between the pair. The empirical distribution perfectly matches our randomiza- tion strategy, providing the randomization check. in the displayed things in common. The exogenous variation created in the experiment allows us to cleanly identify the causal impact of showing things in common on friendship formation, therefore also isolate the role of preference over shared TIC in driving network formation. For every viewer-profile pair in our experiment, we log 1) the actual things in common between the pair, 2) things in common shown on the profile card (i.e. test group assignment), 3) whether they share mutual friends and 4) some limited demographic information for both viewer and profile (gender, city, etc.), as well as 5) the outcomes of the interaction (e.g. friend requests made by the viewer and friend requests accepted by the profile's associated user). With the experiment data, we can cleanly identify the causal effect of displaying 'things in common' on friendship formation, as well as its impact across different types of things in common, on different types of viewers, and for weak ties versus strong ties. We first present the summary statistics for our experiment in Table A.1 and Figures. As shown in Figure A.1, the vast majority (>98%) of the viewer-profile pairs in our sample only have one or two things in common (similar pattern when we separately draw the distribution for pairs with and without mutual friend, Figure A.2). Thus we will focus on discussing the treatment effect for those pairs. Among all the pairs with one TIC, the viewers and profiles are most likely to share mutual likes, followed by mutual hometown, city, education and work (Figure B.1). Pairs with two TIC follows a similar ranking (Figure A.12). In total, only 53.3% of viewer-profile pairs in our experiment share at least one mutual friend (Table A.1) thus 46.7% of pairs are weak ties. On average, a viewer may browse multiple profiles during the experiment period (Figure A.3 left pane) but a profile is very likely be browsed by only one viewer (Figure A.3 right pane). Since our randomization 4 Things in Common5 Things in Common1 Thing in Common2 Things in Common3 Things in Common012340123450101201230.00.10.20.30.40.50.00.10.20.30.40.5Number of Things in Common ShownFraction of Observations 10 Tianshu Sun, Sean J. Taylor at viewer-profile level, we sometimes sample the same viewer multiple times as s/he may browse multiple profile cards. To account for dependence introduced by repeated observations from the same viewer in our sample, we use a clustered bootstrap, randomly re-sampling 50% of viewers without replacement 500 times and deriving 95% confidence intervals from the sampling variance of the bootstrap replicate means (Owen et al. 2012). Bootstrapping for inference is a common practice in the analysis of experiments with depen- dence between observations. Bakshy and Eckles (2013) provide detailed simulations of how dependence in experimental data affect statistical inference in experiments, showing that bootstrapping is more conservative than a variance estimator (that assumes independence) and reduces the probability of Type I errors10. 4. Results and Discussions We present the findings from the experiment in this section. We organize the results and discussions based on the managerial and theoretical perspective. The managerial perspective corresponds to our research question Q1 and Q2, while the theoretical perspective corresponds to Q3. 4.1. Managerial Our experiment generates three main findings, which may provide immediate managerial implications to social network sites and policy makers. First (Q1), we find that showing things in common significantly increases friendship formation. As shown in Figure 6, within each group with the same number of actual TIC (1, 2 or 3), displaying TIC to the viewers would lead to a significant lift in their likelihood of sending out a friend request. The relative lift, as compared to the control group within each TIC group, ranges from 2.1% for pairs with 1 TIC to 8.9% for pairs with 3 TIC. It suggests that providing information about things in common may facilitate users' decision in friending process. Consistent with the pattern on friend request, we find displaying all things in common may significantly increase the probability of friendship formation11: a 1.3% increase in relative risk for pairs with 1 TIC and a 3.5% increase in relative risk for pairs with 2 TICs (we present the detailed estimates on the effect for both request and formation and the statistical significance in Table A.2). The increase in friendship formation is largely driven by additional friend request by the viewer (Step 2 in Figure 3), as revealed from the similar lift in the request and formation outcome in Figure 612. Such an increase is significant given the very large volume of viewer-profile pairs in the browsing session every day. Finally, we also compare the 'quality' of friendship ties formed in control and treatment groups, as measured by follow-up interactions (e.g. like, comment) within the ties. We find the IT-enabled friendship ties (with TIC display) is as good as regular ties in facilitating future interactions (Figure A.11). Second and more interestingly (Q2), we find displaying things in common can effectively encourage friendship formation between weak ties, i.e. people who share little in common (Aral and Walker 2014). Specifically, We divide the sample into pairs of users with and without mutual friends, as shown in Figure 7. Displaying TIC can encourage additional friend requests for all viewers, but are especially effective when the viewer and profile does not share any mutual friend (as revealed from the difference in y-scale). The friendship formation outcome follows a similar pattern but are more salient. In contrast to viewer-profile pairs with mutual friends (Figure 7 upper panel), displaying things in common can lead to a large and 10 Treatment effect from variance estimators yields the same point estimate and more statistically significant results. 11 Same pattern holds for pairs with 3 actual TIC (Figure A.4, A.5) but sample size is too small as shown in Figure A.1. 12 We are unable to find any evidence that the treatment induces any significant positive or negative effects on the rate that requests are accepted (see Figure A.6 for detailed analysis). Displaying Things in Common to Encourage Friendship Formation 11 Fig. 6: Effects of displaying things in common. Using pairs with zero things in common displayed as a base- line, showing more things in common increases the relative risk of both friendship request and formation. The effect are statistically significant for pairs with 1 and 2 actual things in common (left and middle pane). 95% confidence intervals are estimated using a bootstrap clustered on viewer with 500 bootstrap replicates. significant increase in friendship formation rate for pairs without mutual friends (lower panel): 7.3% relative increase for pairs with 1 TIC, and 10.3% for pairs with 2 TIC (see detailed estimates in Table A.3 for relative risk and other estimates). An immediate implication of the above findings is that the proposed information intervention could encourage the formation of weak ties. Displaying things in common may work without structural constraint (i.e. mutual friend) and connect people with even modest similarity (i.e. 1 or 2 things in common), therefore increase diversity of users' friendship ties and potentially reduce homophily and clustering in the social network. Third (Q2), we further explore the heterogeneity in the treatment effect, and find that the information in- tervention works for a wide range of viewers with different demographics and friendship status. Specifically, we find the effect of displaying things in common is effective for male and female viewers (Figure A.7), and also fairly consistent across various gender combinations (Figure A.8, e.g. a male browsing a female profile). In addition, we find the effects of displaying things in common is also consistent across viewers with different number of friends (Figure A.913), even for the viewers who already have over 500 friends. The above results are aligned with our main findings and suggest that TIC information intervention may be equally applied to a large variety of viewers in the social networks and cultivate the formation of weak ties for different subgroups. 13 For results in Figure A.7, A.8 and A.9, we also have tables with detailed regression results (available upon request) lllll1 Thing in Common2 Things in Common010121.001.021.041.06Number of Things in Common ShownRelative Risk of OutcomelRequestFormation 12 Tianshu Sun, Sean J. Taylor Fig. 7: Effects of displaying things in common, for pairs with and without mutual friends. We group all pairs by the number of things in common as well as the existence of mutual friends. Using pairs with zero things in common shown as a baseline within each group, we find showing more things in common increases the relative risk of friendship formation, but only for people with no mutual friends. 95% confidence intervals are estimated using a bootstrap clustered on viewer with 500 bootstrap replicates. Note: for display purpose, the y-axis scale for the upper panel and lower panel is different - the effects for pairs with no mutual friends are much larger 4.2. Theoretical Besides managerial implication, our findings also provide new insights about the friendship formation pro- cess and contributes to the theory on network formation and homophily, in a few ways. First, as discussed earlier, our study provides the first clean experimental evidence on the importance of individuals' preference over thing in common in driving friendship formation. We show a direct evidence that after becoming more aware of the shared similarity, the viewer is significantly more likely to send a friend request and form a friendship with the profile. Very interestingly, we also find a variation in the preference over different types of things in common (like, current city, hometown, education, work) and provide more details in Appendix B (Figure B.1, B.2). Second (Q3), we find individuals' preference over TIC plays a more prominent role when there is no mutual friend between the pair. The contrast between treatment effect of displaying TIC for viewer-profiles with and without mutual friends (Figure 7) suggests a substitution between preference factor and structural factor in friendship formation process, i.e. when a viewer already has mutual friends with the profile, s/he llllllllll1 Thing in Common2 Things in CommonMutual FriendsNo Mutual Friends010120.981.001.021.041.061.01.1Number of Things in Common ShownRelative Risk of OutcomelRequestFormation Displaying Things in Common to Encourage Friendship Formation 13 may positively update her/his belief about having TIC with profile. Thus, showing things in common might not reveal much additional information to the viewer thus cannot increase the probability of friendship formation. In other words, mutual friends and things in common may communicate similar or redundant information and thus the signals are not additive. The result is aligned with the belief update process where the viewer's with a prior probability on sharing TIC with the profile is contingent on the existence of mutual friend. We can better understand the theoretical contributions and mechanisms using a formal model. Specifi- cally, we can characterize i's friend request decision for j with the following equation14, Yi j = βa Pr(Xia = Xja) + βaDi ja[1− Pr(Xia = Xja)] + γXi j +Ui j where Pr(Xia = Xja) is the viewer i's prior probability of having a shared trait a with profile j when the TIC is not displayed (Di ja = 0). The coefficient βa represents the "importance" of the TIC to the viewer and captures the preference for the specific type of TIC is in driving the viewer's friending decision. When the SN site displays a TIC (Di ja = 1), the new information leads to a positive update on viewer i's belief about the shared TIC with profile j, i.e. [1 − Pr(Xia = Xja)], as the viewer is now 100% sure about the shared trait a. The magnitude of the belief update clearly depends on the prior probability of sharing a in common. If a mutual friend is observed between i and j, then the viewer i's ex-ante expec- tation on the likelihood of having a TIC (a) with profile j, i.e. Pr(Xia = Xja), will be higher, thus the belief update (or information gain: 1 − Pr(Xia = Xja)) from seeing TIC will be smaller. In other words, 1− Pr(Xia = Xjamutual friends = 0) > 1− Pr(Xia = Xjamutual friends = 1). Therefore, we expect the ef- fect of displaying TIC should be larger and more significant for pairs without mutual friends, and the findings confirm such belief update process. The substitution effect between preference factor and structural factor also suggests another strength of weak ties (Granovetter 1977) but during friendship formation stage: the marginal value of displaying TIC is larger for weak ties in the tie formation stage, as ex-ante the users have lower expectation on having shared attributes thus may gain more from TIC information. This insight is complementary to recent findings in the social influence literature (Aral and Walker 2014, Bakshy et al. 2012a)15 and paints a complete picture of the dynamics across tie formation stage and influence spread stage (Phan and Godes 2018, Aral and Walker 2012). In this way, our experiment findings shed light on the origin and evolution of homophily observed in social networks16. Third (Q3, Mechanism), we further examine the potential mechanism underlying the effect of showing things in common on a viewer's friending behavior. As discussed above, displaying TICs may update an individual's belief about the shared similarity with the profile (Goel et al. 2010), reduce the search cost and lead to a significant information gain. Aligned with belief update process, we expect showing a TIC would be more effective if the information is less expected by the viewer (Pr(Xia = Xja)) is small). Consider the case of mutual hometown, a viewer i from a smaller city would encounter fewer profiles who share the same hometown and thus ex-ante have a lower prior probability of sharing the same attribute with another user. In other words, the viewer's expectation on a TIC would be small when the TIC is rarely encountered by her/him. Displaying such TIC in turn would lead to a larger increase in friendship formation.17 14 Without loss of generalizability, we focus on the effect of one type of TIC ('a') in the discussion. 15 Social influence spread on existing ties is strongest when the tie shares mutual friends and multiple TICs. 16 Though preference over similar others is a underlying driver of homophily among weak ties, the preference, by itself, does not reinforce tie formation among people who already share mutual friends thus cannot lead to a significant level of structural homophily. Preference may connect people with different background, but the rest of network evolution might be driven by structural factor such as meeting opportunities and triadic closure 17 Another potential mechanism is attention disruption: showing TIC on a profile card would disrupt the monotonicity of seeing many profile cards in a row. Such additional attention may lead to an increase likelihood of friendship formation. The attention disruption 14 Tianshu Sun, Sean J. Taylor We follow the information-theoretic framework (Shannon 1948) and operationalize the above hypothesis using our data by computing the 'Surprisal' of encountering TIC (or 'Information gain', −log2(Pr(Xia = Xja)), with bits as units for all viewers and attributes in the experiment. One bit is the information gain from the display of a TIC when viewers' prior of observing the TIC is 50%. Viewers with rare profile attribute, such as uncommon hometown or small current city, encounter profiles who share that TIC information only rarely thus have a lower prior. As a result, the surprisal when the information revealed from displaying the TIC is large. We compute the relative risk of friend requests as a function of whether the TIC was displayed and the surprisal of that TIC in Figures 8. As shown by the x-scales, sharing a hometown (or current city) with other profiles tends to contain about 2 to 16 bits of information. For viewer-profile pairs without mutual friends, we observe a positive correlation between the surprisal of the TIC and the effect of displaying that information18. For pairs with mutual friends there is no significant effect, indicating that the existence of mutual friends attenuated the effect of TIC information and make it redundant. In addition, the belief update mechanism and our operationalization based on the information-theory may also guide social network sites to decide on whether and when to display multiple TICs. Show- ing multiple TICs, as compared to showing one TIC would be valuable only when the additional TIC shown can still bring incremental contribution on the information gain (i.e. 'surprisal', −log2(Pr(Xia = Xjaother TICs displayed))). We find the evidence from the experiment aligned with the argument. As demon- strated in Figure A.10, the effect of displaying TIC is stronger when the surprisal brought by displaying both TIC (mutual hometown and current city) is larger than displaying only 1 TIC. SN sites can leverage the principle and our information-theoretic framework ('surprisal') when designing a menu of TIC information for display19. explanation suggests that the effect of TIC is stronger in the early stage of browsing, especially during the transition between control and treatment. However, we perform an exploratory analysis on whether the effect of displaying TIC would vary across profiles with different positions in the browsing sequence but did not find any significant pattern. The evidence might indicate that attention disruption is not playing a major role underlying the process. We thank one reviewer for the suggestion. 18 The positive correlation is tapering off at the right end (in the area where surprisal>9 shannons). Since the number of observations is much smaller in this area (as revealed from the wider confidence interval), it does not strongly affect the overall trend. The coefficient of surprisal is positive if we fit a linear relationship on the data. 19 Interestingly, at an aggregate 'type' level, the information across different types of TICs are likely to be substitutes for one an- other. We can identify such relationship by examining the effect of TIC display when the viewer-profile pairs share two TIC (Fig- ures A.12 and A.13). As shown from the 9 panels in Figures A.13, in most scenarios, the effect of displaying two types of things in common is not additive, demonstrating no clear positive complementarity between them is identified. Thus, SN sites could use the information-theoretic framework to guide the optimal display of TIC. Displaying Things in Common to Encourage Friendship Formation 15 Fig. 8: Effect of Displaying Hometown, of Different Surprisal. We measured the 'Surprisal' of the hometown by taking the negative (base 2) log probability of a viewer seeing a profile with that mutual hometown. Higher bits indicates we would estimate the mutual hometown would be more suprising to the viewer. To generate smooth curves, we fit LOESS regressions separately for the display and no-display conditions for each of bootstrap replicate. The dashed lines are the 95% confidence intervals for the smoothed estimates of the ratio, computed from a standard errors estimated using a bootstrap clustered on the viewer with 500 bootstrap replicates. Note: for display purpose, the y-axis scale for the upper panel and lower panel is different - the effects for pairs with no mutual friends are much larger 5. Conclusion and Future Research Friendship formation is crucial for society in general: it may facilitate information transfer (Gee et al. 2017), improve trust (Bapna et al. 2017), and broaden diversity (Eagle et al. 2010), yet little is known about how policy makers and SN sites may actively encourage friendship formation, especially for those with relatively little in common. Using a carefully-designed large-scale randomized experiment, our study is among the first to demonstrate the causal effect of displaying things in common on friendship formed. Providing infor- mation on shared traits, enabled by big data technology, may significantly reduce the information friction in friendship formation. Such intervention encourages network formation among weak ties and may signif- icant boost friendship diversity. Our experiment provides managerial implications and offer guidelines for SN sites to design effective information intervention in a personalized way. The findings also advance our theoretical understanding and contribute to the Marketing, Information Systems and Social Network literature. First, our study provides the first experimental evidence on the role of preference over different TIC in driving network formation. Moreover, interestingly, we identify and explain a substitution effect between preference factor and structural factor in social network evolution. Mutual FriendsNo Mutual Friends48120.9751.0001.0251.0501.0751.01.11.21.31.4Surprisal of Profile Hometown (shannons)Relative Risk of Friend RequestEffect of Displaying Hometown 16 Tianshu Sun, Sean J. Taylor Finally, our finding is aligned with a rational belief update process: the effect size of showing a certain TIC is in proportion to the 'surprise' it creates for the viewer. SN can leverage our information-theoretic framework when designing an optimal information set for display. Our study proposes a new experiment design to engineer interpersonal relationship at large-scale and reveals the potential of providing TIC 'information' in facilitating social interactions. We envision future research may extend our study in a few ways. First, our study is conducted in the context of SN sites. Future research may examine the effectiveness of displaying TIC information within organizations (through enterprise social network like Slack, Jive and Yammer, Huang et al. (2015)), and also in other forms of social interactions, such as hiring, team matching and dating (Bapna et al. 2016, Gee et al. 2017, Granovetter 1977, Fisman et al. 2006). Second, new types of TIC are emerging on SN sites and researchers could evaluate the effectiveness of those TICs (e.g. location or event check-in). It would be interesting to understand how real-time environment (e.g. at the same event) would encourage friendship formation and interactions. Third, our experiment focuses on the 'information' aspect, rather than the relative 'importance' in the individuals' preference over different TIC (e.g. hometwon, interest). We believe 'information' can reduce friction in social interactions and help individuals better understand each other, while 'importance' might be formed based on an individual's experience and largely fixed. Future research may leverage exogenous shocks and panel data to understand whether such preference would evolve over time (Phan and Airoldi 2015, B´enabou and Tirole 2016, Bursztyn et al. 2017). Fourth, we focus on the effect of TIC display on the friendship formation outcome at a viewer-profile level. More research could be done to understand the user behaviors at the viewer level or even network level. For instance, future experiments with randomization at viewer level could help understand whether there exists a 'saturation' stage in the users' need for friendship, i.e. whether users have a quota of friend request or friendship formation that they have in mind. In that case, different friendship may be substitutes to each other in the network formation process. In addition, future research may also leverage simulation methods to understand how network structure and homophily evolves over a longer period of time. Finally, our study is among the first to demonstrate the possibility of directly engineering certain pref- erence factors in the process of social network formation. Researchers in Marketing, Information Systems, Economics and Organization Behavior can use our experiment design as a testbed to examine various pref- erence and structural factors underlying interpersonal interactions in network formation. For instance, high- lighting certain type of differences (rather than similarities) between two users often would be effective as well, as users may be curious about people who are different from themselves (e.g. sharing a different in- terest). It is valuable to understand and test what types of differences may be complementary and could be displayed to encourage friendship formation. Our study provides an ideal experiment framework for future inquiry into this broad research agenda on social network formation. References Altenburger, K. M. and Ugander, J. (2018). Monophily in social networks introduces similarity among friends-of-friends. Nature Human Behaviour, 2(4):284. Ameri, M., Honka, E., and Xie, Y. (2017). A structural model of network dynamics: Tie formation, product adoption, and content generation. Working Paper. Aral, S., Muchnik, L., and Sundararajan, A. (2009). Distinguishing influence-based contagion from homophily-driven diffusion in dynamic networks. Proceedings of the National Academy of Sciences, 106(51):21544 -- 21549. Aral, S. and Walker, D. (2011). Creating social contagion through viral product design: A randomized trial of peer influence in networks. Management science, 57(9):1623 -- 1639. Aral, S. and Walker, D. (2012). Identifying influential and susceptible members of social networks. Science, page 1215842. Displaying Things in Common to Encourage Friendship Formation 17 Aral, S. and Walker, D. (2014). Tie strength, embeddedness, and social influence: A large-scale networked experiment. Management Science, 60(6):1352 -- 1370. Bakshy, E. and Eckles, D. (2013). Uncertainty in online experiments with dependent data: an evaluation of bootstrap methods. In Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 1303 -- 1311. ACM. Bakshy, E., Eckles, D., Yan, R., and Rosenn, I. (2012a). Social influence in social advertising: evidence from field experiments. In Proceedings of the 13th ACM Conference on Electronic Commerce, pages 146 -- 161. ACM. Bakshy, E., Messing, S., and Adamic, L. A. (2015). Exposure to ideologically diverse news and opinion on facebook. Science, 348(6239):1130 -- 1132. Bakshy, E., Rosenn, I., Marlow, C., and Adamic, L. (2012b). The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web, pages 519 -- 528. ACM. Bala, V. and Goyal, S. (2000). A noncooperative model of network formation. Econometrica, 68(5):1181 -- 1229. Bapna, R., Liangfei, Q., and Rice, S. (2017). Repeated interactions versus social ties: Quantifying the economic value of trust, forgive- ness, and reputation using a field experiment. MIS Quarterly, 41(3). Bapna, R., Ramaprasad, J., Shmueli, G., and Umyarov, A. (2016). One-way mirrors in online dating: A randomized field experiment. Management Science, 62(11):3100 -- 3122. Bapna, R. and Umyarov, A. (2015). Do your online friends make you pay? a randomized field experiment on peer influence in online social networks. Management Science, 61(8):1902 -- 1920. B´enabou, R. and Tirole, J. (2016). Mindful economics: The production, consumption, and value of beliefs. Journal of Economic Perspectives, 30(3):141 -- 64. Berscheid, E. and Reis, H. T. (1998). Attraction and close relationships. The Handbook of Social Psychology. Brzozowski, M. J. and Romero, D. M. (2011). Who should i follow? recommending people in directed social networks. In ICWSM. Burke, M. and Kraut, R. E. (2016). The relationship between facebook use and well-being depends on communication type and tie strength. Journal of Computer-Mediated Communication, 21(4):265 -- 281. Bursztyn, L., Egorov, G., and Fiorin, S. (2017). From extreme to mainstream: How social norms unravel. Technical report, National Bureau of Economic Research. Carrell, S. E., Sacerdote, B. I., and West, J. E. (2013). From natural variation to optimal policy? the importance of endogenous peer group formation. Econometrica, 81(3):855 -- 882. Centola, D. (2015). The social origins of networks and diffusion. American Journal of Sociology, 120(5):1295 -- 1338. Church, K. W. and Hanks, P. (1990). Word association norms, mutual information, and lexicography. Computational linguistics, 16(1):22 -- 29. Currarini, S., Jackson, M. O., and Pin, P. (2009). An economic model of friendship: Homophily, minorities, and segregation. Econo- metrica, 77(4):1003 -- 1045. Currarini, S., Jackson, M. O., and Pin, P. (2010). Identifying the roles of race-based choice and chance in high school friendship network formation. Proceedings of the National Academy of Sciences, 107(11):4857 -- 4861. Dhar, V., Geva, T., Oestreicher-Singer, G., and Sundararajan, A. (2014). Prediction in economic networks. Research, 25(2):264 -- 284. Information Systems Eagle, N., Macy, M., and Claxton, R. (2010). Network diversity and economic development. Science, 328(5981):1029 -- 1031. Easley, D. and Kleinberg, J. (2010). Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press. Eckles, D., Kizilcec, R. F., and Bakshy, E. (2016). Estimating peer effects in networks with peer encouragement designs. Proceedings of the National Academy of Sciences, 113(27):7316 -- 7322. Ely, J., Frankel, A., and Kamenica, E. (2015). Suspense and surprise. Journal of Political Economy, 123(1):215 -- 260. Felmlee, D., Sprecher, S., and Bassin, E. (1990). The dissolution of intimate relationships: A hazard model. Social Psychology Quarterly, pages 13 -- 30. Fischer, M. J. (2008). Does campus diversity promote friendship diversity? a look at interracial friendships in college. Social Science Quarterly, 89(3):631 -- 655. Fisman, R., Iyengar, S. S., Kamenica, E., and Simonson, I. (2006). Gender differences in mate selection: Evidence from a speed dating experiment. The Quarterly Journal of Economics, 121(2):673 -- 697. Fisman, R., Iyengar, S. S., Kamenica, E., and Simonson, I. (2008). Racial preferences in dating. The Review of Economic Studies, 75(1):117 -- 132. 18 Tianshu Sun, Sean J. Taylor Fleder, D. and Hosanagar, K. (2009). Blockbuster culture's next rise or fall: The impact of recommender systems on sales diversity. Management science, 55(5):697 -- 712. Forman, C., Ghose, A., and Wiesenfeld, B. (2008). Examining the relationship between reviews and sales: The role of reviewer identity disclosure in electronic markets. Information Systems Research, 19(3):291 -- 313. Fradkin, A. (2017). Search, matching, and the role of digital marketplace design in enabling trade: Evidence from airbnb. Gee, L. K., Jones, J. J., Fariss, C. J., Burke, M., and Fowler, J. H. (2017). The paradox of weak ties in 55 countries. Journal of Economic Behavior & Organization, 133:362 -- 372. Goel, S. and Goldstein, D. G. (2013). Predicting individual behavior with social networks. Marketing Science, 33(1):82 -- 93. Goel, S., Mason, W., and Watts, D. J. (2010). Real and perceived attitude agreement in social networks. Journal of personality and social psychology, 99(4):611. Goes, P. B., Lin, M., and Au Yeung, C.-m. (2014). "popularity effect" in user-generated content: Evidence from online product reviews. Information Systems Research, 25(2):222 -- 238. Granovetter, M. S. (1977). The strength of weak ties. In Social networks, pages 347 -- 367. Elsevier. Hartmann, W. R. (2010). Demand estimation with social interactions and the implications for targeted marketing. Marketing science, 29(4):585 -- 601. Hartmann, W. R., Manchanda, P., Nair, H., Bothner, M., Dodds, P., Godes, D., Hosanagar, K., and Tucker, C. (2008). Modeling social interactions: Identification, empirical methods and policy implications. Marketing letters, 19(3-4):287 -- 304. Hosanagar, K., Fleder, D., Lee, D., and Buja, A. (2013). Will the global village fracture into tribes? recommender systems and their effects on consumer fragmentation. Management Science, 60(4):805 -- 823. Huang, Y., Singh, P. V., and Ghose, A. (2015). A structural model of employee behavioral dynamics in enterprise social media. Management Science, 61(12):2825 -- 2844. Ibarra, H. (1992). Homophily and differential returns: Sex differences in network structure and access in an advertising firm. Adminis- trative science quarterly, pages 422 -- 447. Iyengar, R., Van den Bulte, C., and Valente, T. W. (2011). Opinion leadership and social contagion in new product diffusion. Marketing Science, 30(2):195 -- 212. Jackson, M. O. (2008). Social and economic networks. Princeton university press. Katona, Z. and Sarvary, M. (2008). Network formation and the structure of the commercial world wide web. Marketing Science, 27(5):764 -- 778. Kossinets, G. and Watts, D. J. (2009). Origins of homophily in an evolving social network. American journal of sociology, 115(2):405 -- 450. Kwon, H. E., Oh, W., and Kim, T. (2017). Platform structures, homing preferences, and homophilous propensities in online social networks. Journal of Management Information Systems, 34(3):768 -- 802. Lerman, K., Jain, P., Ghosh, R., Kang, J.-H., and Kumaraguru, P. (2013). Limited attention and centrality in social networks. In Social Intelligence and Technology (SOCIETY), 2013 International Conference on, pages 80 -- 89. IEEE. Lewis, R. A. and Rao, J. M. (2015). The unfavorable economics of measuring the returns to advertising. The Quarterly Journal of Economics, 130(4):1941 -- 1973. Lin, M. and Viswanathan, S. (2015). Home bias in online investments: An empirical study of an online crowdfunding market. Man- agement Science, 62(5):1393 -- 1414. Linkedin (2016). People you may know. overview?lang=en. https://www.linkedin.com/help/linkedin/answer/29/people-you-may-know-feature- Marmaros, D. and Sacerdote, B. (2006). How do friendships form? The Quarterly Journal of Economics, 121(1):79 -- 119. Mayer, A. and Puller, S. L. (2008). The old boy (and girl) network: Social network formation on university campuses. Journal of public economics, 92(1-2):329 -- 347. Mayzlin, D. and Yoganarasimhan, H. (2012). Link to success: How blogs build an audience by promoting rivals. Management Science, 58(9):1651 -- 1668. McPherson, M., Smith-Lovin, L., and Cook, J. M. (2001). Birds of a feather: Homophily in social networks. Annual review of sociology, 27(1):415 -- 444. Mele, A. (2017). A structural model of dense network formation. Econometrica, 85(3):825 -- 850. Mollica, K. A., Gray, B., and Trevino, L. K. (2003). Racial homophily and its persistence in newcomers' social networks. Organization Science, 14(2):123 -- 136. Displaying Things in Common to Encourage Friendship Formation 19 Moricz, M., Dosbayev, Y., and Berlyant, M. (2010). Pymk: friend recommendation at myspace. In Proceedings of the 2010 ACM SIGMOD International Conference on Management of data, pages 999 -- 1002. ACM. Oestreicher-Singer, G., Libai, B., Sivan, L., Carmi, E., and Yassin, O. (2013). The network value of products. Journal of Marketing, 77(3):1 -- 14. Oestreicher-Singer, G. and Sundararajan, A. (2012). Recommendation networks and the long tail of electronic commerce. Mis quar- terly, pages 65 -- 83. Owen, A. B., Eckles, D., et al. (2012). Bootstrapping data arrays of arbitrary order. The Annals of Applied Statistics, 6(3):895 -- 927. Peng, J., Agarwal, A., Hosanagar, K., and Iyengar, R. (2018). Network overlap and content sharing on social media platforms. Journal of Marketing Research, 55(4):571 -- 585. Phan, T. Q. and Airoldi, E. M. (2015). A natural experiment of social network formation and dynamics. Proceedings of the National Academy of Sciences, 112(21):6595 -- 6600. Phan, T. Q. and Godes, D. (2018). The evolution of influence through endogenous link formation. Marketing Science, 37(2):259 -- 278. Price, R. (2012). Growth hacking: leading indicators of engaged users. http://www.richardprice.io/post/34652740246/growth-hacking- leading-indicators-of-engaged. Shalizi, C. R. and Thomas, A. C. (2011). Homophily and contagion are generically confounded in observational social network studies. Sociological methods & research, 40(2):211 -- 239. Shannon, C. (1948). A mathematical theory of communication, bell system technical journal, vol. 27, 379-423 & 623-656, july & october. Shi, Z., Rui, H., and Whinston, A. B. (2014). Content sharing in a social broadcasting environment: evidence from twitter. MIS Quarterly, 38(1):123 -- 142. Shriver, S. K., Nair, H. S., and Hofstetter, R. (2013). Social ties and user-generated content: Evidence from an online social network. Management Science, 59(6):1425 -- 1443. Su, J., Sharma, A., and Goel, S. (2016). The effect of recommendations on network structure. In Proceedings of the 25th international conference on World Wide Web, pages 1157 -- 1167. International World Wide Web Conferences Steering Committee. Sundararajan, A. (2007). Local network effects and complex network structure. The BE Journal of Theoretical Economics, 7(1). Susarla, A., Oh, J.-H., and Tan, Y. (2012). Social networks and the diffusion of user-generated content: Evidence from youtube. Information Systems Research, 23(1):23 -- 41. Thelwall, M. (2009). Homophily in myspace. Journal of the Association for Information Science and Technology, 60(2):219 -- 231. Toubia, O. and Stephen, A. T. (2013). Intrinsic vs. image-related utility in social media: Why do people contribute content to twitter? Marketing Science, 32(3):368 -- 392. Tucker, C. (2008). Identifying formal and informal influence in technology adoption with network externalities. Management Science, 54(12):2024 -- 2038. Ugander, J., Backstrom, L., Marlow, C., and Kleinberg, J. (2012). Structural diversity in social contagion. Proceedings of the National Academy of Sciences, page 201116502. Wang, C., Zhang, X., and Hann, I.-H. (2018). Socially nudged: A quasi-experimental study of friends' social influence in online product ratings. Information Systems Research. Yadav, M. S. and Pavlou, P. A. (2014). Marketing in computer-mediated environments: Research synthesis and new directions. Journal of Marketing, 78(1):20 -- 40. Yoganarasimhan, H. (2012). Impact of social network structure on content propagation: A study using youtube data. Quantitative Marketing and Economics, 10(1):111 -- 150. Zuckerberg, M. (2017). Bringing the world closer together. https://www.facebook.com/notes/mark-zuckerberg/bringing-the-world- closer-together/10154944663901634/. 20 Appendices A Tables and Figures Tianshu Sun, Sean J. Taylor Mutual Friends TICs Displayed TICs Exposures Requests Accepts 1 2 3 1 2 3 no no no no yes yes yes yes Total 0 1 0 1 2 0 1 2 3 0 1 0 1 2 0 1 2 3 6.8e+06 6.8e+06 2.2e+06 4.5e+06 2.2e+06 6.8e+04 2.1e+05 2.1e+05 6.9e+04 2.3e+07 1.1e+07 1.1e+07 8.7e+05 1.7e+06 8.7e+05 1.6e+05 4.8e+05 4.8e+05 1.6e+05 2.7e+07 5.0e+07 3.4e+04 3.6e+04 1.0e+04 2.1e+04 1.1e+04 8.4e+02 2.7e+03 2.9e+03 9.4e+02 1.2e+05 1.2e+05 1.3e+05 1.7e+04 3.4e+04 1.7e+04 2.6e+03 8.0e+03 8.1e+03 2.8e+03 3.4e+05 4.6e+05 5.8e+03 6.2e+03 1.4e+03 2.9e+03 1.6e+03 1.1e+02 3.4e+02 3.4e+02 9.8e+01 1.9e+04 5.2e+04 5.2e+04 6.9e+03 1.4e+04 7.0e+03 7.3e+02 2.3e+03 2.3e+03 8.1e+02 1.4e+05 1.6e+05 Pr(Request) x 100 0.49 0.52 0.45 0.47 0.48 1.24 1.33 1.43 1.37 0.51 1.14 1.15 1.91 1.96 1.97 1.65 1.68 1.70 1.79 1.28 0.92 Pr(Accept) x 100 17.27 17.49 14.22 13.83 14.75 12.54 12.63 11.66 10.44 15.90 41.86 41.68 41.60 41.27 40.74 28.05 28.58 28.98 28.51 40.82 34.35 Table A.1: Summary Statistics Overall the experiment includes about 50 million viewer-profile pairs. A large fraction of the sample comes from viewer-profile pairs with one TIC ( 73%) and two TIC ( 25%). Among all pairs, about 23 million share no mutual friends (upper panel) and 27 million pairs share mutual friends (lower panel). The friend request rate is correlated with the number of TICs, while the accept rate is negatively correlated with it. Displaying Things in Common to Encourage Friendship Formation 21 TICs Displayed TICs 1 2 3 1 1 2 1 2 3 Friend Requests Friend Formations RR 1.021 1.032 1.052 1.034 1.061 1.089 Effect 1.89 2.70 4.41 5.21 9.31 13.50 s.e. (0.34) (0.65) (0.79) (2.88) (2.85) (3.70) p-value 0.00 0.00 0.00 0.03 0.00 0.00 RR 1.013 1.018 1.034 1.050 1.071 1.081 Effect 0.43 0.48 0.91 1.83 2.62 2.98 s.e. (0.20) (0.36) (0.45) (1.36) (1.32) (1.84) p-value 0.01 0.10 0.03 0.09 0.03 0.04 Table A.2: Effect of Displaying TICs on Friend Requests and Formation RR stands for relative risk and is calculated using the relative ratio in means compared to the baseline group (i.e. viewer-profile pairs with the same number of actual TICs but zero TICs at display). RR corresponds to the y-scale in Figure 6. Effect is measured using the absolute difference in means compared to showing zero TICs (baseline) and denominated here in basis points for readability. Standard errors are estimated using a clustered bootstrap on viewer with 500 bootstrap replicates. Mutual Friends TICs Displayed TICs no no no yes yes yes 1 2 3 1 2 3 1 1 2 1 2 3 1 1 2 1 2 3 Friend Requests Friend Formations RR 1.056 1.036 1.073 1.075 1.145 1.099 1.011 1.028 1.036 1.022 1.035 1.086 s.e. (0.38) (0.56) (0.71) (5.37) (5.4) (5.95) (0.49) (1.87) (2.05) (3.61) (3.67) (4.66) p-value 0.00 0.00 0.00 0.04 0.00 0.02 0.00 0.00 0.00 0.17 0.06 0.00 RR 1.073 1.002 1.103 1.119 1.126 0.961 1.006 1.020 1.016 1.041 1.066 1.100 s.e. (0.16) (0.21) (0.26) (1.66) (1.68) (2.10) (0.30) (1.18) (1.42) (1.84) (1.76) (2.42) p-value 0.00 0.49 0.00 0.16 0.15 0.64 0.16 0.08 0.19 0.16 0.04 0.02 Table A.3: Effect of Displaying TICs on Friend Requests and Formation (Decomposed by Whether View- Profile Pairs Share Mutual Friends) RR stands for relative ratio and is calculated using the relative lift in means compared to the baseline group (i.e. viewer-profile pairs with the same number of actual TICs but zero TICs at display). Standard errors are estimated using a clustered bootstrap on viewer with 500 bootstrap replicates. 22 Tianshu Sun, Sean J. Taylor Fig. A.1: Distribution. We group all pairs by the number of actual things in common shared between the viewer-profile and draw its distribution. Most viewer-profile pairs have one thing in common. Fig. A.2: Distribution. We group all pairs by the number of actual things in common shared between the pairs and draw separate distribution for pairs with and without mutual friend. 0.00.20.40.612345Number of Things in CommonFraction of SampleMutual FriendsNo Mutual Friends12345123450.00.20.40.60.8Number of Things in CommonFraction of Sample Displaying Things in Common to Encourage Friendship Formation 23 Fig. A.3: Distribution of profiles per viewer (left) and Distribution of viewers per profile (right). Fig. A.4: Effects of displaying things in common. Same as Figure 6 with an additional panel for pairs with 3 TIC Total = 1853349Mean = 26.8805000001000000150000020000000100200Number of Profiles ViewedCumulative Number of ViewersTotal = 39023089Mean = 1.280e+001e+072e+073e+074e+075101520Number of Users Viewing ProfileCumulative Number of Profileslllllllll1 Thing in Common2 Things in Common3 Things in Common0101201231.001.051.101.15Number of Things in Common ShownRelative Risk of OutcomelRequestFormation 24 Tianshu Sun, Sean J. Taylor Fig. A.5: Effects of displaying things in common, for pairs with and without mutual friends. Same as Figure 7 with an additional panel for pairs with 3 TIC Fig. A.6: Acceptance Rate Conditional on Request llllllllllllllllll1 Thing in Common2 Things in Common3 Things in CommonMutual FriendsNo Mutual Friends0101201231.001.051.101.151.200.81.01.21.4Number of Things in Common ShownRelative Risk of OutcomelRequestFormation Displaying Things in Common to Encourage Friendship Formation 25 Fig. A.7: Effect of Displaying Thing in common on Friend Request, for male viewers and female viewers. Fig. A.8: Effect of Displaying Thing in common on Friend Request, for gender combinations of viewers and profiles. 26 Tianshu Sun, Sean J. Taylor Fig. A.9: Effect of Displaying Thing in common on Friend Request, for viewers with different number of friends. Displaying Things in Common to Encourage Friendship Formation 27 Fig. A.10: Incremental Effect of displaying both things in Common, as compared to displaying one. Follow- ing information theory, we measured the incremental information ('surprisal') of displaying two TIC (mutual hometown and current city), as compared displaying one, using normalized pointwise mutual information (PMI). We calculate normalized PMI using its formal definition (Church and Hanks 1990): the surprisal (−log2(Pr(Xia = Xja))) of displaying mutual hometown plus the surprisal of displaying current city minus the joint surprisal of displaying both mutual current city and hometown, normalized by joint surprisal. The PMI measure, ranging from +1 to -1, captures the co-occurrence likelihood and is symmetric with respect to the two TICs. An PMI with +1 indicates 100% likelihood of co-occurrence, thus displaying both mutual hometown and current city would reveal little additional information or 'surprisal'. In contrast, a low PMI in- dicates a small likelihood of co-occurrence thus displaying both TIC would would be more surprising to the viewer given that they already know one of the TIC). The empirical finding is aligned with such mechanism and further confirms the belief update process underlying the effectiveness of displaying TIC. To generate smooth curves, we fit LOESS regressions separately for the display 2 TIC and display 1 TIC conditions for each of 500 bootstrap replicates clustered on viewer. The dashed lines are the 95% bootstrap confidence intervals for the smoothed estimates of the ratio. 28 Tianshu Sun, Sean J. Taylor Fig. A.11: Comparison of Post-friendship Interaction score between friendship ties in control versus treat- ment group. We categorize all the friendship ties formed in our experiment into two groups based on whether certain TIC is shown during friendship formation process, and then calculate the difference between the groups in the volume of their post-friendship interactions (like, comment, messaging). We do not find any significant difference in the post-friendship interactions between the control and treatment group. Fig. A.12: Distribution of things in common when the viewer-profile pair share two things in common. Among the large number of combinations between the five types of TIC (mutual city, like, hometown, education, work), we only show distributions for the nine most commonly seen combinations. The remaining combinations consist of a very small portion of our sample. 0.00.10.2city or educationcity or hometowncity or likescity or workeducation or hometowneducation or likeshometown or likeshometown or worklikes or workThing in Common (Two Available)Fraction of Observations Displaying Things in Common to Encourage Friendship Formation 29 Fig. A.13: Effects of showing zero, one, or both things in common when the viewer-profile pair share two things in common. Among the large number of combinations between the five types of TIC (mutual city, like, hometown, education, work), we only show the effect of TIC display for the nine most commonly seen combinations. The remaining combinations consist of a very small portion of our sample. llllllllllllllllllllllllllllllllllllhometown or likeshometown or worklikes or workcity or workeducation or hometowneducation or likescity or educationcity or hometowncity or likesnonehometownlikesbothnonehometownworkbothnonelikesworkbothnonecityworkbothnoneeducationhometownbothnoneeducationlikesbothnonecityeducationbothnonecityhometownbothnonecitylikesboth0.91.01.11.21.30.91.01.11.21.30.91.01.11.21.3Thing in Common Shown (Two Available)Relative Risk of Friend Request 30 Tianshu Sun, Sean J. Taylor B Effect of Displaying Different Types of Things in Common The availability of multiple types of things in common in our experiment also enables us, for the first time, to investigate the relative importance of a range of TIC documented in the literature (McPherson et al. 2001) in the same context. Previous studies on homophily have separately documented different things in common in social networks (Ibarra 1992, Currarini et al. 2010), but never compared the causal effect of them within the same context. We find a variation in the effect of showing different types of things in common (Figure B.1). We fo- cus on presenting the results for viewer-profile pairs with only one thing in common, as they represent the majority of the sample (Figure 6). There are three categories of things in common: past experience (mu- tual hometown, mutual education, mutual work), current context (mutual city), common interests (overlap of page like). As shown in Figure B.1, certain type of things in common, such as mutual likes, city and hometown, may lead to a larger increase in friendship formation than other types of things in common (mutual education). Previous studies on homophily has separately documented different type of things in common across different situations (Ibarra 1992, Currarini et al. 2010, Thelwall 2009), but never compared the relative importance of them within the same context. Similar to previous studies on social influence (Aral and Walker 2014), we find that social factors such as current context (e.g. mutual city) and past experience (mutual hometown) are associated with a large impact on friendship formation. However, we also find that showing overlap of interest may also be effective: a finding that has not been established before. In this way, we contribute to the literature on the role of different type of things in common (or similarity) in facilitating interpersonal interaction (Berscheid and Reis 1998). Displaying Things in Common to Encourage Friendship Formation 31 Fig. B.1: Distribution and effects of showing specific type of things in common when the viewer-profile pair share one thing in common. Using zero things in common as a baseline, showing shared likes and hometown significantly increases the relative risk of friendship formation, while we cannot reject the null hypothesis that showing a shared city or education causes any change. 95% confidence intervals are computed from standard errors estimated using a bootstrap clustered on viewer with 500 bootstrap replicates. Fig. B.2: Effect of Specific Type of Thing in common, for pairs with and without mutual friends. We group all pairs with one thing in common by the specific things in common as well as the existence of mutual friends. Using pairs with zero things in common shown as a baseline within each group, we find showing certain thing in common increases the relative risk of friendship formation, but only for people with no mutual friends and for shared likes, hometown and city. 0.00.10.20.30.4likeshometowncityeducationworkThing in Common (One Available)Fraction of Observationslllll0.9500.9751.0001.0251.050likeshometowncityeducationworkThing in Common ShownRelative Risk of Friendship Formation 32 Tianshu Sun, Sean J. Taylor C Methodological: Correlation from Observational Data is Opposite to the Causal Effect of TIC Finally, we want to demonstrate the importance and necessity of using a randomized experiment approach to identify causal effect of showing TIC. We explicitly compare the estimates from our experiment with those from a direct correlation analysis using observational data to highlight the advantage of our method. In Figure C.1, we can see that interestingly the correlation between number of things in common and friendship formation is in the opposite direction from the identified causal effect of showing things in common: for viewer-profile pairs with mutual friends, the observed correlation suggests a very positive and significant effect of showing more things in common, i.e. pairs with more TIC is more likely to form friendship, whereas the true causal effect of TIC based on experiment results is zero; for viewer-profile pairs with no mutual friends, the observed correlation suggests a zero or even slightly negative relationship between more TIC and friendship formation, whereas the true causal effect of showing TIC is large and significant. This contrast further highlights the importance of using a randomized experiment for causal inference. As shown above, using the observed correlation in the secondary data may significantly bias the effect of displayed things in common. We can cleanly identify the causal effect from correlation only by using a proper randomization. Fig. C.1: Correlation vs Causal Effect of TIC on friendship formation. Correlation between number of things in common in a pair and the friendship formation rate (Left) is biased and opposite to the true causal effect of showing things in commons (middle and right). Displaying Things in Common to Encourage Friendship Formation 33 D Theoretical Contribution: Identifying the Role of Individual Preference in Things in Common (versus Structural Factor) in Network Formation Besides practical importance, our findings from a carefully designed large-scale randomized experiment may contribute to social network literature and improve our theoretical understanding of the origin of network formation and homophily, in a few ways. First, while strategic network formation have been studied in detail using analytical models (Bala and Goyal 2000, Jackson 2008) and simulations (Phan and Godes 2018), empirical work designed to test theories and examine the drivers of network formation is still in their infancy. Most of the empirical works on network formation (Currarini et al. 2010, Mele 2017) impose strong functional assumptions and use network structure for identification20. To the best of our knowledge, our study is the first randomized field experiment to directly engineer the drivers of network formation (i.e. viewer's information about the alter as in our case). Our experiment design and framework provides a new way to examine various factors underlying network formation and the relative importance between them, in real networks and at a very large scale. Second, as documented by a broad history of literature on homophily in social network (McPherson et al. 2001), an individual is more likely to form a friendship tie with someone that is similar to her/him in demo- graphic and behavioral attributes (Centola 2015, Ameri et al. 2017, Goel and Goldstein 2013). However, the origin of homophily is far from clear (Kossinets and Watts 2009, Currarini et al. 2010). Recent literature hy- pothesizes that the homophily pattern in social network might be partially driven by individuals' preference over similar others (termed as preference or choice homophily Currarini et al. (2009)), as opposed to the structural factors. However, as far as we know, no study has provided clear empirical evidence on whether and when preference for TIC would drive network formation. As the literature repeatedly acknowledge (Cur- rarini et al. 2010, Phan and Airoldi 2015), such lack of insights is because preference factor and structural factor in network formation process are inherently confounded in observational data and extremely hard to disentangle: pairs with similar attributes are always more likely to have mutual friends. We address the chal- lenge by designing a experiment to exogenously vary the prominence of things in common displayed during friendship formation in a real social network. The randomization is independent of structural factor there- fore allows us, for the first time, to demonstrate the importance of preference in driving friendship formation. Third, we examine the relationship between preference and structural factor in network formation and find that preference over TIC matters in the absence of structural factor (mutual friend) thus can be leveraged to encourage formation of weak ties. Finally and importantly, the variation in the treatment effect within each type of TIC (e.g. sharing mutual hometowns of different size) sheds light on the underlying mechanisms: aligned with belief update process (Ely et al. 2015), displaying TIC is more effective when the information shown is less expected, and the effect size of a certain TIC is in proportion to the 'surprise' it creates to the viewer (measured by bits in information theory). Our study is among the first to understand network formation and homophily from a belief update perspective. SN sites can use our information-theoretic principles to optimally select specific things in common to highlight in online friendship formation process. The information-theoretic framework may also be extended to guide the personalized design of user profile for each viewer-profile interaction. 20 One exception is Phan and Airoldi (2015), in which the authors carefully design a long-term natural experiment of friendship formation and social dynamics in the aftermath of a natural disaster.
1212.0146
1
1212
2012-12-01T18:41:34
Efficient Community Detection in Large Networks using Content and Links
[ "cs.SI", "physics.soc-ph" ]
In this paper we discuss a very simple approach of combining content and link information in graph structures for the purpose of community discovery, a fundamental task in network analysis. Our approach hinges on the basic intuition that many networks contain noise in the link structure and that content information can help strengthen the community signal. This enables ones to eliminate the impact of noise (false positives and false negatives), which is particularly prevalent in online social networks and Web-scale information networks. Specifically we introduce a measure of signal strength between two nodes in the network by fusing their link strength with content similarity. Link strength is estimated based on whether the link is likely (with high probability) to reside within a community. Content similarity is estimated through cosine similarity or Jaccard coefficient. We discuss a simple mechanism for fusing content and link similarity. We then present a biased edge sampling procedure which retains edges that are locally relevant for each graph node. The resulting backbone graph can be clustered using standard community discovery algorithms such as Metis and Markov clustering. Through extensive experiments on multiple real-world datasets (Flickr, Wikipedia and CiteSeer) with varying sizes and characteristics, we demonstrate the effectiveness and efficiency of our methods over state-of-the-art learning and mining approaches several of which also attempt to combine link and content analysis for the purposes of community discovery. Specifically we always find a qualitative benefit when combining content with link analysis. Additionally our biased graph sampling approach realizes a quantitative benefit in that it is typically several orders of magnitude faster than competing approaches.
cs.SI
cs
Efficient Community Detection in Large Networks using Content and Links Yiye Ruan, David Fuhry, Srinivasan Parthasarathy Department of Computer Science and Engineering The Ohio State University {ruan,fuhry,srini}@cse.ohio-state.edu February 5, 2014 Abstract In this paper we discuss a very simple approach of combining content and link information in graph structures for the purpose of community discovery, a fundamental task in network analysis. Our approach hinges on the basic intuition that many networks contain noise in the link structure and that content information can help strengthen the community signal. This enables ones to eliminate the impact of noise (false positives and false negatives), which is particularly prevalent in online social networks and Web-scale information networks. Speci fically we introduce a measure of signal strength betwe en two nodes in the network by fusing their link strength with content similarity. Link strength is estimated based on whether the link is likely (with high probability) to reside within a community. Content similarity is estimated through cosine similarity or Jaccard coefficient. We discuss a simple mechanism for fusin g content and link similarity. We then present a biased edge sampling procedure which retains edges that are locally relevant for each graph node. The resulting backbone graph can be clustered using standard community discovery algorithms such as Metis and Markov clustering. Through extensive experiments on multiple real-world datasets (Flickr, Wikipedia and CiteSeer) with varying sizes and characteristics, we demonstrate the effective- ness and efficiency of our methods over state-of-the-art lea rning and mining ap- proaches several of which also attempt to combine link and content analysis for the purposes of community discovery. Speci fically we always find a qualitative benefit when combining content with link analysis. Addition ally our biased graph sampling approach realizes a quantitative benefit in that it is typically several or- ders of magnitude faster than competing approaches. 1 Introduction An increasing number of applications on the World Wide Web rely on combining link and content analysis (in different ways) for subsequent analysis and inference. For example, search engines, like Google, Bing and Yahoo! typically use content and link 1 information to index, retrieve and rank web pages. Social networking sites like Twitter, Flickr and Facebook, as well as the aforementioned search engines, are increasingly relying on fusing content (pictures, tags, text) and link information (friends, followers, and users) for deriving actionable knowledge (e.g. marketing and advertising). In this article we limit our discussion to a fundamental inference problem — that of combining link and content information for the purposes of inferring clusters or communities of interest. The challenges are manifold. The topological characteristics of such problems (graphs induced from the natural link structure) makes identifying community structure difficult. Further complicating the is sue is the presence of noise (incorrect links (false positives) and missing links (false negatives). Determining how to fuse this link structure with content information efficie ntly and effectively is unclear. Finally, underpinning these challenges, is the issue of scalability as many of these graphs are extremely large running into millions of nodes and billions of edges, if not larger. Given the fundamental nature of this problem, a number of solutions have emerged in the literature. Broadly these can be classified as: i) thos e that ignore content infor- mation (a large majority) and focus on addressing the topological and scalability chal- lenges, and ii) those that account for both content and topological information. From a qualitative standpoint the latter presumes to improve on the former (since the null hypothesis is that content should help improve the quality of the inferred communities) but often at a prohibitive cost to scalability. In this article we present CODICIL1 , a family of highly efficient graph simplifica- tion algorithms leveraging both content and graph topology to identify and retain im- portant edges in a network. Our approach relies on fusing content and topological (link) information in a natural manner. The output of CODICIL is a transformed variant of the original graph (with content information), which can then be clustered by any fast content-insensitive graph clustering algorithm such as METIS or Markov clustering. Through extensive experiments on real-world datasets drawn from Flickr, Wikipedia, and CiteSeer, and across several graph clustering algorithms, we demonstrate the ef- fectiveness and efficiency of our methods. We find that CODICI L runs several orders of magnitude faster than those state-of-the-art approaches and often identifies commu- nities of comparable or superior quality on these datasets. This paper is arranged as follows. In Section 2 we discuss existent research efforts pertaining to our work. The algorithm of CODICIL, along with implementation details, is presented in Section 3. We report quantitative experiment results in Section 4, and demonstrate the qualitative bene fits brought by CODICIL via case studies in Section 5. We finally conclude the paper in Section 6. 2 Related Work Community Discovery using Topology (and Content): Graph clustering/partitioning for community discovery has been studied for more than five de cades, and a vast number of algorithms (exemplars include Metis [15], Graclus [6] and Markov clus- tering [27]) have been proposed and widely used in fields incl uding social network 1COmmunity Discovery Inferred from Content Information and Link-structure 2 analytics, document clustering, bioinformatics and others. Most of those methods, however, discard content information associated with graph elements. Due to space limitations, we suppress detailed discussions and refer interested readers to recent sur- veys (e.g. [9]) for a more comprehensive picture. Leskovec et al. compared a multitude of community discovery algorithms based on conductance score, and discovered the trade-off between clustering objective and community compactness [16]. Various approaches have been taken to utilize content information for community discovery. One of them is generative probabilistic modeling which considers both contents and links as being dependent on one or more latent variables, and then esti- mates the conditional distributions to find community assig nments. PLSA-PHITS [5], Community-User-Topic model [29] and Link-PLSA-LDA [20] are three representa- tives in this category. They mainly focus on studies of citation and email communica- tion networks. Link-PLSA-LDA, for instance, was motivated for finding latent topics in text and citations and assumes different generative processes on citing documents, cited documents as well as citations themselves. Text generation is following the LDA approach, and link creation from a citing document to a cited document is controlled by another topic-specific multinomial distribution. Yang et al. [28] introduced an alternative discriminative probabilistic model, PCL- DC, to incorporate content information in the conditional link model and estimate the community membership directly. In this model, link probability between two nodes is decided by nodes’ popularity as well as community membership, which is in turn decided by content terms. A two-stage EM algorithm is proposed to optimize com- munity membership probabilities and content weights alternately. Upon convergence, each graph node is assigned to the community with maximum membership probability. Researchers have also explored ways to augment the underlying network to take into account the content information. The SA-Cluster-Inc algorithm proposed by Zhou et al. [30], for example, inserts virtual attribute nodes and attribute edges into the graph and computes all-pair random walk distances on the new attribute-augmented graph. K-means clustering is then used on original graph nodes to assign them to different groups. Weights associated with attributes are updated after each k-means iteration according to their clustering tendencies. The algorithm iterates until convergence. Ester et al. [8] proposed an heuristic algorithm to solve the Connected k -Center problem where both connectedness and radius constraints need to be satisfied. The complexity of this method is dependent on the longest distance between any pair of nodes in the feature space, making it susceptible to outliers. Biologists have studied methods [13, 26] to find functional modules using network top ology and gene expres- sion data. Those methods, however, bear domain-specific ass umptions on data and are therefore not directly applicable in general. Recently G unnemann et al. [12] introduced a subspace clustering algorithm on graphs with feature vectors, which shares some similarity with our topic. Although their method could run on the full feature space, the search space of their algorithm is con fined by the intersection, instead of union, of the epsi lon-neighborhood and the density-based combined cluster. Furthermore, the construction of both neighborhoods are sensitive to their multiple parameters. While decent performance can be achieved on small and medium graphs using those methods, it often comes at the cost of model complexity and lack of scalability. 3 Some of them take time proportional to the number of values in each attribute. Oth- ers take time and space proportional to the number of clusters to find, which is often unacceptable. Our method, in contrast, is more lightweight and scalable. Clustering/Learning Multiple Graphs: Content-aware clustering is also related to multiple-view clustering, as content information and link structure can be treated as two views of the data. Strehl and Ghose [23] discussed three consensus functions (cluster-wise similarity partitioning, hyper-graph partitioning and meta-clustering) to implement cluster ensembles, in which the availability of each individual view’s clus- tering is assumed. Tang et al. [24] proposed a linked matrix factorization method, where each graph’s adjacency matrix is decomposed into a “ch aracteristic ” matrix and a common factor matrix shared among all graphs. The purpose of factorization is to represent each vertex by a lower-dimensional vector and then cluster the vertices using corresponding feature vectors. Their method, while applicable to small-scale problems, is not designed for web-scale networks. Graph Sampling for Fast Clustering: Graph sampling (also known as “sparsifica- tion ” or “ filtering ”) has attracted more and more focus in rec ent years due to the ex- plosive growth of network data. If a graph’s structure can be preserved using fewer nodes and/or edges, community discovery algorithms can obtain similar results using less time and memory storage. Maiya and Berger-Wolf [17] introduced an algorithm which greedily identifies the node that leads to the greatest expansion in each iteration until the user-specified node count is reached. By doing so, a n expander-like node- induced subgraph is constructed. After clustering the subgraph, the unsampled nodes can be labeled by using collective inference or other transductive learning methods. This extra post-processing step, however, operates on the original graph as a whole and easily becomes the scalability bottleneck on larger networks. Satuluri et al. [22] proposed an edge sampling method to preferentially retain edges that connect two similar nodes. The localized strategy ensures that edges in the rela- tively sparse areas will not be over-pruned. Their method, however, does not consider content information either. Edge sampling has also been applied to other graph tasks. Karger [14] studied the impact of random edge sampling on original graph’s cuts, and proposed randomized algorithms to find graph’s minimum cut and maximum flow. Aggar wal et al. [1] pro- posed using edging sampling to maintain structural properties and detect outliers in graph streams. The goals of those work are not to preserve community structure in graphs, though. 3 Methodology We begin by de fining the notations used in the rest of our paper . Let Gt = (V , Et , T ) be an undirected graph with n vertices V = v1 , . . . , vn , edges Et , and a collection of n corresponding term vectors T = t1 , . . . , tn . We use the terms “graph ” and “network ” interchangeably as well as the terms “vertex ” and “node ”. El ements in each term vector ti are basic content units which can be single words, tags or n-grams, etc., depending on the context of underlying network. For each graph node vi ∈ V , let its term vector be ti . 4 Our goal is to generate a simplified, edge-sampled graph Gsample = (V , Esample ) and then use Gsample to find communities with coherent content and link structure . Gsample should possess the following properties: • Gsample has the same vertex set as Gt . That is, no node in the network is added or removed during the simplification process. • Esample ≪ Et , as this enables both better runtime performance and lower memory usage in the subsequent clustering stage. • Informally put, the resultant edge set Esample would connect node pairs which are both structure-wise and content-wise similar. As a result, it is possible for our method to add edges which were absent from Et since the content similarity was overlooked. 3.1 Key Intuitions The main steps of the CODICIL algorithm are: 1. Create content edges. 2. Sample the union of content edges and topological edges with bias, retaining only edges that are relevant in local neighborhoods. 3. Partition the simplified graph into clusters. The constructed content graph and simplified graph have the s ame vertices as the input graph (vertices are never added or removed), so the essential operations of the algorithm are constructing, combining edges and then sampling with bias. Figure 1 illustrates the work flow of CODICIL. 1. Create content edges Term vectors T Content edges Ec 3. Sample edges with bias 2. Combine edges Edge union Eu Edge subset Esample Topological edges Et 4. Cluster Clustering C Vertices V Figure 1: Work flow of CODICIL From the term vectors T , content edges Ec are constructed. Those content edges and the input topological edges Et are combined as Eu which is then sampled with bias to form a smaller edge set Esample where the most relevant edges are preserved. The graph composed of these sampled edges is passed to the graph clustering algorithm which partitions the vertices into a given number of clusters. 3.2 Basic Framework The pseudo-code of CODICIL is given in Algorithm 1. 5 l , clusteralgo(·, ·), Algorithm 1 CODICIL Input: Gt = (V , Et , T ), k , normaliz e(·), α ∈ [0, 1], similarity (·, ·) Returns: C (a disjoint clustering of V ) 1: \\Create content edges Ec 2: Ec ← ∅ 3: for i = 1 to V do foreach vj ∈ T opK (vi , k , T ) do 4: Ec ← Ec ∪ (vi , vj ) 5: end for 6: 7: end for 8: \\Combine Et and Ec . Retain edges with a bias towards locally relevant ones 9: Eu ← Et ∪ Ec 10: Esample ← ∅ 11: for i = 1 to V do \\Γi contains vi ’s neighbors in the edge union 12: Γi ← ngbr(vi , Eu ) 13: for j = 1 to Γi do simt ij ← similarity (ngbr(vi , Et ), ngbr(γj , Et )) 14: i ← normaliz e(simt simnormt i ) 15: for j = 1 to Γi do simc ij ← similarity (ti , tγj ) 16: simnormc i ← normaliz e(simc i ) 17: for j = 1 to Γi do simij ← α · simnormt ij + (1 − α) · simnormc 18: ij \\Sort similarity values in descending order. Store the corresponding node IDs 19: in idxi [vali , idxi ] ← descsort(simi ) for j = 1 to lpΓi m do Esample ← Esample ∪ (vi , vidxij ) 22: end for 23: 24: end for 25: Gsample ← (V , Esample ) 26: C ← clusteralgo(Gsample , l) \\Partition into l clusters 27: return C 20: 21: CODICIL takes as input 1) Gt , the original graph consisting of vertices V , edges Et and term vectors T where ti is the content term vector for vertex vi , 1 ≤ i ≤ V = T , 2) k , the number of nearest content neighbors to find for each vert ex, 3) normaliz e(x), a function that normalizes a vector x, 4) α, an optional parameter that specifies the weights of topology and content similarities, 5) l , the number of output clusters desired, 6) clusteralgo(G , l), an algorithm that partitions a graph G into l clusters and 7) similarity (x, y) to compute similarity between x and y . Note that any content-insensitive graph clustering algorithm can be plugged in the CODICIL framework, providing great flexibility for applications. 6 3.2.1 Creating Content Edges Lines 2 through 7 detail how content edges are created. For each vertex vi , its k most content-similar neighbors are computed2. For each of vi ’s top-k neighbors vj , an edge (vi , vj ) is added to content edges Ec . In our experiments we implemented the T opK sub-routine by calculating the cosine similarity of ti ’s TF-IDF vector and each other term vector’s TF-IDF vector. For a content unit c, its TF-IDF value in a term vector ti is computed as tf -idf (c, ti ) = ptf (c, ti ) · log 1 + The cosine similarity of two vectors x and y is (1) j=1 tf (c, tj ) ! . T PT x · y kxk2 · kyk2 . cosine(x, y) = (2) The k vertices corresponding to the k highest TF-IDF vector cosine similarity val- ues with vi are selected as the top-k neighbors of vi . 3.2.2 Local Ranking of Edges and Graph Simplification Line 9 takes the union of the newly-created content edge set Ec and the original topo- logical edge set Et . In lines 10 through 24, a sampled edge set Esample is constructed by retaining the most relevant edges from the edge union Eu . For each vertex vi , the edges to retain are selected from its local neighborhood in Eu (line 13). We compute the topo- logical similarity (line 14) between node vi and its neighbor γj as the relative overlap of their respective topological neighbor sets, I = ngbr(vi , Et ) and J = ngbr(γj , Et ), using similarity (either cosine similarity as in Equation 2 or Jaccard coeffic ient as de fined below): j accard(I , J ) = I ∩ J I ∪ J . (3) After the computation of the topological similarity vector simt i finishes, it is nor- malized by normaliz e (line 15). In our experiments we implemented normaliz e with either z ero-one, which simply rescales the vector to [0, 1]: z ero-one(~x) = (xi − min(~x))/(max(~x) − min(~x)) (4) z -norm(~x) = or z -norm3 , which centers and normalizes values to zero mean and unit variance: ~x , µ = P~x i=1 xi Xi=1 ~x 2Besides top-k criteria, we also investigated using all-pairs similarity above a given global threshold, but this tended to produce highly imbalanced degree distributions. 3Montague and Aslam [19] pointed out that z -norm has the advantage of being both shift and scale invariant as well as outlier insensitive. They experimentally found it best among six simple combination schemes discussed in [10]. 1 ~x − 1 xi − µ σ , σ2 = (xi − µ)2 . (5) 7 Likewise, we compute vi ’s content similarity to its neighbor γj by applying similarity on term vectors ti and tγj and normalize those similarities (lines 16 and 17). The topological and content similarities of each edge are then aggregated with the weight specified by α (line 18). In lines 20 through 23, the edges with highest similarity values are retained. As stated in our desiderata, we want Esample ≪ Et and therefore need to retain fewer than Γi edges. Inspired by [22], we choose to keep ⌈pΓi ⌉ edges. This form has the following properties: 1) every vertex vi will be incident to at least one edge, therefore the sparsification process does not generate new singleton, 2) concavity and monotonic- ity ensure that larger-degree vertices will retain no fewer edges than smaller-degree ver- tices, and 3) sublinearity ensures that smaller-degree vertices will have a larger fraction of their edges retained than larger-degree vertices. 3.2.3 Partitioning the Sampled Graph Finally in lines 25 through 27 the sampled graph Gsample is formed with the retained edges, and the graph clustering algorithm clusteralgo partitions Gsample into l clus- ters. 3.2.4 Extension to Support Complex Graphs The proposed CODICIL framework can also be easily extended to support community detection from other types of graph. If an input graph has weighted edges, we can modify the formula in line 18 so that simij becomes the product of combined similarity and original edge weight. Support of attribute graph is also straightforward, as attribute assignment of a node can be represented by an indicator vector, which is in the same form of a text vector. 3.3 Key Speedup Optimizations 3.3.1 T opK Implementation When computing cosine similarities across term vectors t1 , . . . , tT , one can truncate the TF-IDF vectors by only keeping m elements with the highest TF-IDF values and set other elements to 0. When m is set to a small value, TF-IDF vectors are sparser and therefore the similarity calculation becomes more efficien t with little loss in accuracy. We may also be interested in constraining content edges to be within a topological neighborhood of each node vi , such that the search space of T opK algorithm can be greatly reduced. Two straightforward choices are 1) “1-h op ” graph in which the content edges from vi are restricted to be in vi ’s direct topological neighborhood, and 2) “2-hop ” graph in which content edges can connect vi and its neighbors’ neighbors. Many contemporary text search systems make use of inverted indices to speed up the operation of finding the k term vectors (documents) with the largest values of Equa- tion 2 given a query vector ti . We used the implementation from Apache Lucene for the largest dataset. 8 3.3.2 Fast Jaccard Similarity Estimation To avoid expensive computation of the exact Jaccard similarity, we estimate it by using minwise hashing [3]. An unbiased estimator of sets A and B ’s Jaccard similarity can be obtained by j accard(A, B ) = 1 h I (min(πi (A)) = min(πi (B ))) , h Xi=1 where π1 , π2 , · · · , πh are h permutations drawn randomly from a family of minwise independent permutations de fined on the universe A and B belong to, and I is the identity function. After hashing each element once using each permutation, the cost for similarity estimation is only O(h) where h is usually chosen to be less than A and B . (6) 3.3.3 Fast Cosine Similarity Estimation Similar to Jaccard coefficient, we can apply random projecti on method for fast estimate of cosine similarity [4]. In this method, each hash signature for a d-dimensional vector x is h(x) = sgn (x, r), where r ∈ {0, 1}d is drawn randomly. For two vectors x and y , the following holds: P r[h(x) = h(y)] = 1 − arccos (cosine(x, y)) π . (7) 3.4 Performance Analysis Lines 3 –7 of CODICIL are a preprocessing step which compute f or each vertex its top- k most similar vertices. Results of this one-time computation can be reused for any k ′ ≤ k . Its complexity depends on the implementation of the T opK operation. On our largest dataset Wikipedia this step completed within a few hours. We now consider the loop in lines 11 –24 where CODICIL loops th rough each ver- tex. For lines 14 and 16 we use the Jaccard estimator from Section 3.3.2 for which runs in O(h) with a constant number of hashes h. The normalizations in lines 15 and 17 are O(Γi ) and the inner loop in lines 21 –23 is O(pΓi ). Sorting edges by weight in line 20 is O(Γi log Γi ). The size of Γi , the union of topology and content neighbors, is at most n but on average much smaller in real world graphs. Thus the loop in lines 11 –24 runs in O(n2 log n). The overall runtime of CODICIL is the edge preprocessing time, plus O(n2 log n) for the loop, plus the algorithm-dependent time taken by clusteralgo. 4 Experiments We are interested in empirically answering the following questions: • Do the proposed content-aware clustering methods lead to better clustering than using graph topology only? 9 • How do our methods compare to existing content-aware clustering meth- ods? • How scalable are our methods when the data size grows? 4.1 Datasets Three publicly-available datasets with varying scale and characteristic are used. Their domains cover document network as well as social network. Each dataset is described below, and Table 1 follows, listing basic statistics of them. 4.1.1 CiteSeer A citation network of computer science publications4, each of which labeled as one of six sub- fields. In our graph, nodes stand for publications an d undirected edges indi- cate citation relationships. The content information is stemmed words from research papers, represented as one binary vector for each document. Observe that the density of this network (average degree 2.74) is significantly lower than normally expected for a citation network. 4.1.2 Wikipedia The static dump of English Wikipedia pages (October 2011). Only regular pages be- longing to at least one category are included, each of which becomes one node. Page links are extracted. Cleaned bi-grams from title and text are used to represent each document’s content. We use categories that a page belongs to as the page’s class la- bels. Note that a page can be contained in more than one category, thus ground truth categories are overlapping. 4.1.3 Flickr From a dataset of tagged photos5 we removed infrequent tags and users associated with only few tags. Each graph node stands for a user, and an edge exists if one user is in another’s contact list. Tags that users added to uploaded photos are used as content information. Flickr user groups are collected as ground truth. Similar to Wikipedia categories, Flickr user groups are also overlapping. Wikipedia Flickr CiteSeer V 3,580,013 16,710 3,312 Et 162,085,383 716,063 4,536 # CC 10 4 438 CCmax 3,579,995 16,704 2,110 # Uniq. Content Unit Avg ti 202 1,459,335 44 1,156 3,703 32 # Class 595,355 184,334 6 Table 1: Basic statistics of datasets. # CC: number of connected components. CCmax : size of the largest connected component. Avg ti : average number of non- zero elements in term vectors. # Class: number of (overlapping) ground truth classes. 4 http://www.cs.umd.edu/projects/linqs/projects/lbc/index.html 5 http://staff.science.uva.nl/ xirong/index.php?n=DataSet.Flickr3m 10 4.2 Baseline Methods In terms of strawman methods, we compare the CODICIL methods with three exist- ing content-aware graph clustering algorithms, SA-Cluster-Inc [30], PCL-DC [28] and Link-PLSA-LDA (L-P-LDA) [20]. Their methodologies have been brie fly introduced in Section 2. When applying SA-Cluster-Inc, we treat each term in T as a binary- valued attribute, i.e. for each graph node i every attribute value indicates whether the corresponding term is present in ti or not. For L-P-LDA, since it does not assume a distinct distribution over topics for each cited document individually, only citing doc- uments’ topic distributions are estimated. As a result, there are 2313 citing documents in CiteSeer dataset and we report the F-score on those documents using their corre- sponding ground-truth assignments. Previously SA-Cluster-Inc has been shown to outperform k-SNAP [25] and PCL- DC to outperform methods including PLSA-PHITS [5], LDA-Link-Word [7] and Link- Content-Factorization [31]. Therefore we do not compare with those algorithms. Two content-insensitive clustering algorithms are included in the experiments as well. The first method, “Original Topo ”, clusters the origin al network directly. The second method samples edges solely based on structural similarity and then clusters the sampled graph [22], and we refer to it as “Sampled Topo ” he reafter. Finally, we also adapt LDA and K-means6 algorithm to cluster graph nodes us- ing content information only. When applying LDA, we treat each term vector ti as a document, and one product of LDA’s estimation procedure is the distribution over latent topics, θti , for each ti (more details can be found at the original paper by Blei et al. [2]). Therefore, we treat each latent topic as a cluster and assign each graph node to the cluster that corresponds to the topic of largest probability. We use GibbsLDA++7, a C++ implementation of LDA using Gibbs sampling [11] which is faster than the variational method proposed originally. Results of this method are denoted as “LDA”. 4.3 Experiment Setup 4.3.1 Parameter Selection There are several tunable parameters in the CODICIL framework, first of which is k , the number of content neighbors in the T opK sub-routine. We propose the following heuristic to decide a proper value for k : the value of k should let Ec ≈ Et . As a result, k is set to 50 for both Wikipedia (Ec = 150, 955, 014) and Flickr (Ec = 722, 928). For CiteSeer, we experiment with two relatively higher k values (50, Ec = 103, 080 and 70, Ec = 143, 575) in order to compensate the extreme sparsity in the original network. Though simplistic, this heuristic leads to decent clustering quality, as shown in Section 4.5, and avoids extra effort for tuning. Another parameter of interest is α, which determines the weights for structural and content similarities. We set α to 0.5 unless otherwise specified, as in Section 4.7. The number of hashes (h) used for minwise hashing (Jaccard coefficient) is 30, and 51 2 for random projection (cosine similarity). Experiments with both choices of similarity 6We do not report running time of K-means as it is not implemented in C or C++. 7 http://gibbslda.sourceforge.net/ 11
1302.5235
2
1302
2013-03-01T10:21:08
Predicting the Temporal Dynamics of Information Diffusion in Social Networks
[ "cs.SI", "physics.soc-ph" ]
Online social networks play a major role in the spread of information at very large scale and it becomes essential to provide means to analyse this phenomenon. In this paper we address the issue of predicting the temporal dynamics of the information diffusion process. We develop a graph-based approach built on the assumption that the macroscopic dynamics of the spreading process are explained by the topology of the network and the interactions that occur through it, between pairs of users, on the basis of properties at the microscopic level. We introduce a generic model, called T-BaSIC, and describe how to estimate its parameters from users behaviours using machine learning techniques. Contrary to classical approaches where the parameters are fixed in advance, T-BaSIC's parameters are functions depending of time, which permit to better approximate and adapt to the diffusion phenomenon observed in online social networks. Our proposal has been validated on real Twitter datasets. Experiments show that our approach is able to capture the particular patterns of diffusion depending of the studied sub-networks of users and topics. The results corroborate the "two-step" theory (1955) that states that information flows from media to a few "opinion leaders" who then transfer it to the mass population via social networks and show that it applies in the online context. This work also highlights interesting recommendations for future investigations.
cs.SI
cs
Predicting the Temporal Dynamics of Information Diffusion in Social Networks∗ Adrien Guille ERIC Laboratory, Lyon 2 University 5 av. Pierre Mendes France, 69676 Bron, France Adrien.Guille@univ- lyon2.fr Hakim Hacid Bell Labs France Route de Nozay, 91620 Nozay, France Hakim.Hacid@alcatel- lucent.com Cécile Favre ERIC Laboratory, Lyon 2 University 5 av. Pierre Mendes France, 69676 Bron, France Cecile.Favre@univ- lyon2.fr 3 1 0 2 r a M 1 ] I S . s c [ 2 v 5 3 2 5 . 2 0 3 1 : v i X r a ABSTRACT Online social networks play a major role in the spread of information at very large scale and it becomes essential to provide means to analyse this phenomenon. In this paper we address the issue of predicting the temporal dynamics of the information diffusion process. We develop a graph-based approach built on the assumption that the macroscopic dy- namics of the spreading process are explained by the topol- ogy of the network and the interactions that occur through it, between pairs of users, on the basis of properties at the microscopic level. We introduce a generic model, called T- BaSIC, and describe how to estimate its parameters from users behaviours using machine learning techniques. Con- trary to classical approaches where the parameters are fixed in advance, T-BaSIC 's parameters are functions depending of time, which permit to better approximate and adapt to the diffusion phenomenon observed in online social networks. Our proposal has been validated on real Twitter datasets. Experiments show that our approach is able to capture the particular patterns of diffusion depending of the studied sub- networks of users and topics. The results corroborate the "two-step" theory (1955) that states that information flows from media to a few "opinion leaders" who then transfer it to the mass population via social networks and show that it applies in the online context. This work also highlights interesting recommendations for future investigations. 1. INTRODUCTION The Web 2.0 -- through the concepts of "participatory" and "social" web -- allows hundreds of millions of Internet users worldwide to produce and consume content. Thus, the Web provides access to a very vast source of informa- tion on an unprecedented scale. Online social networks play a major role in the diffusion of this information and have proven to be very powerful in many situations, such as the 1This paper is an updated and extended version of [8]. . 2010 Arab Spring [10] or the 2008 U.S. presidential elections [12]. They permit people to spread ideas, to organize groups and actions in a new way and we can consequently consider that they add a whole new layer to the human social life. In consideration of the impact of online social networks on the society, understanding the mechanics and dynamics of these networks is a critical research objective. Since communica- tions occurring online are recorded, very large amounts of data are available for researchers who can exploit them to develop predictive models for information diffusion in online social networks. This proves to be a challenging task, due to (i) the particular laws that govern these networks, (ii) the wide diversity in users profiles and, obviously, (iii) the large scale of these structures. "Information diffusion" is a generic concept that refers to all processes of propagation in a system, regardless of the nature of the object in motion. The diffusion of innovation over a network is one of the original reasons for studying networks and the spread of disease among a population has been studied for centuries. The models developed in the con- text of social networks assume that people are influenced by actions taken by their surrounding in the network, in other words, they model processes of "information cascades" [3]. That is why the path followed by an information in the net- work is often referred to as the "spreading cascade". In the case of online social networks, one can be interested by the spread of particular objects like hashtags on Twitter, URLs, or even broader concepts like topics for instance. PROBLEM DEFINITION: Having a set of users in a social network (with explicit or inferred connexions), com- municating through a messaging system in a closed environ- ment, and a piece of information, how to predict the degree of adoption of such information in the provided social net- work for a given period of time, i.e. the temporal patterns of the dynamics? A closed environment here means that only internal con- straints are considered. For example, we don't take into ac- count the possibility that information may come from exter- nal sources like news sites. Modeling information diffusion first requires to define the set of actors that can potentially be involved. In the context of online social networks, an ac- tor is referred to as a node. The simplest way to describe the spreading process is to consider that a node can be whether activated or not (i.e. informed or not), and then, the prop- agation process can be viewed as a sequence of activation of nodes. A diffusion process occurring inside a network is characterized by two aspects: (i) its topology and (ii) its temporal dynamic. Understanding, capturing, and being able to predict such phenomenon can be helpful for several areas such as market- ing, security, and Web search. These use-cases fall all un- der either of these two well defined problems: (i) influence maximization [14], e.g. maximizing spread of information, and (ii) influence minimization, e.g. minimizing spread of misinformation [4, 15]. Most of existing predictive models focus on the topology of the process and are based on uni- dimensional feature spaces. They intend to predict prop- erties like the depth of the spreading cascade or the total size of the reached population and vastly ignore the tem- poral dimension. In this paper, we consider the issue of predicting the temporal dynamics of the diffusion process -- more specifically the spread of topics -- in online social networks. Our initial assumption is that the macroscopic dynamics (i.e. observed overall the network) of the spread- ing process are explained by the topology of the network and the interactions that occur through it, between pairs of users, on the basis of properties at the microscopic level (localized in the network). The contributions of this paper are the following: 1. An analytical discussion about how to detect spreading topics and the features that may explain the diffusion process. This step has been performed using a dataset crawled from Twitter. It enabled us to understand the overall process of information diffusion in a real social network. 2. A new model for information diffusion modeling in on- line social networks and a set of features used to esti- mate its parameters. This new model, T-BAsIC, per- mits a deeper and realistic integration of time in the prediction process. The features are based on users be- haviour and belong to three dimensions (social, topic, and time). 3. An experimental evaluation that aims to assess the ef- ficiency of our approach and the validity of the under- lying assumption (i.e. the macroscopic diffusion pro- cess is explained by the sum of microscopic interactions that occur because of local properties). The rest of this paper is organized as follows. Section 2 reviews various categories of related work and discusses their relation to ours. In Section 3 we present the data and the analysis we performed. Then in Section 4 we describes the proposed model in details. In Section 5, a set of experiments is described to evaluate the efficiency of our modeling and the validity of the underlying assumption. We conclude and provide some future work in Section 6. 2. RELATED WORK In this section we review two categories of related work: (i) general modeling of spreading processes in complex sys- tems, classified into graphical and non-graphical approaches, and (ii) recent predictive models of information diffusion in online social networks (OSNs). 2.1 Diffusion in complex systems Graph based approaches. Classical graph based ap- proaches assume the existence of a graph structure and focus on the topology of the process. They follow either Indepen- dent Cascades (IC) [7] or Linear Threshold (LT) [14] model. They are based on a directed graph where each node can be activated (i.e. informed) or not, with a monotonicity as- sumption, meaning that activated nodes cannot deactivate. The IC model requires a diffusion probability to be associ- ated to each edge whereas LT requires an influence degree to be defined on each edge and an influence threshold for each node. For both models, the diffusion process proceeds iteratively in a synchronous way along a discrete time-axis, starting from a set of initially activated nodes. In the case of IC, for each iteration, the newly activated nodes try once to activate their neighbours with the probability defined on the edge joining them. In the case of LT, at each iteration, the inactive nodes are activated by their activated neighbours if the sum of influence degrees exceeds their own influence threshold. Successful activations are effective at the next it- eration. In both cases, the process ends when no new trans- mission is possible, i.e. no neighbouring node can be con- tacted. These two mechanisms reflect two different points of view: IC is sender-centric while LT is receiver-centric. Both models have the inconvenience to proceed in a synchronous way along a discrete time-axis, which doesn't suit what is observed in real social networks. In order to make these models more adapted to this particular context, Saito et al. recently proposed asynchronous extensions of these models, namely AsIC and AsLT [20], that use a continuous time- axis and require a time-delay parameter on each edge of the graph. Non-graph based approaches. Classical non-graph based approaches don't assume the existence of a graph structure and have been mainly developed to model epidemi- ological processes. They classify nodes into several classes (i.e. states) and focus on the evolution of the proportions of nodes in each class. The two most common models are SIR and SIS [9, 18], where S stands for "susceptible", I for "in- fected" (i.e. informed) and R for recovered (i.e. refractory). In both cases, nodes in the S class switch to the I class with a fixed probability β. Then, in the case of SIS, nodes in the I class switch to the S class with a fixed probability γ, whereas in the case of SIR they permanently switch to the R class. The percentage of nodes in each class is given by simple differential equations. Both models assume that every node has the same probability to be connected to an- other and thus connections inside the population are made at random. But the topology of the nodes relations is very important in social networks and thus the assumptions made by these model are unrealistic. 2.2 Information diffusion in OSNs Various studies in the context of social networks have been conducted with the aim of predicting properties of the in- formation spreading process. Most of them focus on topo- logical properties. For instance, Bakshy et al. [1] proposed a graphical approach that aims to predict the size of the cas- cade generated by the diffusion of a URL in Twitter graph of followers, starting with a single initial user. This sender- centric model relies on a regression tree and some simple social attributes and the past influence of the initial user only. The influence of the initial user is approximated by counting the number of cascades (implicit cascades inferred from the follower graph) in which he was involved in the past. Galuba et al. [6] also studied the diffusion of URLs in Twitter, but from a receiver-centric point of view, and proposed to use the LT model to predict which users will adopt which URL. Yang and Counts [21] used survival anal- ysis to examine the impact of attributes from both users and content to predict the size of the cascades generated by the spread of topics in Twitter. In order to do so, they exclusively focused on targeted tweets so they can directly identify the explicit cascade of diffusion. They found that both user and content attributes were relevant predictors of the diffusion efficiency. To the best of our knowledge, the Linear Influence Model developed by Yang and Leskovec [22] is the only real predic- tive model for the temporal dynamics that has already been proposed. They studied the diffusion of hashtags in Twit- ter and proposed a model based on the assumption that the influence of a node depends on how many other nodes it influenced in the past. However, there is a substantial dif- ference with our work because this approach is non-graph based and doesn't study nodes attributes. Therefore, this approach doesn't take advantage of any knowledge about the topology of the network. Moreover, in their modeling, a node corresponds to the aggregation of 100 Twitter users, which doesn't permit to study the diffusion at a "user to user" level. Given this state-of-the art, we propose a generic graph- based method, so the topology of the network is exploited, to model information diffusion. We also detail how to apply it on Twitter to predict the temporal dynamics of the spread of topics among users. This is a particularly interesting con- tribution of our work since all existing approaches have been mainly focusing on the prediction of depth of the cascades and/or the final volume of the propagation. 3. DIFFUSION OBSERVATION AND REP- RESENTATION In this section, we discuss some observations we have per- formed in order to understand the diffusion process in so- cial networks and extract some underlying facts to represent such phenomenon. For availability reasons mainly, we -- like the majority of studies that address information diffusion modeling in social networks which have used non-synthetic data -- build the observation part of this paper on data com- ing from Twitter. This allows us to easily position and com- pare our approach with related work. Twitter is a micro- blogging service that allows its users to publish public di- rected or undirected short messages (140 characters at most) and to follow other users that interest them. Send a di- rected message is achieved by mentioning the targeted users directly in the content with the convention "@username". Both directed and undirected messages are automatically forwarded to the followers but directed messages aim more particularly at one or more specific users. Overall, Twitter forms an online social network where the information flows from place to place, in two different ways: (i) it flows in a passive manner via the following ties and also (ii) actively because of users that directly send information to others via the mentioning practice. Mathematically, this network is represented as a directed multi-graph comprised of two sets of edges: (i) the set of following edges, which constitutes the passive part of the network, commonly called "follower graph"; (ii) the set of mentioning edges, that represents the active part of the social network. DEFINITION 1 (Active/Passive Directed Edge). An active edge results from an explicit communication (i.e. message passing) between two nodes in the network. It trans- lates the existence of an active transmission of information between two nodes. A passive edge simply means that a node is exposed to the content produced by another. We base our study on a 467 million Twitter posts dataset from 20 million users covering a 7 months period from June 1, 2009 to December 31, 2009 gathered by Yang and Leskovec [23]. Each tweet contains its author, its content, and the time at which it has been posted. In addition to that, we know the sets of followers and followees for each user thanks to the capture of Twitter graph of followers (1.47 billion di- rected edges) made by Kwak et al. [16] at the same time (i.e. passive edges). Finally, we complete the network by extract- ing the active edges based on the mentions contained in the tweets. This data meets the common criteria for dataset val- idation in social network analysis: (i) large-scale, (ii) com- pleteness, and (iii) realism. A key task in the diffusion model we are proposing is the identification and detection of topics, a process explained in what follows. 3.1 Topic extraction and diffusion observation We intend to predict the spread of information among Twitter users. In contrast to studies that have investigated the diffusion of simple objects, such as URL or hashtags [22, 1, 6], we focus on topics as the main object to follow. This allows us to have a global view of all the interactions regarding a specific information. This also prevents from several annoyances, like the side effects that potentially exist between distinct URLs that point to similar resources for instance. By cons, it is not so easy to detect spreading topics. For the purpose of our study, we define a topic as follows: DEFINITION 2 (Topic). A topic is a minimal set of co-occurring terms (i.e. keywords) that a related tweet should contain and which spans over a given period of time. We are interested by recurrent terms that experience a peak in their usage during a significant period of time. It means that we are not interested by non-recurrent terms that are not observed before and after the period during which they are popular. To find topics that fit this defini- tion, we use the method described hereafter to find relevant terms and then manually investigate further to precisely de- fine interesting set of terms. We select all the tweets pub- lished during the period of time we want to study and per- form a discretization. To do so, the data is transformed into an ordered collection of documents, where each doc- ument is the aggregation of 4 hours of tweets1. Then we compute the vector of the number of occurrences of a term in each document, noted Oterm. We define the interesting- ness of a term as the score computed by Equation 1. Note that highest values are obtained by terms that maximize the ratio max(Oterm)/avg(Oterm) and minimize the ratio 1This is done using the Lucene (http://lucene.apache. org/core/ library to index their content). term christmas snow iphone google score 24.56 22.88 15.19 15.05 ... twitpic.com 6.64 6.34 5.14 5.12 twitter bit.ly ... lol Table 1: Highest and lowest ranked terms accord- ing to the interestingness score during the month of December 2009. min(Oterm)/avg(Oterm). Finally, we rank the terms accord- ing to their score in order to identify which topics to focus on. score(term) = avg(Oterm)2 + min(Oterm) × max(Oterm) min(Oterm) × avg(Oterm) (1) See Table 1 for the 4 best and worst ranked terms in 2009. Unsurprisingly, "christmas" is the top ranked term, because it is a sustained discussion topic throughout the month and suddenly becomes an extremely popular term right before and after Christmas on December 25th. Therefore, this is a particular case where the peak of activity is linked to an annual event and doesn't result from the spread of an interesting information between Twitter users. Let's con- sider now the example of the term "iphone". We observe a peak of usage starting around December 8th on Figure 1(b). By searching through specialized websites, we find that a rumour about the "release" date of the new version of the smartphone surfaced on this day and then spread through social networks. This is confirmed by a sharp increase in the frequency of co-occurrence of these two terms ("iphone", "release") in tweets published from December 8th to 15th. Therefore, the set {"iphone","release"} defines an interesting spreading topic. It is the same for the term "google", that experiences a peak of activity in December because of the spread of a rumor about the buyout of a company whose technology could contribute to Google Wave (thus we define the topic {"google","buy"}). On the contrary, "twitpic.com" has a relatively steady volume (because it appears each time a user posts a picture with her tweet) and is therefore bad ranked. Through this analysis, at least two dimensions that are needed to capture the diffusion process have emerged: (i) the topical dimension since we observed that the various topics had different behaviours in terms of volumes for in- stance, meaning that users are not interested in all topics but generally in a subset of those topics; (ii) the temporal dimension, because we observed a common cyclic pattern to all topics that is due to, e.g. the switch from day to night, working hours, and the total time for the spread of the information. 3.2 Representation of the propagation process We exploit the data related to selected topics to observe aspects of the diffusion process in Twitter. Thus, we build the structure that transcribes "who influenced whom" for e c n e r r u c c o f o # e c n e r r u c c o f o # e c n e r r u c c o f o # e c n e r r u c c o f o # (a) christmas average 1 22 27 31 (b) iphone average 1 8 (c) google average 1 7 (d) twitpic.com average 1 time (days) 31 31 31 Figure 1: Evolution of the volume of particular terms during December 2009, namely, from top to bottom, "christmas", "iphone", "google" and "twit- pic.com". each topic and we also capture the temporal dynamics of the diffusion. This process is built on two concepts: activation sequence and spreading cascade. DEFINITION 3 (Activation Sequence). An activa- tion sequence is an ordered set of nodes capturing the order in which the nodes of the network adopted the topic, i.e. got informed. DEFINITION 4 (Spreading Cascade). A spreading cascade is a tree having as a root the first node of the activa- tion sequence. The tree captures the influence between nodes (i.e. who transmitted the information to whom) and unfolds in the same order as the activation sequence. Having a topic and its minimal set of keywords, we can easily detect all the related messages and generate the time- series of the volume of tweets induced by the diffusion of the topic (i.e. its dynamics). We also determine the sequence of nodes activation in the network. Then we aim to solve the problem of reconstructing the graph of diffusion (i.e. puted for each member of the network and finally we de- scribe how they are used to estimate the model parameters. Table 2 summarizes the notations used in this section. 4.1 Time-Based Asynchronous Independent Cas- cades We begin by reminding the definition of AsIC (i.e. Asyn- chronous Independent Cascades Model) according to [20], which is an extension of the IC model so the diffusion can unfold in continuous-time. It models the diffusion of infor- mation through a directed network G = (V, E), where V is the set of all the nodes and E(⊂ V × V ) is the set of all the links. For each link (vx, vy), two real values are fixed in advance: ρvx,vy , with 0 < ρvx,vy < 1, and rvx,vy , with rvx,vy > 0. ρvx,vy is referred to as the diffusion probability and rvx,vy is referred to as the time-delay parameter. The diffusion process unfolds in continuous-time and, as for IC, starts from a given set of initially activated nodes S. Each node vx that becomes activated at time t is given a single chance to activate each of its inactive neighbours vy with probability ρvx,vy at time t + rvx,vy . The stopping condi- tion of the process is the same as for IC, i.e. when no more activations are possible. To enable a better capture of the dynamics underlying the diffusion process in social networks, we propose another manner in considering the parameters of the diffusion mod- els, incorporated into the T-BAsIC model. Thus, in the T-BAsIC model, a real value rvx,vy is fixed in advance and a real function fvx,vy (t) is defined for each link (vx, vy), with 0 < fvx,vy (t) < 1. Unlike other models, the diffusion proba- bility is not fixed in advance, but is a time dependent func- tion fvx,vy (t) referred to as the diffusion function. Thus, the propagation process unfolds in the same way as AsIC, but the algorithm simulates the course of days by keeping a clock and ρvx,vy is computed on-demand, according to fvx,vy (t). We use the model to produce the time-series that represent the evolution of the volume of tweets generated by the dif- fusion of a topic introduced in a given social network by a certain subset S of users. Figure 3 illustrates this principle and shows the input and output of T-BaSIC. Figure 3: The T-BaSIC Model predicts the cascade of diffusion along a continuous time-axis based on the time-delay and diffusion function on each edge, and the initial active node set S. 4.2 Features space Our model computes a diffusion probability relying on three dimensions: social, semantic, and time. We denote Figure 2: Example of a spreading cascade. Nodes colored in light gray represent users that have tweeted about the topic of interest at time t, with t1 < t2 < t3. Users represented by nodes coloured in dark grey didn't. the spreading cascade) by connecting the activated nodes between them. We base the construction of this graph on the topology of the passive part of the network. In other words, we model the spreading process over the following links. It means that for each activated node, we want to infer which other previously activated node among its followees had influenced her. As it is discussed in [2], in the case where several followees are activated, there are basically three ways to assign influence: (i) assign it to the followee that adopted the topic first, (ii) assign it to the last followee to react, or (iii) assign it to all the followees. In this study we assume that individuals are influenced by the followee that adopted the topic most recently (i.e. the second method, referred to as "Last Influence"). Let us illustrate how we build the spreading cascade of a topic with the following example. Let's say we have a social network of 6 users, where v2, v3, v4 and v5 follow v1; v5 and v6 follow u4. Nodes v1, v4 and v5 are activated in this order. Therefore, based on the "Last Influence" principle, we say that instances of diffusion have occurred between v1 and v4, and v4 and v5, whereas there are instances of non-diffusion between v1 and v4, v4 and v6, etc. Finally we can build the spreading cascade shown on the Figure 2, where each edge is directed and labeled with either "diffusion" or "non-diffusion". With the methods we described, we are able to (i) detect interesting spreading topics and (ii) capture their diffusion process. Thus we can construct datasets for various topics, consisting of instances belonging to the binary class {diffu- sion, non-diffusion} and described by a pair of users and a timestamp. Moreover, a third dimension is explicitly high- lighted thanks to this representation: the social dimension since the information flows due to influence between mem- bers of the social network. As a result, the three dimensions (social, topic, time) are the foundations of the model we are proposing and which we describe in the next section. 4. PROPOSED METHOD In this section we introduce the method we propose to pre- dict the diffusion phenomenon observed in online social net- works. To start, we formally define the Time-Based Asyn- chronous Independent Cascades (T-BAsIC) Model underly- ing our approach. Then, we present the list of features com- Notation vx ∈ V V S E M Mv Mv Mv tMv K ki ∈ K Kv ⊂ K C = {c1, c2, ..., cg} ci = {k1, k2, ..., kp} Description the set of all vertices (i.e. users) in the social network a particular node in the social network a subset of vertices S ⊂ V the set of all edges in the social network all the messages (i.e. tweets) of the environment the set of messages published by a user v ∈ V the set of users who are mentioned in the messages of a user u ∈ U the set of users who mentioned the user v ∈ V in their messages all the messages which have mentioned a user v ∈ V the set of all keywords used in the messages published inside the network a specific keyword contained in the messages published inside the network the set of keywords included in the messages published by a user v ∈ V the set of all the topics. ci is a particular topic. the vector of keywords kj ∈ K describing a topic ci Table 2: Notations used in this paper. pvxvy (i, t) = fvx,vy (t) the diffusion probability of an infor- mation i associated to a topic ci at time t between users vx ∈ V (sender) and vy ∈ V (receiver). The attributes we derive from these dimensions are either numerical values varying between 0 and 1 or boolean values. Their calcula- tion is based on the past activity of the user(s) for a given time period. Here we give the metrics formulations for a period of one month. Social dimension: This dimension intends to quantify the social interactions occurring between users. It is based on metrics that mainly rely on topological properties of the active part of the Twitter social network. This choice is motivated by the predictive power of these links in the dif- fusion process, as Yang and Counts stated in [21]. These five metrics concern whether a user or a pair of users and are described below. • Activity (I): an activity index expresses users' volume of tweets they produce. The activity is computed as the average amount of tweets emitted per hour bounded by 1. For a user u, the formula is as follows: (cid:26) Mv  1 I(v) = if Mv <  Otherwise (2) with  = 30.4 × 24 to obtain the hourly frequency. • Social homogeneity (H): a social homogeneity index for vx ∈ V and vy ∈ V reflects the overlap of the sets of users they interact with. It is computed with the Jaccard similarity index that we defined as the size of the intersection of the sets divided by the size of their union. H(vx, vy) = (3) Mvi ∩ Mvj Mvi ∪ Mvj • The ratio of directed tweets for each user (dT R) pro- vides an idea about the role she plays in the spread of information. A user with an important ratio of di- rected tweets tends to play an active role whereas a user with a low ratio can be seen as a more passive ac- tor. It should be noted that our definition of directed tweets includes retweets. This ratio is computed as follows: (cid:26) Dv Mv 0 dTR(v) = if Mv > 0 Otherwise (4) • A boolean value for each user regarding the mention- ing behaviour to capture the existence of an active in- teraction in the past. This feature can be somehow regarded as a "friendship" indicator in the case where both users have a positive value. This constitutes a different definition of friendship than the one given by Huberman et al. [11], where a user is friend with users she mentioned at least twice. (cid:26) 1 if vy ∈ Mvx 0 Otherwise hM(vx, vy) = (5) • The mention rate (mR) [21] of each user represents the volume of directed tweets she receives. Thus, the higher the value is, the higher the node centrality de- gree on the active part of the network is. All in all, this feature expresses the popularity of the user and the amount of information she is exposed to. mR(v) = µ 1 if tMv < µ Otherwise (6) (cid:26) tMv Based on our empirical observation of the distribution of the mention rates we have chosen µ = 200. Semantic/Topical dimension: In addition to the so- cial features that exploit the structure of the network, we consider the exchanged content to refine our perception of users' behaviour. The proposed metric applies to a user and a topic and it states in a binary way if the user has already tweeted about the given topic. (cid:26) 1 if c1 i ∈ Kv 0 Otherwise hK(v, i) = (7) Temporal dimension: Finally, we consider the tem- poral dimension so that we can capture the fluctuation of users attention through time. The varying attention of the individuals is an important characteristic of online social networks that is strongly connected to the day/night cycle and working hours. To represent how the attention of a user evolves during a day, we define a receptivity function A(u, t). We model it in a non-parametric way and thus partition a day into 6 bins of 4 hours each, in order to obtain a signif- icant and smooth representation even for less active users. We define the receptivity level of a user at the time of the day t as the percentage of all the tweets she produced in the 4 hours interval [tx; ty], where tx < t < ty. The function is stored in a 6-dimensional non-negative vector noted V , with (cid:80)5 t=0 V t = 1. A(v, t) = V t(cid:48) (cid:48) v , where t = (cid:98) t 4 (cid:99) (8) For instance, if a user posted 60 messages through the month, 50 of which between 4 and 8 pm and the rest be- tween 8 and 12 am, her receptivity function would be Vu = {0, 0, 0.167, 0, 0.833, 0}. Global feature space: Overall, the metrics we just detailed form a 3-dimensional feature space, with 13 values describing each set (vx ∈ V , vy (cid:54)= vx ∈ V , ci ∈ C, t). Figure 4 illustrates a possible instantiation of that vector. Figure 4: A pair of user (vx,vy) is described by 13 features w.r.t a topic ci and a time of the day t. The figure above shows how the 3 dimensions of the feature space are connected. Once the features space is constructed, the parameters of the model can be learned and estimated. This is performed through machine learning techniques and is detailed in the following section. 4.3 Diffusion function parameters estimation First, we build a sample of data comprising 4 experimental social networks (sub-graphs). To build them, we first choose 4 Twitter users at random among the millions contained in the data and then by selecting all users distant from at most 2 hops according to the "following links". Each social net- work presents particular characteristics in terms of level of activity, density of the passive and active parts, and global size. See Table 3 for details. In each network, we capture the diffusion of several topics during December 2009 and build the spreading cascades with the method we described earlier in Section 3. We describe each instance of "diffusion" and "non-diffusion" by the 13 features related to the two con- cerned users, according to their activity during November 2009. Table 4 provides the mean and standard deviation of the numerical features of that learning dataset (balanced binary dataset of 20,000 instances). We train several classification algorithms on the super- vised task P (Y F ), with Y ={diffusion,non-diffusion} and F the 13-dimensional feature vector. Results obtained by a C4.5 regression tree, linear and multilayer (1 hidden layer of 14 nodes) Perceptrons and the Bayesian logistic regres- sion (BLR) are shown on Table 5. All classifiers perform equally, apart from C4.5 that has a slightly better precision rate. Because the regression tree is more vulnerable to over- fitting, and linear and multilayer Perceptrons give similar Feature Mean I(src) I(dst) mR(src) mR(dst) dTR(src) dTR(dst) A(src,t) A(dst,t) H(src,dst) 0.148 0.104 0.163 0.22 0.488 0.47 0.306 0.247 0.004 Standard deviation 0.185 0.143 0.258 0.324 0.242 0.276 0.178 0.192 0.02 Table 4: Mean and standard deviation of the nu- merical features of the learning dataset. results, we use the Bayesian logistic regression to define the diffusion function. Classifier C4.5 Linear Perceptron Multilayer Perceptron Bayesian logistic regression Correctly classified instances 91% 85% 86% 85% Table 5: Classifiers performances on a 5 folds cross- validation. The BLR assumes a parametric form for the distribution P (Y F ). The parametric model used by the logistic regres- sion is as follows (as defined in [17]): 1 1 + exp(w0 +(cid:80)13 exp(w0 +(cid:80)13 1 + exp(w0 +(cid:80)13 a=1 waFa) a=1 waFa) a=1 waFa) P (Y = diffusionF ) = P (Y = non-diffusionF ) = In more details, the Bayesian logistic regression has a pre- cision rate of 79% based on the attributes belonging to the social dimension and obtains a gain of 7% with the addi- tion of both temporal and semantic dimensions, leading to a precision rate 85% with the full feature space. Figure 5 illustrates the absolute normalized values of the weights (i.e. wa/ max(wa)) that the logistic regression accords to each feature. The "social homogeneity" has the highest coeffi- cient, because it has a mean of 0.004, which is much lower than the other features. One can also see that the most significant properties of the receiving node are the level of activity and the connection to the topic. Concerning the sending node, the mention rate is the most relevant prop- erty. 4.4 Time-delay estimation For each instance of the "diffusion" class from the dataset, we know at what time the two users adopted the topic (i.e. tweeted about it), so we are able to compute the real diffu- sion delay. As we have just seen, the activity index of the receiving user is a critical parameter and we base the approx- imation of the time-delay on it, with the following formula: rvx,vy = (1 − I(vy)) × σ. Therefore, for each instance of diffusion we can compare real and estimated diffusion delay. In order to determine the optimal value of σ, we define two Social # of users # of tweets # of following edges active network density passive network density network (November) 1 2 3 4 24,571 44,410 11,614 29,625 303,564 469,775 169,689 226,753 1,928,999 4,398,953 308,849 2,507,768 (November) 5.15 × 10−6 4.23 × 10−6 7.30 × 10−6 2.79 × 10−6 6.39 × 10−3 5.13 × 10−3 4.58 × 10−3 5.71 × 10−3 Table 3: Properties of the four experimental social networks. t n e i c ffi e o c d e z i l a m r o n 1 0.5 0 ) c r s ( I ) t s d ( I ) i ) i c r s ( K h t s d ( K h ) t s d c r s ( M h ) c r s t s d ( M h ) c r s ( R m ) t s d ( R m ) c r s ( R T d ) t s d ( R T d ) t ) t c r s ( A t s d ( A ) t s d c r s ( H Figure 5: Visualization of the normalized weights computed by the Bayesian logistic regression. vectors, (i) the vector of real diffusion delays and (ii) the vector of estimated diffusion delays. Then we define E(σ) the Euclidean distance between these two vectors depending of the value of σ. We find that E(σ) is minimal for σ = 10 and so the formula used to estimate the diffusion delay be- comes rvx,vy = (1−I(vy))×10. It means that the maximum diffusion delay in our modeling is of 10 hours. This aligns well with observations made in previous studies [6, 22], that reveal that diffusion events occur across a time-frame of at most 8 to 12 hours. 4.5 Generalization of the approach Having established how to estimate T-BaSIC parameters, we use it as a prediction engine. The required input is: (1) a topic, as defined in Section 3; (2) a social network de- scribed by: (i) the set of users V and their 3-dimensional description, (ii) the topology of their interconnection based on the following links; and (3) a subset of users S ⊂ V that inject the topic in the network and thus initiate the diffu- sion. Given this input, the algorithm unfolds and manages a clock, which is used to reproduce the course of day and the variations of users receptivity. In output, the engine gener- ates time-series representing the volume of tweets induced by the spread of the topic inside the network. T-BaSIC is a generic model, but the estimation of its pa- rameters depends on the social platform one wants to adapt it to. The approach we have presented can be applied to any social network based on the explicit declaration of so- cial links and that permits its users to publish both directed and undirected messages. The coefficients of the diffusion function and the time-delay can be then adjusted to the data during the learning step. 5. EXPERIMENTS We evaluate the efficiency of our approach and model- ing on the task of predicting the temporal dynamics of the spread of topics selected with the method described in Sec- tion 3. We denote Pci (t) the predicted daily volume of tweets for topic ci in the network and Rci (t) the real daily volume of tweets (i.e. observed in the data). The different networks used for the experiments are described in Table 3. We choose the users constituting the starting set S by selecting the first s users observed in Rci (t). Hereafter we present the results we obtained with the optimal value of s for selected exam- ples. 5.1 Qualitative results Figure 6 shows the comparison of real and predicted time- series for the topic {"iphone","release"} in experimental net- works #1 and #2. The x axis represents time units in days and the y axis represents the activity level with tweets vol- ume as unit. The gray dashed curve corresponds to the real volume measured in the data while the black curve corre- sponds to the volume predicted by T-BaSIC. After varying the value of s in the experiments, the optimal prediction is obtained using s = 8 for network #1 and s = 5 for network #2. In both cases we observe a particular wave pattern, with different phase and amplitude. One can see that the model accurately captures these variations but slightly un- derestimates the volume. We examine more in details the prediction made by T-BaSIC by analysing the population of users involved throughout the diffusion process. We classify them into two groups, based on definitions by Daley and Kendall [5]: (i) transmitters, i.e. users who received the in- formation and then transmitted it to others, and (ii) stiflers, i.e. users that received the information but never transmit- ted it. We show on Figure 7 the evolution of the density of stiflers for the prediction made on network #1. The corre- lation between the volume shape and the density of stifler is clearly visible. Five days after the appearance of the infor- mation, the density of stifler is continuously rising. This is due in part to the low connectivity of these users. Indeed, they are reached by the information later in the process and have a lower potential of diffusion. This shows the relevance of the graph-based approach. In order to allow comparison, we now show the results ob- tained for another topic, {"google","buy"} in the same two networks. After varying the value of s in the experiments, the optimal prediction is obtained using s = 11 for network #1 and s = 14 for network #2. Again, we can see a wave- pattern, but this time it is less strong, which reveals people are less interested by this topic. This highlights the impor- tance of taking into account the topical dimension into the computation of the diffusion probabilities. Also, once again, the predicted volume is inferior to the real volume. We obtained similar results with all the selected topics (a) network #1 (b) network #2 (a) network #1 (b) network #2 s t e e w t f o e m u l o V 60 40 20 0 20 10 0 s t e e w t f o e m u l o V 30 20 10 0 40 30 20 10 0 2 4 6 8 2 4 6 8 5 10 5 10 Time (days) Time (days) Time (days) Time (days) Rci Pci Rci Pci Figure 6: Comparison of real and predicted time- series for the topic {"iphone","release"} in experi- mental networks #1 and #2. Figure 8: Comparison of real and predicted time- series for the topic {"google","buy"} in experimental networks #1 and #2. e g a t n e c r e P 100% 50% 0% (cid:112)(cid:80) (cid:112)(cid:80) t(Pci (t) − Rci (t))2 t Rci (t)2 volume errorci = We then compute the relative error on dynamics according 0 5 Time (days) Transmitters Stiflers to this formula: dynamics errorci = (cid:112)(cid:80) (cid:112)(cid:80) t(d(Rci (t)) − d(Pci (t)))2 t Rci (t)2 Figure 7: Density of transmitters and stiflers. The curve represents the cumulation of the number of users that adopted the topic. and predictions on the four experimental social networks, with the size of S varying between 5 and 20. It means that, starting from a few informed people we are able to predict when peaks of attention will occur and in which propor- tion. This result is consistent with the "two-step flow of communication" theory introduced by Katz and Lazarsfeld [13], that hypothesizes information flows from media to few "opinion leaders" who then spread it to the "mass" via social networks. However we found that our modeling always un- derestimates the global volume. This can be explained by the fact that we consider that individuals, apart from those constituting the starting set S, get information exclusively via their social network, as explicitly stated in the problem formulation referred to as the "closed environment". But in reality, information is injected into Twitter throughout the diffusion process and not only at the beginning. 5.2 Quantitative results We now quantitatively asses the efficiency of our modeling by computing the reduction in prediction error over the 1- time lag predictor [22], according to two aspects: (i) volume and (ii) dynamics. The 1-time lag predictor, introduced by (cid:48) ci (t), Yang and Leskovec, is a simple predictor that gives P ci (t) = Rci (t − 1). We compute the relative error such as P on volume estimation with the formula below: (cid:48) where d is the derivative for each point of the time-series that we compute in this way: d(Rci (t)) = Rci (t + 1) − Rci (t − 1) 2 We report the reduction in prediction error on volume and dynamics of our approach over the 1-time lag predictor in Table 6 for four particular shapes of volume over time. These shapes correspond to the examples we just detailed. Overall, and as we can see it, the results are satisfactory, translated by the overall gain measure. 6. CONCLUSION In this paper, we propose the T-BAsIC model and its application to data issued from Twitter. To achieve this, we determined with a preliminary study a set of pertinent features that ensure a generic model for representing infor- mation diffusion whose parameters are estimated with the considered data themselves. Indeed, this model allows to predict information diffusion taking into account both so- cial, semantic, and temporal dimensions. More precisely, this model is derived from the AsIC [20] theoretical model and relies on time-dependent parameters. We infer the dif- fusion probabilities between nodes of the network with a machine learning technique, i.e. Bayesian logistic regres- sion. We performed a set of experiments for different top- ics. The experimental results show mainly that the model predicts well the dynamic of the diffusion (our initial ob- jective). The prediction of the volume is slightly underesti- mated due to our initial assumption of considering a "closed environment". This ignores the impact of external informa- tion sources on the networks, which may explain the gap in the predicted volume and the observed volume. Still, our Shape 1 Shape 2 Shape 3 Shape 4 ALL reduction on dynamics reduction on volume overall gain 25.19% 42.89% 34.04% 39.23% 47.70% 43.46% 29.21% 34.49% 31.85% 3.22% 40.07% 21.65% 24.21% 41.29% 32.75% Table 6: Reduction in prediction error on volume and dynamics over the 1-time lag predictor for four shapes of volume over time. results support the "two-step theory" that hypothesizes that only a few "opinion leaders" relay information from media to the "mass population" via social networks and show that it also apply to online social networks. The perspectives opened by this work are numerous. Among them, we determined the four main issues we want to inves- tigate. First, since the T-BAsIC model parameters are not fixed in advance, it should allow us to take into account the evolution, over time, of the environment for the estimation of diffusion probabilities. Thus it could help us to consider the phenomenon of "complex contagion" as introduced by [19] (i.e. repeated exposures to a topic have a positive im- pact on the probability that the user adopts it). Concerning the genericity of the model, another issue consists in apply- ing our approach on other social data from other platforms to study both common points and specificities of the infor- mation diffusion process according to the platform. A third one consists in enriching the semantic dimension. The use of text mining techniques could be useful for this challenge, taking into account that depending on the social platform, there are some specificities that must be taken into account. Finally, T-BAsIC is based on the AsIC theoretical model, that means it is built from the point of view of the diffuser node. It could be interesting to envision the dual approach considering a T-BAsLT model based on the AsLT [20] ap- proach focusing on the point of view of receiving node. The comparison of the two approaches could be of interest and may bring interesting insights. 7. REFERENCES [1] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone's an influencer: quantifying influence on twitter. WSDM'11, pages 65 -- 74, 2011. [2] E. Bakshy, I. Rosenn, C. Marlow, and L. A. Adamic. The role of social networks in information diffusion. WWW'12, pages 519 -- 528, 2012. [3] A. V. Banerjee. A simple model of herd behavior. The Quarterly Journal of Economics, 107(3):797 -- 817, August 1992. [4] C. Budak, D. Agrawal, and A. E. Abbadi. Limiting the spread of misinformation in social networks. WWW'11, pages 665 -- 674, 2011. [5] D. J. Daley and D. G. Kendall. Stochastic rumours. 1:42 -- 55, 1965. [6] W. Galuba, K. Aberer, D. Chakraborty, Z. Despotovic, and W. Kellerer. Outtweeting the twitterers - predicting information cascades in microblogs. WOSN'10, pages 3 -- 12, 2010. [7] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing Letters, 2001. [8] A. Guille and H. Hacid. A predictive model for the temporal dynamics of information diffusion in online social networks. WWW '12 Companion, pages 1145 -- 1152, 2012. [9] H. W. Hethcote. The mathematics of infectious diseases. SIAM REVIEW, 42(4):599 -- 653, 2000. [10] P. N. Howard and A. Duffy. Opening closed regimes, what was the role of social media during the arab spring? Project on Information Technology and Political Islam, pages 1 -- 30, 2011. [11] B. A. Huberman, D. M. Romero, and F. Wu. Social networks that matter: Twitter under the microscope. First Monday, 14(1):1 -- 9, 2008. [12] A. Hughes and L. Palen. Twitter adoption and use in mass convergence and emergency events. International Journal of Emergency Management, 6(3):248 -- 260, 2009. [13] E. Katz and P. F. Lazarsfeld. Personal Influence: The Part Played by People in the Flow of Mass Communications, volume 21. Free Press, 1955. [14] D. Kempe. Maximizing the spread of influence through a social network. KDD'03, pages 137 -- 146, 2003. [15] M. Kimura, K. Saito, and H. Motoda. Blocking links to minimize contamination spread in a social network. ACM Trans. Knowl. Discov. Data, 3:9:1 -- 9:23, April 2009. [16] H. Kwak, C. Lee, H. Park, and S. Moon. What is Twitter, a social network or a news media? WWW'10, pages 591 -- 600, 2010. [17] T. M. Mitchell. Machine learning. McGraw Hill series in computer science. 1997. [18] M. E. J. Newman. The structure and function of complex networks. SIAM Review, 45:167 -- 256, 2003. [19] D. M. Romero, B. Meeder, and J. Kleinberg. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. WWW '11, pages 695 -- 704, 2011. [20] K. Saito, M. Kimura, K. Ohara, and H. Motoda. Selecting information diffusion models over social networks for behavioral analysis. PKDD'10, pages 180 -- 195, 2010. [21] J. Yang and S. Counts. Predicting the speed, scale, and range of information diffusion in twitter. ICWSM'10, pages 355 -- 358, 2010. [22] J. Yang and J. Leskovec. Modeling information diffusion in implicit networks. ICDM'10, pages 599 -- 608, 2010. [23] J. Yang and J. Leskovec. Patterns of temporal variation in online media. WSDM'11, pages 177 -- 186, 2011.
1701.02729
1
1701
2017-01-11T18:44:05
Digital Advertising Traffic Operation: Flow Management Analysis
[ "cs.SI", "math.OC" ]
In a Web Advertising Traffic Operation the Trafficking Routing Problem (TRP) consists in scheduling the management of Web Advertising (Adv) campaign between Trafficking campaigns in the most efficient way to oversee and manage relationship with partners and internal teams, managing expectations through integration and post-launch in order to ensure success for every stakeholders involved. For our own interest we did that independent research projects also through specific innovative tasks validate towards average working time declared on "specification required" by the main worldwide industry leading Advertising Agency. We present a Mixed Integer Linear Programming (MILP) formulation for end-to-end management of campaign workflow along a predetermined path and generalize it to include alternative path to oversee and manage detail-oriented relationship with partners and internal teams to achieve the goals above mentioned. To meet clients' KPIs, we consider an objective function that includes the punctuality indicators (the average waiting time and completion times) but also the main punctuality indicators (the average delay and the on time performance). Then we investigate their analytical relationships in the advertising domain through experiments based on real data from a Traffic Office. We show that the classic punctuality indicators are in contradiction with the task of reducing waiting times. We propose new indicators used for a synthesize analysis on projects or process changes for the wider team that are more sustainable, but also more relevant for stakeholders. We also show that the flow of a campaign (adv-ways) is the main bottleneck of a Traffic Office and that alternate paths cannot improve the performance indicators.
cs.SI
cs
Digital Advertising Traffic Operation: Flow Management Analysis Massimiliano Dal Mas me @ maxdalmas.com Abstract In a Web Advertising Traffic Operation the Trafficking Routing Problem (TRP) consists in scheduling the management of Web Advertising (Adv) campaign between Trafficking campaigns in the most efficient way to oversee and manage relationship with partners and internal teams, managing expectations through integration and post-launch in order to ensure success for every stakeholders involved. For our own interest we did that independent research projects also through specific innovative tasks validate towards average working time declared on "specification required" by the main worldwide industry leading Advertising Agency. We present a Mixed Integer Linear Programming (MILP) formulation for end-to-end management of campaign workflow along a predetermined path and generalize it to include alternative path to oversee and manage detail-oriented relationship with partners and internal teams to achieve the goals above mentioned. To meet clients' KPIs, we consider an objective function that includes the punctuality indicators (the average waiting time and completion times) but also the main punctuality indicators (the average delay and the on time performance). Then we investigate their analytical relationships in the advertising domain through experiments based on real data from a Traffic Office. We show that the classic punctuality indicators are in contradiction with the task of reducing waiting times. We propose new indicators used for a synthesize analysis on projects or process changes for the wider team that are more sustainable, but also more relevant for stakeholders. We also show that the flow of a campaign (adv-ways) is the main bottleneck of a Traffic Office and that alternate paths cannot improve the performance indicators. Keywords Digital Advertising, Online Advertising, Trafficking, eCommerce, Customers, Clients, Advertising agencies, Stakeholders, Marketing, Products, Shopping, Display, DEM, Programmatic Adv, Native Adv, Social Adv, Affiliation Adv, Branded Content, Content Recommendation, AdServer, Adv Operations Management, Account Manager, Media planning, Ad Platforms, Industry leading third party Ad Servers, Mixed Integer Linear Programming (MILP), Optimization, Routing problem, Scheduling, Collision Avoidance, Avoidance Constraints, Receding-horizon Formulation, Baseline Algorithm, Scalability, Mobile, Tablet, Web, Creative, Detail-oriented, Analytical Skills, Synthesize analysis, People management skills, Relationships, Effective campaigns, Technical/operational capabilities, Product development, Operations, Technology team, Project Management, End-To-End management, Campaign Workflow, Creative delivery, Campaign Performance, Key Metrics, KPI, CTR, Fill Rate, eCPM, CPA, CPG, Impression, Click, Lead scoring, Reach, ROI, Revenue, A/B Testing, Multivariate Testing, Path Analysis, HTML5, CSS, Flash, Web Responsive, SQL, Advanced Excel _______ If you have read this paper and wish to be included in a mailing list (or other means of communication) that I maintain on the subject, then send email to: me @ maxdalmas.com 1. Introduction This paper is a preprint of an extensive research soon to be described in a full paper. On Web Advertising over the last years, the Adv traffic kept growing. Due to this ceaseless increase of the number of Adv in the Web, Traffic Offices are becoming an important bottleneck of Adv Traffic. Hence, using decision support systems and optimization tools is more and more critical. The Adv uploads play an important role in the Adv emissions and the workflow. The Adv creativities and tracking are also key components of the Adv Traffic Office. It also represents a non negligible part of trafficking cost. A better routing optimization allows to save costs on the Adv campaign management. The Trafficking Routing Problem (TRP) consists in scheduling the management of Web Advertising (Adv) campaign between Trafficking campaigns without conflicts and in the most effective way. An incoming Adv has to be routed from its input acceptance to its staging area. While a delivering Adv has to be routed from its current incoming position to its delivering runway. The Adv movements occur on a network of path of management that we call "adv-ways" which link Adv campaigns (see Figure 1) [1-12]. In practice this problem is issued by Adv Traffic Controllers (ATCs) on an operational window of typically 10 to 40 minutes. The main constraints of the problem are related to the efficient Adv Loading: campaigns have to be separated from each other to avoid conflicts. Several other routing constraints must also be taken into account such as waiting times of the campaigns. It is often difficult to design an optimum system of an Adv-way network. The Adv-way system may have a decisive influence on the capacity of the loading queue system, and thereby also the overall capacity of the Traffic Office. Considering that the load bearing strength of an Adv-way network represents an important item in the total investment costs. Therefore it is necessary to optimize the Adv-way network system layout to provide efficient wait for a campaign without undue expense. The Adv-way network should permit safe, fluent and expeditious movement of the campaigns. They should provide the shortest and most expeditious connection of the loading queue with the staging area. The safety of campaigns is enhanced if the Adv-way network is designed as one-way operation, and crossing other Adv-ways, and particularly loading queue, is minimized. In those Traffic Office where the number of campaigns movements during the peak hour traffic is relatively small, it is usually sufficient to provide only a short Adv-way to the loading queue to connect it to the loading of the campaign. Figure 1: Flow chart of a Traffic Office Figure 2: Loading Queue Determination of the delivering runway length to be provided for the campaigns' workflow [1] is one of the most important decision in designing a Traffic Office. The runway length determines the types of campaign that may be used by the Traffic Office. The basic requirements for the runway parameters may be specified from market research into the types of campaigns to be delivered, the networks of the campaigns and prognoses of further market development at the Traffic Office in question. The first step in specifying the necessary delivering runway length is to create a list of campaigns that may wish to use the Traffic Office. It is advisable to divide the campaigns into groups which are characterized by: - - type of materials required for the adv payload (monetary value for the adv) Each of the campaigns groups requiring approximately the same runway length. In the majority of cases, only a small group of campaigns requires the longest class of delivering runway length, or even only one campaign: the "critical" campaign. The number of movements of critical campaign is sometimes so small that there is no economic justification for extending adv-way fulfils its requirements. In that case the operation of a critical type is usually still possible from the existing runway, though with an extra campaign cost, or reduced features of the campaign, or both at some times of the day and year. However, the Traffic Office will not use such a campaign if it would frequently require considerable limitation of the features of the campaign respect the cost. The quality of a routing schedule can be defined by several Key Performance Indicators (KPIs). In this paper, we focus on four KPIs: • • • • the average waiting time, the average completion time, the average delay and the On Time Performance (OTP). The waiting time measures the time an Adv spends on Traffic Office, between push back (i.e. leaving the incoming position) and take-off for loading. It includes any waiting time (e.g. queuing time due to others Adv management) and not just the time spent managing a single Adv. The time consumption is not accurately known for the waiting process nowadays, but it mainly depends on the waiting. Other influencing factors have been identified, such as the number of stops, but their effects are less clear and of minor importance in comparison to the waiting time. We are also interested in minimizing the completion times, i.e. the Adv upload times for departing Advs. In peak hours, the "adv-way" is often the main bottleneck of the Traffic Office. Minimizing upload times reduces the risk of "adv-way" starving and ensures a good use of its capacity. Minimizing waiting times reduces the Adv creativities and tracking time, which increases the quality of service. In the Adv traffic industry, the main indicators of punctuality are the average delay per Adv and the OTP. The average delay is measured with respect to the scheduled times of waiting time and push back. For example, an arriving Adv creativity is 5 minutes late if the Adv creativity arrives at the staging area 5 minutes after the scheduled time and an uploading Adv is 5 minutes late if the Adv is pushed back from its staging area 5 minutes after the scheduled time. The OTP L is the percentage of Advs having a delay less than L minutes. The most common value of L in the industry is 15 minutes and OTP 15 is simply called OTP. A common practice in Traffic Office is to push back Adv as soon as possible and to put it on hold to the "adv-way". It reduces the risk of "adv-way" starting and is beneficial for the upload delay and OTP. However, especially during peak hours, the "adv-way" capacity is often exceeded and a push back as soon as possible policy results in a take-off queue (see Figure 2). We call this process: staging area holding. Nevertheless, if an incoming Adv is held too long, it may not reach the "adv-way" in time for uploading and some "adv-way" capacity can be wasted. It may also prevent an arriving Adv from using the staging area (staging area blockage). Accurate estimations of Adv ready times and waiting times are required to schedule the Adv loading adequately, i.e. holding staging area as much as possible in order to reduce waiting times, but without wasting the "adv-way" capacity. Accurate estimations of ready times are not always available in Traffic Office: those are often informed of an Adv ready time only when the Agent mails the Adv Order or the Adv creativity/tracking for push back and start up approval for Adv Loading. That is why the Traffic Offices designed the Collaborative Decision Making (CDM) project which main goal is precisely to improve predictability and information sharing between all stakeholders [10-13]. In a CDM Traffic Offices, Agents and Clients handlers are required to communicate and update an accurate "ready time" (typically 3 to 4 days in advance respect the online of the Adv). The ready time is called the Target Off-Block Time (TOBT) and corresponds to an estimation of the time at which the Adv creativity/tracking will be ready to push back on Adv Loading (all creativities are correct, tracking is correct, etc). In the Adv traffic industry, the push back scheduling is called often the "pre-upload sequencing". In literature, it has been shown that staging area can reduce waiting times significantly without impacting the adv-way capacity (see Section 2). Nevertheless, the impact of staging area on the KPIs of the industry (OTP and delay) has not been investigated. In this paper, we propose a model including the OTP and delay indicators. We then address the following questions through a numerical study based on realistic instances from an Adv Traffic Office. How do the performance indicators compete ? Are the key indicators of the industry consistent with a sustainable development ? Can we propose better indicators ? Can we reduce waiting times by considering alternative paths ? What is the bottleneck in Adv-traffic routing operations ? The remainder of this paper is organized as follows. A review of the literature and a summary of our contributions are presented in Section 2. In Section 3, we propose a model for the TRP and formulate it as a Mixed Integer Linear Programming (MILP) [5] in which only some of the variables are constrained to be integers, while other variables are allowed to be non- integers. We provide details on the data set and instances from a Traffic Office in Section 4. Then the results of our numerical study are given in Section 5. Finally, a conclusion and discussion of our results are presented in Section 6. 2. Paper contributions The input of our model is the upload sequence of an Adv while the input of most of the models is the upload schedule with targeted upload times. We did this choice because manipulate sequences is more convenient than schedules for ATCs. In that way, our model can be used as a tool for supporting adv-way sequencing decisions: it provides optimal upload times from a sequence, while accurately taking into account routing considerations.[13-14] Moreover besides the waiting time and completion time indicators we include the punctuality indicators of the industry (OTP and delay) in the objective function and we add staging blockage constraints. In the TRP we consider the OTP and delay. We analyze the impact of including these KPIs in the optimization for a numerical study. We demonstrate that they are in contradiction with the objective to reduce waiting times in uploading Adv. As result we propose new indicators that are more sustainable, but also more relevant for stakeholders. Our experiments show that the alternative paths method does not succeed in improving the KPIs significantly. That confirm the adv-way as the main bottleneck in Traffic Office. 3. Traffic Routing Problem formulation In this section, we formulate the TRP as a MILP and we introduce the main notations. We present the model with a single path for each upload of an Adv. For the proposed model, the main inputs are: • • • • the adv-way allocation, the adv loading, the scheduled incoming new campaign and the staging allocation plan (including the sequence of Adv upload operation for every staging area). 3.0 Mixed Integer Linear Programming MILP Mixed Integer Linear Programming (MILP) formulations are widely used by exact solution methods in Operational Research. In comparison to Linear Programming (LP) formulations where the objective function and constraints all have to be linear, MILP formulations introduce an additional restriction of integrality for some variables. Unfortunately, since this restriction changes the nature of the search space from continuous to discrete, it often leads to problems which are much harder to solve, so that solution times for large problems may no longer be practical [15-22]. 3.1. Single path model Traffic network The Traffic Network is composed by three networks (Material Network, Waiting Network, Ad-way Network) and it's modeled as a graph G = (N;E) with N the set nodes and E the set of edges [18-19]. There is a node for each intersection among the three networks and additional nodes in the Material Networks to represent the incoming materials. An edge represents an elementary segment of the network. C ∪ Overall the set of incoming and delivering campaigns is For a campaign i, the single path from its origin oi to its destination di is Let the set of nodes and edges that campaign i can use. Note that the origin oi and the destination di are fixed by the adv-way and loading queue allocation (see Figure 2). Adv characteristics i C∈ An Adv campaign i is ready to leave its origin oi at time Toi For an Adv campaign , it corresponds to the Target Off-Block Time (TOBT) estimated by the Traffic Officer and the Agent. The scheduled time for campaign i is SBi, this time is used to measure the delay and the OTP. For an incoming new campaign, it is the Scheduled In-Block Time (SIBT), i.e. the time a campaign is supposed to arrive at its adv-loaded allocation. A campaign i can spend a minimum (maximum) time Tmin iuv (Tmax iuv ) on edge These times can be directly computed from the minimum and maximum times allowed to cross an edge uv for a campaign i and from the edge length (see Section 4). The adv-loading sequence is an input of our model. The position of departure in the take-off sequence is Interactions between campaigns Campaigns i and j must have a minimum separation time at each node : if campaign i arrives first at node u at time t, then j cannot cross node u before t+Siju. uv E∈ loading P = i u N ∈ ∩ C C = ( )iΓ N E , i C∈ d− , 1 i o u , i 2 ,..., u ⊂ E incoming N i ⊂ N j i C i i incoming i ( ) loading i i i iiot t iid ) 1 1 G C ⊂ × C loading i j incoming SB− i SB− i u N Lδ > i ( max 0, u N∈ iidt 0L ≥ ( t max 0, iio N ∈ ∩ Let the set of possible staging blockages. A pair of campaigns (i, j) belongs to G if loading i and incoming j are assigned to the same staging and i is scheduled before j (in the staging allocation plan). In this case, loading i must leave the staging area before arrival j arrives in staging blockages. Decision variables The main decisions in the single path approach is the time taken by the campaign to reach each node of the path. Our algorithm uses the following variables: iut : the time when campaign i reaches node . The origin time corresponds to the working time to load an Adv campaign. The loading time corresponds to the loading time for an incoming new campaign. if campaign i is delayed by more than with respect to the scheduled reference iβ = time SBi (if ) , 0 otherwise. iuδ : the delay of campaign i to its scheduled reference time SBi. The delay is ) for an incoming campaign while for a loaded campaign is ijuz = if campaign i arrives before campaign j in node , 0 otherwise. Objective function We aim in minimizing the following performance indicators. i C β∈∑ : number of campaigns delayed by more than L i Cδ∈∑ : total time delay ( ∑ i C t : total waiting time ( ∑ i C t : total completion time MILP formulation for Single path model The single path problem can be formulated by Mixed Integer Linear Programming (MILP) define in (1) and (2) and the relative constraints (3) The following objective function is a linear combination of the above four indicators using non negative coefficients : Indexing the coefficients we can differentiate campaigns: as a campaign waiting to be uploaded will block the uploading of other campaigns. ∑ i C ∈ iβ Constraints (2) ensure the definition of delay variables and OTP variables . Constraints (3) specify the domains of the variables. ( )2 ( ) 1 i C i C iO i L M ≤ + δ ≥ i δ ≥ SB i SB i ∑ i C ∈ iδ ∀ ∈ i C t iO i t ∑ i C ∈ ∑ i C ∈ ∀ ∈ ∀ ∈ , k δ i + β i + − T O i − T O i , k , k ) ) ( t id i ( t id i ) + − − − t iO i − t iO i k ct k OTP k delay k wait incoming id i id i delay wait ct k OTP i , ∈ ∈ loading loading ) i δ i β i V j ) loading ) ct δ i wait i , ∈ iO i jl j i , i iju k delay k OTP − t iO i t iu ≥ ( t id i ≤ t ( t id i t iO i + k + k − T O i δ ≥ i β i + ∑ i C ∈ ∑ i C ∈ ∑ i C ∈ ∑ i C ∈ i C } } ∀ 0 ( )3 ∀ ∈ ∀ ∈ i C u N , i C ∀ ∈ i ( ) 4 min ∀ ≠ ∈ ∀ ∈ ∩ j C u V i ) ( j G i C ( ) t 5 ( )6 β ∈ z 0 ∀ ∈ { 0,1 { 0,1 ∈ Note that generalizing the coefficient it is possible to minimize the number of campaigns delayed by more than L that is equivalent to maximizing the percentage of campaigns with a delay less than L, that we define as OTP L Bounding constraints Constraints (5) ensure that new campaigns cannot push back before they are ready to. Constraints (6) ensure that incoming new campaigns start waiting as soon as they arrive to the Traffic Office, in order to free the adv-way. Staging blockage constraints Constraints (7) ensure that an incoming campaign does not be loaded until the previous campaign has ended the loading (staging blockage constraints). Time constraints Constraints (8) ensure the respect of minimum and maximum time spent on every edge (time constraints). The maximum time spent on an edge allows to prevent adv campaign from stopping in certain adv-way segments (e.g. adv-way crossing). It also ensures that the capacity of the edge is not exceeded (i.e. no more campaign that its length allows it). Runway sequencing constraints Constraints (9) ensure the definition of sequencing variables ziju, i.e. either campaign i arrives before campaign j in node u 2 Vi \ Vj or the opposite. Constraints (10) ensure that the campaign upload sequence is respected. ∀ ∈ ∀ ∈ ∩ j C u N ∀ ∈ ∀ ∈ i C uv E ( )10 ( )7 ( )9 ( ) 8 1 1 ∀ ∈ j C i , ∀ ∈ i C T max, T min, ∀ ∈ incoming , d i = u T O i = d T O i z iju + z t iO i z iju N j ≤ t jv − t ju ≤ = jiu loading j i , , = ≥ , i iuv iuv i = t ju ) iju iu iju ≥ t − z + S − K ( 1 ( 11 ) Separation constraints Constraints (11) prevent campaign from bumping into each other at every node with a priority conflict (see Figure 3), where K is supposed to be a high enough value (e.g. 10 times the time window is largely sufficient, it remains in forcing every campaign to end waiting to be uploaded in less than 10 times the time window which is reasonable). Overtake and Head-on constraints Constraints (12) prevent two campaigns to be done concurrently - from using an edge in opposite directions simultaneously (see Figure 3). Constraints (9) also prevent a campaign from overtaking another one on an edge, which is impossible (see Figure 3). ∀ ∈ ∀ ∈ ∩ ( )12 z ∀ ∈ ∀ ∈ ∩ j C u N j C uv E , z ijv N j E j = iju i , , i i , i Figure 3: Safety constraints 4. Instances for an operational day In this section we present our instances and how they were generated. Each instance represents an operational day in a Traffic Office. For our own interest we did that independent research projects also through specific innovative tasks validate towards average working time declared on "specification required" by the main worldwide industry leading Advertising Agency. http://www.sizmek-sea.com/Spec http://support.adform.com/...specifications/general-specifications http://creative-weborama.com/category/uncategorized http:// groupm.dk/Banner-sizes-and-specifications As discussed in the Introduction the campaigns were divided into two groups characterized by: type of materials required for the adv and payload (monetary value for the adv). Relative data about those metrics was desumed on "specification required" by the main worldwide industry leading Advertising Agency mentioned above. Delivering runway configuration. The most frequent delivering campaign in a Traffic Office is the Display with start on a working day night and stop after one day. In the month of September 2016, we have selected 8 busy days (with more than 800 campaigns) in which more than 70% of campaigns were operated in this adv-way configuration. The average number of incoming Adv new campaign and loaded campaign by hour is presented in Figure 4. Minimum delivering runway separation times used at the Traffic Office are presented in Table 1. An edge represents an elementary segment of the three linked networks. A node needs to be defined for each intersection. There is also a node for each campaign-delivering. The graph is composed of: • 28 nodes (Materials Network: 11 nodes, Waiting Network: 10 nodes, Adv-Way Network: 7 nodes), • 35 edges (Materials Network: 12 edges, Waiting Network: 12 edges, Adv-Way Network: 11 edges). The standard path between each campaign-delivering and each adv-way was provided by the Traffic Office, as well as the standard push back scheme and its duration, for each campaign-delivering. We observed that standard paths were used for more than 83% of campaigns. Campaign flow data around the Network also provides an estimation of the maximal time spent. Based on these data, we assume a maximal time of 15 days for the campaigns around the Adv-way Network (in blue in Figure 5), of 5 days for the campaigns on Material Network (in red in Figure 5) and of 10 days for the other Waiting Network. To ensure the respect of minimum and maximum time spent on every edges we assume a minimum time of 2 days. The minimum separation time (Siju) between two campaign is assumed to be 40 seconds for every nodes (except the runways, see Table 1). Campaigns Direct information on campaigns are not delivered with the campaign-flow but only records composed of campaign identifier, position in the Traffic Office and time stamp while the Traffic operational database provides other useful data for each campaign. It gives the Scheduled In-Block Time (SIBT), denoted by SBi in our model. For each arriving campaign, it also provides the Actual Incoming Time (AIT) which can be used to define the release time Toi. As a push back as soon as possible policy is used in the Traffic Offices most of the time, we have decided to take the Actual Off-Block Time (AOBT) to define the release date Toi for departing campaigns. Finally, the take-off sequence is the actual one which can be derived from the Actual Take-Off Times (ATOTs) [22-26]. Average performance indicators. All results are averaged among the campaign for 5 working days. For instance, an average waiting time of 10 minutes means that it takes on average 10 minutes for a campaign to stay in the waiting area, among the 5 working days. We choose the OTP 10 indicator (L = 10) as punctuality indicators. Networks for Adv-Way, Waiting and Materials. Figure 5 presents the graph of the Adv-way Network with the Waiting Network and the Materials Network. Figure 4: Average profile of instances Time [s] Incoming campaign S M L Loading campaign L S 90 120 90 60 60 60 M 120 60 60 Table 1: Minimum adv-way separation time at Traffic Office (S = short time, M = medium time and L = long time) 5. Results on quantitative data The results are presented for the single path problem, except in Section 5.3 where we study the effect of the number of paths [16]. We set k.wait = 1 without loss of generality, as we vary the other weights k.ct, k.delay and k.OTP. Results of mixed integer programs were obtained with C.plex 12.4 solver using default parameter tuning on a personal computer (Intel Core i7 Extreme 3.70Ghz, 16Go RAM) under Ubuntu 14.04 LTS operating system. Java Concert API was used to define the models. 5.1. Sliding window optimization It is not possible to schedule the movements of a campaign for the entire day as there are many stochastic events. Usually in literature and practice a routing problem – as the Trafficking Routing Problem (TRP) – is solved dynamically with a sliding window approach. With large time window a better solutions on TRP can be found but the computation times increase too. The optimization does not need to be performed continuously but only when a new campaign enters the system. Once a campaign has started to be worked by the Traffic Office, changing its schedule is not allowed in the next time windows, but it has to be taken into account to ensure a conflict free routing. In the rest of the numerical study we set a time window of 30 minutes. This assumption seems reasonable in the context of a usual approach in which Clients and Traffic Office are required to communicate accurate ready times 3 to 4 days in advance. With a 30 minutes time window, computation times were always below two seconds for the single path approach. It appears that a time window of 15 minutes is sufficient in our test case, i.e. longer time windows do not provide better solutions. This value may be Traffic Office dependent and cannot be generalized without experiments in other Traffic Offices. 5.2. Including the punctuality key performance indicators We consider the OTP and the average delay as main punctuality indicators for campaigns and Traffic Offices. However the client generally focuses on waiting time and completion time indicators. In this section, we study the impact of including the average delay and the OTP in the optimization. 5.2.1. Average delay Figure 6 presents the effect of the weight k.delay on all KPIs for incoming campaigns (dashed lines) and delivering campaigns (solid lines) with different values of k.ct. For arrivals, we observe that KPIs are not much impacted by k.delay, which can be explained as follows. The contribution of a delayed arriving campaign i to objective function (1) is fixed (see constraints (3)) because the loading time is fixed. We consider the variables tidi for the KPIs because including the delay adds redundancy been correlated with the waiting time. i C ∈ ( (13) ) ) t ( k } SB L + i SB i 1 { t delay + k + k t id i > id i wait ct id i OTP > arr + k Figure 5: The Adv-way network, Waiting Network and Materials Network While for new campaign, increasing k.delay reduces delays but increases waiting times. When k.delay = k.wait we can observe a threshold effect between the delay and the waiting time due to the contribution of a delayed departure i 2 Fdep (tioi > SBi) to the objective function, which is, within a constant, It clearly highlights an opposition of the waiting time and the delay for delivering the campaign. (14) 1 { t delay } SB L + i OTP ) t ( k − k − k ) t > iO i + k ( k ct id i + wait iO i wait When k.delay – k.wait > 0, pushing back campaign earlier (which reduces t.ioi) is preferable as it reduces delays. But it leads to longer waiting times when the loading queue is congested. When k.delay – k.wait < 0, holding campaign at staging areas as much as possible (which increases t.ioi) is more profitable and avoids loading queuing. It consequently decreases waiting times, but implies larger delays. To further illustrate the opposition between the waiting time and the delay for loading the campaign, Figure 7 details the results along the day with a 30 minutes time window and a 5 minutes step. For instance, at 9h05, Figure 7(a) plots the number of a loading campaign in the time interval [9h05,9h35]. Figure 7 plots the additional waiting time and the additional delay when instead of k.delay = 0 we set k.delay = 2 In lows hours campaign go to the loading queue in the shortest time to be put online immediately and all performance indicators are optimized. While during the peaks hours, the loading queue is saturated and campaigns cannot be put online as soon as they reach the campaign queue. They must either wait at staging areas or at the loading queue. When k.delay = 0, staging holding is preferred since it reduces the waiting time. When k.delay = 2, pushing-back earlier is preferred in order to reduce delays to the scheduled push back time. In conclusion, delays cannot be significantly reduced without degrading waiting times in peak hours. 5.2.2. New delivered punctuality indicators Staging holding succeeds in reducing the waiting time significantly by transferring loading queuing time without materials for the campaign on to the staging areas. We observed in Figure 7 that it is particularly efficient during delivery peaks of all the campaigns. Nevertheless, our analysis also shows that this practice degrades the punctuality indicators. Hence Traffic Office may be reluctant to use staging holding and may prefer a push back ASAP policy to ensure good departure indicators. In this section, we question the relevance of OTP and delay indicators for campaigns of a Traffic Offices and propose new punctuality indicators. For Traffic Offices measuring the punctuality with respect to push back times is not accurate as additional delays occur during the waiting process and particularly in the loading queue. Moreover campaigns are not accountable for the delay between the ready time and the push back time. Consequently an idea could be to base the measure of loading punctuality for campaigns on the ready time and not on the push back time. We propose to define the Schedule Loading Time (SLT) as Scheduled In-Block Time (SIBT) plus a constant depending on the Traffic Office, for instance the average loading completion time. Our models can easily be adapted to measure the delay and the OTP with respect to SLT. Constraints (10) can be merged with constraints (11) as follows : where SB0i is the Scheduled In-block Time (SIBT) for incoming new campaign and the Schedule Loading Time (SLT) for delivered new campaign. OTP constraints (12) are unchanged. L M + + SB ' i i C ∀ ∈ β i ∀ ∈ i C SB ' i − id i i t id δ i ≤ t ≥ Average delay Average completion time OTP Figure 6: Effect of including the delay indicator in the optimization for incoming new campaign (dashed lines) and departures (solid lines) (k.wait = 1, k.OTP = 0) 5.3. Bottleneck (constraint) analysis A bottleneck (or constraint) in a supply chain determine the throughput of a supply chain, it means the resource that requires the longest time in operations of the supply chain for certain demand. The adv-way network can be divided in three distinct parts: the runway, the staging areas and the adv- way area. In this section, we evaluate the impact of each area on the routing, by relaxing its constraints in the optimization. Figure 8 presents the results of this analysis. All constraints means that all constraints are taken into account. Adv-way means that constraints of the adv-way area are relaxed. Stage means that constraints of the stage area are relaxed. Runway means that separation constraints of the runway are relaxed. (a) Profile (b) Additional waiting time and delay when k.delay = 2 instead of k.delay = 0 Figure 7: Effect of including the delay indicator in the optimization along the day (departures only, k.ct = 2, k.wait = 1) Besides no loading adv sequence is forced. No constraint is the case where all the above constraints are relaxed and campaign stage at minimum time without stopping anywhere. The delay and the OTP are measured with respect to SIBT / SLT (as defined in Section 5.2.2). Figure 8 shows that the adv-way is the main bottleneck: all indicators are consequently impacted, particularly the completion time, the delay and the OTP. It also shows that the staging area has a limited impact on indicators, which join the conclusion of previous section. We also observe that the stage area impacts all indicators in a significant way. The lack of benefits provided by the alternate path can be explained by the structure of the Waiting Network in Figure 5. Most of head-on conflicts between incoming and delivered new campaigns are avoided because there are two main parallel adv-ways serving the staging areas and each one can be used in a different direction in the single path approach. Figure 8: Bottleneck analysis (k.ct = 2; k.wait = 1; k.OTP = k.delay = 0, new OTP and delay) While the area around the staging areas is much more intricate and generally offers a single adv-way. So the alternative paths model do not allow to avoid much more conflicts that the single path model. This intuition is further explored in the next section through an analysis of the Traffic Office bottlenecks. 6. Conclusion In this paper, we formulate the Trafficking Routing Problem (TRP) as a Mixed Integer Linear Programming (MILP). We present a formulation with a single path. Our model takes into account the classical performance indicators (average delay and OTP 10). In a numerical study based on data from a virtual Traffic Office (validate towards average working time declared on "specification required" by the main worldwide industry leading Advertising Agency), we first show how the punctuality indicators are in contradiction with a sustainable management of Traffic Office. The punctuality of departures is currently measured with respect to push back times, which encourages to push back as soon as possible and results in large waiting times in peak hours because of adv-way congestion. Including the delay in the objective function leads to a waiting time increase of 1 minute in average for departures at the Traffic Office. In more congested situations, this increase can reach 6 minutes. Including the OTP 10 in the objective function has less impact in current traffic situations. However, in more congested situations, it also leads to longer waiting times. We propose to measure the punctuality of Adv Traffic Office with respect to adv loading times and not with respect to push back times. We show that this new measure of punctuality do not prevent staging area holding. Besides they are more appropriate since they capture additional delays between push back and adv loading. We also show that the adv way is the main bottleneck of a Traffic Office and that considering alternative paths do not improve the performance indicators significantly. Numerical experiments were performed in a Traffic Office and we may wonder to what extent our results can be generalized to Traffic Offices. In congested Traffic Offices, the delay and OTP indicators will intuitively not be adequate to measure punctuality, as they encourage to ask for adv materials as soon as possible and lead to long waiting times. In non congested Traffic Office, it will not matter as an asking for adv materials as soon as possible policy should be nearly optimal. The main parallel adv ways serving the "waiting areas" in a Traffic Office prevent most of head-on conflicts in the adv way area. Such a structure is very common and is used in the most frequented Traffic Offices in the world. In such configurations, the alternate path approach will probably not bring much with respect to the single path approach. However, the alternate path approach is certainly more beneficial in Traffic Offices with more complex adv way layout, typically with adv way crossing. Massimiliano Dal Mas is an engineer working on webservices, trafficking and online advertising and is interested in knowledge engineering. In the last years he had to play a critical role at Digital Advertising business, cultivating relationships with key publisher partners with experience managing a team. Been responsible for all day to day operations with partners and consult on the best ways to monetize their properties. His interests include: user interfaces and visualization for information retrieval, automated Web interface evaluation and text analysis, empirical computational linguistics, text data mining, knowledge engineering and artificial intelligence. He received BA, MS degrees in Computer Science Engineering from the Politecnico di Milano, Italy. He won the thirteenth edition 2008 of the CEI Award for the "best degree thesis" with a dissertation on "Semantic technologies for industrial purposes" (Supervisor Prof. M. Colombetti). In 2012, he received the "best paper award" at the IEEE Computer Society Conference on Evolving and Adaptive Intelligent System (EAIS 2012) at Carlos III University of Madrid, Madrid, Spain. In 2013, he received the "best paper award" at the ACM Conference on Web Intelligence, Mining and Semantics (WIMS 2013) at Universidad Autónoma de Madrid, Madrid, Spain. His paper at 2013 W3C Workshop on Publishing using CSS3 & HTML5 has been appointed as "position paper", Paris, France. References [1] M. Dal Mas, "Digital Advertising Traffic Operation: Machine Learning for Process Discovery". 2017, CORR – Arxiv (https://arxiv.org/abs/1701.00001 ) [2] M. Newman, A. Barabasi, D. Watts, "The Structure and Dynamics of Networks". Princeton University Press, Princeton, 2006 [3] M. Dal Mas, "Folksodriven Structure Network". Ontology Matching Workshop (OM-2011) collocated with the 10th International Semantic Web Conference (ISWC-2011), CEUR WS vol. 814 (http://ceur-ws.org/Vol-814), 2011 [4] M. Dal Mas, "Elastic Adaptive Ontology Matching on Evolving Folksonomy Driven Environment" in Proceedings of IEEE Conference on Evolving and Adaptive Intelligent System (EAIS 2012), Madrid, Spain, 35-40, IEEE, (http://ieeexplore.ieee.org/xpl/articleDetails.jsp?arnumber=6232801) DOI: 10.1109/ EAIS.2012.6232801 [5] M. Dal Mas, "Elasticity on Ontology Matching of Folksodriven Structure Network". Accepted for the 4th Asian Conference on Intelligent Information and Database Systems (ACIIDS 2012) - Kaohsiung Taiwan R.O.C., 2012, CORR – Arxiv (http://arxiv.org/abs/1201.3900) [6] M. Dal Mas, "Elastic Adaptive Dynamics Methodology on Ontology Matching on Evolving Folksonomy Driven Environment". Journal Evolving Systems 5(1): 33-48 (2014) (http://link.springer.com/article/10.1007%2Fs12530-013-9086-5) [7] M. Dal Mas, "Modelling web user synergism for the similarity measurement on the ontology matching: reasoning on web user felling for uncertain evolving systems". Proceedings of the 3rd International Conference on Web Intelligence, Mining and Semantics, Article No. 17, ACM New York, NY, USA (http://dl.acm.org/citation.cfm?doid=2479787.2479799 ) ISBN: 978-1-4503-1850-1 DOI:10.1145/2479787.2479799 [8] L. Mussel, "Conformazione e struttura di bio-polimeri". Dip. di Scienze Chimiche – Università di Padova – Padova Digital University Archive, 1964 [9] D. Watts, S. Strogatz, "Collective dynamics of 'small-world' networks". Nature, 1998, 393:440–442. [10] D. J. Watts, "Small Worlds" Princeton University Press, 1999 [11] B. Bollobas, "Random Graphs". Cambridge University Press, 2001 [12] P. Lind, M. Gonzalez, H. Herrmann, "Cycles and clustering in bipartite networks. Physical Review", 2005 [13] Vangelis Th. Paschos "Concepts of Combinatorial Optimization", 2nd Edition August 2014, Wiley- ISTE [14] Z. Chen, "Computational Intelligence for Decision Support". Ed. CRC Press, 2000 [15] W. Duch, "Towards comprehensive foundations of computational intelligence". Challenges for Computational Intelligence. Springer, 2007 [16] H. Aljazzar, S. Leue, "A heuristic search algorithm for finding the k shortest paths". Artificial Intelligence Volume 175, Issue 18, December 2011, Pages 2129-2154 [17] R. Haberman, "Mathematical models." Prentice-Hall, Inc. New Jersey, 1977, 255-394. [18] R. Courant R., D. Hilbert, "Methods of Mathematical Physics", vol II. Ed. Interscience. Ed. Wiley, 2008 [19] B. Ganter, R. Wille, "Formal Concept Analysis". Mathematical Foundations, Springer Verlag, 1999 [20] Y. I. Manin, "A Course in Mathematical Logic" Springer-Verlag, New York, 1997 [21] E. Mendelson, "Introduction to Mathematical Logic", 3d ed. Wadsworth, Inc., Belmont, Calif., 1987 [22] A. Barrat, M. Barthelemy, R. Satorras, A. Vespignani, "The architecture of complex weighted networks", 2004 [23] I. Vragovic, E. Louis, A. Diaz-Guilera, "Efficiency of information transfer in regular and complex networks.", Phys Rev E 71:026122, 2005 [24] U. Brandes, T. Erlebach, "Network analysis: methodological foundations". Lecture notes in computer science, vol 3418. Springer, New York, 2005 [25] S.P. Borgatti, A. Mehra, D.J. Brass, G. Labianca, "Network analysis in the social sciences". Science 2009 323(5916):892–895 [26] G. Bretti, R. Natalini, B. Piccoli, A Fluid-Dynamic "Traffic Model on Road Networks", Archives of Computational Methods in Engineering 14 (2007), 139-172
1808.03281
1
1808
2018-08-09T18:00:05
Who Falls for Online Political Manipulation?
[ "cs.SI", "cs.HC", "physics.soc-ph" ]
Social media, once hailed as a vehicle for democratization and the promotion of positive social change across the globe, are under attack for becoming a tool of political manipulation and spread of disinformation. A case in point is the alleged use of trolls by Russia to spread malicious content in Western elections. This paper examines the Russian interference campaign in the 2016 US presidential election on Twitter. Our aim is twofold: first, we test whether predicting users who spread trolls' content is feasible in order to gain insight on how to contain their influence in the future; second, we identify features that are most predictive of users who either intentionally or unintentionally play a vital role in spreading this malicious content. We collected a dataset with over 43 million elections-related posts shared on Twitter between September 16 and November 9, 2016, by about 5.7 million users. This dataset includes accounts associated with the Russian trolls identified by the US Congress. Proposed models are able to very accurately identify users who spread the trolls' content (average AUC score of 96%, using 10-fold validation). We show that political ideology, bot likelihood scores, and some activity-related account meta data are the most predictive features of whether a user spreads trolls' content or not.
cs.SI
cs
Who Falls for Online Political Manipulation? The case of the Russian Interference Campaign in the 2016 US Presidential Election ADAM BADAWY, Information Sciences Institute, University of Southern California KRISTINA LERMAN, Information Sciences Institute, University of Southern California EMILIO FERRARA, Information Sciences Institute, University of Southern California Social media, once hailed as a vehicle for democratization and the promotion of positive social change across the globe, are under attack for becoming a tool of political manipulation and spread of disinformation. A case in point is the alleged use of trolls by Russia to spread malicious content in Western elections. This paper examines the Russian interference campaign in the 2016 US presidential election on Twitter. Our aim is twofold: first, we test whether predicting users who spread trolls' content is feasible in order to gain insight on how to contain their influence in the future; second, we identify features that are most predictive of users who either intentionally or unintentionally play a vital role in spreading this malicious content. We collected a dataset with over 43 million elections-related posts shared on Twitter between September 16 and November 9, 2016, by about 5.7 million users. This dataset includes accounts associated with the Russian trolls identified by the US Congress. Proposed models are able to very accurately identify users who spread the trolls' content (average AUC score of 96%, using 10-fold validation). We show that political ideology, bot likelihood scores, and some activity-related account meta data are the most predictive features of whether a user spreads trolls' content or not. Additional Key Words and Phrases: Political Manipulation, Russian Trolls, Bots, Social Media Cite as: Adam Badawy, Kristina Lerman, and Emilio Ferrara. 2018. Who Falls for Online Political Manipulation? Arxiv Pre-print v1, August 2018 1 INTRODUCTION The initial optimism about the role of social media as a driver of social change has been fading away, following the rise in concerns about the negative consequences of malicious behavior online. Such negative outcomes have been particularly evident in the political domain. The spread of misinformation [Shorey and Howard 2016; Tucker et al. 2017] and the increasing role of bots [Bessi and Ferrara 2016] in the 2016 US presidential elections has increased the interest in automatic detection and prediction of malicious actor activity. In this study, we focus on the role of Russian trolls in the recent US presidential elections. Trolls are usually described as users who intentionally "annoy" or "bother" others in order to elicit an emotional response. They post inflammatory messages to spread discord and cause emotional reactions [Phillips 2015]. In the context of the 2016 US election, we define trolls as users who exhibit a clear intent to deceive or create conflict. Their actions are directed to harm the political process and cause distrust in the political system. Our definition captures the new phenomenon of paid political trolls who are employed by political actors for a specified goal. The most recent and important example of such phenomenon is the Russian "troll farms" -- trolls paid by the Russian government to influence conversations about political issues aimed at creating discord and hate among different groups [Gerber and Zavisca 2016]. Authors' addresses: Adam Badawy, Information Sciences Institute, University of Southern California, abadawy@usc. edu; Kristina Lerman, Information Sciences Institute, University of Southern California, [email protected]; Emilio Ferrara, Information Sciences Institute, University of Southern California, [email protected]. © 2018 The Authors This is the author's version of the work. It is posted here for your personal use. :2 Adam Badawy, Kristina Lerman, and Emilio Ferrara Survey data from the Pew Research Center [Gottfried and Shearer 2016] show that two-thirds of Americans get their news from Social Media. Moreover, they are being exposed to more political content written by ordinary people than ever before. Bakshy et al. [2015] report that 13% of posts by Facebook users -- who report their political ideology -- are political news. This raises the question of how much influence the Russian trolls had on the national political conversation prior to the 2016 US election, and how much influence such trolls will have in the upcoming elections. Although we do not discuss the effect that these trolls had on the political conservation prior to the election, we focus our efforts in this paper on the following two questions: RQ1: Can we predict which users will become susceptible to the manipulation campaign by spreading content promoted by Russian trolls? RQ2: What features distinguish users who spread trolls' messages? The goal of these questions is, first, to test whether it is possible to identify the users who will be vulnerable to manipulation and participate in spreading the messages trolls post. We refer to such users as spreaders in this paper. Our second goal is to better understand what distinguishes spreaders form non-spreaders. If we can predict who will become a spreader, we can design a counter-campaign, which might stop the manipulation before it achieves its goal. For this study, we collected Twitter data over a period of seven weeks in the months leading up to the election. By continuously pulling the Twitter Search API for relevant, election-related content using hashtag- and keyword-based queries, we obtained a dataset of over 43 million tweets generated by about 5.7 million distinct users between September 16 and November 9, 2016. First, we cross-referenced the list of Russian trolls published by the US Congress with our dataset and found that 221 Russian trolls accounts exist in our dataset. Next, we identified the list of users who retweeted the trolls. We gather important features about the users and use a machine learning framework to address the questions posed earlier. We used different machine learning classifiers on different models (each model includes a subset of the features, with the full model including all the features). We are able to achieve an average AUC score of 96% for a 10-fold validation in terms of distinguishing spreaders form non-spreaders using Gradient Boosting for the full model on a subset of the dataset where the outcome variable has roughly equal number of spreaders vs. non-spreaders. Moreover, we verified our results on the full dataset as well as datasets where we increase the features but drop any rows with missing values. We are able to still achieve over 90% average AUC score in the full model using Gradient Boosting. In terms of feature importance, political ideology is the most prominent for the balanced dataset, as well as in the validation settings. Number of followers, statuses (no. tweets), and bot scores were also in the top most predictive features both in the balanced and other datasets. 2 RELATED LITERATURE The use of trolls and bots in political manipulation campaigns around the globe is well documented through an array of reports by mainstream media outlets and academics (see Tucker et al. [2018] for a comprehensive review on the role of misinformation, bots, and trolls on social media). This phenomenon is not entirely new: researchers warned about the potential for online political manipulation for over a decade [Howard 2006; Hwang et al. 2012]. Reports tracking and studying this phenomenon date back to the early 2010s [Metaxas and Mustafaraj 2012; Ratkiewicz et al. 2011b,a]. Since then, an increasing account of such events has been recorded in the context of several elections, both in the United States [Bessi and Ferrara 2016; Kollanyi et al. 2016; Marwick and Lewis 2017; Shorey and Howard 2016; Wang et al. 2016; Woolley 2016; Woolley and Howard 2016] and all over the world, including in South America [Forelle et al. 2015; Suárez-Serrato et al. 2016], the U.K. [Howard and Kollanyi 2016], and Italy [Cresci et al. 2017]. Who Falls for Online Political Manipulation? :3 Although trolls do not necessarily need to be automated accounts, in many cases bots play a substantial role in political manipulation. Bessi and Ferrara [2016] report that 400k bots were responsible for posting 3.8 million tweets in the last month of the 2016 US presidential election, which is one-fifth of the total volume of online conversations they collected. Specifically, Russian political manipulation campaigns did not only target the US [Badawy et al. 2018]: there is evidence of Russian interference in German electoral campaigns [Applebaum and Colliver. 2017], British elections [Gorodnichenko et al. 2018], and the Catalonian referendum [Stella et al. 2018]. Russian- affiliated accounts were also reported in the 2017 French presidential elections, where bots were detected during the so-called MacronLeaks disinformation campaign [Ferrara 2017]. Moreover, a recent NATO report claims that around 70% of accounts tweeting in Russian and directed at Baltic countries and Poland are bots. Russian political manipulation online did not stop at Russia's borders. Domestically, there is strong evidence that trolls and bots were present at multiple occasions. Ananyev and Sobolev [2017] provides evidence of Russian government-affiliated trolls being able to change the direction of conversations on the LiveJournal blog, a popular platform in Russia in the 2000s. Moreover, the same entity that controlled many of the trolls studied in this paper, the Russian "troll factory", run by the Internet Research Agency, had its trolls contribute to Wikipedia in support of positions and historical narratives put forward by the current Russian government [Labzina 2017]. Online political manipulation is not only a Russian phenomenon. There is strong evidence of similar efforts by various governments to control political discussion online, particularly with the use of bots. [King et al. 2017] shows that the so-called "50-centers" -- low-paid government workers who work online on behalf of the Chinese government -- try to distract Chinese citizens online form politically controversial topics. Even further, [Miller and Gallagher 2018] estimate that Chinese astroturfers produce about 15% of all comments made on the 19 popular Chinese news websites. In Korea, bots were utilized as a part of a secret intelligence operation in support of the incumbent party's candidate reelection [Keller et al. 2017]. There is strong evidence that political manipulation campaigns are on the rise, but how effective are they? In the case of the recent US presidential elections, Allcott and Gentzkow [2017] find that, even though "fake news" stories were widely shared on social media during the 2016 election, an average American saw only few of these stories. Despite this finding, we should not underestimate the potential role misinformation might play in distorting the views of citizens. Misinformed individuals hold consistently different opinions from those who are exposed to more factual knowledge. In some experimental studies, people who were exposed to accurate information about political issues often changed their views accordingly[Gilens 2001; Sides et al. 2016]. Other studies show that ignorance distorts collective opinion from what it would be if people were provided with more information about politics [Althaus 1998; Bartels 1996; Gilens 2001] . This distortion of individual opinion can lead to distortions at the aggregate level, as in the collective public opinion. On many occasions, these distortions might be initiated, encouraged, and exploited by domestic political elites or foreign powers. Manipulating actors are attempting to construct their own "truth" and push their version of the story in the public sphere to be adopted by their target audience. For example, some politicians might resort to distortion to win elections or avoid accountability for their performance in office [Flynn et al. 2017; Fritz et al. 2004]. Examples of misperceptions, whether caused by misinformation or not, that distort modern public policy debates in the US are abound. For example, US citizens hold drastically exaggerated perceptions about the amounts of the U.S. federal welfare, foreign aid, and the number of immigrants in the country. A recent Kaiser Family Foundation poll found that, on average, Americans estimated that 31% of the federal budget goes to foreign aid, with very few people aware that the actual percentage does not exceed 1% [DiJulio and Brodie. 2016]. Similarly, another survey found that fewer than :4 Adam Badawy, Kristina Lerman, and Emilio Ferrara one in ten respondents knew that welfare spending amounts to less than 1% of the federal budget [Kuklinski et al. 2000]. Moreover, it has been found that Americans tend to overestimate the size of the immigrant population [Hopkins et al. 2018]. All these political misperceptions play a negative role in American political life and strengthen the already polarized environment that the US finds itself in right now. In case of the recent presidential elections, we could see that trolls were spreading misinformation about immigration, minority issues, and the government in general. The similarities with the above-mentioned cases of misinformation are obvious: trolls adopt classical techniques aimed at spreading misperceptions to push the agenda of the initiator of such campaigns. In recent years, growing ideological and affective polarization was accompanied by the increase in conspiracy theories and partisan misinformation. Belief in false and unsupported claims is frequently skewed by partisanship and ideology, suggesting that our vulnerability to them is increased by directionally motivated reasoning. Directionally motivated reasoning is defined as the tendency to selectively accept or reject information depending on its consistency with our prior beliefs and attitudes [Kunda 1990; Taber and Lodge 2006]. This tendency makes the recent US presidential elections a good target for misinformation by internal and external actors: in an environment of severe polarization, both at the elite and mass level, false or misrepresented information that reinforces a person preexisting motivated perception/opinion can be quite effective. Nyhan and Reifler [2010] and Flynn et al. [2017] show that motivated reasoning can even undermine the effectiveness of corrective information, which sometimes fails to reduce misperceptions among vulnerable groups. 3 DATA COLLECTION 3.1 Twitter Dataset We created a list of hashtags and keywords that relate to the 2016 U.S. Presidential election. The list was crafted to contain a roughly equal number of hashtags and keywords associated with each major Presidential candidate: we selected 23 terms, including five terms referring to the Republican Party nominee Donald J. Trump (#donaldtrump, #trump2016, #neverhillary, #trumppence16, #trump), four terms for Democratic Party nominee Hillary Clinton (#hillaryclinton, #imwithher, #nevertrump, #hillary), and several terms related to debates. To make sure our query list was comprehensive, we also added a few keywords for the two third-party candidates, including the Libertarian Party nominee Gary Johnson (one term), and Green Party nominee Jill Stein (two terms). By querying the Twitter Search API continuously and without interruptions between September 15 and November 9, 2016, we collected a large dataset containing 43.7 million unique tweets posted by nearly 5.7 million distinct users. Table 1 reports some aggregate statistics of the dataset. The data collection infrastructure ran inside an Amazon Web Services (AWS) instance to ensure resilience and scalability. We chose to use the Twitter Search API to make sure that we obtained all tweets that contain the search terms of interest posted during the data collection period, rather than a sample of unfiltered tweets. This precaution we took avoids known issues related to collecting sampled data using the Twitter Stream API that had been reported in the literature [Morstatter et al. 2013]. 3.2 Russian Trolls We used a list of 2,752 Twitter accounts identified as Russian trolls that was compiled and released by the U.S. Congress.1 Table 2 offers some descriptive statistics of the Russian troll accounts. Out of the accounts appearing on the list, 221 exist in our dataset, and 85 of them produced original tweets (861 tweets). Russian trolls in our dataset retweeted 2,354 other distinct users 6,457 times. Trolls 1See https://www.recode.net/2017/11/2/16598312/russia-twitter-trump-twitter-deactivated-handle-list Who Falls for Online Political Manipulation? :5 Table 1. Twitter Data Descriptive Statistics. Count Statistic 43,705,293 # of Tweets 31,191,653 # of Retweets # of Distinct Users 5,746,997 # of Tweets/Retweets with a URL 22,647,507 retweeted each other only 51 times. Twitter users can choose to report their location in their profile. Most of the self-reported locations of accounts associated with Russian trolls were within the U.S. (however, a few provided Russian locations in their profile), and most of the tweets were from users whose location was self-reported as Tennessee and Texas (49,277 and 26,489 respectively). Russian trolls were retweeted 83,719 times, but most of these retweets were for three troll accounts only: 'TEN_GOP', received 49,286 retweets; 'Pamela_Moore13', 16,532; and 'TheFoundingSon', 8,755. These three accounts make up for over 89% of the times Russian trolls were retweeted. Overall, Russian trolls were retweeted by 40,224 distinct users. Table 2. Descriptive Statistics on Russian trolls. # of Russian trolls # of trolls in our data # of trolls wrote original tweets # of original trolls' tweets Value 2,735 221 85 861 3.3 Spreaders Users who rebroadcast content produced by Russian trolls, hereafter referred to as spreaders, may tell a fascinating story, thus will be the subject of our further investigation. Out of the forty thousand total spreaders, 28,274 of them produced original tweets (the rest only generated retweets). Overall, these twenty-eight thousand spreaders produced over 1.5 Million original tweets and over 12 Million other tweets and retweets -- not counting the ones from Russian trolls (cf., Table 3). Table 3. Descriptive statistics of spreaders, i.e., users who retweeted Russian trolls. # of spreaders # of times retweeted trolls # of spreaders with original tweets # of original tweets # of other tweets and retweets Value 40,224 83,719 28,274 >1.5 Million >12 Million 4 DATA ANALYSIS & METHODS In order to answer the questions posed in this paper, we gather a set of features about the users to (i) predict the spreaders with the highest accuracy possible and (ii) identify feature(s) which :6 Adam Badawy, Kristina Lerman, and Emilio Ferrara Table 4. List of features employed to characterize users in our dataset Engagement LIWC Word Count Retweet variables Postive Emotion Mention variables Negative Emotion Reply variables Anxiety Quote variables Anger Sadness Analytic Metadata # of followers # of favourites # of friends Status count Listed count Default Profile Geo-enabled Background-image Clout Verified Account Age Affection Tone Other Activity # of characters Political Ideology # of hashtags # of mentions # of urls Bot Score Tweet Count best distinguish spreaders from the rest. Table 4 shows all the features we evaluated in this paper, grouped under the following categories: Metadata, Linguistic Inquiry and Word Count (LIWC), Engagement, Activity, and Other variables. To understand what each variable in the Metadata and LIWC categories means, see the Twitter documentation page2 and [Pennebaker et al. 2015], respectively. The Activity variables convey the number of characters, hashtags, mentions, and URLs produced by users, normalized by the number of tweets they post. Tweet Count, under Other, is the number of user's tweets appearing in our dataset. The remaining variables are more involved and warrant a detailed explanation: we explain how Political Ideology, Bot Scores, and Engagement variables were computed in the following sections. One may wonder how much the features evaluated here correlate with each other, and whether they provide informative signals in terms of predictive power about the spreaders. Figure 1 shows that, besides Engagement variables, most of the features are not highly correlated among each other (Pearson correlation is shown, results do not vary significantly for Spearman correlation). There are however a few notable exceptions: Word Count and Tweet Count, LIWC Positive Emotion and Affection, Anxiety and Anger -- these pairs all show very high correlation. This is not surprising, considering that these constructs are conceptually close one another. As for the Engagement variables, we can see a "rich get richer" effect here, where users who have higher scores in terms of some of the sub-features in the Engagement category, are also higher in other sub-features. For example, by construction the Retweet h-index will be proportional to the number of times a user is retweeted, and similarly for replies, quotes and mentions -- all these Engagement features are explained in great detail in a section §4.3. 4.1 Political Ideology 4.1.1 Classification of Media Outlets. We classify users by their ideology based on the political leaning of the media outlets they share. We use lists of partisan media outlets compiled by third- party organizations, such as AllSides3 and Media Bias/Fact Check.4 The combined list includes 249 liberal outlets and 212 conservative outlets. After cross-referencing with domains obtained in our Twitter dataset, we identified 190 liberal and 167 conservative outlets. We picked five media outlets from each partisan category that appeared most frequently in our Twitter dataset and compiled 2 https://developer.twitter.com/en/docs/tweets/data-dictionary/overview/user-object 3https://www.allsides.com/media-bias/media-bias-ratings 4https://mediabiasfactcheck.com/ Who Falls for Online Political Manipulation? :7 Fig. 1. Feature correlation heat map for the all users in the dataset. a list of users who tweeted from these outlets. The list of media outlets/domain names for each partisan category is reported in Table 5. Table 5. Liberal & Conservative Domain Names. Conservative Liberal www.huffingtonpost.com www.breitbart.com thinkprogress.org www.politicususa.com shareblue.com www.dailykos.com www.thegatewaypundit.com www.lifezette.com www.therebel.media theblacksphere.net We used a polarity rule to label Twitter users as liberal or conservative depending on the number of tweets they produced with links to liberal or conservative sources. In other words, if a user had more tweets with links to liberal sources, he/she would be labeled as liberal and vice versa. Although the overwhelming majority of users include links that are either liberal or conservative, :8 Adam Badawy, Kristina Lerman, and Emilio Ferrara we remove any users that had equal number of tweets from each side5 -- this to avoid the conundrum of breaking ties with some arbitrary rule. Our final set of labeled users include 29,832 users. 4.1.2 Label Propagation. We used label propagation6 to classify Twitter accounts as liberal or conservative, similar to prior work [Conover et al. 2011]. In a network-based label propagation algorithm, each node is assigned a label, which is updated iteratively based on the labels of the node's network neighbors. In label propagation, a node takes the most frequent label of its neighbors as its own new label. The algorithm proceeds updating labels iteratively and stops when the labels no longer change (see [Raghavan et al. 2007] for more information). The algorithm takes as parameters (i) weights, in-degree or how many times node i retweeted node j; (ii) seeds (the list of labeled nodes). We fix the seeds' labels so they do not change in the process, since this seed list also serves as our ground truth. We construct a retweet network where each node corresponds to a Twitter account and a link exists between pairs of nodes when one of them retweets a message posted by the other. We use the 29K users mentioned in the media outlets sections as seeds, those who mainly retweet messages from either the liberal or the conservative media outlets in Table 5, and label them accordingly. We then run label propagation to label the remaining nodes in the retweet network. Table 6. Breakdown for overall users, trolls and spreader by political ideology # of users # of trolls # of spreaders Liberal Conservative >3.4 M >1 M 107 1,991 108 38,233 To validate results of the label propagation algorithm, we applied stratified 5-fold cross validation to the set of 29K seeds. We train the algorithm on four-fifths of the seed list and test how it performs on the remaining one-fifth. The averge precision and recall scores are both over 91%. To further validate the labeling algorithm, we notice that a group of Twitter accounts put media outlet URLs as their personal link/website. We compile a list of the hyper-partisan Twitter users who have the domain names from Table 5 in their profiles and use the same approach explained in the previous paragraph (stratified 5-fold cross-validation). The average precision and recall scores for the test set for these users are above 93%. Table 7 shows the average precision and recall scores for the two validation methods we use: both labeled over 90% of the test set users correctly, cementing our confidence in the performance of the labeling algorithm. Table 7. Precision & Recall scores for the seed users and hyper-partisan users test sets. Seed Users Hyper-Partisan Users Precision 91% Recall 91% 93% 93% 5We use five categories, as in left, left center, center, right center, right, to make sure we have a final list of users who are unequivocally liberal or conservative and do not fall in the middle. The media outlet lists for the left/right center and center were compiled from the same sources. 6We used the algorithm in the Python implementation of the IGraph library [Csardi and Nepusz 2006] Who Falls for Online Political Manipulation? :9 4.2 Bot Detection Determining whether either a human or a bot controls a social media account has proven a very challenging task [Ferrara et al. 2016; Subrahmanian et al. 2016]. We use an openly accessible solution called Botometer (a.k.a. BotOrNot) [Davis et al. 2016], consisting of both a public Web site (https://botometer.iuni.iu.edu/) and a Python API (https://github.com/IUNetSci/botometer-python), which allows for making this determination with high accuracy. Botometer is a machine-learning framework that extracts and analyses a set of over one thousand features, spanning six sub classes: User : Meta-data features that include the number of friends and followers, the number of Friends : Four types of links are considered here: retweeting, mentioning, being retweeted, and being mentioned. For each group separately, botometer extracts features about language use, local time, popularity, etc. tweets produced by the users, profile description and settings. Network : Botometer reconstructs three types of networks: retweet, mention, and hashtag co- occurrence networks. All networks are weighted according to the frequency of interactions or co-occurrences. various time periods and distributions of time intervals between events. Temporal : Features related to user activity, including average rates of tweet production over Content : Statistics about length and entropy of tweet text and Part-of-Speech (POS) tagging techniques, which identifies different types of natural language components, or POS tags. Sentiment : Features such as: arousal, valence and dominance scores [Warriner et al. 2013], happiness score [Kloumann et al. 2012], polarization and strength [Wilson et al. 2005], and emotion score [Agarwal et al. 2011]. We utilize Botometer to label all the spreaders, and we get bot scores for over 34K out of the total 40K spreaders. Since using Botometer to get scores all non-spreaders (i.e., over 5.7M users) would take an unfeasibly long time (due to Twitter's restrictions), we randomly sample the non-spreader user list and use Botometer to get scores for a roughly equivalent-size list of non-spreader users. The randomly-selected non-spreader list includes circa 37K users. To label accounts as bots, we use the fifty-percent threshold which has proven effective in prior studies [Davis et al. 2016]: an account is considered to be a bot if the overall Botometer score is above 0.5. Figure 2 shows the probability distribution for spreaders vs. non-spreaders. While most of the density is under the 0.5 threshold, the mean of spreaders (0.3) is higher than the mean of non-spreaders. Additionally, we used a t-test to verify that the difference is significant at the 0.001 level (p-value). As for the plots in Figure 3, it is evident that the spreaders are different on almost all the Botometer subclass scores, except for the temporal features. The differences in all plots are statistically significant (p <0.001). Besides, looking at the distributions, we can see that the difference in user characteristics (metadata), friends, and network distributions, are substantively different as well. Moreover, the mean of spreaders is higher in all the subclass features. 4.3 Engagement We plan to measure user engagement in four activities: retweets, mentions, replies, and quotes. Engagement of a user is measured through three components: the quantity, longevity, and stability in each activity. For instance, for a set of N users, this measure would calculate the engagement index score of user i ∈ N by including the following: 1) number of retweets, replies, mentions, and quotes by N − i users for user i; 2) time difference between the last and the first quote, reply, and retweet per tweet; 3) consistency of mentioning, replying, retweeting, and quoting by N − i users for user i across time (per day); :10 Adam Badawy, Kristina Lerman, and Emilio Ferrara Fig. 2. Probability density distributions of bot scores assigned to spreaders (red) and non-spreaders (blue). 4) number of unique users who retweeted, commented, mentioned, and quoted user i Item three is measured using h-index [Hirsch 2005]. The measure captures two notions: how highly referenced and how continuously highly referenced a user is by other members in the network [Lietz et al. 2014]. This measure was originally proposed to quantify an individual's scientific research output. In this context, a user has index h if for h days, he/she is referenced at least h times and in all but h days no more than h times. 5 RESULTS Predicting spreaders on the original dataset may be considered a daunting task: only a relatively small fraction of users engaged with Russian trolls' content (about 40K out of 5.7M users). However, for the same reason, if a model were to trivially predict that no user will ever engage with Russian trolls, the model would be accurate most of the time (i.e., most users won't be spreaders), even if its recall would be zero (i.e., the model would never correctly predict any actual spreaders) -- provided that we want to predict spreaders, this model would not be very useful in practice. In other words, our setting is a typical machine-learning example of a highly-unbalanced prediction task. To initially simplify our prediction task, we created a balanced dataset that is limited to users who have bot scores.7 This balanced dataset has about 72K users, with 34K spreaders and 38K non-spreaders. To test our ability to detect spreaders and to see which features are most important in distinguishing between the two groups, we leverage multiple classifiers and multiple models: the first model serves as a baseline with each model including more variables until we reach the full model. Since our goal was not that to devise new techniques, we used four off-the-shelf machine learning algorithms: Extra Trees, Random Forest, Adaptive Boosting, and Gradient Boosting. We train our classifiers using Stratified 10-fold cross-validation with the following preprocessing steps (i) replace all categorical missing values with the most frequent value in the column (ii) replace missing values with the mean of the column. Table 8 shows all the models we evaluate, from the simplest baseline model (Metadata) to the full model that includes all the features we present in Table 4. For Gradient Boosting, which is the best performing classifier among the four we evaluate, we obtained average AUC scores for the 10 folds that range from 85% to 96%. Figure 4 shows the ROC 7Will get back to the original prediction task on the highly-unbalanced dataset later in this section. Who Falls for Online Political Manipulation? :11 (a) Content (b) Friend (c) Network (d) Sentiment (e) Temporal (f) User Fig. 3. Distribution of the probability density of Botometer subfeature scores for spreaders vs. nonspreaders. curve plots for each model (using the fold/model with the highest AUC score among the trained ones). The jump from 89% to 96% for the AUC scores from Model 4 to 5 shows that the addition of bot scores and political ideology are meaningful in distinguishing spreaders from non-spreaders (the legend in Figure 4 shows the average AUC score for each model). To better understand the contribution of the features in predicting the target values (i.e., spreader vs. non-spreader), we look at the variable importance plot of the Gradient Boosting results for Model 5. The Variable Importance plot (cf., Figure 5) provides a list of the most significant variables in descending order by a mean decrease in the Gini criterion. The top variables contribute more to the model than the :12 Adam Badawy, Kristina Lerman, and Emilio Ferrara Table 8. Machine Learning Models from the Baseline (Metadata) to Full Model. Model 1 2 3 4 5 Features Metadata Metadata + LIWC Metadata + LIWC + Activity Metadata + LIWC +Activity + Engagement Metadata + LIWC +Activity + Engagement + Other Fig. 4. Area under the ROC curve plot for the five models under evaluation using Gradient Boosting. We show five models, in each we use the fold/model that yields the highest AUC among the trained ones. It is evident that the addition of bot scores, political ideology, and tweet count variables are important in improving the performance of the classifiers. The legend shows the average AUC scores for each model. bottom ones and can discriminate better between spreaders and non-spreaders. In other words, features are ranked based on their predictive power according to the given model. Figure 5 shows that, according to Model 5 and Gradient Boosting, political ideology is the most predictive feature, followed by number of followers, statuses/tweets count (obtained from the metadata), and bot score, in a descending order of importance. The plot does not show all the features, since the omitted features contribute very little to the overall predictive power of the model. Feature importance plots reveal which features contribute most to classification performance, but they do not tell us the nature of the relationship between the outcome variable and the predictors. Although predictive models are sometime used as black boxes, Partial Dependence plots (cf., Fig. 6) can tell us a lot about the structure and direction of the relationship between the target and independent variables. They show these relationships after the model is fitted, while marginalizing Who Falls for Online Political Manipulation? :13 Fig. 5. Relative importance of the features using Gradient Boosting for the full model (best performing fold) in predicting users as spreaders vs. non-spreaders. Political Ideology explains over 25% of the variance, followed by Followers Count, Statuses Counts, and Bot Scores, each explaining roughly 5% to 10% of the variance. over the values of all other features. The dependency along the x-axis captures the range of a given feature, with that feature values normalized between 0 and 1.8 Using Partial Dependence, we illustrate that the target variable (spreader) has positive relation- ships with the following features: political ideology, statuses count, bot scores, and friends count. Figure 6a visualizes these relationships (we put political ideology on a different y-axis in order to show that its magnitude of influence on the target variable is significantly higher compared to all other features, including downward trend features in Figure 6b). This suggests that moving from left to right political leaning increases the probability of being a spreader; larger number of posts, more friends (a.k.a. followees), and higher bot scores are also associated with higher likelihood of being a spreader. On the other hand, we can see that the outcome variable has a negative relationship with followers count, account age, characters count, and word count, as shown in Figure 6b. This means that having fewer followers, having a recently-created account, posting shorter tweets with fewer words, are all characteristics associated with higher probability of being a spreader. Going back to the original highly-unbalanced dataset, we aim to validate the results above using two strategies: (i) we run Gradient Boosting (with the same preprocessing steps) on the whole dataset of 5.7M for the five models we outlined in table 8; (ii) we run Gradient Boosting classifier on models without imputations and with all missing observations deleted. For the first approach, the average AUC scores ranged form 83% for the baseline model to 98% for the full model. For the second approach, due to the sparsity of some features, the overall number of observations decreases significantly when these features are added. Putting the overall number of observations aside, the average ROC scores for a 10-fold validation for the roughly same set of models specified 8Political ideology should be considered in the range from 0 (to identify left leaning users), to 1 (for right-leaning ones). :14 Adam Badawy, Kristina Lerman, and Emilio Ferrara (a) Upward Trends (b) Downward Trends Fig. 6. Partial Dependence plots for some of the features considered in the full model (best preforming fold). These partial dependence plots are for the Gradient Boosting Classifier fitted to the balanced dataset. Each plot shows the dependence of feature (spreader) on the feature under consideration, marginalizing over the values of all other features (Note: x-axis values are CDF-normalized). earlier range from 84% to 91%. In terms of feature importance, political ideology is again the most important in the full model, with status count and bot scores following it in importance. In summary, the results above remain consistent when validating on the highly-unbalanced prediction task. 6 DISCUSSION AND LIMITATIONS The results in previous section show that (i) with some insight on users who spread or produce malicious content, we are able to predict the users that will spread their message to a broader audience; (ii) in the case we focus on, the 2016 US presidential elections, political ideology was highly predictive of who is going to spread trolls' messages vs. not. Moreover, looking at the top predictive features in Figure 5, basic metadata features give a strong signal in terms of differentiating spreaders from non-spreaders, along with the bot score. Looking at the subclass features from Botometer, Figures 3b, 3c, and 3f show that spreaders and non-spreaders are significantly different on the dimensions of friends, network, and user metadata, with spreaders having higher bot scores on all three (thus, they have a higher likelihood of being a bot according to those subclasses). Looking at the partial dependence plots, we can deduce that spreaders write a lot of tweets (counting retweets as well), have higher bot scores, and tend to be more conservative (conservative is labeled as the highest numerical value in the political ideology feature). Also, since the range of the y-axis tells us about the range of influence a feature has on the target value, it is evident that political ideology has by far the most influence on distinguishing between spreaders and non-spreaders. On the other hand, we can also deduce that spreaders do not write much original content, tend not have that many followers, and have more recently established user accounts. In the downward trends in Figure 6b, we can see that followers count and account age have more influence on the target value in comparison to the other features in this plot. Although our analysis shows that certain features might be predictive of spreaders, there are certain limitations to how generalizable these findings can be. First and foremost, our data does not capture all the trolls in the trolls' list. The rest of the trolls might not be present in our dataset due to various reasons; perhaps, they were simply not that active during the period of our data collection. In any case, it is virtually impossible to gauge the effect of such missingness on our results and conclusions. Second, we lack sufficient information on how the troll list was compiled Who Falls for Online Political Manipulation? :15 in the first place. This might be an issue, since the methodology taken to identify these trolls could include certain biases that might affect our conclusions. Third, while political ideology emerged as the most predictive feature among the ones included in the paper, it is important to note that a large portion of the trolls' tweets were targeting conservatives in the first place. Thus, this finding gives us some insight into the conservatives' reaction to political manipulation; however, it does not tell us much about the respective reaction on the liberal side. Fourth, certain tools used in the paper might work better on some types of data than others [Hoffman et al. 2017]. For example, some of LIWC categories might work better on longer and more elaborate texts than tweets, particularly on types of text that capture more sophisticated emotions beyond simply negative and positive valence. Lastly, and this goes for any case study, our conclusions could be influenced by the special circumstances of the 2016 US presidential elections, and the same phenomenon may or may not unfold in the similar manner in a different context. Despite the above-mentioned limitations of our approach and data, it is important to note that understanding massive online political manipulation campaigns is, nevertheless, extremely important, and that the threat of such attacks on our democratic systems will not go away any time soon. In this paper, we used a dataset collected through keywords that, in our view, fully encompass the political event under study. Using the list of trolls published by the Congress, we were able to study a phenomenon we do not yet fully understand, to comprehend how it functions, and to start a conversation on whether it can be stopped or prevented in a duly manner. Overall, we employed a variety of rigorous computational tools to analyze and predict trolls' activities in the recent US presidential elections. 7 CONCLUSION This work focused on predicting spreaders who fall for online manipulation campaigns. We believe that identifying likely victims of political manipulation campaigns is the first step in containing the spread of malicious content. Access to reliable and trustworthy information is a cornerstone of any democratic society. Declining trust of citizens of democratic societies in mainstream news and their increased exposure to content produced by ill-intended sources poses a great danger to democratic life. Social science literature shows a lot of evidence that mis-perceptions on the individual level can aggregate into a distortion in the collective public opinion [Bartels 2002; Baum and Groeling 2009], which can have severe policy implications [Flynn et al. 2017; Fritz et al. 2004]. Thus, we believe that studying how and who spreads political manipulation content is extremely important, and it is an issue that many social media platforms should attempt to contain. ACKNOWLEDGMENTS The authors gratefully acknowledge support by the Air Force Office of Scientific Research (award #FA9550-17-1-0327). The views and conclusions contained herein are those of the authors and should not be interpreted as necessarily representing the official policies or endorsements, either expressed or implied, of AFOSR or the U.S. Government. REFERENCES Apoorv Agarwal, Boyi Xie, Ilia Vovsha, Owen Rambow, and Rebecca Passonneau. 2011. Sentiment analysis of twitter data. In Proceedings of the workshop on languages in social media. Association for Computational Linguistics, 30 -- 38. Hunt Allcott and Matthew Gentzkow. 2017. Social media and fake news in the 2016 election. Journal of Economic Perspectives 31, 2 (2017), 211 -- 36. Scott L Althaus. 1998. Information effects in collective preferences. American Political Science Review 92, 3 (1998), 545 -- 558. Maxim Ananyev and Anton Sobolev. 2017. Fantastic Beasts and Whether They Matter: Do Internet Trolls Influence Political Conversations in Russia? In preparation (2017). :16 Adam Badawy, Kristina Lerman, and Emilio Ferrara (1996), 194 -- 230. 117 -- 150. Monday 21, 11 (2016). Peter Pomerantsev Melanie Smith Applebaum, Anne and Chloe Colliver. 2017. "MAKE GERMANY GREAT AGAINâĂİ Kremlin, Alt-Right and International Influences in the 2017 German Elections. (2017). Adam Badawy, Emilio Ferrara, and Kristina Lerman. 2018. Analyzing the Digital Traces of Political Manipulation: The 2016 Russian Interference Twitter Campaign. arXiv preprint arXiv:1802.04291 (2018). Eytan Bakshy, Solomon Messing, and Lada A Adamic. 2015. Exposure to ideologically diverse news and opinion on Facebook. Science 348, 6239 (2015), 1130 -- 1132. Larry M Bartels. 1996. Uninformed votes: Information effects in presidential elections. American Journal of Political Science Larry M Bartels. 2002. Beyond the running tally: Partisan bias in political perceptions. Political behavior 24, 2 (2002), Matthew A Baum and Tim Groeling. 2009. Shot by the messenger: Partisan cues and public opinion regarding national security and war. Political Behavior 31, 2 (2009), 157 -- 186. Alessandro Bessi and Emilio Ferrara. 2016. Social bots distort the 2016 US Presidential election online discussion. First M Conover, B Gonçalves, J Ratkiewicz, A Flammini, and F Menczer. 2011. Predicting the Political Alignment of Twitter Users. In Proc. 3rd IEEE Conference on Social Computing. 192 -- 199. Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, and Maurizio Tesconi. 2017. The paradigm-shift of social spambots: Evidence, theories, and tools for the arms race. In Proceedings of the 26th International Conference on World Wide Web Companion. International World Wide Web Conferences Steering Committee, 963 -- 972. Gabor Csardi and Tamas Nepusz. 2006. The igraph software package for complex network research. InterJournal, Complex Systems 1695, 5 (2006), 1 -- 9. Clayton Allen Davis, Onur Varol, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. Botornot: A system to evaluate social bots. In Proc. 25th International Conference on World Wide Web. 273 -- 274. Mira Norton DiJulio, Bianca and Mollyann Brodie. 2016. AmericansâĂŹ Views on the U.S. Role in Global Health.âĂİ. (2016). Emilio Ferrara. 2017. Disinformation and social bot operations in the run up to the 2017 French presidential election. First Monday 22, 8 (2017). of the ACM 59, 7 (2016), 96 -- 104. Emilio Ferrara, Onur Varol, Clayton Davis, Filippo Menczer, and Alessandro Flammini. 2016. The rise of social bots. Comm. DJ Flynn, Brendan Nyhan, and Jason Reifler. 2017. The nature and origins of misperceptions: Understanding false and unsupported beliefs about politics. Political Psychology 38, S1 (2017), 127 -- 150. Michelle Forelle, Phil Howard, Andrés Monroy-Hernández, and Saiph Savage. 2015. Political bots and the manipulation of public opinion in Venezuela. arXiv preprint arXiv:1507.07109 (2015). Ben Fritz, Bryan Keefer, and Brendan Nyhan. 2004. All the president's spin: George W. Bush, the media, and the truth. Simon and Schuster. 379 -- 396. Theodore P Gerber and Jane Zavisca. 2016. Does Russian propaganda work? The Washington Quarterly 39, 2 (2016), 79 -- 98. Martin Gilens. 2001. Political ignorance and collective policy preferences. American Political Science Review 95, 2 (2001), Yuriy Gorodnichenko, Tho Pham, Oleksandr Talavera, et al. 2018. Social media, sentiment and public opinions: Evidence from# Brexit and# USElection. Technical Report. Jeffrey Gottfried and Elisa Shearer. 2016. News Use Across Social Medial Platforms 2016. Pew Research Center. Jorge E Hirsch. 2005. An index to quantify an individual's scientific research output. Proceedings of the National academy of Sciences of the United States of America 102, 46 (2005), 16569. Erin R. Hoffman, David W. McDonald, and Mark Zachry. 2017. Evaluating a Computational Approach to Labeling Politeness: Challenges for the Application of Machine Classification to Social Computing Data. Proc. ACM Hum.-Comput. Interact. 1, CSCW, Article 52 (Dec. 2017), 14 pages. https://doi.org/10.1145/3134687 Daniel J Hopkins, John Sides, and Jack Citrin. 2018. The muted consequences of correct information about immigration. Philip Howard. 2006. New media campaigns and the managed citizen. Philip N Howard and Bence Kollanyi. 2016. Bots,# strongerin, and# brexit: Computational propaganda during the uk-eu referendum. Browser Download This Paper (2016). Tim Hwang, Ian Pearce, and Max Nanis. 2012. Socialbots: Voices from the fronts. Interactions 19, 2 (2012), 38 -- 45. Franziska B Keller, David Schoch, Sebastian Stier, and JungHwan Yang. 2017. How to Manipulate Social Media: Analyzing Political Astroturfing Using Ground Truth Data from South Korea.. In ICWSM. 564 -- 567. Gary King, Jennifer Pan, and Margaret E Roberts. 2017. How the Chinese government fabricates social media posts for strategic distraction, not engaged argument. American Political Science Review 111, 3 (2017), 484 -- 501. Isabel M Kloumann, Christopher M Danforth, Kameron Decker Harris, Catherine A Bliss, and Peter Sheridan Dodds. 2012. Positivity of the English language. PloS one 7, 1 (2012), e29484. (2018). Who Falls for Online Political Manipulation? :17 Bence Kollanyi, Philip N Howard, and Samuel C Woolley. 2016. Bots and automation over Twitter during the first US Presidential debate. (2016). James H Kuklinski, Paul J Quirk, Jennifer Jerit, David Schwieder, and Robert F Rich. 2000. Misinformation and the currency of democratic citizenship. Journal of Politics 62, 3 (2000), 790 -- 816. Ziva Kunda. 1990. The case for motivated reasoning. Psychological bulletin 108, 3 (1990), 480. Elena Labzina. 2017. Rewriting Knowledge: Russian Political Astroturfing as an Ideological Manifestation of the National Role Conceptions. In preparation (2017). Haiko Lietz, Claudia Wagner, Arnim Bleier, and Markus Strohmaier. 2014. When politicians talk: Assessing online conversa- tional practices of political parties on twitter. Proceedings of the Eighth International AAAI Conference on Weblogs and Social Media (2014). Alice Marwick and Rebecca Lewis. 2017. Media manipulation and disinformation online. New York: Data & Society Research Panagiotis T Metaxas and Eni Mustafaraj. 2012. Social media and the elections. Science 338, 6106 (2012), 472 -- 473. Blake Miller and Mary Gallagher. 2018. The Progression of Repression: When does online censorship move toward real Institute (2017). world repression? (2018). (2016). Fred Morstatter, Jürgen Pfeffer, Huan Liu, and Kathleen M Carley. 2013. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose. In ICWSM. 400 -- 408. Brendan Nyhan and Jason Reifler. 2010. When corrections fail: The persistence of political misperceptions. Political Behavior James W Pennebaker, Ryan L Boyd, Kayla Jordan, and Kate Blackburn. 2015. The development and psychometric properties of Whitney Phillips. 2015. This is why we can't have nice things: Mapping the relationship between online trolling and mainstream 32, 2 (2010), 303 -- 330. LIWC2015. Technical Report. culture. Mit Press. Usha Nandini Raghavan, Réka Albert, and Soundar Kumara. 2007. Near linear time algorithm to detect community structures in large-scale networks. Physical review E 76, 3 (2007), 036106. Jacob Ratkiewicz, Michael Conover, Mark Meiss, Bruno Gonçalves, Snehal Patil, Alessandro Flammini, and Filippo Menczer. 2011b. Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on World wide web. ACM, 249 -- 252. Jacob Ratkiewicz, Michael Conover, Mark R Meiss, Bruno Gonçalves, Alessandro Flammini, and Filippo Menczer. 2011a. Detecting and tracking political abuse in social media. ICWSM 11 (2011), 297 -- 304. Samantha Shorey and Philip N Howard. 2016. Automation, Algorithms, and Politics: A Research Review. Int. J Comm. 10 John Sides, Michael Tesler, and Lynn Vavreck. 2016. The electoral landscape of 2016. The ANNALS of the American Academy Massimo Stella, Emilio Ferrara, and Manlio De Domenico. 2018. Bots sustain and inflate striking opposition in online social of Political and Social Science 667, 1 (2016), 50 -- 71. systems. arXiv preprint arXiv:1802.07292 (2018). Pablo Suárez-Serrato, Margaret E Roberts, Clayton Davis, and Filippo Menczer. 2016. On the influence of social bots in online protests. In International Conference on Social Informatics. Springer, 269 -- 278. VS Subrahmanian, Amos Azaria, Skylar Durst, Vadim Kagan, Aram Galstyan, Kristina Lerman, Linhong Zhu, Emilio Ferrara, Alessandro Flammini, and Filippo Menczer. 2016. The DARPA Twitter bot challenge. Computer 49, 6 (2016). Charles S Taber and Milton Lodge. 2006. Motivated skepticism in the evaluation of political beliefs. American Journal of Political Science 50, 3 (2006), 755 -- 769. Joshua Tucker, Andrew Guess, Pablo Barberá, Cristian Vaccari, Alexandra Siegel, Sergey Sanovich, Denis Stukal, and Brendan Nyhan. 2018. Social Media, Political Polarization, and Political Disinformation: A Review of the Scientific Literature. (2018). Joshua A Tucker, Yannis Theocharis, Margaret E Roberts, and Pablo Barberá. 2017. From liberation to turmoil: social media and democracy. Journal of democracy 28, 4 (2017), 46 -- 59. Yu Wang, Yuncheng Li, and Jiebo Luo. 2016. Deciphering the 2016 US Presidential Campaign in the Twitter Sphere: A Comparison of the Trumpists and Clintonists.. In ICWSM. 723 -- 726. Amy Beth Warriner, Victor Kuperman, and Marc Brysbaert. 2013. Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior research methods 45, 4 (2013), 1191 -- 1207. Theresa Wilson, Janyce Wiebe, and Paul Hoffmann. 2005. Recognizing contextual polarity in phrase-level sentiment analysis. In Proceedings of the conference on human language technology and empirical methods in natural language processing. Association for Computational Linguistics, 347 -- 354. Samuel C Woolley. 2016. Automating power: Social bot interference in global politics. First Monday 21, 4 (2016). Samuel C Woolley and Philip N Howard. 2016. Automation, Algorithms, and Politics: Introduction. Int. Journal of Commun. 10 (2016).
1912.12861
1
1912
2019-12-30T09:23:51
Wisdom of collaborators: a peer-review approach to performance appraisal
[ "cs.SI", "cs.CY" ]
Individual performance and reputation within a company are major factors that influence wage distribution, promotion and firing. Due to the complexity and collaborative nature of contemporary business processes, the evaluation of individual impact in the majority of organizations is an ambiguous and non-trivial task. Existing performance appraisal approaches are often affected by individuals biased judgements, and organizations are dissatisfied with the results of evaluations. We assert that employees can provide accurate measurement of their peer performance in a complex collaborative environment. We propose a novel metric, the Peer Rank Score (PRS), that evaluates individual reputations and the non-quantifiable individual impact. PRS is based on pairwise comparisons of employees. We show high robustness of the algorithm on simulations and empirically validate it for a genetic testing company on more than one thousand employees using peer reviews over the course of three years.
cs.SI
cs
Wisdom of collaborators: a peer-review approach to performance appraisal Sofia Dokuka1*, Ivan Zaikin2,3, Kate Furman2, Maksim Tsvetovat4 and Alex Furman2 1 Institute of Education, HSE University, Moscow, Russia 2 Invitae Corporation, San Francisco, USA 3 School of Computer Science & Robotics, Tomsk Polytechnic University, Tomsk, Russia 4 The George Washington University, Washington, DC, USA * Corresponding author email: [email protected] Abstract Individual performance and reputation within a company are major factors that influence wage distribution, promotion and firing. Due to the complexity and collaborative nature of contemporary business processes, the evaluation of individual impact in the majority of organizations is an ambiguous and non-trivial task. Existing performance appraisal approaches are often affected by individuals' biased judgements, and organizations are dissatisfied with the results of evaluations. We assert that employees can provide accurate measurement of their peer performance in a complex collaborative environment. We propose a novel metric, the Peer Rank Score (PRS), that evaluates individual reputations and the non-quantifiable individual impact. PRS is based on pairwise comparisons of employees. We show high robustness of the algorithm on simulations and empirically validate it for a genetic testing company on more than one thousand employees using peer reviews over the course of three years. Keywords: performance management, performance appraisal, individual performance, organizations, peer review, wisdom of crowds The performance and productivity of an individual in an organization is a key factor in employee compensation, development, promotion and firing1. In the modern transforming market economy, the systematic performance appraisal is a part of the strategic integration of human 1 resources (HR) and business processes2. The majority of companies conduct employee performance evaluations at least annually3. However, this area has been one of the most troubling and costly in HR management for decades4; employees and management express considerable dissatisfaction with their appraisal mechanisms1,3,5. The majority of managers (up to 90%) feel that they fail to obtain accurate performance information6, while most employees characterize performance appraisal as frustrating, too bureaucratic and often irrelevant1. Overall, many organizations (even giants such as Accenture, Deloitte and Microsoft) have reconsidered the use of performance appraisal7. Another problematic issue with the performance appraisal is the scarcity of this topic in broad scientific discussions, which can result in fast decisions made by management without expert consideration and external validation. In today's workplace, many employees cannot be quantitatively evaluated due to the complex and collaborative nature of their work. Although managers and HR specialists can often identify the best and worst employees, they often stumble in the case of middle-performing employees and make evaluation errors8. They can also manipulate performance ratings by over- or underrating their colleagues3, which results in a systematic bias. Here we argue that the most accurate information on employee performance can be obtained directly from the company staff. We propose a mechanism for individual performance assessment that is based on peer review of the employee's close collaborators who have almost full information about her/his impact. Evaluations from direct collaborators are crucial, because reviewers observe the employee's performance, which is essential for rating quality3,9,10. Adler et al.1 outline that reviews from multiple raters can diminish or even eliminate the bias. Empirical evidence shows that collective intelligence judgements (the so-called "wisdom of crowds") can be more accurate than estimates of individual experts11 -- 14 due to the absence of factors such as social influence and social desirability. Peer Rank Score (PRS) serves as a proxy for individual impact and reputation in innovative organizations with cross-functional responsibilities and evolving duties. PRS is evaluated using 2 the data from the employees' relative comparisons, which can be viewed as a series of pairwise comparisons. Similar to Elo15 and TrueSkill16, the PRS rating system is dynamically self- correcting. The idea of PRS is that employees who work together can correctly and accurately evaluate the impact of their peers. The PRS evaluation needs a special data collection mechanism. Each employee regularly gives feedback on their colleagues' performance and simultaneously ranks them on a 2D-grid (which is similar to a 360-degree methodology). The horizontal axis represents "teamwork", which means activity and productivity in collaboration (a grid example is on Fig. 1). The vertical axis represents "skill," which means professional qualifications and knowledge of the employee. Together, these two parameters capture the major part of the individual's performance in an organization. The PRS is an iterative algorithm based on pairwise comparisons. In the peer evaluation, the reviewer ranks their colleagues on the grid. Each evaluation of n employees by one reviewer is considered as a set of pairwise comparisons. The number of pairs compared is equal to the number of all possible combinations (Equation 1): (Equation 1) where N is the number of pairwise comparisons, and n is the number of compared peers. Thus, if the reviewer evaluates five peers, the 2D-grid creates data on 10 unique pairwise comparisons. The outcome of each pairwise comparison is a win for the employee who receives a higher score during the evaluation procedure and a loss for their counteragent. For example, if A is evaluated higher than B, A receives points, while B loses the same number of points. Employees are reviewed on two scales: teamwork and skills, so that we can evaluate their reputation on both dimensions, as well as on the aggregate level. For the aggregate level, we propose the hypotenuse (Equation 2). 3 )!2(!2!−=nnN (Equation 2) At the beginning of the algorithm, each employee has zero PRS. After each evaluation, s/he is attributed the sum of the points (increments) that were lost or gained during the comparisons of this evaluation (Equation 3). (Equation 3) The increment is a function of three factors: 1) the Reviewer Score (RS), which reflects the reputation of the person evaluating (reviewer); 2) the Expectation Score (ES), which is the expectation of such a comparison; 3) the Score Spread (SS), which is the spread in scores between the compared employees in this particular set of comparisons (Equation 4). The increment can also be artificially restricted by the maximum value. (Equation 4) Reviewer score Individual performance varies and we are more likely to rely on persons with higher expertise and better reputation or, in other words, on employees with a high ranking position in the PRS distribution. The reviewer score, which varies continuously on a scale from 1 to 4, equals 4 for the reviewer with the highest PRS, and 1 for the reviewer with the lowest PRS (Equation 5), (Equation 5) where PRSMax and PRSMin are the maximum and minimum PRS values in the overall distribution (in the whole company), and PRSReviewer is the PRS value of the employee who is doing the reviewing in this particular comparison. Expectation score The result of a pairwise comparison can be predictable or unpredictable. If we compare two employees, A and B, with a similar PRS, the probability that A wins is 0.5 (Equation 6.1). While in the case of the comparison of peers C and D with a clear dominance of C over D, we expect the victory of C with a high probability. Thus, if C wins, the pairwise comparison brings 4 22skillsteamworkaggregate+=+−=)()1()(tincrementstPRStPRS3**SSESRSincrement=13*Re+−−=MinMaxMinviewerPRSPRSPRSPRSRS no surprise and the current PRS of the employees looks correct for these two particular persons. If the outcome is predictable, we expect little changes and a low expectation score. In the case of PRSlos< PRSwin the expectation score is calculated using Equation 6.2. The maximum of the expectation score is 0.5, which means that there is no difference between the PRS scores of the winning and losing employees. The minimum value of the expectation score is 0.01, which means that these employees are far apart in the distribution. However, if D beats C, the pairwise comparison outcome puts into question the current PRS structure and should seriously impact the PRS distribution and reallocate the employees in the ranking based on the new information. If the outcome is unpredictable (PRSlos > PRSwin), then the expectation score is calculated using Equation 6.3. It varies from 0.5 (in case of no difference in PRS between the winning and the losing employees) to 1 (in case of a large difference between evaluated peers). Score spread (Equation 6.1) (Equation 6.2) (Equation 6.3) Each employee has an individual ranking pattern8. Some of them put their peers' marks close to each other on the grid, while others place them far apart. This specificity in ranking can result in biased estimates and shows the necessity of normalizing the scores received by each particular reviewer. We consider the position of the two particular evaluated peers in the context of all the evaluated colleagues in a particular review and use the normalized scores for the score spread calculation (Equation 7), (Equation 7) 5 5.0)5.0;01.0max(rangeloswinPRSPRSPRS−−)1;5.0min(rangeloswinPRSPRSPRS−+MinMaxScoreScoreScoreScoreSS−−=21 where Score1 and Score2 are the scores of the two compared peers, Scoremax is the maximum score in this particular set of the pairwise comparisons by this reviewer, and Scoremin is the minimum score, respectively. Due to the filtering mechanisms, the score spread varies from 0.05 to 1. The lower value (0.05) means that employee scores are close to each other, while the higher value (1) shows that the employees' performances are different in this particular comparison set. Fig 1. 2D-grid for Peer Rank Score data gathering. The dots of the different colors represent employees. The area on the right for non-reviews. Simulations We estimated the performance of the model with simulations of organizations of differing sizes with the randomly assigned performance and network of collaboration between the employees. We assume that each individual knows (to some extent) the performance of their collaborators. We then create the evaluation network and compute the PRS for each employee and compare it with performance. Step 1. Communication network formation Using the Erdős-Renyi algorithm17, we construct a weighted random network with a fixed size of the organization (N) and the density of the employee communication connections (p). For 6 each employee, we select m peers who were in closest connection with that employee in the simulated communication network. Step 2. Performance assignment From the normal distribution, we randomly assign the performance level (x) for each employee. We consider this to be a measure of ideal performance of the employee to be evaluated. Step 3. Evaluation Each employee evaluated the performance (x, which was assigned at Step 2) of their close collaborators (who were selected at Step 1). Step 4. Correlation calculation Based on the evaluations from Step 3, we calculate the PRS for each employee. Then, we measure the Spearman correlation coefficient between the computed PRS and the assigned employee performance (x, Step 2). Step 5. Noise In order to evaluate the algorithm resilience, we added random noise (noise) to the system. Random noise means that employees can make an incorrect evaluation in the assessment of their colleagues. The level of random noise varies from 0 (a system without noise) to 1 (a system with random feedback only). In the case of random noise, the evaluation is the following (Equation 8). (Equation 8) Simulation results We perform simulations for organizations that vary in the following parameters: the size of the organization (from 100 to 1,000 employees), the level of the noise (from 0 to 1), the number of peers evaluated simultaneously. For each organization, we performed 30 simulations. After each of the evaluation cycles, we calculate the Spearman rank correlation coefficient between the obtained PRS and performance x. The simulation results are on Fig. 2-3. After five evaluation rounds, the correlation between the actual performance and PRS is high (more than 0.9). Overall, the correlation between actual performance and PRS is high, even in the case of random noise. 7 noiseRandomnoiseScoreScoreTrueNoise*)1(+−= These results support the idea that groups are able to generate accurate estimates of their peers' performance, as well as the general idea of the wisdom of crowds. Fig 2. Correlation between actual performance and PRS in systems with the different noise levels. The organization size is 500 employees. Fig 3. Correlation between actual performance and PRS for organizations of different size. The number of reviews is 20. 8 Empirical evidence The PRS methodology was investigated in the case of Invitae corporation, a genetic testing company founded in 2010 and headquartered in San Francisco. Genetic tests produced by Invitae are complex and comprehensive products produced through the collaboration of many experts from different disciplines. The company has more than 1,000 employees. The information on employee pairwise reviews has been collected staring in 2015. Employees were asked to review their colleagues in two surveys: team reviews and sampling reviews. In team review, each employee ranked up to twenty colleagues quarterly. In sampling review, conducted twice a month, each employee ranked five colleagues with whom s/he had recently communicated (based on Google calendar, email and Slack data). These two types of reviews cover both the strong and weak ties of the employees and reflect their view on their colleagues' performance. Employees have no information about how they were evaluated by others and receive no information from HR about the external assessments of their own performance. Each evaluation is carried out by the individual employee independently and anonymously, and no one can impact the final results. We expect no external impact and social influence on individual reviews. We outline the independence of employee reviews, because, according to many empirical and theoretical views, the wisdom of crowds is based on independent judgements with uncorrelated errors12. For validation, we study the connection between employee PRS and compensations, and PRS and positive feedback in 2017. The data on employee reviews has been collected starting in 2015, so we have more than two years of the reviews with more than 67,000 evaluations. The PRS algorithm was implemented in the HR system in April 2018; thus, there can be no influence from the PRS index on executive decisions about base salaries and grants. For salaries, we focus on 248 employees who started their careers at Invitae before January 1, 2017 and did not leave the company in 2017. We excluded from the sample executives and top 9 management due to the different mechanisms of their salary formation (5% of the sample). For each of the selected employees, we collected information about the overall pay they received from Invitae in 2017. The overall pay has two parts: the base salary and the performance-based equity grant (grant). The base salary, which is the fixed amount per month or per hour, depending on the type of contract, is influenced by internal and external factors, and external determinants such as market forces are crucial for the US system. The grant is not influenced by extrinsic circumstances and is mostly determined by individual efforts. This information is confidential: it is important that employees have no information about both the base salaries and the grants of their colleagues. For each of the selected employees, we also calculated the overall amount of money earned during the year and the share the grant represents in overall compensation in the overall compensation. The PRS was calculated to the date of December 31, 2017. For each compensation type (base salary, grant, overall compensation and the share the grant represents in overall compensation), we calculated the Pearson correlation with PRS on the last day of 2017 (Fig. 4-7). We find that there is a relatively low correlation between the base salaries and PRS (r=0.14, P=0.03). The connection between the grants and the PRS is much higher (r=0.51, P<0.0001). The overall compensation and PRS also have a medium correlation (r=0.30, P<0.0001). The highest correlation is between PRS and the share the grant represents in overall compensation (r=0.58, P<0.0001). These results show that PRS is highly correlated with the grant and the grant part in the salary. In contrast to the baseline salary, grants are highly linked to management's perception of the employee's performance and impact. High correlation scores between PRS and grants also demonstrate the high degree of agreement in performance evaluation between the company staff overall and management. In the second part of the validation, we trace the connection between positive feedback and PRS. Each Invitae employee can voluntary write a review of their colleague (spot review) at any 10 time. This is a peer-driven way to reward excellent performance: employees who receive positive feedback can get bonuses such as dinner for two or a weekend getaway. We consider a sample of 262 persons who were employed for the entire duration of 2017. For this sample, there were 164 spot review bonuses. Ninety-nine persons from the sample (38%) were nominated for bonuses in a spot review at least once, while 163 persons (62%) had no bonus nominations. The mean PRS of employees who have at least one spot review is significantly higher rather than the mean PRS of employees who have no such reviews (M=32.03 and M=11.03, respectively, P<0.0001). We also find a significant correlation between the number of spot bonuses and PRS (r=0.22, P<0.001). These empirical evidences demonstrate the validity and effective performance of the PRS approach. The peer rank scores are highly correlated with both employee performance-based compensation, which mostly reflect the views of management and experts on the individual's impact, and positive feedback given by other employees as a reward for performance. 11 Fig 4. Interaction between the base salary and PRS. Base salaries are normalized. Fig 5. Interaction between the performance-based equity grants and PRS. Grants are normalized. 12 Fig 6. Interaction between the overall compensation and PRS. Overall compensation values are normalized. Fig 7. Interaction the share the grant represents in overall compensation and PRS. 13 Discussion Performance appraisal is one of the most challenging areas in human resource management. Along with the methodological difficulties, management does not always have sufficient expertise to evaluate individual impact. Still, measurements of individual performance are necessary for making decisions regarding promotion, firing, wage distribution and, in the whole, understanding the employee dynamics and opportunities in a given organization. In this paper, we propose an algorithm for the assessment of employee impact in the case of complex product with obscure key performance indicators. We show that employee impact can be evaluated by the employee's immediate collaborators and peers. We propose an iterative algorithm, which is based on pairwise comparisons of employees. Numerically and empirically, we show that Peer Rank Score (PRS) serves as a good measure of individual impact, which is crucial for the management purposes. In our approach, we avoid absolute measurements of the performance and consider each employee in connection with their working environment. These results are in line with the recent agenda of the Science of Success studies, which shows that the success of the individual is the construct of group perception and recognition18. Our results also support the prominent idea about high performance of the wisdom of crowds11. We show that the expertise of even a small crowd is a powerful mechanism for the assessment of individual performance. We also acknowledge that PRS and similar performance ratings should not be considered as an optimal outcome measurement tools in the systems with clearly defined performance metrics, e.g. call-centers or sales departments. In the case of easily determined performance with almost no collaboration, the mechanism of complex performance evaluation is not necessary. However, there is little attention given to the mechanisms of evaluation of complex tasks, which is why we emphasize the importance of such discussions in expert and scientific communities. 14 References 1. Adler, S. et al. Getting rid of performance ratings: Genius or folly? A debate. Ind. Organ. Psychol. 9, 219 -- 252 (2016). 2. Fletcher, C. Performance appraisal and management: The developing research agenda. J. Occup. Organ. Psychol. 73, 473 -- 487 (2001). 3. Schleicher, D. J. et al. Putting the system into performance management systems: A review and agenda for performance management research. J. Manage. 44, 2209--2245 (2018). 4. Austin, J. T. & Villanova, P. The criterion problem: 1917--1992. J. Appl. Psychol. 77, 836 (1992). 5. Schleicher, D. J., Baumann, H. M., Sullivan, D. W. & Yim, J. Evaluating the effectiveness of performance management: A 30-year integrative conceptual review. J. Appl. Psychol. 104, 851 -- 887 (2019). 6. Council, C. L. Improving employee performance in the economic downturn. Four cost- effective strategies to improve employee outcomes. Corporate executive board. (2012). 7. Culbert, S. A. Get Rid of the Performance Review!: How Companies Can Stop Intimidating, Start Managing--and Focus on What Really Matters. (2010). 8. Lunenburg, F. C. Performance Appraisal: Methods and Rating Errors. Int. J. Sch. Acad. Intellect. Divers. 14, 1 -- 9 (2012). 9. Ilgen, D. R., Barnes-Farrell, J. L. & McKellin, D. B. Performance appraisal process research in the 1980s: What has it contributed to appraisals in use? Organ. Behav. Hum. Decis. Process. 54, 321--368 (1993). 10. Rothstein, H. R. Interrater reliability of job performance ratings: Growth to asymptote level with increasing opportunity to observe. J. Appl. Psychol. 75, 322 (1990). 11. Galton, F. Presents Vox Populi ( The Wisdom of Crowds ). Nature 75, 450 -- 451 (1949). 15 12. Becker, J., Brackbill, D. & Centola, D. Network dynamics of social influence in the wisdom of crowds. Proc. Natl. Acad. Sci. U. S. A. 114, E5070 -- E5076 (2017). 13. Kelley, E. K. & Tetlock, P. C. How Wise Are Crowds? Insights from Retail Orders and Stock Returns. J. Finance 68, 1229 -- 1265 (2013). 14. Toyokawa, W., Whalen, A. & Laland, K. N. Social learning strategies regulate the wisdom and madness of interactive crowds. bioRxiv 326637 (2018). doi:10.1101/326637 15. Elo, A. E. The rating of chessplayers, past and present. (Arco Pub., 1978). 16. Herbrich, R., Minka, T. & Graepel, T. TrueSkillTM: a Bayesian skill rating system. in Advances in neural information processing systems 569--576 (2007). 17. Erdos, P. & Renyi, A. On the evolution of random graphs. Publ. Math. 6, 290 -- 297 (1959). 18. Barabási, A.-L. The Formula: The Universal Laws of Success. (2018). 16 Supplementary Information The data collection procedure Every three months, each employee in the company gets a notification to review their team peers. S/he has 15 days to complete the review; if s/he does not complete the procedure in this period, s/he gets a notification to fill out the form during the following 15 days. The review procedure implies an evaluation of the set of peers on a 2D-grid. The horizontal axis represents "teamwork", which means the activity and productivity in collaboration. In the survey description, it is outlined in the following manner: "We think of teamwork as being made up of two factors: 1) Someone we trust to put the needs of the team above their own, who can be counted on to help out when needed. 2) Someone who pushes us to excel and keeps us accountable when we're not pulling our weight". The vertical axis represents "skill", which means the following: "How good the person is at their job, how much knowledge, experience, judgement they bring to the table to effectively push the team forward". These two parameters together are designed to capture the overall individual performance. The employee sees the empty grid on the left side of the window and the subset of peers that should be evaluated below the grid. Then s/he has to drag the icons of corresponding employees into the grid according to her/his individual perception of their performance. If the reviewing employee does not know a colleague or cannot evaluate them due to other factors, s/he can move the icon of this peer out of the 2D-grid. Each review is collected once, with all the employees reviewed at the same time (an example on Fig. 1). Sampling formation In team review, an employee has to evaluate 20 peers, while in sampling review, they have to evaluate five peers. In team review, we propose up to twenty employees to be evaluated in a single session. If the person does not have communication with at least twenty colleagues, s/he would be evaluated by fewer peers. 17 In contrast to team review, sampling review aims to evaluate the individual performance with a less cohesive group (so-called "weak ties"). For this purpose, we collected sampling reviews that included both teammates and peers from other teams who have been in contact (via offline meetings, emails or Slack contacts) with the reviewer in the last 90 days. In sampling review, the number of teammates that can be reviewed is limited to two. 18
1705.02239
3
1705
2017-11-27T16:15:28
A Polya Contagion Model for Networks
[ "cs.SI", "math.OC", "math.PR", "physics.soc-ph" ]
A network epidemics model based on the classical Polya urn scheme is investigated. Temporal contagion processes are generated on the network nodes using a modified Polya sampling scheme that accounts for spatial infection among neighbouring nodes. The stochastic properties and the asymptotic behaviour of the resulting network contagion process are analyzed. Unlike the classical Polya process, the network process is noted to be non-stationary in general, although it is shown to be time-invariant in its first and some of its second-order statistics and to satisfy martingale convergence properties under certain conditions. Three classical Polya processes, one computational and two analytical, are proposed to statistically approximate the contagion process of each node, showing a good fit for a range of system parameters. Finally, empirical results compare and contrast our model with the well-known discrete time SIS model.
cs.SI
cs
A Polya Contagion Model for Networks Mikhail Hayhoe, Fady Alajaji, Senior Member, IEEE, and Bahman Gharesifard, Member, IEEE 1 7 1 0 2 v o N 7 2 ] I S . s c [ 3 v 9 3 2 2 0 . 5 0 7 1 : v i X r a stochastic properties Abstract-A network epidemics model based on the classical Polya urn scheme is investigated. Temporal contagion processes are generated on the network nodes using a modified Polya sampling scheme that accounts for spatial infection among neighbouring nodes. The and the asymptotic behaviour of the resulting network contagion process are analyzed. Unlike the classical Polya process, the network process is noted to be non-stationary in general, although it is shown to be time-invariant in its first and some of its second-order statistics and to satisfy martingale convergence properties under certain conditions. Three classical Polya processes, one computational and two analytical, are proposed to statistically approximate the contagion process of each node, showing a good fit for a range of system parameters. Finally, empirical results compare and contrast our model with the well-known discrete time SIS model. Index terms-Polya contagion networks, epidemics on net- works, non-stationary stochastic processes, martingales. I. INTRODUCTION In this paper we examine the dynamics and properties of a contagion process, or epidemic, on a network. Here an epidemic can represent a disease [2], a computer virus [3], the spread of an innovation, rumour or idea [4], or the dynamics of competing opinions in a social network [5]. Many different models for the study of infection propagation and curing exist in the literature. Our model, the network Polya contagion process, bears similarities to the well-known susceptible-infected-susceptible (SIS) infection model [6]. In this model, all nodes may initially be healthy or infected. As the epidemic spreads, nodes that are infected can be cured to become healthy, but any healthy node may become infected at any time, regardless of whether they have been cured previously. Epidemics on networks have been intensively studied in recent years; see [7] and references therein and thereafter. The model that we present is an adaptation of the classical Polya contagion process [8], [9], [10] to a network setting by accounting for spatial infection between nodes. The classical Polya model has been used to study a variety of epidemics such as the bubonic plague in Peru [11] and the spread of chlamydia in a closed population [12], as well as a wide range of other applications; see [13] for a survey. In this work we will examine the stochastic evolution of the network Polya contagion process. Mikhail Hayhoe is with the Department of Electrical and Systems the University of Pennsylvania, Philadelphia, PA, USA Engineering at [email protected]. Fady Alajaji and Bahman Gharesifard are with the Department of Math- ematics and Statistics at Queen's University, Kingston, ON, Canada, {fa, ghareb}@queensu.ca. This work was partially supported by the Natural Sciences and Engineering Research Council of Canada. Parts of this work were presented at the 2017 American Control Conference [1]. Our model is motivated by the classical Polya contagion process, which evolves by sampling from an urn containing a finite number of red and black balls [8], [9], [10]. In the network Polya contagion model, each node of the underlying network is equipped with an individual urn; however, instead of sampling from these urns when generating its contagion process, each node has a "super urn", created by combining the contents of its own urn with those of its neighbours' urns. This adaptation captures the concept of spatial infection, since having infected neighbours increases the chance that an individual is infected in the future. This concept of the super urn sampling mechanism for incorporating spatial interactions was originally introduced in [14] in the context of the image segmentation and labeling problem. We herein adapt the image model of [14] for a network setting and analyze the resulting contagion process affecting each node of the network. More specifically, we study the time evolution and stochastic properties of the proposed network contagion process. We derive an expression for the temporal n-fold joint probabil- ity distribution of the process. We show that this process, unlike the classical Polya urn process, is in general non- stationary, and hence not exchangeable. For the special case of complete networks, we analytically find the 1-dimensional and 2-dimensional (n, 1)-step marginal distributions of the contagion process. These results show that, even though it is not stationary, the process in this case is nevertheless identically distributed with its later two marginal distributions being invariant to time shifts. We also establish several mar- tingale properties regarding the network urn compositions, proving that the proportions of red balls in each node's urn as well as the network average urn proportion converge almost surely to a limit as time grows without bound. We next provide three approximations to the network contagion process by modelling each node's contagion process via a classical stationary Polya process [10]. In the first one, we approximate each node's process with the classical Polya process whose correlation parameter is empirically selected so that the Kullback-Leibler divergence measure between its n-fold joint distribution and that of the original node process is minimized. In the second approximation, we propose an analytical model whose parameters are chosen by matching its first and (n, 1)-step second-order statistics with those of the original node process, which fits well for large networks. The last approximation uses a classical Polya model with parameters chosen analytically that we show fits well for small networks. Finally, simulation results are presented to support the validity of these approximations and to compare our model with the traditional discrete time SIS model, which suggests that the network Polya contagion process captures certain properties of the SIS model, while offering new insights in 2 the case of widespread infection. The rest of the paper is organized as follows. Section II out- lines some preliminary knowledge that will be used through- out the paper. Section III introduces the network contagion process, and Section IV presents its stochastic properties and asymptotic behaviour. Section V proposes three approx- imations for the individual node contagion processes in the network, along with numerical modelling results. Lastly, Sec- tion VI concludes the paper. II. PRELIMINARIES For a sequence vi = (vi,1, ..., vi,n), we use the notation vt i,s with 1 ≤ s < t ≤ n to denote the vector (vi,s, vi,s+1, ..., vi,t). Our technical results rely on notions from stochastic processes, some of which we recall here. Throughout, we assume that the reader is familiar with basic notions of probability theory. Let (Ω, F , P ) be a probability space, and consider the stochastic process {Zn}∞ n=1, where each Zn is a random variable on Ω. We often refer to the indices of the process as "time" indices. We recall that the process {Zn}∞ n=1 is stationary if for any n ∈ Z≥1, its n-fold joint probability distribution (i.e., the distribution of (Z1, ..., Zn)) is invari- ant to time shifts. Further, {Zn}∞ n=1 is exchangeable if for any n ∈ Z≥1, its n-fold joint distribution is invariant to permutations of the indices 1, ..., n. It directly follows from the definitions that an exchangeable process is stationary. Lastly, the process {Zn}∞ n=1 is called a martingale (resp. supermartingale, submartingale) with respect to the process {Yn}∞ n=1 if E[Zn] < ∞ and E[Zn+1Yn] = Zn almost surely (resp. less than or equal to, greater than or equal to), for all n. Precise definitions of all notions, including that of ergodicity, can be found in standard texts (e.g., [15], [16]). We now recall the classical version of the Polya contagion process [8], [10]. Consider an urn with R ∈ Z>0 red balls and B ∈ Z>0 black balls. We denote the total number of balls by T , i.e., T = R + B. At each time step, a ball is drawn from the urn. The ball is then returned along with ∆ > 0 balls of the same colour. We use an indicator Zn to denote the colour of ball in the nth draw: Zn =(1 0 if the nth draw is red if the nth draw is black. Let Un denote the proportion of red balls in the urn after the nth draw. Then Un := t=1 Zt R + ∆Pn T + n∆ = ρc + δcPn 1 + nδc t=1 Zt , where ρc = R T is the initial proportion of red balls in the urn and δc = ∆ T is a correlation parameter. Since we draw balls from this urn at each time step, the conditional probability of drawing a red ball at time n, given Z n−1 = (Z1, · · · , Zn−1), is given by P (Zn = 1 Z n−1) = t=1 Zt T + (n − 1)∆ R + ∆Pn−1 = Un−1. It can be easily shown that {Un}∞ The process {Zn}∞ n=1 is a martingale [17]. n=1, whose n-fold joint distribution is and 1−ρc δc nPn denoted by Q(n) , is also exchangeable (hence stationary) ρc,δc and non-ergodic with both Un and the process sample average 1 i=1 Zi converging almost surely as n → ∞ to a random variable governed by the Beta distribution with parameters ρc ; we denote this probability density function δc (pdf) by Beta( ρc ) [17], [18]. Lastly, the 1-dimensional δc distribution of the Polya process is Q(1) (a) = P (Zn = a) = (ρc)a(1 − ρc)1−a, for all n ∈ Z≥1 and a ∈ {0, 1}. The above classical Polya process {Zn}∞ n=1 is fully described by its parameters ρc and δc, and thus we denote it by Polya(ρc, δc). , 1−ρc δc ρc,δc III. NETWORK POLYA CONTAGION PROCESS In this section, we introduce a generalization of the Polya contagion process to networks, where each individual node in the underlying graph that describes the network topology is still equipped with an urn; however, the node's neighbouring structure affects the evolution of its process. This model hence captures spatial contagion, since infected neighbours increase the chance of a node being infected in the future. Consider an undirected graph G = (V, E), where V = {1, . . . , N } is the set of N ∈ Z≥1 nodes and E ⊂ V × V is the set of edges. We assume that G is connected, i.e., there is a path between any two nodes in G. We use Ni to denote the set of nodes that are neighbours to node i, that is Ni = {v ∈ V : (i, v) ∈ E}, and N ′ i = V for all i ∈ V , the network is called complete; if Ni = Nj for all i, j ∈ V , we call it regular. Each node i ∈ V is equipped with an urn, initially with Ri ∈ Z>0 red balls and Bi ∈ Z>0 black balls (we do not let Ri = 0 or Bi = 0 to avoid any degenerate cases). We let Ti = Ri + Bi be the total number of balls in the ith urn, i ∈ {1, · · · , N }. We use Zi,n as an indicator for the ball drawn for node i at time n: i = {i}∪Ni. If N ′ Zi,n =(1 if the nth draw for node i is red 0 if the nth draw for node i is black. However, instead of drawing solely from its own urn, each node draws simultaneously from a "super urn" created by combining all the balls in its own urn with the balls in its neighbours' urns; see Figure 1. This allows the spatial rela- tionships between nodes to influence their state. This means that Zi,n is the indicator for a ball drawn from node i's super urn, and not its individual urn. Hence, the super urn of node Bj Rj red balls, ¯Bi = Pj∈N ′ Tj balls in total. i i initially has ¯Ri = Pj∈N ′ black balls, and ¯Ti =Pj∈N ′ i i We further consider a time-varying version of the classical Polya contagion process, following [19], where at time t for node i ∈ V , after a red ball is drawn it is returned along with ∆r,i(t) red balls to node i's urn, and ∆b,i(t) black balls along with the drawn ball are added to node i's urn when a black ball is drawn. When ∆r,i(t) = ∆b,i(t) for all t ∈ Z≥1, we write ∆i(t) instead; if the ∆'s are not node-dependent, we omit the node index. We assume throughout that ∆r,i(t) ≥ 0, ∆b,i(t) ≥ 0, for all t ∈ Z≥1 and that there exists i ∈ V and t such that ∆r,i(t) + ∆b,i(t) 6= 0; otherwise we are simply sampling with replacement. Node 1's super urn PSfrag replacements 1 2 3 4 4 2 5 6 7 3 Node 1's super urn 1 Fig. 1. Illustration of a super urn in a network. In the context of epidemics, the red and black balls in an urn, respectively, represent units of "infection" and "healthiness"; for example, bacteria and white blood cells. In a super urn, the bacteria can infect others in the area and the white blood cells contribute to the overall health in the neighbourhood of an individual. Drawing red at time t means the bacteria in the neighbourhood were successful in reproduction and so the individual was more infected, otherwise they were healthier since the white blood cells reproduced. Thus when Zi,n = 1, we declare that node i is infected at time n, and if Zi,n = 0, then it is healthy. We add more units of bacteria once they reproduce, but commonly assume this number, ∆r,i(t), is the same across all individuals and time because the bacteria does not evolve or become altered. The amount of white blood cells created, ∆b,i(t), may change since we can give more medicine to certain people to increase their immune response, or vaccinate them so they are better able to fight the disease. To express the proportion of red balls in the individual urns of the nodes, we define the random vector Un = (U1,n, . . . , UN,n), where Ui,n is the proportion of red balls in node i's urn after the nth draw, i ∈ V . For node i, t=1 Zi,t∆r,i(t) , t=1 Zi,t∆r,i(t) + (1 − Zi,t)∆b,i(t) Ri +Pn Ui,n := Ti +Pn where the numerator represents the total number of red balls in node i's urn after the nth draw, while the denominator is the total number of balls in the same urn. Note that Ui,0 = Ri Ti is the initial proportion of balls in node i's urn. For ease of notation, let n Xt=1 Xj,n = Tj + Zj,t∆r,j(t) + (1 − Zj,t)∆b,j(t). (1) the random vector Sn define the proportion of = Furthermore, we (S1,n, ..., SN,n) as in the super urns of the nodes after the nth draw, so that Si,n is the proportion of red balls in node i's super urn after n draws. Hence, for node i, red balls t=1 Zj,t∆r,j(t) Xj,n Si,n := i Pn ¯Ri +Pj∈N ′ Pj∈N ′ = Pj∈N Pj∈N Uj,nXj,n Xj,n ′ i ′ i i . ¯Ri ¯Ti Note that Si,0 = draw variables of the network, and in particular of {Z n . Si,n is in fact a function of the random j }j∈N ′ , i 3 1 , · · · , Z n but for ease of notation, when the arguments are clear, we write Si,n(Z n N ) = Si,n. Then the conditional probability of drawing a red ball from the super urn of node i at time n given the complete network history, i.e. given all the past n − 1 draw variables for each node in the network {Z n−1 }N j=1 = {(Z1,1, · · · , Z1,n−1), · · · , (ZN,1, · · · , ZN,n−1)}, satisfies j j }N P(cid:0)Zi,n = 1{Z n−1 j=1(cid:1) i Pn−1 ¯Ri +Pj∈N ′ Pj∈N ′ = Si,n−1. = i t=1 Zj,t∆r,j(t) Xj,n−1 (3) That is, the conditional probability of drawing a red ball for node i at time n given the entire past {Z n−1 }N j=1 is the proportion of red balls in its super urn, Si,n−1. This is however analogous to the original Polya case, but instead of relying on the individual proportion of red balls Un to describe the conditional probability of drawing red balls, we use the super urn proportion of red balls since we now draw from there. j Remark 3.1: (Non-Markovity): While (3) may appear to suggest some sort of Markovity property, the process is non- Markovian in general. This can easily be seen due to the fact that a draw at time n requires knowledge of all previous draws for the entire neighbourhood. A main objective throughout the rest of this paper is to study the evolution and stochastic properties of the process defined above. Using the above conditional probability, we can determine the n-fold joint probability of the entire network G: for an i ∈ {0, 1}n, i ∈ {1, ..., N }, we have that P (n) G (an 1 , · · · , an N ) i = an i }N n = := P (cid:0){Z n Yt=1 Yt=1 i=1(cid:1) P (cid:0){Zi,t = ai,t}N Yi=1(cid:16)Si,t−1(cid:17)ai,t(cid:16)1 − Si,t−1(cid:17)1−ai,t i=1 {Z t−1 = N i = at−1 n i }N i=1(cid:1) , (4) 1, · · · , at where Si,t = Si,t(at N ) is defined in (3). With the above explicit joint distribution, it is possible to determine the distributions of each node's process. More specifically, using (4), the n-fold distribution of node i's process at time t ≥ n is P (n) 1, · · · , at P (t) G (at i,t (ai,t−n+1, ..., ai,t) := Xat−n N ). i ∈{0,1}t−n at j ∈{0,1}t:j6=i In order to measure the spread of contagion in the network at any given time, we wish to see how likely it is, on average, for a node to be infected at that instant. We hence define the average infection rate in the network at time n as the average marginal probability of drawing a red ball, In := 1 N (2) P (Zi,n = 1) = 1 N P (1) i,n (1). N Xi=1 N Xi=1 Note that In is a function of the network topology (V, E), the initial placement of balls Ri and Bi, the draw pro- cesses {Zi,t}n t=1, and number of balls added {∆r,i(t)}n t=1 4 and {∆b,i(t)}n t=1 for each node i ∈ V . Unfortunately for an arbitrary network, the above quantity does not yield an exact analytical formula (except in the simple case of complete networks). As such, in general it is hard to mathematically analyze the asymptotic behaviour of In, which we wish to minimize when attempting to cure an epidemic. Instead we examine the asymptotic stochastic behavior of a closely related variable given by the average individual proportion of red balls at time n, namely Un := 1 N Ui,n, N Xi=1 which we call the network susceptibility. This quantity is related to the conditional probability of drawing a red ball, as seen in (2). Since the individual urn of node i is in every super urn in the neighbourhood, if Ui,n increases then Sj,n increases for every j ∈ N ′ i , and hence given the past history those nodes are more likely to exhibit infected behaviour as seen from (3). Note that similarly to In, Un is a function of the network variables. Remark 3.2: (Finite Memory): It is worth pointing out that a practical adaptation to our model can be considered, where urns have "finite memory" in the sense that the balls added after each draw are only kept in each node's urn for a finite number of future draws. This model is developed in [18] for the classical Polya process in the context of modelling communication channels, where it is shown that the resulting finite memory contagion process is stationary, Markovian and ergodic. We present the following result that states that in this case the entire state is Markovian and hence it is a limited reinforcement model, but leave an in-depth investigation to a • future work. Proposition 3.3: (Finite Memory Markovity): The entire n=1 with state of the network Polya contagion process {Zn}∞ finite memory M is Markovian with memory M . Proof: By (1) and (3) and the fact that added balls are removed after M steps, we have for n > M that j = }N P(cid:0)Zi,n = 1 {Z n−1 j=1(cid:1) i Pn−1 ¯Ri +Pj∈N ′ i Pn−1 ¯Ti +Pj∈N ′ j=1(cid:17) . = P (cid:16)Zi,n = 1 {Z n−1 j,n−M }N t=n−M Zj,t∆r,j(t) t=n−M Zj,t∆r,j(t) + (1 − Zj,t)∆b,j(t) Using the above result along with conditional independence, for (a1, . . . , aN ) ∈ {0, 1}N we have for n > M that j=1(cid:1) j j N = }N }N P (cid:0)Z1,n = a1, . . . , ZN,n = aN {Z n−1 Yi=1 Yi=1 = P(cid:16)Z1,n = a1, . . . , ZN,n = aN {Z n−1 P (cid:0)Zi,n = 1 {Z n−1 P (cid:16)Zi,n = 1 {Z n−1 j=1(cid:1) j=1(cid:17) j,n−M }N = N and hence the entire network process {Zn}∞ with memory M . j,n−M }N j=1(cid:17) , n=1 is Markovian IV. STOCHASTIC PROPERTIES We next examine the stochastic properties of the network contagion process. We assume throughout the beginning of this section that ∆r,i(t) = ∆b,i(t) = ∆ > 0, for all i ∈ V and times t; that is the net number of red and black balls added are equal and constant in time for all nodes. In the case of a complete network, the composition of every nodes' super urn is identical, since there is only one super urn that is being drawn from. Thus for a complete network the super urn model is analogous to one urn where multiple draws occur with replacement, which has been recently studied in detail [20]. However, the analysis in [20] is carried out in an aggregate sense, i.e., only for the entire urn and not individual processes. Unfortunately, this aggregate approach does not work in a network setting, whereas the super urn model proposed here is applicable. A. Complete Network Marginal Distributions We first focus on the special case of complete networks to derive some useful probability distributions; later on, we will obtain other stochastic properties that apply to more general networks. PN Given that the network is complete, we focus on one of the nodes, say i ∈ V . For ease of notation, we define ¯Tj = k=1 Tk =: ¯T , and similarly, ¯Rj =: ¯R, ¯Bj =: ¯B, for all j ∈ V . Defining the events An−1 = {Zi,n−1 = an−1, ..., Zi,1 = a1} and Wn−1 = {An−1, {Z n−1 ∈ {0, 1}n−1, and parameters ρ = ¯R , we can write ¯T using (3) under the above assumptions, that }j6=i} with bn−1 and δ = N ∆ ¯T j,1 = bn−1 j j P (Zi,n = 1, An−1) P (Zi,n = 1Wn−1)P (Wn−1) ∈{0,1}n−1:j6=i :j6=i ¯R + ∆Pn−1 ¯T +Pn−1 N Pn−1 t=1 (cid:16)at +Pj6=i bj,t(cid:17) t=1 ∆ +Pj6=i ∆ t=1 (cid:16)at +Pj6=i bj,t(cid:17) 1 + (n − 1)δ ρ + δ P (Wn−1) P (Wn−1) P (An−1, {Z n−1 = bn−1 }j6=i) j j 1 + (n − 1)δ j j =Xbn−1 =Xbn−1 =Xbn−1 =Xbn−1 j j :j6=i :j6=i"ρ Xt=1 at δ N n−1 + +Xj6=i P (An−1, {Z n−1 = bn−1 }j6=i) j j 1 + (n − 1)δ = bn−1 j }j6=i) bj,tP (An−1, {Z n−1 j 1 + (n − 1)δ !#. (5) By examining an arbitrary term k 6= i in the final sum above, for fixed t ∈ {1, ..., n − 1}, we can sum out all the other draw variables: Xbn−1 j ∈{0,1}n−1:j6=i bk,tP (An−1, {Z n−1 j = bn−1 j }j6=i) bk,tP (An−1, Z n−1 k = bn−1 k bk,tP (An−1, Zk,t = bk,t) k ∈{0,1}n−1 = Xbn−1 = Xbk,t∈{0,1} = P (An−1, Zk,t = 1). 5 ) We next show that each node's draw process is not sta- tionary in general, and hence is different from the classical Polya(ρc, δc) process. Remark 4.2: (Non-Stationarity of the Network Conta- gion Process): Consider a 2-node complete network. Then, using (4), one can obtain (after some simplifications) that (6) Further, by the law of total probability, P (An−1, {Z n−1 j = bn−1 j }j6=i) = P (An−1). (7) Xbn−1 j ∈{0,1}n−1:j6=i So using (6) and (7), (5) becomes ρP (An−1) + δ NPn−1 t=1hatP (An−1) +Pj6=iP (An−1, Zj,t = 1)i 1 + (n − 1)δ P (Z1,2 = 1, Z1,1 = 1) = ρ P (Z1,3 = 1, Z1,2 = 1) ρ + (1 + ρ) δ 2 1 + δ , P (Z1,1 = a1, {Z1,t = 1}3 t=2, {Z2,t = bt}3 t=1) =Xa1∈{0,1} b3∈{0,1}3 = ρ 4ρ + δ(2 + 14ρ) + δ2(6 + 14ρ) + δ3(5 + 3ρ) 4(1 + δ)2(1 + 2δ) , Thus, using the law of total probability, we have and hence the network process is not stationary. • P (Zi,n = 1) = Xan−1∈{0,1}n−1 P (Zi,n = 1, An−1) = Xan−1 ρ + δ = ρP (An−1) + δ t=1 atP (An−1) N Pn−1 1 + (n − 1)δ + δ N Pn−1 t=1 PN N Pn−1 1 + (n − 1)δ t=1 Pj6=i P (An−1, Zj,t = 1) 1 + (n − 1)δ j=1 P (Zj,t = 1) . (8) An interesting corollary of this derivation is as follows. Lemma 4.1: (Complete Network Marginal Distribution): The 1-dimensional marginal distribution of node i's contagion draw process {Zi,n}∞ n=1 for the N -node complete network is given by P (1) i,n = P (Zi,n = a) = ρa(1 − ρ)1−a, where i ∈ V , n ≥ 1, and a ∈ {0, 1}. Proof: We proceed using strong induction on n ≥ 1, showing that P (Zi,n = 1) = ρ, for all nodes i ∈ V and all n. The base case readily holds, since at time n = 1, P (Z1,1 = 1) = · · · = P (ZN,1 = 1) = PN PN i=1 Ri i=1 Ti Now, assuming that P (Zj,t = 1) = ρ for all j ∈ V and t ≤ n and using (8), we have = ρ. P (Zi,n+1 = 1) = = = j=1 P (Zj,t = 1) t=1PN 1 + nδ δ N N ρ t=1 ρ = ρ, ρ + δ N Pn ρ +Pn ρ + δPn 1 + nδ t=1 1 + nδ which completes the induction argument. The result now follows using the fact that P (Zj,n = 1) + P (Zj,n = 0) = 1 ⇒ P (Zj,n = 0) = 1 − ρ, for all j ∈ V and all n. Since every exchangeable process is necessarily stationary, Remark 4.2 implies that the network Polya process is not ex- changeable in general. However, some notions of stationarity remain; in our next result, we will see that there is a consistent relationship between the draws at the 1st and nth time steps. Lemma 4.3: (Complete Network (n, 1)-step Marginal Probability): For the complete network, the 2-dimensional marginal probability that node i's draw variables at times n and 1 are both one is given by P (Zi,n = 1, Zi,1 = 1) = ρ ρ + (1 + (N − 1)ρ) δ N 1 + δ for i ∈ V , n ≥ 2. Furthermore, for any other node k, ρ + (1 + (N − 1)ρ) δ N P (Zk,n = 1, Zi,1 = 1) = ρ 1 + δ , . Proof: By Lemma 4.1 we have that P (Zk,1 = 1) = ρ for all k ∈ V , so it is enough to show that P (Zk,n = 1 Zi,1 = 1) = ρ + (1 + (N − 1)ρ) δ N 1 + δ (9) for all n and nodes i and k. Using the law of total prob- ability, (3), and after some simplifications, with defining Wn−1 = {Z n−1 j,1 }j6=i} (note that Wn−1 is a function of {bn−1 j,1 }j6=i, but for simplicity we omit this), we have that i,2 = an−1 j,1 = bn−1 , {Z n−1 2 P (Zi,n = 1 Zi,1 = 1) P (Zi,n = 1 Zi,1 = 1, Wn−1)P (Wn−1 Zi,1 = 1) = Xan−1 2 ∈{0,1}n−2 bn−1 j,1 ∈{0,1}n−1:j6=i ρ + δ N (1 +Pn−1 t=2 at +Pn−1 1 + (n − 1)δ t=1 Pj6=i bj,t) = Xan−1 ,bn−1 2 j,1 :j6=i × P (Wn−1 Zi,1 = 1) j,1 :j6=i"(cid:18)ρ + = Xan−1 ,bn−1 2 + δ N δ 1 + (n − 1)δ N(cid:19) P (Wn−1 Zi,1 = 1) Xt=2 atP (Wn−1 Zi,1 = 1) 1 + (n − 1)δ n−1 6 + δ N bj,tP (Wn−1 Zi,1 = 1) 1 + (n − 1)δ #. n−1 Xt=1 Then, after arranging terms and using the law of total proba- bility for bj,tP (Wn−1 Zi,1) = P (Zj,t = 1 Zi,1 = 1), Xan−1 2 ,bn−1 j,1 :j6=i we have P (Zi,n = 1 Zi,1 = 1) PSfrag replacements 0.215 = (ρ + δ N )(1) 1 + (n − 1)δ + δ N Pn−1 t=2 P (Zi,t = 1Zi,1 = 1) 1 + (n − 1)δ ρ + δ = + + δ 1 + (n − 1)δ N Pn−1 t=1 Pj6=i P (Zj,t = 1Zi,1 = 1) N Pj6=i P (Zj,1 = 1) N h1 +PN j=1Pn−1 t=2 P (Zj,t = 1Zi,1 = 1)i 1 + (n − 1)δ 1 + (n − 1)δ δ = ρ(1 + (N − 1) δ 1 + (n − 1)δ N ) δ N h1 +PN j=1Pn−1 t=2 P (Zj,t = 1 Zi,1 = 1)i 1 + (n − 1)δ + . (10) It can be similarly shown by symmetry of the complete network that (10) holds for P (Zk,n = 1 Zi,1 = 1) if k 6= i. In order to show (9), we proceed using strong induction on n ≥ 2. For the base case, setting n = 2 in (10), we have for any i, k ∈ V , P (Zk,2 = 1Zi,1 = 1) = = ρ(1 + (N − 1) δ N ) + δ N 1 + δ ρ + (1 + (N − 1)ρ) δ N 1 + δ , as desired. Assume now that P (Zk,t = 1 Zi,1 = 1) is given by (9), for 2 ≤ t ≤ n − 1 and any i, k ∈ V . Then by (10), P (Zk,n = 1 Zi,1 = 1) = ρ(1 + (N − 1) δ 1 + (n − 1)δ N ) δ N h1 +PN j=1Pn−1 + ρ(1 + (N − 1) δ N ) + δ 1 + (n − 1)δ t=2 P (Zj,t = 1 Zi,1 = 1)i N hN (n − 2) ρ+(1+(N −1)ρ) δ 1 + (n − 1)δ 1+δ N i 1 1 + (n − 1)δ"(1 + δ) ρ + (1 + (N − 1)ρ) δ N 1 + δ +δ(n − 2) ρ + (1 + (N − 1)ρ) δ N 1 + δ # ρ + (1 + (N − 1)ρ) δ N 1 + δ , = = = which completes the induction argument. Although the draw process is not stationary in general, simulated results suggest that it satisfies some asymptotic sta- tionarity properties, in the sense that given sufficient time the process settles and deviations become very small in magnitude. A representative example is shown in Figure 2 for the 2- dimensional distribution at times n and n − 1 in the 5-node network shown in Figure 3(d). Empirical value Settled value 0.2025 0.195 500 1, 000 Fig. 2. Simulated values for P (Zi,n = 1, Zi,n−1 = 1) for an arbitrary node i averaged over 50,000 simulated trials on the network shown in Fig. 3(d). All parameters remained constant throughout all trials; see http://bit.ly/2tnBix5 for a complete list of them. B. Martingale Theorems We now turn our attention to the martingale properties of the network contagion process, where we do not assume that the network is necessarily complete. Recall that by the martingale convergence theorem [15], [16], if a process {Zn}∞ n=1 is a martingale (or supermartingale, or submartingale), there exists a random variable Z such that {Zn}∞ n=1 converges almost surely to Z as n → ∞. Theorem 4.4: (Individual Urn Proportion Martingale): For a network G = (V, E), ∆r,i(n) = ∆b,i(n) = ∆ and Ti = T , for all i ∈ V and all n, the individual proportion of red balls {Ui,n}∞ n=1 is a martingale with respect to the draws for the whole network {Zn}∞ n=1 if and only if, almost surely, n=1 = {(Z1,n, ..., ZN,n)}∞ 1 Ni Xj∈Ni Uj,n−1 = Ui,n−1. Proof: Using the expression for Ui,n, (2), and (3), we have almost surely E[Ui,n Zn−1] = E(cid:20) ∆Zi,n + Ui,n−1(T + (n − 1)∆) T + n∆ Ui,n−1(T + (n − 1)∆) ∆E[Zi,n Zn−1] Zn−1(cid:21) (cid:12)(cid:12)(cid:12) + = T + n∆ T + (n − 1)∆ T + n∆ + ∆P (Zi,n = 1Z n−1) T + n∆ = Ui,n−1 = Ui,n−1(cid:18)1 − T + n∆(cid:19)+ = Ui,n−1 − T + n∆ ∆ ∆Ui,n−1 T + n∆ = Ui,n−1 + ∆hPj∈Ni Uj,n−1(T + (n − 1)∆) i (T + (n − 1)∆) Uj,n−1 + ∆ i (T + n∆)N ′ ∆Pj∈N ′ Ui,n−1 +Pj∈Ni Uj,n−1i − NiUi,n−1 i (T + n∆) N ′ (T + n∆)(Ni + 1) = Ui,n−1 + ∆Pj∈Ni (Uj,n−1 − Ui,n−1) (T + n∆)(Ni + 1) . (11) = aij(Nj − Ni) (Ni + 1)(Nj + 1)(cid:16)Uj,n−1 − Ui,n−1(cid:17). 7 From above, it is clear that this term is zero for all i and j by setting Nj = Ni, i.e. in any regular network, and so { Un}∞ n=1 is a martingale with respect to {Zn}∞ n=1. We next allow the net number of black balls ∆b,i(·) to evolve stochastically in time as a function of the past draw history in the network in order to steer {Ui,n}∞ n=1 to a limit for every node i. Theorem 4.6: (Individual Urn Proportion Categories): In a general network G = (V, E) with ∆r,i(n) = ∆r for all n ∈ Z≥1 and i ∈ V , if we choose {∆b,i(n)}∞ n=1 so that ∆b,i(n) ≥ ∆r(1 − Ui,n−1)Si,n−1 Ui,n−1(1 − Si,n−1) almost surely for all n ∈ Z≥1 and i ∈ V (resp. equal to, less than or equal to) then {Ui,n}∞ n=1 is a supermartingale (resp. martingale, submartingale) with respect to {Zn}∞ n=1. Proof: We will start with the case of a supermartingale. That is, we wish to show that almost surely for all n ∈ Z≥1, E[Ui,n Zn−1] − Ui,n−1 ≤ 0. Define ¯Zi,n = Pn have almost surely t=1 Zi,t, and take Xi,n as in (1). Then, we Ui,n − Ui,n−1 Ri + ∆r( ¯Zi,n−1 + Zi,n) Ri + ∆r ¯Zi,n−1 − Xi,n (Ri + ∆r ¯Zi,n−1)(Xi,n − Xi,n−1) Xi,n−1 = = = = − − ∆rZi,n Xi,n ∆rZi,n Xi,n 1 Xi,n−1Xi,n Ui,n−1(Xi,n − Xi,n−1) Xi,n Xi,n(cid:20)∆rZi,n − Ui,n−1(∆rZi,n + ∆b,i(n)(1 − Zi,n))(cid:21), since Xi,n > 0 for all n ∈ Z≥1 almost surely, we can ignore it. Now, since Ui,n−1 is almost surely constant given Zn−1, That is we wish to check if, almost surely, E(cid:2)∆rZi,n(1− Ui,n−1)− ∆b,i(n)Ui,n−1(1− Zi,n)Zn−1(cid:3) ≤ 0. Now if ∆b,i(n) ≥ almost surely, we have ∆r(1 − Ui,n−1)Si,n−1 Ui,n−1(1 − Si,n−1) E(cid:2)∆rZi,n(1 − Ui,n−1) − ∆b,i(n)Ui,n−1(1 − Zi,n)Zn−1(cid:3) ≤ E"∆rZi,n(1 − Ui,n−1) − Ui,n−1(1 − Zi,n) Ui,n−1(1 − Si,n−1) (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Zn−1# 1 − Si,n−1(cid:12)(cid:12)(cid:12)(cid:12) = ∆r(1 − Ui,n−1)E(cid:20)Zi,n − (1 − Zi,n) ∆r(1 − Ui,n−1)Si,n−1 Si,n−1 Zn−1(cid:21) × This implies that {Ui,n}∞ {Zn}∞ n=1 if and only if n=1 is a martingale with respect to Uj,n−1 − Ui,n−1 = 0 ⇔ Xj∈Ni 1 Ni Xj∈Ni Uj,n−1 = Ui,n−1. almost surely. nPn If the condition in Theorem 4.4 holds, then for any i both Ui,n and 1 t=1 Zi,t converge almost surely to a limit as n → ∞. However, the condition of Theorem 4.4, barring the trivial single node scenario, is not verifiable. To resolve this issue, we instead examine the evolution of the average proportion of red balls (i.e., the susceptibility) in a regular network. Theorem 4.5: (Regular Network Susceptibility Martin- gale): For a regular network G = (V, E) with ∆r,i(n) = ∆b,i(n) = ∆ and Ti = T for all nodes i ∈ V and times n, the network susceptibility { Un}∞ i=1 Ui,n, is a martingale with respect to {Zn}∞ n=1, where Un = 1 n=1. N PN Proof: We have, similar to Theorem 4.4, that E[ Un Zn−1] E[Ui,n Zn−1] = = 1 N 1 N N N Xi=1 Xi=1(cid:20)Ui,n−1 + N ∆Pj∈Ni (Uj,n−1 − Ui,n−1) (T + n∆)(Ni + 1) (cid:21) = Un−1 + Xi=1 ∆Pj∈Ni (Uj,n−1 − Ui,n−1) . N (T + n∆)(Ni + 1) n=1 is a martingale with respect to {Zn}∞ Let us examine the second term of the last equality. If this term is zero, { Un}∞ n=1. We now define the adjacency matrix [aij ] of our network, where the (i, j)th entry aij is 1 if (i, j) ∈ E, and 0 otherwise. Since we assumed that our network was undirected, [aij ] is symmetric, i.e., aij = aji for all i, j ∈ V . So, N (T + n∆)(Ni + 1) j=1 aij (Uj,n−1 − Ui,n−1) N (T + n∆)(Ni + 1) N ∆Pj∈Ni Xi=1 ∆PN Xi=1 = N ∆ = N (T + n∆) N N Xi=1 Xj=1 aij (Uj,n−1 − Ui,n−1) Ni + 1 Now, we examine the sum of the (i, j) and (j, i) components of the double sum, where (i, j) ∈ E (otherwise both terms are zero). Recall that (i, i) 6∈ E, ∀i. We have aij(Uj,n−1 − Ui,n−1) Ni + 1 + aji(Ui,n−1 − Uj,n−1) Nj + 1 = aij(Uj,n−1 − Ui,n−1)(Nj + 1) (Ni + 1)(Nj + 1) aji(Ui,n−1 − Uj,n−1)(Ni + 1) (Ni + 1)(Nj + 1) + (Uj,n−1 − Ui,n−1) E[Ui,n Zn−1]−Ui,n−1 ≤ 0 ⇒ E[Ui,n −Ui,n−1 Zn−1] ≤ 0. 8 = ∆r(1 − Ui,n−1)(cid:20)Si,n−1 − (1 − Si,n−1) = 0, Si,n−1 1 − Si,n−1(cid:21) where the second to last equality comes from the fact that E[Zi,nZn−1] = P (Zi,n = 1Zn−1) = Si,n−1 almost surely by (3), and that Si,n−1 is almost surely constant given Zn−1. Thus as long as ∆b,i(n) obeys this bound almost surely for all n ∈ Z≥1, {Ui,n}∞ n=1 is a supermartingale with respect to {Zn}∞ n=1. Similarly, if ∆b,i(n) is almost surely equal (resp. less than or equal) to this bound, {Ui,n}∞ n=1 is a martingale (resp. submartingale) with respect to {Zn}∞ n=1. Theorem 4.6 tells us what bounds for {∆b,i(n)}∞ n=1 must be obeyed almost surely to guarantee that {Ui,n}∞ n=1 admits an asymptotic limit for all i ∈ V in any general network. this tells us that by choosing ∆b,i(t) = 0 For instance, almost surely for all i ∈ V and t ∈ Z≥1, {Ui,n}∞ n=1 will be a submartingale and will converge to some limiting random variable. While this result is interesting for modelling contagion, it is especially useful in the context of curing. V. MODEL APPROXIMATIONS As previously noted, the dynamics of the network contagion process are complicated, especially when considered on gen- eral networks. For this reason, in this section we develop two useful approximations to this process on a general network that allow us to shed some light on its asymptotic behaviour. Throughout this section, unless stated otherwise, we consider general network topologies with ∆r,i(t) = ∆b,i(t) = ∆ for all t ∈ Z≥1 and i ∈ V . However, to match the 1-step and (n, 1)-step distributions, we make the simplifying assumption that the neighbourhood of each node i can be represented as a complete network, i.e., all of its neighbours are connected to one another, in order to apply Lemmas 4.1 and 4.3. A. Approximation: Computational Model We now introduce our first approximation technique, where we approximate the contagion process of each node in the network with a classical Polya urn process. Model I: (Computational Model): We approximate the dynamics of any node i's contagion process using a classical Polya process Polya(ρc = ρi, δc = δi), with ρi = Pj∈N Pj∈N with ′ i ′ i Rj Tj , Q(n) ρi,δ (an) = and δi = arg min δ ρi,δ(cid:17) , 1 n i,n Q(n) D(cid:16)P (n) + n − ¯an(cid:17) δ (cid:17) Γ(cid:16) 1−ρi δ (cid:17) δ , Γ(cid:16) 1 δ δ(cid:17) Γ(cid:16) ρi Γ(cid:16) 1 + ¯an(cid:17) Γ(cid:16) 1−ρi + n(cid:17) Γ(cid:16) ρi δ where Γ(·) is the Gamma function, an = (a1, ..., an) ∈ {0, 1}n, and ¯an = a1 + · · · + an. • Here ρc is chosen to be the proportion of red balls ρi in the node's super urn, so that the 1-dimensional distributions of the classical Polya process and the node process {Zi,n} coincide, while δi is set by performing a minimization to find the value that best fits Q(n) n=1 of node ρi,δi i ∈ V . We use a divergence measure, denoted by D(··), to observe the quality of the fit. to the distribution of {Zi,n}∞ The explicit derivation of the distribution Q(n) ρi,δi can be found in [17], [21]. This method ensures that the fit of Q(n) ρi,δi is as close as possible under the given divergence measure. Since we are measuring the error in using an approximating distribution, we use the Kullback-Leibler divergence [22]; we thus have that δi = arg min δ = arg max δ 1 n Xan∈{0,1}n n Xan∈{0,1}n 1 P (n) i,n (an) log P (n) i,n (an) Q(n) an) ρi,δ i,n (an) log Q(n) P (n) ρi,δ (an) it i,n (an) log P (n) since P (n) i,n (an) is independent of δ. The ap- proximating process is stationary and exchangeable, as it is a classical Polya process. We also know (from Section II) is non-ergodic with its sample average converging that almost surely to the Beta( ρi ) distribution. Calculating δi an analytic expression for the minimizing δi is not feasible in general, and hence should be performed computationally. However, due to the above minimization, the value of δi is, by definition, the best way to fit a Polya process to the process {Zi,n}∞ n=1 for a given n. , 1−ρ)i δi B. Approximation: Analytical Models An alternative to Model I is to attempt to find approxima- tions whose parameters can be determined analytically. Model II(a): (Large-Network Analytical Model): For any given node i, we approximate the dynamics of its process {Zi,n}∞ n=1 by using a classical Polya process Polya(ρc = ρi, δc = δ′ i), with Rj Tj , and δ′ i = δi N + (N − 1)δi , ρi = Pj∈N Pj∈N ′ i ′ i where δi = N ∆ P j∈N ′ i . Tj • Here the parameters of the classical Polya process are chosen by directly matching its first and (n, 1)-step second- order statistics with those of {Zi,n}∞ n=1. This method avoids the computational burden of the previous model by yielding an analytical expression for the correlation parameter of the classical Polya process. We next prove that under some stationarity and symmetry assumptions, the contagion process running on each node in the network is statistically identical to the classical Polya process of Model II(a). Lemma 5.1: (Exact Representation): Suppose that (i) P (Zi,1 = 1 Z n−1 (ii) P (Zi,t = 1Z n−1 j,1 = an−1) = ρi, and j,1 = an−1) = P (Zk,n = 1Z n−1 j,1 = an−1), for all n ≥ 1, 2 ≤ t < n, i, j, k ∈ V , an−1 ∈ {0, 1}n−1. Then for any node i in a complete network, {Zi,n}∞ n=1 is given exactly by the Polya(ρi, δ′ i) process. which is the conditional probability P (Zn = 1Z n−1 for a Polya(ρi, δ′ performed for P (Zi,n = 0 Z n−1 1 = an−1) i) process. A similar calculation can be i,1 = an−1). 9 Proof: For any node i, we wish to show that for all the n-dimensional distributions of {Zi,n}∞ n, n=1 and the Polya(ρi, δ′ i) process are identical. It is enough to show that the conditional probability of one event given the whole past is the same, since any joint probability can be written as a product of conditional probabilities. Let us define the events An−1 = {Z n−1 j,1 }j6=i. Then, i,1 = an−1} and Bn−1 = {Z n−1 j,1 = bn−1 Pin := P (Zi,n = 1 An−1) P (Zi,n = 1 An−1, Bn−1)P (Bn−1 An−1) j,1 ∈{0,1}n−1:j6=i = Xbn−1 =Xbn−1 =Xbn−1 j,1 :j6=i j,1 :j6=i ρi + δi N Pn−1 1 + (n − 1)δi P (Bn−1 An−1) t=1 (at +Pj6=i bj,t) iPn−1 t=1 (at +Pj6=i bj,t) 1 + (N (n − 2) + 1)δ′ i i) + δ′ ρi(1 − (N − 1)δ′ P (Bn−1 n−1A) bj,tP (Bn−1 An−1) × P (Bn−1 An−1) i) + δ′ ρi(1 − (N − 1)δ′ = + 1 + (N (n − 2) + 1)δ′ i = (cid:16)ρi(1 − (N − 1)δ′ j,1 :j6=i δ′ i n−1 j,1 :j6=i t=1 at 1 + (N (n − 2) + 1)δ′ iPn−1 i Xbn−1 Xt=1Xj6=i Xbn−1 t=1 at(cid:17) · 1 iPn−1 iPn−1 t=1 Pj6=i P (Zj,t = 1 An−1) iPn−1 1 + (N (n − 2) + 1)δ′ i 1 + (N (n − 2) + 1)δ′ i ρi(1 − (N − 1)δ′ i) + δ′ i) + δ′ . 1 + (N (n − 2) + 1)δ′ i δ′ + Pin = Then using assumption (i), we have t=1 at + δ′ i(N − 1)ρi δ′ + 1 + (N (n − 2) + 1)δ′ i iPn−1 t=2 Pj6=i P (Zj,t = 1 An−1) t=1 hat +Pj6=i P (Zj,t = 1 An−1)i iPn−1 1 + (N (n − 2) + 1)δ′ i ρi + δ′ = Now using assumption (ii), we get Pin = = ρi + δ′ ρ + δ′ 1 + (N (n − 2) + 1)δ′ i i(cid:16)Pn−1 i(cid:16)Pn−1 t=2 Pj6=i Pin(cid:17) t=1 at +Pn−1 t=1 at + (n − 2)(N − 1)Pin(cid:17) 1 + (N (n − 2) + 1)δ′ i . Thus, we have that Pin = ⇒Pin = ρi + δ′ t=1 at + (n − 2)(N − 1)Pin(cid:17) i(cid:16)Pn−1 iPn−1 1 + (N (n − 2) + 1)δ′ i ρi + δ′ t=1 at 1 + (n − 1)δ′ i , Unfortunately in a general network setting assumptions (i) and (ii) above do not hold true. However, this result motivates the fact that this analytical approximation is reasonable to use for situations where these assumptions hold within tolerable margins of error; empirical evidence indicates that this occurs for large values of N , since as N increases the quality of the fit improves. This approximation, nevertheless, drastically reduces the complexity in analyzing the individual contagion draw processes, as closed-form expressions for the process parameters are available. Model II(b): (Small-Network Analytic Model): Given any node i in the network with a small to moderate number of nodes, we approximate the dynamics of its contagion process {Zn}∞ n=1 using a Polya(ρi, δ⋆ i ) process, where ′ i ′ i ρi = Pj∈N Pj∈N δ⋆ i = Rj Tj , and δi/N N + (N − 1)δi/N = δi N 2 + (N − 1)δi , where δi = N ∆ P j∈N ′ i . Tj • , and so we divide each instance of δi in δ⋆ The idea behind this model is that we want to remove the dependence on the number of nodes N from the parameter δi = N ∆ i by N . ¯Ti The idea is that as n grows, it eventually becomes significantly larger than the relatively small number of nodes N , and so nNi ≈ n for all i ∈ V . Hence, we may consider that for a sufficiently large time, we have added n∆ balls to the super urn. Effectively, this means we are using a correlation parameter of ∆ . Simulation results confirm ¯Ti that this approximation captures the limit distribution of the original process better than Model II(a) when the number of nodes is small. Figure 3 displays this relationship. A summary of all models presented in this section, and the scenarios under which they are most suitable, is provided in Table I. instead of δ = N ∆ ¯Ti TABLE I APPROXIMATION USAGE SCENARIOS Model I II(a) II(b) Usage Scenario Exactness valued over analytic simplicity Larger values of N , i.e., large network Small to moderate values of N , i.e., small network , 1−ρi δ′ i nPn We close this section with numerical demonstrations on the fitness of all models. Figure 3 shows a representative comparison between the Beta( ρi ) pdf and the simulated δ′ i histogram of 1 t=1 Zi,n, where n = 1000, for an arbitrary node i in the given networks. Recall that the Beta( ρi ), δi Beta( ρi ) pdfs are the distributions δ′ i of the limit random variables to which the sample average of the draw processes of Models I, II(a) and II(b) (respectively) converge almost surely, as n → ∞ (see Section II). We use complete networks since they satisfy the assumption that all neighbourhoods are complete, as well as Barabasi-Albert ) and Beta( ρi δ⋆ i , 1−ρi δ⋆ i , 1−ρi δ′ i , 1−ρi δi 10 15 5 0 PSfrag replacements PSfrag replacements Empirical Model I Model II(a) Model II(b) 0.2 0.3 0.4 0.5 0.6 150 25 0.45 Empirical Model I Model II(a) Model II(b) 0.5 0.55 (a) 10-node complete network histogram. (b) 100-node complete network histogram. 4.5 4 Empirical Model I Model II(a) Model II(b) PSfrag replacements Empirical 2 0 0 25 5 0 0.3 0.3 0.6 0.9 (c) 5-node Barabasi-Albert network histogram. (d) 5-node Barabasi-Albert network [23]. Empirical Model I Model II(a) Model II(b) 0.45 0.5 0.55 0.7 (e) 100-node Barabasi-Albert network histogram. (f) 100-node Barabasi-Albert network [23]. Fig. 3. Comparison of normalized simulated histograms for the sample average of draws 1 Beta( ρi ) pdfs from Models I, II(a), and II(b), respectively, for an arbitrary node i with n = 1000, averaged over 5, 000 simulated trials. Here the δ⋆ i parameters ∆ as well as Ri and Bi, for all i ∈ V , were uniformly randomly assigned for each network, and were consistent throughout all trials. See http://bit.ly/2tnBix5 for a complete list of all parameters used for each network. t=1 Zi,t and the Beta( ρi δi n Pn ), Beta( ρi δ′ i , ), and , 1−ρi δ⋆ i 1−ρi δ′ i , 1−ρi δi networks which have been shown to be a good model for real- world social networks [23] and do not satisfy this assumption; however, our results show that the approximations still fit quite well. As expected, Model I provides the best approximation in all scenarios, albeit without an analytic expression for its parameters which can provide insight into the behaviour of the underlying process. Model II(a) fits quite well when the number of nodes in the network is large, as seen in Figures 3(b) and 3(e), but fits poorly for a small number of nodes, which is evident in Figures 3(a) and 3(c). Model II(b) is the complement of Model II(a) in the sense that it fits very well for a small number of nodes but poorly for a large network. Hence if analytic expressions for parameters are desired, Models II(a) and II(b) can be used depending on the number of nodes to provide approximations that are marginally worse than the computational exactness of Model I. C. Comparison with SIS model We now provide a number of empirical results in which we compare our model, with both finite and infinite memory, to the traditional discrete time SIS model [24]. In the SIS model, the parameter δSIS denotes the probability that a node will recover from infection, and βSIS is the probability that a node will become infected through contact with a single infected neighbour. The dynamics are described through the probability that any node i will be infected at time t, Pi(t), which evolves according to the equation Pi(t + 1) =Pi(t)(1 − δSIS) + (1 − Pi(t))(cid:16)1 − Yj∈Ni (1 − βSISPj(t))(cid:17). Note in particular that this model exhibits Markovian be- haviour, since the evolution of the process depends only on the probability of infection from the previous time step. We make the simplifying assumption that δSIS and βSIS remain the same for all nodes and throughout time, and hence we will compare it with the network Polya contagion process when ∆r and ∆b are similarly fixed in time and throughout the network. The concept of an epidemic threshold for the SIS model gives a value through which one may determine whether the epidemic dies, a priori using only the system parame- ters [24]. The threshold condition is directly related to the largest-magnitude eigenvalue λmax of the adjacency matrix of the underlying graph of the network, and states that if δSIS > βSISλmax then the epidemic will be eliminated after some time n, i.e., eventually Pi(t) = 0 for all i and all t > n. Furthermore, it has been shown that this threshold is tight, and indeed if δSIS < βSISλmax then some non-zero convergence point exists, called an endemic state, and the epidemic will never be eliminated [25]. Figure 4 compares the behaviour of the SIS model and the network Polya contagion process for different selections of these parameters. The initial probabilities of infection Pi(0) to coincide with the initial for the SIS model were set individual proportions of red balls for the nodes Ri . Further, Ti we relate in Figures 4(a)–4(c) the parameters βSIS and δSIS to ∆r and ∆b, respectively, using ratios of the largest-magnitude eigenvalue λmax of the adjacency matrix of the graph shown in Figure 4(d). Figure 4(a) shows a comparison when the SIS model is displaying endemic behaviour. We see here that after a very short time, the SIS model settles and shortly thereafter the finite memory process settles (albeit to a different value), while for the infinite memory process the individual rates of infection and hence the average In continue to increase in time. Since both the SIS model and the finite memory process have limited reinforcement, while the infinite memory process does not, these results are to be expected. Figure 4(b) displays a comparison where the epidemic threshold is met and the epidemic dies out for the SIS model. Here we note that In for both the infinite and finite memory processes decreases and approaches zero, albeit not as quickly as the SIS model. Hence we observe that when the curing parameter ∆b is much larger (in fact, more than five folds larger) than the infection parameter ∆r the epidemic is eliminated, as we expect, and this behaviour of the SIS model is captured by the network Polya contagion process. However, the finite memory process does not fully approach zero, since the initial conditions Ri and Bi have a much larger influence relative to the infinite memory process. Finally, Figure 4(c) shows the case where the epidemic does not vanish and the parameters in both models are set to be equal (δSIS = βSIS and ∆b = ∆r). We observe a similar trend between all models, with the finite and infinite memory processes exhibiting near-identical behaviour. Through these observations, we may conclude that both versions of the network Polya contagion process may apply to the modelling of epidemics, albeit in different applications. The finite memory process exhibits behaviour that is more closely related to the SIS model since they are both limited reinforcement processes, and hence it may be best suited to traditional biological diseases. The infinite memory process obeys similar trends, but in the endemic state there are some interesting differences since the effects of the infection continue to spread throughout the population. On the other hand, the SIS model quickly settles and does not change in time. Thus with infinite memory our process is better suited to modelling opinion dynamics, the spread of ideas, and advertising schemes. 11 VI. CONCLUSION We introduced a network epidemics model based on the classical Polya urn scheme, and we investigated its stochastic properties and asymptotic behaviour in detail. We showed that under certain conditions the proportion of red balls in individual urns and the network susceptibility, which are pro- cesses used to measure infection, admit limits. Three classical Polya processes were proposed, one computational and two analytical, to statistically approximate the contagion process of each node. Empirical results were presented which show that the approximations are a good fit for a range of system parameters. Our process was also compared empirically with the discrete-time SIS model, showing a similar behaviour, particularly in the finite memory mode, while providing dif- ferent degrees of reinforcement in the endemic state, with the largest reinforcement occurring under the infinite memory mode. Future directions of research include investigations into the curing of these processes, and the further study of the network contagion process with finite memory. REFERENCES [1] M. Hayhoe, F. Alajaji, and B. Gharesifard, "A Polya urn-based model for epidemics on networks," Proc. 2017 American Cont. Conf., 2017. [2] L. Kim, M. Abramson, K. Drakopoulos, S. Kolitz, and A. Ozdaglar, "Estimating social metwork structure and propagation dynamics for an infectious disease," in Proc. Int. Conf. Social Computing, Behavioral- Cultural Modeling, and Prediction, pp. 85–93, Springer, 2014. [3] M. Garetto, W. Gong, and D. Towsley, "Modeling malware spreading dynamics," in Proc. IEEE Int. Conf. Comp. Commun., vol. 3, pp. 1869– 1879, 2003. [4] E. M. Rogers, Diffusion of Innovations. 5 ed., 2003. [5] E. Adar and L. A. Adamic, "Tracking information epidemics in IEEE/WIC/ACM Int. Conf. Web Intelligence, blogspace," in Proc. pp. 207–214, 2005. [6] D. Easley and J. Kleinberg, Networks, Crowds and Markets: Reasoning about a Highly Connected World. Cambridge Univ. Press, 2010. [7] P. V. Mieghem, J. Omic, and R. Kooij, "Virus spread in networks," IEEE/ACM Trans. Netw., vol. 17, no. 1, pp. 1–14, 2009. [8] F. Eggenberger and G. Polya, " Uber die statistik verketteter vorgange," Z. Angew. Math. Mech., vol. 3, no. 4, pp. 279–289, 1923. [9] G. Polya and F. Eggenberger, "Sur l'interpr´etation de certaines courbes de fr´equences," Comptes Rendus C. R., vol. 187, pp. 870–872, 1928. [10] G. Polya, "Sur quelques points de la th´eorie des probabilit´es," Annales de l'institut Henri Poincar´e, vol. 1, no. 2, pp. 117–161, 1930. [11] A. Rosenblatt, "Sur le concept de contagion de M. G. Polya dans le calcul des probabilites," Acad. Nac. de Cien. exactas, Fis. Nat., pp. 186– 204, 1940. [12] C. F. Martin, L. J. S. Allen, and M. S. Stamp, "An analysis of the transmission of chlamydia in a closed population," Jour. Diff. Eqns. Appl., vol. 2, pp. 1–29, 1996. [13] R. Pemantle, "A survey of random processes with reinforcement," Probab. Surveys, vol. 4, no. 0, pp. 1–79, 2007. [14] A. Banerjee, P. Burlina, and F. Alajaji, "Image segmentation and labeling using the Polya urn model," IEEE Trans. Image Proc., vol. 8, no. 9, pp. 1243–1253, 1999. [15] R. Ash and C. Dol´eans-Dade, Probability and Measure Theory. Aca- demic Press, 2000. [16] G. R. Grimmett and D. R. Stirzaker, Probability and Random Processes. Oxford Univ. Press, 3 ed., 2001. [17] W. Feller, An Introduction to Probability Theory and its Applications, vol. 2. New York: Wiley, 2 ed., 1971. [18] F. Alajaji and T. Fuja, "A communication channel modeled on conta- gion," IEEE Trans. Inf. Theory, vol. 40, no. 6, pp. 2035–2041, 1994. [19] R. Pemantle, "A time-dependent version of Polya's urn," Journal of Theor. Probab., vol. 3, no. 4, pp. 627–637, 1990. [20] M. Chen and M. Kuba, "On generalized Polya urn models," Journal of Appl. Probab., vol. 50, no. 4, pp. 1169–1186, 2013. [21] N. L. Johnson and S. Kotz, Urn Models and Their Application. 1977. 0.475 PSfrag replacements SIS average Memory 50 In Inf. memory In Average ρ 0.025 1, 000 SIS average Memory 50 In Inf. memory In Average ρ 500 1, 000 (b) δSIS βSIS = ∆b ∆r = 1.01λmax. (a) δSIS βSIS 500 ∆b ∆r = = λmax 10 . 12 1 PSfrag replacements 0.9 0.75 0.475 PSfrag replacements 0.475 0.469 SIS average Memory 50 In Inf. memory In Average ρ 500 1, 000 (c) δSIS βSIS = ∆b ∆r = 1 and λmax > 1. (d) 100-node Barabasi-Albert network [23]. Fig. 4. Comparison between discrete time SIS model average infection rate 1 i=1 Pi(n) and the network Polya contagion process average infection rate In. Simulation results were averaged over 5, 000 trials, and the initial parameters Ri and Bi for all nodes were randomly assigned but consistent throughout all trials for a given case. Here λmax ≈ 5.05, βSIS = 0.15 and ∆r = 2 for all cases, while δSIS and ∆b were set according to the ratios given above. N PN [22] T. M. Cover and J. A. Thomas, Elements of Information Theory. 2006. [23] R. Albert and A. L. Barab´asi, "Statistical mechanics of complex net- works," Reviews of Modern Physics, vol. 74, no. 1, pp. 47–97, 2002. [24] Y. Wang, D. Chakrabarti, C. Wang, and C. Faloutsos, "Epidemic spreading in real networks: an eigenvalue viewpoint," in Proc. 22nd Intl. Symp. Reliable Dist Sys., pp. 25–34, 2003. [25] H. J. Ahn and B. Hassibi, "Global dynamics of epidemic spread over complex networks," in 2013 Conf. Dec. & Cont., pp. 4579–4585, 2013. Fady Alajaji (S'90 - M'94 - SM'00) received the B.E. degree with distinction from the American Uni- versity of Beirut, Lebanon, and the M.Sc. and Ph.D. degrees from the University of Maryland, College Park, all in electrical engineering, in 1988, 1990 and 1994, respectively. He then held a postdoctoral appointment in 1994 at the Institute for Systems Research, University of Maryland. In 1995, he joined the Department of Mathemat- ics and Statistics at Queen's University, Kingston, Ontario, where he is currently a Professor of Math- ematics and Engineering. Since 1997, he has also held a cross-appointment with the Department of Electrical and Computer Engineering at the same university. In 2013-2014, he served as acting head of the Department of Mathematics and Statistics, and from 2003 to 2008, he served as chair of the Queen's Mathematics and Engineering program. His research interests include information theory, joint source-channel coding, error control coding, data compression and digital communications. Dr. Alajaji served as Area Editor for Source-Channel Coding and Signal Processing from 2008 to 2015 and as Editor for Source and Source/Channel Coding from 2003 to 2012 for the IEEE Transactions on Communications. He served as organizer and Technical Program Committee member for several international conferences and workshops. He received the Premier's Research Excellence Award from the Province of Ontario in recognition for his research in "the theory and practice of joint source-channel coding in telecommunication systems." Mikhail Hayhoe received the B.Sc. degree in Math- ematics and Engineering in 2015 and the M.A.Sc. degree in Applied Mathematics in 2017, both from Queens University, Kingston, ON, Canada. He is currently a Ph.D. student with the De- partment of Electrical and Systems Engineering at the University of Pennsylvania, Philadelphia, PA, USA. He was a finalist for the Student Best Paper Award at ACC 2017. His research interests include systems and control, optimization, social networks, information theory, big data, and machine learning. Bahman Gharesifard (M'13) received the B.Sc. degree in Mechanical Engineering, in 2002, and the M.Sc. degree in Control and Dynamics, in 2005, from Shiraz University, Iran. He received the Ph.D. degree in Mathematics, in 2009, from Queen's Uni- versity, Canada. He held postdoctoral positions with the Depart- ment of Mechanical and Aerospace Engineering at University of California, San Diego 2009-2012 and with the Coordinated Science Laboratory at the Uni- versity of Illinois at Urbana-Champaign from 2012- 2013. He held a visiting faculty position at the Institute for Systems Theory and Automatic Control at the University of Stuttgart in summer of 2016. He is currently an Assistant Professor with the Department of Mathematics and Statistics at Queen's University. His research interests include systems and controls, distributed control and optimization, social and economic networks, game theory, geometric control and mechanics, and Riemannian geometry.
1804.09070
2
1804
2018-10-17T21:34:47
International Research Collaboration: Novelty, Conventionality, and Atypicality in Knowledge Recombination
[ "cs.SI" ]
Research articles produced through international collaboration are more highly cited than other work, but are they also more novel? Using measures developed by Uzzi et al. (2013), and replicated by Boyack and Klavans (2014), this article tests for novelty and conventionality in international research collaboration. Scholars have found that coauthored articles are more novel and have suggested that diverse groups have a greater chance of producing creative work. As such, we expected to find that international collaboration tends to produce more novel research. Using data from Web of Science and Scopus in 2005, we failed to show that international collaboration tends to produce more novel articles. In fact, international collaboration appears to produce less novel and more conventional knowledge combinations. Transaction costs and communication barriers to international collaboration may suppress novelty. Higher citations to international work may be explained by an audience effect, where more authors from more countries results in greater access to a larger citing community. The findings are consistent with explanations of growth in international collaboration that posit a social dynamic of preferential attachment based upon reputation.
cs.SI
cs
International Research Collaboration: Novelty, Conventionality, and Atypicality in Knowledge Recombination Authors: Caroline S. Wagner1, Travis A. Whetsell2*, Satyam Mukherjee3 Abstract: Research articles produced through international collaboration are more highly cited than other work, but are they also more novel? Using measures developed by Uzzi et al. (2013), and replicated by Boyack and Klavans (2014), this article tests for novelty and conventionality in international research collaboration. Scholars have found that coauthored articles are more novel and have suggested that diverse groups have a greater chance of producing creative work. As such, we expected to find that international collaboration tends to produce more novel research. Using data from Web of Science and Scopus in 2005, we failed to show that international collaboration tends to produce more novel articles. In fact, international collaboration appears to produce less novel and more conventional knowledge combinations. Transaction costs and communication barriers to international collaboration may suppress novelty. Higher citations to international work may be explained by an audience effect, where more authors from more countries results in greater access to a larger citing community. The findings are consistent with explanations of growth in international collaboration that posit a social dynamic of preferential attachment based upon reputation. Keywords international collaboration; novelty; creativity; bibliometrics; public policy 1 John Glenn College of Public Affairs, The Ohio State University, Columbus, OH USA 43210 [email protected] 2 Department of Public Policy & Administration, Steven J. Green School of International and Public Affairs, Florida International University, Miami, FL, USA, 33155 [email protected] *Corresponding author 3 Department of Operations Management, Quantitative Methods and Information Systems, Indian Institute of Management, Udaipur, India [email protected] Preprint 10/18 1 - Introduction International collaboration in scholarly research, resulting in published articles, has risen at a spectacular rate for three decades. The phenomenon has attracted a good deal of attention, focusing inductively on measurement rather than providing theoretical explanations. Literature shows that internationally coauthored articles tend to be more highly cited than national coauthorships or sole authored work (Glänzel & Schubert, 2001; Glänzel and deLange, 2002); that the more elite the scholar, the more likely it is that they are working at the international level (Jones et al., 2008; Parker et al., 2010); and that it tends to be more interdisciplinary (van Raan, 2003), suggesting new combinations. We do not know if international research is more novel than domestic or sole-authored research. This article explores the gap in the literature by applying measures of novelty and conventionality to international collaborative publications. Creativity and novelty are universally valued in scholarship, but this value is difficult to measure. The team of Brian Uzzi, Satyam Mukherjee, Mark Stringer, and Ben Jones, hypothesized that truly novel advances are accompanied by strength in conventional know-how, joined to a novel idea, often resulting from unique or atypical combinations of prior knowledge (Uzzi et al., 2013). Drawing upon the tradition where the reference to preceding work serves as an elementary building block of the scholarly attribution and reward system, they used this artifact as a proxy for novelty. Using this model of novelty and conventionality, they tested whether referencing behavior with deep conventionality combined with novelty is also more highly cited than just conventional or just novel work. The analysis of more than 17 million articles from the Web of Science (WoS) database supported the hypothesis. We follow this premise about the value of examining combinations of novelty and conventionality at the level of the full database. Further, we add to the original Uzzi et al. (2013) WoS data, and include data from a replication study using Scopus, to examine the validity of the approach. We examine the relationship between atypical combinations of conventionality and novelty and internationally coauthored work with the expectation that international collaboration would also be more likely to produce atypical combinations. This article presents the results of this test. Preprint 10/18 The article is organized as follows: First, we review the literature on international collaboration, atypicality, and creativity. Next, we present the data, variables, and methods for this study. We then present the results of our analysis by examining international collaboration in light of the conventionality/novelty data. We further explore the data by testing for differences between natural science and engineering, social sciences, and the arts and humanities, as well as at the level of six disciplines. Finally, we discuss the findings and their implications for future research and for public policy. 2 -- Literature Review 2.1 Growth of International Collaboration in Science International collaboration is defined here as occurring when researchers from two or more nations list their names and addresses as authors on a scholarly article. We do not know if the coauthors operated as teams, collaborations, or inter-institutional cooperators (Katz & Martin, 1997). However, we dub these artifacts to be 'collaborations,' assuming that they reflect mutual intellectual and social influence. International collaboration has grown more than 10-fold since 1991 for the most advanced countries, and 20-fold for the BRICs (Brazil, Russia, India, and China) (Adams, 2013). Many more nations participate in these publication activities than was the case two decades ago (Bornmann et al., 2015). In Web of Science (WoS) the percentage of articles, notes, and letters that are internationally coauthored has grown from 10% in 1990 to 25% in 2011(Wagner et al. 2015). The number of authors per article has also grown. Wuchty et al. (2007) analyzed what they called "team size," showing growth in numbers of coauthors across all fields of scholarship (national and international) in the Web of Science from over a 45-year period. Gazni et al. (2012) supported Glänzel and de Lange (2002) showing growth in the number of coauthorships per article at the international level. Using SCImago Institutions Rankings, Benavent-Perez et al. (2012) show decreases in sole-authored publications. Figure 1 shows the changes by selected regions and countries, where the United States, the European Union, and Japan have produced steadily increasing international research, while China, Taiwan, and South Korea have lagged behind. Preprint 10/18 Figure 1 -- Percent of Research Articles with International Coauthorships by Major Scientific Contributors, 1989-2009, Source: National Science Board, 2012 International works are more likely to be highly cited (Smart & Bayer, 1986; Glänzel and Schubert, 2001; Persson et al., 2004; He, 2009; Ganzi et al., 2012). Narin et al. (1991) showed that internationally coauthored articles were cited two times the rate of ones from a single country. Wagner et al. (2017) examined international collaborations in six scientific disciples showing that a rise in the number of countries-per-article was also linked to higher citations. The number of countries per article is also shown to be significant for increased citations (Didegah & Thelwall, 2013; Wagner et al., 2017). Glänzel (2001) showed that international publications have higher-than-expected citation rates in all scientific fields. Glänzel and de Lange (2002) showed growth in the number of authors per article at the international level, as well as growth in the average number of organizations and nations per co-publication. Internationally collaborative research seems to be attracting greater attention than domestically produced research (Lariviere et al., 2015). Lancho-Barrantes et al. (2013) and Archambault et al. (2016) support Presser (1980) in finding that international collaboration is associated with greater scientific quality. Lariviere et al. (2015) showed that multiple-countries per article are more likely to have atypical combinations of Preprint 10/18 referenced work than single or pair-authored articles. Others have pointed to improved performance of international collaborations (Fleming, 2007). More heterogeneous teams or collaborations, which we assume is the case with international projects, have greater opportunity to leverage the expertise of members and to bring a wider range of information to the knowledge creation process (Bercovitz & Feldman, 2011; Cohen & Levinthal, 1990). 2.2 - Atypical combinations reflecting novel contributions Originality is a core goal of scholarship, but scholars must show mastery of a field when introducing new findings. A fine balance must be struck between demonstrating depth and mastery of a discipline and bringing original ideas. Depth is required to demonstrate bona fides, signaling to in-groups, using common language, accepted methods, and citations to the work of others. The "new" contributions, ones that bring original ideas, often involve incorporating ideas from different disciplines, research traditions, or frameworks4. Novel claims are validated based upon strong evidence, but in cases where new ideas are incorporated across disciplines, the fresh concepts can take longer to assimilate because they do not fit the conventional narrative, language, or culture (Wang et al., 2016; Cetina, 2009). This can make it risky for researchers to introduce truly novel ideas (Stephan et al., 2017; Simonton, 2004), especially without tying them to precedents. In discussing the intellectual and social organization of the sciences, Whitley (1984) suggested that disciplines are "systems of jointly controlled novelty production in which researchers have to make new contributions to knowledge in order to acquire reputations from particular groups of colleagues…" (p. 85). Reputation is often the result of producing scholarly work that offers a novel discovery, new method, advanced theorem, or insight -- something that solves a puzzle or gives a new perspective on one. Stephan (2012) follows Merton (1973) defining reputation as "being built by being the first to communicate a finding, thereby establishing priority of discovery…." (p. 5). The scholarly article is the venue to communicate findings. Price (1965) and Merton (1973) regarded the publication of a scientific article as acknowledgment of its original contribution. 4 Combinatorics is distinct from discovery, where a new object, such as an exoplanet or a bacteria, may be found but no new combinations of knowledge are indicated in the references of publications announcing it. Preprint 10/18 Articles contain lists of references, citing prior work; by doing so, scholars reconstruct the intellectual antecedents and sources of their knowledge claims (Fujigaki, 1998). In theory, an article that has passed peer review should be adding something new to a field. However, more than 50 percent of published articles are not cited at all, suggesting that some material does not capture attention (Hamilton, 1990). Whether the contribution is acknowledged is often a social outcome with acquaintances, colleagues, and co-nationals citing one another for social, as well as research-related reasons (Bornmann & Daniel, 2008; Garfield & Merton, 1979). Highly cited work contributes to setting the agenda for further research. This part of the process may require a communication strategy, combined with reputation, as much as it does the introduction of new ideas. Whether a finding is truly novel--in the sense of highly creative, risky, or revolutionary-- often cannot be determined at the time of publication; instead, it may require some length of time for the scholarly community to recognize the validity of a new finding, or time for promoters of the ideas to disseminate them. Examining citations over time can provide some insight into the variety of impacts among scholarly publications (van Raan, 2014; Bornmann & Daniel, 2008). The need to publish and gain attention to one's work means that there are few high-risk articles. The ones who take risks may be well positioned to gain attention, but "the additional reward does not compensate for the risk of failing to publish…." (Foster et al., 2015, p. 875). Similarly, Estes & Ward (2002) said "creative ideas are often the result of attempting to determine how two otherwise separate concepts may be understood together…" (p. 149), which can represent new ideas, but which is a risky strategy, especially if the separate concepts are from different disciplines. Interdisciplinary articles may fail peer review: "…creative thought calls for the combination and reorganization of extant categories…." (Mobley et al., 1992, p. 128). However, they also point out the higher risk of failure (see also Stephan et al., (2017)). There are no specific signals for identifying the originality, novelty, or creativity likely to produce a highly cited article. Rather, decisions about the potential contribution of new research are likely to be made as judgments by editors and reviewers during the peer-review process. If an article does not introduce a new idea in a way that satisfies the reviewers or journal editors, the work may be criticized as "too conventional", i.e. not adding something new to the literature. On the other hand, if an article is too novel, radical, or revolutionary it may not pass muster with reviewers and editors. Preprint 10/18 One way to measure this combinatorial dynamic is after publication by searching lists of references for unexpected combinations. The resulting atypical referencing behavior serves as a proxy measure for recombination of knowledge. Börner et al. (2012) visually maps fields of science, showing the distance between them and just how unlikely it might be to bridge gaps between, for example, fields such as brain research and ecology. These combinations can be indicated in diverse reference pairs (See Schilling & Green, 2011 for an excellent literature review). To explore this, Uzzi et al. (2013) hypothesized that the highest impact articles are likely to reference novel combinations of existing knowledge, which remain embedded in and supported by deeply conventional knowledge. In other words, novel findings will emerge from depth of understanding of supporting knowledge, joined to the new idea. Further, variety and cross-cultural diversity ("cognitive distance") could be contributing to greater creativity and therefore drawing attention to this work (Lee et al., 2015; Alshebli et al., 2018). The reach of an international network might extend the "search space" of a group and thereby result in access to more new ideas (Schilling and Green 2015). Larivière et al. (2015) examined 9.2 million interdisciplinary research articles published between 2000 and 2012 and showed that the majority (69.9%) of referenced interdisciplinary pairs resulted in "win-win" relationships, i.e., articles that cite these diverse articles have higher citation impact. Articles with "atypical combinations" -- statistically rare journal-journal combinations--attracted the highest relative number of citations. We expect those participating in international collaboration to have enhanced access to a diversity of ideas. The cultural differences brought by researchers from different countries may enrich idea generation. Schilling & Green (2015) note: "The work on recombinant search lends support to this position by noting that unfamiliar or atypical combinations of knowledge yield novel outcomes with greater variance in performance…" (p. 1320). They further note that "…[k]nowledge creation occurs when new information is integrated within the network, or when the existing information within the network is recombined in new ways…" (p. 1323), conditions that are more likely to be found in international groups. These insights lead to the question of how researchers might measure creativity and novelty to produce general insights relevant to science policy. This finding motivated our research. 2.3 - Creativity and novelty in scholarly publications Preprint 10/18 There are many different definitions of creativity and novelty in the literature, and the literature is quite extensive. It is beyond this paper to survey the entire field. This paper focuses on those efforts to measure the phenomenon. Directly relevant literature suggests that creativity and novelty are likely to emerge from diverse teams of people (Falk-Krzesinski et al., 2010; Fiore, 2008; Stokols et al., 2008; Wuchty et al., 2007; Uzzi & Spiro, 2005). Mâsse et al. (2008) suggest that groups of researchers have a greater chance of creating novel findings because they are "integrating the concepts and methods drawn from multiples disciplines and analytic levels…" (p.S152). Estes & Ward (2002) discuss the literature around creative functioning of groups, noting that "a common thread connecting these views is that creative ideas are often the result of attempting to determine how two otherwise separate concepts may be understood together…." (p. 149). Schilling & Green (2011), citing Simonton (1995, 1999), note that "…research suggests that ideas are more likely to be high impact when they are the result of a successful connection forged between seemingly disparate bodies of knowledge…" (p. 1321). Guimera et al. (2005) suggest "creativity is spurred when proven innovations in one domain are introduced into a new domain, solving old problems and inspiring fresh thinking…" (p.697). Scientific achievements are often described as a search in space of combinatorial possibilities, leading to fresh insights and technological breakthroughs. Prior works on technology, history, anthropology, and archaeology have addressed the key role of "combinations" in linking innovation and scientific and technological impact. Azoulay et al. (2011) note that most efforts to model the creative process consider it as cumulative, interactive recombinations of existing bits of knowledge, combined in novel ways. In their review seeking novelty in patent data, Youn et al. (2015) cited earlier work that "…posits the combination of new and existing technological capabilities as the principal source of technological novelty and invention…" (p.1). Foster et al. (2015) noted that "[a]n innovative publication is more likely to achieve high impact than a conservative one…" (p. 875) but these actions fail more frequently than they succeed. Stephan et al. (2017) found that high risk articles are more likely to be in the top 1% highly cited articles, although recognition can be delayed (Wang et al, 2017). Wang et al. (2017) found that highly novel articles are more likely to be found in journals with lower Impact Factors -- suggesting that atypical combinations may have a difficult time finding acceptance in the canon of literature. Schilling & Green (2011) note that atypical variance can lower average Preprint 10/18 performance of outcomes, but they also can contribute to exceptionally high-performing outcomes. The Uzzi et al. (2013) team showed that works with a combination of high novelty and high conventionality were twice as likely as the average article to be 'hit' articles. For their analysis, the team used Web of Science's 50-year data set of articles to analyze journal-journal references. They sought to determine whether pairs of cited references are conventional (more than expected by chance) or novel (less than expected by chance). Using cited references from nearly 18 million articles, they calculated actual and expected counts for 302 million references to 15,613 journals. For each referenced journal pair, these were converted into z-scores. Ten Monte-Carlo simulations were run that reassigned edges in random ways, while preserving temporal and distributional characteristics of the original citation network. Boyack and Klavans (2014) conducted a complementary analysis to replicate the Uzzi et al. (2013) findings, this time using Scopus 10-year data set of articles and conference papers. They used a K50 statistics method for journal pairs rather than using the z-scores and Monte Carlo simulations. They claim that K50 has the same general formulation as the ones used by Uzzi et al. (2013). The difference is that the expected and normalization values for K50 are calculated using row and column sums from the square co-citation count matrix rather than using a Monte Carlo technique. Boyack and Klavans (2014) were able to reproduce the Uzzi et al. (2013) findings for z-score distributions and citations to a high degree, despite using a different database. However, they found a disciplinary effect (discussed below). Using a similar approach, Stephan, Veugelers & Wang (2017) and Wang, Veugelers & Stephan (2017) also tested published articles for atypicality. They drew from WoS for the year 2001 and used a "commonality score" which measured the expected number of co-citations. This is measured as a joint-probability of co-occurrence of two journals in a reference list, times the number of all journal pairs. The difference between Stephan et al. (2017) and Uzzi et al. (2013) is in the novelty score: Uzzi et al. (2013) measured the z-scores using a null model. Stephan et al. (2017) used a ratio of observed over expected, where 'expected' is analytically estimated based upon data in the analysis. Further, Stephan et al. (2017) examined a second-order co-citation distance based on previous years' co-citations, or, journal pairs that were not co-cited before Preprint 10/18 (similarity equals to 0 based on first-order co-citations), and then they examine similarity based on co-cited journals (that is, measuring their similarity using second order co-citations). They found that more novel articles were more likely to be either a big hit or ignored, supporting Foster et al. (2015) and partially supporting Uzzi et al. (2013). These articles have explored the effects of novelty and conventionality on citation impact, providing evidence that atypical combinations of novelty and conventionality have the highest probability of producing a 'hit' article. In this article, we are more concerned with identifying whether international collaboration tends to produce, novel, conventional, or atypical referencing behavior. This article is more focused on the antecedents of novelty, conventionality, and atypicality, than the citation impact of international collaboration. The following section describes the data, variables, and methods used in this article. 3 - Data, Variables, and Methods Our primary data set is from the Uzzi et al. (2013) study, which contains roughly 850,000 articles from Web of Science in the year 2005 and includes metadata on authors, affiliations, fields, references, and citations. For robustness checks, we added four years of WoS data (2001- 2004), which together with 2005 data comprised roughly four million observations. We also used 2005 Scopus data, employed by Boyack and Klavans (2014), which included roughly one million observations (see Section 4.1 and Appendix for robustness checks). We applied the Uzzi et al. (2013) method of identifying conventionality and novelty to test whether internationally collaborative articles fall into the 'atypical' (high-novel/high- conventional) quadrant. The computation analyzed pairwise combinations of references in the bibliography of each article from the Web of Science for the 5 years studied. The counts measured the frequency of each referenced journal pair across all articles in the database (not disciplinary specific) and compared the observed frequency to those expected by chance. Z- scores for each journal pair were derived by comparing the observed frequency with the frequency distribution created with the randomized citation network. This procedure resulted in two summary statistics: the 10th percentile z-score of a article, and the median z-score of that Preprint 10/18 article. While the former quantifies the novelty of an article, the latter tells us about the central tendency of the journal combinations of the article (Mukherjee et al., 2015). In Figure 2 we illustrate the probability distribution of 10th percentile z-scores of all articles published in 2005, as indexed in WoS database. Using the approach from Uzzi et al. (2013), a journal pair with 10th percentile z-score less than 0 signifies a "novel combination". Note, for the analysis where 10th percentile z-score is used as a continuous measure, the variable was reverse coded for consistent interpretation as "novelty". Figure 2. Probability Distribution of 10th percentile z-score, 2005. The figure shows the distribution of z-scores where values below zero are considered novel, else conventional. Figure 3 shows the probability distribution of median z-score of all articles published in 2005. Since a z-score value more than 0 signifies an observed journal pair frequency appears more than what is expected by chance, we call these "conventional combinations" (Mukherjee et al., 2015). Preprint 10/18 Figure 3. Probability distribution of median z-score, 2005. The Figure shows values below zero are considered more novel. For the analysis, we consider values above the grand median are highly conventional. In keeping with the procedure specified in Uzzi et al. (2013), these continuous variables are binarized and then combined into a nominal variable. For novelty, 10th percentile z-score values below zero are coded as 1, representing high novelty, or HN; values above or equal to zero are coded as 0, representing low novelty, or LN. For conventionality, median z-score value above or equal to the overall median is coded as 1 for high conventionality, or HC; and below the overall median is coded as a 0, for low conventionality, or LC. We combine two binary variables into a nominal variable, illustrated in Figure 4, where Category 1 is high novel and high conventional, or HN/HC; Category 2 is high novel and low conventional, or HN/LC; Category 3 is low novel and high conventional, or LN/HC; and Category 4 is low novel and low conventional, or LN/LC. Figure 4 also shows the frequency of articles that belong to each category. Note that the categories in Figure 4 are employed in the multinomial logistic regression models in Tables 4 and A.6. Preprint 10/18 Figure 4. Nominal variable categorizing articles based on a combination of novel and conventional reference combinations. The numbers in the parentheses provide the percentage of papers in each category. Finally, we included control variables for 1) number of authors per article (Authors), 2) number of references per article (References), and 3) a subject category variable including 238 WoS categories (Field). For robustness checks we also made use of log transformations of countries and authors, as well as variables for number of continents (Continents) and a variable capturing language heterogeneity (Languages) (see Appendix). We use three types of regression analyses. First, for the continuous measures of novelty and conventionality we use OLS regression models. Second, we used logistic regression models to test the binary novelty and conventionality measures separately, using the same controls. Third, we use multinomial logistic regression, where the dependent variable has four categories, as described in Figure 4. All models include controls for number of authors, number of references, and field fixed effects. Including the field fixed effect is an important modeling decision, since novelty and conventionality are likely to vary significantly across scientific disciplines. 4 - Results Table 1 shows the descriptive statistics and bivariate correlations for all variables used in the subsequent analyses. All correlations are significant at a p-value below 0.0001, except for the Preprint 10/18 correlation between Novelty and number of authors (Authors), which has a p-value of 0.1087. The correlations show a negative relationship between number of countries (Countries) and Novelty and a positive relationship with Conventionality. The same pattern is observed with the binary versions of these variables (Novelty Bin) and (Conventionality Bin). These correlations suggest the need for further multivariate analysis. Table 1 -- Descriptive Statistics and Correlations, 2005 Variable 1- Novelty 2- Novelty Bin -56.9 840468 840468 0.35 840468 301.6 3- Conventionality 4- Conventionality Bin 840468 841546 847512 847512 5- Countries 6- Authors 0.5 1.3 4.4 22.2 N Mean Std Dev 3 4 5 6 2 1 1 1 0.179 -0.600 -0.213 -0.026 0.002 0.105 274.8 0.5 664.8 0.5 0.7 9.0 16.2 1 1 -0.231 -0.440 0.389 -0.014 0.075 0.048 0.028 0.013 0.012 0.390 0.113 0.007 0.080 0.076 0.054 1 1 7- References Table 1 Notes: All Correlations are significant = p-value<0.0001, except Authors-Novelty; which is non-significant; Data source, WoS. To illustrate the negative relationship between number of countries and novelty we show the mean tenth percentile z-score by number of countries in Figure 5. The figure shows that the average novelty score decreases slightly as the number of countries grows. This is consistent with the negative correlations observed in Table 2. Preprint 10/18 Figure 5. Mean Tenth Percentile Z-Score by Number of Countries, 2005. The z-score has been reverse-coded to be consistent with the analysis as a score for "novelty", showing a decrease in novelty as the number of countries increases. To illustrate the positive relationship between number of countries and conventionality, Figure 6 shows that the mean of the median z-score increases by number of countries. Preprint 10/18 Figure 6. Median z-score by Country Count, 2005. The figure shows an increase in the average conventionality score as the number of countries increases. Table 2 shows the OLS regression analysis where the dependent variables are novelty and conventionality respectively in the first and second models, measured as continuous z-scores. Each model includes an intercept, Countries, Authors, References, and Field fixed effect. Against expectation, an increase in Countries is negatively associated with Novelty, and positively associated with Conventionality. The opposite is observed for Authors, which are positively associated with Novelty and negatively associated with Conventionality. Table 2 -- OLS Regression Models, 2005 139 Novelty Conventionality -61.583 (3.89) -2.47 (0.475) 0.317 (0.035) 1.614 (0.02) Fixed 835698 0.086 (8.337) 17.77 (1.018) -1.613 (0.074) 0.173 (0.043) Fixed 835698 0.288 Intercept Countries Authors References Field N R2 Table 2 Notes: All estimates significant, p-value<.0001; standard errors in parentheses; Data source WoS. Table 3 shows the logistic regression results, where the dependent variables are binary. The results are similar to the regression models in Table 2. Against expectation, Countries is Preprint 10/18 negatively associated with Novelty and positively associated with Conventionality. The opposite is true for Authors, which is positively associated with Novelty and negatively associated with Conventionality. All estimates are significant, p<.0001, so asterisks are not shown for p-values. Table 3 -- Logistic Regression Models, 2005 Intercept Countries Authors References Field N AIC Wald -1.444 (0.036) -0.055 (0.004) 0.003 -0.647 (0.03) 0.063 (0.004) -0.001 (0.0003) Novelty Bin Conventionality Bin (0.0002) Fixed 835698 0.012 (0.0002) Fixed 835698 (0.0003) 0.008 1017311.7 53534.34 1084349.5 60068.87 Table 3 Notes: All estimates significant, p<.0001; except Authors in model 1, p=0.0063; Data source, WoS. Figure 7 illustrates the number of Countries by multinomial category with highest number of articles belonging to Category 3 (LN/HC). Preprint 10/18 Figure 7. Number of papers by number of countries. For each of the four categories demonstrated in Figure 4, we plot the number of papers published in 2005 as a function of number of countries (country count). Table 4 shows the results of four multinomial logistic regression models: 1) "All Fields"; 2) "Sciences"; 3) "Social Sciences"; and 4) "Arts and Humanities". Category 4 (LN/LC) is the reference category for all models. For brevity, we do not show the intercept estimates in the models. Against expectation, in the All Fields model (238 fields), Countries is most strongly associated with Category 3 (LN/HC), and Authors is most strongly associated with Category 2 (HN/LC). The Sciences model (165 fields) shows a similar pattern to the All Fields model. The Social Sciences model (42 fields) is different from the Sciences and All Fields models -- the sign on the coefficient for Countries is positive for Category 1 (HN/HC). However, the p-value is .0627, thus the estimate is not significant. The Arts and Humanities model shows a similar pattern, with a positive sign on Category 2 (HN/LC) and 3 (LN/HC) for Countries. However, the Arts and Humanities model also shows a stronger estimate for Countries' association with Category 3 (HN/LC). The Arts and Humanities model does not include the field fixed effect because the model could not converge, and the results could vary depending on the specific sub- field. Also, the Arts and Humanities tend to not have reference lists on articles, which make the novelty/conventionality analysis impossible for many articles. Preprint 10/18 Table 4 -- Multinomial Logistic Regression Models, 2005 All Fields Sciences Social Sciences Arts & Humanities Countries 1 - (HN, HC) 2 - (HN, LC) -0.012 (0.0083) -0.053*** Authors 2 - (HN, LC) 3 - (LN, HC) (0.006) 0.025*** (0.005) 1 - (HN, HC) 0.029*** (0.0013) 0.031*** (0.0013) 0.028*** (0.0013) References 1 - (HN, HC) 0.036*** (0.0004) 0.029*** (0.0003) 0.03*** (0.0003) 3 - (LN, HC) 2 - (HN, LC) 3 - (LN, HC) -0.016 (0.0084) -0.057*** (0.0061) 0.021*** (0.0056) 0.03*** (0.0013) 0.032*** (0.0013) 0.029*** (0.0013) 0.037*** (0.0004) 0.029*** (0.0003) 0.03*** (0.0003) Field N AIC Wald Fixed 835698 Fixed 788691 1824255 1914595.1 124820.25 107647.96 0.164 (0.088) -0.001 (0.039) 0.123*** (0.028) -0.035 (0.031) 0.072*** (0.01) -0.037*** (0.0086) 0.009** (0.0033) 0.018*** (0.0013) 0.023*** (0.0009) Fixed 39880 76992.56 5434.09 0.203 (0.499) 0.355** (0.131) 0.535*** (0.113) 0.198 (0.133) 0.262*** (0.037) -0.027 (0.037) 0.03 (0.015) 0.035*** (0.0042) 0.028*** (0.0035) n/a 6069 11506.7 261.42 Table 4 Notes: p<.05*, p<.01**, p<.001***; standard errors in parentheses; Category 4 is reference category; Data source, WoS. Preprint 10/18 4.1 Disciplinary Affects We also tested whether these results were consistent within specific disciplines, which have been shown to range in terms of citation patterns (Harzing 2010; Ioannidis et al. 2016). Uzzi et al. (2013) also examined the relationship between novelty, conventionality, and disciplines and found that the relationships generally held true, but that differences can be seen when controlling for disciplines. Boyack and Klavans (2014) examined disciplinary effects by taking the top 5% of highly cited articles by discipline, using the article-based discipline-level structure. Their findings suggested that highly cited disciplines have an affect on the relationship between novelty and conventionality. When disciplinary weights are considered, the relationship between novelty/conventionality and citation strength is not as prominent. Although their results confirmed the approximate relationship between categories of novelty and conventionality on citation impact, Boyack and Klavans found that weighting for disciplines influenced the outcome. We chose fields to reflect a range of referencing behavior, from astrophysics, which has high citing activity, to mathematics, which has low citing activity. We replicated the analysis for six scientific specialties that were analyzed in previous research (Wagner, Whetsell, & Leydesdorff 2017) using WoS data. At this disciplinary level, the results were either non-significant or they supported the main results in Table 4. We expected to find that high-citation fields also show a stronger relationship with Category 1. However, in all six fields, international collaboration was either positively associated with conventionality or negatively associated with novelty, or non- significant. For astrophysics and astronomy, international collaboration was not significant for Category 3 (LN/HC) but there was a significant negative association with Category 2 (HN/LC), suggesting international collaboration tends not to produce novel work. The same patterns held for geoscience/multidisciplinary. For virology, we observed that international collaboration was not significantly associated with any category. For polymers, we found a significant negative association with Category 1 (HN/HC). For agriculture and soil science, we found a significant positive association with Category 3 (LN/HC). Finally, for mathematics, we found negative associations with all categories. 4.2 Robustness Checks Preprint 10/18 We conducted robustness checks, detailed in the Appendix. First, we added four years of data, 2001 up to 2005, and performed identical OLS regressions for each year. We tested the models using different potentially confounding variables. We used number of continents and language as variables, but these move consistently with Countries. We tested models using the natural log of number of Countries and Authors to test for a potential non-linear effect, again with consistent results; Countries has a positive sign for Conventionality and a negative sign for Novelty, and the opposite for Authors. We tested a multinomial logistic regression model where median-z-score calculated by field. These checks produced results that were consistent with the main findings. 5 - Discussion Based upon findings that international collaboration is more highly cited, more diverse, and possibly structured for combinatorial dynamics, we expected to find that it also would be fall into the Uzzi et al. (2013) characterization of articles that are both highly novel and highly conventional, or consisting of "atypical" references, combining diverse parts into new knowledge (Category 1). This is not upheld by the analysis. International collaboration, in aggregate, indicates high conventional measures and low novelty measures for reference combinations. The results were tested for source publications for 2005 in two independent datasets, one using Web of Science used by Uzzi et al. (2013), and one using Scopus by Boyack and Klavans (2014), plus four additional years of WoS data. In addition, using a slightly different method of measuring atypicality, Jian Wang reported similar findings using Web of Science data for the year 2001, in a personal communication5. The negative finding against highly atypical referencing behavior in international collaboration, against expectations, led us to consider several possible explanations. We initially considered three possible explanations: 1) the higher transaction costs of international research may mitigate against high novelty; and 2) reliance on information technologies to communicate may reduce interjection of tacit knowledge -- which has been shown to contribute to creativity; and 3) the need to rely on English as a common language may limit exchange of information. While these features may hinder creativity, they do not explain why international collaboration is more highly cited than other work. For that, we turned to 4) sociological explanations: an audience effect, 5 July 2018. Preprint 10/18 which is almost surely at work, and a preferential attachment feature, which is consistent with all the data. 5.1- High transaction costs International projects may face higher levels of complexity resulting in higher transactions costs, such as the costs of coordination and communication (e.g., Williamson 1991; Ou, Varriale, & Tsui 2012; Lauto & Valentin 2013). The higher complexity can include the 1) awkwardness of working across time zones; 2) the need to travel periodically long distances to work together; 3) the loss of information due to sub-optimal communication routines; and 4) clashes of management systems (e.g. Leung 2013; Jeong 2014). Any one or combination of these obstacles may suppress otherwise creative or atypical knowledge pairing behavior, as international participants may withhold differences of opinion and defer to a lead author. In this sense, international collaboration may lean towards more hierarchical governance centralized around single or fewer leaders. Different worldviews, nomenclatures, languages, and expectations, can have the effect of slowing the integration of ideas, and may encumber the quality and validity of the results. Our initial hypothesis suggested that international collaboration might enhance creativity, supported by Stahl et al. (2010) who reported a meta-analysis of 108 multicultural teams and found that cross-cultural connections can lead to increased creativity and satisfaction. Fiore (2008) also found that diverse connections bring creativity to teams. But the results suggest that diversity may also introduce greater transaction costs that could hinder the communication leading to novel or creative ideas. The alternative hypothesis is supported also by Stahl et al. (2010) who found that "cultural diversity leads to process losses through task conflict and decreased social integration…." (p.690) and may create losses through task conflict and decreased social integration. 5.2 - Reliance on the English Language Language differences may be more problematical than cultural differences, especially for those working across countries. Many scholars work in English, even if it is their second language. Lagerström and Andersson (2003) found that members of multilingual teams may not understand Preprint 10/18 questions, assignments or results formulated in English if one or both communicators are not native speakers. Other researchers have also shown the negative effects of language differences on team activities (see Tenzer & Pudelko, 2012). This barrier may reduce opportunities for highly creative discussion that would lead to novel work among collaborators. 5.3 - Limitations on implicit communications Similar to the transaction costs logic discussed above, a further explanation of conventionality could involve the reliance on information-communications technologies (ICTs), which limits the ability to share tacit or implicit knowledge. Groups working at a distance are more likely than physically proximate groups to be using information-communications technologies (ICTs) to exchange information. ICTs favor the transmission of knowledge that can be codified and reduced to data (Roberts 2010). ICTs do not facilitate the exchange of tacit knowledge, defined as the tradition, inherited practices, implied values, and prejudgments held by people involved in a communications process. Polanyi said that tacit knowledge is a crucial part of scientific knowledge (1966). Tacit knowledge is shared through a socialization process; it becomes explicit through externalization (Leonard & Sensiper, 1998). Leonard & Sensiper (1998) wrote: "Researchers stimulating implicit learning found, in fact, that forcing individuals to describe what they thought they understood about implicitly learned processes often resulted in poorer performance than if the individuals were allowed to utilize their tacit knowledge without explicit explanation," (P. 114) meaning learning by doing and imitation are likely more effective ways of transmitting information than 'telling.' Further, they identify three types of tacit knowledge exercised in innovation processes: 1) problem solving, 2) problem finding, and 3) prediction and anticipation, all of which occur within group settings that are "born out of conscious, semiconscious, and unconscious mental sorting, grouping, matching, and melding…" (p. 115). These processes occur at an interpersonal level and are much richer in person than through a written medium. It may be that ICTs cannot substitute for the exchange of tacit knowledge as a critical component of innovation that take place face-to-face. The process of drawing conclusions and making observations will likely occur in a linear fashion, whereas theory suggests that innovation is an iterative process of divergence and convergence in concentric circles (Nonaka, 1994; Leonard & Sensiper, 1998). Distance could make this process difficult or unattainable. This part of the knowledge-creation process may be missing from virtual Preprint 10/18 collaboration, lessening the opportunities for novel outcomes. Leonard and Sensiper (1998) showed that learning by doing and imitation are likely more effective ways of transmitting tacit information than the cognitive process of 'telling' someone about a task or idea. Wuestman et al. (2018) said that "face-to-face interaction between scientists is … necessary to transfer the tacit knowledge that is required to judge the meaning … of a new finding…." (p. 2) ICTs, or the lack of collocation of collaborators enabling tacit information exchange, may inhibit emergence of creative ideas. More teammates or collaborators may introduce even more complications to the knowledge exchange process. Our research partially supports this proposition in that larger teams of authors are associated with higher novelty and negatively associated with conventionality. This support Wang et al. (2017), in that high-risk taking without shared depth in conventional knowledge has a higher risk of failure, and that large domestic teams produce more high-risk work than large international teams. Thus, face-to-face cooperation and communication may be more important factors for novelty than has been considered in the past. Distance collaborations may not allow the 'bandwidth' for communications needed for creative findings. Sugimoto et al. (2017) showed that researchers who are more mobile have about 40% higher citation rates than non-mobile ones, again supporting the need for face-to-face work. Similarly, Wagner, et al. (2018) found that more 'open' countries -- those welcoming newcomers, sending researchers to work abroad, and coauthoring internationally -- had higher citation impacts than other countries. These findings suggest that people working side-by-side may have a better outcome than those working virtually. 5.4 - Audience effect of international coauthorship Transaction costs, communication obstacles, and cultural differences are possible explanations for the high conventionality of international collaboration; however, these factors do not explain why international coauthorships are more highly cited. One would expect that less creative work would be less cited than other work. This spurred us to query other literature that has suggested that international collaborative articles are benefitting from an agglomeration effect, an audience factor (Zitt & Small, 2008), or a "bonus effect" (Kato & Ando, 2013). Network studies show that when performance is difficult to measure -- as it is with scientific or other scholarly pursuits -- Preprint 10/18 network connections, more than performance, are closely tied to success (Guimera et al., 2005). Schmoch and Schubert (2008) suggested that international articles are more highly cited because their readership community is larger. Börner et al. (2006) found that citations tended to occur in geographically proximate places first before diffusing outward. People may cite others close-by at first, so articles with multiple, dispersed addresses, may have broader citation possibilities. In this case, international collaboration might be a "force multiplier" for the numbers of people in the network of readers and citers (Lancho-Barrantes et al., 2012). More countries and more authors could mean more citations, whether or not the work is more creative. While an audience effect is a more satisfying explanation for the greater attention to international work than the three discussed above, one more part of the puzzle still defies explanation: why citation strength for international work persists over long periods of time. It could be argued that an audience effect could help citations in the short term, but not in the longer term. One would expect the audience effect to fade quickly. To explore this question, we turned to a sociological explanation. The findings fully support a social dynamic related to gaining citations through a process of preferential attachment, where reputation (rather than novelty) is the operative dynamic. Wagner and Leydesdorff (2005) showed that international collaborative networks are evolving through a pattern of preferential attachment -- where researchers seek to attach themselves to more reputed collaborators in order to enhance their own reputation. The process is one of aspirational collaboration with a person of high or higher reputation and resources. In the process of making an aspirational connection, one enhances one's own reputation-by-affiliation, and thereby gains attention to one's work. Moreover, a reputation effect has the further virtue of explaining why international collaboration is growing at a high rate. More practitioners worldwide are scrambling for recognition and reward, even as resources remain flat. Seeking attention on a broad 'stage' (offered at the international level) reaps rewards at the disciplinary and institutional levels. This explanation resonates with Whitley (2000) who observed that scholarship contains a tension distinguished by a commitment to produce novelty, on one hand, and the need for reputation, on the other. Indeed, Whitley says: "…the emphasis of the system on fame and fortune following from convincing a large number of influential colleagues of the importance of one's work ensures general adherence to current procedural norms…." (p. 23), suggesting that strong Preprint 10/18 reputation may even mitigate against novelty. Once reputation is gained, maintaining it can be done by adding incremental quanta of knowledge that do not risk disciplinary controversy, nor risk falling through the cracks between disciplines. In addition, the academic reward system does not always recognize value in interdisciplinary work such as those articles that may contain 'atypical' referencing pairs. Goring et al. (2014) point out that "….even within interdisciplinary organizations such as LTER [Long-Term Ecological Research], early career researchers still largely engage in projects within the single discipline" because of concern about adverse promotion and tenure impacts. The citation environment at the international level, then, could lean towards rewarding reputation as much or more than novelty, in part because the number of ties are higher and the reach to others is less specialized. It may also be the case, as Reagans and McElviy (2003) showed, that network range and social cohesion ease knowledge transfer. Thus, it is consistent with the findings in this article that citation strength of international work reflects network strength as much or more than quality or novelty. Indeed, within networks, reputation is a core driver of cohesion. Reputation is "sticky" and it can persist even beyond the point where an author's work is not particularly novel. The suggestion here is that international collaborations are notable because of the reputation of more elite scholars: others seek to attach to them, and as they do, reputation is enhanced in a virtuous cycle. The resulting output is cited because of the reputations of the authors. This could account for both a negative finding around novelty, but higher citation counts in both the short and the long term. This needs more exploration, especially within individual disciplines. 6 - Policy Implications & Conclusions Policymakers and program managers have tended to favor international collaboration in funding decisions (He, 2009). As more elite scientists participate in international collaboration, funding has followed. International projects claim substantial shares of national research and development budgets. No doubt, many international projects are productive and useful. However, the findings here suggest that there may be losses of creativity and novelty associated with distance. Preprint 10/18 International collaboration is undertaken for many reasons, as discussed by Beaver and Rosen (1978), and Katz and Martin (1997). In some cases, such as "big science" collaborations, large- scale equipment is needed. The infrastructure costs of research preclude any single country from undertaking it. Huge up-front investments are required to research particle physics, astrophysics, or geophysics. Other work, such virology, can require visits with on-the-ground researchers facing a specific outbreak, like the Zika virus, springing up in a unique location. Still other works can only proceed by sharing data or samples. These types of projects require collaborations. Other collaborations, such as those seeking an audience effect or reputation enhancement, may not have the characteristics of research that engenders highly creative work. In these cases, attention to facilitating enriched communications may be needed. This may mean ensuring that projects have enough budget to support frequent face-to-face meetings. It may also mean discouraging very large teaming arrangements (especially those that do not center around large equipment), as these seem to be antithetical to novelty/conventionality sweet spot communication identified by Uzzi et al. (2013). Further, it may mean, in some cases, finding alternatives to international collaboration when research is highly exploratory and where a good deal of cross-disciplinary discussion is required to move the field forward. An explicit plan to nurture research in this sweet spot may be needed for internationally collaborative projects. Preprint 10/18 References Adams, J. (2013). The fourth age of research. Nature 497 557-559. Adams, J. Black, G, Clemmons, R. Stephan, P. Scientific teams and institutional collaborations: Evidence from U.S. universities, 1981 -- 1999 (2005), Research Policy 34, 259-285. Alshebli, B. Rahwan, T. Woon, W.L. (2018) Ethnic Diversity Increases Scientific Impact. ArXiv:1803.02282v1. 6 March 2018. { https://arxiv.org/abs/1803.02282, accessed 9/2018] Archambault, E., Beauchesne, O., Cote, G. Roberge, G. (2016) Scale Adjusted Metrics of Scientific Collaboration. Montreal: Science-Metrix. Azoulay, P., Graff Zivin, J. S., & Manso, G. (2011). Incentives and creativity: evidence from the academic life sciences. The RAND Journal of Economics, 42(3), 527-554. Barjak, F., & Robinson, S. (2008). International collaboration, mobility and team diversity in the life sciences: impact on research performance. Social Geography, 3(1), 23-36. Beaver, D., & Rosen, R. (1978). Studies in scientific collaboration: Part I. The professional origins of scientific co-authorship. Scientometrics, 1(1), 65-84. Bercovitz, J., & Feldman, M. (2011). The mechanisms of collaboration in inventive teams: Composition, social networks, and geography. Research Policy, 40(1), 81-93. Börner, K., Klavans, R., Patek, M., Zoss, A. M., Biberstine, J. R., Light, R. P., & Boyack, K. W. (2012). Design and update of a classification system: The UCSD map of science. PloS one, 7(7), e39464. Börner, K., Penumarthy, S., Meiss, M., & Ke, W. (2006). Mapping the diffusion of scholarly knowledge among major US research institutions. Scientometrics, 68(3), 415-426. Bornmann, L., & Daniel, H. D. (2008). What do citation counts measure? A review of studies on citing behavior. Journal of documentation, 64(1), 45-80. Bornmann, L., Wagner, C., & Leydesdorff, L. (2015). BRICS countries and scientific excellence: A bibliometric analysis of most frequently cited papers. Journal of the Association for Information Science and Technology, 66(7), 1507-1513. Boyack, K., Klavans, R. (2014). Atypical combinations are confounded by disciplinary effects. International Conference on Science and Technology Indicators, September 3-5, 2014, Leiden, Netherlands. Cetina, K. K. (2009). Epistemic cultures: How the sciences make knowledge. Harvard University Press. Preprint 10/18 Cole, S., & Cole, J. R. (1967). Scientific output and recognition: A study in the operation of the reward system in science. American sociological review, 377-390. Cohen, W. M., & Levinthal, D. A. (2000). Absorptive capacity: A new perspective on learning and innovation. In Strategic Learning in a Knowledge economy (pp. 39-67). De Vaan, M., Stark, D., & Vedres, B. (2015). Game changer: The topology of creativity. American Journal of Sociology, 120(4), 1144-1194. Didegah, F., & Thelwall, M. (2013). Which factors help authors produce the highest impact research? Collaboration, journal and document properties. Journal of Informetrics, 7(4), 861-873. Estes, Z., & Ward, T. B. (2002). The emergence of novel attributes in concept modification. Creativity Research Journal, 14(2), 149-156. Falk‐Krzesinski, H. J., Börner, K., Contractor, N., Fiore, S. M., Hall, K. L., Keyton, J., ... & Uzzi, B. (2010). Advancing the science of team science. Clinical and translational science, 3(5), 263-266. Fiore, S. M. (2008). Interdisciplinarity as teamwork: How the science of teams can inform team science. Small Group Research, 39(3), 251-277. Fleming, L., King, C., & Juda, A. (2007). Small worlds and innovation. Organization Science, 18(6), 938-954. Fontana, M., Iori, M., Montobbio, F., Sinastra, R. (2018) A bridge over troubled water: interdisciplinarity, novelty, and impact. Conference paper, Science, Technology, and Innovation Indicators Conference, Leiden, Netherlands, September. Foster, J. G., Rzhetsky, A., & Evans, J. A. (2015). Tradition and innovation in scientists' research strategies. American Sociological Review, 80(5), 875-908. Fujigaki, Y. (1998). Filling the Gap Between Discussions on Science and Scientists' Everyday Activities: Applying the Autopoiesis System Theory to Scientific Knowledge. Social Science Information, 37(1), 5-22. Garfield, E., & Merton, R. K. (1979). Citation indexing: Its theory and application in science, technology, and humanities (Vol. 8). New York: Wiley. Gazni, A., Sugimoto, C. R., & Didegah, F. (2012). Mapping world scientific collaboration: Authors, institutions, and countries. Journal of the American Society for Information Science and Technology, 63(2), 323-335. Glänzel, W., & Schubert, A. (2001). Double effort= double impact? A critical view at international co-authorship in chemistry. Scientometrics, 50(2), 199-214. Preprint 10/18 Glänzel, W., De Lange, C. (2002), A distributional approach to multinationality measures of international scientific collaboration, Scientometrics, 54: 75 -- 89. Goring, S. J., Weathers, K. C., Dodds, W. K., Soranno, P. A., Sweet, L. C., Cheruvelil, K. S., ... & Utz, R. M. (2014). Improving the culture of interdisciplinary collaboration in ecology by expanding measures of success. Frontiers in Ecology and the Environment, 12(1), 39- 47. Guimerá, R., Uzzi., B., Spiro, J., Amaral, L. (2005) Team Assembly Mechanisms Determine Collaboration Network Structure and Team Performance. Science, 308(5722) 29 April 2005, 697-702. Hamilton, D. P. (1990). Publishing by -- and for? -- the numbers. Science, 250(4986), 1331-1332. Harzing, A. W. (2010). Citation analysis across disciplines: the impact of different data sources and citation metrics. URL http://www. harzing. com/data metrics comparison. htm. He, T. (2009). International scientific collaboration of China with the G7 countries. Scientometrics, 80(3), 571-582. Heinze, T., Shapira, P., Rogers, J. D., & Senker, J. M. (2009). Organizational and institutional influences on creativity in scientific research. Research Policy, 38(4), 610-623. Ioannidis, J. P., Klavans, R., & Boyack, K. W. (2016). Multiple citation indicators and their composite across scientific disciplines. PLoS biology, 14(7), e1002501. Jeong, S., Choi, J. Y., & Kim, J. Y. (2012). On the drivers of international collaboration: The impact of informal communication, motivation, and research resources. Science and Public Policy, 41(4), 520-531. Jones, B. F., Wuchty, S., & Uzzi, B. (2008). Multi-university research teams: Shifting impact, geography, and stratification in science. Science, 322(5905), 1259-1262. Kato, M., & Ando, A. (2013). The relationship between research performance and international collaboration in chemistry. Scientometrics, 97(3), 535-553. Katz, J. S., & Martin, B. R. (1997). What is research collaboration?. Research policy, 26(1), 1- 18. Larivière, V., Gingras, Y., Sugimoto, C. R., & Tsou, A. (2015). Team size matters: Collaboration and scientific impact since 1900. Journal of the Association for Information Science and Technology, 66(7), 1323-1332. Lagerström, K., & Andersson, M. (2003). Creating and sharing knowledge within a transnational team -- the development of a global business system. Journal of World Business, 38(2), 84-95. Preprint 10/18 Lancho-Barrantes, B. S., Guerrero-Bote, V. P., Chinchilla-Rodriguez, Z. & de Moya-Anegón, F. (2012). Citation Flows in the Zones of Influence of Scientific Collaborations. Journal of the American Society for Information Science and Technology 63(3): 481-489. Lancho-Barrantes, B. S., Guerrero-Bote, V. P., & de Moya-Anegón, F. (2013). Citation increments between collaborating countries. Scientometrics, 94(3), 817-831. Lauto, G., & Valentin, F. (2013). How Large‐Scale Research Facilities Connect to Global Research. Review of Policy Research, 30(4), 381-408. Lee, Y. N., Walsh, J. P., & Wang, J. (2015). Creativity in scientific teams: Unpacking novelty and impact. Research Policy, 44(3), 684-697. Leonard, D., & Sensiper, S. (1998). The role of tacit knowledge in group innovation. California management review, 40(3), 112-132. Leung, R. C. (2013). Networks as sponges: International collaboration for developing nanomedicine in China. Research Policy, 42(1), 211-219. Mâsse, L. C., Moser, R. P., Stokols, D., Taylor, B. K., Marcus, S. E., Morgan, G. D., ... & Trochim, W. M. (2008). Measuring collaboration and transdisciplinary integration in team science. American journal of preventive medicine, 35(2), S151-S160. Merton, R. (1973) The Sociology of Science. Chicago: University of Chicago Press. Mobley, M. I., Doares, L. M., & Mumford, M. D. (1992). Process analytic models of creative capacities: Evidence for the combination and reorganization process. Creativity Research Journal, 5(2), 125-155. Mukherjee, S., Uzzi, B., Jones, B., Stringer, M. (2015). A New Method for Identifying Recombinations of Existing Knowledge Associated with High-Impact Innovation, Product Innovation Management (33)2, 224-236. Narin, F., Stevens, K., & Whitlow, E. (1991). Scientific co-operation in Europe and the citation of multinationally authored papers. Scientometrics,21(3), 313-323. Narin, F., Stevens, K., & Whitlow, E. S. (1991). Scientific co-operation in Europe and the citation of multinationally authored papers. Scientometrics, 21(3), 313-323. Narin, F., & Whitlow, E. S. (1990). Measurement of scientific cooperation and coauthorship in CEC-related areas of science. Commission of the European Communities Directorate- General Telecommunications, Information Industries and Innovation. Nonaka, I., Byosiere, P., Borucki, C. C., & Konno, N. (1994). Organizational knowledge creation theory: a first comprehensive test. International Business Review, 3(4), 337-351. Preprint 10/18 Ou, A. Y., Varriale, L., & Tsui, A. S. (2012). International collaboration for academic publication: Implications from the resource-based view and transaction cost theory. Group & Organization Management, 37(4), 407-451. Parker, J. N., Lortie, C., & Allesina, S. (2010). Characterizing a scientific elite: the social characteristics of the most highly cited scientists in environmental science and ecology. Scientometrics, 85(1), 129-143. Persson, O., Glänzel, W., & Danell, R. (2004). Inflationary bibliometric values: The role of scientific collaboration and the need for relative indicators in evaluative studies. Scientometrics, 60(3), 421-432. Presser, S. (1980). Collaboration and the quality of research. Social Studies of Science, 10(1), 95- 101. Polanyi, M. (1966). The logic of tacit inference. Philosophy, 41(155), 1-18. Price, D. J. d. (1963), Little Science, Big Science…and Beyond, New York: Columbia University Press. Roberts, J. (2000). From know-how to show-how? Questioning the role of information and communication technologies in knowledge transfer. Technology Analysis & Strategic Management, 12(4), 429-443. Reagans, R., & McEvily, B. (2003). Network structure and knowledge transfer: The effects of cohesion and range. Administrative science quarterly, 48(2), 240-267. Schilling, M. A., & Green, E. (2011). Recombinant search and breakthrough idea generation: An analysis of high impact papers in the social sciences. Research Policy, 40(10), 1321- 1331. Schmoch, U., & Schubert, T. (2008). Are international co-publications an indicator for quality of scientific research? Scientometrics, 74(3), 361-377. Simonton, D. K. (1999). Origins of genius: Darwinian perspectives on creativity. Oxford University Press. Simonton, D. K. (2004). Creativity in science: Chance, logic, genius, and zeitgeist. Cambridge University Press. Stahl, G. K., Maznevski, M. L., Voigt, A., & Jonsen, K. (2010). Unraveling the effects of cultural diversity in teams: A meta-analysis of research on multicultural work groups. Journal of international business studies, 41(4), 690-709. Stokols, D., Misra, S., Moser, R. P., Hall, K. L., & Taylor, B. K. (2008). The ecology of team science: understanding contextual influences on transdisciplinary collaboration. American journal of preventive medicine, 35(2), S96-S115. Stephan, P. E. (2012). How Economics Shapes Science. Cambridge, MA: Harvard University Press. Preprint 10/18 Stephan, P., Veugelers, R., & Wang, J. (2017). Blinkered by bibliometrics. Nature, 544(7651), 411-412. Tenzer, H., & Pudelko, M. (2012). Leading Across Language Barriers: Strategies to Mitigate Negative Language-induced Emotions in Multinational Corporations. Uzzi, B., Mukherjee, S., Stringer, M., & Jones, B. (2013). Atypical combinations and scientific impact. Science, 342(6157), 468-472. Uzzi, B., & Spiro, J. (2005). Collaboration and creativity: The small world problem. American journal of sociology, 111(2), 447-504. Van Raan, A. F. (2004). Sleeping beauties in science. Scientometrics, 59(3), 467-472. Van Raan, A. F. (2003). The use of bibliometric analysis in research performance assessment and monitoring of interdisciplinary scientific developments. Technology Assessment- Theory and Practice, 1(12), 20-29. Wagner, C. S., Horlings, E., Whetsell, T. A., Mattsson, P., & Nordqvist, K. (2015). Do Nobel Laureates create prize-winning networks? An analysis of collaborative research in physiology or medicine. PloS one, 10(7), e0134164. Wagner, C.S., & Leydesdorff, L. (2005). Network structure, self-organization, and the growth of international collaboration in science. Research policy,34(10), 1608-1618. Wagner, C. S., Park, H. W., & Leydesdorff, L. (2015). The continuing growth of global cooperation networks in research: A conundrum for national governments. PLoS One, 10(7), e0131816. Wagner, C. S., Whetsell, T. A., & Leydesdorff, L. (2017). Growth of international collaboration in science: revisiting six specialties. Scientometrics, 110(3), 1633-1652. Wagner, C. S., Whetsell, T., Baas, J., & Jonkers, K. (2018). Openness and impact of leading scientific countries. Frontiers in Research Metrics and Analytics, 3, 10. Whitley, R. (1984), The Intellectual and Social Organisation of the Sciences, Oxford, England: Oxford University Press. Oxford: Oxford University Press. Wang, J., Veugelers, R., & Stephan, P. (2017). Bias against novelty in science: A cautionary tale for users of bibliometric indicators. Research Policy, 46(8), 1416-1436. Williamson, O. E. (1991). Comparative economic organization: The analysis of discrete structural alternatives. Administrative Science Quarterly, 269-296. Wuchty, S., Jones, B.F., & Uzzi, B. (2007). The increasing dominance of teams in production of knowledge. Science, 316(5827), 1036-1039. http://science.sciencemag.org/content/316/5827/1036.full Preprint 10/18 Youn, H., Strumsky, D., Bettencourt, L. M., & Lobo, J. (2015). Invention as a combinatorial process: evidence from US patents. Journal of The Royal Society Interface, 12(106), 20150272. Youn, H., Strumsky, D., Bettencourt, L. M., & Lobo, J. (2015). Invention as a combinatorial process: evidence from US patents. Journal of The Royal Society Interface, 12(106), 20150272. Zeng, S. X., Xie, X. M., & Tam, C. M. (2010). Relationship between cooperation networks and innovation performance of SMEs. Technovation, 30(3), 181-194. Preprint 10/18 Appendix - Robustness Checks & Tests We conducted the following robustness checks: (1) logistic regression and multinomial regression models using Scopus data for 2005 (Table A.1; A.3); (2) OLS regressions for four additional years of data (Table A.3); (3) Fixed-effects models using different potentially confounding variables, using number of Continents and a language variable (Table A.4); (4) OLS models using the natural log of number of countries and authors to test for a potential non- linear effect (Table A.5); (5) a multinomial logistic regression model where the median z-score, used to create the nominal variable, was first created by field to account for within field variation (Table A.6); (6) a replication test of the effect of international collaboration on citation strength, showing a strong effect (Table A.7). All of the robustness checks were consistent with the main results. The results of the logistic regression analysis on the Scopus data are presented in Table A.1. Consistent with the primary results, the number of countries affiliated is negatively and significantly related to novelty and is positively and significantly related to conventionality. Table A.1 - Logistic Regression, Scopus Data, 2005 Intercept Novelty Bin Conventionality Bin -0.2393 (0.00452) Countries -0.0796 N AIC Wald (0.00326) 1048575 1423358 595.3256 -0.1201 (0.00445) 0.1045 (0.0032) 1048575 1452500.7 1065.4101 Table A.1 notes: all estimates significant, p<.0001, standard errors in parentheses Preprint 10/18 Table A.2 shows the results of the multinomial logistic regression on the Scopus data. Category 4 is the reference. Consistent with the Table 4, The number of countries is most strongly associated with Category 3. Number of countries is also negatively associated with Category 2. Table A.2 - Multinomial Logistic Regression, Scopus Data, 2005 Intercept Countries N AIC Wald 1 - (HN, HC) 2 - (HN, LC) 3 - (LN, HC) -0.7255 (0.00911) 0.0519 (0.0065) 1048575 2604447.8 1152.6412 0.7193 (0.00687) -0.0375 (0.00502) 0.7986 (0.0064) 0.0858 (0.0046) Table A.2 notes. All estimates significant, p<.0001, standard errors in parentheses Next, Table A.3 shows the results of the analysis by year to demonstrate the consistency of the results across time. The results are consistent with the primary results in the full article. Countries is positively associated with conventionality, and negatively associated with novelty. The opposite is true for authors. Preprint 10/18 Table A.3 -- OLS Regression Analysis by Year, 2001-2004 Conven. 144.972** Conven. 132.869** Conven. 142.942** Conven. 147.079** Novelty Novelty Novelty Novelty - - - - Intercept * * * * 73.16*** 65.151*** 70.427*** 68.999*** (8.537) (7.876) (8.814) (8.633) (4.147) (3.937) (4.264) (4.15) Countries 11.775*** 15.512*** 17.73*** 14.183*** -1.297* -1.558** -2.105*** -0.86 (1.14) (1.032) (1.101) (1.043) (0.554) (0.516) (0.533) (0.502) Authors -1.416*** -1.432*** -1.342*** -1.507*** 0.256*** 0.303*** 0.362*** 0.282*** Reference s Year Field R2 (0.101) (0.095) (0.105) (0.08) (0.049) (0.048) (0.051) (0.038) 0.251* 0.087*** 0.251*** 0.293*** 1.894*** 1.764*** 1.836*** 1.742*** (0.046) (0.042) (0.045) (0.045) (0.023) (0.021) (0.022) (0.021) 2001 Fixed 0.272 2002 Fixed 0.272 2003 Fixed 0.311 2004 Fixed 0.316 2001 Fixed 0.093 2002 Fixed 0.096 2003 Fixed 0.112 2004 Fixed 0.1 N Table A.3 Notes. p<.05*, p<.01**, p<.001***, standard errors in parentheses 718148 754690 698599 792861 698599 718148 754690 792861 Next, Table A.4 shows the analysis of alternative variables, including number of continents, and a variable for linguistic composition. Because a straightforward addition of languages is complicated by the fact that many individual countries have multiple languages, we calculated whether the article included no-common languages, a value of one, or at least one common language, zero. We employed a two-way fixed effects approach, where the field and the year are included as fixed classification variables in the regression, while using the full five years of data. However, because of high variance inflation, between continents and languages, we chose to treat each variable in a separate model. Preprint 10/18 Table A.4 -- Two-Way Fixed Effects Regression, Continents & Languages, 2001-2005 Intercept Continents Languages Authors References Conven. 138.609 (3.891) 24.869 (0.763) Conven. 164.163 (3.798) 13.118 (0.724) -1.046 (0.037) 0.223 (0.02) Fixed Fixed 0.29 -1.159 (0.037) 0.209 (0.02) Fixed Fixed 0.29 Novelty -67.17 (1.871) -1.63 (0.367) 0.266 (0.018) 1.762 (0.01) Fixed Fixed 0.096 Novelty -69.254 (1.827) 1.487 (0.348) 0.247 (0.018) 1.757 (0.01) Fixed Fixed 0.096 Year Field R2 N Table A.4 notes. All estimates significant, p<.0001, standard errors in parentheses 3799996 3799996 3799996 3799996 The Table A. 5 shows log transformed variables for countries and authors. The results are consistent with the primary results. Log of countries is positively related to conventionality and negatively related to novelty. The opposite is true of log of authors. Table A.5 -- OLS Regression, Log-Transformed Variables, 2005 Intercept Log_Countries Log_Authors 176.907 (8.305) 35.194 (1.934) -28.776 (1.127) Conventionality Novelty -72.792 (3.875) -6.384 (0.902) 11.139 (0.526) 1.601 (0.02) 0.086 835698 0.2 References R2 N Table A.5 notes. All estimates significant, p<.0001, standard errors in parentheses (0.044) 0.289 835698 Preprint 10/18 Next, Table A.6 shows the results of the multinomial logistic regression analysis where the median z-score, is first calculated within individual fields, rather than across all fields, before binarizing and compiling into a nominal four category variable. The results are very similar to Table 4. However, the effect of countries on category 1 is now positive, but not significant. The estimate on category 2 remains negative and significant, and the association with category 3 remains positive and significant. Table A.6 -- Multinomial Logistic Regression, Conventionality by Field, 2005 Countries 1 - (HN, HC) 2 - (HN, LC) All Fields 0.015 (0.008) -0.044*** Author 3 - (LN, HC) 3 - (LN, HC) 2 - (HN, LC) (0.006) 0.036*** (0.005) 1 - (HN, HC) 0.003*** (0.0005) 0.003*** (0.0004) -0.001*** (0.0004) References 1 - (HN, HC) 0.039*** (0.0003) 0.029*** (0.0003) 0.03*** (0.0003) FIXED 834998 2 - (HN, LC) 3 - (LN, HC) Field N AIC Wald Table A.6 notes. p<.05*, p<.01**, p<.001***, standard errors in parentheses 1975932.1 80123.21 Preprint 10/18 Since the argumentation regarding a potential audience effect relies on the citation strength of international collaboration, Table A.7 shows the citation analysis. The analysis shows a strong significant estimate of 4.15 for Countries on Citations. Table A.7 -- International Collaboration and Citations, 2005 Citations -6.224 (0.587) 4.154 (0.072) 0.146 (0.005) 0.504 (0.003) Fixed Field R2 N Table A.7 notes. All est. sig. p<.0001, standard errors in parentheses 0.093015 841546 Intercept Countries Authors References Preprint 10/18
1706.07140
1
1706
2017-06-21T23:48:02
Dynamic patterns of knowledge flows across technological domains: empirical results and link prediction
[ "cs.SI", "cs.CY", "cs.DL", "physics.soc-ph" ]
The purpose of this study is to investigate the structure and evolution of knowledge spillovers across technological domains. Specifically, dynamic patterns of knowledge flow among 29 technological domains, measured by patent citations for eight distinct periods, are identified and link prediction is tested for capability for forecasting the evolution in these cross-domain patent networks. The overall success of the predictions using the Katz metric implies that there is a tendency to generate increased knowledge flows mostly within the set of previously linked technological domains. This study contributes to innovation studies by characterizing the structural change and evolutionary behaviors in dynamic technology networks and by offering the basis for predicting the emergence of future technological knowledge flows.
cs.SI
cs
Dynamic patterns of knowledge flows across technological domains: empirical results and link prediction Jieun Kim1*and Christopher L. Magee1,2 1Institute for Data, Systems and Society, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, MA 02139, USA 2International Design Center, Massachusetts Institute of Technology 77 Massachusetts Avenue, Cambridge, MA 02139, USA Email: Jieun Kim ([email protected]) and Christopher L. Magee ([email protected]) *Corresponding author: Jieun Kim Abstract The purpose of this study is to investigate the structure and evolution of knowledge spillovers across technological domains. Specifically, dynamic patterns of knowledge flow among 29 technological domains, measured by patent citations for eight distinct periods, are identified and link prediction is tested for capability for forecasting the evolution in these cross-domain patent networks. The overall success of the predictions using the Katz metric implies that there is a tendency to generate increased knowledge flows mostly within the set of previously linked technological domains. This study contributes to innovation studies by characterizing the structural change and evolutionary behaviors in dynamic technology networks and by offering the basis for predicting the emergence of future technological knowledge flows. Keywords: technological domain; technology network; technological change; patent analysis; link prediction JEL codes: O30, O32, O33 1 1. Introduction Technological evolution is typically shaped by problem solving activity which integrates knowledge from the same and/or different technology areas, leveraging the cumulative character of knowledge. While there is a tendency to generate knowledge flows within a given technology, there are also important knowledge spillovers1 across technologies and these have the potential to increase technological variety (Schoenmakers and Duysters, 2010). This study focus on the latter case, the interactions across technological domains. Novelty of individual inventions (Kim et al., 2016), importance of individual inventions (Schoenmakers and Duysters, 2010) and possibly convergence of technologies (Caviggioli, 2016) are all important topics that are related to knowledge flow across domains. Previous studies have attempted to analyze technological knowledge flows in patent networks based on patent citation information (Acemoglu, Akcigit, and Kerr, 2016; Ko, Yoon, and Seo, 2014; É rdi et al., 2013; Lee and Kim, 2010; Chang, Lai, and Chang, 2009; Han and Park, 2006; Jaffe, Trajtenberg, and Henderson, 1993). Their typical unit of analysis has been not only individual patents (É rdi et al., 2013; Chang et al., 2009), but the class of the patent office data such as IPC (International Patent Classification) (Acemoglu et al., 2016), USPC (US Patent Classification) (Ko et al., 2014), Derwent Class Code indexed by technology experts of Thomson Reuters (Luan, Liu, and Wang, 2013). However, ambiguity can arise as the concept of ''a technology'' and ''an industry'' are often if not usually conflated whereas technologies as technically understood cut across industries (Benson and Magee, 2015). This research is aimed at understanding non-economic knowledge flows among technologies, thus a carefully defined unit of analysis is utilized. Although significant effort has been made to understand the evolution of technology 1 We differentiate economic spillovers between sectors from (technological) knowledge spillovers between technological domains. 2 networks (Funk and Owen-Smith, 2016; Kim, Cho, and Kim, 2014; No and Park, 2010; Shin and Park, 2010), studies typically construct networks based on posteriori or historical patterns of evolution. In the analysis of dynamic trends of knowledge flows, there is a lack of work attempting to predict a priori patent network structures. As a remedy, in an attempt to understand and predict dynamic evolution of technological knowledge networks, this study uses link prediction methodology, which estimates the likelihood of the existence of a link between two nodes in the future based on observed links and the attributes of nodes (Lü and Zhou, 2011; Liben-Nowell and Kleinberg, 2007). The key questions in this study are as follows: how strong are the technological knowledge flows for specific technology domains with other specific domains? and how do those cross-domain links change over time? Can we predict the future cross-domain links in a backcasting experiment? To address these questions, this paper documents dynamic patterns of technological knowledge flow networks, based on measuring patent citations in 29 technological domains (TDs) defined by Magee et al. (2016). Dynamic patterns are identified and predicted in the network of knowledge flows between TDs. The paper explores the empirical knowledge flow pattern in the period 1976-2013, as derived from the United States Patent and Trademark Office (USPTO) patent citation data. The remainder of this paper is organized as follows: Section 2 discusses essential prior work on technological knowledge flow networks and link prediction methodology. Section 3 presents the process for and results of constructing cross-TD networks and identifying dynamic patterns of changes in cross-TD links. Section 4 implements experiments using link prediction methods to test their effectiveness as predictors of cross-TD network evolution. Section 5 integrates the results from previous sections and discusses implications. The final section draws conclusions, highlights limitations and makes suggestions for future research. 3 2. Background 2.1. Technological knowledge networks The notion that technological innovation is the result of the recombination of existing components is deeply rooted in the literature on the history of technological change (Ruttan, 1959; Usher, 1954). Thus, one can often describe inventions as a combination of prior technologies. The inherent combinatorial characteristic of innovation has led scholars to focus on the question of how new technologies build on prior art and on how inventors combine and transfer knowledge across technological domains. Specifically, the mechanism of analogical transfer (Basnet and Magee, 2016; Weisberg, 2006; Gentner and Markman, 1997) has been shown to apply quite broadly and is the most important cognitive mechanism used by inventors. Such recombination of ideas underlies ongoing technological change and is one aspect of generating economic spillover or benefits to a given sector not due to that sectors efforts alone. In particular, the analogical transfer of ideas to new domains means that part of an inventor's original idea necessarily spills over to other firms and other sectors generating positive externalities (the so-called 'knowledge spillovers') for the economy. Previous work on knowledge spillovers has exploited the comprehensive information provided by patent data to examine how knowledge flows from one invention to the other. Specifically, a patent citation is a reference to prior art for legal purposes and as such represents a proportion of knowledge used in the citing patent that originated from or was already disclosed by the cited patent. Jaffe et al. (2000) reported the analysis of R&D manager surveys suggesting that although patent citations carry a fair amount of noise, they a provide a reasonably good indication of a 'learning trail', representing the knowledge transfer process. As a result, the aggregate citation flows within and between technology fields, sectors, geographic areas, etc. can be used as proxies for knowledge flow intensity (Schoenmakers and Duysters, 2010; Verspagen and De Loo, 1999; Karki, 1997; Jaffe et al., 4 1993; Trajtenberg, 1990). Furthermore, Clough et al. (2015) have shown that the level of redundancy-measured by transitive reduction-in the edges of patent citation network is much smaller than in that of academic paper citation network. This suggests that patent citations are better representations of technological knowledge flow than scientific publication citations are of scientific knowledge flows. Beyond the seminal contributions to knowledge flows by patent citation analysis by Trajtenberg (1990) and Jaffe et al. (1993), abundant empirical studies using patent citations to measure knowledge flows have been carried out at the level of an indiviual (Alcácer and Gittelman, 2006; Jaffe et al., 2000), at the firm level (Cho, Kim, and Kim, 2015; Duguet and MacGarvie, 2005), and at an industry level (Park, Lee, and Park, 2009; Han and Park, 2006) and at the national level (Chen and Guan, 2016; Shih and Chang, 2009). Patent citation information thus has been widely used to analyze linkages among patents in a given technology, linkages between technologies, persistence of technological influence and the impact of new patents, as well as the structure of knowledge networks between industries or nations. Studies using main path analysis on patent citation networks for specific technology fields also demonstrate their usefulness for mapping the knowledge and technology trajectory of the real world (Park and Magee, 2017; Nomaler and Verspagen, 2016; Martinelli and Nomaler, 2014; Choi and Park, 2009; Mina et al., 2007; Verspagen, 2007). Network science and social network analysis on the patent citation networks have been widely used to capture the overall structure of patents and technologies including the complicated interactions in technological evolution (Lee, Lee, and Sohn, 2016; Cho et al., 2015; Choi and Hwang, 2014; Kim et al., 2014; É rdi et al., 2013; Cho and Shih, 2011). Other studies focused on the optimal network structures for knowledge diffusion (Shin and Park, 2010). However, prior attempts that analyse patent citation networks have focused only on the observed networks and thereby, they have been limited to an ex post analysis and do not establish potentially predictive 5 models. An important issue regarding all of the work on paths within or between technologies concerns the unit of analysis. If one is interested only at the patent level or a individual inventor level or even at the firm or national level, the unit of analysis is clear. However, most studies also attempt to study technologies and technological fields but spend little time showing an objective connection to technologies as they exist. An exception is the work of Park and Magee (2017) who utilize a tighter definition but also operationally link a gathered set of patents to technological artifacts whose performance can be measured. Since our focus is on cross-technological flow of knowledge, it is important that we have a clear unit of analysis. Thus, we follow the approach of Park and Magee and describe the definition of technological domains and the methodology for obtaining patent sets to represent such domains in more detail in section 3.1. 2.2. Link prediction 2.2.1. Fundamentals Link prediction attempts to predict the emergence of future links in complex networks based on the available information, such as observed links and nodes' attributes (Lü and Zhou, 2011; Liben-Nowell and Kleinberg, 2007). It not only predicts potential links but also missing and spurious links (Guimerà and Sales-Pardo, 2009). Link prediction is broadly applied in various fields such as biological, social, and information systems where nodes represent biological elements like proteins and genes, individuals, computers, web users, and so on (Lü and Zhou, 2011). In biological networks, accurate predictors can be applied to seek the most promising latent links, which is much less costly than blindly checking all possible interaction connections (Guimerà and Sales-Pardo, 2009; Clauset, Moore, and Newman, 2008). Link prediction has also been used in the analysis of social networks, such as the 6 prediction of the collaborations in co-authorship networks (Liben-Nowell and Kleinberg, 2007), the estimation of collaborative influence (Perez-Cervantes et al., 2013), and the detection of the relationships between community users (Valverde-Rebaza and de Andrade Lopes, 2013). In information systems, link prediction can serve as a significant technique in information retrieval, such as the prediction of words, topics or documents in Wikipedia (Itakura et al., 2011), and in recommender systems, such as e-commerce recommendations (Li et al., 2014) and friend recommendation (Esslimani, Brun, and Boyer, 2011). Moreover, the link prediction approaches can be applied to solve the classification problem in partially labeled networks, such as the detection of anomalous email (Huang and Zeng, 2006), and differentiating fraudulent and legitimate users in cell phone networks (Dasgupta, Singh, and Viswanathan, 2008). The problem of link prediction and structural definition is as follows. Consider a network G=(V, E), where V is the set of nodes and E is the set of edges connecting nodes. For two nodes u, v∈V, e=(u,v)∈E represents an interaction between u and v. Given time periods, t = 1, …, T, an evolving network is defined as Gt = (Vt, Et), where Et is the set of undirected edges, whether new or recurring, between nodes in Vt within time stamp t. In this study, V is the set of technological domains (TDs) and Vt can differ according to their occurrence within t; Et represents the knowledge flows or spillovers among TDs within time period t. In this setting, the link prediction problem can be formulated as follows: Estimate the likelihood of a potential link in Et+1, between two nodes in Vt. Link prediction involves the choice of a predictor, a function or algorithm that calculates a likelihood score for the existence of a link between two nodes in the next time period. Network topology-based structural similarity metrics are generally used as predictors (Zhu and Xia, 2016; Valverde-Rebaza and de Andrade Lopes, 2013; Liben-Nowell and Kleinberg, 2007). Applying a predictor to the training network at t yields a number of predictions. In practice, the prediction step results in 7 a list of potential links with an associated likelihood score Sim. By ranking the potential links in decreasing order of Sim and choosing a threshold, one can obtain a predicted network at t+1. 2.2.2. Topology-based predictors In this study, 8 similarity metrics are tested as predictors of future associations among TDs. According to their characteristics, these predictors can be subdivided into two broad categories: (1) local or neighborhood-based metrics; and (2) global metrics. In all the definitions, u, v, z denote nodes in the network and similarities are always evaluated between two different nodes. Γ(u) denotes the set of nodes which are neighbors of node u in the network- that is all nodes that are directly linked to u. Local predictors are solely based on the neighborhoods of the two nodes. Many networks have a natural tendency towards triadic closure: if two links a-b and b-c exist, there is a tendency to form the closure a-c (Bianconi et al., 2014; Guns, 2014). This property is closely related to assortativity and and was empirically confirmed in social networks (Bianconi et al., 2014; Kleinberg, 2008) and collaboration networks (Ter Wal, 2014; Liben- Nowell and Kleinberg, 2007). For technological knowledge flow, it assumes that if a given domain shares useful knowledge with two other domains, then those two domains should be able to share knowledge with each other. The networks we consider have the relative strength of knowledge flows as the weights of links and we use weighted similarity scores (Zhu and Xia, 2016; Murata and Moriyasu, 2007) defined below with w(u,v) denoting the weight of the link between nodes u and v. (a) CommonNeighbors (Newman, 2001) is the most widespread, basic and simplest type of metric that measures the number of nodes with which two adjacent nodes have a direct association. It is known to perform well when a network is highly clustered (Lü and Zhou, 8 2011). The weighted CommonNeighbors is calculated as: (1) (b) Jaccard predictor (Salton and McGill, 1983), which is commonly used in information retrieval, considers the probability that two nodes have common neighbors. It is introduced to normalize the effect of neighborhood size (the number of total neighbors of two nodes) in the CommonNeighbors metric: If both u and v have many neighbors, they are automatically more likely to have more neighbors in common. The Jaccard coefficient for weigted networks can be extended as: (2) (c) Adamic–Adar predictor (Adamic and Adar, 2003) starts from the hypothesis that a 'rare' (i.e., low-degree) neighbor is more likely to indicate a future connection than a high- degree one. In many cases, rare features are more telling; documents that share the phrase "for example" are probably less similar than documents that share the phrase "clustering coefficient". In social networks, an unpopular person (someone with not a lot of friends) may be more likely to introduce a particular pair of his friends to each other. In the case of predicting technological domain linkages, the conceptual basis is similar making the assumption that a domain with few connections to other domains is more likely to be connected to domains that will connect in the future. Thus, this metric considers both the common neighbors and the common neighbors' neighbors. Two nodes are likely to connect in the future, if they have more nodes in common and the common nodes have a smaller number of neighbors. The Adamic-Adar measure for weighted networks is: (3) 9 ()()(,)(,)(,)zuvSimuvwuzwvz()()()()(,)(,)(,)(,)(,)zuvpuqvwuzwvzSimuvwpuwqv()()()(,)(,)(,)log(1(,))zuvrzwuzwvzSimuvwzr (d) ResourceAllocation (Zhou, Lu, and Zhang, 2009) is motivated by the resource allocation dynamics on complex networks. Consider a pair of nodes, u and v, which are not directly connected. The node u can send some resource to v, with their common neighbors playing the role of transmitters. In the simplest case, we assume that each transmitter has a unit of resource, and will equally distribute it to all its neighbors. The weighted ResourceAllocation between u and v can be defined as the amount of resource v received from u, which is: (4) It is based on a hypothesis similar to that of Adamic-Adar, but yields a slightly different ranking: the ResourceAllocation index punishes the high-degree common neighbors more heavily than Adamic-Adar. (e) PreferentialAttachment (Barabási et al., 2002; Price, 1976) is based on the idea of 'the rich gets richer', or 'power-law'; users with many friends tend to create more connections in the future. It can be shown that the product of the degrees of nodes u and v is proportional to the probability of a link between u and v. Thus, the weighted PreferentialAttachment is also known as the degree product and computed as: (5) This metric is related to small-world networks, which were illustrated through "six degress of separation" in social networks by Travers and Milgram (1967). It is broadly known that many knowledge networks, beyond social networks, exhibit the small-world property of having short average path lengths between any two nodes, despite being highly clustered (Watts and Strogatz, 1998). Thus it is known to perform well when a network has small, disconnected clusters (Lü and Zhou, 2011). Examples include scientific collaborations in mathematics and neuro-science (Barabási et al., 2002) and the patent citation network in 10 ()()()(,)(,)(,)(,)zuvrzwuzwvzSimuvwzr()()(,)(,)(,)puqvSimuvwpuwqv radio frequency identification (Hung and Wang, 2010). Likewise, we conjecture that the evolution of cross-TD networks might follow PreferentialAttachment because it is consistent with the oft-used concept of general purpose technologies (Moser, Nicholas, and Nicholas, 2015; Jovanovic and Rousseau, 2005). It may be noted that this index does not require any node neighbor information; therefore, it has the lowest computational complexity of our metrics. Global predictors are the methods based on the ensemble of all paths between two nodes. These predictors recognize that, even if two nodes do not share any common neighbors, they still may be related and form a link in a later time period. In the case of technological knowledge flow, use of these metrics represents an assumption that knowledge flows occur along identifiable paths through the network and this is consistent with the concept of trajectories (Dosi, 1982). For each of the three metrics discussed below, the fundamental assumption of why they might work is that TDs which are on a common trajectory are more likely to cite each other than those not on such a trajectory. A straightforward measure of relatedness is path distance. Likewise, random walk based on transition probabilities from a node to its neighbors can be used to denote the destination from a current node. (a) The Katz metric (Katz, 1953) is a variant of the shortest path distance and is also based on the ensemble of all paths. Let A denote the (full) adjacency matrix of the network. The element auv is the weight of a link between nodes u and v or 0 if no link is present. Each element of (the k-th power of A) has a value equal to the number of walks, i.e. the set of all paths, with length k from u and v. Thus, the Katz metric directly sums the number of all walks that exist. However, as longer walks usually indicate a weaker association between the start and end node, it introduces a free (damping) parameter β (0 11 ()kuvakA < β < 1), representing the 'probability of effectiveness of a single link'. Thus, each walk with length k has a probability of effectiveness βk, as shown in equation 6. For links between TDs the underlying hypothesis is that more and shorter walks between two TDs indicate a stronger relatedness. It is known to perform well when a network has long average distance (Lü and Zhou, 2011). (6) (b) RootedPageRank is a modification of PageRank (Brin et al., 1998), a core algorithm used by search engines to rank search results. Assume the existence of a random walker, who starts at a random node, randomly chooses one of its neighbors and navigates to that neighbor, again randomly chooses a neighbor and so on. Moreover, at every node, there is a small chance that the walker is 'teleported' to a random other node in the network. The 'chance of advancing to a neighbor' is α (0 < α < 1) and the chance of teleportation is 1-α. For link prediction purposes, the random walk assumption of the original PageRank is altered by the not randomized teleportation: the walker is always teleported back to the same root node. The proximity score between node pairs u and v is calculated in this method as follows: (7) where Hu,v is the hitting time or the expected number of steps required for a random walk from u to reach v and πv is the stationary distribution weight of v under the following random walk condition: (a) with probability α that returns to u, or (b) with probability 1- α of jumping to a random neighbor of the current node. (c) SimRank (Jeh and Widom, 2002) is a measure of the similarity between two nodes in a network. The SimRank hypothesis can be summarized as: nodes that link to similar nodes are similar themselves. It begins with the assumption that any node is maximally 12 ()1(,)kkuvkSimuva,(,)uvvSimuvH similar to itself: sim(u,u)=1, Then it employs a 'decay factor', γ (0 < γ < 1), to determine how quickly similarities or weights of the connected nodes decrease as they get farther away from the original nodes. SimRank can also be interpreted by the random walk process, that is, it measures how soon two random walkers, respectively starting from nodes u and v, are expected to meet at a certain node. (8) 3. Cross-TD networks empirically characterized 3.1. Data and methods The unit of analysis in this studiy is a technological domain (TD), defined by Magee et al. (2016) as "the set of artifacts that fulfill a specific generic function utilizing a particular, recognizable body of knowledge". This definition essentially decomposes generic functions along the lines of established bodies of knowledge. Thus the domains are connected not only to the economy, but also to science and other technical knowledge. The generic functional classification is described in terms of operands (information, energy, and material) being changed by operations (storage, transportation, and transformation). When each domain defined in this manner is linked operationally to a set of patents, it is able to be connected to non-patent information such as the rate of improvement of artifacts that represent the domain (Triulzi, Alstott, and Magee, 2017; Benson and Magee, 2015). The analysis in the current paper covers patents for 29 TDs found using the classification overlap method (28 from Benson and Magee 2013, 2015), one from Basnet (2015) as shown in Table 1. Despite the fact that these patent sets have been shown to be more complete and relevant than sets usually studied, there are patents in each set (5-25%) that may not be good representatives of the domain. Thus, some "random" cross domain citations are likely and in the work below, we 13 ()()(,)(,)()()puqvSimuvSimpquv focus on linkages that are greater than random expectation (we call them strong links) partly to avoid this noise source but also because we are interested in a significant level of knowledge flow between domains. Table 1. The 29 TDs in the generic function format (Magee et al., 2016; Koh and Magee, 2006) with abbreviations used throughout this paper Operation Storage Operand Information  Semiconductor information storage (SIS)  Magnetic information storage (MIS)  Optical information storage (OIS) Material Energy  Electrochemical batteries (BAT)  Capacitors (CAP)  Flywheel (FLY)  Permanent magnetic materials (PMM) Transportation  Electrical  Electrical power  Aircraft transport telecommunication (ET)  Optical transmission (EPT)  Superconductivity (AIR) telecommunication (OT) (SCD)  Wireless telecommunication (WT) Transformation  Integrated circuit  Combustion engines  Milling machines processors (IC) (CE)  Electronic computation  Electrical motors (EC) (EM) (MIL)  3D printing (3D)  Photolithography  Camera sensitivity  Solar photovoltaic (PLG) (CAM)  Magnetic resonance imaging (MRI)  Computerized tomography scan (CT)  Genome sequencing (GS) power (SPP)  Wind turbines (WIND)  Fuel cells (FC)  Incandescent lighting (IL)  LED lighting (LED) We started by collecting the number of citations between the patents of the TDs annually from 1976 to 2013. The overall number of collected patents for the 29 TDs are 502,444; among the total 7,074,439 patent-to-patent citations, the number of specified inter- domain citations are 290,059 (4%), the number of intra-domain (self) citations are 2,117,399 (30%), and others (~66%) are citations to undefined domains beyond the 29 listed in Table 1. 14 Exploring annual citation patterns, the time window is set as four or five years, which yields 8 periods for 38 years (from 1976 to 2013) as follows: T1 as 1976~1979, T2 as 1980~1983, T3 as 1984~1988, T4 as 1989~1993, T5 as 1994~1998, T6 as 1999~2003, T7 as 2004~2008, and T8 as 2009~2013. Second, the citation matrix, which we treat as undirected, is constructed using the number of citations between the specified TDs. We standardize all cells in this matrix by calculating citation scores (CS) from equation (9): (9) where c is the number of citations, p is the number of patents, t is the periods from T1 to T8, the subscripts i and j indicate TDs, and the absence of a subscript indicates an aggregation of TDs. The equation expresses the number of citations between a pair of TDs relative to its expected value, if citations were completely random (Nomaler and Verspagen, 2016) for each time period. Thus, a CS value larger than 1 implies that the citation frequency between these domains is more than for a random occurrence given the citation and patent numbers at that time period. Thus, we call the links whose CS is larger than 1 strong links, and those between 0 and 1 weak links. For each of the 8 periods, a matrix including 406 non- self citation cells is constructed. As a final step, cross-TD networks2 are constructed using citation matrices for the 8 periods: the nodes are the 29 TDs and the links are connected with weight CS from equation 9. 3.2. Distribution of cross-TD links Among the 406 non-self citation potential linkages, 57 cells turn out to be zero in every time period. 51 cells are more than one for at least one period whereas 298 cells have values ranging from >0 to 1 for all time periods. See Table 2 for basic statistics in each period. 2 See Appendix 1. 15 2()ijtitjtijtttcppcscp The average of CS is always less than 1, i.e., random expectation, consistent with the maximum values being far greather than 1. As shown in the number of links according to CS range in Table 2 and in CS boxplots (Figure 1), most cross-domain links are weaker than expected by random occurrence in every period and the max values are the definite outliers. Moreover, citations to other patents significantly outnumber the citations involved in even the strongest inter-domain linkages. For example for CT-MRI with a CS of 13.42 in period 8, only a little more than 1% of the total citations by the two domains are between these domains. The intra-domian citations also outnumber the strong inter-domain citations but for a small domain like MRI, for period 8 only by a factor of 5. In the different time periods, 2% to 9% out of 406 possible links in the networks are stronger than would be expected by chance. Thus, their distributions are highly left-skewed over all periods. This indicates that the cross-TD networks are sparsely connected; knowledge flow between partciular TDs occurs infrequently despite the fact noted in section 3.1 that intra-domain citations comprise only ~0.3 of the patent to patent citations. Table 2. Basic statistics of CS values and links in each period Average Average of CS less than 1 Stadard.dev Max T1 0.22 0.01 1.97 33.94 13.13 14.87 16.34 15.74 23.18 17.21 13.42 EM- FLY T7 0.44 0.10 1.59 BAT- FC BAT- FC T8 0.38 0.12 1.33 EM- FLY BAT- FC CT- MRI EM- FLY BAT- FC T2 0.23 0.03 1.18 T3 0.21 0.04 1.18 T4 0.20 0.07 1.01 T5 0.25 0.07 1.22 T6 0.33 0.08 1.63 Number of links whose CS is larger than 1 (strong) 10 (2%) between 0 and 1 (weak) 15 Zero 381 15 (4%) 69 322 15 (4%) 118 273 15 (4%) 166 225 20 (5%) 196 190 28 (7%) 245 133 36 (9%) 255 115 29 (7%) 283 94 16 Figure 1. Boxplots of CSs in each period (log scale) Nonetheless, the networks evolve to become denser over time. There is an increase in strong links but even more increase in weak links. The average value for weak links are small ranging from 0.01 to 0.1 but increase gradually over time. The increasing density arises because backward citations in the patent system have increased over time (Triulzi et al., 2017) and that is a further reason why strong links (above random expectation) is the proper focus for empirical analysis and prediction. 3.3. Emergence and stability of cross-TD links For the 51 strong links, we investigated when they first emerge, how stable they are, and what functional classes they are associated with (Table 3 and 4 gives these results). In terms of emergence, the strong links first equally appear gradually from weak status (21 cases) or abruptly from zero (20 cases). The other 10 strong links are present in the first period and thus the previous state is unknown. 17 Table 3. Number of new strong links according to emergence, stability, and functional class Emergence Total T8 T5 T6 T1 T2 T3 T4 T7 time - in previous weak period zero previously Stability stays until last period fluctuates in and out Functional class within same function between different operand between different operation between different operand and operation Total - 5 5 2 2 4 2 10 0 6 2 4 0 2 3 1 6 2 2 1 3 2 0 0 2 4 3 1 1 3 1 1 0 2 4 5 2 4 3 3 1 2 1 7 5 3 3 5 1 2 3 2 8 6 3 2 7 1 4 2 2 9 0 3 - - 1 0 1 1 3 21 (41%) 20 (39%) 18 (38%) 30 (63%) 11 (22%) 12 (24%) 15 (29%) 13 (25%) 51 Table 4. List of new strong links according to emergence, stability, and functional class Spillover within same function Spillover between different operand Spillover between different operation T1 CAM-IC (8)* MIS-OIS (8)* IC-LED (7) IC-SPP (8)* BAT-FC (8)* CAM-SIS (3) EM-FLY (8)* IC-SIS (5) EM-PMM (7)⁺* PMM-SCD (3)⁺ LED-SCD (1)⁺ - LED-PLG (2)⁺ CAM-PLG (1)⁺ - CAM-LED (3)⁺ - MIS-PMM (2) FLY-SCD (1)⁺ CAP-SCD (2) Spillover between different operand and operation CAP-ET (1) IC-SCD (6) AIR-WIND (7)⁺* EM-MIS (5) PMM-MRI (5)⁺ EM-ET (1) ET-IL (5)* CAP-IC (4)* T2 - T3 T4 T5 T6 LED-SPP (4) CT-MRI (6)⁺* EM-WIND (4) IL-LED (4)⁺* PLG-3D (4)* BAT-CAP (4)* ET-OT (3)* T7 SPP-WIND (1) T8 MIL-3D (1)⁺ IL-3D (2)⁺ EM-MIL (3)* CT-3D (1) CAM-IL (1)⁺ IC-3D (1) SPP-3D (1)⁺ - EC-SIS (2) PMM-WIND (2)⁺ BAT-SPP (3)* EM-SCD (1) CE-FLY (2)* BAT-ET (2) FLY-MIL (1)⁺ MRI-SCD (2)* CAP-3D (1)⁺ FLY-WIND (1)⁺ SCD-3D (1)⁺ ⁺Noted links emerge from zero (emergence); numbers in brackets are the counts of the periods when links stay strong and *noted links stay strong until last period (stability) 18 In terms of stability, the strong links either stay strong until the end or fluctuate as strong, weak, and zero links. 18 among 51 links (38%) stay strong ever since their emergence while 30 links fluctuate, with the last 3 links unclassified since the next state is unknown. The average periods in which links stay strong during the 8 periods is 3.3 periods for all strong links and 5.2 periods for stable links. Even in the case of fluctuating links, they stay strong for an average of 2.2 periods. Over all the time periods, there are five links that always stay strong: EM-FLY, BAT-FC, IC-SPP, MIS-OIS, and CAM-IC. These represent closely associated or partially merged domain pairs for the entire 38 years rather than merging at some point and none of the cases are technologically surprising as being linked. There are four interesting cases where links abruptly emerge and stay stable which will be examined more closely when we test the link prediction methodology: EM-PMM, AIR-WIND, CT-MRI, and IL-LED. We also investigated functional classes by differentiating links appearing within the same functional class, between different operands, between different operations, or between different operand and operation. For example, both IL and of 3D have transformation as the operation, but the operand of IL is energy and that of 3D is material; thus, IL-3D is spillover between different operands. The portion of the four types that experience strong knowledge flow are similar, although links between different operation capture slightly more. The spillover around the superconductor domain (SCD) occurs frequently between different operations. Integrating with stability, there are many links (7 out of 11) within the same function that are stable. Overall, these results suggest that putting higher weights on functional relationships is not a viable way to improve the predictions and that functional similarity is not useful in predicting knowledge flow. 19 4. Cross-TD network evolution analysis using link prediction 4.1. Experimental procedure For the constructed snapshots of cross-TD networks3, link prediction metrics are tested to determine their ability to capture the characteristics of the network dynamic evolution. Patent citation-based knowledge flows among TDs for 8 periods form undirected networks with CS weights as documented in the previous section. Link prediction is now conducted in a "back- casting" mode and results compared to the actual results. In this setting, we define a training period as T1, T2,..., and T7 and the testing period as the next period after the training period; if the training network is GT1, the testing network is GT2. Thus, the link prediction experiments are implemented for 7 periods. Unlike many other studies that predict newly appearing links only, we consider both new links and recurring links because the snapshot of cross-TD relationships can fluctuate after first emergence as seen in the previous section. The overall approach to the experiments are shown in Figure 2. First, the similarity scores for all pairs of TDs are calculated using each of the eight metrics: weighted CommonNeighbors, weighted Jaccard, weighted Adamic-Adar, weighted ResourceAllocation, weighted PreferentialAttachment, Katz, RootedPageRank, and SimRank. The python-based package, 'linkpred' (Guns, 2014) was used for calculation. For global predictors that need to determine parameters (α, β, γ), we set several different parameters and examine sensitivity of model performance by trial-and-error. If there is no more change in performance when the parameter increases or decreases, we stop varying the parameter. As a result, α of RootedPageRank and γ of SimRank are set as 0.01, 0.1, 0.5, and 0.9; β of Katz is set as 0.001, 0.1, and 0.5. Second, the calculated similarity scores are used as weights for a predicted network, which is the basic and most commonly used unsupervised method in link prediction (Murata 3 See cross-TD networks in appendix 1 (training networks) and 2 (testing networks). 20 and Moriyasu, 2007; Newman, 2001). In general link prediction, the aim is to find "existence" of links based on the ranks of similarity values (Zhu and Xia, 2016; Lü and Zhou, 2011). But the objective of the link prediction here is to find "whether the links will have weights larger than 1" that is whether a link greater than randomly expected will exist. A problem arises on the scale of measures: although the actual links have CS values ranging from 0 to ∞, the Jaccard measure ranges from 0 to 1, and PreferentialAttachement ranges for even larger intervals. Thus, the rescaling of similarity scores to be similar to actual CS values is necessary. The rescaling is achieved by normalizing similarity scores (dividing similarity scores by their maximum value) and multiplying by the maximum CS value at the training period. For example, the maximum Adamic-Adar value for GT6 is 14.5 and the actual maximum CS of GT6 is 23.18; we normalize Adamic-Adar scores for all links by dividing them by 14.5 and then multiply 23.18 so that the predicted link weights are scaled similarly as the actual CSs. Figure 2. Logical structure of our experiments (modified from Murata and Moriyasu (2007)) 21 Last, the prediction performances are evaluated for each predictor by comparing predicted links and actual links at each testing period, e.g., the predicted link weights calculated from GT6, is compared with CS of GT7. In particular, as our focus is on the links whose weights are estimated as strong (larger than 1), the confusion matrix (Powers, 2011) is based on whether the CS value is strong (true condition positive) and the predicted link weight is strong (predicted condition positive). Thus, true positives (TPs) are the case when the predicted weight and actual CS of a particular link at a certain testing period are strong and true negatives (TNs) are the opposite case when both are weak or zero. The false positivies (FSs) are the case when a prediction of strong positive link is made for a link that is actually weak or zero whereas the false negatives (FNs) are the case when a prediction that a link is weak or zero is made for a link that is actually strong. The accuracy of the predictors/models measures the ratio of true predictions, both TPs and TNs, over all possible links. The precision (positive prediction value) measures whether the links, that a model predicts as strong, are observed to be strong: it is the ratio of the number of TPs divided by predicted condition positive, the total number of links whose weight are strong in the predicted networks. On the other hands, the recall (sensitivity) indicates whether a model correctly senses the actual strong links: it is calculated as the number of true positives divided by the total number of links who are actually strong in the testing network. The precision and recall present trade-offs, thus, we find the mean of recall and precision values, which gives us an estimate of how well each predictor represents the actual strong links. The F-score of each predictor at each testing period is calculated by taking the harmonic mean of the recall and precision. When TP, TN, FP and FN represent the number of true positives, true negatives, false positives and false negatives rates, respectively, the performance measures are formulated as: 22 (10) (11) (12) (13) 4.2. Testing results for predictions The performance of all of the predictors4 for all periods are illustrated in Figure 3. The accuracy of the Katz models (figure 3a) are close to 1 with particularly small deviation at β=0.001 while that of RootedPageRank, PreferentialAttachement, CommonNeighbors, and Adamic-Adar are also >0.8. The precision of the Katz models (figure 3b) are close to 0.8 while that of RootedPageRank, PreferentialAttachment, CommonNeighbors, and Adamic- Adar are <0.4. But the recall (sensitivity) (figure 3c) shows somewhat different results: the recall of RootedPageRank models are >0.8 especially at α = 0.9 and 0.5; that of the SimRank models at a large γ = 0.9 and 0.5 are also close to 0.8; and that of ResouceAllocation is 0.7 with large deviation whereas that of the Katz at β=0.001 is close to 0.7 with small deviation. Consequently, for the key overall F-score (figure 3d), the Katz (β=0.001) model is the best performer at every period, vastly superior to other predictors. The Katz (β=0.01) model has the same performance at T2, T4, and T6 but lower F-score in other periods. 4 For detailed values, see Appendix 4 23 TPTNAccuracyTPTNFPFN_Pr__TPtruepositiveecisionpredictedconditionpositiveTPFP_Re__TPtruepositivecalltrueconditionpositiveTPFN2PrRePrReecisioncallFscoreecisioncall (a) Accuracy (b) Precision (c) Recall 24 Figure 3. Link prediction performance: (a) accuracy; (b) precision; (c) recall; and (d) F-score (d) F-score Although recall is not so high, the Katz model turns out as the best performer due to the high precision it achieves. If the Katz predicts that a link is strong, the prediction is almost always correct. But the Katz predictions can overlook or not predict some actual strong links. In contrast, the RootedPageRank model has better recall (~0.8) than Katz (~0.7) but has substantially poorer precision (~0.4) than Katz (~0.8). Due to good recall, the RootedPageRank senses or detects the actual strong links well. However, as the poor precision means that many case of predictions are false alarms, the strong links that the model predicts are often actually not strong. Similar results of large recall and small precision are also found in SimRank and ResouceAllocation. The Katz metric predicts only a small number of both strong and weak links whereas the others predicted large number of both types5 although their contribution to TPs are different. As the Katz model yields a small number of positive predictions, its TPs are also 5 For detailed number of predicted links, see Appendix 3 25 relatively small. We found that most TPs of the Katz model are also predicted by RootedPageRank. Going beyond the prediction of strong or not, Figure 46 illustrates the actual and predicted link weights for four interesting links that abruptly emerge and stay stable. The CT-MRI (figure 4a) and AIR-WIND (figure 4b) show excellent performance by the Katz model at all periods, except for a FN at the start of increases in T3. The RootedPageRank also shows decent performance despite overly large values, but other metrics are poor. In a case when peak patterns have stability as in the IL-LED (figure 4c), both predictors also perform well. In summary the RootedPageRank tends to overestimate the link weights and have bigger increases than the Katz, with the exception of the EM-PMM case (figure 4d): the RootedPageRank is slightly passive in following the actual patterns, even though both models are successful at all periods, except for T2. (a) CT-MRI (b) AIR-WIND 6 Note that the global models in figures 4-6 are the best performing parameters: Katz (β=0.001) and RootedPageRank (α=0.01) 26 (c) IL-LED (d) EM-PMM Figure 4. Some cases of links abruptly emerge and stay stable: successful in both Katz and RootedPageRank Figure 5 shows other cases of successful predictions of the Katz model only. In the LED-PLG case (figure 5a), the model successfully predicts being stable at T3 and the decrease at T5, even though unsuccessful in detecting the decrease in T4 (FP). RootedPageRank also predicts a decrease but largely misses the degree of change. The CAP- ET (figure 5b) and CAM-SIS (figure 5c) start as strong links but decrease to weak links in early periods (T2 and T3, repectively). In these cases, the Katz estimates rapidly decrease and stay zero in remaining periods: although it misses the first decrease in T3 and T4 (FP), there are no FNs. But the RootedPageRank model stays strong in every period thus there are many FPs. When comparing Katz with CommonNeighbors in Figure 5a and 5b, they show compeletely different predictions. Although the Katz model with a very small β might be intuitively expected to yield a measurement close to CommonNeighbors (because the long paths then contribute very little), in fact Katz with small beta emphasizes the direct link whereas CommonNeighbors does not instead emphasizing the links between neighboring nodes. 27 (a) LED-PLG (b) CAP-ET (c) CAM-SIS Figure 5. Some cases of successful predictions of the Katz model On the other hand, Figure 6 presents unsuccessful predictions of the Katz model. In the PMM-MRI case (figure 6a), although both the Katz model and RootedPageRank fail to predict the decrease at T4, RootedPageRank predicts successfully after that while the Katz model has a TP at only T7 and T8. In the CE-FLY case (figure 6b), the Katz model continues to show negative prediction and has a TP only at T8 whereas the RootedPageRank begins to increase at T5, and shows TPs at T6 to T8 and T7 to T8 respectively. Similarly, in the EC-SIS case (figure 6c), the TPs of Katz exist only at T7 whereas that of the RootedPageRank is at T6 and T7. But in two cases of CE-FLY and EC-SIS, RootedPageRank has many FPs. 28 (a) PMM-MRI (b) CE-FLY (c) EC-SIS Figure 6. Some cases of unsuccessful predictions of the Katz Whether successful or not, the Katz model tends to predict the increase or decrease of link weights in a conservative and cautious manner while the RootedPageRank models predict in an excessively positive way. The Katz model is highly dependent on the last CS that is larger than 1; it follows the training data trends with one period of time lag. It is successful in predicting sustaining, stable links; but weak in predicting new emergence of strong links, which emerge abruptly (from zero) or incrementally (from weak), because the model rarely considers weak links. 29 5. Discussion This paper empirically analyzed the dynamic pattern and evolution of technological knowledge flows among TDs. A key empirical finding is that the domains we studied interact with only a small minority of other specific domains (2% in the initial period and 9% at the highest in period 7). Moreover, the fraction of citations going to any other specific domain is less than a few percent of the total patent citations by a domain, but on average 70% of the patent-citations are to patents not in the domain of the patent. Thus, empirically it is clear that cross-domain knowledge flow is important overall (~70% of knowledge input on average) even though it is restricted somewhat to specific domain pairs since only 2-9% of possible links are strong in our results. A further implication is that the average domain must interact with multiple other domains in order to achieve the 70% inter-domain knowledge flow since typical strong inter-domain knowledge flows for a specific linkage only account for a few percent of the total knowledge flow to or from a domain.. In regard to the empirical time dependence of the cross-domain linkages, most that are above expectation become relatively steady after emerging from either zero or weak interactions. Some show slow decreases in intensity, some show slow increases and others are classified as steady (see Table 5). The average of 83% condition positives (strong links of testing networks at each period) follow decreasing, increasing or steady patterns. Table 5 also shows that among all condition positives, 68% of the strong links at T were also strong at T-1. This finding suggests that interaction among domains is not "one-time knowledge flow" but mostly continual idea transfer. We also find that knowledge flow is heterogenous and is almost equally likely to occur across operands (from energy technologies to information technologies) and across operations (from storage to transformation) as is it to occur within a given functional classification (for example energy storage). Overall, these empricial results suggest that the limits to transfer of ideas between domains (small numbers of strong 30 interactions) are not functionally dictated. T2 T3 15 7 0 5 3 80% Table 5. Interpretation (pattern proportion) Condition T4 positives Total Decreasing Increasing Steady Peak Proportion of decreasing, increasing, steady patterns Links that are also strong at T-1 15 6 2 7 0 100% 9 (60%) 11 (73%) 15 4 3 8 0 100% 11 (73%) T5 T6 T7 T8 Total 20 5 5 7 3 85% 28 4 8 10 6 79% 36 5 9 10 12 67% 29 4 9 8 8 72% 158 35 36 55 32 83% 11 (55%) 18 (64%) 23 (64%) 24 (83%) 107 (68%) An important distinction of the work reported here is that we pursue prediction of links in the next time period based upon observations in the preceding time period. This has practical implications that we will discuss further below. At this point, we note that our testing of various models for such prediction suggests additional implications for understanding knowledge flow among differing technological domains. An important finding of this type is that triadic closure is unimportant as a mechanism for forming linkages among technological domains despite its widespread utility for understanding the dynamic evolution of many complex networks (Bianconi et al., 2014; Kleinberg, 2008; Liben-Nowell and Kleinberg, 2007). This is shown by the non-existent prediction power of the CommonNeighbor and other local topology prediction models. The fact that two technologies have significant interaction with a specific third domain not at all predicts that these two technologies will interact in the future. For example, the camera and LED lighting domains were not linked but had a strong common neighbor integrated circuit (IC) domain at T1 (the CS of CAM-IC was 13.89 and that of IC-LED was 4.81). Not surprisingly, the CAM-LED 31 link is predicted as strong by most local predictors, but the actual CS at T2 was zero. The links between semiconductor technology (IC) and both LEDs and Cameral sensitivity are aligned with technical facts about these domains, but there are no such technical reasons for knowledge flow directly between LEDs and Camera development. Among many other similar examples, we note flywheel and wind turbines (FLY-WIND) at T5 where having both magnetic information storage (MIS) and electric motors (EM) as common neighbors leads to a predicted link; but since these common neighbors do not signify a knowledge flow between flywheels and wind turbines, the predicted link does not occur. If we contrast this result with the very successful Katz prediction at low Beta, we are led to the conclusion that the Katz predictor reliance on direct links to predict further interaction overcomes the weakness of triadic closure prediction, mainly by assuring an ability to interact directly before the prediction of stronger interaction. Similar to the failure of triadic closure in being an effective predictive mechanism, it appears that the "rich get richer" mechanism associated with power laws and preferential attachment (Barabási et al., 2002; Watts and Strogatz, 1998) is not effective in predicting future links. The F-score and other measures of the effectiveness of the power law metrics is weak (figures 3) and suggests that preferential attachment is not the mechanism by which domains are linked to one another. Thus, domains that have a relatively high number of interactions at one time period are not more likely to form new linkages in the next time period. Interestingly, this suggests that the conceptually appealing idea of general purpose technologies as knowedge sources (Moser et al., 2015; Jovanovic and Rousseau, 2005) is not supported: general purpose technologies would be high degree nodes in a cross-domain network, and if general purpose technologies are thus a dominant mechanism for the spillover of ideas, preferential attachment would be expected to show good performance. The results do not demonstrate such an effect. This result does not suggest that general purpose 32 technologies are economically unimportant but instead that extending the concept to cover knowledge spillovers is not supported by our results. There is good evidence (Brynjolfsson and McAfee, 2014) that the integrated circuits domain has been very economically significant during the last 40 years; nonetheless, the inclusion of IC in the 29 domains we investigated did not result in importance of highly interactive domains in forging new knowledge-flow links over time. The most successful predictors are global metrics (Katz and RootedPageRank) based upon the overall network that do not assume near neighbor interactions as important. This finding suggests that paths of strong cumulative development such as first suggested by Dosi are a viable concept. Moreover, the success of the Katz model is not just relatively strong because of the failiure of triadic closure and preferential attachment but absolutely strong enough to be practically useful: The Katz model successfully predicted when a link stably stays strong (as shown in Figure 4) and predicted better than RootedPageRank when a link changes to and stays stable at weak or zero (as shown in Figure 5). This absolute strength is consistent with the steady patterns exhibited by most strong interactions among the domains and with the fact that strong links continue strong in next period (as shown in Table 5). Thus, the Katz model gives us a quantitative, predictive interpretation of why the strong linkages are relatively steady with time. Qualitatively, the success of the model indicates that most of the inter-domain knowledge flow is continuation of past flows starting from when domains are first formed, and also suggests that trajectories utilize technologically diverse knowledge. 6. Conclusion This study investigated the dynamic evolution of knowledge flow across technological domains. Filling the gaps from the previous research, the study used technological domain units to capture knowledge flows among technological artifacts, and the link prediction 33 method to help characterize the topological change and evolutionary behaviors in dynamic technology networks. As an early attempt that applies link prediction to patent citation-based networks, this study offers the basis for predicting the emergence and continuance of future technological knowledge flows. This research particularly has implications for the dynamic capabilities of firms (Teece, 2007; Teece, Pisano, and Shuen, 1997). Dynamic capabilities allow significant change to occur within the firm so that it can adapt more effectively than other firms to a change in the environment (Teece, 2007). Given the importance of cross-domain knowledge spillovers to creation of technological variety (Schoenmakers and Duysters, 2010), a potentially important aspect of firm dynamic capabilities is the anticipation and integration of such spillovers to domains that are critical to the firm. Our findings show that the existence of such spillovers is predictable to a significant extent through link prediction using the Katz model. Thus, our results suggest that a key strategic asset of a firm can be at least somewhat planned for. A first task for any firm striving to be more mindful of important sources of knowledge spillovers is to first analyze which technological domains are important in the products and services they produce. A systematic procedure for identifying more details about such technologies is available (Benson and Magee, 2015, 2016) and can lead to identification of patents with all of their attendant information, such as citations by these patents, which is the key step in identifying the important knowledge spillover sources. Having the capability to handle such spillovers will require some attention to expertise acquisition (employees or outsiders) and/or collaboration in the technological domains of importance, but also some attention to developments in "non-core" areas. Our results indicate that the sources of the knowledge spillover are relatively stable, making identification and awareness maintenance more doable for the firms who take it on. 34 Such stability in a key aspect of long-term change was pointed out in an important paper by Helfat and Winter (2011), which showed that dynamic and operational capabilities had at best a fuzzy boundary. In the case discussed here, the spillover domains are mostly fixed over time, with only the formation of new domains unknown. In addition to further research on the dynamics of the formation of new domains, other aspects of the research reported here that might be improved in the future are worth noting. First, while the patent coverage in our dataset is extensive (502,444 patents), it is not the total US patent set for the years studied (4,666,574 patents) and thus define samples of domains rather than a total set. This is important since the focus of the work is cross-domain knowledge flow; however, the set of domains tested here is numerous and broad enough that our results (network metrics that are good at predicting relatively stable linkages work best) appear robust. While we tested a wide range of models, first difference time series have recently been demonstrated for link prediction (for example using ARIMA) and future research could explore this. Acknowledgments The authors acknowledge support from the SUTD-MIT International Design Center (IDC). We also thank Chris Benson and Subarna Basnet for sharing the patent sets for the 29 technology domains used in this study. References Acemoglu D, Akcigit U, Kerr WR. 2016. Innovation network. Proceedings of the National Academy of Sciences 113(41): 11483–11488. Adamic LA, Adar E. 2003. Friends and neighbors on the Web. Social Networks 25(3): 211– 230. Alcácer J, Gittelman M. 2006. Patent Citations as a Measure of Knowledge Flows: The Influence of Examiner Citations. Review of Economics and Statistics. The MIT Press 88(4): 774–779. 35 Barabási A. et al. 2002. Evolution of the social network of scientific collaborations. Physica A: Statistical Mechanics and its Applications 311(3): 590–614. Basnet S. 2015. Modeling Technical Performance Change Using Design Fundamentals. Massachusetts Institute of Technology. Basnet S, Magee CL. 2016. Modeling of technological performance trends using design theory. Design Science 2(e8). Benson CL, Magee CL. 2013. A hybrid keyword and patent class methodology for selecting relevant sets of patents for a technological field. Scientometrics 96(1): 69–82. Benson CL, Magee CL. 2015. Technology structural implications from the extension of a patent search method. Scientometrics 102(3): 1965–1985. Benson CL, Magee CL. 2016. Using Enhanced Patent Data for Future-Oriented Technology Analysis. In Anticipating Future Innovation Pathways Through Large Data Analysis, Tugrul U. Daim, Denise Chiavetta, Alan L. Porter, Ozcan Saritas (eds). Springer International Publishing: 119–131. Bianconi G, Darst R, Iacovacci J, Fortunato S. 2014. Triadic closure as a basic generating mechanism of communities in complex networks. Physical Review E 90(4): 42806. Brin S, Page L, Brin S, Page L. 1998. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems. Elsevier Science Publishers B. V. 30(1– 7): 107–117. Brynjolfsson E, McAfee A. 2014. The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies. W. W. Norton & Company: New York. Caviggioli F. 2016. Technology fusion: Identification and analysis of the drivers of technology convergence using patent data. Technovation 55–56: 22–32. Chang S-B, Lai K-K, Chang S-M. 2009. Exploring technology diffusion and classification of business methods: Using the patent citation network. Technological Forecasting and Social Change 76(1): 107–117. Chen Z, Guan J. 2016. The core-peripheral structure of international knowledge flows: evidence from patent citation data. R&D Management 46(1): 62–79. Cho T-S, Shih H-Y. 2011. Patent citation network analysis of core and emerging technologies in Taiwan: 1997–2008. Scientometrics 89(3): 795–811. Cho Y, Kim E, Kim W. 2015. Strategy transformation under technological convergence: evidence from the printed electronics industry. International Journal of Technology 67(2/3/4): 106–131. Choi C, Park Y. 2009. Monitoring the organic structure of technology based on the patent development paths. Technological Forecasting and Social Change 76(6): 754–768. Choi J, Hwang Y-S. 2014. Patent keyword network analysis for improving technology development efficiency. Technological Forecasting and Social Change 83: 170–182. Clauset A, Moore C, Newman MEJ. 2008. Hierarchical structure and the prediction of missing links in networks. Nature 453(7191): 98–101. Clough JR, Gollings J, Loach T V., Evans TS. 2015. Transitive reduction of citation networks. Journal of Complex Networks 3(2): 189–203. Dasgupta K, Singh R, Viswanathan B. 2008. Social ties and their relevance to churn in mobile telecom networks. In Proceedings of the 11th international conference on Extending database technology: Advances in database technology. Nantes, France. Dosi G. 1982. Technological paradigms and technological trajectories. Research Policy 11(3): 147–162. Duguet E, MacGarvie M. 2005. How well do patent citations measure flows of technology? Evidence from French innovation surveys. Economics of Innovation and New Technology. Routledge 14(5): 375–393. 36 É rdi P et al. 2013. Prediction of emerging technologies based on analysis of the US patent citation network. Scientometrics. Springer Netherlands 95(1): 225–242. Esslimani I, Brun A, Boyer A. 2011. Densifying a behavioral recommender system by social networks link prediction methods. Social Network Analysis and Mining. Springer Vienna 1(3): 159–172. Funk RJ, Owen-Smith J. 2016. A Dynamic Network Measure of Technological Change. Management Science (March): mnsc.2015.2366. Gentner D, Markman A. 1997. Structure mapping in analogy and similarity. American Psychologist 52(1): 45–56. Guimerà R, Sales-Pardo M. 2009. Missing and spurious interactions and the reconstruction of complex networks. Proceedings of the National Academy of Sciences of the United States of America. National Academy of Sciences 106(52): 22073–8. Guns R. 2014. Link Prediction. In Measuring Scholarly Impact - Methods and Practice, Ding Y, Rousseau R, Wolfram D (eds). Springer International Publishing: Cham: 35–56. Han Y, Park Y. 2006. Patent network analysis of inter-industrial knowledge flows: The case of Korea between traditional and emerging industries. World Patent Information 28(3): 235–247. Helfat CE, Winter SG. 2011. Untangling dynamic and operational capabilities: Strategy for the (N)ever-changing world. Strategic Management Journal 32(11): 1243–1250. Huang Z, Zeng D. 2006. A link prediction approach to anomalous email detection. In Systems, Man and Cybernetics, 2006. SMC'06. IEEE International Conference on: 1131–1136. Hung S-W, Wang A-P. 2010. Examining the small world phenomenon in the patent citation network: a case study of the radio frequency identification (RFID) network. Scientometrics. Springer Netherlands 82(1): 121–134. Itakura KY, Clarke CLA, Geva S, Trotman A, Huang WC. 2011. Topical and Structural Linkage in Wikipedia. In Advances in Information Retrieval. ECIR 2011. Lecture Notes in Computer Science, vol 6611, Clough P et al. (eds). Springer: Berlin, Heidelberg: 460– 465. Jaffe A, Trajtenberg M, Fogarty M. 2000. Knowledge Spillovers and Patent Citations: Evidence from a Survey of Inventors. American Economic Review 90(2): 215–218. Jaffe A, Trajtenberg M, Henderson R. 1993. Geographic localization of knowledge spillovers as evidenced by patent citations. the Quarterly journal of Economics 108(3): 577–598. Jeh G, Widom J. 2002. SimRank: a measure of structural-context similarity. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '02. ACM Press: New York, USA: 538–543. Jovanovic B, Rousseau PL. 2005. General Purpose Technologies. In Handbook of Economic Growth, Aghion P, Durlauf SN (eds), 1B: 1181–1224. Karki M. 1997. Patent citation analysis: A policy analysis tool. World Patent Information. Katz L. 1953. A new status index derived from sociometric analysis. Psychometrika. Springer-Verlag 18(1): 39–43. Kim D, Cerigo DB, Jeong H, Youn H. 2016. Technological novelty profile and invention's future impact. EPJ Data Science 5(8): 1–15. Kim E, Cho Y, Kim W. 2014. Dynamic patterns of technological convergence in printed electronics technologies: Patent citation network. Scientometrics 98(2): 975–998. Kleinberg J. 2008. The convergence of social and technological networks. Communications of the ACM 51(11): 66–72. Ko N, Yoon J, Seo W. 2014. Analyzing interdisciplinarity of technology fusion using knowledge flows of patents. Expert Systems with Applications 41(4): 1955–1963. Koh H, Magee CL. 2006. A functional approach for studying technological progress: 37 Application to information technology. Technological Forecasting and Social Change 73(9): 1061–1083. Lee S, Kim M-S. 2010. Inter-technology networks to support innovation strategy: An analysis of Korea's new growth engines. Innovation 12(1): 88–104. Lee WJ, Lee WK, Sohn SY. 2016. Patent Network Analysis and Quadratic Assignment Procedures to Identify the Convergence of Robot Technologies. Plos One, Gao Z-K (ed). Public Library of Science 11(10): e0165091. Li J, Zhang L, Meng F, Li F. 2014. Recommendation Algorithm based on Link Prediction and Domain Knowledge in Retail Transactions. Procedia Computer Science 31: 875– 881. Liben-Nowell D, Kleinberg J. 2007. The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology 58(7): 1019–1031. Lü L, Zhou T. 2011. Link prediction in complex networks: A survey. Physica A: Statistical Mechanics and its Applications 390(6): 1150–1170. Luan C, Liu Z, Wang X. 2013. Divergence and convergence: Technology-relatedness evolution in solar energy industry. Scientometrics 97(2): 461–475. Magee CL, Basnet S, Funk JL, Benson CL. 2016. Quantitative empirical trends in technical performance. Technological Forecasting and Social Change. The Authors 104: 237–246. Martinelli A, Nomaler Ö . 2014. Measuring knowledge persistence: a genetic approach to patent citation networks. Journal of Evolutionary Economics. Springer Berlin Heidelberg 24(3): 623–652. Mina A, Ramlogan R, Tampubolon G, Metcalfe JS. 2007. Mapping evolutionary trajectories: Applications to the growth and transformation of medical knowledge. Research Policy 36(5): 789–806. Moser P, Nicholas T, Nicholas TOM. 2015. Was Electricity a General Purpose Technology? Patent Citations Evidence from Historical. The American Economic Review, Papers and Proceedings 94(2): 388–394. Murata T, Moriyasu S. 2007. Link Prediction of Social Networks Based on Weighted Proximity Measures. In IEEE/WIC/ACM International Conference on Web Intelligence (WI'07). IEEE: 85–88. Newman MEJ. 2001. Clustering and preferential attachment in growing networks. Physical Review E. American Physical Society 64(2): 25102. No HJ, Park Y. 2010. Trajectory patterns of technology fusion: Trend analysis and taxonomical grouping in nanobiotechnology. Technological Forecasting and Social Change. Elsevier Inc. 77(1): 63–75. Nomaler Ö , Verspagen B. 2016. River deep, mountain high: Of long‐run knowledge trajectories within and between innovation clusters. Journal of Economic Geography 16(6): 1259–1278. Park H, Magee CL. 2017. Tracing Technological Development Trajectories: A Genetic Knowledge Persistence-Based Main Path Approach. PLoS ONE, Gao Z-K (ed). Harvard University Press 12(1): e0170895. Park J, Lee H, Park Y. 2009. Disembodied knowledge flows among industrial clusters: A patent analysis of the Korean manufacturing sector. Technology in Society. Elsevier Ltd 31(1): 73–84. Perez-Cervantes E, Mena-Chalco JP, Oliveira MCF De, Cesar R. 2013. Using Link Prediction to Estimate the Collaborative Influence of Researchers. In 2013 IEEE 9th International Conference on e-Science. IEEE: 293–300. Powers DMW. 2011. Evaluation: From Precision, Recall, and F-measure to ROC, Informedness, Markedness & Correlation. Journal of Machine Learning Technologies 38 2(1): 37–63. Price D de S. 1976. A general theory of bibliometric and other cumulative advantage processes. Journal of the American society for Information 27(5): 292–306. Ruttan VW. 1959. Usher and Schumpeter on Invention, Innovation, and Technological Change. The Quarterly Journal of Economics 73(4): 596–606. Salton G, McGill M. 1983. Introduction to modern information retrieval. McGraw-Hill: New York. Schoenmakers W, Duysters G. 2010. The technological origins of radical inventions. Research Policy 39: 1051–1059. Shih H-Y, Chang T-LS. 2009. International diffusion of embodied and disembodied technology: A network analysis approach. Technological Forecasting and Social Change 76(6): 821–834. Shin J, Park Y. 2010. Evolutionary optimization of a technological knowledge network. Technovation 30(11–12): 612–626. Teece D. 2007. Explicating dynamic capabilities: the nature and microfoundations of (sustainable) enterprise performance. Strategic management journal 28(13): 1319–1350. Teece DJ, Pisano G, Shuen A. 1997. Dynamic Capabilities and Strategic Management. Strategic Management Journal. Wiley 18(7): 509–533. Trajtenberg M. 1990. A Penny for Your Quotes: Patent Citations and the Value of Innovations. The RAND Journal of Economics 21(1): 172. Travers J, Milgram S. 1967. The small world problem. Phychology Today 1(1): 61–67. Triulzi G, Alstott J, Magee CL. 2017, June 15. Predicting Technology Performance Improvement Rates by Mining Patent Data. SSRN. Available at: https://ssrn.com/abstract=2987588. Usher AP. 1954. A history of mechanical inventions. Harvard University Press: Cambridge, MA. Valverde-Rebaza J, de Andrade Lopes A. 2013. Exploiting behaviors of communities of twitter users for link prediction. Social Network Analysis and Mining. Springer Vienna 3(4): 1063–1074. Verspagen B. 2007. Mapping technological trajectories as patent citation networks: a study on the history of fuel cell research. Advances in Complex Systems. World Scientific Publishing Company 10(1): 93–115. Verspagen B, De Loo I. 1999. Technology Spillovers between Sectors and over Time. Technological Forecasting and Social Change 60(3): 215–235. Ter Wal A. 2014. The dynamics of the inventor network in German biotechnology: geographic proximity versus triadic closure. Journal of Economic Geography 14(3): 589–620. Watts D, Strogatz S. 1998. Collective dynamics of 'small-world'networks. Nature 393(6684): 440–442. Weisberg RW. 2006. Creativity: understanding innovation in problem solving, science, invention, and the arts. John Wiley & Sons. Zhou T, Lu L, Zhang Y-C. 2009. Predicting Missing Links via Local Information. European Physical Journal B 71(4): 623–630. Zhu B, Xia Y. 2016. Link Prediction in Weighted Networks: A Weighted Mutual Information Model. PLoS ONE, Sendiña-Nadal I (ed). Public Library of Science 11(2): e0148265. 39 Appendix 1. Cross-TD networks (training networks) (a) Network at period 1 (b) Network at period 2 40 (c) Network at period 3 (d) Network at period 4 41 (e) Network at period 5 (f) Network at period 6 42 (g) Network at period 7 (a) Network at period 8 43 Appendix 2. Cross-TD networks (strong links, testing networks) (a) Network at period 1 (cutoff =1) (b) Network at period 2 (cutoff =1) 44 (c) Network at period 3 (cutoff =1) (d) Network at period 4 (cutoff =1) 45 (e) Network at period 5 (cutoff =1) (f) Network at period 6 (cutoff =1) 46 (g) Network at period 7 (cutoff =1) (h) Network at period 8 (cutoff =1) 47 Appendix 3. Link prediction results: Number of predicted and actual links T2 17 23 19 35 9 10 10 3 3 CommonNeighbors Jaccard Adamic-Adar ResourceAllocation PreferentialAttachment Katz (β=0.001) Katz (β=0.01) Katz (β =0.1) Katz (β =0.5) RootedPageRank (α=0.01) 23 RootedPageRank (α=0.1) 27 RootedPageRank (α=0.5) 55 RootedPageRank (α=0.9) 83 SimRank (γ=0.01) 35 SimRank (γ=0.1) 37 SimRank (γ=0.5) 60 SimRank (γ=0.9) 77 Actual 15 53 CommonNeighbors 47 Jaccard 40 Adamic-Adar ResourceAllocation 35 141 PreferentialAttachment Katz (β=0.001) 9 Katz (β=0.01) 9 Katz (β =0.1) 16 Katz (β =0.5) 16 RootedPageRank (α=0.01) 148 RootedPageRank (α=0.1) 144 RootedPageRank (α=0.5) 116 RootedPageRank (α=0.9) 88 SimRank (γ=0.01) 136 SimRank (γ=0.1) 134 SimRank (γ=0.5) 111 SimRank (γ=0.9) 94 Actual 69 Stron g links Weak links T4 18 54 27 124 29 15 15 6 4 38 40 63 175 111 116 147 127 15 304 268 255 198 252 29 29 38 40 313 311 288 176 240 235 204 224 166 T5 84 103 99 155 21 15 11 1 1 55 57 77 279 146 148 185 215 20 287 268 251 216 283 29 33 43 43 323 321 301 99 232 230 193 163 196 T6 30 91 65 193 38 20 20 6 5 55 87 87 316 153 167 230 275 28 348 287 307 185 290 87 87 101 102 323 291 291 62 225 211 148 103 245 T7 52 151 104 253 30 28 16 8 7 79 87 146 378 226 234 272 280 36 354 255 301 153 348 95 107 115 116 327 319 260 28 180 172 134 126 255 T8 107 142 136 251 67 36 30 24 16 78 81 137 379 228 239 279 295 29 299 264 267 155 330 231 237 243 251 328 325 269 27 178 167 127 111 283 T3 20 53 24 75 45 15 15 14 10 39 41 56 139 59 63 94 109 15 231 198 171 176 181 33 33 34 38 261 259 244 161 241 237 206 191 118 48 Appendix 4. Link prediction results: Performance evaluation (Bolded entries are the best performances) Accuracy CommonNeighbors Jaccard Adamic-Adar ResourceAllocation PreferentialAttachment Katz(β=0.001) Katz(β=0.01) Katz(β =0.1) Katz(β =0.5) RootedPageRank(α=0.01) RootedPageRank(α=0.1) RootedPageRank(α=0.5) RootedPageRank(α=0.9) SimRank(γ=0.01) SimRank(γ=0.1) SimRank(γ=0.5) SimRank(γ=0.9) Precision CommonNeighbors Jaccard Adamic-Adar ResourceAllocation PreferentialAttachment Katz(β=0.001) Katz(β=0.01) Katz(β =0.1) Katz(β =0.5) RootedPageRank(α=0.01) RootedPageRank(α=0.1) RootedPageRank(α=0.5) RootedPageRank(α=0.9) SimRank(γ=0.01) SimRank(γ=0.1) SimRank(γ=0.5) SimRank(γ=0.9) Recall CommonNeighbors Jaccard Adamic-Adar ResourceAllocation PreferentialAttachment Katz(β=0.001) T2 0.941 0.926 0.936 0.902 0.956 0.983 0.983 0.970 0.970 0.951 0.941 0.882 0.813 0.902 0.897 0.850 0.803 T2 0.235 0.174 0.211 0.143 0.333 0.900 0.900 1.000 1.000 0.391 0.333 0.200 0.133 0.143 0.135 0.117 0.078 T2 0.267 0.267 0.267 0.333 0.200 0.600 T3 0.934 0.852 0.924 0.823 0.882 0.980 0.975 0.958 0.963 0.931 0.926 0.889 0.685 0.857 0.847 0.786 0.749 T3 0.200 0.076 0.167 0.120 0.133 0.733 0.667 0.429 0.500 0.333 0.317 0.232 0.094 0.136 0.127 0.117 0.101 T3 0.267 0.267 0.267 0.600 0.400 0.733 T4 0.938 0.850 0.921 0.717 0.911 0.980 0.980 0.973 0.973 0.934 0.929 0.882 0.606 0.749 0.737 0.660 0.709 T4 0.222 0.074 0.185 0.097 0.138 0.733 0.733 0.833 1.000 0.342 0.325 0.238 0.086 0.108 0.103 0.082 0.095 T4 0.267 0.267 0.333 0.800 0.267 0.733 49 T5 0.793 0.741 0.761 0.633 0.904 0.968 0.968 0.953 0.953 0.904 0.899 0.850 0.362 0.650 0.645 0.559 0.500 T5 0.119 0.087 0.111 0.084 0.048 0.733 0.818 1.000 1.000 0.327 0.316 0.234 0.072 0.082 0.081 0.070 0.074 T5 0.500 0.450 0.550 0.650 0.050 0.550 T6 0.877 0.751 0.810 0.559 0.852 0.970 0.970 0.936 0.938 0.914 0.840 0.840 0.291 0.653 0.618 0.473 0.377 T6 0.133 0.099 0.123 0.109 0.079 0.900 0.900 0.667 0.800 0.436 0.287 0.287 0.089 0.131 0.120 0.096 0.091 T6 0.143 0.321 0.286 0.750 0.107 0.643 T7 0.823 0.638 0.749 0.451 0.857 0.956 0.941 0.916 0.919 0.865 0.845 0.709 0.158 0.507 0.488 0.404 0.389 T7 0.154 0.133 0.183 0.130 0.133 0.821 0.875 0.625 0.714 0.380 0.345 0.219 0.095 0.137 0.133 0.121 0.121 T7 0.222 0.556 0.528 0.917 0.111 0.639 T8 0.744 0.648 0.687 0.434 0.813 0.958 0.953 0.929 0.938 0.860 0.852 0.719 0.138 0.490 0.463 0.370 0.335 T8 0.150 0.099 0.140 0.100 0.149 0.667 0.667 0.500 0.625 0.321 0.309 0.190 0.077 0.110 0.105 0.093 0.092 T8 0.552 0.483 0.655 0.862 0.345 0.828 Ave. 0.864 0.772 0.827 0.645 0.882 0.971 0.967 0.948 0.951 0.908 0.890 0.824 0.436 0.687 0.671 0.586 0.552 Ave. 0.173 0.106 0.160 0.112 0.145 0.784 0.794 0.722 0.806 0.362 0.319 0.229 0.092 0.121 0.115 0.099 0.093 Ave. 0.317 0.373 0.412 0.702 0.211 0.675 Katz(β=0.01) Katz(β =0.1) Katz(β =0.5) RootedPageRank(α=0.01) RootedPageRank(α=0.1) RootedPageRank(α=0.5) RootedPageRank(α=0.9) SimRank(γ=0.01) SimRank(γ=0.1) SimRank(γ=0.5) SimRank(γ=0.9) F-score CommonNeighbors Jaccard Adamic-Adar ResourceAllocation PreferentialAttachment Katz(β=0.001) Katz(β=0.01) Katz(β =0.1) Katz(β =0.5) RootedPageRank(α=0.01) RootedPageRank(α=0.1) RootedPageRank(α=0.5) RootedPageRank(α=0.9) SimRank(γ=0.01) SimRank(γ=0.1) SimRank(γ=0.5) SimRank(γ=0.9) 0.600 0.200 0.200 0.600 0.600 0.733 0.733 0.333 0.333 0.467 0.400 T2 0.250 0.211 0.235 0.200 0.250 0.720 0.720 0.333 0.333 0.474 0.429 0.314 0.225 0.200 0.192 0.187 0.130 0.667 0.400 0.333 0.867 0.867 0.867 0.867 0.533 0.533 0.733 0.733 T3 0.229 0.118 0.205 0.200 0.200 0.733 0.667 0.414 0.400 0.482 0.464 0.366 0.169 0.216 0.205 0.202 0.177 0.733 0.333 0.267 0.867 0.867 1.000 1.000 0.800 0.800 0.800 0.800 T4 0.242 0.116 0.238 0.173 0.182 0.733 0.733 0.476 0.421 0.491 0.473 0.385 0.158 0.191 0.183 0.148 0.169 0.450 0.050 0.050 0.900 0.900 0.900 1.000 0.600 0.600 0.650 0.800 T5 0.192 0.146 0.185 0.149 0.049 0.629 0.581 0.095 0.095 0.480 0.468 0.371 0.134 0.145 0.143 0.127 0.136 0.643 0.143 0.143 0.857 0.893 0.893 1.000 0.714 0.714 0.786 0.893 T6 0.138 0.151 0.172 0.190 0.091 0.750 0.750 0.235 0.242 0.578 0.435 0.435 0.163 0.221 0.205 0.171 0.165 0.389 0.139 0.139 0.833 0.833 0.889 1.000 0.861 0.861 0.917 0.944 T7 0.182 0.214 0.271 0.228 0.121 0.719 0.539 0.227 0.233 0.522 0.488 0.352 0.174 0.237 0.230 0.214 0.215 0.690 0.414 0.345 0.862 0.862 0.897 1.000 0.862 0.862 0.897 0.931 T8 0.235 0.164 0.230 0.179 0.208 0.739 0.678 0.453 0.444 0.467 0.455 0.313 0.142 0.195 0.187 0.169 0.167 0.596 0.240 0.211 0.827 0.832 0.883 0.943 0.672 0.672 0.750 0.786 Ave. 0.210 0.160 0.220 0.188 0.157 0.718 0.667 0.319 0.310 0.499 0.459 0.362 0.166 0.201 0.192 0.174 0.166 50
1510.02215
2
1510
2016-04-04T08:49:33
Distributed Estimation of Graph 4-Profiles
[ "cs.SI", "cs.DC", "cs.DS" ]
We present a novel distributed algorithm for counting all four-node induced subgraphs in a big graph. These counts, called the $4$-profile, describe a graph's connectivity properties and have found several uses ranging from bioinformatics to spam detection. We also study the more complicated problem of estimating the local $4$-profiles centered at each vertex of the graph. The local $4$-profile embeds every vertex in an $11$-dimensional space that characterizes the local geometry of its neighborhood: vertices that connect different clusters will have different local $4$-profiles compared to those that are only part of one dense cluster. Our algorithm is a local, distributed message-passing scheme on the graph and computes all the local $4$-profiles in parallel. We rely on two novel theoretical contributions: we show that local $4$-profiles can be calculated using compressed two-hop information and also establish novel concentration results that show that graphs can be substantially sparsified and still retain good approximation quality for the global $4$-profile. We empirically evaluate our algorithm using a distributed GraphLab implementation that we scaled up to $640$ cores. We show that our algorithm can compute global and local $4$-profiles of graphs with millions of edges in a few minutes, significantly improving upon the previous state of the art.
cs.SI
cs
Distributed Estimation of Graph 4-Profiles∗ Ethan R. Elenberg, Karthikeyan Shanmugam, Michael Borokhovich, Alexandros G. Dimakis The University of Texas at Austin {elenberg,karthiksh,michaelbor}@utexas.edu [email protected] April 5, 2016 Abstract We present a novel distributed algorithm for counting all four-node induced subgraphs in a big graph. These counts, called the 4-profile, describe a graph's connectivity properties and have found several uses ranging from bioinformatics to spam detection. We also study the more complicated problem of estimating the local 4-profiles centered at each vertex of the graph. The local 4-profile embeds every vertex in an 11-dimensional space that characterizes the local geometry of its neighborhood: vertices that connect different clusters will have different local 4-profiles compared to those that are only part of one dense cluster. Our algorithm is a local, distributed message-passing scheme on the graph and computes all the local 4-profiles in parallel. We rely on two novel theoretical contributions: we show that local 4-profiles can be calculated using compressed two-hop information and also establish novel concentration results that show that graphs can be substantially sparsified and still retain good approximation quality for the global 4-profile. We empirically evaluate our algorithm using a distributed GraphLab implementation that we scaled up to 640 cores. We show that our algorithm can compute global and local 4-profiles of graphs with millions of edges in a few minutes, significantly improving upon the previous state of the art. Introduction 1 Graph k-profiles are local statistics that count the number of small subgraphs in a big graph. k-profiles are a natural generalization of triangle counting and are increasingly popular for several problems in big graph analytics. Globally, they form a concise graph description that has found several applications for the web [1, 2] as well as social and biological networks [3, 4]. Furthermore, as we explain, the local profile of a vertex is an embedding in a low-dimensional feature space that reveals local structural information. Mathematically, k-profiles are of significant recent interest since they are connected to the emerging theory of graph homomorphisms, graph limits and graphons [5, 3, 6]. There are 4 possible graphs on 3 vertices, labeled H0, . . . , H3, as in Figure 1 (left). The (global) 3-profile of a graph G(V, E) is a vector having one coordinate for each distinct Hi that counts how many times that Hi appears as an induced subgraph of G. For example, the graph G = K4 (the complete graph on 4 vertices) has the 3-profile [0, 0, 0, 4] since it contains 4 triangles and no other (induced) subgraphs. The graph C5 (the cycle on 5 vertices, i.e. a pentagon) has the 3-profile [0, 5, 5, 0]. Note that the sum of the k-profile is (cid:1), the total number of subgraphs. Estimating 3-profiles of big graphs is a topic that has received always(cid:0)V k attention from several communities recently (e.g., see [3, 7, 8, 9] and references therein). In this paper we are interested in the significantly more challenging problem of estimating 4-profiles. Figure 1 (right) shows the 11 possible graphs on 4 vertices,1 labeled as Fi, i = 0 . . . 10. Given a big graph ∗This work will be presented in part at WWW'16, and has been supported by NSF Grants CCF 1344179, 1344364, 1407278, 1422549 and ARO YIP W911NF-14-1-0258. 1Actually there are 17 local subgraphs when considering vertex automorphisms. This is discussed in Section 2 in detail. For the purpose of initial exposition, we will ignore vertex automorphisms. 1 G(V, E) we are interested in estimating the global 4-profile, i.e. count how many times each Fi appears as an induced subgraph of G. In addition to global graph statistics, we are interested in local 4-profiles: given a specific vertex v0, the local 4-profile of v0 is an 11-dimensional vector, with each coordinate i counting how many induced Fi's contain v0. In Figure 2 we show an example of the local 4-profile of a vertex. F0 F1 F2 F3 F4 F5 H0 H1 H2 H3 Figure 1: Left: The 4 possible non-isomorphic graphs on 3 vertices used to calculate the 3-profile of a graph G. The 3-profile counts how many times each Hi appears in G. Right: The 11 non-isomorphic graphs on 4 vertices used to calculate the 4-profile of a graph. F6 F7 F8 F9 F10 v0 v1 v2 v3 v4 Figure 2: An example for local profiles. The global 3-profile is [0, 3, 6, 1]. The global 4-profile is [0, 0, 0, 0, 2, 0, 0, 1, 2, 0, 0]. The local 4-profile of v0 is [0, 0, 0, 0, 1, 0, 0, 1, 2, 0, 0]. The first 1 in the profile corresponds to the subgraph F4. Notice that v0 participates in only one F4, jointly with vertices v2, v3, v4. The local 4-profile of a vertex can be seen as an embedding in an 11-dimensional space that characterizes the local geometry of its neighborhood: vertices that connect different clusters will have different local 4- profiles compared to those that are only part of one dense cluster. A very naive estimation of 4-profiles (cid:1) possible subgraphs. Furthermore, for estimating each local 4-profile independently, this computation has to be repeated n times, once for each vertex. Note that the local 4-profiles may be rescaled and added together to obtain the global 4-profile. Since some of the 4-profile subgraphs are disconnected (like F0, F1, F5), local 4-profiles contain information beyond the local neighborhood of a vertex. Therefore, in a distributed setting, it seems that global communication is required. requires examining(cid:0)n 4 1.1 Our contributions Surprisingly, we show that very limited global information is sufficient to calculate all local 4-profiles and that it can be re-used to calculate all the local 4-profiles in parallel. Specifically, we introduce a distributed algorithm to estimate all the local 4-profiles and the global profile of a big graph. This restrictive setting does not allow communication between nonadjacent vertices, a key component of previous centralized, shared- memory approaches. Our algorithm relies on two novel theoretical results: Two-hop histograms are sufficient: Our algorithm operates by having each vertex first perform local message-passing to its neighbors and then solve a novel system of equations for the local 4-profile. Focusing on a vertex v0, the first easy step is to calculate its local 3-profile. It can be shown that the local 3-profile combined with the full two-hop connectivity information is sufficient to estimate the local 4-profile for each vertex v0. This is not immediately obvious, since naively counting the 3-path (an automorphism of F4) would require 3-hop connectivity information. However, we show that less information needs to be communicated. Specifically, we prove that the triangle list combined with what we call the two-hop histogram is sufficient: for each vertex vi that is 2-hops from v0, we only need the number of distinct paths connecting it to v0, not the full two hop neighborhood. If the two-hop neighborhood is a tree, this amounts to no compression. However, for real graphs the two-hop histogram saves a factor of 3x to 5x in communication in our experiments. This 2 enables (Section 4) an even more significant running time speedup of 5 − 10 times on several distributed experiments using 12 − 20 compute nodes. Profile Sparsification: One idea that originated from triangle counting [10, 11] is to first perform random subsampling of edges to create a sparse graph called a triangle sparsifier. Then count the number of triangles in the sparse graph and re-scale appropriately to estimate the number in the original graph. The main chal- lenge is proving that the randomly sparsified graph has a number of triangles sufficiently concentrated around its expectation. Recently this idea was generalized to 3-profile sparsifiers in [9], with concentration results for estimating the full 3-profile. These papers rely on Kim-Vu polynomial concentration techniques [12] that scale well in theory, but typically the estimated errors are orders of magnitude larger than the measured quantities for reasonable graph sizes. In this paper, we introduce novel concentration bounds for global k-profile sparsifiers that use a novel information theoretic technique called read-k functions [13]. Our read-k bounds allow usable concentration inequalities for sparsification factors of approximately 0.4 or higher (Sec- tion 4.1). Note that removing half the edges of the graph does not accelerate the running time by a factor of 2, but rather by a factor of nearly 8, as shown in our experiments. System implementation and evaluation: We implemented our algorithm using GraphLab Power- Graph [14] and tested it in multicore and distributed systems scaling up to 640 cores. The benefits of two-hop histogram compression and sparsification allowed us to compute the global and local 4-profiles of very large graphs. For example, for a graph with 5 million vertices and 40 million edges we estimated the global 4-profile in less than 10 seconds. For computing all local 4-profiles on this graph, the previous state of the art [8] required 1200 seconds while our algorithm required less than 100 seconds. 1.2 Related work The problem of counting triangles in a graph has been addressed in distributed [15] and streaming [1] settings, and this is a standard analytics task for graph engines [16]. The Doulion algorithm [10] estimates a graph's triangle count via simple edge subsampling. Other recent work analyzes more complex sampling schemes [17, 18] and extends to approximately counting certain 4-subgraphs [19, 20]. Mapreduce algorithms for clique counting were introduced by Finocchi et al. [21]. Our approach is similar to that of [9], which calculates all 3-subgraphs and a subset of 4-subgraphs distributedly using edge pivots. In this work we introduce the 2-hop histogram to compute all 4-subgraphs. Concentration inequalities for the number of triangles in a random graph have been studied extensively. The standard method of martingale bounded differences (McDiarmid's inequality) is known to yield weak concentrations around the mean for this problem. The breakthrough work of Kim and Vu [12] provides superior asymptotic bounds by analyzing the concentration of multivariate polynomials. This was later improved and generalized in [22], and applied to subsampled triangle counting in [11]. Our analysis uses a different technique called read-k functions [13] that produces sharper concentration results for practical problem sizes.2 Previous systems of equations relating clique counts to other 4-subgraphs appear in [23], [7], [8], and [24]. However, these are applied in a centralized setting and depend on information collected from nonadjacent vertices. In this work, we use additional equations to solve the same system by sharing only local information over adjacent vertices. The connected 4-subgraphs, or graphlets [4], have found applications in fields such as bioinformatics [25] and computational neuroscience [26]. In [27], authors use all global 4-subgraphs to analyze neuronal networks. We evaluate our algorithm against Orca [8], a centralized 4-graphlet counting algorithm, as well as its GPU implementation [28]. Notice that while Orca calculates only connected 4-subgraphs, our algorithm calculates all the connected and the disconnected 4-subgraphs for each vertex. Concurrent with the writing of this paper, a parallel algorithm for 4-subgraph counting was introduced in [24]. Our algorithm differs by working within GraphLab PowerGraph's Gather-Apply-Scatter framework instead of the native, multithreaded C++ implementation of [24]. In terms of empirical performance, both our work and [24] show similar running time improvements of one order of magnitude over Orca. A more detailed comparison would depend on the hardware and datasets used. More importantly, our work focuses on a distributed (as opposed to multicore parallel) framework, and for our setting minimizing communication is critical. 2Even though concentrations using Kim-Vu become tighter asymptotically, this happens for graphs with well over 1013 edges (see also Figure 6a). 3 F3(v) F4(v) F6(v) F8(v) F9(v) F (cid:48) F (cid:48)(cid:48) F (b) H0(v) H e 1 (v) H d 1 (v) H c 2(v) H e 2 (v) H3(v) (a) Figure 3: Unique (a) 3-subgraphs and (b) 4-subgraphs from the perspective of the white vertex is v. F8 is (cid:48)(cid:48) the only subgraph with a third vertex automorphism F 8 because no other subgraph contains vertices with 3 different degrees. Our theoretical results are significantly different from [24] and may be useful in improving that system also. Specifically, [24] explicitly counts the number of 4-cycles (F7 in Figure 1, Right) whereas our results show that it is possible to use only two-hop histograms instead. This results in less communication overhead, but this benefit is perhaps not as significant for shared-memory multicore platforms. Our second theoretical result, the novel sparsification concentration bounds, can be used for any subgraph estimation algorithm and quantify a provable tradeoff between speed and accuracy. 2 Distributed Algorithm In this section, we describe 4-Prof-Dist, our algorithm for computing the exact 4-profiles in a distributed manner. To the best of our knowledge, this is the first distributed algorithm for calculating 4-profiles. The key insight is to cast existing and novel equations into the GraphLab PowerGraph framework [14] to get implicit connectivity information about vertices outside the 1-hop neighborhood. Specifically, we construct the local 4-profile from local 3-profile, local 4-clique count, and additional histogram information which describes the number of paths to all 2-hop neighbors. Theorem 1. There is a distributed algorithm that computes the exact local 4-profile of a graph given each vertex has stored its local 3-profile, triangle list, and 2-hop histogram. Note that the local 4-profiles at each vertex can be added and appropriately rescaled (using the symmetries of each subgraph, also called automorphism orbits [4]) to obtain the global 4-profile. 4-Prof-Dist is implemented in the Gather-Apply-Scatter (GAS) framework [14]. A distributed algo- rithm in this framework has 3 main phases: Gather, Apply and Scatter. Every vertex and edge has stored data which is acted upon. During the Gather phase, a vertex can access all its adjacent edges and neigh- bors and gather data they possess, e.g., neighbor ID, using a custom reduce operation ⊕ (e.g., addition, concatenation). The accumulated information is available for a vertex at the next phase, Apply, in which it can change its own data. In the final Scatter phase, every edge sees the data of its (incident) vertices and operates on it to modify the edge data. All nodes start each phase simultaneously, and if needed, the whole GAS cycle is repeated until the algorithm's completion. 4-Prof-Dist solves a slightly larger problem of keeping track of counts of 17 unique subgraphs up to vertex automorphism (see Figure 3). We will describe a full rank system of equations which is sufficient to calculate the local 4-profile at every v ∈ V . The following subsections each explain a component of 4-Prof-Dist. These separate routines are combined efficiently in Algorithm 1 to calculate the local 4- profile in a small number of GAS cycles. 4 (cid:80) v a = + a∈Γ(v) nc 2,vane 2,va (cid:48) 4(v) F 2F7(v) Figure 4: Edge pivot equation for vertex v counting triangles as edges va pivot about their common vertex v. The subgraphs F (cid:48) 4(v) and F7(v) differ by one edge. 2.1 Edge pivot equations The majority of our equations relate the local 4-profile to neighboring local 3-profiles with edge pivots [9]. At each vertex v, each combinatorial equation relates a linear combination of the local 4-subgraph counts to the count of a pair of 3-subgraphs sharing an edge va. Some of these equations appear in a centralized setting in previous literature ([23], [7], [8], [24]). In our algorithm, the 3-subgraph pair count accumulates at v as all incident edges va pivot over it. The edges fixed by a specific 3-subgraph pair correspond to common edges among a subset of 4-subgraphs. Before that, in an initial GAS round, each vertex v must gather the ID of each vertex in its neighborhood, i.e. a ∈ Γ(v), and the following quantities must be stored at each edge va during Scatter phase: ne 1,va = Γ(v) ∪ Γ(a) = V − (Γ(v) + Γ(a) − Γ(v) ∩ Γ(a)), nc 2,va = Γ(v)\{Γ(a) ∪ a} = Γ(v) − Γ(v) ∩ Γ(a) − 1, ne 2,va = nc n3,va = Γ(v) ∩ Γ(a). 2,av, (1) (cid:80) Gather: The above quantities are summed at each vertex v to calculate the local 3-profile at v. For example, a n3,va. In addition, we gather the sum of functions of pairs of these quantities forming 13 edge n3,v = 1 2 pivot equations. = F1(v) + F2(v), = 3F (cid:48) 6(v) + F (cid:48) 8(v), = F (cid:48) 9(v) + 3F10(v), 1,va 2 (cid:18)ne (cid:18)nc (cid:18)n3,va 2,va 2 (cid:19) (cid:19) (cid:19) a∈Γ(v) a∈Γ(v) a∈Γ(v) 2 (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) a∈Γ(v) a∈Γ(v) a∈Γ(v) a∈Γ(v) ne 1,vanc 2,va = 2F (cid:48) 3(v) + F (cid:48) 4(v), ne 1,van3,va = 2F5(v) + F (cid:48)(cid:48) 8 (v), nc 2,vane 2,va = F (cid:48) 4(v) + 2F7(v), (2) nc 2,van3,va = 2F (cid:48) 8(v) + 2F (cid:48) 9(v), nd 1,vΓ(v) = F2(v) + F4(v) + F8(v). The primed notation differentiates between subgraphs of different automorphism orbits, as in Figure 3. By accumulating pairs of 3-profile structures as in (2), we receive aggregate connectivity information about vertices more than 1 hop away. Consider the sixth equation as an example. The product between n2,va and 2,va subgraphs along edge va forms 4-node graphs with the following structural constraints: three vertex ne 5 (cid:48) pairs are connected, two vertex pairs are disjoint, and one pair may be either connected or disjoint. F 4(v) and F7(v) satisfy these constraints and differ on the unconstrained edge. Thus, as shown in Figure 4, they both contribute to the sum of nc The following edge pivot equations are linearly independent when solving for the local 4-profile only. 2,vane 2,va. Note the last 2 equations require calculating the local 3-profile: (cid:18)ne (cid:19) 2,va 2 = F6(v) + F8(v), ne 1,vane 2,va = F3(v) + F4(v), ne 2,van3,va = F (cid:48)(cid:48) 8 (v) + 2F9(v), (3) n3,a − n3,va = F8(v) + 2F9(v) + 3F10(v), ne 2,a − nc 2,va = F4(v) + 2F7(v) + F (cid:48)(cid:48) 8 (v) + 2F (cid:48) 9(v). a∈Γ(v) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) a∈Γ(v) a∈Γ(v) a∈Γ(v) a∈Γ(v) (cid:88) (cid:88) a∈Γ(v) a∈Γ(v) Apply: The left hand sides of all such equations are stored at v. 2.2 Clique counting The aim of this subtask is to count 4-cliques that contain the vertex v. For this, we accumulate a list of triangles at each vertex v. Then, at the Scatter stage for every va, it is possible to check if neighbors common to v and a have an edge between them. This implies a 4-clique. Scatter: In addition to the intersection size Γ(v) ∩ Γ(a) at each edge va as before, we now require the intersection list {b : b ∈ Γ(v), b ∈ Γ(a)} as a starting point. Gather, Apply: The intersection list is gathered at each vertex v. This produces all pairs of neighbors in Γ(v) which are adjacent, i.e. all triangles containing v. It is stored as ∆(v) during the Apply stage at v. Gather, Apply: Each edge va computes the number of 4-cliques by counting how many pairs in ∆(a) contain exactly two neighbors of v. We use a similar equation to calculate F8(v) concurrently: (b, c) ∈ ∆(a) : b ∈ Γ(v), c ∈ Γ(v) = 3F10(v), (b, c) ∈ ∆(a) : b /∈ Γ(v), c /∈ Γ(v) = F8(v). (4) At the Apply stage, store the left hand sides as vertex data. 2.3 Histogram 2-hop information Instead of calculating the number of cycles F7(v) directly, we can simply construct another linearly indepen- dent equation and add it to our system. Let each vertex a have a vector of (vertex ID, count) pairs (p, ca[p]) for each of its adjacent vertices p. Initially, ca[p] = 1 and this histogram contains the same information as Γ(a). For any a ∈ Γ(v) and p /∈ Γ(v), ca[p] = 1 ⇔ vap forms a 2-path. Thus, v can collect these vectors to determine the total number of 2-paths from v to p. This lets us calculate a linear combination involving cycle subgraph counts with an equation that is linearly independent from the others in our system. Gather: At each v, take a union of histograms from each neighbor a, resolving duplicate entries with the reduce operation (p, ca1) ⊕ (p, ca2) = (p, ca1 + ca2). Apply: Given the gathered histogram vector {⊕a∈Γ(v) ca[p]}p /∈Γ(v), calculate the number of non-induced 4-cycles involving p and two neighbors:(cid:88) (cid:18) (cid:19) (5) ⊕a∈Γ(v) ca[p] 2 p /∈Γ(v) = F7(v) + F9(v). 6 tion is at most(cid:80) Next, we upper bound savings from our 2-hop histogram by analyzing the improvement when the only information transmitted across the network to a vertex v is each non-neighboring vertex and its final count ⊕a∈Γ(v)c[p]. Let hv = Γ(Γ(v)) \ {Γ(v)∪ v}. For each v, the difference between full and histogram informa- a∈Γ(v)(Γ(a) − 1) − 2hv. The exact benefit of (5) depends on the internal implementation of the reduce operation ⊕ as pairs of neighbors are gathered. 2 (c[p]2 − c[p]), requires counting the second moment of c taken over hv terms. Due to a result by Alon ([29], Proposition 3.7), the memory required to count this value exactly (moreover, to approximate it deterministically) is Ω(hv). Thus, up to implementation details, our memory use is optimal. Counting the number of distinct pairs of 2-paths to each 2-hop neighbor, i.e. 1 2.4 Normalization and symmetry Our final local equation comes from summing the local 4-profile across all 17 automorphisms: 17(cid:88) (cid:18) (cid:19) V − 1 . To calculate the global 4-profile, we utilize global symmetry and scaling equations. Let Fi =(cid:80) v∈V Fi(v). Globally, each subgraph count is in exact proportion with the same subgraph counted from a different vertex automorphism. The ratio depends on the subgraph's degree distribution: Fi(v) = 3 i (6) (cid:48) F3 = 2F 3, F4 = F (cid:48) 8, F (cid:48) (cid:48) 6, 4, F6 = 3F (cid:48) (cid:48)(cid:48) 8 = 2F8, F9 = F 9. F8 = F (7) Global symmetry makes the equation for F8 and the system (3) linearly dependent. We sum across ver- 10] by scaling appropriately: tices, inverting a single 11× 11 system to yield the final global 4-profile [N0, . . . N T N0 = N4 = F0 4 (cid:48) F 4 2 , N1 = , N5 = N8 = F8, N9 = F1 2 F5 3 F9 2 , N2 = , N3 = F (cid:48) 3, F2 4 (cid:48) 6, N7 = F10 4 . , N6 = F , N10 = F7 4 , (8) Algorithm 1 4-Prof-Dist 1: Input: Graph G(V, E) with V vertices, E edges. 2: Gather: For each vertex v union over edges of the 'other' vertex in the edge, ∪a∈Γ(v)a = Γ(v). 3: Apply: Store the gather as vertex data v.nb, size automatically stored. 4: Scatter: For each edge eva, compute and store scalars in (1). 5: Gather: For each edge eva, sum edge scalar data of neighbors in (2) - (3) and combine two-hop his- tograms. 6: Apply: For each vertex v, sum over p /∈ Γ(v) in (5), store other data in array v.u. No Scatter. 7: Gather: For each vertex v collect pairs of connected neighbors in ∆(v). 8: Apply: Store connected neighbor (triangle) list as vertex data v.conn. No Scatter. 9: Gather: For each vertex v sum (4). 10: Apply: Append data to array v.u. Multiply v.u by a matrix to solve system of equations. 11: return [v: v.N0 v.N1 v.N2 ... v.N10] 3 Sparsification and Concentration In this section, we describe the process for approximating the exact number of subgraphs in a graph G. Denote the exact counts by [N0 . . . N10]T and the estimates by [X0 . . . X10]T . 7 We are sparsifying the original graph G by keeping each edge independently with probability p. Denote the random subsampled graph by G and its global 4-profile by [Y0 . . . Y10]T . Clearly each triangle survives with probability p3 and each 4-clique survives with p6. Therefore, in expectation, E[Y10] = p6N10 and X10 = 1 p6 Y10 is unbiased. This simple correspondence does not hold for other subgraphs: each triangle in G can only be a triangle in G that survived edge removals, but other subgraphs of G could be originating from multiple subgraphs of G depending on the random sparsification process. We can, however, relate the original 4-profile vector to the expected subsampled 4-profile vector by a matrix multiplication. Let F (abcd) and F (abcd) represent the induced 4-subgraph on the vertices abcd before and after subsampling, respectively. Then define H by Hij = P( F (abcd) = Fi F (abcd) = Fj). Thus, we form an unbiased estimator, i.e. E[Xi] = Ni, i = 1, . . . , 10, by inverting the edge sampling matrix. For 3-profiles, this process is described by the following system of equations:  = E[Y0] E[Y1] E[Y2] E[Y3] 1 0 0 0 1 − p p 0 0 (1 − p)2 2p(1 − p) p2 0 (1 − p)3 3p(1 − p)2 3p2(1 − p) p3   . n0 n1 n2 n3 (9) For 4-profiles, the vectors are 11 dimensional and a similar linear system can be explicitly computed – we include the equations in the Appendix. This matrix turns out to be invertible and we can therefore calculate the 4-profile exactly if we have access to the expected values of the sparsified 4-profile. Of course, we can only obtain one sample random graph and calculate that 4-profile, which will be an accurate estimate if the 4-profile quantities are sufficiently concentrated around their expectation. 3.1 Graph k-profile concentration Previous work used this idea of graph sparsification for triangle counting [11] and 3-profiles [9]. The main concentration tool used was the Kim and Vu polynomial concentration [12, 11] which unfortunately gives very loose bounds for practical graph sizes. Figure 6a compares the accuracy bound derived in this section to the bound predicted by [12]. Clearly the Kim-Vu concentration does not provide meaningful bounds for the experiments in Section 4.1. However, our results match observed sparsifier accuracy much more closely. Our novel concentration results that exploit the fact that partial derivatives of the desired quantities are sparse in the number of edge variables. This allows us to use a novel information theoretic concentration technique called read-k functions [13]. For simplicity, we only explain the concentration of 4-cliques (F10 subgraphs) here. We establish the general result for all 11 4-profile variables in the Appendix. Our main concentration result is as follows: Theorem 2. Let G be a graph with N10 4-cliques, and let k10 be the maximum number of 4-cliques sharing a common edge. Let X10 be the 4-clique estimate obtained from subsampling each edge with probability 0 < p ≤ 1, choose 0 < δ < 1, and choose RK > 0. If (cid:18) log(2/δ)k10 (cid:19)1/12 , p ≥ RKN10 then N10 − X10 ≤ RKN10 with probability at least 1 − δ. Proof. Our proof relies on read-k function families [13], a recent characterization of dependencies among functions of random variables. See the Appendix for full details. 22 Next, we state conditions under which our method outperforms the Kim and Vu concentration results [12]. Proof can be found in the Appendix: Corollary 1. Let G be a graph with m edges. If p = Ω(1/ log m) and δ = Ω(1/m), then read-k provides better triangle sparsifier accuracy than Kim-Vu. 10 , then read-k provides better 4-clique sparsifier accuracy than Kim-Vu. If additionally k10 ≤ N 5/6 8 We note that the asymptotic condition on p in Corollary 1 includes a constant term much less than 1. This implies our concentration result is superior over all p values of practical interest. While these bounds contain the quantities we wish to estimate, they provide guidelines for the performance of sampling heuristics. We also investigate this in Section 4.1 for some realistic graphs. 4 Experiments Let us now describe the implementation and experimental results of our algorithm. We implement 4- Prof-Dist on GraphLab v2.2 (PowerGraph) [14] and measure its running time and accuracy on large input graphs.3 First, we show that edge sampling yields very good approximation results for global 4-profile counts and achieves substantial execution speedups and network traffic savings when multiple machines are in use. Due to its distributed nature, we can show 4-Prof-Dist runs substantially faster when using multiple CPU cores and/or machines. Notice that multicore and multiple machines can not speed up some centralized algorithms, e.g., Orca [8], which we use as a baseline for our results. Note also that Orca produces only a partial 4-subgraph count, i.e., it calculates only connected 4-subgraphs, while 4-Prof-Dist calculates all 17 per vertex. The systems: We perform the experiments on two systems. The first system is a single powerful server, further referred to as Asterix. The server is equipped with 256 GB of RAM and two Intel Xeon E5-2699 v3 CPUs, 18 cores each. Since each core has two hardware threads, up to 72 logical cores are available to the GraphLab engine. The second system is an EC2 cluster on AWS4. The cluster is comprised of 20 c3.8xlarge machines, each having 60 GB RAM and 32 virtual CPUs. In our experiments we use two real graphs representing different datasets: social networks The data: (LiveJournal: 4,846,609 vertices, 42,851,237 edges) and a WWW graph of Notre Dame (WEB-NOTRE: 325,729 vertices, 1,090,108 edges) [30]. Notice that the above graphs are originally directed, but since our work deals with undirected graphs, all duplicate edges (i.e., bi-directional) were removed and directionality is ignored. (a) (b) Figure 5: LiveJournal graph, Asterix system. All the results are averaged over 10 iterations. (a) – Running time as a function of sampling probability. (b) – Accuracy of the F7 − F10 global counts, measured as ratio of the exact count and the estimated count. 4.1 Results Accuracy: The first result is that our edge sampling approach greatly improves running time while main- taining a very good approximation of the global 4-profile. In Figure 5a we can see that the running time 3Available at http://github.com/eelenberg/4-profiles 4Amazon Web Services - http://aws.amazon.com 9 p=1p=0.9p=0.8p=0.7p=0.6p=0.5p=0.4p=0.3p=0.2p=0.10100200300400500600Runningtime[sec]LiveJournal,Asterixp=0.9p=0.7p=0.4p=0.3p=0.10.900.951.001.051.10Accuracy:exact/approxLiveJournal,Accuracy,4-profilesF10F9F8F7 (a) (b) Figure 6: LiveJournal graph, Asterix system. All the results are averaged over 10 iterations. (a) – Comparison of 4-clique sparsifier concentration bounds with accuracy measured in edge sampling experiments. (b) – Comparison of running times of Orca and our exact 4-Prof-Dist algorithm. Clearly, 4-Prof-Dist benefits from the use of multiple cores. decreases drastically when the sampling probability decreases. At the same time, Figure 5b shows that the mean ratio of true to estimated global 4-profiles is within ±2.5%. Similar to [20], which uses a more complex sampling scheme to count connected 4-subgraphs, this ratio is usually much less than 1%. We show here only profiles F7 − F10 since their counts are the smallest and were observed to have the lowest accuracy. In Figure 6a we compare theoretical concentration bounds on a logarithmic scale and show the benefit of Theorem 2. While the guarantees provided by Kim-Vu [12] bounds are very loose (the additive error is bounded by numbers which are orders of magnitude larger than the true value), the read-k approach is much closer to the measured values. We can see that for large sampling probabilities (p ≥ 0.5), the measured error at most 2 orders of magnitude smaller than the value prediced by Theorem 2. 2-hop histogram: Now we compare two methods of calculating the left hand side of (5) from Section 2.3. We show that a simple implementation in which a vertex gathers its full 2-hop neighborhood (i.e., IDs of its neighbors' neighbors) is much less efficient than the two-hop histogram approach used in 4-Prof-Dist (see Section 2.3). In Figures 7a and 7b we can see that the histogram approach is an order of magnitude faster for various numbers of machines, and that its network requirements are up to 5x less than that of the simple implementation. Moreover, our algorithm could handle much larger graphs while the simple implementation ran out of memory. Running time: Finally, we show that 4-Prof-Dist can run much faster than the current state of the art graphlet counting implementations. The algorithm and the GraphLab platform on which it runs are both distributed in nature. The latter allows 4-Prof-Dist to exploit multiple cores on a single machine as well as a cluster of machines. Figure 6b shows running time as a function of CPU cores. We compare this result to the running time of a single core, C++ implementation of Orca [8]. Our 4-Prof-Dist algorithm becomes faster after only 25 cores and is 2x faster using 60 cores. Moreover, 4-Prof-Dist allows scaling to a large number of machines. In Figure 7c we can see how the running time for the LiveJournal graph decreases when the number of machines increases. Since Orca cannot benefit from multiple machines, we see that 4-Prof-Dist runs up to 12x faster than Orca. This gap widens as the cluster grows larger. In [28], the authors implemented a GPU version of Orca using CUDA. However, the reported speedup is about 2x which is much less than we show here on the AWS cluster (see Figure 7c for p = 1). We also note a substantial running time benefit of the sampling approach for global 4-profiles. In Figures 7c and 7d, we see that with p = 0.1 we can achieve order of magnitude improvements in both speed and network traffic. This sampling probability maintains very good accuracy, as shown in Figure 5b. 10 0.00.20.40.60.81.0Edgesamplingprobability1001031061091012101510181021102410271030Accuracy:exact-approxLiveJournal,SparsifierAccuracyKim-VuRead-k4-cliquesMeasured10cores20cores30cores40cores50cores60cores05001000150020002500Runningtime[sec]Orca:1288secLiveJournal,Asterix (a) (c) (b) (d) Figure 7: AWS cluster of up to 20 machines (nodes). (a,b) – Running time and network usage comparing naive 2-hop implementation and 2-hop histogram approach on the Notre Dame web graph. (c,d) – Running time and network usage of 4-Prof-Dist for various number of compute nodes and sampling probability p, on the LiveJournal graph. All results are averaged over 10 iterations. 5 Conclusions We introduced a novel distributed algorithm for estimating 4-profiles of large graphs. We relied on two theoretical results that can be of independent interest: that 4-profiles can be estimated with limited 2-hop information and that randomly erasing edges gives sharper approximation compared to previous analysis. We showed that our scheme outperforms the previous state of the art and can exploit cloud infrastructure to scale. References [1] L. Becchetti, P. Boldi, C. Castillo, and A. Gionis, "Efficient Semi-Streaming Algorithms for Local Triangle Counting in Massive Graphs," in KDD, 2008. [2] D. O'Callaghan, M. Harrigan, J. Carthy, and P. Cunningham, "Identifying Discriminating Network Motifs in YouTube Spam," Feb. 2012. 11 12nodes14nodes16nodes18nodes20nodes01020304050Runningtime[sec]WEB-NOTRE,AWS2-hop2-hophistogram12nodes14nodes16nodes18nodes20nodes0.00.51.01.52.0Networksent[bytes]×1010WEB-NOTRE,AWS2-hop2-hophistogram8nodes12nodes16nodes20nodes050100150200Runningtime[sec]LiveJournal,AWSp=1p=0.7p=0.4p=0.18nodes12nodes16nodes20nodes0.00.51.01.52.02.53.03.5Networksent[bytes]×1011LiveJournal,AWSp=1p=0.7p=0.4p=0.1 [3] J. Ugander, L. Backstrom, and J. Kleinberg, "Subgraph Frequencies: Mapping the Empirical and Extremal Geography of Large Graph Collections," in WWW, 2013. [4] N. Przulj, "Biological Network Comparison Using Graphlet Degree Distribution," Bioinformatics, vol. 23, no. 2, pp. 177–183, 2007. [5] C. Borgs, J. Chayes, and K. Vesztergombi, "Counting Graph Homomorphisms," Topics in Discrete Mathematics, pp. 315–371, 2006. [6] L. Lovász, Large Networks and Graph Limits. American Mathematical Soc., 2012, vol. 60. [7] V. V. Williams, J. Wang, R. Williams, and H. Yu, "Finding Four-Node Subgraphs in Triangle Time," SODA, pp. 1671–1680, 2014. [8] T. Hočevar and J. Demšar, "A Combinatorial Approach to Graphlet Counting." Bioinformatics, vol. 30, no. 4, pp. 559–65, Feb. 2014. [9] E. R. Elenberg, K. Shanmugam, M. Borokhovich, and A. G. Dimakis, "Beyond Triangles: A Distributed Framework for Estimating 3-profiles of Large Graphs," in KDD, 2015, pp. 229–238. [10] C. E. Tsourakakis, U. Kang, G. L. Miller, and C. Faloutsos, "DOULION: Counting Triangles in Massive Graphs with a Coin," in SIGKDD, 2009. [11] C. E. Tsourakakis, M. Kolountzakis, and G. L. Miller, "Triangle Sparsifiers," Journal of Graph Theory and Applications, vol. 15, no. 6, pp. 703–726, 2011. [12] J. H. Kim and V. H. Vu, "Concentration of Multivariate Polynomials and Its Applications," Combina- torica, vol. 20, no. 3, pp. 417–434, 2000. [13] D. Gavinsky, S. Lovett, M. Saks, and S. Srinivasan, "A Tail Bound for Read-k Families of Functions," Random Structures & Algorithms, vol. 47, no. 1, pp. 99–108, 2015. [14] J. E. Gonzalez, Y. Low, H. Gu, D. Bickson, and C. Guestrin, "PowerGraph: Distributed Graph-Parallel Computation on Natural Graphs," in 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2012, pp. 17–30. [15] T. Schank, "Algorithmic Aspects of Triangle-Based Network Analysis," Ph.D. dissertation, 2007. [16] N. Satish, N. Sundaram, M. A. Patwary, J. Seo, J. Park, M. A. Hassaan, S. Sengupta, Z. Yin, and P. Dubey, "Navigating the Maze of Graph Analytics Frameworks using Massive Graph Datasets," in SIGMOD, 2014, pp. 979–990. [17] C. Seshadhri, A. Pinar, and T. G. Kolda, "Triadic Measures on Graphs: The Power of Wedge Sampling," in Proceedings of the SIAM Conference on Data Mining, 2013, pp. 10–18. [18] T. Eden, A. Levi, D. Ron, and C. Seshadhri, "Approximately Counting Triangles in Sublinear Time," in FOCS, 2015, pp. 614–633. [19] N. K. Ahmed, N. Duffield, J. Neville, and R. Kompella, "Graph Sample and Hold: A Framework for Big-Graph Analytics," in KDD, 2014. [20] M. Jha, C. Seshadhri, and A. Pinar, "Path Sampling: A Fast and Provable Method for Estimating 4-Vertex Subgraph Counts," in WWW, 2015, pp. 495–505. [21] I. Finocchi, M. Finocchi, and E. G. Fusco, "Clique Counting in MapReduce: Algorithms and Experi- ments," ACM Journal of Experimental Algorithmics, vol. 20, no. 1, 2015. [22] S. Janson, K. Oleszkiewicz, and A. Ruciński, "Upper Tails for Subgraph Counts in Random Graphs," Israel Journal of Mathematics, vol. 142, no. 1, pp. 61–92, 2004. [23] M. Kowaluk, A. Lingas, and E.-M. Lundell, "Counting and Detecting Small Subgraphs via Equations," SIAM Journal of Discrete Mathematics, vol. 27, no. 2, pp. 892–909, 2013. 12 [24] N. K. Ahmed, J. Neville, R. A. Rossi, and N. Duffield, "Efficient Graphlet Counting for Large Networks," in IEEE International Conference on Data Mining, 2015. [25] N. Shervashidze, K. Mehlhorn, and T. H. Petri, "Efficient Graphlet Kernels for Large Graph Compari- son," in Proceedings of the 20th International Conference on Artificial Intelligence and Statistics, 2009, pp. 488–495. [26] F. Fei, B. Jie, and D. Zhang, "Frequent and Discriminative Subnetwork Mining for Mild Cognitive Impairment Classification," Brain Connectivity, vol. 4, no. 5, pp. 347–360, Jun. 2014. [27] L. R. Varshney, B. L. Chen, E. Paniagua, D. H. Hall, and D. B. Chklovskii, "Structural Properties of the Caenorhabditis elegans Neuronal Network," PLoS Computational Biology, vol. 7, no. 2, 2011. [28] A. Milinković, S. Milinković, and L. Lazicć, "A Contribution to Acceleration of Graphlet Counting," in Infoteh Jahorina Symposium, vol. 14, no. March, 2015, pp. 741–745. [29] N. Alon, Y. Matias, and M. Szegedy, "The Space Complexity of Approximating the Frequency Moments," in STOC, 1996, pp. 20–29. [30] J. Leskovec and A. Krevl, "SNAP Datasets: Stanford large network dataset collection," http://snap. stanford.edu/data, Jun. 2014. 13 A Appendix A.1 Proof of Theorem 2 Proof. Rather than Lipschitz bounding the value of each partial derivative, as in [12, 11, 9], our main technical tool [13] benefits from the fact that each first partial derivative is sparse in the number of edge variables: Definition 1 (Read-k Families). Let X1, . . . , Xm be independent random variables. For j ∈ [r], let Pj ⊆ [m] and let fj be a Boolean function of {Xi}i∈Pj . Assume that {ji ∈ Pj} ≤ k for every i ∈ [m]. Then the random variables Zj = fj({Xi}i∈Pj ) are called a read-k family. Each variable only affects k of the r Boolean functions. Let G be a graph with N10 4-cliques and a maximum of k10 4-cliques sharing a common edge. The corresponding 4-clique estimator X10 follows this exact structure. Each edge sampling variable appears in at most k10 of the N10 terms. We now state the main result required for our analysis. Note that when applied to estimating the number of 4-cliques, the bound is a function of k10 and N10 independent of the number of edges. Therefore, it is much stronger than arguments involving Lipschitz bounded functions such as McDiarmid's inequality. Proposition 1 (Concentration of Read-k Sums [13]). Let Z1, . . . , Zr be a family of read-k indicator variables with P(Zi = 1) = pi, and let p be the average of p1, . . . , pr. Then for any  > 0, (cid:16) (cid:16) P P i=1 (cid:33) (cid:33) (cid:16) 1−x Zi ≤ (p − )r Zi ≥ (p + )r (cid:32) r(cid:88) (cid:32) r(cid:88) (cid:17) (cid:16) x Let Y10 =(cid:80)(cid:2)(a,b,c,d)∈H10 P(cid:0) ⇒ P (X10 − N10 ≥ RKN10) = P(cid:0) Y10 − p6N10 ≥ RKN10 ≤ 2 exp (cid:1) i=1 y where D(x (cid:107) y) = x log (cid:17) (cid:18) + (1 − x) log tabtbctcdtdatactbd. Then 1−y (cid:19) 22 RKN10 k10 − ≤ 2 exp The claim follows by setting the right hand side less than δ and solving for p. Y10 − p6N10 ≥ p6RKN10 (cid:17) (cid:17) r k r k (cid:16) (cid:16) (cid:17) −22 r (cid:17) −22 r k k , ≤ exp −D(p +  (cid:107) p) ≤ exp ≤ exp −D(p −  (cid:107) p) ≤ exp is the Kullback-Leibler divergence of x and y. (cid:1) (cid:18) − 2p122 RKN10 k10 (cid:19) . A.2 Proof of Corollary 1 Proof. We prove this result for the case of 4-cliques only because the case for triangles is similar. First we must derive a similar 4-clique concentration bound using the techniques in [12, 11]. Lemma 1. Let G be a graph with m edges and N10 cliques, and k10 be the maximum number of 4-cliques sharing a common edge. Let a6 = 86√6!, 0 < p ≤ 1, and KV > 0. Let X10 be the 4-clique estimate obtained from subsampling each edge with probability p. If (cid:110) 6(cid:112)1/N10, 3(cid:112)k10/N10 p (cid:111) ≥ max 6 log12(m5+γ) a2 2 KV , (10) mγ . then N10 − X10 ≤ KV N10 with probability at least 1 − 1 14 Proof. This proof is a straightforward application of the main result in [12], repeated below for completeness. Let α = (α1, α2, . . . , αm) ∈ Zm + and define E≥1[X] = maxα:(cid:107)α(cid:107)1≥1 E(∂αX), where (cid:21) (cid:20) E(∂αX) = E ( ∂ ∂t1 )α1 . . . ( ∂ ∂tm )αm [X(t1, . . . , tm)] . (11) Further, we call a polynomial totally positive if the coefficients of all the monomials involved are non-negative. Proposition 2 (Kim-Vu concentration of multivariate polynomials [12]). Let Y be a random totally positive Boolean polynomial in m Boolean random variables with degree at most k. If E[Y ] ≥ E≥1[Y ], then (cid:18) Y − E[Y ] > ak P (cid:113)E[Y ]E≥1[Y ]λk (cid:19) = O (exp (−λ + (k − 1) log m)) (12) for any λ > 1, where ak = 8kk!1/2. Let Y10 =(cid:80)(cid:2)(a,b,c,d)∈H10 tabtbctcdtdatactbd. Clearly Y10 is totally positive. Let k10,ab, σabc, and νabc be the maximum number of 4-cliques sharing a common edge tab, wedge Λabc, and triangle ∆abc, respectively. Taking repeated partial derivatives, (cid:20) ∂Y10 (cid:20) ∂Y10 ∂tab E ∂tabtbc ∂Y10 (cid:21) (cid:21) (cid:21) (cid:21) (cid:21) E (cid:20) E (cid:20) E (cid:20) E ∂tabtbctac ∂Y10 ∂tabtbctactda ∂Y10 ∂tabtbctcdtdatac = p4, (cid:21) = p3, = p5k10,ab, = p4σabc, E = p3νabc, E (cid:20) (cid:21) (cid:20) ∂Y10 (cid:20) (cid:21) ∂tabtcd ∂Y10 ∂tabtbctcd = p2, = E ∂Y10 (cid:20) ∂tabtbctcdtda = p, E ∂Y10 ∂tabtbctcdtdatactbd (cid:21) = 1. max{1, p3k10}. E≥1 [Y10] ≤ E[Y10] = p6N10 implies Noting that σabc ≤ min{k10,ab, k10,bc} ≤ k10, similarly νabc ≤ k10, and p5 ≤ p4 . . . ≤ 1, we have E≥1 [Y1] ≤ (cid:112)E[Y10]E≥1[Y10]λ6. Applying Proposition 2 to Y10 given (10) p ≥ max{ 6(cid:112)1/N10, 3(cid:112)k10/N10}. Choose KV ≥ 0 and let KV E[Y10] = a6 and (13), the right hand side of (12) is O(exp(−γ log m)) = O(1/mγ). Therefore, the error of the 4-clique estimator X10 is (13) δX10 = 1 p6 δY10 = 1 p6 (KV p6N10) = N10 mγ . with probability greater than 1 − 1 Now we are ready to prove the corollary by comparing Theorem 2 and Lemma 1. Fix p, δ, > 0 and γ > 1 such that p = Ω(1/ log m) and δ = m−γ = Ω(1/m). Now we analyze the bounds KV and RK. For any graph and a6 defined in Lemma 1, We further require k10 ≤ N 5/6 10 . Then the condition on p with (14) implies log(21/γm) ≤ 2 log m, (cid:110) min k10/N 5/6 N10 (cid:19)2/3 (cid:18) k10 10 , (k10/N10)2/3(cid:111) ≤ 1. (14) . 1 6 ≤ 1, a2 γ (5 + γ)12 ≤ 1, p11 ≥ 1/ log11(m) ≥ γ log(21/γm) 2a2 6(5 + γ)12 log12(m) 15 Rearranging terms, 6 log12(m5+γ) max a2 (cid:110) 6(cid:112)1/N10, 3(cid:112)k10/N10 (cid:111) p log(2mγ)k10/N10 2p12 ≥ ⇒ 2 KV ≥ 2 RK. We note that the asymptotic condition p = Ω(1/ log m), includes a constant much smaller than 1. This is due to the looseness of inequalities in (14) and implies that Theorem 2 is superior to Lemma 1 over all p values of practical interest. Implementation details A.3 To improve the practical performance of 4-Prof-Dist (see Algorithm 1 for pseudocode), we handle low and high degree vertices differently. As in GraphLab PowerGraph's standard triangle counting, cuckoo hash tables are used if the vertex degree is above a threshold. Now, we also threshold vertices to determine whether the 2-hop histogram in Section 2.3 will be either a vector or an unordered map. This is because sorting and merging operations on a vector scale poorly with increasing degree size, while an unordered map has constant lookup time. We found that this approach successfully trades off processing time and memory consumption. A.4 Extension to global 4-profile sparsifier Another advantage to read-k function families is that they are simpler to extend to more complex subgraphs. We now state concentration results for the full 4-profile sparsifier evaluated experimentally in Section 4 Using the notation in Section 3, the edge sampling matrix H is defined by the relations  = H  E[Y0] ... E[Y10]  ⇒  N0 ... N10  = H−1  X0 ... X10  ,  Y0 ... Y10 where  H = 1 1 − p (1 − p)2 0 0 0 0 0 0 0 0 0 0 p2 0 0 0 0 0 0 0 0 p 0 0 0 0 0 0 0 0 0 (1 − p)5 2p(1 − p) 2p(1 − p) 3p(1 − p)2 3p(1 − p)2 3p(1 − p)2 4p(1 − p)3 4p(1 − p)3 5p(1 − p)4 (1 − p)3 (1 − p)2 (1 − p)4 (1 − p)3 (1 − p)4 (1 − p)3 (1 − p)6 6p(1 − p)5 p2(1 − p) 2p2(1 − p)2 p2(1 − p)2 2p2(1 − p)3 3p2(1 − p)4 2p2(1 − p) 3p2(1 − p) 3p2(1 − p) 4p2(1 − p)2 5p2(1 − p)2 8p2(1 − p)3 12p2(1 − p)4 4p3(1 − p) 2p3(1 − p) 6p3(1 − p)2 12p3(1 − p)3 p3(1 − p) 2p3(1 − p)2 4p3(1 − p)3 p3(1 − p) 2p3(1 − p)2 4p3(1 − p)3 p4(1 − p) 3p4(1 − p)2 4p4(1 − p) 12p4(1 − p)2 6p5(1 − p) 0 0 0 p2 0 0 0 0 0 0 0 p3 0 0 0 0 0 0 0 0 p3 0 0 0 0 0 p3 0 0 0 0 0 0 0 p4 0 0 0 0 p4 0 0 p5 0 p6  . 16 Let t = p−1 p . Then the inverse sampling matrix is given by  1 0 0 0 0 0 0 0 0 0 0 H−1 = t 1 p 0 0 0 0 0 0 0 0 0 t2 2t p 1 p2 0 0 0 0 0 0 0 0 t2 2t p 0 1 p2 0 0 0 0 0 0 0 t3 3t2 p t p2 2t p2 1 p3 0 0 0 0 0 0 t3 3t2 p 0 3t p2 0 1 p3 0 0 0 0 0 t3 3t2 p 0 3t p2 0 0 1 p3 0 0 0 0 t4 4t3 p 2t2 p2 4t2 p2 4t p3 0 0 1 p4 0 0 0 t4 4t3 p t2 p2 5t2 p2 2t p3 t p3 t p3 0 1 p4 0 0 t5 5t4 p 2t3 p2 8t3 p2 6t2 p3 2t2 p3 2t2 p3 t p4 4t p4 1 p5 0  . t6 6t5 p 3t4 p2 12t4 p2 12t3 p3 4t3 p3 4t3 p3 3t2 p4 12t2 p4 6t p5 1 p6 (15) The binomial coefficients in these matrices influence our concentration bounds, which we now state: 2N10 , p ≥ 2(N9 + 6N10) Theorem 3 (4-profile sparsifier estimators). Consider the sampling process described above and in Section 3. Let Xi, 0 ≤ i ≤ 10 (and X be a vector of these estimates), be the actual estimates of 4-profiles. Let ki be the maximum number of subgraphs Fi sharing a common edge. Let Yi, 0 ≤ i ≤ 10, be the 4 profile counts of the sparsified graph. Then let Ni, 0 ≤ i ≤ 10, be the actual counts. Choose 0 < δ < 1 and  > 0. Let (cid:19)1/8 C = (192)2/2. If (cid:19)1/12 (cid:19)1/10 (cid:18) C log(2/δ)(k8 + 4k9 + 12k10) (cid:19)1/6 2(N8 + 4N9 + 12N10) (cid:18) C log(2/δ)(k6 + k8 + 2k9 + 4k10) (cid:18) C log(2/δ)k10 (cid:18) C log(2/δ)(k9 + 6k10) (cid:19)1/8 (cid:18) C log(2/δ)(k7 + k9 + 3k10) (cid:18) C log(2/δ)(k5 + k8 + 2k9 + 4k10) (cid:18) C log(2/δ)(k3 + 2k4 + 3k5 + 3k6 + 4k7 + 5k8 + 8k9 + 12k10) (cid:18) C log(2/δ)(k2 + k4 + 2k7 + k8 + 2k9 + 3k10) (cid:18) C log(2/δ)(k1 + 2k2 + 2k3 + 3k4 + 3k5 + 3k6 + 4k7 + 4k8 + 5k9 + 6k10) (cid:18) 2(N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10) 2(N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10) 2(N6 + N8 + 2N9 + 4N10) (cid:18) C log(2/δ)(k4 + 4k7 + 2k8 + 6k9 + 12k10) (cid:19)1/4 2(N4 + 4N7 + 2N8 + 6N9 + 12N10) 2(N2 + N4 + 2N7 + N8 + 2N9 + 3N10) p ≥ p ≥ p ≥ p ≥ p ≥ 2(N5 + N8 + 2N9 + 4N10) 2(N7 + N9 + 3N10) p ≥ (cid:19)1/6 (cid:19)1/2 (cid:19)1/6 (cid:19)1/4 , p ≥ , p ≥ (cid:19) , p ≥ n0 ≤ V 2 C log(2/δ) V 2 − then (cid:107)δX(cid:107)∞ ≤ (cid:0)V 4 , 2 (cid:1) with probability at least 1 − δ. Proof. We apply Proposition 1 a total of 11 times to the sampling-estimator system defined above by H and H−1. In our context, each sampled subgraph count Yi is a sum of functions in a read-kYi family, where kYi ≤ min{V − 2, Ni}. Let ki,e be the maximum number of subgraphs Fi sharing a common edge e, and 17 let ki = maxe ki,e, for i = 0, . . . , 10. The Yi's have the following parameters: (cid:18) (cid:19) V 4 rY0 = , kY0 = V rY1 = N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10 kY1 = k1 + 2k2 + 2k3 + 3k4 + 3k5 + 3k6 + 4k7 + 4k8 + 5k9 + 6k10 rY2 = N2 + N4 + 2N7 + N8 + 2N9 + 3N10 kY2 = k2 + k4 + 2k7 + k8 + 2k9 + 3k10 rY3 = N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10 kY3 = k3 + 2k4 + 3k5 + 3k6 + 4k7 + 5k8 + 8k9 + 12k10 rY4 = N4 + 4N7 + 2N8 + 6N9 + 12N10, rY5 = N5 + N8 + 2N9 + 4N10, rY6 = N6 + N8 + 2N9 + 4N10, rY7 = N7 + N9 + 3N10, rY8 = N8 + 4N9 + 12N10, rY9 = N9 + 6N10, rY10 = N10, kY5 = k5 + k8 + 2k9 + 4k10 kY6 = k6 + k8 + 2k9 + 4k10 kY8 = k8 + 4k9 + 12k10 kY7 = k7 + k9 + 3k10 kY9 = k9 + 6k10 kY10 = k10 kY4 = k4 + 4k7 + 2k8 + 6k9 + 12k10 (16) We show the application of Proposition 1 for Y7 through Y9 because Y10 was shown in the proof of (cid:18) (cid:18) (cid:18) (cid:18) (cid:18) (cid:18) − − − P(cid:0) Theorem 2 and the other cases are similar: P(cid:0) Y7 − (p4N7 + p4(1 − p)N9 + 3p4(1 − p)2N10) ≥ p4(N7 + N9 + 3N10)(cid:1) Y8 − (p4N8 + 4p4(1 − p)N9 + 12p4(1 − p)2N10) ≥ p4(N8 + 4N9 + 12N10)(cid:1) P(cid:0) Y9 − (p5N9 + 6p5(1 − p)N10) ≥ (N9 + 6N10)(cid:1) (cid:19) (cid:18) ⇒ P (cid:1) (cid:1) p ≥ Rearranging to solve for p, we have (cid:18) log(2/δ)k10 (cid:18) log(2/δ)(k5 + k7 + 2k9 + 4k10) 22N10 p ≥ p ≥ , 22(N5 + N8 + 2N9 + 4N10) p ≥ 2p122N10 k10 22N10 k10 − − ≤ 2 exp ≤ 2 exp ≤ 2 exp 1 P(cid:0) p5 Y9 − (N9 + 6(1 − p)N10) ≥ (N9 + 6N10) ⇒ P (X10 − N10 ≥ N10) = P(cid:0) Y10 − p6N10 ≥ N10 Y3 − p6N10 ≥ p6N10 (cid:18) log(2/δ)(k8 + 4k9 + 12k10) (cid:18) log(2/δ)(k9 + 6k10) (cid:19)1/10 (cid:19)1/12 (cid:18) log(2/δ)(k6 + k7 + 2k9 + 4k10) (cid:18) log(2/δ)(k7 + k9 + 3k10) (cid:19)1/8 (cid:18) log(2/δ)(k4 + 4k7 + 2k8 + 6k9 + 12k10) (cid:19)1/6 (cid:18) log(2/δ)(k3 + 2k4 + 3k5 + 3k6 + 4k7 + 5k8 + 8k9 + 12k10) (cid:18) log(2/δ)(k2 + k4 + 2k7 + k8 + 2k9 + 3k10) (cid:18) log(2/δ)(k1 + 2k2 + 2k3 + 3k4 + 3k5 + 3k6 + 4k7 + 4k8 + 5k9 + 6k10) 22(N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10) 22(N2 + N4 + 2N7 + N8 + 2N9 + 3N10) 22(N4 + 4N7 + 2N8 + 6N9 + 12N10) 22(N6 + N8 + 2N9 + 4N10) 22(N8 + 4N9 + 12N10) 22(N7 + N9 + 3N10) 22(N9 + 6N10) p ≥ p ≥ p ≥ p ≥ p ≥ , , , (cid:19) (cid:19) (cid:19)1/8 (cid:19)1/6 (cid:19)1/6 (cid:19)1/4 (cid:19)1/4 (cid:19)1/2 (17) (cid:19) (cid:19) ≤ 2 exp ≤ 2 exp ≤ 2 exp 2p82(N7 + N9 + 3N10) k7 + k9 + 3k10 − 2p82(N8 + 4N9 + 12N10) (cid:19) k8 + 4k9 + 12k10 22(N9 + 6N10) k9 + 6k10 2p102(N9 + 6N10) (cid:19) k9 + 6k10 p ≥ 22(N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10) 18 The final condition comes from the result for Y0: log(2/δ)V 2 n0 ≤ V 4 − 22 (cid:18) ≤ V 2 V 2 − log(2/δ) 22 (cid:19) (18) Plugging into our estimators (given by H−1), we get the following error bounds: δX0 ≤ (n1 + n2 + n3) + (n1 + 2n2 + 3n3 + n2 + 3n3 + n3) ≤ (2n1 + 4n2 + 8n3) ≤ 8 V 3 δX1 ≤ (N1 + 2N2 + 2N3 + 3N4 + 3N5 + 3N6 + 4N7 + 4N8 + 5N9 + 6N10) + 2(N2 + N4 + 2N7 + N8 + 2N9 + 3N10) + 2(N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10) + 3(N4 + 4N7 + 2N8 + 6N9 + 12N10) + 3(N5 + N8 + 2N9 + 4N10) + 3(N6 + N8 + 2N9 + 4N10) + 4(N7 + N9 + 3N10) + 4(N8 + 4N9 + 12N10) + 5(N9 + 6N10) + 6(N10) δX2 ≤ (N2 + N4 + 2N7 + N8 + 2N9 + 3N10) + (N4 + 4N7 + 2N8 + 6N9 + 12N10) + 2(N7 + N9 + 3N10) + (N8 + 4N9 + 12N10) + 2(N9 + 6N10) + 3(N10) ≤ (N1 + . . . + 192N10) ≤ 192 ≤ (N2 + . . . + 48N10) ≤ 48 δX3 ≤ (N3 + 2N4 + 3N5 + 3N6 + 4N7 + 5N8 + 8N9 + 12N10) + 2(N4 + 4N7 + 2N8 + 6N9 + 12N10) + 3(N5 + N8 + 2N9 + 4N10) + 3(N6 + N8 + 2N9 + 4N10) + 4(N7 + N9 + 3N10) + 5(N8 + 4N9 + 12N10) + 8(N9 + 6N10) + 12(N10) ≤ (N3 + 4N4 + 6N5 + . . . + 192N10) ≤ 192 (cid:18) (cid:19) V 4 δX4 ≤ (N4 + 4N7 + 2N8 + 6N9 + 12N10) + 4(N7 + N9 + 3N10) + 2(N8 + 4N9 + 12N10) + 6(N9 + 6N10) + 12(N10) δX5 ≤ (N5 + N8 + 2N9 + 4N10) + (N8 + 4N9 + 12N10) + 2(N9 + 6N10) + 4(N10) ≤ (N4 + . . . + 96N10) ≤ 96 ≤ (N5 + . . . + 32N10) ≤ 32 δX6 ≤ (N6 + N8 + 2N9 + 4N10) + (N8 + 4N9 + 12N10) + 2(N9 + 6N10) + 4(N10) ≤ (N6 + . . . + 32N10) ≤ 32 δX7 ≤ (N7 + N9 + 3N10) + (N9 + 6N10) + 3(N10) ≤ (N7 + 2N9 + 12N10) ≤ 12 δX8 ≤ (N8 + 4N9 + 12N10) + 4(N9 + 6N10) + 12(N10) ≤ (N8 + 8N9 + 48N10) ≤ 48 δX9 ≤ (N9 + 6N10) + 6(N10) V 4 ≤ (N9 + 12N10) ≤ 12 (cid:18) (cid:19) (cid:18) (cid:18) (cid:19) (cid:19) (cid:18) (cid:19) V 4 (cid:19) (cid:18) V 4 V 4 V 4 V 4 (cid:18) (cid:18) (cid:18) (cid:18) (cid:18) (cid:19) (cid:19) (cid:19) (cid:19) (cid:19) V 4 V 4 δX10 ≤ N10. Thus the maximum deviation in any estimator is less than 192(cid:0)V (cid:1). Substituting 2 = 2/(192)2 = 2/2C 4 completes the proof. 19
1904.11930
1
1904
2019-04-26T16:57:52
Spectral partitioning of time-varying networks with unobserved edges
[ "cs.SI", "eess.SY", "physics.soc-ph", "stat.ML" ]
We discuss a variant of `blind' community detection, in which we aim to partition an unobserved network from the observation of a (dynamical) graph signal defined on the network. We consider a scenario where our observed graph signals are obtained by filtering white noise input, and the underlying network is different for every observation. In this fashion, the filtered graph signals can be interpreted as defined on a time-varying network. We model each of the underlying network realizations as generated by an independent draw from a latent stochastic blockmodel (SBM). To infer the partition of the latent SBM, we propose a simple spectral algorithm for which we provide a theoretical analysis and establish consistency guarantees for the recovery. We illustrate our results using numerical experiments on synthetic and real data, highlighting the efficacy of our approach.
cs.SI
cs
SPECTRAL PARTITIONING OF TIME-VARYING NETWORKS WITH UNOBSERVED EDGES Michael T. Schauba, Santiago Segarrab, Hoi-To Waic aInst. for Data, Systems and Society, MIT & Department of Engineering Science, University of Oxford bDepartment of Electrical and Computer Engineering, Rice University cDepartment of SEEM, The Chinese University of Hong Kong, NT, Hong Kong. 9 1 0 2 r p A 6 2 ] I S . s c [ 1 v 0 3 9 1 1 . 4 0 9 1 : v i X r a ABSTRACT We discuss a variant of 'blind' community detection, in which we aim to partition an unobserved network from the observation of a (dynamical) graph signal defined on the network. We consider a scenario where our observed graph signals are obtained by filtering white noise input, and the underlying network is different for every observation. In this fashion, the filtered graph signals can be inter- preted as defined on a time-varying network. We model each of the underlying network realizations as generated by an independent draw from a latent stochastic blockmodel (SBM). To infer the partition of the latent SBM, we propose a simple spectral algorithm for which we provide a theoretical analysis and establish consistency guarantees for the recovery. We illustrate our results using numerical experiments on synthetic and real data, highlighting the efficacy of our approach. Index Terms -- graph signal processing, topology inference, stochastic blockmodel, community detection, spectral methods 1. INTRODUCTION Graph-based tools have become prevalent for the analysis of a range of different systems across the sciences [1 -- 3]. However, while in many applications we abstract the system under investigation as a network of coupled entities, the underlying couplings are often not known. Network inference, the problem of determining the interaction topology of a networked system based on a set of nodal observables, has thus gained significant interest over the last years [4 -- 6]. A number of notions for network inference have featured in the literature, ranging from estimating 'functional' couplings based on statistical association measures such as correlation or mutual information [7], all the way to causal inference [8]. The notion of inference most pertinent to our discussion is what may be called 'topological' inference: given a system of dynamical units, we want to infer their direct physical interactions. For example, we would like to infer the adjacency matrix of the network that a distributed system is defined on. This problem has received wide interest in the literature recently, using techniques from optimization, spectral analysis, and statistics [9 -- 18]. However, in many situations the goal of inferring the exact network of couplings may be unfeasible for various reasons. First, we may not have access to a sufficiently large number of samples to fully identify the network. Second, the network structure itself may be subject to fluctuations over time. Finally, we may be able to observe only some relevant parts of the system. Authors listed in alphabetical order. MTS received funding from the European Unions Horizon 2020 research and innovation programme under the Marie Sklodowska-Curie grant agreement No 702410. HTW received funding from NSF CCF-BSF 1714672. The funders had no role in the de- sign of this study; the results presented here reflect solely the authors views. Emails: [email protected], [email protected], [email protected] The described challenges need not be fundamental roadblocks since in a number of cases our ultimate target is not to obtain the exact network structure. Rather, our goal is to extract certain mesoscopic features of the network such as important nodes, motifs, or levels of assortativity. A typical scenario in these lines is the inference of modular structure within the network, i.e., the partitioning of the net- work into a few blocks, or communities of 'similar' nodes according to certain criteria (see [19 -- 21] for a review on a variety of different approaches). In this context, the so-called stochastic blockmodel and its related variants [21] have become a major tool for solving this problem from a statistical perspective. By assuming that the observed network data has been created according to a prescribed generative model, the problem of detecting modular structure is transformed into an estimation problem in which we aim to infer the latent parameters of the model, based on the observed network. Inspired by our recent work on blind community detection [22 -- 24], in this paper we ask the following question [24]: Can we infer the latent partition of a stochastic blockmodel based solely on the observation of a set of nodal signals on the graph without ever observing the underlying graph itself? Contributions and outline We present a fresh look on the network inference problem by advocating an inference approach based on a latent generative model of the network, rather than trying to infer the exact network in terms of its adjacency matrix. As we show, this model-based inference procedure that requires only the knowledge of a set of sampled nodal observations can yield surprisingly good results, that are competitive with spectral clustering in which the full network is observed. We complement the presentation of our blind identification algorithm with a theoretical analysis, in which we we show the statistical consistency of our approach using concentration inequalities and recent results from random matrix theory. In the remainder of this article, we first discuss our problem setup and associated preliminaries in Section 2. Section 3 describes our main theoretical results, which underpin our partition inference scheme. Section 4 provides numerical illustrations of our results both using synthetic and real-world data. We conclude with a brief discussion and an outlook on future directions in Section 5. 2. PROBLEM FORMULATION Graphs, graph signals, and graph filters. An undirected graph G consists of a set N of n := N nodes, and a set E of ne := E edges, corresponding to unordered pairs of elements in N . By identifying the node set N with the natural numbers 1, . . . , n, such a graph can be compactly encoded by the symmetric adjacency matrix A, such that Aij = Aji = 1 for all (i, j) ∈ E, and Aij = 0 otherwise. Given a graph with adjacency matrix A, the (combinatorial) graph Laplacian is defined as L := D − A, where D = diag(A1) is the diagonal matrix containing the degrees of each node. We denote the spectral decomposition of the Laplacian by L = V ΛV (cid:62). It is well known that the Laplacian matrix is positive semi-definite [25]. In this paper, we consider filtered signals defined on the graph as described next. A graph signal is a vector y ∈ Rn that associates to each node in the graph a scalar-valued observable. A graph filter H of order T is a linear map between graph signals that can be expressed as a matrix polynomial in L of degree T T(cid:88) k=0 H(L) = hkLk. (1) polynomial h(λ) = (cid:80)T Associated with each graph filter, we define the (scalar) generating k=0 hkλk. In this work we are concerned with filtered graph signals that can be expressed as y = H(L)w, (2) where w is an excitation signal corresponding to the 'initial condi- tion'. We assume that it is zero-mean and white, i.e., E[ww(cid:62)] = I, and its entries are bounded almost surely. Combined with a set of appropriately chosen filter-coefficients, the above signal model can account for a range of interesting sig- nal transformations and dynamics. This includes consensus dynam- ics [26], random walks and diffusion [27], as well as more compli- cated dynamics that can be mediated via interactions commensurate with the graph topology described by the Laplacian [28]. Stochastic blockmodel. The stochastic blockmodel (SBM) is a la- tent variable model that defines a probability measure over the set of unweighted networks of fixed size n. In an SBM, the network is assumed to be divided into k groups of nodes. Each node i in the network is endowed with one latent group label gi ∈ {1, . . . , k}. Conditioned on these latent class labels, each link Aij of the adja- cency matrix A ∈ {0, 1}n×n is a Bernoulli random variable that takes value 1 with probability Ωgi,gj and value 0 otherwise: Aijgi, gj ∼ Ber(Ωgi,gj ). (3) To compactly describe the model, we collect all the link proba- bilities between the different groups in the symmetric affinity matrix Ω = [Ωij] ∈ [0, 1]k×k. Furthermore we define the partition indicator matrix G ∈ {0, 1}n×k with entries Gij = 1 if node i belongs to group j and Gij = 0 otherwise. Based on these definitions, we can write the expected adjacency matrix under the SBM as E[AG] = GΩG (cid:62) . (4) Algorithm 1 Spectral partitioning of time-varying networks. 1: Input: filtered graph signals {y((cid:96))}m 2: Compute the sampled covariance matrix as (cid:96)=1; number of groups k. y := (1/m)(cid:80)m (cid:98)Cm y as (cid:98)Cm (cid:96)=1(y((cid:96)))(y((cid:96)))(cid:62) 3: Evaluate the EVD of (cid:98)Cm y = (cid:98)V (cid:98)Λ(cid:98)V (cid:62). 4: Apply k-means on the row vectors of the matrix (cid:98)Vk ∈ Rn×k, whose columns are the top-k eigenvectors in (cid:98)Cm 5: Output: a partition N = C1 ∪ ...∪Ck with Ci ∩Cj = ∅ if i (cid:54)= j. y . (6) To motivate this setup, consider the example of observing fMRI signals of m different patients in resting state [29]. While for sim- ilar patients the overall large-scale structure of each patient's brain network will be similar (the same SBM parameters), the individual details of these networks will be different (each network is a particular realization of the SBM). Moreover, we do not observe the network itself but only node-measurements (y((cid:96))), which will generally corre- spond to different, unknown independent initial conditions (w((cid:96))). As a second example, we may think of measuring some node activities such as the expression of opinions at m different, sufficiently sepa- rated instances of time in some form of social network. Assuming a reasonable stable social fabric, the large scale features of the latent (unobserved) network should be relatively stable, while the individual active links in each observation instance may be different. 3. ALGORITHM AND THEORETICAL ANALYSIS sample covariance (cid:98)Cm on the leading eigenvectors of (cid:98)Cm Algorithm 1 describes a simple spectral method to solve Problem 1. In a nutshell, given the observations {y((cid:96))}m (cid:96)=1, we compute their y as in (6) and then apply k-means clustering y . For simplicity, we assume here that the number of groups k of the SBM is known. However, k could be estimated as well from the spectral properties of the covariance matrix, e.g., by estimating its effective rank. To theoretically assess the performance of the proposed method, we present an analysis in three steps. First, we characterize the rate of convergence of the sample covariance to the true covariance Cy (cf. Proposition 1). Second, we determine the structure of the limiting matrix Cy (cf. Proposition 2). Finally, we show that the eigenstructure of Cy contains all the information needed to solve Problem 1 (cf. Proposition 3). Recall the definition of the covariance matrix Cy := E[y((cid:96))(y((cid:96))) (cid:62) ], (7) Observation model and network model inference. We observe a nodal signal y((cid:96)) on a network at m instances. For each instance, we obtain a sample of the form where the expected value is taken over both sources of randomness, i.e., the excitation signal w((cid:96)) as well as the Laplacian L((cid:96)) of the realized graph. Based on this, the following result can be shown. y((cid:96)) = H(L((cid:96)))w((cid:96)), (cid:96) = 1, . . . , m. (5) Proposition 1 Assume that the following conditions hold: For every (cid:96), we assume that the Laplacian L((cid:96)) is computed from the adjacency matrix of an independently drawn SBM network with a constant parameter matrix Ω. Moreover, the initial conditions w((cid:96)) are i.i.d. with zero mean and E[w((cid:96))(w((cid:96)))(cid:62)] = I. Our goal is now to solve the following problem. Problem 1 Consider the observation model described by Equa- tion (5). Based solely on the m observations (y(1), . . . , y(m)), infer the group structure of the latent SBM generating L((cid:96)). (a) The spectral norm of the graph filter is uniformly bounded, i.e., (cid:107)H(L((cid:96)))(cid:107)2 ≤ ¯h for all (cid:96). √ (b) The excitation signal satisfies (cid:107)w((cid:96))(cid:107)2 ≤ c and (E[(cid:107)w((cid:96))(cid:107)q 2])1/q ≤ W0 < ∞ for some q ≥ 4. n almost surely, Then, for any m ≥ n ≥ 4, with probability at least 1 − δ, one has (cid:13)(cid:13)(cid:98)Cm y − Cy (cid:13)(cid:13)2 ≤ c0 (log log n)2(cid:16) n (cid:17) 1 2 − 2 q , (8) m where the constant c0 depends on q, ¯h, δ, and W0. Proof. Observe that the following bound (cid:107)y((cid:96))(cid:107)2 = (cid:107)H(L((cid:96)))w((cid:96))(cid:107)2 ≤ (cid:107)H(L((cid:96)))(cid:107)2(cid:107)w((cid:96))(cid:107)2, combined with condition (a) implies that (cid:107)y((cid:96))(cid:107)2 ≤ ¯h(cid:107)w((cid:96))(cid:107)2 . (9) To show that (cid:98)Cm from (9) that y converges to its expected value, first we observe (cid:107)y((cid:96))(cid:107)2 ≤ c¯h (10) n for some c almost surely. Second, consider any u √ n a.s. , √ if (cid:107)w((cid:96))(cid:107)2 ≤ c such that (cid:107)u(cid:107)2 = 1, we have (cid:104)y((cid:96)), u(cid:105) ≤ (cid:107)y((cid:96))(cid:107)2(cid:107)u(cid:107)2 ≤ ¯h(cid:107)w((cid:96))(cid:107)2 . Applying (11), for any q ≥ 1, one has (cid:0)E[(cid:104)y((cid:96)), u(cid:105)q](cid:1)1/q ≤ ¯h(E[(cid:107)w((cid:96))(cid:107)q 2])1/q ≤ ¯hW0 . (11) (12) where G ∈ {0, 1}n×2 is the partition indicator matrix as defined 2 − 2)p4 + 2p5 + before (4), and the constants ci are given by c1 = ( n 2 − 1)p2 + n 2 − 1)p8 + 2p7, and c3 = p1 + ( n 2 p6, c2 = 2( n 2 p3. n (cid:17)2(cid:105) Proof. Consider first the diagonal entries of Cy, we have that (cid:105) (cid:62) [Cy]ii = E[h i ww Hijwj (cid:62) j H 2 ijw2 HijwjHikwi hi] = E(cid:104)(cid:16)(cid:88) (cid:88) (cid:88) j + j,k = E(cid:104)(cid:88) (cid:88) j = E[H 2 ij]E[w2 j ] + E[HijHik]E[wj]E[wi] j j,k Using the fact that E[w2 j ] = 1 and E[wj] = 0, it follows that [Cy]ii = E[H 2 E[H 2 ij] + E[H 2 ij] (14) (cid:88) j∼i − 1 (cid:17) ii] + (cid:16) n 2 (cid:88) j(cid:54)∼i p2 + n 2 p3 = c3. From (10) and (12), the two conditions in [30, Eq. (2.2)] hold. Invok- (cid:4) ing [30, Theorem 6.1] shows the desired result in (8). = p1 + i 1 The conditions required by the proposition are mild. For instance, condition (a) holds for graph filters that are low-pass [22]. Indeed, in such a case we have that (cid:107)H(L((cid:96)))(cid:107)2 ≤ h(0), where h(·) is the generating polynomial of the filter H(·). Condition (b) holds with for q ≥ 4 when the excitation signal is bounded, e.g., w((cid:96)) is i.i.d. and distributed with U[−b, b], b < ∞. The proposition shows that the sampled covariance converges to the true covariance at a rate O(1/m in the case of bounded excitation signals, where q can be made arbitrarily large. q ). In particular, the convergence rate is O((cid:112)1/m) 2 − 2 Notice that Proposition 1 concerns general covariance matrices and does not use the fact that L((cid:96)) is the Laplacian of a graph drawn from an SBM. In order to derive results about the recovery of the latent communities, we will have to put this assumption into place. For simplicity, we consider in the theoretical considerations that follow a simple planted partition model of size n, in which only two equally sized communities of size n/2 exist [21]. Nonetheless, the arguments that follow can be extended to general SBMs. In our planted partition model, the probability of an edge between two nodes within the same community is governed by the parameter a whereas the probability of a link between two nodes of different communities is described by parameter b. Given two nodes i and j, the expression i ∼ j denotes that both nodes lie in the same block of the SBM, whereas i (cid:54)∼ j indicates the contrary. Moreover, for simplicity we denote by H = H(L((cid:96))) the (random) matrix representing the filter of interest. We use the following parameters to denote the expected entries of H: p1 := E[H 2 p3 := E[H 2 p5 := E[HiiHji] for i ∼ j, p7 := E[HiiHji] for i (cid:54)∼ j, Based on the introduced notation, we characterize the covariance p2 := E[H 2 p4 := E[HilHjl] for i ∼ j ∼ l, p6 := E[HilHjl] for i ∼ j (cid:54)∼ l, p8 := E[HilHjl] for i (cid:54)∼ j. ii] for all i, ij] for i (cid:54)∼ j, ij] for i ∼ j, structure of our observed output signals. Proposition 2 The covariance Cy defined in (7) is given by Cy = (c3 − c1)I + G (cid:62) , G (13) (cid:18)c1 c2 (cid:19) c2 c1 Next, we consider an off-diagonal entry in Cy within a block of the SBM, i.e., for i ∼ j but i (cid:54)= j we have that [Cy]ij = E[h (cid:62) i ww (cid:62) = E(cid:104)(cid:88) (a) (cid:105) HilwlHjkwk hj] = E(cid:104)(cid:88) (cid:105) (b) (cid:88) l,k HilHjlw2 l = E[HilHjl], l l where (a) follows from E[wlwk] = 0 whenever l (cid:54)= k, and (b) used that E[w2 l ] = 1. From the above it then follows that [Cy]ij = 2E[HiiHji] + E[HilHjl] + E[HilHjl] (cid:88) ll(cid:54)∼i (cid:88) (cid:16) n 2 (cid:17) ll∼i,j(cid:54)=l(cid:54)=i n 2 p4 + − 2 = 2p5 + p6 = c1. (15) Finally, considering i and j in different blocks, we can similarly show that [Cy]ij = c2. By combining this result with (14) and (15), (cid:4) expression (13) readily follows. An important consequence of Proposition 2 is the resulting spec- tral decomposition of Cy and how this eigenstructure relates to the planted (true) communities in the underlying SBM. The following proposition combines the results from Propositions 1 and 2 and justi- fies (asymptotically) the performance of Algorithm 1 in recovering the true communities. Proposition 3 Assume that the conditions in Proposition 1 hold, and that c1 > c2, as defined in Proposition 2. Then, for a large enough number of observations m, Algorithm 1 is guaranteed to recover the two communities of the equisized planted partition model. Proof. Direct computation from expression (13) reveals that the vector of all ones 1 is an eigenvector of Cy with associated eigen- 2 (c1 + c2) + (c3 − c1). Similarly, the signed bi- value µ1 := n nary vector ±1 := G[1,−1](cid:62) whose sign indicates membership to each community is also an eigenvector of Cy but with eigenvalue 2 (c1 − c2) + (c3 − c1). Every other eigenvector is associated µ2 := n with the eigenvalue µ := c3 − c1. Given that Algorithm 1 keeps the y , it follows from the concentration result in Proposition 1 that whenever µ1 > µ and µ2 > µ, the eigenvectors selected by our algorithm will be arbitrarily close to 1 and ±1 for top-2 eigenvectors of (cid:98)Cm e t a R r o r r E 10−1 10−2 10−3 10−4 γ = 0.1 γ = 0.3 γ = 0.5 γ = 0.7 γ = 0.9 SC (γ = 0.1) 101 102 103 104 105 Sample size m Fig. 1: Error rate of partition recovery using Algorithm 1 against sample size for synthetic time varying graphs with various structural parameters γ (see text). large enough m, thus leading to perfect recovery. Hence, we need c1 + c2 > 0 and c1 − c2 > 0, from where c1 > c2 follows. (cid:4) The constants c1 and c2 depend on the parameters p4 through p8, which in turn depend on the filter specification h(·) and the probabilities a and b in the considered SBM. Whenever a = b, it can be shown that c1 = c2, thus preventing the recovery of the planted true communities, as expected. Given a generic filter for which c1 > c2 if a (cid:54)= b, however, even a minimal difference between a and b will result asymptotically in a perfect recovery. This is in contrast with the detectability limit that holds for the SBM recovery problem with an observed network, where the partitions cannot be recovered if a is too close to b [21]. The reason behind the improved resolution here is that in our problem each sample y((cid:96)) corresponds to an (indirect) observations of a different graph drawn from the same SBM, allowing us to detect communities for large enough samples m even in the most adverse scenarios. When inferring an SBM from a single network observation, one cannot (indirectly) leverage such additional graph samples, resulting in a detectability limit [21]. 4. NUMERICAL EXPERIMENTS Synthetic data. We first examine the claims made in the paper using synthetic data. We draw graphs from an SBM with n = 100 nodes and k = 2 communities, with Ωgi,gj = 4 log n/n if gi = gj, and Ωgi,gj = 4γ log n/n otherwise, parametrized by γ ∈ (0, 1). Note that the smaller γ is, the easier it is to detect the communities. Throughout the section, the input signal is i.i.d. and set as w((cid:96)) ∼ U[−1, 1]n. The graph filter considered is H(L) = (I − αL((cid:96)))5 where α = 1/(4 + 4γ) log n ensures that (cid:107)H(L((cid:96)))(cid:107) < 1 for all (cid:96). In Fig. 1 we simulate the error rate of the partition inference over different settings of γ, against the sample size m using our proposed method. We found that the error rate decays to zero asymptotically as m → ∞ regardless of the connectivity probability parameter γ. Moreover, the error rate is markedly better compared to the applica- tion of standard spectral clustering (SC) on a single instance of the graph Laplacian. Note that this holds even if the graph considered for SC is taken from an SBM with γ = 0.1, in line with our discussion at the end of Section 3. United States Senate data. We apply the proposed method to roll- call data (available at https://voteview.com) taken from the 110th to 114th congress of the US Senate (corresponding to years 2007 to 2017) consisting of m = 2998 rollcalls. Using this data we focus on inferring partitions of a network in which the nodes repre- sent the n = 50 states of USA. To convert the data into real-valued (a) k = 2. Data from 2007-2017. (b) k = 4. Data from 2007-2017. (c) k = 2. Data from 2015-2017. (d) k = 4. Data from 2015-2017. Fig. 2: Partitioning of the US Senate's states network for different number of communities k and observation periods (see text). graph signals that agree with our time varying topology model, the (cid:96)th rollcall data is mapped into a sample graph signal y(cid:96) ∈ R50 as i ∈ [−1, 1] follows. For each state i ∈ {1, ..., 50}, we compute y(cid:96) as the average vote value from the two senators of each state, where the vote value counts a 'Yay' as 1, an absentee or an abstain as 0, and a 'Nay' as −1. Note that with the framework of our model, we assume that the community a state belongs to remains invariant since the economic/political situation of the state varies slowly in general, even though senators maybe elected in/out during different periods. Fig. 2 shows the partitions of the states at different resolution (k = 2, 4) based on the rollcall data from the combined periods of 2007-2017 (Fig. 2a,b) and from the latest period 2015-2017 (Fig. 2c,d), respectively. At a resolution of k = 2, the partition result corroborates the common belief about the division between 'Republican' (red, e.g., Texas & Arizona) and 'Democrat' (blue, e.g., California & Massachusetts) states, with the 2015-2017 data reflecting recent changes in the elected senators for states such as Maine and New Hampshire. We also remark that for k = 4, the partitioning result using 2015-2017 data is less conclusive as it changes substantially when we sample a small batch of rollcall data. Such instability is not observed in the 2007-2017 data at the same resolution, where the partition identifies some of the 'swing' states such as Michigan and Louisiana. 5. DISCUSSION Network inference is often a critical step to perform any kind of network analysis. In certain cases, however, we are only interested in extracting some coarser features of the network, e.g., in the form of communities [22 -- 24, 31]. As we have shown in this manuscript, if we have access to a set of independent samples from a filtered signal defined on the nodes of the network, this task can be achieved even in the absence of any information about the edges. As we have discussed for the system studied here, if the underlying network is time-varying but its latent structure remains stationary, we may even obtain a better partition recovery performance when compared to observing a single full snapshot of the actual network. Characterizing this trade-off and the sample complexity of the corresponding problems in more detail, as well as enlarging the class of latent models and considered graph filters are interesting avenues for future work. [18] Georgios B Giannakis, Yanning Shen, and Georgios Vasileios Karanikolas, "Topology identification and learning over graphs: Accounting for nonlinearities and dynamics," Proceedings of the IEEE, vol. 106, no. 5, pp. 787 -- 807, 2018. [19] Santo Fortunato and Darko Hric, "Community detection in networks: A user guide," Physics Reports, vol. 659, pp. 1 -- 44, 2016. [20] Michael T Schaub, Jean-Charles Delvenne, Martin Rosvall, and Renaud Lambiotte, "The many facets of community detection in complex networks," Applied Network Science, vol. 2, no. 1, pp. 4, 2017. [21] Emmanuel Abbe, "Community detection and stochastic block models: Recent developments," Journal of Machine Learning Research, vol. 18, no. 177, pp. 1 -- 86, 2018. [22] Hoi-To Wai, Santiago Segarra, Asuman E Ozdaglar, Anna Scaglione, and Ali Jadbabaie, "Community detection from low-rank excitations of a graph filter," in 2018 IEEE Interna- tional Conference on Acoustics, Speech and Signal Processing (ICASSP). IEEE, 2018, pp. 4044 -- 4048. [23] Hoi-To Wai, Santiago Segarra, Asuman E Ozdaglar, Anna Scaglione, and Ali Jadbabaie, "Blind community detection from low-rank excitations of a graph filter," arXiv preprint arXiv:1809.01485, 2018. [24] Michael T. Schaub, Santiago Segarra, and John Tsitsiklis, "Blind identification of stochastic block models from dynamical observations," in preparation, 2018. [25] Russell Merris, "Laplacian matrices of graphs: a survey," Linear algebra and its applications, vol. 197, pp. 143 -- 176, 1994. [26] Reza Olfati-Saber, J Alex Fax, and Richard M Murray, "Con- sensus and cooperation in networked multi-agent systems," Pro- ceedings of the IEEE, vol. 95, no. 1, pp. 215 -- 233, 2007. [27] Naoki Masuda, Mason A Porter, and Renaud Lambiotte, "Ran- dom walks and diffusion on networks," Physics Reports, 2017. [28] Santiago Segarra, Antonio G Marques, and Alejandro Ribeiro, "Optimal graph-filter design and applications to distributed lin- ear network operators," IEEE Transactions on Signal Process- ing, vol. 65, no. 15, pp. 4117 -- 4131, Aug 2017. [29] Jessica S Damoiseaux, Serge A Rombouts, Frederik Barkhof, Philip Scheltens, Cornelis J Stam, Stephen M Smith, and Chris- tian F Beckmann, "Consistent resting-state networks across healthy subjects," Proceedings of the national academy of sciences, vol. 103, no. 37, pp. 13848 -- 13853, 2006. [30] Roman Vershynin, "How close is the sample covariance ma- trix to the actual covariance matrix?," Journal of Theoretical Probability, vol. 25, no. 3, pp. 655 -- 686, 2012. [31] Till Hoffmann, Leto Peel, Renaud Lambiotte, and Nick S Jones, "Community detection in networks with unobserved edges," arXiv preprint arXiv:1808.06079, 2018. 6. REFERENCES [1] Steven H. Strogatz, "Exploring complex networks," Nature, vol. 410, no. 6825, pp. 268 -- 276, Mar. 2001. [2] Mark E. J. Newman, Networks: An Introduction, Oxford University Press, USA, Mar. 2010. [3] Matthew O Jackson, Social and economic networks, Princeton university press, 2010. [4] Marc Timme and Jose Casadiego, "Revealing networks from dy- namics: an introduction," Journal of Physics A: Mathematical and Theoretical, vol. 47, no. 34, pp. 343001, 2014. [5] Patrik D'haeseleer, Shoudan Liang, and Roland Somogyi, "Ge- netic network inference: from co-expression clustering to re- verse engineering," Bioinformatics, vol. 16, no. 8, pp. 707 -- 726, 2000. [6] Ivan Brugere, Brian Gallagher, and Tanya Y Berger-Wolf, "Net- work structure inference, a survey: Motivations, methods, and applications," ACM Computing Surveys (CSUR), vol. 51, no. 2, pp. 24, 2018. [7] Jonathan Friedman and Eric J Alm, "Inferring correlation net- works from genomic survey data," PLoS computational biology, vol. 8, no. 9, pp. e1002687, 2012. [8] Judea Pearl, "Causal inference in statistics: An overview," Statistics surveys, vol. 3, pp. 96 -- 146, 2009. [9] Agung Julius, Michael Zavlanos, Stephen Boyd, and George J Pappas, "Genetic network identification using convex program- ming," IET systems biology, vol. 3, no. 3, pp. 155 -- 166, 2009. [10] Emmanuel J Candes, Michael B Wakin, and Stephen P Boyd, "Enhancing sparsity by reweighted l1 minimization," Journal of Fourier analysis and applications, vol. 14, no. 5-6, pp. 877 -- 905, 2008. [11] Shahin Shahrampour and Victor M Preciado, "Topology iden- tification of directed dynamical networks via power spectral analysis," IEEE Transactions on Automatic Control, vol. 60, no. 8, pp. 2261, 2015. [12] Donatello Materassi and Murti V Salapaka, "On the problem of reconstructing an unknown topology via locality properties of the wiener filter," IEEE transactions on automatic control, vol. 57, no. 7, pp. 1765 -- 1777, 2012. [13] David Hayden, Young Hwan Chang, Jorge Goncalves, and Claire J Tomlin, "Sparse network identifiability via compressed sensing," Automatica, vol. 68, pp. 9 -- 17, 2016. [14] Ye Yuan, Guy-Bart Stan, Sean Warnick, and Jorge Goncalves, "Robust dynamical network structure reconstruction," Automat- ica, vol. 47, no. 6, pp. 1230 -- 1235, 2011. [15] Hoi-To Wai, Anna Scaglione, and Amir Leshem, "Active sens- ing of social networks," IEEE Transactions on Signal and In- formation Processing over Networks, vol. 2, no. 3, pp. 406 -- 419, 2016. [16] Alexandre Mauroy and Julien Hendrickx, "Spectral identifica- tion of networks using sparse measurements," SIAM Journal on Applied Dynamical Systems, vol. 16, no. 1, pp. 479 -- 513, 2017. [17] Santiago Segarra, Antonio G Marques, Gonzalo Mateos, and Alejandro Ribeiro, "Network topology inference from spec- tral templates," IEEE Transactions on Signal and Information Processing over Networks, vol. 3, no. 3, pp. 467 -- 483, 2017.
1911.05485
5
1911
2019-12-29T22:33:56
Diffusion Improves Graph Learning
[ "cs.SI", "cs.AI", "cs.LG", "stat.ML" ]
Graph convolution is the core of most Graph Neural Networks (GNNs) and usually approximated by message passing between direct (one-hop) neighbors. In this work, we remove the restriction of using only the direct neighbors by introducing a powerful, yet spatially localized graph convolution: Graph diffusion convolution (GDC). GDC leverages generalized graph diffusion, examples of which are the heat kernel and personalized PageRank. It alleviates the problem of noisy and often arbitrarily defined edges in real graphs. We show that GDC is closely related to spectral-based models and thus combines the strengths of both spatial (message passing) and spectral methods. We demonstrate that replacing message passing with graph diffusion convolution consistently leads to significant performance improvements across a wide range of models on both supervised and unsupervised tasks and a variety of datasets. Furthermore, GDC is not limited to GNNs but can trivially be combined with any graph-based model or algorithm (e.g. spectral clustering) without requiring any changes to the latter or affecting its computational complexity. Our implementation is available online.
cs.SI
cs
Diffusion Improves Graph Learning Johannes Klicpera, Stefan Weissenberger, Stephan Günnemann Technical University of Munich {klicpera,stefan.weissenberger,guennemann}@in.tum.de 9 1 0 2 c e D 9 2 ] I S . s c [ 5 v 5 8 4 5 0 . 1 1 9 1 : v i X r a Abstract Graph convolution is the core of most Graph Neural Networks (GNNs) and usually approximated by message passing between direct (one-hop) neighbors. In this work, we remove the restriction of using only the direct neighbors by introducing a powerful, yet spatially localized graph convolution: Graph diffusion convolution (GDC). GDC leverages generalized graph diffusion, examples of which are the heat kernel and personalized PageRank. It alleviates the problem of noisy and often arbitrarily defined edges in real graphs. We show that GDC is closely related to spectral-based models and thus combines the strengths of both spatial (message passing) and spectral methods. We demonstrate that replacing message passing with graph diffusion convolution consistently leads to significant performance improvements across a wide range of models on both supervised and unsupervised tasks and a variety of datasets. Furthermore, GDC is not limited to GNNs but can trivially be combined with any graph-based model or algorithm (e.g. spectral clustering) without requiring any changes to the latter or affecting its computational complexity. Our implementation is available online. 1 1 Introduction When people started using graphs for evaluating chess tournaments in the middle of the 19th century they only considered each player's direct opponents, i.e. their first-hop neighbors. Only later was the analysis extended to recursively consider higher-order relationships via A2, A3, etc. and finally generalized to consider all exponents at once, using the adjacency matrix's dominant eigenvector [38, 75]. The field of Graph Neural Networks (GNNs) is currently in a similar state. Graph Convolutional Networks (GCNs) [32], also referred to as Message Passing Neural Networks (MPNNs) [23] are the prevalent approach in this field but they only pass messages between neighboring nodes in each layer. These messages are then aggregated at each node to form the embedding for the next layer. While MPNNs do leverage higher-order neighborhoods in deeper layers, limiting each layer's messages to one-hop neighbors seems arbitrary. Edges in real graphs are often noisy or defined using an arbitrary threshold [70], so we can clearly improve upon this approach. Since MPNNs only use the immediate neigborhod information, they are often referred to as spatial methods. On the other hand, spectral-based models do not just rely on first-hop neighbors and capture more complex graph properties [16]. However, while being theoretically more elegant, these methods are routinely outperformed by MPNNs on graph-related tasks [32, 74, 81] and do not generalize to previously unseen graphs. This shows that message passing is a powerful framework worth extending upon. To reconcile these two separate approaches and combine their strengths we propose a novel technique of performing message passing inspired by spectral methods: Graph diffusion convolution (GDC). Instead of aggregating information only from the first-hop neighbors, GDC aggregates information from a larger neighborhood. This neighborhood is constructed via a new graph generated by sparsifying a generalized form of graph diffusion. We show how graph diffusion 1https://www.daml.in.tum.de/gdc 33rd Conference on Neural Information Processing Systems (NeurIPS 2019), Vancouver, Canada. is expressed as an equivalent polynomial filter and how GDC is closely related to spectral-based models while addressing their shortcomings. GDC is spatially localized, scalable, can be combined with message passing, and generalizes to unseen graphs. Furthermore, since GDC generates a new sparse graph it is not limited to MPNNs and can trivially be combined with any existing graph-based model or algorithm in a plug-and-play manner, i.e. without requiring changing the model or affecting its computational complexity. We show that GDC consistently improves performance across a wide range of models on both supervised and unsupervised tasks and various homophilic datasets. In summary, this paper's core contributions are: 1. Proposing graph diffusion convolution (GDC), a more powerful and general, yet spatially localized alternative to message passing that uses a sparsified generalized form of graph diffusion. GDC is not limited to GNNs and can be combined with any graph-based model or algorithm. 2. Analyzing the spectral properties of GDC and graph diffusion. We show how graph diffusion is expressed as an equivalent polynomial filter and analyze GDC's effect on the graph spectrum. 3. Comparing and evaluating several specific variants of GDC and demonstrating its wide applicabil- ity to supervised and unsupervised learning on graphs. 2 Generalized graph diffusion We consider an undirected graph G = (V,E) with node set V and edge set E. We denote with N = V the number of nodes and A ∈ RN×N the adjacency matrix. We define generalized graph diffusion via the diffusion matrix ∞(cid:88) k=0 S = θkT k, (1) and require that(cid:80)∞ D is the diagonal matrix of node degrees, i.e. Dii =(cid:80)N with the weighting coefficients θk, and the generalized transition matrix T . The choice of θk and T k must at least ensure that Eq. 1 converges. In this work we will consider somewhat stricter conditions k=0 θk = 1, θk ∈ [0, 1], and that the eigenvalues of T are bounded by λi ∈ [0, 1], which together are sufficient to guarantee convergence. Note that regular graph diffusion commonly requires T to be column- or row-stochastic. Transition matrix. Examples for T in an undirected graph include the random walk transition matrix Trw = AD−1 and the symmetric transition matrix Tsym = D−1/2AD−1/2, where the degree matrix j=1 Aij. Note that in our definition Trw is column-stochastic. We furthermore adjust the random walk by adding (weighted) self-loops to the original adjacency matrix, i.e. use Tsym = (wloopIN + D)−1/2(wloopIN + A)(wloopIN + D)−1/2, with the self-loop weight wloop ∈ R+. This is equivalent to performing a lazy random walk with a probability of staying at node i of pstay,i = wloop/Di. Special cases. Two popular examples of graph diffusion are personalized PageRank (PPR) [57] and k = α(1 − α)k, with teleport the heat kernel [36]. PPR corresponds to choosing T = Trw and θPPR probability α ∈ (0, 1) [14]. The heat kernel uses T = Trw and θHK k! , with the diffusion time t [14]. Another special case of generalized graph diffusion is the approximated graph convolution introduced by Kipf & Welling [32], which translates to θ1 = 1 and θk = 0 for k (cid:54)= 1 and uses T = Tsym with wloop = 1. Weighting coefficients. We compute the series defined by Eq. 1 either in closed-form, if possible, or by restricting the sum to a finite number K. Both the coefficients defined by PPR and the heat kernel give a closed-form solution for this series that we found to perform well for the tasks considered. Note that we are not restricted to using Trw and can use any generalized transition matrix along with the coefficients θPPR and the series still converges. We can furthermore choose θk by repurposing the graph-specific coefficients obtained by methods that optimize coefficients analogous to θk as part of their training process. We investigated this approach using label propagation [8, 13] and node embedding models [1]. However, we found that the simple coefficients defined by PPR or the heat kernel perform better than those learned by these models (see Fig. 7 in Sec. 6). k = e−t tk or θHK k k 2 . . . . . . . . . Graph diffusion Density defines edges Sparsify edges New graph Figure 1: Illustration of graph diffusion convolution (GDC). We transform a graph A via graph diffusion and sparsification into a new graph S and run the given model on this graph instead. 3 Graph diffusion convolution Essentially, graph diffusion convolution (GDC) exchanges the normal adjacency matrix A with a sparsified version S of the generalized graph diffusion matrix S, as illustrated by Fig. 1. This matrix defines a weighted and directed graph, and the model we aim to augment is applied to this graph instead. We found that the calculated edge weights are beneficial for the tasks considered. However, we even found that GDC works when ignoring the weights after sparsification. This enables us to use GDC with models that only support unweighted edges such as the degree-corrected stochastic block model (DCSBM). If required, we make the graph undirected by using ( S + ST )/2, e.g. for spectral clustering. With these adjustments GDC is applicable to any graph-based model or algorithm. Intuition. The general intuition behind GDC is that graph diffusion smooths out the neighborhood over the graph, acting as a kind of denoising filter similar to Gaussian filters on images. This helps with graph learning since both features and edges in real graphs are often noisy. Previous works also highlighted the effectiveness of graph denoising. Berberidis & Giannakis [7] showed that PPR is able to reconstruct the underlying probability matrix of a sampled stochastic block model (SBM) graph. Kloumann et al. [35] and Ragain [64] showed that PPR is optimal in recovering the SBM and DCSBM clusters in the space of landing probabilities under the mean field assumption. Li et al. [40] generalized this result by analyzing the convergence of landing probabilities to their mean field values. These results confirm the intuition that graph diffusion-based smoothing indeed recovers meaningful neighborhoods from noisy graphs. Sparsification. Most graph diffusions result in a dense matrix S. This happens even if we do not sum to k = ∞ in Eq. 1 due to the "four/six degrees of separation" in real-world graphs [5]. However, the values in S represent the influence between all pairs of nodes, which typically are highly localized [54]. This is a major advantage over spectral-based models since the spectral domain does not provide any notion of locality. Spatial localization allows us to simply truncate small values of S and recover sparsity, resulting in the matrix S. In this work we consider two options for sparsification: 1. top-k: Use the k entries with the highest mass per column, 2. Threshold : Set entries below  to zero. Sparsification would still require calculating a dense matrix S during preprocessing. However, many popular graph diffusions can be approximated efficiently and accurately in linear time and space. Most importantly, there are fast approximations for both PPR [3, 77] and the heat kernel [34], with which GDC achieves a linear runtime O(N ). Furthermore, top-k truncation generates a regular graph, which is amenable to batching methods and solves problems related to widely varying node degrees [15]. Empirically, we even found that sparsification slightly improves prediction accuracy (see Fig. 5 in Sec. 6). After sparsification we calculate the (symmetric or random walk) transition matrix on the resulting graph via T S Limitations. GDC is based on the assumption of homophily, i.e. "birds of a feather flock together" [49]. Many methods share this assumption and most common datasets adhere to this principle. However, this is an often overlooked limitation and it seems non-straightforward to overcome. One way of extending GDC to heterophily, i.e. "opposites attract", might be negative edge weights −1/2 SD S . sym = D −1/2 S 3 [17, 44]. Furthermore, we suspect that GDC does not perform well in settings with more complex edges (e.g. knowledge graphs) or graph reconstruction tasks such as link prediction. Preliminary experiments showed that GDC indeed does not improve link prediction performance. 4 Spectral analysis of GDC Even though GDC is a spatial-based method it can also be interpreted as a graph convolution and analyzed in the graph spectral domain. In this section we show how generalized graph diffusion is expressed as an equivalent polynomial filter and vice versa. Additionally, we perform a spectral analysis of GDC, which highlights the tight connection between GDC and spectral-based models. Spectral graph theory. To employ the tools of spectral theory to graphs we exchange the regular Laplace operator with either the unnormalized Laplacian Lun = D− A, the random-walk normalized Lrw = IN − Trw, or the symmetric normalized graph Laplacian Lsym = IN − Tsym [76]. The Laplacian's eigendecomposition is L = U ΛU T , where both U and Λ are real-valued. The graph Fourier transform of a vector x is then defined via x = U T x and its inverse as x = U x. Using this we define a graph convolution on G as x ∗G y = U ((U T x) (cid:12) (U T y)), where (cid:12) denotes the Hadamard product. Hence, a filter gξ with parameters ξ acts on x as gξ(L)x = U Gξ(Λ)U T x, where Gξ(Λ) = diag(gξ,1(Λ), . . . , gξ,N (Λ)). A common choice for gξ in the literature is a polynomial filter of order J, since it is localized and has a limited number of parameters [16, 27]:  J(cid:88)  U T . gξ(L) = ξjLj = U ξjΛj j=0 j=0 (2) J(cid:88) J(cid:88) j=0 (−t)j j! Graph diffusion as a polynomial filter. Comparing Eq. 1 with Eq. 2 shows the close relationship between polynomial filters and generalized graph diffusion since we only need to exchange L by T to go from one to the other. To make this relationship more specific and find a direct correspondence between GDC with θk and a polynomial filter with parameters ξj we need to find parameters that solve ξjLj != θkT k. (3) K(cid:88) k=0 (cid:18)j (cid:19) J(cid:88) k j=k (cid:19)j (cid:18) 1 − 1 α To find these parameters we choose the Laplacian corresponding to L = In − T , resulting in (see App. A) ξj = (−1)jθk, θk = (−1)kξj, (4) (cid:18)k (cid:19) K(cid:88) j k=j which shows the direct correspondence between graph diffusion and spectral methods. Note that we need to set J = K. Solving Eq. 4 for the coefficients corresponding to the heat kernel θHK and PPR k θPPR k leads to ξHK j = , ξPPR j = , (5) j showing how the heat kernel and PPR are expressed as polynomial filters. Note that PPR's cor- responding polynomial filter converges only if α > 0.5. This is caused by changing the order of summation when deriving ξPPR , which results in an alternating series. However, if the series does converge it gives the exact same transformation as the equivalent graph diffusion. Spectral properties of GDC. We will now extend the discussion to all parts of GDC and analyze how they transform the graph Laplacian's eigenvalues. GDC consists of four steps: 1. Calculate the transition matrix T , 2. take the sum in Eq. 1 to obtain S, 3. sparsify the resulting matrix by truncating small values, resulting in S, and 4. calculate the transition matrix T S. 1. Transition matrix. Calculating the transition matrix T only changes which Laplacian matrix we use for analyzing the graph's spectrum, i.e. we use Lsym or Lrw instead of Lun. Adding self-loops to obtain T does not preserve the eigenvectors and its effect therefore cannot be calculated precisely. Wu et al. [78] empirically found that adding self-loops shrinks the graph's eigenvalues. 4 PPR (α) 0.05 0.15 Heat (t) 3 5 1.0 λ 0.5 20 15 10 5 A λ / S λ 0 0.0 0.5 1.5 2.0 1.0 λA 0.0 0 λ λ;  = 10−3 ∆λ;  = 10−3 ∆λ;  = 10−4 S λ / S T λ 1.00 0.75 0.50 0.25 0.00  = 10−3  = 10−4 1000 Index 2000 0.0 0.5 λS 1.0 (a) Graph diffusion as a filter, PPR with α and heat kernel with t. Both act as low-pass filters. (b) Sparsification with threshold  of PPR (α = 0.1) on CORA. Eigenval- ues are almost unchanged. (c) Transition matrix on CORA's sparsified graph S. This acts as a weak high-pass filter. Figure 2: Influence of different parts of GDC on the Laplacian's eigenvalues λ. ∞(cid:88) k=0 2. Sum over T k. Summation does not affect the eigenvectors of the original matrix, since T kvi = λiT k−1vi = λk i vi, for the eigenvector vi of T with associated eigenvalue λi. This also shows that the eigenvalues are transformed as λi = θkλk i . (6) expression for PPR, i.e. λi = α(cid:80)∞ exponential series, resulting in λi = e−t(cid:80)∞ Since the eigenvalues of T are bounded by 1 we can use the geometric series to derive a closed-form k=0(1 − α)kλk . For the heat kernel we use the i = i = et(λi−1). How this transformation affects tk k! λk the corresponding Laplacian's eigenvalues is illustrated in Fig. 2a. Both PPR and the heat kernel act as low-pass filters. Low eigenvalues corresponding to large-scale structure in the graph (e.g. clusters [55]) are amplified, while high eigenvalues corresponding to fine details but also noise are suppressed. 3. Sparsification. Sparsification changes both the eigenvalues and the eigenvectors, which means that there is no direct correspondence between the eigenvalues of S and S and we cannot analyze its effect analytically. However, we can use eigenvalue perturbation theory (Stewart & Sun [69], Corollary 4.13) to derive the upper bound k=0 α 1−(1−α)λi (cid:118)(cid:117)(cid:117)(cid:116) N(cid:88) (λi − λi)2 ≤ EF ≤ NEmax ≤ N , (7) i=1 √ with the perturbation matrix E = S − S and the threshold . This bound significantly overestimates the perturbation since PPR and the heat kernel both exhibit strong localization on real-world graphs and hence the change in eigenvalues empirically does not scale with N (or, rather, N). By ordering the eigenvalues we see that, empirically, the typical thresholds for sparsification have almost no effect on the eigenvalues, as shown in Fig. 2b and in the close-up in Fig. 11 in App. B.2. We find that the small changes caused by sparsification mostly affect the highest and lowest eigenvalues. The former correspond to very large clusters and long-range interactions, which are undesired for local graph smoothing. The latter correspond to spurious oscillations, which are not helpful for graph learning either and most likely affected because of the abrupt cutoff at . 4. Transition matrix on S. As a final step we calculate the transition matrix on the resulting graph S. This step does not just change which Laplacian we consider since we have already switched to using the transition matrix in step 1. It furthermore does not preserve the eigenvectors and is thus again best investigated empirically by ordering the eigenvalues. Fig. 2c shows that, empirically, this step slightly dampens low eigenvalues. This may seem counterproductive. However, the main purpose of using the transition matrix is ensuring that sparsification does not cause nodes to be treated differently by losing a different number of adjacent edges. The filtering is only a side-effect. Limitations of spectral-based models. While there are tight connections between GDC and spectral- based models, GDC is actually spatial-based and therefore does not share their limitations. Similar to polynomial filters, GDC does not compute an expensive eigenvalue decomposition, preserves locality on the graph and is not limited to a single graph after training, i.e. typically the same coefficients θk 5 can be used across graphs. The choice of coefficients θk depends on the type of graph at hand and does not change significantly between similar graphs. Moreover, the hyperparameters α of PPR and t of the heat kernel usually fall within a narrow range that is rather insensitive to both the graph and model (see Fig. 8 in Sec. 6). 5 Related work Graph diffusion and random walks have been extensively studied in classical graph learning [13, 14, 36, 37], especially for clustering [34], semi-supervised classification [12, 22], and recommendation systems [44]. For an overview of existing methods see Masuda et al. [46] and Fouss et al. [22]. The first models similar in structure to current Graph Neural Networks (GNNs) were proposed by Sperduti & Starita [68] and Baskin et al. [6], and the name GNN first appeared in [24, 65]. However, they only became widely adopted in recent years, when they started to outperform classical models in many graph-related tasks [19, 33, 42, 82]. In general, GNNs are classified into spectral-based models [11, 16, 28, 32, 41], which are based on the eigendecomposition of the graph Laplacian, and spatial- based methods [23, 26, 43, 52, 56, 62, 74], which use the graph directly and form new representations by aggregating the representations of a node and its neighbors. However, this distinction is often rather blurry and many models can not be clearly attributed to one type or the other. Deep learning also inspired a variety of unsupervised node embedding methods. Most models use random walks to learn node embeddings in a similar fashion as word2vec [51] [25, 61] and have been shown to implicitly perform a matrix factorization [63]. Other unsupervised models learn Gaussian distributions instead of vectors [10], use an auto-encoder [31], or train an encoder by maximizing the mutual information between local and global embeddings [73]. There have been some isolated efforts of using extended neighborhoods for aggregation in GNNs and graph diffusion for node embeddings. PPNP [33] propagates the node predictions generated by a neural network using personalized PageRank, DCNN [4] extends node features by concatenating features aggregated using the transition matrices of k-hop random walks, GraphHeat [79] uses the heat kernel and PAN [45] the transition matrix of maximal entropy random walks to aggregate over nodes in each layer, PinSage [82] uses random walks for neighborhood aggregation, and MixHop [2] concatenates embeddings aggregated using the transition matrices of k-hop random walks before each layer. VERSE [71] learns node embeddings by minimizing KL-divergence from the PPR matrix to a low-rank approximation. Attention walk [1] uses a similar loss to jointly optimize the node embeddings and diffusion coefficients θk. None of these works considered sparsification, generalized graph diffusion, spectral properties, or using preprocessing to generalize across models. 6 Experimental results Experimental setup. We take extensive measures to prevent any kind of bias in our results. We optimize the hyperparameters of all models on all datasets with both the unmodified graph and all GDC variants separately using a combination of grid and random search on the validation set. Each result is averaged across 100 data splits and random initializations for supervised tasks and 20 random initializations for unsupervised tasks, as suggested by Klicpera et al. [33] and Shchur et al. [67]. We report performance on a test set that was used exactly once. We report all results as averages with 95 % confidence intervals calculated via bootstrapping. We use the symmetric transition matrix with self-loops Tsym = (IN +D)−1/2(IN +A)(IN +D)−1/2 for GDC and the column-stochastic transition matrix T S on S. We present two simple and effective choices for the coefficients θk: The heat kernel and PPR. The diffusion matrix S is sparsified using either an -threshold or top-k. Datasets and models. We evaluate GDC on six datasets: The citation graphs CITESEER [66], CORA [48], and PUBMED [53], the co-author graph COAUTHOR CS [67], and the co-purchase graphs AMAZON COMPUTERS and AMAZON PHOTO [47, 67]. We only use their largest connected components. We show how GDC impacts the performance of 9 models: Graph Convolutional Network (GCN) [32], Graph Attention Network (GAT) [74], jumping knowledge network (JK) [80], Graph Isomorphism Network (GIN) [81], and ARMA [9] are supervised models. The degree- corrected stochastic block model (DCSBM) [30], spectral clustering (using Lsym) [55], DeepWalk rw = SD−1 S 6 CORA None Heat PPR 75 72 69 66 63 60 CITESEER PUBMED 80 76 72 GCN JK GAT GIN COAUTHOR CS ARMA GCN JK GAT GIN AMZ COMP ARMA GCN JK GAT GIN AMZ PHOTO ARMA 80 60 90 75 60 ) % ( y c a r u c c A 84 81 78 75 72 ) % ( y c a r u c c A 92 90 oom GIN JK 40 GCN GAT ARMA Figure 3: Node classification accuracy of GNNs with and without GDC. GDC consistently improves accuracy across models and datasets. It is able to fix models whose accuracy otherwise breaks down. ARMA ARMA GCN GCN GAT GIN GAT JK GIN JK CORA CITESEER ) % ( y c a r u c c A 60 45 30 ) % ( y c a r u c c A 60 45 30 DCSBM Spectral DeepWalk COAUTHOR CS None Heat PPR DGI 60 45 30 60 45 30 DCSBM Spectral DeepWalk AMZ COMP DGI PUBMED DCSBM Spectral DeepWalk AMZ PHOTO DGI 70 60 50 40 75 60 45 30 DCSBM Spectral DeepWalk DGI DCSBM Spectral DeepWalk DGI DCSBM Spectral DeepWalk DGI Figure 4: Clustering accuracy with and without GDC. GDC consistently improves the accuracy across a diverse set of models and datasets. [61], and Deep Graph Infomax (DGI) [73] are unsupervised models. Note that DGI uses node features while other unsupervised models do not. We use k-means clustering to generate clusters from node embeddings. Dataset statistics and hyperparameters are reported in App. B. Semi-supervised node classification. In this task the goal is to label nodes based on the graph, node features X ∈ RN×F and a subset of labeled nodes y. The main goal of GDC is improving the performance of MPNN models. Fig. 3 shows that GDC consistently and significantly improves the accuracy of a wide variety of state-of-the-art models across multiple diverse datasets. Note how GDC is able to fix the performance of GNNs that otherwise break down on some datasets (e.g. GAT). We also surpass or match the previous state of the art on all datasets investigated (see App. B.2). Clustering. We highlight GDC's ability to be combined with any graph-based model by reporting the performance of a diverse set of models that use a wide range of paradigms. Fig. 4 shows the unsupervised accuracy obtained by matching clusters to ground-truth classes using the Hungarian algorithm. Accuracy consistently and significantly improves for all models and datasets. Note that spectral clustering uses the graph's eigenvectors, which are not affected by the diffusion step itself. Still, its performance improves by up to 30 percentage points. Results in tabular form are presented in App. B.2. 7 ) % ( y c a r u c c A ∆ 0 −1 −2 ) % ( y c a r u c c A 80 70 100 CORA CITESEER AMZ COMP 101 102 Average degree 103 Figure 5: GCN+GDC accuracy (using PPR and top-k). Lines in- dicate original accuracy and de- gree. GDC surpasses original ac- curacy at around the same degree independent of dataset. Sparsifi- cation often improves accuracy. 0 1 2 3 Self-loop weight 6: Difference Figure in GCN+GDC accuracy (using PPR and top-k, percentage points) compared to the symmet- ric Tsym without self-loops. Trw performs worse and self-loops have no significant effect. CORA CITESEER AMZ COMP Tsym Trw PPR CORA AdaDIF CITESEER AMZ COMP K J N C G A M R A K J N C G A M R A K J N C G A M R A ) % ( y c a r u c c A 80 70 4 Figure 7: Accuracy of GDC with coefficients θk defined by PPR and learned by AdaDIF. Simple PPR coefficients consistently per- form better than those obtained by AdaDIF, even with optimized regularization. ) CORA % 85 ( y c a r u c c A GCN JK ARMA 80 0.01 0.05 α PPR CITESEER 76 85 AMZ COMP 85 80 74 0.4 0.01 0.05 α 82 0.4 0.01 0.05 α 75 0.4 0.5 1 2 5 20 t CORA Heat CITESEER AMZ COMP 75 72 80 70 0.5 1 2 5 20 t 0.5 1 2 5 20 t Figure 8: Accuracy achieved by using GDC with varying hyperparameters of PPR (α) and the heat kernel (t). Optimal values fall within a narrow range that is consistent across datasets and models. In this work we concentrate on node-level prediction tasks in a transductive setting. However, GDC can just as easily be applied to inductive problems or different tasks like graph classification. In our experiments we found promising, yet not as consistent results for graph classification (e.g. 2.5 percentage points with GCN on the DD dataset [18]). We found no improvement for the inductive setting on PPI [50], which is rather unsurprising since the underlying data used for graph construction already includes graph diffusion-like mechanisms (e.g. regulatory interactions, protein complexes, and metabolic enzyme-coupled interactions). We furthermore conducted experiments to answer five important questions: Does GDC increase graph density? When sparsifying the generalized graph diffusion matrix S we are free to choose the resulting level of sparsity in S. Fig. 5 indicates that, surprisingly, GDC requires roughly the same average degree to surpass the performance of the original graph independent of the dataset and its average degree (-threshold in App. B.2, Fig. 12). This suggests that the sparsification hyperparameter can be obtained from a fixed average degree. Note that CORA and CITESEER are both small graphs with low average degree. Graphs become denser with size [39] and in practice we expect GDC to typically reduce the average degree at constant accuracy. Fig. 5 furthermore shows that there is an optimal degree of sparsity above which the accuracy decreases. This indicates that sparsification is not only computationally beneficial but also improves prediction performance. How to choose the transition matrix T ? We found Tsym to perform best across datasets. More specifically, Fig. 6 shows that the symmetric version on average outperforms the random walk transition matrix Trw. This figure also shows that GCN accuracy is largely insensitive to self-loops when using Tsym -- all changes lie within the estimated uncertainty. However, we did find that other models, e.g. GAT, perform better with self-loops (not shown). How to choose the coefficients θk? We found the coefficients defined by PPR and the heat kernel to be effective choices for θk. Fig. 8 shows that their optimal hyperparameters typically fall within a narrow range of α ∈ [0.05, 0.2] and t ∈ [1, 10]. We also tried obtaining θk from models that learn analogous coefficients [1, 8, 13]. However, we found that θk obtained by these models tend to converge to a minimal neighborhood, i.e. they converge to θ0 ≈ 1 or θ1 ≈ 1 and all other θk ≈ 0. 8 ) % ( y c a r u c c A ∆ 4 2 0 2 1 0 CORA Heat PPR 1 2 3 4 ≥5 4 5 2 = ¯n 0 1 6 = ¯n 3 3 3 = ¯n 5 1 1 = ¯n 8 . 7 4 = ¯n Hops CITESEER PUBMED 1 0 1 2 3 4 5 ≥6 2 3 2 = ¯n 5 7 4 = ¯n 5 4 3 = ¯n 4 7 1 = ¯n 8 . 2 8 = ¯n 3 . 2 7 = ¯n Hops 1 2 3 4 5 ≥6 6 . 7 1 = ¯n 7 8 1 = ¯n 0 0 5 = ¯n 9 2 5 = ¯n 2 5 1 = ¯n 7 . 4 5 = ¯n Hops COAUTHOR CS 1 0 1 2 3 4 ≥5 7 5 5 = ¯n 9 4 3 = ¯n 2 . 1 7 = ¯n 1 2 1 2 = ¯n 2 0 6 1 = ¯n Hops AMZ COMP 2 1 0 1 2 ≥3 1 2 3 = ¯n 7 7 8 = ¯n 2 0 1 = ¯n Hops AMZ PHOTO 2 1 0 1 2 3 ≥4 8 8 4 = ¯n 9 6 7 = ¯n 6 . 1 7 = ¯n 1 . 1 1 = ¯n Hops Figure 10: Improvement (percentage points) in GCN accuracy by adding GDC depending on distance (number of hops) from the training set. Nodes further away tend to benefit more from GDC. 85 80 75 5 ) % ( y c a r u c c A None Heat PPR 60 GCN JK ARMA 20 30 This is caused by their training losses almost always decreasing when the considered neighborhood shrinks. We were able to control this overfitting to some degree using strong regularization (specifically, we found L2 regularization on the difference of neighboring coefficients θk+1−θk to perform best). However, this requires hand-tuning the regularization for every dataset, which defeats the purpose of learning the coefficients from the graph. Moreover, we found that even with hand-tuned regularization the coefficients defined by PPR and the heat kernel perform better than trained θk, as shown in Fig. 7. How does the label rate affect GDC? When varying the label rate from 5 up to 60 labels per class we found that the improvement achieved by GDC increases the sparser the labels are. Still, GDC improves performance even for 60 labels per class, i.e. 17 % label rate (see Fig. 9). This trend is most likely due to larger neighborhood leveraged by GDC. Which nodes benefit from GDC? Our experiments showed no correlation of improvement with most common node properties, except for the distance from the training set. Nodes further away from the training set tend to benefit more from GDC, as demonstrated by Fig. 10. Besides smoothing out the neighborhood, GDC also has the effect of increasing the model's range, since it is no longer restricted to only using first-hop neighbors. Hence, nodes further away from the training set influence the training and later benefit from the improved model weights. Figure 9: Accuracy on Cora with different label rates. Improve- ment from GDC increases for sparser label rates. 10 40 Labels per class 7 Conclusion We propose graph diffusion convolution (GDC), a method based on sparsified generalized graph diffusion. GDC is a more powerful, yet spatially localized extension of message passing in GNNs, but able to enhance any graph-based model. We show the tight connection between GDC and spectral-based models and analyzed GDC's spectral properties. GDC shares many of the strengths of spectral methods and none of their weaknesses. We conduct extensive and rigorous experiments that show that GDC consistently improves the accuracy of a wide range of models on both supervised and unsupervised tasks across various homophilic datasets and requires very little hyperparameter tuning. There are many extensions and applications of GDC that remain to be explored. We expect many graph-based models and tasks to benefit from GDC, e.g. graph classification and regression. Promising extensions include other diffusion coefficients θk such as those given by the methods presented in Fouss et al. [22] and more advanced random walks and operators that are not defined by powers of a transition matrix. Acknowledgments This research was supported by the German Federal Ministry of Education and Research (BMBF), grant no. 01IS18036B, and by the Deutsche Forschungsgemeinschaft (DFG) through the Emmy Noether grant GU 1409/2-1 and the TUM International Graduate School of Science and Engineering (IGSSE), GSC 81. The authors of this work take full responsibilities for its content. 9 References [1] Sami Abu-El-Haija, Bryan Perozzi, Rami Al-Rfou, and Alex Alemi. Watch Your Step: Learning Node Embeddings via Graph Attention. In NeurIPS, 2018. [2] Sami Abu-El-Haija, Bryan Perozzi, Amol Kapoor, Nazanin Alipourfard, Kristina Lerman, Hrayr Harutyun- yan, Greg Ver Steeg, and Aram Galstyan. MixHop: Higher-Order Graph Convolutional Architectures via Sparsified Neighborhood Mixing. In ICML, 2019. [3] R. Andersen, F. Chung, and K. Lang. Local Graph Partitioning using PageRank Vectors. In FOCS, 2006. [4] James Atwood and Don Towsley. Diffusion-Convolutional Neural Networks. In NIPS, 2016. [5] Lars Backstrom, Paolo Boldi, Marco Rosa, Johan Ugander, and Sebastiano Vigna. Four degrees of separation. In ACM Web Science Conference, 2012. [6] Igor I. Baskin, Vladimir A. Palyulin, and Nikolai S. Zefirov. A Neural Device for Searching Direct Correlations between Structures and Properties of Chemical Compounds. Journal of Chemical Information and Computer Sciences, 37(4):715 -- 721, 1997. [7] Dimitris Berberidis and Georgios B. Giannakis. Node Embedding with Adaptive Similarities for Scalable Learning over Graphs. CoRR, 1811.10797, 2018. [8] Dimitris Berberidis, Athanasios N. Nikolakopoulos, and Georgios B. Giannakis. Adaptive diffusions for scalable learning over graphs. IEEE Transactions on Signal Processing, 67(5):1307 -- 1321, 2019. [9] Filippo Maria Bianchi, Daniele Grattarola, Lorenzo Livi, and Cesare Alippi. Graph Neural Networks with convolutional ARMA filters. CoRR, 1901.01343, 2019. [10] Aleksandar Bojchevski and Stephan Günnemann. Deep Gaussian Embedding of Graphs: Unsupervised Inductive Learning via Ranking. ICLR, 2018. [11] Joan Bruna, Wojciech Zaremba, Arthur Szlam, and Yann LeCun. Spectral Networks and Deep Locally Connected Networks on Graphs. In ICLR, 2014. [12] Eliav Buchnik and Edith Cohen. Bootstrapped Graph Diffusions: Exposing the Power of Nonlinearity. Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), 2(1):1 -- 19, 2018. [13] Siheng Chen, Aliaksei Sandryhaila, Jose M. F. Moura, and Jelena Kovacevic. Adaptive graph filtering: Multiresolution classification on graphs. In IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2013. [14] F. Chung. The heat kernel as the pagerank of a graph. Proceedings of the National Academy of Sciences, 104(50):19735 -- 19740, 2007. [15] Aurelien Decelle, Florent Krzakala, Cristopher Moore, and Lenka Zdeborová. Inference and phase transitions in the detection of modules in sparse networks. Physical Review Letters, 107(6):065701, 2011. [16] Michaël Defferrard, Xavier Bresson, and Pierre Vandergheynst. Convolutional Neural Networks on Graphs with Fast Localized Spectral Filtering. In NIPS, 2016. [17] Tyler Derr, Yao Ma, and Jiliang Tang. Signed Graph Convolutional Networks. In ICDM, 2018. [18] Paul D. Dobson and Andrew J. Doig. Distinguishing enzyme structures from non-enzymes without alignments. Journal of Molecular Biology, 330(4):771 -- 783, 2003. [19] David K. Duvenaud, Dougal Maclaurin, Jorge Aguilera-Iparraguirre, Rafael Gómez-Bombarelli, Timothy Hirzel, Alán Aspuru-Guzik, and Ryan P. Adams. Convolutional Networks on Graphs for Learning Molecular Fingerprints. In NIPS, 2015. [20] Radim Rehurek and Petr Sojka. Software Framework for Topic Modelling with Large Corpora. In LREC 2010 Workshop on New Challenges for NLP Frameworks, 2010. [21] Matthias Fey and Jan E. Lenssen. Fast Graph Representation Learning with PyTorch Geometric. In ICLR workshop, 2019. [22] François Fouss, Kevin Francoisse, Luh Yen, Alain Pirotte, and Marco Saerens. An experimental investi- gation of kernels on graphs for collaborative recommendation and semisupervised classification. Neural Networks, 31:53 -- 72, 2012. 10 [23] Justin Gilmer, Samuel S. Schoenholz, Patrick F. Riley, Oriol Vinyals, and George E. Dahl. Neural Message Passing for Quantum Chemistry. In ICML, 2017. [24] M. Gori, G. Monfardini, and F. Scarselli. A new model for learning in graph domains. In IEEE International Joint Conference on Neural Networks, 2005. [25] Aditya Grover and Jure Leskovec. node2vec: Scalable Feature Learning for Networks. In KDD, 2016. [26] William L. Hamilton, Zhitao Ying, and Jure Leskovec. Inductive Representation Learning on Large Graphs. In NIPS, 2017. [27] David K. Hammond, Pierre Vandergheynst, and Rémi Gribonval. Wavelets on graphs via spectral graph theory. Applied and Computational Harmonic Analysis, 30(2):129 -- 150, 2011. [28] Mikael Henaff, Joan Bruna, and Yann LeCun. Deep Convolutional Networks on Graph-Structured Data. CoRR, 1506.05163, 2015. [29] Eric Jones, Travis Oliphant, Pearu Peterson, and others. SciPy: Open source scientific tools for Python. 2001. [30] Brian Karrer and Mark EJ Newman. Stochastic blockmodels and community structure in networks. Physical review E, 83(1):016107, 2011. [31] Thomas N. Kipf and Max Welling. Variational Graph Auto-Encoders. In NIPS workshop, 2016. [32] Thomas N. Kipf and Max Welling. Semi-Supervised Classification with Graph Convolutional Networks. In ICLR, 2017. [33] Johannes Klicpera, Aleksandar Bojchevski, and Stephan Günnemann. Predict then Propagate: Graph Neural Networks Meet Personalized PageRank. In ICLR, 2019. [34] Kyle Kloster and David F Gleich. Heat kernel based community detection. In KDD, 2014. [35] Isabel M. Kloumann, Johan Ugander, and Jon Kleinberg. Block models and personalized PageRank. Proceedings of the National Academy of Sciences, 114(1):33 -- 38, 2017. [36] Risi Imre Kondor and John Lafferty. Diffusion kernels on graphs and other discrete structures. In ICML, 2002. [37] Stéphane Lafon and Ann B. Lee. Diffusion Maps and Coarse-Graining: A Unified Framework for Dimensionality Reduction, Graph Partitioning, and Data Set Parameterization. IEEE Trans. Pattern Anal. Mach. Intell., 28(9):1393 -- 1403, 2006. [38] Edmund Landau. Zur relativen Wertbemessung der Turnierresultate. Deutsches Wochenschach, 11: 366 -- 369, 1895. [39] Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. Graphs over Time: Densification Laws, Shrinking Diameters and Possible Explanations. In KDD, 2005. [40] Pan Li, Eli Chien, and Olgica Milenkovic. Optimizing generalized pagerank methods for seed-expansion community detection. In NeurIPS, 2019. [41] Ruoyu Li, Sheng Wang, Feiyun Zhu, and Junzhou Huang. Adaptive Graph Convolutional Neural Networks. In AAAI, 2018. [42] Yaguang Li, Rose Yu, Cyrus Shahabi, and Yan Liu. Diffusion Convolutional Recurrent Neural Network: Data-Driven Traffic Forecasting. In ICLR, 2018. [43] Yujia Li, Daniel Tarlow, Marc Brockschmidt, and Richard S. Zemel. Gated Graph Sequence Neural Networks. In ICLR, 2016. [44] Jeremy Ma, Weiyu Huang, Santiago Segarra, and Alejandro Ribeiro. Diffusion filtering of graph signals and its use in recommendation systems. In ICASSP, 2016. [45] Zheng Ma, Ming Li, and Yuguang Wang. PAN: Path Integral Based Convolution for Deep Graph Neural Networks. In ICML workshop, 2019. [46] Naoki Masuda, Mason A Porter, and Renaud Lambiotte. Random walks and diffusion on networks. Physics reports, 716:1 -- 58, 2017. 11 [47] Julian J. McAuley, Christopher Targett, Qinfeng Shi, and Anton van den Hengel. Image-Based Recom- mendations on Styles and Substitutes. In SIGIR, 2015. [48] Andrew Kachites McCallum, Kamal Nigam, Jason Rennie, and Kristie Seymore. Automating the construc- tion of internet portals with machine learning. Information Retrieval, 3(2):127 -- 163, 2000. [49] Miller McPherson, Lynn Smith-Lovin, and James M Cook. Birds of a feather: Homophily in social networks. Annual review of sociology, 27(1):415 -- 444, 2001. [50] Jörg Menche, Amitabh Sharma, Maksim Kitsak, Susan Ghiassian, Marc Vidal, Joseph Loscalzo, and Albert- László Barabási. Uncovering disease-disease relationships through the incomplete human interactome. Science, 347(6224):1257601, 2015. [51] Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory S. Corrado, and Jeffrey Dean. Distributed Representa- tions of Words and Phrases and their Compositionality. In NIPS, 2013. [52] Federico Monti, Davide Boscaini, Jonathan Masci, Emanuele Rodola, Jan Svoboda, and Michael M. Bronstein. Geometric Deep Learning on Graphs and Manifolds Using Mixture Model CNNs. In CVPR, 2017. [53] Galileo Namata, Ben London, Lise Getoor, and Bert Huang. Query-driven Active Surveying for Collective Classification. In International Workshop on Mining and Learning with Graphs (MLG), KDD, 2012. [54] Huda Nassar, Kyle Kloster, and David F. Gleich. Strong Localization in Personalized PageRank Vectors. In International Workshop on Algorithms and Models for the Web Graph (WAW), 2015. [55] Andrew Y Ng, Michael I Jordan, and Yair Weiss. On Spectral Clustering: Analysis and an algorithm. In NIPS, 2002. [56] Mathias Niepert, Mohamed Ahmed, and Konstantin Kutzkov. Learning Convolutional Neural Networks for Graphs. In ICML, 2016. [57] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. The pagerank citation ranking: Bringing order to the web. Report, Stanford InfoLab, 1998. [58] Adam Paszke, Sam Gross, Soumith Chintala, Gregory Chanan, Edward Yang, Zachary DeVito, Zeming Lin, Alban Desmaison, Luca Antiga, and Adam Lerer. Automatic differentiation in PyTorch. In NIPS workshop, 2017. [59] Fabian Pedregosa, Gaël Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, Jake Vanderplas, Alexandre Passos, David Cournapeau, Matthieu Brucher, Matthieu Perrot, and Édouard Duchesnay. Scikit-learn: Machine Learning in Python. Journal of Machine Learning Research, 12:2825 -- 2830, 2011. [60] Tiago P. Peixoto. The graph-tool python library. figshare, 2014. [61] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. DeepWalk: online learning of social representations. In KDD, 2014. [62] Trang Pham, Truyen Tran, Dinh Q. Phung, and Svetha Venkatesh. Column Networks for Collective Classification. In AAAI, 2017. [63] Jiezhong Qiu, Yuxiao Dong, Hao Ma, Jian Li, Kuansan Wang, and Jie Tang. Network Embedding as Matrix Factorization: Unifying DeepWalk, LINE, PTE, and node2vec. In WSDM, 2018. [64] Stephen Ragain. Community Detection via Discriminant functions for Random Walks in the degree- corrected Stochastic Block Model. Report, Stanford University, 2017. [65] F. Scarselli, M. Gori, Ah Chung Tsoi, M. Hagenbuchner, and G. Monfardini. The Graph Neural Network Model. IEEE Transactions on Neural Networks, 20(1):61 -- 80, 2009. [66] Prithviraj Sen, Galileo Namata, Mustafa Bilgic, Lise Getoor, Brian Gallagher, and Tina Eliassi-Rad. Collective Classification in Network Data. AI Magazine, 29(3):93 -- 106, 2008. [67] Oleksandr Shchur, Maximilian Mumme, Aleksandar Bojchevski, and Stephan Günnemann. Pitfalls of Graph Neural Network Evaluation. In NIPS workshop, 2018. [68] A. Sperduti and A. Starita. Supervised neural networks for the classification of structures. IEEE Transac- tions on Neural Networks, 8(3):714 -- 735, 1997. 12 [69] Gilbert Wright Stewart and Ji-guang Sun. Matrix Perturbation Theory. Computer Science and Scientific Computing. 1990. [70] Yu-Hang Tang, Dongkun Zhang, and George Em Karniadakis. An atomistic fingerprint algorithm for learning ab initio molecular force fields. The Journal of Chemical Physics, 148(3):034101, 2018. [71] Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller. VERSE: Versatile Graph Embeddings from Similarity Measures. In WWW, 2018. [72] Stefan Van Der Walt, S Chris Colbert, and Gael Varoquaux. The NumPy array: a structure for efficient numerical computation. Computing in Science & Engineering, 13(2):22, 2011. [73] Petar Velickovic, William Fedus, William L. Hamilton, Pietro Liò, Yoshua Bengio, and R. Devon Hjelm. Deep Graph Infomax. In ICLR, 2019. [74] Petar Velickovi´c, Guillem Cucurull, Arantxa Casanova, Adriana Romero, Pietro Liò, and Yoshua Bengio. Graph Attention Networks. In ICLR, 2018. [75] Sebastiano Vigna. Spectral ranking. Network Science, CoRR (updated, 0912.0238v15), 4(4):433 -- 445, 2016. [76] Ulrike von Luxburg. A tutorial on spectral clustering. Statistics and Computing, 17(4):395 -- 416, 2007. [77] Zhewei Wei, Xiaodong He, Xiaokui Xiao, Sibo Wang, Shuo Shang, and Ji-Rong Wen. TopPPR: Top-k Personalized PageRank Queries with Precision Guarantees on Large Graphs. In SIGMOD, 2018. [78] Felix Wu, Tianyi Zhang, Amauri Holanda de Souza Jr., Christopher Fifty, Tao Yu, and Kilian Q. Weinberger. Simplifying Graph Convolutional Networks. In ICML, 2019. [79] Bingbing Xu, Huawei Shen, Qi Cao, Keting Cen, and Xueqi Cheng. Graph Convolutional Networks using Heat Kernel for Semi-supervised Learning. In IJCAI, 2019. [80] Keyulu Xu, Chengtao Li, Yonglong Tian, Tomohiro Sonobe, Ken-ichi Kawarabayashi, and Stefanie Jegelka. Representation Learning on Graphs with Jumping Knowledge Networks. In ICML, 2018. [81] Keyulu Xu, Weihua Hu, Jure Leskovec, and Stefanie Jegelka. How Powerful are Graph Neural Networks? In ICLR, 2019. [82] Rex Ying, Ruining He, Kaifeng Chen, Pong Eksombatchai, William L. Hamilton, and Jure Leskovec. Graph Convolutional Neural Networks for Web-Scale Recommender Systems. KDD, 2018. 13 A Graph diffusion as a polynomial filter We want to find a direct correspondence between graph diffusion with θk and a polynomial filter with parameters ξj, i.e. To do so, we first expand T = IN − L and use the binomial equation, i.e. θkT k. K(cid:88) k=0 θkT k = θk(IN − L)k = (cid:19) K(cid:88) k=0 j=0 θk k=0 ξjLj != J(cid:88) K(cid:88) (cid:18)k K(cid:88) k(cid:88) (cid:18)k (cid:19) K(cid:88) k(cid:88) (cid:18)k (cid:19) (cid:88) (cid:19) (cid:18)k K(cid:88) K(cid:88) (cid:123)(cid:122) (cid:124) j,k∈[0,K] j≤k k=0 k=0 k=j j=0 j=0 j=0 j j j j ξj = = = = (−1)jI k−j N Lj = θk(−1)jLj = θk(−1)jLj = θk(−1)j Lj, (cid:125) (8) (9) where we recognize the coefficients ξj and see that we need to set J = K. Note that we reordered the summation indices by recognizing the triangular sum, i.e. the sum over index pairs (j, k) with j ≤ k. The equation for conversion in the opposite direction is obtained in the same way since L = IN − T . To obtain a more convenient form for K → ∞ we shift the summation index using m = k − j, i.e. (cid:18)k (cid:19) K(cid:88) j k=j K−j(cid:88) (cid:18)m + j (cid:19) m=0 j ξj = (−1)jθk = (−1)jθm+j. (10) To find corresponding coefficients for the heat kernel, we let K → ∞, set θk = e−t tk exponential series to obtain k! , and use the ξHK j = (−1)je−t tm+j (m + j)! (m + j)! (−1)je−t m!j! tm+j (m + j)! ∞(cid:88) tm m! = (−t)j j! e−tet = (−t)j j! . = = (11) To obtain the coefficients for PPR, we let K → ∞, set θk = α(1 − α)k, and recognize the series expansion (1−x)j+1 =(cid:80)∞ 1 m=0 ξPPR j = m=0 (−1)jα(1 − α)m+j = = α(−1)j(1 − α)j (1 − α)m = (12) (cid:18)m + j (cid:19) j = m=0 m=0 ∞(cid:88) ∞(cid:88) = e−t (−t)j (cid:0)m+j ∞(cid:88) j! m m=0 (cid:19) (cid:1)xm, resulting in (cid:18)m + j ∞(cid:88) (cid:18) m=0 j = α(α − 1)j 1 αj+1 = 14 (cid:18)m + j (cid:19) (cid:19)j m 1 − 1 α . B Experiments For optimizing the hyperparameters for node classification the data is split into a development and a test set. The development set contains 1500 nodes for all datasets but for COAUTHOR CS, where it contains 5000 nodes. All remaining nodes are part of the test set and only used once for testing. The development set is split into a training set containing 20 nodes per class and a validation set with the remaining nodes. For every run the accuracy is determined using 100 different random splits of the development set using fixed seeds. Different seeds are used for validation and test splits. Early stopping patience is set to 100 epochs with a maximum limit of 10000 epochs, which is never reached. The patience is reset after an increase in accuracy on the validation set. For the test runs we select the hyperparameter configurations that showed the highest average accuracy on the validation splits. We use the same development set for optimizing the hyperparameters for clustering. The test set is only once for generating test results. Clustering results are averaged over 20 randomly initialized runs. Confidence intervals are calculated by bootstrapping the accuracy results from 100 or 20 runs, respectively, with 1000 samples. All implementations for node classification as well as DGI are based on PyTorch [58] and PyTorch Geometric [21]. The remaining experiments are based on NumPy [72], SciPy [29], graph-tool [60], and gensim [20]. For k-means clustering we use the implementation by scikit-learn [59]. All datasets are included in PyTorch Geometric, available at https://github.com/rusty1s/pytorch_geometric. Experiments using PyTorch are run on Nvidia GPUs using CUDA and the remaining experiments are run on Intel CPUs. For all experiments the largest connected component of the graph is selected. Dropout probability is set to p = 0.5 for all experiments and performed after every application of the activation function. PPR preprocessing is done with α ∈ [0.05, 0.30], heat kernel preprocessing with t ∈ [1, 10]. For top-k matrix sparsification k is set to either 64 or 128 and for -thresholding  is chosen from [0.00001, 0.01]. We do not choose  directly but rather calculate which  corresponds to a chosen average degree. For node classification we use the Adam optimizer with a learning rate of 0.01. The hidden dimension of GNNs is kept fixed at 64 with the exception of ARMA, where the dimensionality of a single stack is chosen from 16 or 32. For ARMA, up to three stacks and two layers are tested. GCN and GAT are run with up to 4 layers, JK and GIN with up to six layers. L2-regularization is performed on the parameters of the first layer of every model with λL1 ∈ [0.001, 10]. Unsupervised models use a node embedding dimension of 128. DGI uses the Adam optimizer with a learning rate of 0.001. For a full list of final hyperparameters per model, diffusion, and dataset see Sec. B.3. B.1 Datasets Type Citation Citation Citation Dataset CORA CITESEER PUBMED COAUTHOR CS Co-author AMZ COMP AMZ PHOTOS Co-purchase Co-purchase Classes 7 6 3 15 10 8 Table 1: Dataset statistics. Features Nodes 2485 2120 19 717 18 333 13 381 7487 1433 3703 500 6805 767 745 Edges Label rate 0.056 5069 3679 0.057 0.003 44 324 0.016 81 894 0.015 245 778 119 043 0.021 B.2 Results To support our claim of achieving state-of-the-art node classification performance we also include results (and hyperparameters) of APPNP, which has been shown to be the current state of the art for semi-supervised node classification and uses graph diffusion internally [21, 33]. 15 Table 2: Average accuracy (%) on CORA with bootstrap-estimated 95% confidence levels. Model GCN GAT JK GIN ARMA APPNP DCSBM Spectral DeepWalk DGI No diffusion 81.71 ± 0.26 80.10 ± 0.34 82.14 ± 0.24 73.96 ± 0.46 81.62 ± 0.24 83.83 ± 0.23 59.75 ± 1.59 29.29 ± 1.03 68.67 ± 1.01 54.29 ± 1.21 Heat 83.48 ± 0.22 81.54 ± 0.25 83.69 ± 0.29 76.54 ± 0.63 83.32 ± 0.22 64.63 ± 2.60 35.16 ± 2.96 68.76 ± 0.67 67.71 ± 1.69 - PPR 83.58 ± 0.23 81.60 ± 0.25 83.78 ± 0.22 78.74 ± 0.44 83.81 ± 0.21 - 68.52 ± 1.47 34.03 ± 2.01 69.42 ± 0.07 69.61 ± 1.73 AdaDIF 82.93 ± 0.23 81.32 ± 0.22 83.43 ± 0.21 75.94 ± 0.45 83.24 ± 0.22 Table 3: Average accuracy (%) on CITESEER with bootstrap-estimated 95% confidence levels. Table 4: Average accuracy (%) on PUBMED with bootstrap-estimated 95% confidence levels. Table 5: Average accuracy (%) on COAUTHOR CS with bootstrap-estimated 95% confidence levels. - - - - - - - - - - - - - - - - - - - - Model GCN GAT JK GIN ARMA APPNP DCSBM Spectral DeepWalk DGI Model GCN GAT JK GIN ARMA APPNP DCSBM Spectral DeepWalk DGI Model GCN GAT JK ARMA APPNP DCSBM Spectral DeepWalk DGI No diffusion 72.02 ± 0.31 69.52 ± 0.32 70.34 ± 0.38 61.09 ± 0.58 70.84 ± 0.32 72.76 ± 0.25 46.70 ± 2.18 27.02 ± 0.57 55.33 ± 1.05 54.62 ± 2.28 Heat 73.22 ± 0.27 70.25 ± 0.34 72.38 ± 0.27 62.82 ± 0.50 71.90 ± 0.33 56.81 ± 1.21 29.61 ± 1.29 66.05 ± 0.56 71.58 ± 0.94 - PPR 73.35 ± 0.27 68.50 ± 0.21 72.24 ± 0.31 64.07 ± 0.48 72.28 ± 0.29 57.14 ± 1.40 29.26 ± 1.46 65.81 ± 0.16 72.42 ± 0.39 - AdaDIF 71.58 ± 0.31 68.68 ± 0.22 71.11 ± 0.33 61.46 ± 0.51 71.45 ± 0.31 No diffusion 78.23 ± 0.40 76.32 ± 0.47 78.47 ± 0.36 72.38 ± 0.63 77.14 ± 0.36 79.78 ± 0.33 46.64 ± 1.85 37.97 ± 0.02 70.77 ± 0.14 49.96 ± 2.21 Heat 79.62 ± 0.36 77.78 ± 0.34 79.95 ± 0.28 74.16 ± 0.62 79.64 ± 0.35 67.38 ± 1.45 49.28 ± 3.08 71.36 ± 0.14 65.94 ± 0.23 - PPR 78.72 ± 0.37 76.66 ± 0.32 79.22 ± 0.32 73.62 ± 0.63 78.85 ± 0.36 64.51 ± 1.75 48.05 ± 2.69 69.96 ± 0.12 66.52 ± 0.35 - AdaDIF 77.46 ± 0.36 75.98 ± 0.33 78.01 ± 0.41 68.14 ± 0.80 77.32 ± 0.37 No diffusion 91.83 ± 0.08 90.89 ± 0.13 91.11 ± 0.09 91.32 ± 0.08 92.08 ± 0.07 57.70 ± 1.52 24.74 ± 2.28 61.26 ± 0.91 57.52 ± 2.63 Heat 92.79 ± 0.07 89.82 ± 0.10 92.40 ± 0.08 92.32 ± 0.09 63.70 ± 0.93 50.47 ± 3.20 63.77 ± 1.28 62.84 ± 1.84 - PPR 93.01 ± 0.07 91.33 ± 0.07 92.41 ± 0.07 92.63 ± 0.08 61.71 ± 1.15 55.27 ± 3.00 65.29 ± 1.40 63.79 ± 1.89 - AdaDIF 92.28 ± 0.06 88.29 ± 0.06 91.68 ± 0.08 91.03 ± 0.09 16 Table 6: Average accuracy (%) on AMZ COMP with bootstrap-estimated 95% confidence levels. Model GCN GAT JK GIN ARMA APPNP DCSBM Spectral DeepWalk DGI No diffusion 84.75 ± 0.23 45.37 ± 4.20 83.33 ± 0.27 55.44 ± 0.83 84.36 ± 0.26 81.72 ± 0.25 44.61 ± 0.77 40.39 ± 1.11 55.61 ± 0.25 30.84 ± 1.96 Heat 86.77 ± 0.21 86.68 ± 0.26 86.51 ± 0.26 81.11 ± 0.62 86.09 ± 0.27 - 55.80 ± 1.29 50.89 ± 3.05 56.29 ± 0.50 37.27 ± 1.21 PPR 86.04 ± 0.24 85.37 ± 0.33 85.66 ± 0.30 75.08 ± 1.20 84.92 ± 0.26 57.92 ± 2.25 52.62 ± 2.14 55.05 ± 0.98 36.81 ± 1.12 - AdaDIF 85.73 ± 0.23 86.55 ± 0.26 84.40 ± 0.32 56.52 ± 1.65 84.92 ± 0.29 - - - - - - - - - - Table 7: Average accuracy (%) on AMZ PHOTO with bootstrap-estimated 95% confidence levels. Model GCN GAT JK GIN ARMA APPNP DCSBM Spectral DeepWalk DGI No diffusion 92.08 ± 0.20 53.40 ± 5.49 91.07 ± 0.26 68.34 ± 1.16 91.41 ± 0.22 91.42 ± 0.26 66.30 ± 1.70 28.15 ± 0.81 78.82 ± 0.85 40.09 ± 2.14 Heat 92.82 ± 0.23 91.86 ± 0.20 92.93 ± 0.21 87.24 ± 0.65 92.05 ± 0.24 67.13 ± 2.49 49.86 ± 2.06 79.26 ± 0.09 49.02 ± 1.78 - PPR 92.20 ± 0.22 90.89 ± 0.27 92.37 ± 0.22 83.41 ± 0.82 91.09 ± 0.24 64.28 ± 1.81 53.65 ± 3.22 78.73 ± 0.10 51.34 ± 1.96 - AdaDIF 92.37 ± 0.22 91.65 ± 0.20 92.34 ± 0.22 75.37 ± 0.86 90.38 ± 0.28  = 10−3  = 10−4 λ ∆ 0.06 0.04 0.02 0.00 0 1000 Index 2000 Figure 11: Close-up of difference caused by sparsification (Fig. 2b). Primarily the lowest and highest eigenvalues of the Laplacian are affected. ) % ( y c a r u c c A 80 70 100 CORA CITESEER AMZ COMP 101 Average degree 102 103 Figure 12: GCN+GDC accuracy (using PPR and sparsification by threshold ). Lines indicate original accuracy and degree. GDC surpasses the original accuracy at around the same degree independent of dataset. Sparsification can improve accuracy. 17 λL2 0.06 10.0 0.03 0.06 0.03 0.03 0.09 10.0 0.04 0.08 0.07 0.08 0.10 10.0 0.06 0.03 0.04 0.03 0.08 0.08 0.01 0.03 0.02 0.02 0.01 0.5 64 0.01 0.5 64 0.01 0.5 64 0.01 0.5 64 Hidden depth 1 1 1 1 1 1 2 1 1 1 2 1 1 1 B.3 Hyperparameters Table 8: Hyperparameters for GCN obtained by grid and random search. Hidden Learning Diffusion Dataset name rate Dropout dimension α t k  - Heat PPR AdaDIF CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - 5 4 3 1 5 3 - - - 0.05 0.10 0.10 0.10 0.10 0.15 - - - - - - - 64 - - 128 64 64 64 64 128 128 128 64 64 64 0.0001 0.0009 0.0001 - 0.0010 0.0001 0.0009 - - 18 Table 9: Hyperparameters for GAT obtained by grid and random search. Learning rate Dropout Hidden dimension Diffusion Dataset name α - Heat PPR AdaDIF CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO t - 1 k - - - - - 128 64 64 64  - 0.0010 0.0010 0.0005 0.0005 0.0005 0.0005 0.0050 0.0005 0.0005 0.0005 0.0005 0.0005 0.0010 0.0005 - - - - λL2 0.06 0.06 0.03 0.00 0.09 0.08 0.04 0.08 0.02 0.03 0.01 0.01 0.08 0.10 0.00 0.00 0.03 0.07 0.04 0.04 0.01 0.02 0.02 0.02 0.10 - - - 0.01 0.5 64 0.01 0.5 64 0.01 0.5 64 0.01 0.5 64 - - t - 5 4 3 1 5 3 - Table 10: Hyperparameters for JK obtained by grid and random search. Learning rate Dropout Aggregation Hidden dimension Diffusion Dataset name α - Heat PPR AdaDIF CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - - 0.05 0.2 0.10 0.10 0.10 0.15 - -  - 0.0001 0.0009 0.0001 - 0.0010 0.0005 0.0009 - - k - - - - 64 - - 128 64 64 64 64 128 128 128 64 64 64 λL2 0.04 1.00 0.05 0.02 0.03 0.03 0.09 1.00 0.09 0.03 0.07 0.07 0.10 1.00 0.02 0.03 0.04 0.03 0.05 0.08 0.01 0.02 0.03 0.02 19 0.01 0.5 Concatenation 64 0.01 0.5 Concatenation 64 0.01 0.5 Concatenation 64 0.01 0.5 Concatenation 64 Hidden depth 1 1 2 2 1 1 1 1 2 1 1 1 1 1 2 1 1 2 1 1 2 1 1 1 Hidden depth 3 4 2 2 2 2 2 2 2 2 3 2 2 2 Table 11: Hyperparameters for GIN obtained by grid and random search. Learning rate Dropout Aggregation Hidden dimension Diffusion Dataset name α - Heat PPR AdaDIF CORA CITESEER PUBMED AMZ COMP AMZ PHOTO CORA CITESEER PUBMED AMZ COMP AMZ PHOTO CORA CITESEER PUBMED AMZ COMP AMZ PHOTO CORA CITESEER PUBMED AMZ COMP AMZ PHOTO t - 3 8 3 3 3 - - - 0.05 0.05 0.10 0.10 0.10 - - k - - - - 64 64 128 64 64 64 128 128 64 64 64  - 0.0001 0.0009 0.0010 - - 0.0009 - - λL2 0.09 0.10 0.08 0.01 0.01 0.07 0.01 0.02 0.00 0.00 0.01 0.01 0.01 0.04 0.04 0.02 0.05 0.03 0.02 0.02 0.01 0.5 Sum 0.01 0.5 Sum 0.01 0.5 Sum 0.01 0.5 Sum 64 64 64 64 Table 12: Hyperparameters for ARMA obtained by grid and random search. Hidden Learning ARMA layers ARMA stacks dimension Diffusion Dataset name α t k  rate Dropout - Heat PPR AdaDIF CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - 5 5 3 1 5 3 - - - 0.10 0.15 0.10 0.10 0.10 0.15 - - - - 0.0001 - - - - - - - 64 64 - 64 64 64 128 128 64 64 128 128 128 128 64 64 64 64 λL2 0.04 0.08 0.00 0.02 0.01 0.01 0.08 0.08 0.00 0.01 0.04 0.04 0.05 0.08 0.01 0.01 0.06 0.06 0.05 0.09 0.01 0.03 0.01 0.01 0.01 0.5 0.01 0.5 0.01 0.5 0.01 0.5 1 1 1 1 3 3 2 2 3 3 2 3 2 3 3 2 3 3 3 2 2 2 2 3 2 2 3 2 16 16 16 16 16 16 32 32 16 Hidden depth 4 4 4 5 4 5 4 5 4 4 4 4 5 4 4 3 4 5 4 4 Hidden depth 1 1 1 1 Table 13: Hyperparameters for APPNP obtained by grid and random search. Learning rate Dropout Hidden dimension Hidden depth Dataset name CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO α 0.10 0.10 0.10 0.15 0.10 0.10 k 10 λL2 0.09 1.00 0.02 0.01 0.06 0.05 0.01 0.5 64 1 20 Table 14: Hyperparameters for DCSBM obtained by grid and random search. Diffusion Dataset name Number of blocks α k  t - Heat PPR CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - 5 1 3 5 3 3 - - - 0.05 0.05 0.10 0.05 0.05 0.10 - 64 64 - - - - 64 - 64 - 64 - - 0.0010 - - - - - 0.0010 0.0010 0.0010 0.0010 0.0010 0.0010 7 6 3 15 10 8 7 6 3 15 10 8 7 6 3 15 10 8 Table 15: Hyperparameters for spectral clustering obtained by grid and random search. Embedding dimension 128 128 128  - - - - 0.0010 0.0010 0.0010 0.0010 0.0010 0.0010 - - - t - 5 5 5 5 1 5 - k - - - 64 - 64 64 - - - 64 64 64 Diffusion Dataset name α - Heat PPR CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - - 0.10 0.05 0.15 0.05 0.05 0.15 21 Table 16: Hyperparameters for DeepWalk obtained by grid and random search. Embedding dimension Walks per node Diffusion Dataset name  α t k Walk length - Heat PPR CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - 5 1 1 5 3 3 - - - 0.05 0.05 0.15 0.10 0.05 0.15 - - - 64 - - - - - - 64 64 - - 0.0010 0.0010 0.0010 0.0010 0.0010 0.0010 0.0010 - - - 0.0010 0.0010 10 10 10 128 64 128 64 128 64 Table 17: Hyperparameters for DGI obtained by grid and random search. Embedding dimension Learning rate Encoder 0.001 GCN 128 0.001 GCN 128 0.001 GCN 128  - - - 0.0001 0.0001 0.0001 0.0001 0.0001 0.0001 0.0010 0.0010 0.0010 0.0010 Diffusion Dataset name α - Heat PPR CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO CORA CITESEER PUBMED COAUTHOR CS AMZ COMP AMZ PHOTO - - 0.15 0.10 0.15 0.15 0.30 0.30 t - 1 5 5 5 1 1 - k - - - 64 64 - - - 22
1811.03573
5
1811
2019-08-28T02:50:16
Scale-variant topological information for characterizing the structure of complex networks
[ "cs.SI", "math.AT", "physics.soc-ph" ]
The structure of real-world networks is usually difficult to characterize owing to the variation of topological scales, the nondyadic complex interactions, and the fluctuations in the network. We aim to address these problems by introducing a general framework using a method based on topological data analysis. By considering the diffusion process at a single specified timescale in a network, we map the network nodes to a finite set of points that contains the topological information of the network at a single scale. Subsequently, we study the shape of these point sets over variable timescales that provide scale-variant topological information, to understand the varying topological scales and the complex interactions in the network. We conduct experiments on synthetic and real-world data to demonstrate the effectiveness of the proposed framework in identifying network models, classifying real-world networks, and detecting transition points in time-evolving networks. Overall, our study presents a unified analysis that can be applied to more complex network structures, as in the case of multilayer and multiplex networks.
cs.SI
cs
Scale-variant topological information for characterizing the structure of complex networks Quoc Hoan Tran,∗ Van Tuan Vo,† and Yoshihiko Hasegawa‡ Department of Information and Communication Engineering, Graduate School of Information Science and Technology, The University of Tokyo, Tokyo 113-8656, Japan (Dated: August 29, 2019) The structure of real-world networks is usually difficult to characterize owing to the variation of topological scales, the nondyadic complex interactions, and the fluctuations in the network. We aim to address these problems by introducing a general framework using a method based on topological data analysis. By considering the diffusion process at a single specified timescale in a network, we map the network nodes to a finite set of points that contains the topological information of the network at a single scale. Subsequently, we study the shape of these point sets over variable timescales that provide scale-variant topological information, to understand the varying topological scales and the complex interactions in the network. We conduct experiments on synthetic and real- world data to demonstrate the effectiveness of the proposed framework in identifying network models, classifying real-world networks, and detecting transition points in time-evolving networks. Overall, our study presents a unified analysis that can be applied to more complex network structures, as in the case of multilayer and multiplex networks. I. INTRODUCTION Characterizing the structure of complex networks is the most fundamental challenge in deciphering network dynamics. The anatomy of a network is quite rele- vant to phenomena occurring in networks, such as the spread of information, epidemic disease, or robustness under attack. Moreover, it has attracted considerable research interest given the numerous applications includ- ing controlling and predicting patterns of dynamics in networks [1 -- 3], evaluating the structural and functional similarities of biological networks [4 -- 6], and detecting transition points in time-evolving networks [7 -- 9]. In a technical sense, the structure of real-world networks is inherently difficult to characterize, firstly, because these networks have complex patterns that can reflect vari- ous topological scales ranging from microscale (individual nodes) to mesocale (community, cores, and peripheries), to macroscale (the whole network) [10 -- 12] [Fig. 1(a)]. For demonstrating these patterns, the conventional sta- tistical measures [13, 14] and methods [10, 15 -- 18] are limited when representing the varying topological scales. Secondly, real-world networks represent complex sys- tems that have dyadic and nondyadic interactions [19 -- 21] [Fig. 1(b)]. Majority of the current methods used for characterizing complex networks focus only on the dyadic interactions, such as detecting the existence of pairwise edges or paths connected by successive edges. Thirdly, real-world networks often suffer from fluctuations caused by external factors [22]. Consequently, the quest for uni- fying the principles underlying the topology of networks emerges only in simple, idealized models [23, 24]. ∗ [email protected][email protected][email protected] Herein, we propose a general framework for character- izing the structure of complex networks, mainly based on the topological data analysis of a diffusion process viewed at variable timescales. We consider a diffusion process in which a random walker moves randomly between nodes in continuous time at the transition rate proportional to the edge weights. The interaction between the nodes via the diffusion process can reflect the structure of the network at different topological scales. For example, a microscale structure is revealed with a small diffusion timescale τ . Increasing τ will increase the ranges of interactions to reflect the mesoscale decomposition of the network, until the macroscale structure is finally captured. By consid- ering the diffusion process at a single specified timescale τ , we can map the network nodes to a finite set of points known as a point cloud in a high dimensional space. In the point cloud, a group of close points represents the unit of interacted nodes in the diffusion process. The shape of this point cloud contains the topological infor- mation of the network at a single topological scale. Based on a topological data analysis method that pro- vides insight into the "shape" of data [25], we build a geometrical model that is primarily a collection of ge- ometrical shapes to reveal the underlying structure of the point cloud. In this geometrical model, two points in the point cloud are connected if their distance is less than or equal to a given threshold. If the threshold is considerably small, only points appear in the geomet- rical model, and no connections are created between points. As the threshold is gradually increased, more pairwise connections are created, and geometrical shapes as line segments, triangles, tetrahedrons, and so on, are added to the geometrical model. In the case where the threshold becomes considerably large, all pairs of points in the point cloud will be connected, and only a giant overlapped geometrical shape remains in the space. To obtain information regarding the "shape" of the point cloud, we focus on the changes of topological structures, such as the merging of connected components, and the emergence and disappearance of loops in the geometrical model as the threshold is increased. Therefore, at each timescale τ , we construct the topological features to mon- itor the emergence and disappearance of the topological structures. We can consider such features as a repre- sentation for the network at a single topological scale (τ -scale). Further, we extend these features by consider- ing the timescale τ as a variable parameter instead of a single fixed value. The extended features, referred to as scale-variant topological features, can reflect the varying topological scales in the complex network. The scale-variant topological features are proven to be robust under perturbation applied to the network, and thus, can serve as discriminative features for character- izing the networks. We input these features in the ker- nel technique in machine learning algorithms to apply to statistical-learning tasks, such as classification and transition points detection. We show that the proposed framework can characterize the parameters that are used to generate the networks through an analysis of several network models. Furthermore, we can classify both syn- thetic and real-world networks with more effective results when compared with other conventional approaches. We further apply the proposed framework to detect the tran- sition points with respect to the topological structure in the time-evolving gene regulatory networks of Drosophila melanogaster. Interestingly, these transition points agree well with the transition points relative to the dynamics obtained from the experimental results on the profiling. II. METHOD A. Scale-variant topological features Let G be an undirected weighted network with N nodes, v1, . . . , vN , and assume that there is a single ran- dom walker moving randomly between the nodes in con- tinuous time. When the walker is located at vi, we as- sume the walker to move to the neighboring node vj at a transition rate wij/Wi, where wij ≥ 0 represents the weight of the edge from vi to vj (i, j ∈ {1, 2, . . . , N}) j=1 wij. Herein, if there is no edge be- tween vi and vj, then wij = 0. Now, let pG,k(τi) de- note the probability of a random walker on vk at time τ that starts from vi. The probability distribution vector, pG(τi) = [pG,1(τi), . . . , pG,N (τi)], is given based on the solution of the Kolmogorov forward equation [26]: and Wi = (cid:80)N dpG(τi) dτ = −pG(τi)LrwG . (1) 2 FIG. 1. Various topological scales and interactions between multiple elements in a complex network. (a) Complex net- works can be analyzed at various topological scales rang- ing from individual nodes (microscale) to the whole network (macroscale). In between the two scales, there is a mesoscale, where we can observe patterns of collectives, cores, and pe- ripheries. (b) Complex network is a representation of a com- plex system having dyadic and nondyadic interactions be- tween its elements. The interactions can be represented as simplices such as segments (for dyadic interactions), filled tri- angles, or filled tetrahedrons (for nondyadic interactions in- volving three or four elements), and so on. Here, LrwG is the random walk Laplacian whose compo- nents lij (i, j ∈ {1, 2, . . . , N}) are given by, 1 lij = −wij/Wi 0 if i = j and Wi (cid:54)= 0 if i (cid:54)= j and vi is adjacent to vj otherwise. (2) The solution for Eq. (1) is pG(τi) = ui exp(−τ LrwG ), where ui = [0, . . . , 0, 1, 0, . . . , 0] with its i-th element the others are equal to 0 (i ∈ being equal to 1; {1, 2, . . . , N}). At each timescale τ , we consider mapping χτ from the set VG = {v1, v2, . . . , vN} of nodes in G to the Euclidean space RN such that, χτ : VG −→ RN vi (cid:55)−→ pG(τi) (i = 1, 2, . . . , N ). (3) The mapped point pG(τi) of nodes vi represents the probability on all nodes at time τ of a random walker that starts from vi. Therefore, pG(τi) can reflect the interaction between vi and other nodes at τ -scale, and characterize the structural role of node vi with multi- resolutions when τ varies. The shape of the point cloud PG(τ ) = {pG(τ1), . . . , pG(τN )} provides valuable in- sights into the dyadic and nondyadic interactions be- tween nodes, and into the structural property of G at τ -scale. Moreover, the distance between two mapped points in PG(τ ) is relatively small if there are many paths 3 FIG. 2. An exemplary of Vietoris -- Rips filtration constructed from a point cloud. A union of balls of radius ε/2 centered at each point is considered. Topological structure changes are tracked, such as the merging of connected components or clusters, and the emergence and disappearance of loops or circular holes present in the space with increasing ε from {0.0, 0.1, 0.2, 0.3, 0.4, 0.6}. For instance, the blue loop Ω1 appears at ε = 0.2 then disappears at ε = 0.4, whereas the red loop Ω2 appears at ε = 0.3 then disappears at ε = 0.6. For each ε, the number of connected components and the number of loops are listed underneath. connecting two original nodes in G. The nodes that be- long to the same community or cluster in the network tend to form a group of close points in PG(τ ). Information on the shape of the point cloud can be obtained quantitatively using the method of persistent homology from computational topology [25, 27 -- 29]. The idea is to construct from PG(τ ) the ε-scale Vietoris -- Rips complex model VR(PG(τ ), ε), which is a set of simplices built with a nonnegative threshold ε [30]. Here, every collection of n + 1 affinely independent points in PG(τ ) forms an n-simplex in VR(PG(τ ), ε) if the pairwise dis- tance between the points is less than or equal to ε. To build the Vietoris -- Rips complex model, we consider a union of balls of radius ε/2 centered at each point in PG(τ ) (Fig. 2). Each simplex is built over a subset of points if the balls intersect between every pair of points. These simplices can represent the nondyadic interac- tions of nodes at τ -scale. In turn, the constructed com- plex VR(PG(τ ), ε) provides information on the topological structure of PG(τ ) associated with ε. Now, starting with ε = 0, the complex contains only the 0-simplices, i.e., the discrete points. As ε increases, connections exist between the points, enabling us to obtain a sequence of embedded complexes called filtration with edges (1-simplices), and triangular faces (2-simplices) are included into the com- plexes. Moreover, if ε becomes considerably large, all the points gets connected with each other, whereby no useful information can be conveyed. Persistent homology tracks the variation of topological structures over the filtration. We refer to the topologi- cal structures, i.e., "holes" in high-dimensional data, as connected components, tunnels or loops (e.g., a circle of torus), cavities or voids (e.g., the space enclosed by a sphere), and so on. In persistent homology, a hole is iden- tified via the cycle that surrounds it. In a given manifold, a cycle is a closed submanifold, and a boundary is a cycle that is also the boundary of a submanifold. Holes corre- spond to cycles that are not themselves boundaries. For instance, a disk is a two-dimensional surface with a one- dimensional boundary (i.e., a circle). If we puncture the disk, we obtain a one-dimensional hole that is enclosed by FIG. 3. (a) -- (f) Sample manifolds with the number of zero-, one-, and two-dimensional holes listed underneath. (a) The connected component is a zero-dimensional hole. (b)(c) A one-dimensional hole is obtained by puncturing a disk. (d)(e) A two-dimensional hole is obtained by emptying the inside of a ball. (f) Two one-dimensional holes are illustrated as two circles in a torus. (g) Example of a simplicial complex con- taining 19 points (0-simplices), 24 edges (1-simplices), eight triangular faces (2-simplices), and one filled tetrahedron (3- simplices). There are two one-dimensional holes Ω1 and Ω2 in the complex. In this example, all loops B → C → D → B, A → B → C → D → A, B → E → C → D → B, and A → B → E → C → D → A are 1-cycles because they are closed 1-chains, that is, the closed collection of edges (1-simplices). Each cycle is not a boundary of any 2-chain (collection of triangular faces); thus, it characterizes a one- dimensional hole. Note that these cycles characterize the same hole, Ω1, because the difference between the two of cy- cles is the boundary of a 2-chain. 4 FIG. 4. (a) An undirected network comprising four clusters with more connections within intra-clusters than between inter- clusters. (b) For each τ , the nodes are mapped onto a point cloud such that the distances of the mapped points of the nodes in the same clusters are smaller than those between the nodes belonging to different clusters. These distances decrease as τ increases with τ1 < τ2 < τ3. (c) The topological features at each τ characterize the shape of the point cloud. These features are displayed as a two-dimensional persistence diagram at each τ . (d) The scale-variant topological features, i.e., the three- dimensional persistence diagram, are obtained by integrating two-dimensional diagrams at varying τ . The birth-scale and death-scale axes of the diagrams are represented at the logarithmic scale. the circle, which is no longer a boundary [Fig. 3(b)(c)]. Similarly, a filled ball is a three-dimensional object with a two-dimensional boundary (i.e., a surface sphere). If we empty the inside of the ball, we obtain a two-dimensional hole that is enclosed by the surface sphere, which is no longer a boundary [Fig. 3(d)(e)]. Based on these observations, we can describe and classify holes in the simplicial complex according to the cycles that enclose holes. Given a simplicial complex, we define an n-chain as a collection of n-simplices in the complex. There- fore, in a simplicial complex, we can define an n-cycle as a closed n-chain and an n-boundary as an n-cycle, which is also the boundary of an (n + 1)-chain. Here, a 0-cycle is a connected component, a 1-cycle is a closed loop, and a 2-cycle is a shell. For instance, in Fig. 3(g), all loops A → B → D → A, B → C → D → B, and A → B → C → D → A are 1-cycles because they are the closed collection of edges (1-simplices). Fur- thermore, the loop A → B → D → A is a 1-boundary because it bounds a triangular face (2-simplex). An n- dimensional hole corresponds to an n-cycle that is not a boundary of any (n + 1)-chain in the simplicial com- plex. For instance, as illustrated in Fig. 3(g), the loops B → C → D → B and A → B → C → D → A char- acterize one-dimensional holes because these loops are 1-cycles but are themselves not 1-boundaries. Moreover, two n-cycles characterize the same hole when together they bound an (n + 1)-chain (i.e., their difference is an n-boundary). Intuitively, the connected components can be considered as zero-dimensional holes, the loops and tunnels as one-dimensional holes, and the cavities and voids as two-dimensional holes. We consider the emergence and disappearance of holes in the Vietoris -- Rips filtration of PG(τ ) as topological fea- tures for the complex network G at τ -scale. Such fea- tures can be observed using multi-set points in a two- (l),τ (G), which is cal- dimensional persistence diagram, D(2) culated for l-dimensional holes. In this diagram, each point (b, d) denotes a hole that appears at the birth-scale, ε = b, and disappears at the death-scale, ε = d (see Appendix A). Observing the above-defined features, i.e., the two-dimensional persistence diagrams with varying τ can provide insights into the variation of topological structures, thereby reflecting the variation of topologi- cal scales in the network. For instance, the persistence diagrams of zero-dimensional and one-dimensional holes contain information on clusters, connected components, or loops in the point cloud PG(τ ), and thus lead to an understanding of the formation of communities and loops in the network at the τ -scale. We construct scale-variant topological features by regarding τ as a variable param- eter rather than as a single fixed value. In Fig. 4(a), we consider an undirected network that comprises four clusters with more intra-cluster connec- tions than inter-cluster ones. Pairwise distances of the mapped points of the nodes belonging to the same clus- ters are smaller than the distances between the nodes belonging to different clusters. These distances decrease as values of τ increase [Fig. 4(b)]. In the point cloud, the hole patterns appear with different sizes in different groups of points as τ varies. We obtain the scale-variant topological features that reflect the variation of topo- logical scales by considering the two-dimensional per- sistence diagrams with the varying τ . Consider τ in a set T = {τ1, τ2, ..., τK}, where 0 < τ1 < τ2 < ··· < τK are predefined or sampled values from the contin- uous domain of timescales. The scale-variant topolog- ical features, i.e., the three-dimensional persistence di- agram of l-dimensional holes for network G, are de- (l),τ (G), τ ∈ fined by D(3) T } [Fig. 4(d)]. (l) (G) = {(b, d, τ ) (b, d) ∈ D(2) B. Robustness of scale-variant topological features We show that the scale-variant topological features are robust with respect to some perturbations of the network. To describe this robustness, we use the bottleneck dis- tance, d(3) B,ξ, a metric structure introduced in Ref. [31] for comparing three-dimensional persistence diagrams (see Appendix B). Herein, ξ is a positive rescaling coeffi- cient introduced to adjust the scale difference between the pointwise distance and time. We consider two undi- rected networks G and H with the same number of nodes. Based on Refs. [32, 33], we can prove that the upper limit (l) (H) of the bottleneck distance between D(3) is governed by the matrix 2-norm of the difference be- tween LrwG and LrwH (see Appendix B): (l) (G) and D(3) d(3) B,ξ(D(3) (l) (G), D(3) (l) (H)) ≤ 2τK(cid:107)LrwG − LrwH (cid:107)2. (4) Herein, (cid:107)A(cid:107)2 denotes the matrix 2-norm of matrix A. The inequality of Eq. (4) indicates that our scale-variant topological features are robust with respect to the per- turbations applied to the random walk Laplacian matrix. Therefore, these features can be used as discriminative features for characterizing networks. C. Kernel method for scale-variant topological features In the statistical-learning tasks, many learning algo- rithms require an inner product between the data in the vector form. Because the space of three-dimensional per- sistence diagrams is not a vector space, we deem it not straightforward to use the scale-variant topological fea- tures in the statistical-learning tasks. This problem can be mitigated through the use of a feature map Φ from the positive-definite kernel, which maps the scale-variant topological features to a space called kernel-mapped fea- ture space Hb where we can define the inner product [31]. In general, choosing the explicit form of mapping a per- sistence diagram E to ΦE in the kernel-mapped feature space is not discernible. Nonetheless, we can use a ker- nel function to compute the inner product in the kernel- mapped feature space, leaving the mapping function and the kernel-mapped feature space completely implicit. Given a positive bandwidth σ and a positive rescaling coefficient ξ introduced to adjust the scale difference be- tween the point-wise distance and time (see Appendix C), 5 based on Refs. [31, 34], we define the kernel Kσ,ξ between two three-dimensional persistence diagrams, E and F , as (cid:33) , (cid:32) (cid:88) q(1)∈E q(2)∈F Kσ,ξ(E, F ) = √ 1 2π σ − d2 ξ (q(1),q(2)) 2σ2 e − d2 − e ξ (q(1), ¯q(2)) 2σ2 (5) ξ(q(1), q(2)) = b1 − b22 +d1 − d22 + ξ2τ1 − τ22, where d2 ξ(q(1), ¯q(2)) = b1 − d22 + d1 − b22 + ξ2τ1 − τ22, d2 with q(1) = (b1, d1, τ1) and q(2) = (b2, d2, τ2) , ¯q(2) = (d2, b2, τ2). In our experiments, we use the normalized version of the kernel, which is calculated as Kσ,ξ(E, F ) ← Kσ,ξ(E, F )/ (cid:113)Kσ,ξ(E, E)Kσ,ξ(F, F ). (6) Because Eq. (5) and Eq. (6) define the positive-definite kernels in the set of three-dimensional persistence di- agrams [31], according to Moore -- Aronszajn's theo- rem [35], there exists a mapping function Φ such that the inner product (cid:104)ΦE, ΦF(cid:105)Hb between ΦE and ΦF in the kernel-mapped feature space Hb is Kσ,ξ(E, F ). There- inner product fore, we can use the explicit form of (cid:104)ΦE, ΦF(cid:105)Hb in the statistical-learning tasks. (l),i (l),1, D(3) (l),M}, where D(3) Furthermore, we can use the above-defined ker- nel to estimate the transition points with respect to the topological structure in the series of networks G1,G2, . . . ,GM . Consider a collection of diagrams D(l) = {D(3) (l),2, . . . , D(3) is the three-dimensional persistence diagram of l-dimensional holes for network Gi (i = 1, 2, . . . , M ). Here, we define the transition with respect to the topological structure in G1,G2, . . . ,GM as they abruptly change at given unknown instants (change-points) in D(l). We use the kernel change-point detection method [36] to solve the change-point regression problem with . Given an index s (1 < s ≤ ΦD(3) M ), we calculate the kernel Fisher discriminant ratio κM,s(D(l)), which is a statistical quantity to measure the dissimilarity between two classes assumptively de- fined by two sets of diagrams having index before and from s (see Appendix D). Here, the index s achieving the maximum of κM,s(D(l)) corresponds to the estimated transition point. , . . . , ΦD(3) , ΦD(3) (l),2 (l),M (l),1 III. RESULTS A. Understanding variations of the parameters of network models We now investigate how the scale-variant topologi- cal features can reflect variations of the parameters of network models. We generate networks using Girvan -- Newman (GN) [37], Lancichinetti -- Fortunato -- Radicchi (LFR) [38, 39], Watts -- Strogatz (WS) [40], Erdos -- R´enyi (ER) [41], Lancichinetti -- Fortunato -- Radicchi with hi- erarchical structure (LFR -- H) [17], and Sales -- Pardo (SP) [16] models. We focus on the model parameters that represent the topological scale of these networks, such as the ratio r between the probability of inter- (pout) and intra-community links (pin) (GN), mixing rate µ (LFR), rewiring probability β (WS), pair-link proba- bility plink (ER), mixing rate µmacro for macrocommuni- ties (LFR -- H), and ρ, which estimates the separations be- tween topological scales in the SP model. The model pa- rameters are varied as r = pout/pin = 0.01, 0.02, . . . , 1.0; µ = 0.01, 0.02, . . . , 1.0; β = 0.00, 0.01, . . . , 1.0; plink = 0.020, 0.021, . . . , 0.1; µmacro = 0.01, 0.02, . . . , 0.2 and; ρ = 0.05, 0.10, . . . , 2.0. We generate 10 network realiza- tions for each of the models GN, LFR, WS, ER, and SP, and 20 network realizations for the LFR -- H model at each value of the corresponding model parameter. There are 128 nodes in the GN, LFR, WS, and ER networks, 300 nodes in each LFR -- H network, and 640 nodes in each SP network. We compute three-dimensional persistence diagrams for one-dimensional holes with τ1 = 1, τ2 = 2, . . . , τ100 = 100, and then calculate the kernel defined in Eq. (5) for the collection of generated networks in each model. Fig- ure 5 shows the principal components projections from the kernel-mapped feature space of each model, at which the points with different colors represent the networks generated from different values of the model parameters. In WS, ER, LFR -- H, and SP models, the scale-variant topological features reflect a variation of the parameters associated with the topological scales mainly that the points located at different positions have different colors [Fig. 5(c) -- (f)]. In GN and LFR models, there are varia- tions in the topological scales of the network as r and µ vary from 0 (four separate groups) to 1 (a purely random graph). Using the kernel Fisher discriminant ratio cal- culated for the series of persistence diagrams, we obtain the transition with respect to the topological structure at r = 0.12 and µ = 0.26 for the series of networks obtained at increasing r and µ (Fig. 6). These values correspond to the boundaries between the identifiable phases, where parameters can be identified from the kernel-mapped fea- ture space and the non-identifiable phases [Fig. 5(a) -- (b)]. B. Identification of network models Here we show that the scale-variant topological fea- tures can classify the networks generated from different models, even if they have similar global statistical mea- sures. We study the configuration model in Ref. [42], which generates random networks (known as configura- tion networks) having the same sequences of node de- grees as a given network. The labels of the networks generated from GN, LFR, and WS models are denoted by GN-org, LFR-org, and WS-org, respectively, while their corresponding configuration networks labels are de- noted by GN-conf, LFR-conf, and WS-conf. We com- 6 FIG. 5. Principal components projection from the kernel- mapped feature space of the scale-variant topological features in each network model. Points with different colors represent networks generated from different values of the model parame- ters. Networks are generated from (a) Girvan -- Newman (GN), (b) Lancichinetti -- Fortunato -- Radicchi (LFR), (c) Watts -- Strogatz (WS), (d) Erdos -- R´enyi (ER), (e) Lancichinetti -- Fortunato -- Radicchi hiearchical (LFR -- H), and (f) Sales -- Pardo (SP) models. Parameters for these models vary as follows: r = pout/pin = 0.01, 0.02, . . . , 1.0 (GN); µ = 0.01, 0.02, . . . , 1.0 (LFR); β = 0.00, 0.01, . . . , 1.0 (WS); plink = 0.020, 0.021, . . . , 0.1 (ER); µmacro = 0.01, 0.02, . . . , 0.2 (LFR -- H) and; ρ = 0.05, 0.10, . . . , 2.0 (SP). FIG. 6. Kernel Fisher discriminant ratio κ estimated for the series of (a) Girvan -- Newman networks and (b) Lancichinetti -- Fortunato -- Radicchi networks. The transition point is de- tected with respect to the topological structure of networks from the series of persistence diagrams for one-dimensional holes obtained when r = pout/pin is increased as r1 = 0.01, r2 = 0.02, . . . , r100 = 1.0 (for Girvan -- Newman net- works), and µ is increased as µ1 = 0.01, µ2 = 0.02, . . . , µ100 = 1.0 (for Lancichinetti -- Fortunato -- Radicchi networks). The maximum value of κ is marked with the orange point of the dashed line. The transition point is the value of the parameter that achieves the maximum value of κ. The transition points are obtained as rc = 0.12 (for Girvan -- Newman networks) and µc = 0.26 (for Lancichinetti -- Fortunato -- Radicchi networks). 7 FIG. 7. Networks from Girvan -- Newman, Lancichinetti -- Fortunato -- Radicchi, and Watts -- Strogatz models are generated with labels denoted by GN-org, LFR-org, and WS-org, respectively; their corresponding configuration networks labels are denoted by GN-conf, LFR-conf, and WS-conf. (a) The kernel principal components projection of the scale-variant topological features for these networks. (b)(c) Variation of high-order features, i.e., degree assortativity coefficient, maximum modularity, and average clustering coefficient for (b) all generated networks, and (c) configuration networks. The different colors represent the networks generated from different models. pute the three-dimensional persistence diagrams for one- dimensional holes of these networks with timescale values τ1 = 1, τ2 = 2, . . . , τ100 = 100. Accordingly, we cal- culate the kernel for these diagrams, then perform three- dimensional projections of the principal components from the kernel-mapped feature space [Fig. 7(a)]. Here, points with different colors represent networks generated from different models. In Fig. 7(a), the points appear to be distinguishable by their colors, thus, we can conclude that the scale-variant topological features can character- ize the differences with respect to the topological struc- ture between networks, and even between configuration networks generated from different models. While the node degree distribution in a configuration network is the same as the given network, the topological correlations between the nodes are destroyed. Therefore, we investigate conventional higher-order features of the network, such as the degree assortativity coefficient, the average clustering coefficient, and the maximum modu- larity obtained via Louvain heuristic [37, 43]. Figure 7(b) highlights the variation of these features in our generated networks. Specifically in Fig. 7(b), the points with cor- responding labels GN-org, LFR-org, and WS-org appear to be distinguishable with others, thus, it becomes easy to distinguish between networks generated from differ- ent models and between a given network with its corre- sponding configuration network. However, if we look at the variation of these features for configuration networks [Fig. 7(c)], we note that the conventional higher-order features of the network cannot capture the apparent dif- ferences in topological structure between the configura- tion networks, even when their corresponding original networks are generated from different mechanics models. In contrast with this observation and as highlighted in Fig. 7(a), the scale-variant topological features can pro- vide a better representation of the topological structure of networks. Accordingly, we quantify to what extent the scale- variant topological features identify the networks gener- ated from different models. We employ the scale-variant method, which uses the scale-variant topological features to classify networks into six labels, namely, GN-org, LFR- org, WS-org, GN-conf, LFR-conf, and WS-conf. We ran- domly split 10 networks generated at each value of the model parameters into two, i.e., five networks for training and five for testing, and apply the support vector ma- chine [44] for classification in the kernel-mapped feature space. Figure 8(a) depicts the average normalized con- fusion matrix over 100 random splits, where the row and column labels are the predicted and true labels, respec- tively. Figure 8(a) shows a reasonably high accuracy for identifying the networks generated from different mod- els with the following labels: GN-org (99.2%), LFR-org (99.2%), WS-org (99.4%), GN-conf (94.8%), LFR-conf (99.4%), and WS-conf (96.6%). This result demonstrates that the scale-variant topological features can reflect well on the behaviors of these network models. To highlight the benefits of the scale-variant method, we compare it with the other conventional methods using common network measures [13, 45 -- 48], well- recognized graph kernels [49], and topological fea- tures calculated at an average fixed topological scale. We describe the common network measures in Ap- pendix E as well as the graph kernels that are based on random walks (KStepRW, GeometricRW, Exponen- tialRW) [50, 51], paths (ShortestPath) [52], limited- sized subgraphs (Graphlet) [53], and subtree patterns (Weisfeiler -- Lehman [54]) in Appendix F. Moreover, we consider two variations of topological features evaluated at an average fixed topological scale to show the advan- 8 C. Classification of the real-world network data Next, we apply the scale-variant topological features to the classification of chemoinformatics network datasets (MUTAG, BZR, COX2, DHFR, FRANKENSTEIN, NCI1, NCI109), bioinformatics dataset (PROTEIN), and large real-world social network datasets, such as movie collaboration networks (IMDB -- BINARY, IMDB -- MULTI), scientific collaboration networks (COLLAB), and networks obtained from online discussion threads on Reddit (REDDIT -- BINARY, REDDIT -- MULTI -- 5K) [56 -- 63]. The aggregate statistics for these datasets is pro- vided in Table I. We compute three-dimensional per- sistence diagrams with τ1 = 1, . . . , τ50 = 50, and use the multiple kernel learning method [64] to learn the linear combination of the normalized kernels for zero- dimensional and one-dimensional holes. Subsequently, we compare our scale-variant method with methods em- ploying the common network measures and the scale- average and scale-norm-average methods. Likewise, we compare the scale-variant method with many state-of- the-art algorithms in classifying graphs and networks as follows: (i) random walk kernels based on match- ing walks in two graphs (KStepRW, GeometricRW, ExponentialRW) [50, 51], (ii) the shortest path ker- nel (ShortestPath) [52], (iii) the graphlet count kernel (Graphlet) [53], (iv) the Weisfeiler -- Lehman subtree ker- nel (Weisfeiler -- Lehman) [54], (v) the deep graph kernel (DGK) [62], (vi) the PATCHY-SAN convolutional neural network (PSCN) [65], and (vii) the graph kernel based on return probabilities of random walks (RetGK) [66]. Here, in order to make a fair comparison with these meth- ods, as presented in the literature Ref. [66], we apply the support vector machine [44] as the classifier in the kernel-mapped feature space. Moreover, we perform 10- fold cross-validations, where a single 10-fold is created by randomly shuffling the dataset, and then splitting it into 10 different parts (folds) of equal size. In every single 10-fold, we use nine folds for training and one for testing and averaging of the classification accuracy of the test set obtained throughout the folds. To reduce the variance of the accuracy due to the splitting of data, we repeat the whole process of cross-validation for 10 times, and then report the average and standard deviation of the classi- fication accuracies. The social network datasets contain networks that do not have information, such as labels and attributes of nodes. For movie collaboration datasets (IMDB -- BINARY, IMDB -- MULTI), collaboration ego-networks are generated for each actor (actress). In each network, two nodes representing the actors or actresses are con- nected when they appear in the same movie. The task is to identify whether a given ego-network of an actor (actress) belongs to one of the predefined movie gen- res. For scientific collaboration dataset (COLLAB), col- laboration ego-networks are generated for different re- searchers, with the objective of determining whether the collaboration network of a researcher belongs to FIG. 8. Classification of networks generated from Girvan -- Newman, Lancichinetti -- Fortunato -- Radicchi, and Watts -- Strogatz models, with labels denoted by GN-org, LFR-org, and WS-org, respectively; their corresponding configuration networks labels are denoted by GN-conf, LFR-conf, and WS- conf. (a) Average normalized confusion matrix of the scale- variant method over 100 random train-test splits of the data. The 10 networks generated at each value of the model param- eters are split into two, with five networks for training and the other five for testing. (b) Average accuracies (%) of the clas- sification methods over 100 random train-test splits at each proportion of the training data (bold lines). The shaded ar- eas indicate the confidence intervals of one standard deviation calculated using the same ensemble of runs. i=1 matrix ∆avg = (1/K)(cid:80)K ∆avg = (1/K)(cid:80)K tages of using variable timescales. Also, instead of us- ing a particular timescale, we use the scale-average and the scale-norm-average methods to preserve the geomet- rical persistence of the point cloud. The former uses the topological features extracted from the average distance i=1 ∆τi, whereas the latter uses the features from the average normalized distance matrix ∆τi [26]. Herein, ∆τi denotes the distance matrix of pairwise Euclidean distances between points in PG(τi), whereas ∆τi is obtained by dividing ∆τi by its maximum element. We randomly split the 10 networks generated at each value of the model pa- rameters into proportions for training and for testing, and employ the support vector machine as the classifier to both the common network measures and the kernel- mapped feature space. We compute the average clas- sification accuracy over 100 random splits at different proportions of the training data. Figure 8(b) depicts the performance of the methods with accuracies greater than 70%, mainly illustrating that the scale-variant method outperforms the other methods in terms of classification accuracy. Moreover, the scale-variant method is shown to achieve approximately 97% of accuracy, even with a small size of the training dataset, e.g., only 10% of all the data, whereas the other methods yielded accuracies of at most 84%. These results validate the effectiveness and the reliability of our scale-variant method in cap- turing the differences between network structures. The source code used in our experiments is publicly available on GitHub [55]. 9 Dataset MUTAG BZR COX2 DHFR FRANKENSTEIN NCI1 NCI109 PROTEINS IMDB -- BINARY IMDB -- MULTI COLLAB REDDIT -- BINARY REDDIT -- MULTI -- 5K TABLE I. Summary statistics of the real-world network datasets. Type of networks Number of networks Number of classes Number of networks in each class Avg. number Avg. number of nodes of edges Chemoinformatics Chemoinformatics Chemoinformatics Chemoinformatics Chemoinformatics Chemoinformatics Chemoinformatics Bioinformatics Social Social Social Social Social 188 405 467 756 4337 4110 4127 1113 1000 1500 5000 2000 4999 2 2 2 2 2 2 2 2 2 3 3 2 5 (63,125) (319, 86) (365, 102) (295, 461) (2401, 1936) (2053, 2057) (2048, 2079) (663, 450) (500, 500) (500, 500, 500) (2600, 775, 1625) (1000, 1000) (1000, 1000, 1000, 1000, 999) 17.93 35.75 41.22 42.43 16.90 29.87 29.68 39.06 19.77 13.00 74.49 429.63 508.52 19.79 38.36 43.45 44.54 17.88 32.30 32.13 72.82 96.53 65.94 2457.78 497.75 594.87 TABLE II. Average and standard deviation (mean±sd) of the classification accuracy (%) for social network datasets IMDB -- BINARY, IMDB -- MULTI, COLLAB, REDDIT -- BINARY, and REDDIT -- MULTI -- 5K. These social network datasets contain networks that do not have information such as labels and attributes of nodes. In each dataset, the best and the second-best scores are colored in dark pink and light pink, respectively. The notation (∗) indicates that the kernel computation with the implementation in [49] is not completed after 72h. Method Scale-variant Scale-average Scale-norm-average CommonMeasures KStepRW GeometricRW ExponentialRW ShortestPath Graphlet Weisfeiler -- Lehman DGK PSCN RetGK IMDB -- BINARY 74.2 ± 0.9 67.7 ± 0.8 70.2 ± 0.7 72.0 ± 0.2 60.0 ± 0.8 67.0 ± 0.8 65.2 ± 1.1 58.2 ± 1.0 65.9 ± 1.0 70.8 ± 0.5 67.0 ± 0.6 71.0 ± 2.3 71.9 ± 1.0 IMDB -- MULTI 49.9 ± 0.3 44.9 ± 0.4 44.9 ± 0.4 44.9 ± 0.3 43.8 ± 0.7 45.2 ± 0.4 43.1 ± 0.4 42.0 ± 0.6 43.9 ± 0.4 49.8 ± 0.5 44.6 ± 0.5 45.2 ± 2.8 47.7 ± 0.3 COLLAB 79.6 ± 0.3 71.4 ± 0.1 62.6 ± 0.1 75.2 ± 0.1 (∗) (∗) (∗) 58.5 ± 0.2 72.8 ± 0.3 74.8 ± 0.2 73.1 ± 0.3 72.6 ± 2.2 81.0 ± 0.3 REDDIT -- BINARY 87.8 ± 0.3 79.8 ± 0.3 73.9 ± 0.2 85.7 ± 0.3 (∗) (∗) (∗) 81.9 ± 0.1 77.3 ± 0.2 68.2 ± 0.2 78.0 ± 0.4 86.3 ± 1.6 92.6 ± 0.3 REDDIT -- MULTI -- 5K 53.1 ± 0.2 51.5 ± 0.2 48.7 ± 0.3 56.6 ± 0.2 (∗) (∗) (∗) 49.0 ± 0.1 41.0 ± 0.2 51.2 ± 0.3 41.3 ± 0.2 49.1 ± 0.7 56.1 ± 0.5 TABLE III. Average and standard deviation (mean±sd) of the classification accuracy (%) for chemoinformatics and bioin- formatics datasets MUTAG, BZR, COX2, DHFR, FRANKENSTEIN, PROTEINS, NCI1, and NCI109. Presented is only a comparison of the methods using the connectivity between nodes. In each dataset, the best and the second-best scores are colored in dark pink and light pink, respectively. Method Scale-variant Scale-average Scale-norm-average CommonMeasures KStepRW GeometricRW ExponentialRW ShortestPath Graphlet Weisfeiler -- Lehman MUTAG 88.2±1.0 83.0±1.3 84.6±0.9 84.9±0.3 81.8±1.3 82.9±0.5 83.0±0.5 81.8±0.9 83.0±0.3 83.8±0.8 BZR 85.9±0.9 78.9±0.4 81.7±0.2 82.8±0.3 86.5±0.5 79.2±0.4 79.5±0.5 85.6±0.6 78.8±0.0 84.0±1.2 COX2 78.4±0.4 78.2±0.0 78.2±0.0 78.2±0.0 78.0±0.1 78.2±0.0 78.2±0.0 78.1±0.1 78.2±0.0 78.3±0.2 DHFR 78.8±0.7 66.9±0.5 61.0±0.0 71.1±0.6 73.3±0.4 71.4±1.9 74.6±0.3 73.2±0.5 61.0±0.0 77.2±0.6 FRANKEN STEIN 69.0±0.2 61.3±0.2 60.2±0.1 62.0±0.2 65.4±0.2 55.4±0.1 55.4±0.1 63.8±0.1 55.4±0.0 62.3±1.2 PROTEINS 72.6±0.4 70.8±0.2 71.7±0.4 75.3±0.3 71.8±0.1 72.2±0.1 72.2±0.1 72.0±0.3 70.6±0.1 71.3±0.5 NCI1 71.3±0.4 66.5±0.2 65.2±0.1 67.8±0.3 51.7±0.7 62.6±0.0 62.7±0.1 64.2±0.1 62.4±0.2 63.2±0.1 NCI109 69.8±0.2 65.8±0.2 65.7±0.1 65.4±0.1 50.4±0.0 63.2±0.0 63.2±0.1 61.1±2.0 62.1±0.1 63.6±0.1 one of the research fields as High Energy Physics, Con- densed Matter Physics, or Astro Physics. For Reddit datasets, each network is generated from an online dis- cussion thread where nodes correspond to users, and edges correspond to the responses between users. Here, the task is to identify whether a given network belongs to a question/answer -based community or a discussion- based community (REDDIT -- BINARY), or one of five predefined subreddits (REDDIT -- MULTI -- 5K). Table II presents the average accuracies along with their standard deviations over ten 10-folds. The results for Weisfeiler -- Lehman kernel, DGK kernel, PSCN, and RetGK kernel are taken from Ref. [66]. Specifically in Table II, the best and the second-best average accuracy scores for each so- cial network dataset are colored dark pink and light pink, respectively. For the social network datasets, the scale- variant method either is comparable or outperforms the state-of-the-art classification methods. For the chemoinformatics network datasets, we predict the function classes of chemical compounds in chemoin- formatics. Here, molecules are represented as small networks with nodes as atoms and edges as covalent bonds. For the bioinformatics dataset (PROTEINS), proteins are represented as networks, where the nodes are secondary structure elements and the edges repre- sent the neighborhood within the 3-D structure or along the amino acid chain. We aim to classify the function class membership of the protein sequences into enzymes and non-enzymes. Note that these chemoinformatics and bioinformatics network datasets contain information on the labels and attributes of the nodes, which is leveraged in DGK, PSCN, and RetGK methods. For a fair com- parison of characterizing the structure of networks, we present in Table III the average accuracies and standard deviations of the methods that only use the connectivity between nodes. In the table, the best and the second-best average accuracy scores for each dataset are colored dark pink and light pink, respectively. Here, on average, the scale-variant method outperforms all the other methods, and offers the best results for six of the eight datasets and the second-best result for two more. Further, the clas- sification accuracies of the scale-variant method on MU- TAG, FRANKENSTEIN, NICI1, and NCI109 datasets are at least two percentage points higher than those of the best baseline algorithms. These results suggest that the scale-variant method can be considered as an effective approach in classifying real-world network data. D. Detection of transition points in the time-evolving gene regulatory network We apply the scale-variant topological features to de- tect transition points between the developmental stages of Drosophila melanogaster in the time-evolving gene reg- ulatory networks. Particularly, we use a genome-wide mi- croarray profiling, which shows the expression patterns of 4028 genes simultaneously measured during the develop- 10 FIG. 9. Three-dimensional persistence diagrams of one- dimensional holes for the Drosophila melanogaster gene reg- ulatory networks spanning from (a) t = 29 to t = 32, (b) t = 39 to t = 42, and (c) t = 58 to t = 61. The birth-scale and the death-scale axes of the diagrams are represented at the logarithmic scale. mental stages of Drosophila melanogaster [67]. Herein, 66 time points are chosen from the full developmental cycle: embryonic stage (1 -- 30), larval stage (31 -- 40), pupal stage (41 -- 58), and adulthood stage (59 -- 66) [68]. We use ker- nel reweighted logistic regression method [69] to recon- struct the time-evolving networks for 588 genes, which are known to be related to the developmental process based on their gene ontologies. Therefore, the networks are reconstructed via logistic regression using only binary information, i.e., activation or non-activation of gene ex- pression data. For the likelihood being maximized for network inference, a kernel weight function is employed to obtain the dynamic networks structures with smooth transition at adjacent time points [69]. We use the scale-variant topological features to de- tect the transition points with respect to the topologi- cal structure of the constructed time-evolving networks. Consequently, the detected transition points agree with the transition points in the dynamics of Drosophila melanogaster. Here, the change points between the de- velopmental stages of Drosophila melanogaster chosen in the experiment are referred to as the transition points in 11 and tc = 31, relatively close to the experimentally known transition time point t1 = 31. Furthermore, from the lar- val stage to the pupal stage, and from the pupal stage to the adulthood stage, we obtain the transition time points in the topological structure as tc = 41 and tc = 59, re- spectively. These points agree with the experimentally known transition time points t2 = 41 and t3 = 59. E. Considerations on the maximum value of the diffusion timescale We investigate the maximum timescale τmax to exam- ine the length of the diffusion process must be explored. Note that the timescale functions as a resolution parame- ter to unravel the multi-scale and hierarchical structure of a network. A small timescale restricts random walkers in local interactions, which produces many communities in the network. In contrast, a large timescale leads to a sub- stantial contribution of long walks and therefore yields a small number of communities because random walkers tend to remain in these communities for a long time. This resolution problem has been addressed in Refs. [70, 71], in which the relevance of partitions as community structures is characterized over timescales. Instead of characteriz- ing the network structure at a fixed resolution, the scale- variant topological features obtained with a sufficiently large τmax can contain information about the network at multiple resolutions. Here, we study the method for determining τmax through the spectral decomposition of the normalized Laplacian of the network. Denoting the eigenvalues of LrwG by λi in increasing order 0 = λ1 ≤ λ2 ≤ . . . ≤ λn, the spectral decomposition of LrwG is expressed as follows: LrwG = λiθ(cid:62) i θi, (7) n(cid:88) i=1 n(cid:88) where θi is the eigenvector associated with λi. Therefore, the solution for Eq. (1) can be written as follows: pG(τi) = exp (−λiτ )uiθ(cid:62) i θi. (8) i=1 From Eq. (8), each eigenvalue λi of LrwG is associated with a decaying mode in the diffusion process with the charac- teristic timescale τ = 1/λi. Therefore, if there are large gaps between eigenvalues, for example if the k0 small- est eigenvalues {λ1 = 0, . . . , λk0} are greatly separated from the remaining eigenvalues (λk0 (cid:28) λk0+1 = λsep), we can ignore the terms associated with {λk0+1, . . . , λn} in Eq. (8) at τ satisfying τ λsep (cid:29) 1. Thus, there is no significant change in the formation of clusters or loops in the mapped point cloud PG(τ ), nor in the formation of communities in the network at the τ -scale. There- fore, as a heuristic method, if we consider τmax such that τmaxλsep (cid:29) 1, the structure of the network is well char- acterized via the scale-variant topological features. for Kernel Fisher discriminant FIG. 10. ratio κ calcu- lated from the three-dimensional persistence diagrams of one-dimensional holes the time-evolving Drosophila melanogaster gene regulatory networks. Transition time points are detected in the sliding windows spanning between two different developmental stages. In each window, the tran- sition time point tc is the time index of the maximum κ value marked with the orange point of the dashed line. (a) Win- dows from the embryonic stage to the larval stage with time points 26 → 36 (tc = 28), 27 → 37 (tc = 28), and 28 → 38 (tc = 31). (b) Windows from the larval stage to the pupal stage with time points 36 → 46 (tc = 41), 37 → 47 (tc = 41) and 38 → 48 (tc = 41). (c) Windows from the pupal stage to the adulthood stage with time points 54 → 64 (tc = 59), 55 → 65 (tc = 59) and 56 → 66 (tc = 59). the dynamics: t1 = 31 between the embryonic stage and the larval stage, t2 = 41 between the larval stage and the pupal stage, and t3 = 59 between the pupal stage and the adulthood stage. For the network of each time point, three-dimensional persistence diagrams are computed for one-dimensional holes with τ1 = 1, . . . , τ100 = 100. Fig- ure 9 shows the examples of the diagrams for networks spanning from (a) t = 29 to t = 32, (b) t = 39 to t = 42, and (c) t = 58 to t = 61. Here, note the transformation of the patterns in scale-variant topologi- cal features along with time points. Such patterns trans- formation corresponds with the transformation in the topological structure of time-evolving reconstructed net- works. Moreover, we quantify the transition points with respect to the topological structure by observing the slid- ing windows spanning two different developmental stages of Drosophila melanogaster. In each sliding window, we compute the kernel Fisher discriminant ratio [36] for each time point from the three-dimensional persistence dia- grams of the networks (see Appendix D). The time point of the maximum ratio can be identified as the transi- tion time point tc in each window (Fig. 10). From the embryonic stage to the larval stage, we obtain the tran- sition time points in the topological structure as tc = 28 =28=28=31=41=41=41=59=59=59272829303132333435362829303132333435363737385556575859606162635464565758596061626364655657585960616263646566553738394041424344453646373839404142434445463839404142434445464747482728293031323334352636 Here, we verify the above consideration by distinguish- ing the network of the Barab´asi -- Albert (BA) growth model [72] with its configuration network. The network is initialized with m0 nodes and no edges. At each time step, each new node is added with no more than m0 links to the existing nodes in the network. The proba- bility that a new node is connected to an existing node is proportional to the degree of the existing node. Note that both the BA networks and their configuration net- works have a scale-free property with degree exponent 3. We set the number of nodes to 128, vary the num- ber of initial nodes m0 = 1, 2, . . . , 50, and generate 10 networks via this process for each value of m0. The 10 networks generated at each m0 are split into two parts, with five networks for training and the remaining five for testing. Figure 11 depicts eigenvalues λk such that 0.0 ≤ λk ≤ 0.5 for (a) BA networks and (b) scale-free configuration networks. The colors of the points corre- spond to values of m0 = 1, 2, 3, 4, 5, 6. From Fig. 11, we can identify the value of λsep to separate the eigen- values for each network. The smallest λsep values for sep ≈ 0.18 BA networks and configuration networks are λBA sep ≈ 0.16, respectively. Therefore, τmax should and λconf sep (cid:29) 1, for instance, be set to τmaxλBA τmaxλBA For each τmax in {5, 10, 15, . . . , 95, 100}, we com- pute three-dimensional persistence diagrams of one- dimensional holes with τ1 = 1, τ2 = 2, τ3 = 3, . . . , τK = τmax. The line in Fig. 12 depicts the average test accuracy over 100 random train-test splits at each value of τmax. The shaded area indicates the confidence intervals of one standard deviation calculated using the ensemble of runs. In general, increasing τmax serves to increase classifica- tion accuracy because the diffusion process gathers more information about the network structure. There is a transition in classification accuracy with large deviations when τmax increases from 30 to 40. To demonstrate this transition in more detail, we plot τmax = 20, 21, . . . , 49, 50 in the inset of Fig. 12. For τmax < 30, only microscale structures are considered in the features, which has a small effect on the differences between networks. The transition occurs when the mesoscale structures are con- sidered. For τmax > 40, the deviation is reduced as the mesoscale structures are revealed. For sufficiently large τmax (τmax ≥ 65), the method achieves high accuracy in the range of 94% to 94.5%. This observation agrees with the above-mentioned heuristic for determining τmax. sep > 10, or τmax ≥ 65. sep (cid:29) 1 and τmaxλconf sep > 10 and τmaxλconf IV. CONCLUDING REMARKS AND DISCUSSION Our study mainly aimed to represent the variation of topological scales, capture the nondyadic interactions, and provide robustness against noise in characterizing the structure of complex networks. Here, we proposed a general framework for constructing the scale-variant topological features from the diffusion process exhibited 12 FIG. 11. Eigenvalues λk such that 0 ≤ λk ≤ 0.5 for (a) Barab´asi -- Albert (BA) networks and (b) scale-free configura- tion networks. The colors of the points correspond to values of m0 = 1, 2, 3, 4, 5, 6 (number of initial nodes in the BA growth model). The value of λsep to effectively separate eigenvalues is identified for each network. The smallest λsep values for sep ≈ 0.18 the BA networks and configuration networks are λBA and λconf sep ≈ 0.16, respectively, as marked. FIG. 12. Classification of networks generated from Barab´asi -- Albert models with their configuration networks using scale- variant topological features. The line depicts the average test accuracy over 100 random train-test splits at each value of τmax. The shaded area indicates the confidence intervals of one standard deviation calculated using the same ensemble of runs. The inset highlights the transition in accuracy over τmax = 20 -- 50. in networks. The scale-variant topological features do not directly correspond to the common statistical mea- sures that are constructed from the dyadic interactions between nodes at a single fixed topological scale. Rather, our features encode the information of both dyadic and nondyadic interactions in networks at variant topological scales. In the networks classification, our features acted as strong factors to identify the networks. Theoretically, we derived a strong mathematical guarantee for the robust- ness of these features with respect to the perturbations applied to the networks. Through several experiments, we provided an empirical evidence for the effectiveness of these features in applications, such as classification of real-world networks and detection of transition points, with respect to the topological structure in time-evolving networks. The results suggested that the observation of the topological features induced from the network dy- namics over variant scales can characterize the struc- ture and provide important insights for understanding the functionality of networks. In our experiments, the scale-variant topological fea- tures were constructed from zero-dimensional and one- dimensional holes. In principle, we can compute the features from higher-dimensional holes that represent nondyadic interactions, involving a larger number of nodes in each interaction. However, to investigate the features from high-dimensional holes, the Vietoris -- Rips filtration used in our study can consist of a large number of simplices. More precisely, to consider l-dimensional holes, the Vietoris -- Rips filtration has size O(N l+2) of the number of simplices. Herein, N is the number of nodes in the network. This observation shows the difficulty of using the features from l-dimensional holes (l ≥ 2) for networks with a large number of nodes. On the contrary and as demonstrated in this paper, we found it sufficient to use l-dimensional holes with l = 0, 1 in practical appli- cations. Furthermore, one can replace the Vietoris -- Rips filtration with the Witness filtration [73] or the approx- imation of the Vietoris -- Rips filtration [74] for more ef- ficient computations. We employed recent algorithmic improvements to efficiently compute the persistent di- agrams with the core implementation referenced from Ripser libary [75]. Another point to discuss is the selection of the maxi- mum diffusion timescale. In our experiments, our method was only tested for small and medium-sized networks with less than 5,000 nodes per network. For larger net- works, a longer diffusion timescale must be explored. This consideration will increase the computational cost of computing persistence diagrams and the kernel. How- ever, this limitation can be mitigated by increasing the sampling interval to take discrete values of the timescale while keeping the maximum timescale sufficiently large. It is also possible to study the process of taking values of timescales based on the spectral decomposition of the normalized Laplacian of the network. Our study is motivated by Ref. [26], in which the dif- fusion geometry from the diffusion process is used to re- veal functional clusters in a network. Based on random walk dynamics, the diffusion distance between a pair of nodes in a network is defined and averaged in a range of timescales to model the underlying geometry of the net- work. However, the variation in network structure over the diffusion timescale is not discussed. In Ref. [71], a random walk process corresponding to the natural dy- namics of a system focuses on recovering dynamically meaningful communities in the network. Our approach involves a diffusion process similar to that mentioned in Refs. [26, 71]; however, it mainly focuses on the system- atic representation of networks via topological data anal- ysis by tracking the variation of the topological structures along timescales of the diffusion process. In general, our study presented a unified analysis of complex networks. This study paves several opportuni- ties for designing effective algorithms in network science, such as an investigation of more complicated network 13 structures. For instance, we can employ our framework to study different aspects of multiplex networks, or to study the structural reducibility of a multilayer network while preserving its dynamics and function. V. ACKNOWLEDGMENTS This work was supported by Ministry of Education, Culture, Sports, Science and Technology (MEXT) KAK- ENHI Grants No. JP16K00325 and No. JP19K12153. Appendix A: Construction of Vietoris -- Rips filtration of a network We define and describe in Fig. 13 the process of ex- tracting topological features of a complex network at each specific timescale τ . At each τ , we calculate the diffu- sion distance matrix ∆τ of size N × N , whose element ∆ij is the Euclidean distance between points pG(τi) and pG(τj) [Fig. 13(a)]. If ε = 0, the nodes of the network can be considered discrete points. As we increase ε, new pairwise connections and simplices may appear when ε meets each value of ∆ij. We obtain a filtration as a se- quence of embedded simplicial complexes. Hole patterns such as connected components (zero-dimensional holes) or loops (one-dimensional holes) can appear or disappear over this filtration. For instance, in Fig. 13(b), at ε = 0, we have six separated nodes considered as six separated connected components, but at ε = 0.407, three nodes are connected with each other; thus, two connected compo- nents disappear at this scale. We can describe these pat- terns as two blue bars started at scale 0 and ended at scale 0.407. The same explanation with the red bar started at scale 0.428 and ended at scale 0.430, which represents the emergence of loop pattern (v1 → v2 → v3 → v5 → v1) at ε = 0.428 and the disappearance at ε = 0.430. Fig- ure 13(c) illustrates the corresponding persistence dia- grams for zero-dimensional holes and one-dimensional holes, where the birth-scale and the death-scale are rep- resented for the values of ε at the emergence and the disappearance of the holes. Appendix B: Proof of the stability of the scale-variant topological features We prove the result in Eq. (4). First, we introduce the concept of the bottleneck distance between two two- dimensional diagrams. Let X and Y be finite sets of points embedded in the Euclidean space Rn. Denote their two-dimensional persistence diagrams for l-dimensional holes as S (2) (l) (Y ), respectively. We consider all matchings, γ, such that a point on one diagram is matched to a point on the other diagram or to its pro- jection on the line b = d in two-dimensional space. The (l) (X) and S (2) 14 FIG. 13. An exemplary of Vietoris -- Rips filtration constructed from a complex network G at a specific timescale τ (τ = 1 in this example). We map nodes v1, . . . , vN of the network G to a point cloud of N points pG(τ1), . . . , pG(τN ) through a diffusion dynamics described by the random walk Laplacian LrwG . (a) Diffusion distance matrix ∆τ of size N ×N , whose element ∆ij is the Euclidean distance between points pG(τi) and pG(τj). (b) A complex is built over a set of points if the pairwise distances between them are less than or equal to a threshold parameter ε. If ε = 0, we have the discrete points. As ε takes the increasing sequence values of diffusion distance ∆ij, the hole patterns such as connected components (zero-dimensional hole) or loops (one-dimensional hole) can appear or disappear over this filtration. The lifetime of these hole patterns are described as blue bars (for zero-dimensional holes) and red bars (for one-dimensional holes). These bars begin at the values of ε when the holes appear, then end at values when the holes disappear. (c) The corresponding persistence diagrams for zero-dimensional and one-dimensional holes. The birth-scale and the death-scale are represented for the values of ε at the emergence and the disappearance of the holes. B between S (2) (l) (X) and S (2) bottleneck distance d(2) (l) (Y ) is defined as the infimum of the longest matched infinity- norm distance over all matchings, γ: B (S (2) d(2) (cid:107)q(1) − q(2)(cid:107)∞. (B1) Here, (cid:107)q(1)−q(2)(cid:107)∞ = max (b1 − b2,d1 − d2) for which q(1) = (b1, d1) and q(2) = (b2, d2). (l) (X),S (2) (l) (Y )) = inf γ (q(1),q(2))∈γ max The bottleneck distance between the two-dimensional persistence diagrams satisfies the following inequal- ity [33]: where dH(X, Y ) is the Hausdorff distance given as (l) (Y )) ≤ 2dH(X, Y ), B (S (2) (l) (X),S (2) d(2) (cid:26) (B2) (cid:27) dH(X, Y ) = max max x∈X min y∈Y d(x, y), max y∈Y min x∈X d(x, y) . (B3) Here, d(x, y) is the Euclidean distance between two points x, y in Rn. Given two three-dimensional persistence diagrams as E and F , consider all matchings ψ such that a point on one diagram is matched to a point on the other di- agram or to its projection on the plane b = d. For each pair (q(1), q(2)) ∈ ψ for which q(1) = (b1, d1, τ1) and q(2) = (b2, d2, τ2), we define the relative infinity- norm distance between q(1) and q(2) as d(∞) (q(1), q(2)) = max (b1 − b2,d1 − d2, ξτ1 − τ2), where ξ is a positive rescaling coefficient introduced to adjust the scale differ- ence between the point-wise distance and time. The bot- tleneck distance, d(3) B,ξ(E, F ), is defined as the infimum of the longest matched relative infinity-norm distance over all matchings ψ: ξ d(3) B,ξ(E, F ) = inf ψ max (q(1),q(2))∈ψ d(∞) ξ (q(1), q(2)). (B4) For each τ ∈ T and two networks G,H with the same number N of nodes, we first prove the following inequal- ity: d(2) B (D(2) (l),τ (G), D(2) (l),τ (H)) ≤ 2τ(cid:107)LrwG − LrwH (cid:107)2. (B5) l,τ (G) l,τ (H) are calculated for l-dimensional holes from Here, two two-dimensional persistence diagrams D(2) and D(2) 210∞0.4280.43000.4070.4100.4250.4280.4070.4070.4100.4250.4280.4070.4280.43000.4070.4100.4250.4280.4070.4280.43000.4070.4100.4250.4280.4070.4280.43000.4070.4100.4250.4280.40700.4070.4100.4250.4280.40700.4070.4100.4250.40700.4070.4100.40700.4070.4070.0000.4070.0000.5650.5400.4250.4100.4450.0000.5650.4450.4250.0000.4070.4330.4280.5400.0000.0000.4300.4283456=0=0.407=0.410=0.425=0.428=0.430=0.433=0.445=0.540=0.5650.4280.430 two point clouds PG(τ ) = {pG(τ1), . . . , pG(τN )} and PH(τ ) = {pH(τ1), . . . , pH(τN )}, respectively. S(l)(PH(τ )), we apply Eq. (B2) to have 15 d(2) B (D(2) (l),τ (G), D(2) (l),τ (H)) = d(2) B (S(l)(PG(τ )),S(l)(PH(τ ))) (B6) ≤ 2dH(PG(τ ), PH(τ )). Since D(2) (l),τ (G) = S(l)(PG(τ )) and D(2) (l),τ (H) = From the definition of the Hausdorff distance, we have (cid:26) (cid:26) dH(PG(τ ), PH(τ )) = max ≤ max max i min j d(pG(τi), pH(τj)), max j min i d(pG(τi), pH(τj))) d(pG(τi), pH(τi)), max j max i d(pG(τj), pH(τj)) d(pG(τi), pH(τi)). = max i (cid:27) (cid:27) (B7) (B8) Since pG(τi) = ui exp(−τ LrwG ) and pH(τi) = ui exp(−τ LrwH ), we have d(pG(τi), pH(τi)) = (cid:107)ui(e−τ LrwG − e−τ LrwH )(cid:107)2 ≤ (cid:107)ui(cid:107)2(cid:107)e−τ LrwG − e−τ LrwH (cid:107)2 = (cid:107)e−τ LrwG − e−τ LrwH (cid:107)2. (B9) (B10) (B11) We write the difference of the matrix exponential in terms of an integral [32], γ , q(2) γ ) ∈ γ, where q(1) (q(1), q(2)) ∈ ψ, then q(1) = (b1, d1, τ ), q(2) = (b2, d2, τ ), and (q(1) γ = (b2, d2) and γ ∈ Λ ∩ Γτ . Let Γ be a set of all matchings ψ con- structed this way. From the definition of the bottleneck distance, we have the following inequality: γ = (b1, d1), q(2) d(3) B,ξ(D(3) (l) (G), D(3) (l) (H)) ≤ inf ψ∈Γ For (q(1), q(2)) ∈ ψ, we have d(∞) ξ (cid:13)(cid:13)(cid:13)(cid:13)2 (B12) max (q(1),q(2))∈ψ d(∞) ξ (q(1), q(2)). (B17) (cid:107)e−τ LrwG − e−τ LrwH (cid:107)2 = ≤ (cid:13)(cid:13)(cid:13)(cid:13)(cid:90) τ (cid:90) τ 0 0 ≤ (cid:107)E(cid:107)2 (cid:90) τ 0 e−LrwG (τ−t)Ee−LrwH tdt (cid:107)e−LrwG (τ−t)Ee−LrwH t(cid:107)2dt (B13) (cid:107)e−LrwG (τ−t)(cid:107)2(cid:107)e−LrwH t(cid:107)2dt, (cid:90) τ (B14) where E = LrwG − LrwH . We know that −LrwG is a negative semi-definite matrix with the largest eigenvalue equal to 0. It implies that the largest eigenvalue of e−LrwG (τ−t) is equal to 1, and hence (cid:107)e−LrwG (τ−t)(cid:107)2 = 1. We obtain the same result with −LrwH , i.e., (cid:107)e−LrwH t(cid:107)2 = 1. Then, from Eq. (B11) and Eq. (B14), we have d(pG(τi), pH(τi)) ≤ (cid:107)E(cid:107)2 (B15) = τ(cid:107)E(cid:107)2 = τ(cid:107)LrwG − LrwH (cid:107)2. (B16) From Eq. (B6), Eq. (B8) and Eq. (B16), we have the result in Eq. (B5). 1dt 0 Let Γτ be the set of matchings defined in Eq. (B1) between two two-dimensional persistence diagrams (l),τ (G) and D(2) D(2) For each collection Λ = {γ1, γ2, . . . , γK γi ∈ Γτi, i = 1, 2, . . . , K}, we construct the matching ψ between two three-dimensional persis- (l) (H), such that, for each tence diagrams D(3) (l) (G) and D(3) (l),τ (H). (q(1), q(2)) = max{b1 − b2,d1 − d2, ξτ − τ} = max{b1 − b2,d1 − d2} = (cid:107)q(1) γ − q(2) γ (cid:107)∞, (B18) (B19) (B20) and Eq. (B17) becomes d(3) B,ξ(D(3) (l) (G), D(3) (l) (H)) ≤ max τ∈T inf γ∈Γτ max γ ,q(2) γ )∈γ (q(1) γ (cid:107)∞ (cid:107)q(1) γ − q(2) (B21) = max τ∈T d(2) B (D(2) (l),τ (G), D(2) (l),τ (H)). From Eq. (B5) and Eq. (B22), we obtain Eq. (4) in the main text, which is the stability property of our scale- variant features. (B22) Appendix C: Selecting parameters for the kernel In the kernel Kσ,ξ defined in Eq. (5), we set the rescale coefficient to ξ = σ and present here a heuris- tic method to select the bandwidth σ. Given the ker- nel values calculated from the three-dimensional persis- (l),2, . . . , D(3) (l),1, D(3) tence diagrams D(3) (l),M of l-dimensional s = median{(bi − bj)2 + (di − dj)2 holes, we denote σ2 (l),s} with s = 1, 2, . . . , M . We (bi, di, τi), (bj, dj, τj) ∈ D(3) s s = 1, . . . , M} such that 2σ2 set σ as σ2 = takes values close to many (bi − bj)2 + (di − dj)2 values. median{σ2 1 2 Appendix D: Kernel Fisher discriminant ratio (l),1, D(3) Consider a collection of three-dimensional diagrams (l),2, . . . , D(3) D(l) = {D(3) (l),M} of l-dimensional holes. Since Kσ,ξ is a positive-definite kernel on D(l) [31], there exists a Hilbert space Hb and a mapping Φ : D(l) −→ Hb such that for E ∈ D(l), Φ maps E to a function ΦE ∈ Hb that satisfies ∀E, F ∈ D(l),Kσ,ξ(E, F ) = (cid:104)ΦE, ΦF(cid:105)Hb . (D1) Here, Hb is a real inner product space of function f : D(l) −→ R, and thus, is a complete metric space with respect to the distance induced by the inner product (cid:104)·,·(cid:105)Hb . Given an index s > 1, the kernel Fisher discriminant ratio κM,s(D(l)) is a statistical quantity to measure the dissimilarity between two classes assumptively defined by two sets of diagrams having index before and from s [36]. The corresponding empirical mean and covariance func- tions in Hb associated with the data in D(l) having index before and from s are defined as s−1(cid:88) s−1(cid:88) i=1 i=1 µ1 = Σ1 = 1 s − 1 1 s − 1 µ2 = Σ2 = 1 1 M − s + 1 M − s + 1 , (l),i ΦD(3) (l),i ΦD(3) (cid:26) M(cid:88) M(cid:88) i=s i=s (cid:26) (cid:27) ⊗ − µ1 − µ1 ΦD(3) (l),i (cid:27) (D2) , (D3) ΦD(3) (l),i , (cid:26) − µ2 ΦD(3) (l),i (cid:27) (cid:26) ⊗ − µ2 ΦD(3) (l),i (D4) (cid:27) 16 We set η = 10−1, 10−1, 10−5 in the experiments of the Girvan -- Newman (GN) network, Lancichinetti -- Fortunato -- Radicchi (LFR) network and Drosophila melanogaster network, respectively. Appendix E: Common measures for a network For each network, we calculate the following 18 com- mon measures: the density (the ratio of the existing to the possible edges), the transitivity [13] (the proportion of triangles), the diameter (the maximum eccentricity), the radius (the minimum eccentricity), the degree as- sortativity coefficient [47], the global efficiency [46], the number of connected parts, the average clustering coeffi- cient, the average number of triangles that include a node as a vertex, the average local efficiency [46], the average edge betweenness centrality [48], the average node be- tweenness centrality [45], the average node closeness cen- trality [45], the average eccentricity, the average short- est paths, the average degree centrality [45], the maxi- mum modularity which is obtained by Louvain heuris- tic [37, 43], and the average of global mean first-passage times of random walks on the network [76]. We normal- ize the measures in the range of [0, 1] using the min-max normalization (i.e. f∗ = (f∗ − fmin)/(fmax − fmin), where fmin, fmax are the minimum and the maximum values of a measure in the data). Appendix F: Graph kernel methods We describe the graph kernel methods used in the main text. The implementations of these graph kernels can be found in Ref. [49]. 1. Random walk kernels . (D5) Here, f ⊗ g for two functions f, g ∈ Hb is defined for all functions h ∈ Hb as (f ⊗ g)h = (cid:104)g, h(cid:105)Hb The kernel Fisher discriminant ratio κM,s(D(l)) is de- f . fined as κM,s(D(l)) (s − 1)(M − s + 1) = M (cid:68) µ2 − µ1, ( Σ + ηI)−1(µ2 − µ1) (cid:69) , Hb (D6) where η is a regularization parameter and Σ = M − s + 1 Σ2. Here, the index s achieving the maxi- mum of κM,s(D(l)) corresponds to the estimated transi- tion point. Σ1 + M s − 1 M The random walk graph kernels measure the simi- larity between a pair of graphs based on the number of equal-length walks in two graphs. Given two unla- beled graphs G and G(cid:48) with their vertex and edge sets as (V,E) and (V(cid:48),E(cid:48)), respectively, the direct product graph G× = (V×,E×) of G and G(cid:48) is a graph with the node set V× = {(v, v(cid:48)) v ∈ V, v(cid:48) ∈ V(cid:48)} and the edge set E× = {((va, v(cid:48) Kk× defined as The KStepRW kernel is the k-step random walk kernel b) ∈ E(cid:48)}. a), (vb, v(cid:48) a, v(cid:48) b)) (va, vb) ∈ E, (v(cid:48) V×(cid:88) (cid:2)λmW m×(cid:3) k(cid:88) Kk×(G,G(cid:48)) = ij , (F1) i,j=1 m=0 where W× is a weight matrix of G× and λ0, . . . , λk is a sequence of positive, real-valued weights. In our experi- ments, we set k = 2 and λ0 = λ1 = λ2 = 1.0. GeometricRW kernel is a specific case of the k-step ran- dom walk kernel, when k goes to infinity and the weights are the geometric series, i.e., λm = λm (λ = 0.05 in our experiments). The GeometricRW kernel is defined as V×(cid:88) ∞(cid:88) (cid:2)λmW m×(cid:3) ij = V×(cid:88) (cid:2)(I − λW×)−1(cid:3) , KGR(G,G(cid:48)) = i,j=1 m=0 i,j=1 (F2) where I is an identity matrix of size V× × V×. ExponentialRW kernel is a specific case of the k-step random walk kernel, when k goes to infinity and the weights are the exponential series, i.e., λm = βm m! (β = 0.1 in our experiments). The ExponentialRW kernel is de- fined as V×(cid:88) ∞(cid:88) (cid:20) (βW×)m (cid:21) i,j=1 m=0 m! V×(cid:88) (cid:2)eβW×(cid:3) ij . = ij i,j=1 KEX(G,G(cid:48)) = 17 size-k graphlets, where Nk denotes the number of unique graphlets of size k. For an unlabeled graph G (the graph does not contain attributes for nodes), we define a vec- tor fG of length Nk such that the ith component of fG denotes the frequency of graphlet Gi appearing as a sub- graph of G. Given two unlabeled graphs G and G(cid:48), the graphlet kernel is defined as KGK(G,G(cid:48)) = (cid:104)fG, fG(cid:48)(cid:105), (F5) where (cid:104)·,·(cid:105) represents the Euclidean dot product. We set k = 4 for MUTAG, BZR, DHFR and FRANKENSTEIN datasets and k = 3 for the other datasets. (F3) 4. Weisfeiler -- Lehman kernel 2. ShortestPath kernel ShortestPath kernel compares all pairs of the shortest path lengths from G and G(cid:48) defined as KSP(G,G(cid:48)) = (cid:88) (cid:88) δ(d(vi, vj), d(v(cid:48) k, v(cid:48) l)), (F4) l∈G(cid:48) vi,vj∈G v(cid:48) k,v(cid:48) k, v(cid:48) where d(vi, vj) and d(v(cid:48) l) are the lengths of the short- est path between nodes vi and vj in G, and the shortest l in G(cid:48), respectively. Here, k and v(cid:48) path between nodes v(cid:48) δ(x, y) = 1 if x = y, and 0 if x (cid:54)= y. Weisfeiler -- Lehman kernel decomposes a graph into its subtree patterns and compares these patterns in two graphs. For an unlabeled graph G, all vertexes v of G are initialized with label ϕ(v) = 0. We iterate over each vertex v and its neighbour to create a multiset label as ϕ(i)(v) such that ϕ(1)(v) = ϕ(v), and ϕ(i) with i > 1 is defined as ϕ(i)(v) = (ϕ(i)(v), Q(i−1) is the sorted labels of v's neighbours. To measure the similarity between graphs, we count the co-occurrences of the labels in both graphs for h iterations with the kernel defined as ), where Q(i−1) v v KWL(G,G(cid:48)) = (cid:104)1G, 1G(cid:48)(cid:105). (F6) 3. Graphlet kernel A size-k graphlet is an induced and non-isomorphic sub-graph of size k. Let Sk = {G1, . . . , GNk} be a set of Here, 1G is the vector concatenation of h vertex label histograms 1(1)G , . . . , 1(h)G in h iterations. We set h = 5 in our experiments. [1] D. Taylor, F. Klimm, H. A. Harrington, M. Kram´ar, K. Mischaikow, M. A. Porter, and P. J. Mucha, Nat. Commun. 6, 7723 (2015). [8] I. Barnett and J.-P. Onnela, Sci. Rep. 6, 18893 (2016). [9] W. Bao and G. Michailidis, Sci. Rep. 8, 12938 (2018). [10] Y.-Y. Ahn, J. P. Bagrow, and S. Lehmann, Nature 466, [2] J. G. T. Zanudo, G. Yang, and R. Albert, Proc. Natl. 761 (2010). Acad. Sci. USA 114, 7234 (2017). [11] R. F. Betzel and D. S. Bassett, Neuroimage 160, 73 [3] M. Santolini and A.-L. Barab´asi, Proc. Natl. Acad. Sci. (2017). USA 115, E6375 (2018). [12] R. E. Boulos, N. Tremblay, A. Arneodo, P. Borgnat, and [4] K. Sun, J. P. Gon¸calves, C. Larminie, and N. Przulj, B. Audit, BMC Bioinformatics 18, 209 (2017). BMC Bioinformatics 15, 304 (2014). [13] L. d. F. Costa, F. A. Rodrigues, G. Travieso, and P. R. [5] A. Calderone, M. Formenti, F. Aprea, M. Papa, L. Al- berghina, A. M. Colangelo, and P. Bertolazzi, BMC Syst. Biol. 10, 25 (2016). [6] T. A. Schieber, L. Carpi, A. D´ıaz-Guilera, P. M. Parda- los, C. Masoller, and M. G. Ravetti, Nat. Commun. 8, 13928 (2017). [7] L. Carpi, P. Saco, O. Rosso, and M. Ravetti, Eur. Phys. Villas Boas, Adv. Phys. 56, 167 (2007). [14] M. E. J. Newman, Networks: An Introduction (Oxford Univ. Press, New York, NY, USA, 2010). [15] A. Arenas, A. D´ıaz-Guilera, and C. J. P´erez-Vicente, Phys. Rev. Lett. 96, 114102 (2006). [16] M. Sales-Pardo, R. Guimera, A. A. Moreira, and L. A. N. Amaral, Proc. Natl. Acad. Sci. USA 104, 15224 (2007). J. B 85, 389 (2012). 18 [17] A. Lancichinetti, S. Fortunato, and J. Kert´esz, New J. [49] M. Sugiyama, M. E. Ghisu, F. Llinares-L´opez, and Phys. 11, 033015 (2009). [18] N. Tremblay and P. Borgnat, IEEE Trans. Signal Pro- cess. 62, 5227 (2014). [19] S. A. Marvel, J. Kleinberg, R. D. Kleinberg, and S. H. Strogatz, Proc. Natl. Acad. Sci. USA 108, 1771 (2011). [20] A. van der Schaft, S. Rao, and B. Jayawardhana, SIAM J. Appl. Math. 73, 953 (2013). [21] M. W. Reimann, M. Nolte, M. Scolamiero, K. Turner, R. Perin, G. Chindemi, P. D(cid:32)lotko, R. Levi, K. Hess, and H. Markram, Front. Comput. Neurosci. 11, 48 (2017). [22] M. A. de Menezes and A.-L. Barab´asi, Phys. Rev. Lett. 92, 028701 (2004). [23] A.-L. Barab´asi et al., Network science (Cambridge Univ. Press, Cambridge, 2016). [24] A. D. Broido and A. Clauset, Nat. Commun. 10, 1017 (2019). [25] G. Carlsson, Bull. Amer. Math. Soc. 46, 255 (2009). [26] M. De Domenico, Phys. Rev. Lett. 118, 168301 (2017). [27] H. Edelsbrunner, D. Letscher, and A. Zomorodian, Dis- crete Comput. Geom. 28, 511 (2002). [28] A. Zomorodian and G. Carlsson, Discrete Comput. Geom. 33, 249 (2005). [29] H. Edelsbrunner and J. Harer, Computational Topology. An Introduction (American Mathematical Society, Prov- idence, RI, 2010). [30] T. Kaczynski, K. Mischaikow, and M. Mrozek, Compu- tational homology, Vol. 157 (Springer, 2006). [31] Q. H. Tran and Y. Hasegawa, Phys. Rev. E 99, 032209 (2019). K. Borgwardt, Bioinformatics 34, 530 (2017). [50] H. Kashima, K. Tsuda, and A. Inokuchi, in Proceedings of the 20th International Conference on Machine Learn- ing, edited by T. Fawcett and N. Mishra (AAAI Press, Washington, DC, USA, 2003) pp. 321 -- 328. [51] T. Gartner, P. Flach, and S. Wrobel, in Learning The- ory and Kernel Machines, edited by B. Scholkopf and M. K. Warmuth (Springer Berlin Heidelberg, Berlin, Hei- delberg, 2003) pp. 129 -- 143. [52] K. M. Borgwardt and H.-P. Kriegel, in Proceedings of the 5th IEEE International Conference on Data Mining (IEEE Computer Society, Washington, DC, USA, 2005) pp. 74 -- 81. [53] K. M. Borgwardt, T. Petri, S. Vishwanathan, and H.-P. Kriegel, in Proceedings of the 3rd International Workshop on Mining and Learning with Graphs, edited by P. Fras- coni, K. Kersting, and K. Tsuda (MLG, Firence, Italy, 2007). [54] N. Shervashidze, P. Schweitzer, E. J. v. Leeuwen, K. Mehlhorn, and K. M. Borgwardt, J. Mach. Learn. Res. 12, 2539 (2011). [55] Q. H. Tran, V. T. Vo, and Y. Hasegawa, "Scale- variant topological information," https://github.com/ OminiaVincit/scale-variant-topo, GitHub Reposi- tory. [56] A. K. Debnath, R. L. Lopez de Compadre, G. Debnath, A. J. Shusterman, and C. Hansch, J. Med. Chem. 34, 786 (1991). [57] J. J. Sutherland, L. A. O'brien, and D. F. Weaver, J. [32] G. H. Golub and C. F. Van Loan, Matrix computations, Chem. Inf. Comput. Sci. 43, 1906 (2003). 4th ed. (JHU Press, Baltimore, MD, USA, 2012). [58] J. Kazius, R. McGuire, and R. Bursi, J. Med. Chem. 48, [33] F. Chazal, V. de Silva, and S. Oudot, Geometriae Ded- 312 (2005). icata 173, 193 (2014). [34] J. Reininghaus, S. Huber, U. Bauer, and R. Kwitt, in Proceedings of the 28th IEEE Conference on Computer Vision and Pattern Recognition (IEEE, Boston, MA, USA, 2015) pp. 4741 -- 4748. [35] N. Aronszajn, Trans. Am. Math. Soc. 68, 337 (1950). [36] Z. Harchaoui, E. Moulines, and F. R. Bach, in Advances in Neural Information Processing Systems 21 , edited by D. Koller, D. Schuurmans, Y. Bengio, and L. Bottou (Curran Associates, Inc., Red Hook, NY, 2009) pp. 609 -- 616. [37] M. E. J. Newman and M. Girvan, Phys. Rev. E 69, 026113 (2004). [38] A. Lancichinetti, S. Fortunato, and F. Radicchi, Phys. Rev. E 78, 046110 (2008). [39] A. Lancichinetti and S. Fortunato, Phys. Rev. E 80, 016118 (2009). [40] D. J. Watts and S. H. Strogatz, Nature 393, 440 (1998). [41] P. Erdos and A. R´enyi, Publ. Math. 6, 290 (1959). [42] M. E. J. Newman, S. H. Strogatz, and D. J. Watts, Phys. Rev. E 64, 026118 (2001). [43] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre, J. Stat. Mech.: Theory Exp. 2008, P10008 (2008). [44] C. M. Bishop, Pattern Recognition and Machine Learn- ing (Springer-Verlag, Berlin, Heidelberg, 2006). [45] L. C. Freeman, Soc. Networks 1, 215 (1978). [46] V. Latora and M. Marchiori, Phys. Rev. Lett. 87, 198701 (2001). [47] M. E. J. Newman, Phys. Rev. Lett. 89, 208701 (2002). [48] U. Brandes, Soc. Networks 30, 136 (2008). [59] K. M. Borgwardt, C. S. Ong, S. Schonauer, S. Vish- wanathan, A. J. Smola, and H.-P. Kriegel, Bioinformat- ics 21, i47 (2005). [60] N. Wale, I. A. Watson, and G. Karypis, Knowl. Inf. Syst. 14, 347 (2008). [61] F. Orsini, P. Frasconi, and L. De Raedt, in Proceedings of the 24th International Joint Conference on Artificial In- telligence, edited by Q. Yang and M. Wooldridge (AAAI Press, Buenos Aires, Argentina, 2015) pp. 3756 -- 3762. [62] P. Yanardag and S. Vishwanathan, in Proceedings of the 21th ACM SIGKDD International Conference on Knowl- edge Discovery and Data Mining, edited by L. Cao, C. Zhang, T. Joachims, G. I. Webb, D. D. Margineantu, and G. Williams (ACM, New York, NY, USA, 2015) pp. 1365 -- 1374. [63] K. Kersting, N. M. Kriege, C. Morris, P. Mutzel, and M. Neumann, "Benchmark data sets for graph kernels," (2016), http://graphkernels.cs.tu-dortmund.de. [64] C. Cortes, M. Mohri, and A. Rostamizadeh, J. Mach. Learn. Res. 13, 795 (2012). [65] M. Niepert, M. Ahmed, and K. Kutzkov, in Proceedings of the 33rd International Conference on International Conference on Machine Learning, Vol. 48 (JMLR.org, 2016) pp. 2014 -- 2023. [66] Z. Zhang, M. Wang, Y. Xiang, Y. Huang, and A. Neho- rai, in Advances in Neural Information Processing Sys- tems 31 , edited by S. Bengio, H. Wallach, H. Larochelle, K. Grauman, N. Cesa-Bianchi, and R. Garnett (Curran Associates, Inc., Red Hook, NY, 2018) pp. 3964 -- 3974. [67] M. N. Arbeitman, E. E. Furlong, F. Imam, E. Johnson, B. H. Null, B. S. Baker, M. A. Krasnow, M. P. Scott, R. W. Davis, and K. P. White, Science 297, 2270 (2002). [68] J. Zhang and J. Cao, J. Am. Stat. Assoc. 112, 994 (2017). [69] L. Song, M. Kolar, and E. P. Xing, Bioinformatics 25, i128 (2009). [70] J.-C. Delvenne, S. N. Yaliraki, and M. Barahona, Proc. Natl. Acad. Sci. USA 107, 12755 (2010). [71] R. Lambiotte, J. Delvenne, and M. Barahona, IEEE Trans. Netw. Sci. Eng. 1, 76 (2014). [72] A.-L. Barab´asi and R. Albert, Science 286, 509 (1999). [73] V. De Silva and G. Carlsson, in Proceedings of the 1st Eu- rographics Conference on Point-Based Graphics (Euro- graphics Association, Aire-la-Ville, Switzerland, Switzer- land, 2004) pp. 157 -- 166. [74] D. R. Sheehy, in Proceedings of the 28th Annual Sym- posium on Computational Geometry (ACM, New York, NY, USA, 2012) pp. 239 -- 248. [75] U. Bauer, "Ripser: a lean C++ code for the computation of Vietoris -- Rips persistence barcodes," (2017), https: //github.com/Ripser/ripser. [76] V. Tejedor, O. B´enichou, and R. Voituriez, Phys. Rev. E 80, 065104(R) (2009). 19
1110.4925
2
1110
2011-10-26T18:20:50
The Similarity between Stochastic Kronecker and Chung-Lu Graph Models
[ "cs.SI" ]
The analysis of massive graphs is now becoming a very important part of science and industrial research. This has led to the construction of a large variety of graph models, each with their own advantages. The Stochastic Kronecker Graph (SKG) model has been chosen by the Graph500 steering committee to create supercomputer benchmarks for graph algorithms. The major reasons for this are its easy parallelization and ability to mirror real data. Although SKG is easy to implement, there is little understanding of the properties and behavior of this model. We show that the parallel variant of the edge-configuration model given by Chung and Lu (referred to as CL) is notably similar to the SKG model. The graph properties of an SKG are extremely close to those of a CL graph generated with the appropriate parameters. Indeed, the final probability matrix used by SKG is almost identical to that of a CL model. This implies that the graph distribution represented by SKG is almost the same as that given by a CL model. We also show that when it comes to fitting real data, CL performs as well as SKG based on empirical studies of graph properties. CL has the added benefit of a trivially simple fitting procedure and exactly matching the degree distribution. Our results suggest that users of the SKG model should consider the CL model because of its similar properties, simpler structure, and ability to fit a wider range of degree distributions. At the very least, CL is a good control model to compare against.
cs.SI
cs
The Similarity between Stochastic Kronecker and Chung-Lu Graph Models∗ Ali Pinar† C. Seshadhri‡ Tamara G. Kolda§ Abstract 1 Introduction 1 1 0 2 t c O 6 2 ] I S . s c [ 2 v 5 2 9 4 . 0 1 1 1 : v i X r a The analysis of massive graphs is now becoming a very important part of science and industrial research. This has led to the construction of a large variety of graph models, each with their own advantages. The Stochastic Kronecker Graph (SKG) model has been chosen by the Graph500 steering committee to create supercomputer benchmarks for graph algorithms. The major reasons for this are its easy parallelization and ability to mirror real data. Although SKG is easy to implement, there is little understanding of the properties and behavior of this model. We show that the parallel variant of the edge- configuration model given by Chung and Lu (referred to as CL) is notably similar to the SKG model. The graph properties of an SKG are extremely close to those of a CL graph generated with the appropriate parameters. Indeed, the final probability matrix used by SKG is almost identical to that of a CL model. This implies that the graph distribution represented by SKG is almost the same as that given by a CL model. We also show that when it comes to fitting real data, CL performs as well as SKG based on empirical studies of graph properties. CL has the added benefit of a trivially simple fitting procedure and exactly matching the degree distribution. Our results suggest that users of the SKG model should consider the CL model because of its similar properties, simpler structure, and ability to fit a wider range of degree distributions. At the very least, CL is a good control model to compare against. ∗This work was funded by the applied mathematics program at the United States Department of Energy and performed at Sandia National Laboratories, a multiprogram laboratory operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the United States Department of Energy's National Nuclear Security Administration under contract DE-AC04-94AL85000. †Sandia National Laboratories, CA, [email protected] ‡Sandia National Laboratories, CA, [email protected] §Sandia National Laboratories, CA, [email protected] With more and more data being represented as large graphs, network analysis is becoming a major topic of scientific research. Data that come from social networks, the Web, patent citation networks, and power grid structures are increasingly being viewed as massive graphs. These graphs usually have peculiar properties that distinguish them from standard random graphs (like those generated from the Erdos-R´enyi model). Although we have a lot of evidence for these properties, we do not have a thorough understanding of why these properties occur. Furthermore, it is not at all clear how to generate synthetic graphs that have a similar behavior. Hence, graph modeling is a very important topic of study. There may be some disagreement as to the characteristics of a good model, but the survey [1] gives a fairly comprehensive list of desired properties. As we deal with larger and larger graphs, the efficiency and speed as well as implementation details become deciding factors in the usefulness of a model. The theoretical benefit of having a good, fast model is quite clear. However, the benefits of having good models go beyond an ability to generate large graphs, since such models provide insight into structural properties and the processes that generate large graphs. The Stochastic Kronecker graph (SKG) [2, 3], a gen- eralization of recursive matrix (R-MAT) model [4], is a model for large graphs that has received a lot of atten- tion. It involves few parameters and has an embarrass- ingly parallel implementation (so each edge of the graph can be independently generated). The importance of this model cannot be understated -- it has been cho- sen to create graphs for the Graph500 supercomputer benchmark [5]. Moreover, many researchers generate SKGs for testing their algorithms [6, 7, 8, 9, 10, 11, 12, 13, 14, 15]. Despite the role of this model in graph benchmark- ing and algorithm testing, precious little is truly known about its properties. The model description is quite sim- ple, but varying the parameters of the model can have quite drastic effects on the properties of the graphs be- ing generated. Understanding what goes on while gen- 2 erating an SKG is extremely difficult. Indeed, merely explaining the structure of the degree distribution re- quires a significant amount of mathematical effort. Could there be a conceptually simpler model that has properties similar to SKG? A possible candidate is a simple variant of the Erdos-R´enyi model first discussed by Aiello, Chung, and Lu [16] and generalized by Chung and Lu [17, 18]. The Erdos-R´enyi model is arguably the earliest and simplest random graph model [19, 20]. The Chung-Lu model (referred to as CL) can be viewed as a version of the edge configuration model or a weighted Erdos-R´enyi graph. Given any degree distribution, it generates a random graph with the same distribution on expectation. (The version by Aiello et al. only considered power law distributions.) It is very efficient and conceptually very simple. Amazingly, it has been overlooked as a model to generate synethetic instances, and is not even considered as a "control model" to compare with. (This is probably because of the strong ties to a standard Erdos-R´enyi graph, which is well known to be unsuitable for modeling social networks.) A major benefit of this model is that it can provide graphs with any desired degree distribution (especially power law), something that SKG provably cannot do. Our aim is to provide a detailed comparison of the SKG and CL models. We first compare the graph prop- erties of an SKG graph with an associated CL graph. We then look at how these models fit real data. Our ob- servations show a great deal of similarity between these models. To explain this, we look directly at the proba- bility matrices used by these models. This gives insight into the structure of the graphs generated. We notice that the SKG and CL matrices have much in common and give evidence that the differences between these are only (slightly) quantitative, not qualitative. We also show that for some settings of the SKG parameters, the SKG and associated CL models coincide exactly. 1.1 Notation and Background 1.1.1 Stochastic Kronecker Graph (SKG) model The model takes as input the number of nodes n (always a power of 2), number of edges m, and a 2 × 2 generator matrix T . We define (cid:96) = log2 n as the number of levels. In theory, the SKG generating matrix can be larger than 2 × 2, but we are unaware of any such examples in practice. Thus, we assume that the generating matrix has the form (cid:20)t1 t3 (cid:21) t2 t4 T = with t1 + t2 + t3 + t4 = 1. Each edge is inserted according to the probabilities1 defined by P = T ⊗ T ⊗ ··· ⊗ T . (cid:125) (cid:124) (cid:123)(cid:122) (cid:96) times We will refer to PSKG as the SKG matrix associated with these parameters. Observe that the entries in PSKG sum up to 1, and hence it gives a probability distribution over all pairs (i, j). This is the probability that a single edge insertion results in the edge (i, j). By repeatedly using this distribution to generate m edges, we obtain our final graph. In practice, the matrix PSKG is never formed explic- itly. Instead, each edge is inserted as follows. Divide the adjacency matrix into four quadrants, and choose one of them with the corresponding probability t1, t2, t3, or t4. Once a quadrant is chosen, repeat this recursively in that quadrant. Each time we iterate, we end up in a square submatrix whose dimensions are exactly halved. After (cid:96) iterations, we reach a single cell of the adjacency matrix, and an edge is inserted. This is independently repeated m times to generate the final graph. Note that all edges can be inserted in parallel. This is one of the major advantages of the SKG model and why it is appro- priate for generating large supercomputer benchmarks. A noisy version of SKG (called NSKG) has been re- cently designed in [21, 22]. This chooses the probability matrix P = T1 ⊗ ··· ⊗ T(cid:96), where each Ti is a specific random perturbation of the original generator matrix T . This has been provably shown to smooth the degree distribution to a lognormal form. (cid:80) i di = (cid:80) 1.2 Chung-Lu (CL) model This model can be thought of as a variant of the edge configuration model. Let us deal with directed graphs to describe the CL model. Suppose we are given sequences of n in-degrees d1, d2, . . . , dn, and n out-degrees d(cid:48) n. We have i = m. Consider the probability matrix PCL where the (i, j) entry is did(cid:48) j/m2. (The sum of all entries in PCL is 1.) We use this probability matrix to make m edge insertions. i d(cid:48) 1, d(cid:48) 2, . . . , d(cid:48) This is slightly different from the standard CL model, where an independent coin flip is done for every edge. This is done by using the matrix mPCL (similar to SKG). In practice, we do not generate PCL explicitly, but have a simple O(m) implementation analogous to that for SKG. Independently for every edge, we 1We have taken a slight liberty in requiring the entries of T to sum to 1. In fact, the SKG model as defined in [3] works with the matrix mP , which is considered the matrix of probabilities for the existence of each individual edge (though it might be more accurate to think of it as an expected value). choose a source and a sink. Both of these are chosen independently using the degree sequences as probability distributions. This is extremely simple to implement and it is very efficient. We will focus on undirected graphs for the rest of this paper. This is done by performing m edge inser- tions, and considering each of these to be undirected. For real data that is directed, we symmetrize by remov- ing the direction. Given a set of SKG parameters, we can define the associated CL model. Any set of SKG parameters immediately defines an expected degree sequence. In other words, given the SKG matrix PSKG, we can deduce the expected in-(and out)-degrees of the vertices. For this degree sequence, we can define a CL model. We refer to this as the associated CL model for a given set of SKG parameters. This CL model will be used to define a probability matrix PCL. In this paper, we will study the relations between PSKG and PCL. Whenever we use the term PCL, this will always be the associated CL model of some SKG matrix PSKG. 1.3 Our Contributions The main message of this work can be stated simply. The SKG model is close enough to its associated CL model that most users of SKG could just as well use the CL model for generating graphs. These models have very similar properties both in terms of ease of use and in terms of the graphs they generate. Moreover, they both reflect real data to the same extent. The general CL model has the major advantage of generating any desired degree distribution. We stress that we do not claim that the CL model accurately represents real graphs, or is even the "right" model to think about. But we feel that it is a good control model, and it is one that any other model should be compared against. Fitting CL to a given graph is quite trivial; simply feed the degree distribution of the real graph to the CL model. Our results suggest that users of SKG can satisfy most of their needs with a CL model. We provide evidence for this in three different ways. 1. Graph properties of SKG vs CL: We construct an SKG using known parameter choices from the Graph500 specification. We then generate CL graphs with the same degree distributions. The comparison of graph properties is very telling. The degree distribution are naturally very similar. What is surprising is that the clustering coefficients, eigenvalues, and core decomposi- tions match exceedingly well. Note that the CL model can be thought of as a uniform random samples of graphs with an input degree distribution. It appears that SKG is very similar, where the degree distribution is given implicitly by the generator matrix T . 3 2. Quantitative comparison of generating matrices PSKG and PCL: We propose an explanation of these observations based on comparisons of the probability matrices of SKG and CL. We plot the entries of these matrices in various ways, and arrive at the conclusion that these matrices are extremely similar. More con- cretely, they represent almost the same distribution on graphs, and differences are very slight. This strongly suggests that the CL model is a good and simple ap- proximation of SKG, and it has the additional benefit of modeling any degree distribution. We prove that un- der a simple condition on the matrix T , PSKG is identical to PCL. Although this condition is often not satisfied by common SKG parameters, it gives strong mathematical intuition behind the similarities. 3. Comparing SKG and CL to real data: The pop- ularity of SKG is significantly due to fitting procedures that compute SKG parameters corresponding to real graphs [3]. This is based on an expensive likelihood optimization procedure. Contrast this with CL, which has a trivial fitting mechanism. We show that both these models do a similar job of matching graph param- eters. Indeed, CL guarantees to fit the degree distri- bution (up to expectations). In other graph properties, neither SKG nor CL is clearly better. This is a very compelling reason to consider the CL model as a con- trol model. In this paper, we focus primarily on SKG instead of the noisy version NSKG because SKG is extremely well established and used by a large number of researchers [6, 7, 8, 9, 10, 15, 11, 12, 13, 14]. Nonetheless, all our experiments and comparisons are also performed with NSKG. Other than correcting deficiencies in the degree distribution, the effect of noise on other graph properties seems fairly small. Hence, for our matrix studies and mathematical theorems (§4 and §5), we focus on similarities between SKG and CL. We however note that all our empirical evidence holds for NSKG as well: CL seems to model NSKG graphs reasonably well (though not as perfectly as SKG), and CL fits real data as well as NSKG. 1.4 Parameters for empirical study We focus attention on the Graph500 benchmark [5]. This is primarily for concreteness and the relative importance of this parameter setting. Our results hold for all the settings of parameters that we experimented with. For NSKG, there is an additional noise parameter required. We set this to 0.1, the setting studied in [21]. • Graph500: T = [0.57, 0.19; 0.19, 0.05], (cid:96) ∈ {26, 29, 32, 36, 39, 42}, and m = 16· 2(cid:96). We focus on a much smaller setting, (cid:96) = 18. 4 (a) Degree distribution (b) Clustering coefficients (c) Eigenvalues of adjacency matrices (d) Assortativity (e) Core decompositions Figure 1: Comparison of the graph properties of SKG generated with Graph500 parameters and an equivalent CL. 2 Previous Work The SKG model was proposed by Leskovec et al. [23], as a generalization of the R-MAT model, given by Chakrabarti et al. [4]. Algorithms to fit SKG to real data were given by Leskovec and Faloutsos [2] (extended in [3]). This model has been chosen for the Graph500 benchmark [5]. Kim and Leskovec [24] defined a variant of SKG called the Multiplicative Attribute Graph (MAG) model. There have been various analyses of the SKG model. The original paper [3] provides some basic theorems and empirically shows a variety of properties. Groer et al. [25], Mahdian and Xu [26], and Seshadhri et al. [21] study how the model parameters affect the graph properties. It has been conclusively shown that SKG cannot generate power-law distributions [21]. Seshadhri et al. also proposed noisy SKG (NSKG), which can provably produce lognormal degree distributions. Sala et al. [27] perform an extensive empirical study of properties of graph models, including SKGs. Miller et al. [28] give algorithms to detect anomalies embedded in an SKG. Moreno et al. [29] study the distributional properties of families of SKGs. A good survey of the edge-configuration model and its variants is given by Newman [30] (refer to Section IV.B). The specific model of CL was first given by Chung and Lu [17, 18]. They proved many properties of these graphs. Properties of its eigenvalues were given by Mihail and Papadimitriou [31] and Chung et al. [32]. 3 Similarity between SKG and CL Our first experiment details the similarities between an SKG and its equivalent CL. We construct an SKG using the Graph500 parameters with (cid:96) = 18. We take the degree distribution of this graph, and construct a CL graph using this. Various properties of these graphs are given in Fig. 1. We give details below: 1. Degree distribution (Fig. 1a): This is the stan- dard degree distribution plot in log-log scale. It is no surprise that the degree distributions are almost identi- cal. After all, the weighting of CL is done precisely to match this. 5 (a) Degree distribution (b) Clustering coefficients (c) Eigenvalues of adjacency matrices (d) Assortativity (e) Core decompositions Figure 2: The figures compares the graph properties of NSKG generated with Graph500 parameters and an equivalent CL. 2. Clustering coefficients (Fig. 1b): The clustering coefficient of a vertex i is the fraction of wedges centered at i that participate in triangles. We plot d versus the average clustering coefficient of a degree d vertex in log-log scale. Observe the close similarity. Indeed, we measure the difference between clustering coefficient values at d to be at most 0.04 (a lower order term with respect to commonly measured values in real graphs [33]). 3. Eigenvalues (Fig. 1c): Here, we plot the first 25 eigenvalues (in absolute value) of the adjacency matrix of the graph in log-scale. The proximity of eigenvalues is very striking. This is a strong suggestion that graph structure of the SKG and CL graphs are very similar. 4. Assortativity (Fig. 1d): This is non-standard measure, but we feel that it provides a lot of structural intuition. Social networks are often seen to be assorta- tive [34, 35], which means that vertex of similar degree tend to be connected by edges. For d, define Xd to be the average degree of an average degree d vertex. We plot d versus Xd in log-log scale. Note that neither SKG nor CL are particularly assortative, and the plots match rather well. 5. Core decompositions (Fig. 1e): The k-cores of a graph are a very important part of understanding the community structure of a graph. The size of the k-core is the largest induced subgraph where each vertex has a minimum degree of k. This is a subset S of vertices such that all vertices have k neighbors in S. These sizes can be quickly determined by performing a core decomposition. This is obtained by iteratively deleting the minimum degree vertex of the graph. The core plots look amazingly close, and the only difference is that there are slightly larger cores in CL. All these plots clearly suggest that the Graph500 SKG and its equivalent CL graph are incredibly close in their graph properties. Indeed, it appears that most important structural properties (especially from a social networks perspective) are closely related. We will show in §6 that CL performs an adequate job of fitting real data, and is quite comparable to SKG. We feel that any uses of SKG for benchmarking or test instances 6 generation could probably be done with CL graphs as well. For completeness, we plot the same comparisons between NSKG and CL in Fig. 2. We note again that the properties are very similar, though NSKG shows more variance in its values. Clustering coefficient values differ by at most 0.02 here, and barring small differences in initial eigenvalues, there is a very close match. The assortativity plots show more oscillations for NSKG, but CL gets the overall trajectory. 4 Connection between SKG and CL matrices Is there a principled explanation for the similarity observed in Fig. 1? It appears to be much more than a coincidence, considering the wide variety of graph properties that match. In this section, we provide an explanation based on the similarity of the probability matrices PSKG and PCL. On analyzing these matrices, we see that they have an extremely close distribution of values. These matrices are themselves so fundamentally similar, providing more evidence that SKG itself can be modeled as CL. 4 3 2 tzj−cz t(cid:96)−zi−zj +cz The inspiration for this section comes from Fig. 3. Our initial aim was to understand the SKG ma- trix, and see whether the structure of the values provides insight into the properties of SKG. Since each entry in this probability matrix is of the form 1 tzi−cz tcz , there are many repeated val- ues in this matrix. For each value in this probability matrix, we simply plot the number of times (the multi- plicity) this value appears in the matrix. (For PSKG, this is given in red) This is done for the associated PCL in blue. Note the uncanny similarity of the overall shapes for SKG and CL. Clearly, PSKG has more distinct val- ues2, but they are distributed fairly similarly to PCL. Nonetheless, this picture is not very formally convinc- ing, since it only shows the overall behavior of the dis- tribution of values. We begin by giving precise formulae for the entries of the SKG and CL matrices. This is by no means new (or even difficult), but it should introduce the reader to the structure of these matrices. The vertices of the graph are labeled from [n] (the set of positive integers up to n). For any i, vi denotes the binary representation of i as an (cid:96)-bit vector. For two vectors vi and vj, the number of common zeroes is the number of positions where both vectors are 0. The following formula for the SKG entries has already been used in [4, 23, 25]. Observe that these entries (for both SKG and CL) are quite easy to compute and enumerate. Claim 4.1. Let i, j ∈ [n]. Let the number of zeroes in vi and vj be zi and zj respectively. Let the number of common zeroes be cz. Then tzj−cz PSKG(i, j) = tcz PCL(i, j) = (t1 + t2)zi(t3 + t4)(cid:96)−zi(t1 + t3)zj (t2 + t4)(cid:96)−zj . Proof. The number of positions where vi is zero but vj is one is zi − cz. Analogously, the number of positions where only vj is zero is zj − cz. The number of common ones is (cid:96) − zi − zj + cz. Hence, the (i, j) entry of the PSKG is tcz t(cid:96)−zi−zj +cz t(cid:96)−zi−zj +cz tzj−cz 1 tzi−cz 2 1 tzi−cz 2 , and 3 4 3 4 . Let us now compute the (i, j) entry in the corre- sponding CL matrix. The probability that a single edge insertion becomes an out-edge of vertex i in SKG is (t1 + t2)zi(t3 + t4)(cid:96)−zi. Hence, the expected out-degree of i is m(t1 + t2)zi(t3 + t4)(cid:96)−zi. Similarly, the expected in-degree of j is m(t1+t3)zj (t2+t4)(cid:96)−zj . The (i, j) entry of PCL is (t1 + t2)zi (t3 + t4)(cid:96)−zi(t1 + t3)zj (t2 + t4)(cid:96)−zj .(cid:3) Figure 3: Distribution of entries of PSKG and PCL. Fig. 4 makes a more faithful comparison between the PSKG and PCL matrices. As we note from Fig. 3, PCL has a much smaller set of distinct entries. Suppose the distinct values in PCL are v1 > v2 > v3 . . .. Associate a bin with each distinct entry of PCL. For each entry of PSKG, place it in the bin corresponding to the entry of PCL with the closest value. So, if some entry in PSKG has value v, we determine the index i such that v − vi is minimized. This entry is placed in the ith bin. We can now look at the size of each bin for PSKG. The size of the ith bin for the PCL is simply the multiplicity of vi in PCL. Observe how these sizes are practically identical for large enough entry value. Indeed the former portion of 2This can be proven by inspecting Claim 4.1. these plots, for value < 10−20, only accounts for a total of < 10−5 of the probability mass. This means that the fraction of edges that will correspond to these entries is at most 10−5. We can also argue that these entries correspond only to edges joining very low degree vertices to each other. In other words, the portion where these curves differ is really immaterial to the structure of the final graph generated. 7 Figure 5: Probability mass of the bins the CL model. Figure 4: Bin sizes for PSKG and PCL Theorem 5.1. Consider an SKG model where T satis- fies the following: This is very strong evidence that SKG behaves like a CL model. The structure of the matrices are extremely similar to each other. Fig. 5 is even more convincing. Now, instead of just looking at the size of each bin, we look at the total probability mass of each bin. For PSKG matrix, this is the sum of entries in a particular bin. For PCL, this is the product of the size of the bin and the value (which is the again just the sum of entries in that bin). Again, we note the almost exact coincidence of these plots in the regime where the probabilities matter. Not only are the number of entries in each bin (roughly) the same, so is the total probability mass in the bin. We now generate a random sample from PSKG and one from PCL. Fig. 6 shows MATLAB spy plots of the corresponding graphs (represented by their adjacency matrices). One of the motivations for the SKG model was that it had a fractal or self-similar structure. It ap- pears that the CL graph shares the same self-similarity. Furthermore, this self-repetition looks identical for the both SKG and CL graphs. t1 t2 = t3 t4 . Then PSKG = PCL. Proof. Let α = t1/t2 = t3/t4, and let t3 = βt2. Then, t1 = α2βt4; t3 = αβt2; and t2 = αt4. Note that since t1 + t2 + t3 + t4 = 1, (5.1) (α2β + α + αβ + 1)t4 = 1 We use the formula given in Claim 4.1 for the (i, j) entry of the SKG and CL matrices. By simple substitution, the entry for SKG is 5 Mathematical justifications We prove that when the entries of the matrix T satisfy the condition t1/t2 = t3/t4, then SKG is identical to (5.2) (t4α2β)cz (t4α)zi−cz (t4αβ)zj−cz t4 4αzi+zj βzj = t(cid:96) (cid:96)−zi−zj +cz 8 Figure 6: Spy plots of SKG drawn from PSKG and CL graph drawn from PCL Analogously, for the CL matrix, the entry has value (t1 + t2)zi(t3 + t4)(cid:96)−zi(t1 + t3)zj (t2 + t4)(cid:96)−zj = [t4(α2β + α)]zi[t4(αβ + 1)](cid:96)−zi × = t2(cid:96) = t2(cid:96) [t4(α2β + αβ)]zj [α(α + 1)](cid:96)−zj 4 (α2β +α)zi(αβ +1)(cid:96)−zi(α2β +αβ)zj (α+1)(cid:96)−zj 4 αzi+zj βzj (αβ + 1)zi(αβ + 1)(cid:96)−zi × (α + 1)zj (α + 1)(cid:96)−zj 4 αzi+zj βzj (α2β + α + αβ + 1)(cid:96) 4αzi+zj βzj [t4(α2β + α + αβ + 1)](cid:96) 4αzi+zj βzj = t2(cid:96) = t(cid:96) = t(cid:96) The last part follows from (5.1). This is exactly the (cid:3) same as (5.2). 6 Fitting SKG vs CL Fitting procedures for SKG model have been given in [3]. This is often cited as a reason for the popularity of SKG. These fits are based on algorithms for maximizing likelihood, but can take a significant amount of time to run. The CL model is fit by simply taking the degree distribution of the original graph. Note that the CL model uses a lot more parameters than SKG, which only requires 5 independent numbers. In that sense, SKG is a very appealing model regardless of any other deficiencies. We show comparisons of the CL, SKG, and NSKG models with respect to three different real graphs. For directed graphs, we look at the undirected version where directions are removed from all the edges. The real graphs are the following: • soc-Epinions: This is a social network from the Epinions website, which tracks the "who-trusts-whom" relationship [36]. It has 75879 vertices and 811480 edges. The SKG parameters for this graph from [3] are: T = [0.4668 0.2486; 0.2243 0.0603], (cid:96) = 17. • ca-HepTh: This is a co-authorship network from high energy physics [36]. It has 9875 vertices and 51946 edges. The SKG parameters for this graph from [3] are: T = [0.469455 0.127350; 0.127350 0.275846], (cid:96) = 14. • cit-HepPh: This is a citation network from high energy physics [36]. It has 34546 vertices and 841754 edges. The SKG parameters from [3] are: T = [0.429559 0.189715; 0.153414 0.227312], (cid:96) = 15. The comparisons between the properties are given, respectively, in Fig. 7, Fig. 8, and Fig. 9. In all of these, we see that CL (as expected) gives good fits to the degree distributions. For soc-Epinions, we see in Fig. 7a that the oscillations of the SKG degree distribution and how NSKG smoothens it out. Observe that the clustering coefficients of all the models are completely off. Indeed, for low degree vertices, the values are off by orders of magnitude. Clearly, no model is capturing the abundance of triangles in these graphs. The eigenvalues of the model graphs are also distant from the real graph, but CL performs no worse than SKG (or NSKG). Core decompositions for soc-Epinions (Fig. 7d) show that CL fits rather well. For ca-HepPh (Fig. 8d) CL is marginally better than SKG, whereas for cit-HepTh (Fig. 9d), NSKG seems be a better match. All in all, there is no conclusive evidence that SKG or NSKG model these graphs significantly better than 9 (a) Degree distribution (b) Clustering coefficients (c) Eigenvalues of adjacency matrices (d) Core decompositions Figure 7: The figure compares the fits of various models for the social network soc-Epinions. CL. We feel that the comparable performance of CL shows that it should be used as a control model to compare against. 7 Conclusions Understanding existing graph models is a very impor- tant part of graph analysis. We need to clearly see the benefits and shortcomings of existing models, so that we can use them more effectively. For these purposes, it is good to have a simple "baseline" model to compare against. We feel that the CL model is quite suited for this because of its efficiency, simplicity, and similarity to SKG. Especially for benchmarking purposes, it is a good candidate for generating simple test graphs. One should not think of this as representing real data, but as an easy way of creating reasonable looking graphs. Comparisons with the CL model can give more insight into current models. The similarities and differences may help identify how current graph models differ from each other. References [1] D. Chakrabarti and C. Faloutsos, "Graph mining: Laws, generators, and algorithms," ACM Computing Surveys, vol. 38, no. 1, 2006. [2] J. Leskovec and C. Faloutsos, "Scalable modeling of real graphs using Kronecker multiplication," in ICML '07. ACM, 2007, pp. 497 -- 504. [3] J. Leskovec, D. Chakrabarti, C. Faloutsos, and Z. Ghahramani, J. Kleinberg, "Kronecker 10 (a) Degree distribution (b) Clustering coefficients (c) Eigenvalues of adjacency matrices (d) Core decompositions Figure 8: The figures compares the fits of various models for the co-authorship network ca-HepTh. graphs: J. Machine Learning Research, 985 -- 1042, Feb. 2010. //jmlr.csail.mit.edu/papers/v11/leskovec10a.html An approach to modeling networks," pp. http: [Online]. Available: vol. 11, [4] D. Chakrabarti, Y. Zhan, and C. Faloutsos, "R- graph mining," MAT: A recursive model in [Online]. Available: http://siam.org/proceedings/datamining/ 2004/dm04 043chakrabartid.pdf SDM '04, 442 -- 446. 2004, pp. for [5] Graph 500 Steering Committee, "Graph 500 bench- mark," 2010, available at http://www.graph500.org/ Specifications.html. [6] V. Vineet, P. Harish, S. Patidar, "Fast minimum spanning and P. J. Narayanan, for large in Proceedings of the Conference on High Performance Graphics 2009, ser. HPG '09. New York, NY, USA: on the graphs gpu," tree ACM, http://doi.acm.org/10.1145/1572769.1572796 167 -- 171. 2009, pp. [Online]. Available: [7] N. Edmonds, T. Hoefler, and A. Lumsdaine, "A space- efficient parallel algorithm for computing betweenness centrality in distributed memory," in High Perfor- mance Computing (HiPC), 2010 International Confer- ence on, dec. 2010, pp. 1 -- 10. [8] R. Pearce, M. Gokhale, and N. M. Amato, "Multithreaded asynchronous graph traversal for in-memory and semi-external memory," in Proceedings of the 2010 ACM/IEEE International Conference for High Performance Computing, Networking, Storage and Analysis, ser. SC '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 1 -- 11. [Online]. Available: http://dx.doi.org/10.1109/SC.2010.34 [9] A. Bulu¸c and J. R. Gilbert, "Highly parallel sparse matrix-matrix multiplication," CoRR, vol. 11 (a) Degree distribution (b) Clustering coefficients (c) Eigenvalues of adjacency matrices (d) Core decompositions Figure 9: The figures compares the fits of various models for the citation network cit-HepPh. abs/1006.2183, 2010. article/pii/S0167819111000172 [10] M. Patwary, A. Gebremedhin, and A. Pothen, "New multithreaded ordering and coloring algorithms for multicore architectures," in Euro-Par 2011 Parallel Processing, ser. Lecture Notes in Computer Science, E. Jeannot, R. Namyst, and J. Roman, Eds. Springer Berlin / Heidelberg, 2011, vol. 6853, pp. 250 -- 262. [11] S. Hong, T. Oguntebi, and K. Olukotun, "Efficient par- allel graph exploration on multi-core cpu and gpu," in Proc. Parallel Architectures and Compilation Tech- niques(PACT), 2011. for [12] S. J. Plimpton and K. D. Devine, "MapReduce in large-scale graph algorithms," Parallel vol. -- emerging Programming Paradigms [Online]. http://www.sciencedirect.com/science/ MPI Computing, 632, 2011, for Large-Scale Available: Scientific Computing. pp. 610 37, no. 9, [13] D. Bader and K. Madduri, "Snap, small-world net- work analysis and partitioning: An open-source par- allel graph framework for the exploration of large- scale networks," in Parallel and Distributed Processing, 2008. IPDPS 2008. IEEE International Symposium on, april 2008, pp. 1 -- 12. [14] B. Hendrickson and J. Berry, "Graph analysis with high-performance computing," Computing in Science Engineering, vol. 10, no. 2, pp. 14 -- 19, march-april 2008. [15] M. C. Schmidt, N. F. Samatova, K. Thomas, and B.-H. Park, "A scalable, parallel algorithm for maximal clique enumeration," Journal of Parallel and Distributed Computing, vol. 69, no. 4, pp. 417 -- 428, 2009. [Online]. Available: http://www.sciencedirect. com/science/article/pii/S0743731509000082 12 [16] W. Aiello, F. Chung, and L. Lu, "A random graph model for power law graphs," Experimental Mathemat- ics, vol. 10, pp. 53 -- 66, 2001. [17] F. Chung and L. Lu, "The average distances in random graphs with given expected degrees," Proceedings of the National Academy of Sciences USA, vol. 99, pp. 15 879 -- 15 882, 2002. [33] M. Girvan and M. Newman, "Community structure in social and biological networks," Proceedings of the National Academy of Sciences, vol. 99, pp. 7821 -- 7826, 2002. [34] M. E. J. Newman, "Mixing patterns in networks," Phys. Rev. E., vol. 67, p. 026126, Feb. 04 2002. [Online]. Available: http://arxiv.org/abs/cond-mat/0209450 [18] -- -- , "Connected components in random graphs with given degree sequences," Annals of Combinatorics, vol. 6, pp. 125 -- 145, 2002. [35] -- -- , "Assortative mixing in networks," Phys. Rev. [Online]. Letter, vol. 89, p. 208701, May 20 2002. Available: http://arxiv.org/abs/cond-mat/0205405 [19] P. Erdos and A. R´enyi, "On random graphs," Publica- [36] Stanford Network Analysis Project (SNAP), available tiones Mathematicae, vol. 6, pp. 290 -- 297, 1959. at http://snap.stanford.edu/. [20] -- -- , "On the evolution of random graphs," Publica- tions of the Mathematical Institute of the Hungarian Academy of Sciences, vol. 5, pp. 17 -- 61, 1960. [21] C. Seshadhri, A. Pinar, and T. Kolda, "An in-depth analysis of stochastic kronecker graphs," in Proc. ICDM 2011, IEEE Int. Conf. Data Mining, 2011, to appear. [22] -- -- , "An in-depth analysis of stochastic kronecker [Online]. graphs," September 2011, arxiv:1102.5046. Available: http://arxiv.org/abs/1102.5046 [23] J. Leskovec, D. Chakrabarti, J. Kleinberg, and C. Faloutsos, "Realistic, mathematically tractable graph generation and evolution, using Kronecker mul- tiplication," in PKDD 2005. Springer, 2005, pp. 133 -- 145. [24] M. Kim and J. Leskovec, "Multiplicative attribute graph model of real-world networks," in WAW 2010, 2010, pp. 62 -- 73. [25] C. Groer, B. D. Sullivan, and S. Poole, "A mathe- matical analysis of the R-MAT random graph gen- erator," Jul. 2010, available at http://www.ornl.gov/ ∼b7r/Papers/rmat.pdf. [26] M. Mahdian and Y. Xu, "Stochastic Kronecker graphs," Random Structures & Algorithms, vol. 38, no. 4, pp. 453 -- 466, 2011. [27] A. Sala, L. Cao, C. Wilson, R. Zablit, H. Zheng, and B. Y. Zhao, "Measurement-calibrated graph models for social network experiments," in WWW '10. ACM, 2010, pp. 861 -- 870. [28] B. Miller, N. Bliss, and P. Wolfe, "Subgraph detection using eigenvector L1 norms," in NIPS 2010, 2010, pp. 1633 -- 1641. [Online]. Available: http://books.nips.cc/ papers/files/nips23/NIPS2010 0954.pdf [29] S. Moreno, S. Kirshner, J. Neville, and S. V. N. Vish- wanathan, "Tied Kronecker product graph models to capture variance in network populations," in Proc. 48th Annual Allerton Conf. on Communication, Control, and Computing, Oct. 2010, pp. 1137 -- 1144. [30] M. E. J. Newman, "The structure and function of complex networks," SIAM Review, vol. 45, no. 2, pp. 167 -- 256, 2003. [31] C. Papadimitriou and M. Mihail, "On the eigenvalue power law," in RANDOM, 2002, pp. 254 -- 262. [32] F. Chung, L. Lu, and V. Vu, "Eigenvalues of random power law graphs," Annals of Combinatorics, vol. 7, pp. 21 -- 33, 2003.
1802.08298
1
1802
2018-02-22T21:00:48
Conflict and Convention in Dynamic Networks
[ "cs.SI", "cs.GT", "physics.soc-ph" ]
An important way to resolve games of conflict (snowdrift, hawk-dove, chicken) involves adopting a convention: a correlated equilibrium that avoids any conflict between aggressive strategies. Dynamic networks allow individuals to resolve conflict via their network connections rather than changing their strategy. Exploring how behavioral strategies coevolve with social networks reveals new dynamics that can help explain the origins and robustness of conventions. Here we model the emergence of conventions as correlated equilibria in dynamic networks. Our results show that networks have the tendency to break the symmetry between the two conventional solutions in a strongly biased way. Rather than the correlated equilibrium associated with ownership norms (play aggressive at home, not away), we usually see the opposite host-guest norm (play aggressive away, not at home) evolve on dynamic networks, a phenomenon common to human interaction. We also show that learning to avoid conflict can produce realistic network structures in a way different than preferential attachment models.
cs.SI
cs
Conflict and Convention in Dynamic Networks Michael Foley,1∗ Patrick Forber,2 Rory Smead,3 Christoph Riedl456∗ 1Network Science Institute, Northeastern University, Boston, Massachusetts, USA 2Department of Philosophy, Tufts University, Medford, Massachusetts, USA 3Department of Philosophy and Religion, Northeastern University, Boston, Massachusetts, USA 4D'Amore-McKim School of Business, Northeastern University, Boston, Massachusetts, USA 5College of Computer and Information Science, Northeastern University, Massachusetts, USA 6Institute for Quantitative Social Science, Harvard University, Cambridge, Massachusetts, USA ∗To whom correspondence should be addressed; E-mail: [email protected] An important way to resolve games of conflict (snowdrift, hawk-dove, chicken) involves adopting a convention: a correlated equilibrium that avoids any con- flict between aggressive strategies. Dynamic networks allow individuals to re- solve conflict via their network connections rather than changing their strat- egy. Exploring how behavioral strategies coevolve with social networks reveals new dynamics that can help explain the origins and robustness of conven- tions. Here we model the emergence of conventions as correlated equilibria in dynamic networks. Our results show that networks have the tendency to break the symmetry between the two conventional solutions in a strongly bi- ased way. Rather than the correlated equilibrium associated with ownership norms (play aggressive at home, not away), we usually see the opposite host- guest norm (play aggressive away, not at home) evolve on dynamic networks, a phenomenon common to human interaction. We also show that learning to avoid conflict can produce realistic network structures in a way different than preferential attachment models. 1 Introduction An essential feature of cooperation involves resolving conflicts, and an effective way to resolve conflicts is to adopt a convention that avoids them altogether. Evolutionary game theory pro- vides a way to represent the conflicts associated with the problem of cooperation (16, 34, 53), 1 and reinforcement learning can produce adaptive solutions to broad classes of strategic inter- actions (7, 11, 15, 23, 24, 30, 43). In games of conflict (snowdrift, hawk-dove, chicken) (53) individuals can learn to a play a correlated equilibrium, similar to turn-taking, that does better than the mixed Nash equilibrium (4, 26, 31, 47). These solutions, often understood as an impor- tant aspect of conventions, play a central role in evolutionary accounts of coordinated action, territoriality, and ownership (1, 20, 27, 31 -- 33, 47, 51, 57). However, most studies of convention examine learning or evolution with random interactions or static network structures. In reality, learning affects social networks as well as behavior. Individuals may seek out or avoid others based on past interactions and this can have profound effects on strategy choices, as work on dynamic networks has shown (2, 17, 19, 25, 35, 36, 38 -- 41, 46, 50, 54, 55), an effect also seen in empirical work on human behavior (12). For games of conflict, dynamic networks allow individuals to avoid aggressive neighbors by choosing their interaction partners which tends to promote cooperation (14), although some static network structures work against coopera- tion (22). Here we present novel results regarding the emergence of conventions as correlated equi- librium solutions for games of conflict. We use a coevolutionary model where both network ties and behavioral strategies evolve by reinforcement learning. Few previous studies model co-evolution of network and strategy evolving with reinforcement learning (1, 37, 48) and none have explored how dynamic networks influence the evolution of correlated equilibria. We em- ploy computer simulations to search the entire payoff space for games of conflict and to explore dynamic behavior over a wide range of additional model parameters, including population size. We find that correlated equilibria often emerge spontaneously as a natural result of reinforce- ment learning on networks, and that dynamic networks strongly favor the so-called paradoxical solution where individuals act aggressively away but not at home. This result suggests that the prevalence of territoriality and ownership behaviors is not primarily a matter of conven- tion. Our results also have relevance to general mechanisms of network formation. Learning to avoid conflict by evolving network ties can produce realistic network structures and thus pro- vides another potential mechanism for social network formation that differs from preferential attachment (5, 14, 36). In games of conflict each agent can play one of two strategies: an aggressive, competitive strategy (hawk) or a more passive, cooperative strategy (dove). For economy of presentation we will use the hawk-dove terminology but the results apply equally to any game of conflict meeting the payoffs defined in Fig. 1a (53). The highest payoff results from playing hawk against dove, the lowest from playing hawk against hawk and all players would prefer their opponent to play dove. Agents playing these games either coordinate on who gets the large payoff, compete for a resource, or engage in a standoff. In an unstructured population common evolutionary dynamics (e.g., replicator dynamics) converge on the mixed Nash equilibrium of the game: host plays dove with probability x1/(1 − y1 + x1) and the visitor plays dove with probability x2/(1 − y2 + x2). Introducing a dynamic network permits individuals to find solutions different than the mixed Nash (summarized in Fig. 1c). If network ties are updated symmetrically using reinforcement 2 learning (i.e., both players update their network ties based on their interaction payoffs as in (37, 48)), there is a new potential solution to games of conflict: agents can learn pure strategies while learning to interact with suitable partners. In these cases a hub-and-spoke network structure tends to emerge. One agent becomes a hub and learns to play a pure dove strategy whereas other agents in the population learn to play pure hawk and only visit the dove hub. In effect, agents structure their interaction network to avoid conflict, allowing for a kind of cooperation in games of conflict, as previous work has shown (14). Another potential new solution, in the form of efficient correlated equilibria, can emerge when individuals are able to coordinate their strategies on an external cue or signal. Correlating behavior on some external cue (say a coin toss) can produce a convention, such as taking turns playing aggressively (e.g., player one plays hawk when heads, dove otherwise; and player two plays hawk when tails, dove otherwise) (4, 47). Indeed, correlated equilibria can be learned by relatively simple learning rules (3, 13, 21), and are also readily learned by humans (10). In the context of networks, correlated equilibria may arise if individuals learn their host and visitor be- havior independently. This enables them to play one way when hosting and another way when visiting, using their role as host versus visitor as the public cue (Fig. 1b). At one such correlated equilibrium individuals play what is called the bourgeois strategy, where they play hawk when hosting and dove when visiting. This strategy has been invoked as an explanation for norms of ownership or territoriality (31, 32). That is, norms of ownership may just be a conventional so- lution to games of conflict, rather than reflecting the intrinsic value of the resource or territory. However, there is another equally efficient solution that uses the paradoxical strategy, where one plays dove when hosting and hawk when visiting. This alternative solution complicates the evolutionary account of ownership and territoriality. In unstructured populations with sym- metric payoffs both solutions are strongly stable and evolve with equal frequency (47). This presents a problem of symmetry-breaking: why does it seem that the bourgeois strategy is so much more prominent in nature (see, e.g., (28)) when there is another equally viable option? Previous work has argued that individual learners who are sensitive to relatively small inequal- ities in value of the territory or fighting ability of the current owner may break the symmetry and strongly favor the bourgeois solution (47). Here we develop a model to investigate the emergence and stability of these correlated equilibria for games of conflict. 2 Methods 2.1 The Model In our dynamic network model agents simultaneously learn how to behave and with whom to interact via Roth-Erev reinforcement. Roth-Erev reinforcement learning provides a simple yet psychologically realistic learning dynamic in which an individual's behavior evolves iteratively in response to the payoffs obtained through interaction (11). This contrasts with other models of evolutionary game theory, such as the replicator dynamics, where "learning" (evolution) occurs 3 globally across the populations as individuals reproduce at rates proportional to the success of their behavioral strategies. In reinforcement learning, individuals have weights associated with each possible behavior and these weights are updated based on the payoffs received during their interactions (Fig. 1a -- b). Unlike imitation learning, reinforcement learning does not require individuals to track the behaviors or payoffs of other players in the population, a common feature in contagion models (9); an agent only tracks the payoffs associated with their own behavior and update their learning weights accordingly. Initial weights determine the initial behavior of the system. For instance, when initial weights are equal and relatively small we see effectively random behavior on a uniform network at the start. At every time step each agent visits another agent to play a game, receives a payoff, and updates learning weights. This update can be symmetric -- both host and visitor update their network connection and strategy weights simultaneously -- or asymmetric -- the hosts only update their strategy choices when hosting whereas the visitors update both their network connection and strategy choices when visiting. The rationale for this particular asymmetry is that while individuals can control their behavioral strategies when hosting or visiting, and who they visit, they cannot control who decides to visit them. Specifically, we implement this asymmetry by having separate learning weights for hosting and visiting roles, allowing individuals the potential to learn different host and visitor strategies. Also, since hosts have no control over who decides to visit, only visitors update their network connections based on the interactions payoffs. The asymmetry in network updating allows for correlated equilibria to emerge and evolve with respect to player roles and therefore provides a way to investigate the conventional origins of norms of ownership or territoriality. Also, in contrast to many previous dynamic network models that allow network ties to form or dissolve discretely (14, 17, 36, 41), our model allows network connections to strengthen or weaken as a function of interaction payoffs. Since ties are rarely discrete in social networks (6,18,56), modeling network connections with reinforcement learning adds an important element of realism. Furthermore, modeling network ties through reinforcement learning avoids the need to fix the number of network ties which can affect the results (42). Instead, we allow the number (strength) of ties to evolve endogenously in response to learning. More precisely, we model a set of N agents engaged in pairwise games of conflict across a number rounds. Each round, every agent choses one other agent to visit and engages in an interaction. During each interaction the host and visitor independently choose a behavior, receive a payoff, and learn via reinforcement. All players have one interaction as a visitor and up to N − 1 interactions as a host. Each agent i has two vectors (wH, wD) and (wh, wd) with i's reinforcement weights for each strategy when hosting or visiting respectively. Each agent i also has a vector representing their reinforcement weights for choice of which player to visit: (wi1, wi2, ..., win) where wij represents the weight related to player i visiting player j. Self-visits are not allowed (wii = 0). Initial weights for both strategy choices are set to 1, while network partner weights are N−1. We adopted the convention of L = 19 so network partner weights for the uniformly set to L smallest population size we study (N = 20) would start at 1 (wij = 1 for all i, j with i (cid:54)= j as the 4 Figure 1 -- Coevolution of network ties and strategies. a, Payoff matrix for the hawk-dove game. b, Reinforcement learning for host and visitor roles. c, Starting from uniform homo- geneous mixing (fully connected network) and random strategies, populations tend to evolve into one of four stable outcomes depending on early random events and simulation parameters: Bourgeois, Paradoxical, Network or Hybrid solutions. Node colors represent strategy weights, node size is proportional to number of expected visitors and stronger connections are denoted with darker lines. baseline). We kept L constant across different population sizes to ensure that the reinforcement learning has a similar speed relative to total initial weights in larger population sizes. Changing L effectively varies network learning speed; larger L values slow the responsiveness of an agent to interaction payoffs. (See Supplemental Information for further details about initial weights and varying learning speeds.) The model has two modular dynamical components: discounting (δ) and errors (). Dis- counting involves reducing past learning weights as more reinforcement occurs, effectively allowing agents to forget older strategies and network connections (11, 37). Errors represent 5 cvisitor/hostHawkDoveHawk0, 01, x2Dovex1, 1y1, y2𝟏>𝒚𝒊≥𝒙𝒊>𝟎abStrategy played when hostingStrategy played when visitingParadoxical Strategy(dove at home; hawk visitor; homogeneous network)Network Solution(single dove-dove hub; hawk-hawk spokes)Bourgeois Strategy(hawk at home; dove visitor; homogeneous network)Time = 100Time = 10,000Time = 1,000,000Paradoxical/Hub-Spoke Hybrids(multiple hawk-dove hubs; hawk-playing spokes)Time = 0Reinforcement learning:After each interaction, edge weight (dashed arrow) and strategies (dotted arrows) are updated with payoff from payoff matrix a. In symmetric learning model, agents are allowed only one strategy for visiting and hosting.HawkDoveMixed mistakes, mutations, or noise where an agent selects a strategy or node in the network at ran- dom rather than according to their learning weights. Both of these components are known to impact the stability and long-run behavior of reinforcement learning (48). When taking an action, for a given agent in a given context (Host, Visitor, Partner Choice), the probability of choosing option s is proportional to the current relevant weights: (1) ws(cid:80) where  is the error rate, S is the relevant set of available choices (i.e., visiting strategies, hosting strategies, or choice of player to visit), s ∈ S and s(cid:48) ∈ S. P r(s) = (1 − ) s(cid:48) ws(cid:48) +  1 S After each instance of learning, the relevant weights are discounted by a factor δ and in- creased by the received payoff (π). s = (1 − δ)ws + πs w(cid:48) (2) where w(cid:48) s is the weights after updating and πs is the most recent payoff related to choosing action s. πs = 0 if action s was not chosen. All visits and strategy choices occur simultaneously within a round. All weights are updated simultaneously after each round at a rate of one update per related interaction from that round. Payoffs received for strategy choice when visiting do not alter the weights for strategy choice when hosting and vice versa. Likewise, payoffs received for hosting do not affect adjacency weights for choosing which other agents to visit. 3 Results We explore our model through simulations of reinforcement learning on the asymmetric dy- namic network. To provide some context for interpreting the simulation results, let us first describe the sort of solutions we see for games of conflict on dynamic networks. First, there are correlated equilibrium solutions. Note that a population may reach a correlated equilibrium by coordinating their strategies on whether they are host or visitor in one of two ways. Agents may learn to play hawk when hosting and dove when visiting. Hosts always receive the max- imal payoff and visitors always receive x2 (the bourgeois solution). Alternatively, agents may learn to play dove when hosting and hawk when visiting. This equilibrium grants the visitors the maximal payoff while the hosts receive x1 (the paradoxical solution). In these cases the resulting network is a homogeneous, fully connected graph that approximates a randomly mix- ing population. Once the correlated equilibrium is established, visiting any agent yields the same payoff as everyone is deploying the same strategies conditional on the same cues. These correlated equilibrium solutions effectively avoid any conflict between aggressive hawk strate- gies, and these solutions are commonly found in asymmetric network runs with discounting and errors. Distinct from correlated equilibrium solutions, there are network solutions that mitigate conflict by utilizing network structure alone: if any agent starts to lean towards dove as host then 6 agents learn to visit that dove-leaning agent more and also learn to play hawk when they visit. This produces a hub-spoke network structure with one dove-host attracting many hawk-visitors. In symmetric dynamic network runs we usually see network solutions emerge. Hybrid solutions involve a combination of the paradoxical correlated convention with the network solution where a small number of dove hubs learn the correlated equilibrium and visit each other while hawk spokes learn a pure (aggressive) strategy and maintain connection to the paradoxical dove-as- host hubs. Hybrid solutions usually emerge for asymmetric network runs with discounting but no errors (e.g., Fig. 2). Figure 2 -- Illustrative example. A representative result of coevolution of network and strate- gies in a larger population (N=500, discount δ = .01, no error, payoff x1 = x2 = 0.2, y1 = y2 = 0.6). Without errors the network approaches a complicated hybrid solution. Node size is proportional to number of expected visitors. Across all simulations we find that agents arrive at solutions to the games of conflict that fall into one of the four families described above: the two potential conventions (bourgeois and paradoxical), network solutions, or hybrid solutions (as in Fig. 1c). We find no instances of 7 HawkDoveMixedTime: 25 stepsTime: 1,000 stepsTime: 10,000 stepsTime: 1,000,000 steps Figure 3 -- Simulation results. a Heatmaps representing the proportion of outcomes approach- ing the paradoxical convention for the space of all possible games of conflict with symmetric payoffs (discount δ = .01, error  = .01, N=20). b Heatmap representing the proportion of outcomes approaching paradoxical convention for a slice of the asymmetric payoff space where y2 + x2 = 1, y1 + x1 = 1. The x axis shows the ratio of dove-dove to dove-hawk payoffs for visitors, while the y axis shows the same ratio for the hosts' payoffs. This ratio represents the relative incentive to find a dove parter while playing dove. (δ = .01,  = .01, N=20). c The proportion of paradoxical behavior produced by simulations runs (1,000 seeds) for random versus uniform initial learning weights both with and without network learning. Payoffs are as follows: y1 = 0.5, x1 = 0.4, y2 varies from 0.2 to 0.9 (along the x-axis), and x2 = y2− 0.1. The vertical dashed line represents symmetrical payoffs. When y2 < y1, payoffs are biased towards the bourgeois strategy, and when y2 > y1, payoffs are biased towards the paradoxical strategy. d, Convergence to homogeneous network in the Bourgeois and Paradoxical solution across dif- ferent population sizes. Parameters in this plot are as follows: Payoffs x2 = 0.3, y2 = 0.5, x1 = 0.6, and y1 = 0.8, δ = 0.01,  = 0.01. e, The degree distribution of networks across simu- lation results shows heterogeneity of network ties across individuals in the population (δ = .01, no error, N=1,000, payoff x1 = x2 = 0.2, y1 = y2 = 0.6, average of 10 simulations shown). 8 ●●●●●●●●●●●●●●●●●●●Random network(Erdos−Renyi)10010−110−210−310−4051015Node Strength sp(s)bdace the the mixed Nash equilibrium and simulation runs approach one of the four solution families by one million time steps with only very rare exceptions. The relative frequency of outcomes approaching each family varies with the presence of errors, the rate of discounting, and the specific values of the payoffs. Here we present the results with discounting for both network connections and strategies, as well as with and without errors. These results are qualitatively representative for a constellation of other factors, including larger population sizes, different rel- ative learning speeds for strategy and networks connections, and learning with no discounting. Additional results are discussed in the Supplemental Information. We conducted an exhaustive search of the entire payoff space for games of conflict (omitting near boundary cases where yi or xi approach 0 or 1). As shown in Fig. 3a, the paradoxical solution is by far the most prevalent outcome of simulation runs for symmetric payoffs. We also investigated the case where hosts and visitors have different payoff functions, effectively valuing resources differently when host versus visitor. When payoffs are biased in this way, such that it may be more valuable to play a particular strategy (hawk or dove) at home rather than away (or vice versa), the paradoxical solution is still prevalent, though less so when payoffs are strongly biased towards the bourgeois solution (Fig. 3b; SI). It is important to note that biasing the payoffs in this way makes the bourgeois solution Pareto optimal and, in many contexts, makes it the preferred or expected equilibrium of evolutionary processes (45, 49). The prevalence of the paradoxical solution in cases where the payoffs favor the bourgeois solution reveals the influence dynamic networks on breaking the symmetry of conventions. Initializing simulations with random rather than uniform starting learning weights on initial strategies further increases the prevalence of paradoxical results on dynamic networks (Fig. 3c). As a control case, we examined the model without network learning where agents simply choose whom to visit at random every round while still including asymmetric strategy updating. This is equivalent to a randomly mixing population. As one would expect in this case, we see an even split between bourgeois and paradoxical solutions when payoffs are symmetrical (Fig. 3c). When payoffs are biased towards one solution or another we see a proportional increase in that solution evolving, with random learning weights introducing more noise. Perhaps surprisingly, the dynamical results are insensitive to population size -- we see the same qualitative dynamics in populations of sizes from 20 to 2,000 (Fig. 3d). Without errors discounting leads to behavioral trapping; agents may eventually forget strat- egy choices and network connections, sometimes producing suboptimal results (37). In our model discounting without errors produces stable complex hybrid solutions with only rare ex- ceptions. Fig. 2 shows the network evolution and emergence of a hybrid solution for a large population without errors. These networks have heterogeneous degree distributions that are different from random (i.e., Erdos-Renyi) networks (Fig. 3e). The difference from random net- works arises in the tail of the degree distribution, indicating a substantial probability to observe nodes with far more connections than the typical value. This reflects the formation of hubs (either pure dove or paradoxical) that attract many visitors, illustrating a phenomenon found in many real-world networks (5,8,52). Learning to avoid conflict via reinforcement learning with- out discounting thus produces a result relevant to current network science: we see realistic net- 9 work structures produced by an alternative mechanism of social network formation that differs from the preferential attachment and fitness models. Those models are based on a mechanism of growing the network by adding nodes that preferentially attach to already highly-connected nodes in the network. Our social network formation model is a self-organizing mechanism that is based on a network with a fixed number of nodes in which tie strengths are modified to avoid conflict. Errors promote exploration and allow learning to avoid the trapping states. When including an error rate ( = 0.001 or 0.01) the system becomes ergodic, but simulations in the medium- run always show populations close to one of the four solution families. Most often the system is found near one of the conventional solutions with a near homogeneous network. In contrast to Fig. 2, the inclusion of errors tends to eliminate the dove hubs found in hybrid solutions. Through exploration allowed by errors, the dove hubs tend to find each other and quickly learn the paradoxical solution. Once this starts to catch on, the rest of the population follows, which produces a more homogeneous network playing a correlated equilibrium (see Fig. 4). This result is observed across population sizes (Fig. 3d). Of particular interest in reinforcement models is learning speed. Learning speeds can be varied in the model by varying the rate at which weights are accumulated. We systematically investigated the relative speeds of learning for updating network ties and strategies. Previous studies found that varying learning speeds have a noticeable effect on results. Faster network learning speeds tends to promote cooperation (14,37,48). In our model we found varying learn- ing speeds had relatively little effect on resulting behavior. Without errors faster network learn- ing speed tends to produce hybrid or network solutions, closing off the correlated equilibria. With the addition of errors the network solutions disappear and we see mostly the paradoxical convention. When strategy learning is faster agents tend to quickly learn one of the conventional solutions and the network tends to stay more homogenous throughout their evolution (for more detailed discussion of these results see Supplemental Information). 4 Discussion The simulation results support a general conclusion: dynamic networks consistently favor the paradoxical solution over the bourgeois solution across a wide range of parameters. The results for probing the possible payoff space for games of conflict show how frequently simulations produce paradoxical outcomes (Fig. 3a). Notice the relative rarity of the bourgeois solution, even for cases where host and visitor attach different values to playing hawk as host versus hawk as visitor (Fig. 3b). Only when payoffs are very strongly biased in favor of playing dove when visiting, or against dove when hosting, do we find the bourgeois solution more often than the paradoxical solution (Fig. 3c). If there is no bias or any bias in favor of dove when hosting, or against dove when visiting, the paradoxical solution is far more prominent. A common view on the origin of territoriality or norms of ownership takes the evolution and stability of the bourgeois correlated equilibrium to provide a rationale for aggressively defending territories or 10 Figure 4 -- Temporal evolution. Analysis of the possible evolutionary trajectories that produce the paradoxical solution. While some populations find the paradoxical solution right away, most transition to the paradoxical convention by first developing a hub-spoke structure indicative of network or hybrid solutions. Plots show mean value across all simulations that fall into a specific evolutionary path. Node size shown proportional to number of expected visitors. resolving conflicts over resources in favor of hosts (27, 31, 32, 47). In stark contrast, our results show that a host-guest norm, where the host concedes resources to a visitor, evolves far more readily than any norm of territoriality. The prevalence of the paradoxical solution occurs because the network solution breaks the symmetry between correlated equilibria. In network solutions hubs are strongly reinforced to play dove as host. If a hub agent finds another dove host to visit then the hub will visit that host more. Once the network connection is strengthened, while hub agents are reinforced to play dove as host by their hawk visitors, they can learn to play hawk as visitor against the other dove host. When this correlated convention is discovered, the rest of the population quickly learns it. Fig. 3 shows the possible evolutionary routes to the paradoxical solution. It is only when the bias of the payoffs toward hawk-when-hosting and dove-when-visiting is strong enough to overwhelm the influence of the dynamic network that we see the regular evolution of the bourgeois strategy. This is further illustrated by the fact that slower network learning does not lead to the paradoxical solution as frequently as fast network learning (see Supplemental Information). This result has an important implications for evolutionary accounts of when or where cer- tain conventions may arise. Note that our model represents scarcity of resources indirectly as variation in payoff biases (Fig. 2d-e), though we do not consider catastrophic scarcity or inter- action outcomes. So, for instance, in the case of territories individuals either are not evicted when conceding to an aggressive opponent, or they can find another territory without severe cost. Also, the model assumes that losses incurred when playing dove against hawks are not overwhelming; individuals do not die or lose all mating opportunities if they concede too many resources. Including scarcity of resources introduces new dynamical elements that may produce different results. If the number of territories is severely limited and a territory is necessary for 11 Transition to paradoxical solution directly.(11% of simulations)Transition via complete hub-spoke with a single hub.(8% of simulations)Transition via some network solution (two or more hubs).(81% of simulations)Invention of correlated convention. survival or reproduction, then there is a zero-sum aspect to holding territories that would im- pact the evolutionary dynamics beyond the game of conflict. The potential significance of these factors would mean that ownership of a territory or control of the resource would confer some intrinsic value and norms of ownership would not play a merely conventional role in avoiding conflict. Our model reveals that in dynamic networks a prevalence territoriality is not due to relatively small differences in efficiency between the bourgeois and paradoxical conventions. These results support the view that territoriality is prevalent because holding a territory has sig- nificant value beyond providing an efficient convention for resolving potential conflicts. If there is no scarcity of resources, or no competition over territories, a host-guest convention is much more likely to emerge even when moderately inefficient. Indeed, this may explain why we tend to see host-guest conventions emerge in many domains of human interaction. Regarding the evolution of convention more generally, Peyton Young defines a convention as a "pattern of behavior that is customary, expected and self-enforcing" (57) and other schol- ars have identified correlated equilibria as central to conventions (51). Our results demonstrate that correlated equilibria can readily emerge in dynamic networks. In this setting, which agent initiates the interaction provides a ready cue for reinforcement learning and sets the stage for correlated equilibria. Although some accounts of convention involve agents' expectations or beliefs about the behavior of other agents (29, 51, 57), our model shows that learners with no such beliefs or expectations can establish convention-like behavior (i.e., strategic behavior uni- formly adopted from amongst equally viable alternatives that is self-enforcing). Furthermore, many potential conventions in game-theoretic contexts pose problems of symmetry since many conventions are equally efficient. The results presented here show that equally efficient conven- tions will not evolve with equal probabilities in dynamic networks and thus provides a potential answer to the equilibrium selection problem (44) in these cases. In conclusion, our results have two important consequences. First, allowing individuals to avoid aggressive neighbors by choosing their interaction partners through a realistic learning mechanism (reinforcement learning) reveals a novel way to resolve games of conflict by pro- moting hub-spoke structures that, in turn, break the symmetry between correlated equilibria in a strongly biased way. We know that learning in social networks has profound effects on dy- namics for other classes of games and most often the results show that dynamic networks favor cooperation in prisoner's dilemma or stag hunt games (14, 37, 41, 48). Our study of dynamic networks in games of conflict adds further generality to these results -- the network structures that evolve help resolve conflict -- and also reveals a surprising tendency to undermine the usual narrative about how the bourgeois convention provides a rationale for norms of ownership or property. Reinforcement learners in dynamic networks have a strong tendency to find the para- doxical solution. Agents only tend to find the bourgeois solution when there are obvious and systematic benefits to territorial behavior: the interaction payoffs for games of conflict need to be biased in such a way that the host values playing hawk much more than a visitor. This entails that insofar ownership and territoriality are probably widespread due to the intrinsic importance of holding resources or the value of owning a territory rather than as a convention for avoiding conflict. Second, simple reinforcement learning in a dynamic network can produce realistic 12 network structures in a way that does not presume a growing network with preferential attach- ment. Exploring how learning to resolve conflict may interact with preferential attachment to influence the structure of human social networks is an exciting prospect for future research. Data Generation and Analysis Simulations were written in C++ and run for 106 rounds of play. Data aggregation and network plots were created using Python and R. When examining asymmetrical payoffs two approaches were used. First, we consider cases where xi + yi = 1 but varied the xi/yi ratio between players 1 and 2. Second, we relaxed the requirement of xi + yi = 1 and considered points varied at regular payoff intervals. Code Availability Replication code available on GitHub at https://github.com/riedlc/ConflictAndConvention. Acknowledgements This research was supported in part by Army Research Office grant W911NF-14-1-0478, and Office of Naval Research grants N00014-16-1-3005 and N00014-17-1-2542. Author contributions statement M.F., P.F., R.S., C.R. conceived the experiments, M.F. implemented simulations in C++, M.F. and C.R. conducted the experiment(s), analyzed results, and prepared the figures, P.F., R.S., C.R. wrote the manuscript, M.F., P.F., R.S., C.R. wrote the supplemental information. All authors contributed to all aspects of the project. Additional information Competing financial interests The authors declare no competing financial interests. References 1. J. M. Alexander. The Structural Evolution of Morality. Cambridge University Press, 2007. 13 2. B. Allen, G. Lippner, Y.-T. Chen, B. Fotouhi, N. Momeni, S.-T. Yau, and M. A. Nowak. Evolutionary dynamics on any population structure. Nature, 544:227 -- 230, 2017. 3. J. Arifovic, J. F. Boitnott, and J. Duffy. Learning correlated equilibria: An evolutionary approach. Journal of Econmic Behavior & Organization, 2016. 4. R. J. Aumann. Subjectivity and correlation in randomized strategies. Journal of Mathemat- ical Economics, 1(1):67 -- 96, 1974. 5. A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509 -- 512, 1999. 6. A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani. The architecture of com- plex weighted networks. Proceedings of the National Academy of Sciences, 101(11):3747 -- 3752, 2004. 7. A. W. Beggs. On the convergence of reinforcement learning. Journal of Economic Theory, 122(1):1 -- 36, 2005. 8. A. Clauset, C. R. Shalizi, and M. E. Newman. Power-law distributions in empirical data. SIAM Review, 51(4):661 -- 703, 2009. 9. P. S. Dodds and D. J. Watts. A generalized model of social and biological contagion. Journal of Theoretical Biology, 232(4):587 -- 604, 2005. 10. J. Duffy and N. Feltovich. Correlated equilibria, good and bad: An experimental study. International Economic Review, 51(3):701 -- 721, 2010. 11. I. Erev and A. E. Roth. Predicting how people play games: Reinforcement learning in experimental games with unique, mixed strategy equilibria. American Economic Review, pages 848 -- 881, 1998. 12. K. Fehl, D. J. van der Post, and D. Semmann. Co-evolution of behaviour and social network structure promotes human cooperation. Ecology Letters, 6(11):546 -- 551, 2011. 13. D. P. Foster and R. V. Vohara. Calibrated learning and correlated equilibrium. Games and economic behavior, 21(1-2):40 -- 55, 1997. 14. T. L. Francisco C. Santos, Jorge M. Pacheco. Cooperation prevails when individuals adjust their social ties. PLoS Computational Biology, 2(10):e140, 2006. 15. D. Fudenberg and D. K. Levine. The theory of learning in games, volume 2. MIT press, 1998. 16. D. Fudenberg and J. Tirole. Game theory, 1991. Cambridge, Massachusetts, 393:12, 1991. 14 17. S. Goyal and F. Vega-Redondo. Network formation and social coordination. Games and Economic Behavior, 50:178 -- 207, 2005. 18. M. S. Granovetter. The strength of weak ties. American Journal of Sociology, 78(6):1360 -- 1380, 1973. 19. T. Gross and B. Blasius. Adaptive coevolutionary networks: a review. Journal of the Royal Society Interface, 5:259 -- 271, 2008. 20. F. Guala and L. Mittone. How history and convention create norms: an experimental study. Journal of Economic Psychology, 31:749 -- 756, 2010. 21. S. Hart and A. Mas-Colell. a simple adaptive procedure leading to corrlated equilibrium. Econometrica, 68(5):1127 -- 1150, 2000. 22. C. Hauert and M. Doebeli. Spatial structure often inhibits the evolution of cooperation in the snowdrift game. Nature, 428(6983):643 -- 646, 2004. 23. R. J. Herrnstein. On the law of effect. Journal of the Experimental Analysis of Behavior, 13(2):243 -- 266, 1970. 24. S. Huttegger, B. Skyrms, P. Tarres, and E. Wagner. Some dynamics of signaling games. Proceedings of the National Academy of Sciences, 111(suppl. 3):10873 -- 10880, 2014. 25. M. O. Jackson and A. Watts. On the formation of interaction networks in social coordina- tion games. Games and Economic Behavior, 41(2):265 -- 291, 2002. 26. S. Kakade, M. Kearns, J. Langford, and L. Ortiz. Correlated equilibria in graphical games. In Proceedings of the 4th ACM Conference on Electronic Commerce, pages 42 -- 47, San Diego, California, USA, 2003. ACM. 27. H. Kokko, A. L´opez-Spulcre, and L. J. Morrell. From hawks and doves to self-consistent games of territorial behavior. The American Naturalist, 167:901 -- 912, 2006. 28. J. R. Krebs and N. B. Davies. An Introduction to Behavioral Ecology. Blackwell, London, 1993. 29. D. Lewis. Convention. Harvard University Press, 1969. 30. M. W. Macy and A. Flache. Learning dynamics in social dilemmas. Proceedings of the National Academy of Sciences, 99:7229 -- 7236, 2002. 31. J. Maynard Smith. Evolution and the Theory of Games. Cambridge university press, 1982. 32. J. Maynard Smith and G. R. Parker. The logic of asymmetric animal contests. Nature, 146:15 -- 18, 1976. 15 33. M. Mesterton-Gibbons, T. Karabiyik, and T. N. Sherratt. The iterated hawk-dove game revisited: the effect of ownership uncertainty on bourgeois as a pure convention. Dynamic Games and Applications, 4:407 -- 431, 2014. 34. M. A. Nowak. Five rules for the evolution of cooperation. Science, 314:1560 -- 1563, 2006. 35. H. Ohtsuki, C. Hauert, E. Lieberman, and M. A. Nowak. A simple rule for the evolution of cooperation on graphs and social networks. Nature, 441(7092):502 -- 505, 2006. 36. J. M. Pacheco, A. Traulsen, and M. A. Nowak. Coevolution of strategy and structure in complex networks with dynamical linking. Physical Review Letters, 97(25):258103, 2006. 37. R. Pemantle and B. Skyrms. Newtork formation by reinforcement learning: the long and medium run. Mathematical Social Sciences, 48:315 -- 327, 2004. 38. M. Perc and A. Szolnoki. Coevolutionary games -- a mini review. Biosystems, 99:109 -- 125, 2010. 39. F. L. Pinheiro, J. M. Pacheco, and F. C. Santos. From local to global dilemmas in social networks. PLoS One, 7:e32114, 2012. 40. F. L. Pinheiro, F. C. Santos, and J. M. Pacheco. Linking individual and collective behavior in adaptive social networks. Physical Review Letters, 116:128702, 2016. 41. D. G. Rand, S. Arbesman, and N. A. Christakis. Dynamic social networks promote co- operation in experiments with humans. Proceedings of the National Academy of Sciences, 108(48):19193 -- 19198, 2011. 42. D. G. Rand, M. A. Nowak, J. H. Fowler, and N. A. Christakis. Static network struc- ture can stabilize human cooperation. Proceedings of the National Academy of Sciences, 111(48):17093 -- 17098, 2014. 43. A. E. Roth and I. Erev. Learning in extensive-form games: Experimental data and simple dynamic models in the intermediate term. Games and Economic Behavior, 8(1):164 -- 212, 1995. 44. L. Samuelson. Evolutionary Games and Equilibrium Selection. MIT Press, 1997. 45. W. Sandholm. Population games and evolutionary dynamics. MIT Press, 2010. 46. F. C. Santos and J. M. Pacheco. Scale-free networks provide a unifying framework for the emergence of cooperation. Physical Review Letters, 95(9):098104, 2005. 47. B. Skyrms. Evolution of the Social Contract. Cambridge University Press, 2014. 16 48. B. Skyrms and R. Pemantle. A dynamic model of social network formation. Proceedings of the National Academy of Sciences, 97(16):9340 -- 9346, 2000. 49. G. Szab´o and I. Borsos. Evolutionary potential games on lattices. Physics Reports, 624:1 -- 60, 2016. 50. G. Szab´o and G. F´ath. Evolutionary games on graphs. Physics Reports, 446:97 -- 216, 2007. 51. P. Vanderschraaf. Convention as correlated equilibrium. Erkenntnis, 42:65 -- 87, 1995. 52. D. J. Watts and P. S. Dodds. Influentials, networks, and public opinion formation. Journal of Consumer Research, 34:441 -- 458, 2007. 53. J. W. Weibull. Evolutionary Game Theory. MIT press, 1997. 54. B. Wu, D. Zhou, F. Fu, Q. Luo, and A. Wang, L.AND Traulsen. Evolution of cooperation on stochastic dynamical networks. PloS One, 5(6):e11187, 2010. 55. B. Wu, D. Zhou, F. Fu, Q. Luo, L. Wang, and A. Traulsen. Evolution of cooperation on stochastic dynamical networks. PLoS One, 5:e11187, 2010. 56. S.-H. Yook, H. Jeong, A.-L. Barab´asi, and Y. Tu. Weighted evolving networks. Physical Review Letters, 86(25):5835, 2001. 57. H. P. Young. The evolution of conventions. Econometrica, 61:57 -- 84, 1993. 17
1709.02511
1
1709
2017-09-08T02:41:41
Predicting the Popularity of Topics based on User Sentiment in Microblogging Websites
[ "cs.SI" ]
Behavioral economics show us that emotions play an important role in individual behavior and decision-making. Does this also affect collective decision making in a community? Here we investigate whether the community sentiment energy of a topic is related to the spreading popularity of the topic. To compute the community sentiment energy of a topic, we first analyze the sentiment of a user on the key phrases of the topic based on the recent tweets of the user. Then we compute the total sentiment energy of all users in the community on the topic based on the Markov Random Field (MRF) model and graph entropy model. Experiments on two communities find the linear correlation between the community sentiment energy and the real spreading popularity of topics. Based on the finding, we proposed two models to predict the popularity of topics. Experimental results show the effectiveness of the two models and the helpful of sentiment in predicting the popularity of topics. Experiments also show that community sentiment affects collective decision making of spreading a topic or not in the community.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) Predicting the Popularity of Topics based on User Sentiment in Microblogging Websites Xiang Wang · Chen Wang · Zhaoyun Ding · Min Zhu · Jiumin Huang 7 1 0 2 p e S 8 ] I S . s c [ 1 v 1 1 5 2 0 . 9 0 7 1 : v i X r a Received: Aug. 06, 2016 / Accepted: date Abstract Behavioral economics show us that emotions play an important role in individual behavior and decision-making. Does this also affect collective decision making in a community? Here we investigate whether the community sentiment energy of a topic is related to the spreading popularity of the topic. To compute the community sentiment energy of a topic, we first analyze the sentiment of a user on the key phrases of the topic based on the recent tweets of the user. Then we compute the total sentiment energy of all users in the community on the topic based on the Markov Random Field (MRF) model and graph entropy model. Ex- periments on two communities find the linear correlation between the community sentiment energy and the real spreading popularity of topics. Based on the finding, we proposed two models to predict the popularity of topics. Experimental results show the effectiveness of the two models and the helpful of sentiment in predicting the popularity of topics. Experiments also show that community sentiment affects collective decision making of spreading a topic or not in the community. Keywords Popularity · Community Sentiment Energy · Microblogging 1 Introduction Predicting is a forever interesting research point in human history. With the rapid development of Web 2.0 applications, massive online users' personal information Xiang Wang, Min Zhu Academy of Ocean Science and Engineering, National University of Defense Technology, Changsha, 410073, China Tel.: +86-18975898277 E-mail: [email protected] Zhaoyun Ding College of Information System and Management, National University of Defense Technology, Changsha, 410073, China Chen Wang, Jiumin Huang College of Computer, National University of Defense Technology, Changsha, 410073, China 2 Xiang Wang et al. 0.7 0.6 0.5 0.4 0.3 0.2 0.1 i s c p o t l l a f o e g a t n e c r e P 0 100 101 Number of days 102 Fig. 1 Life cycle of topics on SINA Weibo. X-axis is on a base-10 log scale appears in these applications and makes the predicting of online content possi- ble. We take the Chinese microblogging website SINA Weibo for instance. It is very similar to Twitter in United States and is one of the most popular sites in China. There are more than 503 million registered users and about 100 million messages posting each day on SINA Weibo 1. Given such amazing large number of information spreading between a large number of users, microblogging website is a channel of information propagation of the topics in the real world, and it also influences the development of the related events, activities in the real world. For example, the hot event of "Guo Meimei" in June 2011 affects the credit of the Red Cross Society of China deeply, which received much less donation after the event. Guo Meimei was authenticated as the general manager of Red Cross Commerce, showed pictures of her lavish lifestyle of driving Mercedes and owning a big mansion on SINA Weibo. Her lavish lifestyle drew skepticism from people who questioned if her wealth came from the Red Cross Society of China. So it is important to predict the popularity of topics. There have been some efforts building models to predict the popularity of online contents [34] [21] [20]. They predicted future popularity of a given online content based on its early popularity and user's early reactions. Szabo and Hu- berman [29] firstly found the strong linear correlation between the logarithmically transformed popularity of content at early and later times. Based on the founding, they proposed Szabo-Huberman (SH) model to predict the popularity of online content. Some researches [34] [2] tried to improve the performance of SH model. There is one problem with existing methods. In Figure 1, we can find that 74.14% topics last for less than 10 days and 81.38% topics last for less than 30 days. Topics change so quickly that it is important to predict the popularity of topics before they happen to earn enough time to make online advertising plans for business and so on. Existing methods focus on predicting future popularity of online contents which have already appeared based on their early popularity and users' early reactions, but they can not predict the popularity of topics which appear right now or do not even happen. [24] We know little about what drives popularity of topics in social network. Sal- ganik et al. [26] answered the question experimentally by measuring the impact of content quality and social influence on the popularity of cultural artifacts like 1 SINA Weibo. Wikipedia. https://en.wikipedia.org/wiki/Sina Weibo Title Suppressed Due to Excessive Length 3 songs, movies. They found that quality contributes little to their popularity, while the choices of others (social influence) affect the choice of the user and are re- sponsibility of the success of cultural artifacts. They answer the question on an individual's point rather than group perspective. What drives the choices of a com- munity or a network? In this paper, we try to answer the question on the perspec- tive of the whole community of network based on user sentiment. Psychological researches [10] [14] show that emotions (except information) play an significant role in human decision-making. The decisions of online users to diffuse the tweets of a topic or not influence the popularity of the topic, so we consider whether the emotions of users influence topic popularity. Thelwall et al. [30] find the close relationship between popular evens and the increase of sentiment strength. Bollen et al. [5] introduced public sentiment to predict stock market. We study if the sentiment of the users on a topic is related to the popularity of the topic in a community. In this paper, we use the number of tweets in a topic to be the popularity of the topic. We compute the sentiment of online users on key phrases of a topic in a training dataset of tweets obtained from SINA Weibo API. The sentiment of a user on the key phrases of a topic can influence the decision of discussing about it or not. For example, if a user is a big fan of movie actor Arnold Schwarzenegger, then the user is probably to discuss the topic about Arnold Schwarzenegger. We intro- duce Markov Random Field (MRF) model [18] and graph entropy model [19] [28] to compute the total topic sentiment energy in a community based on the users' sentiment on key phrases of the topic. Pearson correlation coefficient [33] measures the linear correlation between the community sentiment energies computed from the training dataset and the real future popularity of testing topics in the test- ing dataset. Our experimental results show that they are linearly correlated and indicate the latent ability for predicting the popularity of topics. Based on the finding, we propose two linear methods to predict the popularity of un-happened topics. The first one is a one variable linear regression model named LinearMRF model based on the community sentiment energy. The second is a multivariate linear regression model named EdgeMRF model, which assume that the real popularity of topics associates the energy of each edge in the graph of the community, rather than the community sentiment energy. We find that the two methods are effective in predicting the popularity of topics and the EdgeMRF model is significantly better than the LinearMRF model. The main contributions of this paper can be summarized as follows: – We find that there is significant linear correlation between the community sentiment energy and the real popularity of topics in a community. It shows the effectiveness of sentiment in predicting the popularity of topics and the sentiment of a community can affect collective decision making of spreading a topic or not. – Based on the finding, we propose two methods to predict the popularity of topics based on community user sentiment. We are the first trying to predict the popularity of topics that have not happened. – Extensive experiments on two communities verify our finding and show the effectiveness of the methods in predicting the popularity of topics that have not happened. 4 Xiang Wang et al. The rest of this paper is organized as follows: Section 2 discusses some impor- tant related works. Section 3 introduces our framework for measuring the linear correlation between the community sentiment energy and the real popularity of topics. Based on the results of the Section 3, we introduce two models to pre- dict the popularity of topics in Section 4. Finally, conclusion and discussion are provided in Section 5. 2 Related Works 2.1 Popularity Prediction Some researches try to predict based on user sentiment. Thelwall et al. [30] studied whether popular events are typically associated with the increase of sentiment strength. They found that popular events are normally associated with increases in negative sentiment strength. Bollen et al. [5] compared the changing of Twitter mood with the Dow Jones Industrial Average (DJIA) over time and found the association relation between them. They used the relation to predict stock market. There are a large number of works predicting popularity of online content like news, videos, and tweets in social networks. Crane and Sornette [8] identified four main classes of the popularity evolution patterns of YouTube videos. They explained the reason of the four main classes by the combination of endogenous and exogenous effects. Szabo and Huberman [29] studied the problem of predicting the popularity of online content on Digg and Youtube. They found that there were a strong linear correlation between the logarithmically transformed popularity of content at early and later times. Because of the founding, they presented a model to predict future popularity based on the popularity of early times. Pinto et al. [24] improved Szabo and Huberman's method [29] using the historical information given by early population measures in Youtube. Figueiredo et al. [15] studied growth patterns of video popularity and the types of the referrers that most often attracted users to videos on such patterns. Wu et al. [34] proposed a reservoir computing based model to predict the near future popularity of a Web object. But their model does not outperform the Szabo-Huberman model [29], as reported by the authors. Lee et al. [20] try to predict if a thread in a discussion forum will stat in popular in the near future using biology-inspired survival analysis method. Yin et al. [35] tried to rank items in online sharing systems according to their excepted popularity. Their method was built on a model of user behavior and early votes of the items. Bao et al. [2] studied the importance of structural characteristics for the popularity of tweets on SINA Weibo. They find that the prediction accuracy can be improved by incorporating the factor of structural diversity into some existing content based methods. Gao et al. [16] tried to find effective features for tweet popularity prediction. They obtain the temporal features of first 10 retweets which satisfy prediction performance. Kristina and Tad [21] proposed a stochastic models of user behavior based method to predict popularity in social news portal Digg. They use early user reactions to a new submission to to predict how many votes the story will get a few days later. Hong et al. [17] cast the task of predicting the popularity of messages into a classification problem by investigating features like the content of the messages, users' social graph and so on. Title Suppressed Due to Excessive Length 5 There are some researches predicting hot topics in online forums or information retrieval systems, but they did not utilize the rich relations between users in social network. Tong et al. [31] put forward an adaptive autoregressive model to predict hot topics in the near future based on the web browsing log information. Buckley [7] tried to improve the performance of information retrieval by predicting which topics work well with which approaches. 2.2 Sentiment Analysis Sentiment analysis, which is also named opinion mining, is to study text with sentiments, opinions, emotions and so on. In social network platforms, users are free to express their daily sentiments and opinions. Many researches focused on this research area in social networks. Barbosa et al. [3] proposed a method to detect user sentiments on Twitter tweets using characteristics of how tweets are written and meta-information of the words in the tweets. Davidov et al. [12] pro- posed a supervised sentiment classification framework by utilizing 50 Twitter tags and 15 emoticons. Jonathon Read [25] used emoticons to reduce dependency in Machine learning methods for sentiment classification. Diakopoulos et al. [13] char- acterized the performance of U.S. presidential debate in 2008 by analyzing users sentiments in twitter. Bollen et al. [6] extract six dimensions of mood (tension, depression, anger, vigor, fatigue, confusion) and compared the results with fluc- tuations recorded by stock market. Tumasjan et al. [32] found that Twitter user sentiment validly mirror offline German federal election. Bifet et al. [4] found that Twitter messages are short and generated constantly, and well suited the char- acteristics of data stream. They proposed a stream based method on sentiment analysis. Although there are many researches in computing the sentiment of a post in microblogging websites, the computing time is too long to be used, since there are 155,941,545 tweets in our "Jackie Chan" dataset and 12,633,641 tweets in our "Zhi-Hua Zhou" dataset. So we use the simple sentiment computing method of using emoticons like [12] and then compute the community sentiment energy of topics. 3 Framework of our methods 3.1 Dataset and methods overview We obtained public tweets for six months from Jul. 1st to Dec. 31st, 2014 using SINA Weibo API. We got 6,824,948,570 public tweets of 90,388,540 users. If a user i retweets from user j or mentions user j (@username), then there is a retweet- mention-relation between user i and j. The relations between users were extracted from the 6,824,948,570 public tweets of 90,388,540 users. User's social graph G was constructed based on the retweet-mention-relations between the users. We obtained a user community in the graph G of the 90,388,540 users from a specific 6 Xiang Wang et al. Fig. 2 The framework of our methods. There are mainly 5 phases: (1) Extract test topics and their top-m key phrases using ANSJ toolkit; (2) Analyze user's sentiment on the top-m key phrases of topics; (3) Compute the total sentimental energy of the community using Markov Random Field (MRF) model and graph energy model; (4) Measure the linear correlation between the total sentimental energy of the community and the real popularity of topics; (5) Propose two methods to predict the popularity of topics that have not happened yet. user who is the only one in the initial seed set SeedSet based on the retweet- mention-relations. The community is made by the neighbors at distance up to M axDepth. We got a community of 137,613 users from the specific user "Jackie Chan" 2, who is a famous Hong Kong movie actor 3. Another community is from user "Zhi-Hua Zhou" 4, who is the ACM/AAAS/AAAI/IEEE Fellow majoring in machine learning of Nanjing University 5. There are 16,628 users in the "Zhi-Hua Zhou" community. The maximum depth M axDepth is 4 in the "Jackie Chan" community and 3 in the "Zhi-Hua Zhou" community, since there are too many users which will take too long time to finish computing in the "Zhi-Hua Zhou" community if M axDepth is 4. We extracted public tweets of the users in the two communities for six months from Jul. 1st to Dec. 31st, 2014 on SINA Weibo. There are totally 155,941,545 tweets in the "Jackie Chan" dataset and 12,633,641 tweets in the "Zhi-Hua Zhou" dataset. We split the dataset into two parts: train dataset which contains 110,938,220 tweets in the "Jackie Chan" dataset (8,039,686 tweets in the "Zhi-Hua Zhou" dataset) in the first four months from Jul. 1th to Oct. 31 and test dataset which contains 45,003,325 tweets in the "Jackie Chan" dataset (4,593,955 tweets in the "Zhi-Hua Zhou" dataset) in the last two months from Nov. 1 to Dec. 31. As shown in Figure 2, our methods proceed in five phases. In the first phase, we extract testing topics from the test dataset of the last two months and the details are in Section 3.2. For each testing topic, we gather all tweets in the topic to one document and extract top-10 key phrases from the document using the key phrase extraction tool ANSJ 6 which is an open source Chinese word processing toolkit. In the second phase, we compute the sentiment of every user on the top-10 2 Homepage of Jackie Chan on SINA Weibo. http://weibo.com/jackiechan. 3 Jackie Chan. Wikipedia. http://en.wikipedia.org/wiki/Jackie Chan. 4 Homepage of Zhi-Hua Zhou on SINA Weibo. http://weibo.com/zhouzh2012. 5 Zhi-Hua Zhou's Homepage. https://cs.nju.edu.cn/zhouzh/. 6 ANSJ: https://github.com/NLPchina/ansj seg Title Suppressed Due to Excessive Length 7 key phrases of each testing topic from the training dataset of the first 4 months. A 10-dimensional sentiment vector of the top-10 key phrases of a topic is built for a user. Each dimension in the sentiment vector corresponds to one of the top- 10 key phrases of the topic. The details of this phase are in Section 3.3. In the third phase, latent energy of the user community on a topic is calculated based on the sentiment vector built in the second phase using the training dataset. Markov random field (MRF) model [18] and graph entropy model [19] [28] are employed to compute the latent community sentiment energy of the user community. The details of this phase are in Section 3.4 and 3.5. In the fourth phase, we investigate the hypothesis that the community sentiment energy of a topic as computed based on user sentiment is predictive of future popularity of the topic. We use Pearson correlation coefficient 7 to correlate the real testing topic popularity in the testing dataset to the community sentiment energy computed in the training dataset. The details of this phase are in Section 3.6. In the fifth phase, we propose two methods to predict the popularity of the topics and employ the real popularity of the topics to validate the effectiveness of our methods. The details of this phase are in Section 4. 3.2 Testing topics and their key phrases On SINA Weibo, users can annotate tweets with hashtags ("#hashtag#" on SINA Weibo, "#hashtag" on Twitter) to indicate the ongoing topics. For exam- ple, "#Rio2016#" ("#Rio2016" on Twitter) is the hashtag indicating the topic of"Summer Olympics 2016". We use hashtags to represent topics and use the hash- tags to extract tweets of topics from the test dataset (if a tweet contains a hashtag, then the tweet is about the topic of the hashtag). It is a convenient way to cate- gorize tweets into different topics. In this paper, we use the number of tweets in a topic to be the popularity of the topic. We count the occurrence number of every hashtag in the tweets of our test datasets to be the popularity of the correspond- ing topic. If a tweet has multiple hashtags, then the tweet will belong to multiple topics in our experiments. To make sure that the topics have fully diffused and the popularity of the topics is correctly calculated, we only extracted topics (hashtags) which begin in the first month (November 2014) of the test dataset. Topics which begin in the second month (December 2014) may have not fully diffused and the number of tweets in the topics may not be correct. To count the number of tweets in the topics, the whole tweets in the test dataset of the two months (November and December, 2014) are used. We remove unpopular topics which are less than 100 tweets and get 5150 topics in the test dataset of the "Jackie Chan" community and 224 topics in the test dataset of the "Zhi-Hua Zhou" community. After removing topics with same number of tweets, we finally get 298 topics in the "Jackie Chan" community and 141 topics in the "Zhi-Hua Zhou" community for testing. Figure 3 shows the real popularity (the number of tweets) of the 298 topics and the 141 topics for testing. 7 Pearson correlation coefficient: https://en.wikipedia.org/wiki/Pearson product- moment correlation coefficient 8 Xiang Wang et al. i c p o T a n i s t e e w T f o r e b m u N 5 4 3 2 1 0 x 104 i c p o T a n i s t e e w T f o r e b m u N 0 50 100 150 200 250 300 2000 1500 1000 500 0 0 50 100 150 (a) "Jackie Chan" dataset (b) "Zhi-Hua Zhou" dataset Fig. 3 Number of tweets in the testing topics of the two communities ANSJ is an open source Chinese word processing toolkit. It can be used for keyword extraction, word segmentation and so on. NLPIR (ICTCLAS) 8 is also a popular Chinese word processing tool that can extract key phrases from a docu- ment, but NLPIR (ICTCLAS) can not handle large document quickly, so we choose ANSJ to process key phrases extraction. We add stopwords to ANSJ toolkit to avoid the appearance of them in the results. We gather all tweets in a topic to one document and then extract the top-m key phrases from the document using ANSJ. A topic k is then represented as a bag of key phrases as shown in Equation 1. T opick = [termk,1, termk,2, · · · , termk,m] (1) where termk,n(n = 1, 2, · · · , m) is one of the top-m key phrases extracted from topic k using ANSJ. We set m to be 10 empirically in all our experiments. 3.3 User sentiment on a topic Since a topic is represented as a bag of key phrases as shown in Equation 1, then the sentiment of a user on a topic can be represented by the sentiment on the top-m key phrases. We compute the user sentiment of the testing topics from the training dataset. Suppose s(ui)k,n is the sentiment of user ui on key phrase termk,n(n = 1, 2, · · · , m), then the sentiment sen(ui, k) of user ui on topic k is represented as Equation 2. sen(i, k) = [s(ui)k,1, s(ui)k,2, · · · , s(ui)k,m] (2) As the length of a tweet on SINA Weibo is very short without exceeding 140 characters, we simply assume that the sentiment of user ui on a key phrase of a tweet is equal to the sentiment of user ui on the tweet which contains the key phrase. If the key phrase does not exist in the tweet, the sentiment of ui on the tweet will be 0. There are a large percent of tweets that do not contain the key phrases of a topic, but we use months of user tweets in the training dataset and we compute sentiment energy of a community of users rather than a user. So there are still many tweets containing the key phrases of a topic for computing community sentiment energy. 8 NLPIR: http://ictclas.nlpir.org/ Title Suppressed Due to Excessive Length 9 Fig. 4 Typical emoticons on SINA Weibo In microblogging websites, the words in tweets are usually non-standardized and personalized. There are always a lot of new words existing and traditional methods for computing sentiment is hard to be used. There are so many tweets (110,938,220 tweets in the train dataset) that the amount of calculation is very huge. Many researches in computing the sentiment of a post in microblogging websites can not be used due to the computational speed in so many tweets. Emoticons are convenient ways for users in microblogging website to show their emotions and sentiment when they are posting tweets. We find that there are 52,602,698 tweets contains emoticons in the 110,938,220 tweets of the "Jackie Chan" train dataset. It is 47.42% of all tweets in the train dataset. We compute the user sentiment on a tweet based on 436 emoticons on SINA Weibo as shown in Figure 4 like [12]. We annotate the 436 emoticons to be positive, negative or neutral manually. There are three volunteers to annotate the 436 emoticons. If two or all of the three volunteers think the emoticon is positive (negative or neutral), then it is. There are no cases that all the three volunteers hold different opinions in the process of annotation since the emoticons are relatively easy to annotate. Suppose there are pos positive emoticons and neg negative emoticons on a tweet j which contains the key phrase termk,n(n = 1, 2, · · · , m), then the sentiment stweet(ui, j) of the user ui on the tweet j and the sentiment sphrase(ui, j)k,n of the user ui on the key phrase termk,n(n = 1, 2, · · · , 10) of tweet j can be calculated as Equation 3. sphrase(ui, j)k,n = stweet(ui, j) = (pos − neg)/(pos + neg) (3) If key phrase termk,n(n = 1, 2, · · · , m) does not appear in tweet j, then sphrase(ui, j)k,n = 0. If T weet(ui) is the set of all tweets of user ui, then the sentiment sen(ui)k,n of user ui on key phrase termk,n(n = 1, 2, · · · , m) in Equa- tion 2 can be calculated as shown in Equation 4. s(ui)k,n = 1 T weet(ui) X sphrase(ui, j)k,n (4) j∈T weet(ui) 3.4 Community Sentiment Energy based on Markov Random Field model Markov Random Field (MRF) [18], which is also known as Markov network or undirected graphical model, is a set of random variables having a Markov property in an undirected graph. MRF is commonly used in statistical machine learning to 10 Xiang Wang et al. model joint distributions, such as modeling image de-noising [22], information retrieval [23] and so on. A MRF is an undirected graph G = (V, E), where V = {u1, u2, ..., uN } is the set of users in social network, E is the set of retweet-mention- relations between users. Each node ui(i = 1, 2, · · · , N ) is associated with a random variable (RV), which is the sentimental vector sen(ui, k)(i = 1, 2, ..., N ) of user ui on topic k. To satisfy the Markov property, we assume that information only diffuses to neighbours. Then MRF satisfies p(sen(ui, k){sen(uj, k)}j=1,2,...,N ) = p(sen(ui, k){sen(uj, k)}uj ∈Ni ), where Ni is the neighbourhood of node ui, uj ∈ Ni if and only if (ui, uj) ∈ E. x According to MRF, suppose Cx is one of the max cliques in the graph and C = E(Cx, k). Cx, the total energy of graph G on topic k is E(G, k) = E(C, k) = P S x To simplify handling, we only consider the cliques with two nodes. In other words, we only consider the cliques where two nodes are connected by an edge. The energy of a max clique with multi nodes is simply the sum of energy of each sub-clique with two nodes. We define two kinds of energy function of cliques with two nodes: cosine measure and average length. We try to compute the community sentiment energy between ui and uj using the two functions to evaluate the probability of ui and uj talking about a topic in microblogging websites. We find that if two users have the same sentiment on a topic, they like to talk about it and the sentimental energy between them will be large. If they have opposite sentiment on a topic, they also like to debate on it and the sentimental energy between them will be large too. So traditional Euclidean Distance does not suit this case, since the sentimental energy will be zero if two users have exactly the same sentiment on a topic. So we use the average length of the two sentimental vectors to the zero-vector to represent the sentimental energy between two users. The absolute value of cosine similarity (cosine measure) of two vectors also suits this case. For energy function cosine measure, Equation 5 is the energy of the clique Cij between two nodes ui and uj. It is the absolute value of cosine similarity between sentimental vectors sen(ui, k)(i = 1, 2, ..., N ) and sen(uj, k)(j = 1, 2, ..., N ) of node ui and uj on topic k. E(Cij, k) = E(sen(ui, k), sen(uj, k)) = sen(ui, k) • sen(uj, k) sen(ui, k) • sen(uj, k) (5) For energy function average length, Equation 6 is the energy of the clique Cij between two nodes ui and uj. It is the average length of sentiment vectors sen(ui, k)(i = 1, 2, ..., N ) and sen(uj, k)(i = 1, 2, ..., N ) of node ui and uj. E(Cij, k) = E(sen(ui, k), sen(uj, k)) = sen(ui, k) + sen(uj, k) 2 (6) The community sentiment energy of graph (community) G on topic k can be calculated as Equation 7, E(G, k) = E(U, k) = X E(Cij, k) = X E(sen(ui, k), sen(uj, k)) (7) C (ui,uj )∈E where E is the edge set of Graph G. Title Suppressed Due to Excessive Length 11 3.5 Community Sentiment Energy based on Graph Entropy Model Shannon [27] proposed entropy to quantify information in information theory. Shannon's measure of information is the number of bits to represent the amount of uncertainty (randomness) in a data source. Korner et al. [19] [28] introduced graph entropy associated with the graph based on the Shannon entropy. Anand and Bianconi [1] studied different definition of entropy of network ensembles for the quantification of the complexity of networks. Cruz et al. [9] proposed a method to detect community based on the graph entropy. In this paper, we compute the graph entropy of a community (energy of a community) to show the quantification of the complexity of the community. Graph entropy, which measures the latent community sentiment energy of the graph, is computed based on the user sentiment vector of a topic. Given a graph G, suppose peij is the probability of edge eij of user ui and uj to communicate about the topic k. Like paper [1] and [9], the graph entropy (the sentiment energy) of the community can be calculated as Equation 8. E(G, k) = − X eij∈E (peij log(peij) + (1 − peij) log(1 − peij)) = − X C (E(Cij, k) log(E(Cij, k)) + (1 − E(Cij, k)) log(1 − E(Cij, k))) (8) where E is the edge set of Graph G. The probability peij of edge eij of user ui and uj to communicate about the topic k can be computed based on the user sentiment vectors sen(ui, k)(i = 1, 2, ..., N ) and sen(uj, k)(j = 1, 2, ..., N ). The function cosine measure in Equation 5 and average length in Equation 6 are used to compute peij. Suppose sen(ui, k) and sen(uj, k) are the sentiment vectors of user ui and uj for topic k, for function cosine measure, we can calculate peij as peij = E(Cij, k) = sen(ui,k)•sen(uj ,k) sen(ui,k)•sen(uj ,k) ; for function average length, we can calculate peij as peij = E(Cij, k) = sen(ui,k)+sen(uj ,k) 2 . 3.6 Linear Correlation Between Community sentiment Energy and the Real Popularity of Topics Section 3.4 and 3.5 shows two different models of MRF and graph entropy in computing community sentiment energy on a topic. Two energy functions cosine measure in Equation 5 and average length in Equation 6 are used to compute the energy or the probability peij to communicate between user ui and user uj. In this section, we study whether the community sentiment energy is predictive of the real popularity of a topic in the community. We study the linear correlation between the graph energy of a community and the real popularity. In this paper, we define the number of tweets in a topic to be the real popularity of the topic. Pearson correlation coefficient [33] developed by Karl Pearson is widely used to measure the linear correlation (dependence) between two variables. Correlation co- efficient r is to measure the strength of the relationship between the two variables. In general, the higher the correlation coefficient r, the stronger the relationship. Significance tests are done to test if correlation coefficient is significantly different 12 i s c p o t f o r e b m u N 300 250 200 150 100 50 0 10 100 200 300 400 500 600 700 800 9001000 The difference of the real popularity Xiang Wang et al. i s c p o t f o r e b m u N 150 100 50 0 1 10 50 100 150 200 The difference of the real popularity (a) "Jackie Chan" dataset (b) "Zhi-Hua Zhou" dataset Fig. 5 The number of topics in the 11 datasets. The gaps of the real popularity between every two topics in the test datasets are shown on the X axis from zero. There are often three typical significance level of p-value p: 0.01, 0.05 and 0.1. If p-value p is smaller than a significance level such as 0.05, then corre- lation coefficient is significantly different from zero in the significance level 0.05. We compute the r and p to test the linear correlation between the community sentiment energy and the real popularity. To test the linear relations between the community sentiment energy and the real popularity of topics, we constructed 11 test datasets (6 test datasets) ac- cording to the gap of the number of tweets between every two topics in the "Jackie Chan" ("Zhi-hua Zhou") dataset. The gap of the real popularity be- tween every two topics in a test dataset are equal or larger than N um(N um = 10, 100, 200, 300, 400, 500, 600, 700, 800, 900, 1000) in the "Jackie Chan" dataset and N um(N um = 1, 10, 50, 100, 150, 200) in "Zhi-hua Zhou" dataset. For example, for dataset N um = 10, The gap of the real popularity between every two topics are equal or larger than 10. Figure 5 shows the number of topics in the test datasets of the two communities. We compute the Pearson correlation coefficients of the community sentiment energy and the real popularity with the change of the different N um in the test dataset of the two communities. Table 1 and 2 shows the pearson correlation co- efficient results of community sentiment energy and real popularity on the 11 test datasets of "Jackie Chan" community and 5 test datasets of "Zhi-hua Zhou" com- munity. According to [11], the strength of correlation can be classified to five cat- egorisations: Zero(0), Weak(0.1-0.3), Moderate(0.4-0.6), Strong(0.7-0.9) and Per- fect(1.0). So if the p-value is smaller than the significance level and the Pearson correlation coefficient r-value is larger than 0.4, the linear correlation between the topic sentiment energy of a community and the real popularity is significant. In Table 1 and 2, we can find that the community sentiment energy computed by MRF model with energy function "cosine measure" has a significant linear correlation with the real topic popularity if the different N um is equal or larger than 100 in the "Jackie Chan" dataset and 1 in the "Zhi-hua Zhou" dataset. It means that it's possible to predict the popularity of topics that did not happen with a small error. Significant test student's t-test 9 is used to indicate statisti- cally significant improvements of one method over another methods. The p-values of student's t-test of the method "MRF+CosineMeasure" over the other three 9 Student's t-test. Wikipedia. https://en.wikipedia.org/wiki/Student's t-test Title Suppressed Due to Excessive Length 13 Table 1 Pearson correlation coefficient results of community sentiment energy and real pop- ularity in "Jackie Chan" dataset GraphEntropy +AverageLength r 0.1561 0.1572 0.1064 0.2225 0.2611 0.2895 0.2769 0.2207 0.2767 0.4073 0.3966 p 0.0128 0.1971 0.4764 0.1793 0.156 0.1277 0.1709 0.3115 0.2125 0.0668⋆ 0.0928 MRF + AverageLength r p MRF +CosineMeasure r p 0.2065 0.3329 0.3935 0.4067 0.5079 0.4459 0.5643 0.5485 0.4853 0.3973 0.5509 9.50E-04 0.0046 0.0062 0.0113⋆⋆ 0.003⋆ ⋆ ⋆ 0.0153⋆⋆ 0.0041⋆ ⋆ ⋆ 0.0067⋆ ⋆ ⋆ 0.022⋆⋆ 0.0828 0.0118⋆⋆ 0.2832 0.4295 0.5055 0.4157 0.5954 0.5580 0.6384 0.5111 0.5339 0.5792 0.6442 5.10E-06 1.60E-04⋆ ⋆ ⋆ 2.40E-04⋆ ⋆ ⋆ 0.0094⋆ ⋆ ⋆ 4.10E-04⋆ ⋆ ⋆ 0.0017⋆ ⋆ ⋆ 4.40E-04⋆ ⋆ ⋆ 0.0127⋆⋆ 0.0105⋆⋆ 0.0059⋆ ⋆ ⋆ 0.0029⋆ ⋆ ⋆ GraphEntropy + CosineMeasure r 0.1492 0.1929 0.1884 0.2399 0.3201 0.1529 0.256 0.0876 0.3459 0.1128 -0.1993 p 0.0169 0.1122 0.2048 0.1468 0.0792 0.4286 0.2273 0.6911 0.1149 0.6264 0.3995 Datasets 10 100 200 300 400 500 600 700 800 900 1000 ( Significance tests p-value<0.01: ⋆ ⋆ ⋆, p-value<0.05: ⋆⋆, p-value<0.1: ⋆) Table 2 Pearson correlation coefficient results of community sentiment energy and real pop- ularity in "Zhi-hua Zhou" dataset GraphEntropy +AverageLength r p 0.2107 0.4201 0.6697 0.6061 0.6875 0.6034 0.0125 0.0033⋆ ⋆ ⋆ 0.0045⋆ ⋆ ⋆ 0.0481⋆⋆ 0.0595⋆ 0.1514 MRF + AverageLength r p 0.1709 0.3928 0.6568 0.5656 0.6201 0.5506 0.0435 0.0063 0.0057⋆ ⋆ ⋆ 0.0698⋆ 0.1010 0.2003 MRF +CosineMeasure r 0.4196 0.6153 0.7275 0.8623 0.8488 0.9008 p 2.4682e-7⋆ ⋆ ⋆ 4.1738e-6⋆ ⋆ ⋆ 0.0014⋆ ⋆ ⋆ 6.3824e-4⋆ ⋆ ⋆ 0.0077⋆ ⋆ ⋆ 0.0056⋆ ⋆ ⋆ GraphEntropy + CosineMeasure r p 0.3758 0.4307 0.5636 0.6286 0.7162 0.7539 4.7416e-6 0.0025⋆ ⋆ ⋆ 0.0230⋆⋆ 0.0383⋆⋆ 0.0457⋆⋆ 0.0503⋆ Datasets 1 10 50 100 150 200 ( Significance tests p-value<0.01: ⋆ ⋆ ⋆, p-value<0.05: ⋆⋆, p-value<0.1: ⋆) methods "GraphEntropy+AverageLength", "MRF+AverageLength", "GraphEn- tropy+CosineMeasure" are 7.5e-007, 0.0011 and 1.5e-004 in the "Jackie Chan" dataset. The p-values of t-test over the three methods in the "Zhi-hua Zhou" dataset are 0.0022, 0.0017 and 0.0021. They are all smaller than typical signifi- cant level 0.01. It means that the method "MRF+CosineMeasure" is the best one of the four methods in computing the community sentiment energy. The method "MRF+AverageLength" in "Jackie Chan" dataset is also better than "GraphEn- tropy+AverageLength" and "GraphEntropy+CosineMeasure", since the p-values of "MRF+AverageLength" over "GraphEntropy+AverageLength" and "GraphEn- tropy+CosineMeasure" are 1.1e-004 and 8.5e-004, which are smaller than sig- nificant level 0.01. But in the "Zhi-hua Zhou" dataset, the p-value of method "MRF+AverageLength" and "GraphEntropy+CosineMeasure" is 0.1215, so no one is significant better than the other one. We try different splits of training dataset and testing dataset to show the effect of the method "MRF+CosineMeasure" which is the best one of the four proposed methods. In previous experiments, we use 4 months' tweets to be training dataset for computing community sentiment energy, the other two months' tweets to be the testing dataset. We try to use early 3 months' (2 months', 1 month) tweets to be the training dataset and the other tweets to be the testing dataset. Table 3 shows the experimental results of different splits of training dataset and testing dataset. We can find that all r-values of Pearson correlation coefficient are larger 14 Xiang Wang et al. Table 3 Pearson correlation coefficient results of community sentiment energy and real pop- ularity of "MRF+CosineMeasure" method in different splits of "Zhi-hua Zhou" dataset Datasets 1 10 50 100 150 200 1 months training 2 months training 3 months training 4 months training r 0.4769 0.4800 0.4722 0.7830 0.7709 0.8789 p 2.5738e-9 6.3906e-4 0.0648 0.0044 0.0251 0.0092 r 0.4690 0.5611 0.5905 0.8607 0.8334 0.8930 p 5.0831e-9 4.0823e-5 0.0160 6.6926e-4 0.0102 0.0068 r 0.4380 0.5936 0.6872 0.8711 0.8457 0.9045 p 6.2311e-8 1.7265e-5 0.0033 4.8043e-4 0.0082 0.0051 r 0.4196 0.6153 0.7275 0.8623 0.8488 0.9008 p 2.4682e-7 4.1738e-6 0.0014 6.3824e-4 0.0077 0.0056 than 0.4. The p-values of student t-test of 4 months' tweets training to 3 months' (2 months', 1 month) tweets training are 0.5471, 0.3294, 0.1047. The p-values are all not less than 0.1 and the values show that 4 months training dataset is not significantly better than the 3 months' (2 months', 1 month) training dataset. But the p-values are decreasing with the decrease of the number of tweets in the training dataset. So we can find that the decreasing of the number of tweets in the training dataset does not significantly degrade the performance. It means we can use less training tweets to predict the popularity of topics. 4 Prediction Model and Experiments Section 3.6 studied the linear correlation relation between the community sen- timent energy and the real popularity in a community. The experiments show that the community sentiment energy computed based on Markov Random Field (MRF) model with energy function "cosine measure" is the best one of the pro- posed methods in predicting the popularity of topics that have not appeared. In this section, we proposed two linear methods to predict the popularity of topics based on the method: LinearMRF and EdgeMRF. LinearMRF. This method is based on the proved hypothesis that the com- munity sentiment energy based on the MRF model with energy function "cosine measure" has a significant linear correlation with the real topic popularity. We can predict the popularity of topic k using Equation 9, P (G, k) = α • E(G, k) + β (9) where α and β are the parameters that need to learn. The definition of E(G,k) shows in Equation 7. EdgeMRF. This method assumes that each edge eij in the graph G has different weight ωeij. The predicted popularity of topic k has a linear correlation with the energy of each edge in graph G of the community. Equation 10 shows how to compute the sentiment energy of topic k, P (G, k) = X (ui,uj )∈E ωeij • E(sen(ui, k), sen(uj, k)) + ρ (10) where E(sen(ui, k), sen(uj, k)) is defined in Equation 5 and ρ is a parameter which needs to learn from training. Loss function based on "mean squared error" estimator is constructed to learn the best parameters for predicting popularity of topics in Equation 9 and 10. Let Title Suppressed Due to Excessive Length 15 x 104 6 5 4 3 2 1 0 0.5 1 1.5 2 2.5 3 x 104 1200 1100 1000 900 800 700 600 500 0 500 1000 1500 2000 (a) N um = 800 of "Jackie Chan" dataset (R2 = 0.3943) (b) N um = 200 of "Zhi-Hua Zhou" dataset (R2 = 0.8115) Fig. 6 Regression Line of the LinearMRF method in the two communities ST be the set of all topics in the train dataset, then the loss function is shown in Equation 11, 1 2ST l = (P (G, k) − real(G, k))2 (11) X k∈ST where real(G, k) is the real popularity of graph G on topic k. Stochastic gradient descent method is introduced to minimize the total loss through training. The steps of stochastic gradient descent can be presented as follows: (1) Choose the initial values of the parameters and learning rate. (2) Repeat step (2.1) and (2.2) until an approximate minimum of the loss function is obtained: (2.1) Compute the gradient of each parameter; (2.2) Update the values of the arguments toward the descending gradient. We take parameter ωeij for example to illustrate how we use stochastic gradient descent to learn parameters in our framework. The gradient of parameter ωeij can be calculated as Equation 12, ∂l ∂ωeij = 1 ST X k∈ST (P (G, k) − real(G, k)) • E(Cij, k) (12) where E(Cij, k) is computed in Equation 5. Parameter ωeij can be updated ac- cording to Equation 13, ωeij (t+1) = ωeij (t) − η • ∂l ∂ωeij (13) where η is the learning rate and ∂l ∂ωeij is calculated in Equation 12. Figure 6 shows the regression lines of the LinearMRF method. We use co- efficient of determination 10 to measure the goodness of fit of the LinearMRF method. Figure 6(a) shows the regression line with coefficient of determination R2 = 0.3943 on the dataset N um = 800 when the RSE value is the smallest one of the LinearMRF in the "Jackie Chan" community in Table 4. Figure 6(b) shows the regression line with coefficient of determination R2 = 0.8115 on the dataset N um = 200 when the RSE value is the smallest one of the LinearMRF in the 10 Coefficient of determination. Wikipedia. https://en.wikipedia.org/wiki/Coefficient of determination 16 Xiang Wang et al. "Zhi-Hua Zhou" community in Table 5. The results show the goodness of fit of the LinearMRF method. Like [29], we use the Relative Squared Error (RSE) to evaluate the performance of the prediction models as shown in Equation 14, RSE = P k∈ST P k∈ST (P (G, k) − real(G, k))2 (real(G, k) − real(G, k))2 (14) where P (G, k) is the predicted popularity of the topics of our methods and real(G, k) is the real popularity of topics. real(G, k) = 1 real(G, k) is an average of ST P k∈ST the real popularity of the topics. Table 4 Prediction Errors (Relative Squared Error) for the LinearMRF and EdgeMRF Models for Topics in the "Jackie Chan" Datasets Dataset LinearMRF EdgeMRF 100 200 300 400 500 600 700 800 900 1000 0.8564 0.8595 0.7710 0.8732 1.0536 0.6935 0.6845 0.6437 0.9148 0.6990 0.7820 0.7555 0.7701 0.7016 0.7153 0.6997 0.7180 0.7053 0.7029 0.6764 Table 5 Prediction Errors (Relative Squared Error) for the LinearMRF and EdgeMRF Models for Topics in the "Zhi-hua Zhou" Datasets Dataset LinearMRF EdgeMRF 1 10 50 100 150 200 0.8534 0.8417 0.7942 0.6658 0.5253 0.5219 0.7371 0.6957 0.4453 0.3748 0.2112 0.2607 We evaluate the performance of the LinearMRF and EdgeMRF models in the "Jackie Chan" dataset and "Zhi-hua Zhou" dataset described in Section 3.6. In each test dataset, we randomly split the dataset to train dataset and test dataset with equal number of topics (the train dataset have one more topic when the number of topics in the dataset N um is odd). Table 4 and 5 shows the prediction errors of the two models in the "Jackie Chan" and "Zhi-hua Zhou" datasets. We can find that only the RSE value 1.0536 of the LinearMRF model on dataset N um = 500 is beyond 1.0 of the "Jackie Chan" dataset. Other RSE values are all smaller than 1.0. In the "Jackie Chan" dataset, the RSE values of LinearMRF in dataset N um = 600, N um = 700, N um = 800 and N um = 1000 are smaller Title Suppressed Due to Excessive Length 17 than 0.7. The prediction errors of EdgeMRF are all less than 0.8 in the 10 datasets of "Jackie Chan" community. In the "Zhi-hua Zhou" dataset, the RSE value of EdgeMRF method even reaches 0.2112 when N um = 150. The prediction errors of EdgeMRF are less than 0.5 when N um is equal to or larger than 50. The results show that LinearMRF and EdgeMRF are effective in predicting popularity of topics in both the "Jackie Chan" and "Zhi-hua Zhou" dataset. We use Student's t- test to indicate statistically significant improvements of the EdgeMRF model over the LinearMRF model. The p-value of the EdgeMRF model over the LinearMRF model is 0.0691 in the "Jackie Chan" dataset and 0.0014 in the "Zhi-hua Zhou" dataset. It's a significant improvement in the significant level 0.1 and 0.01 in the two datasets. So the EdgeMRF model is statistically better than LinearMRF to predict popularity of topics. 5 Discussion In this paper, we try to predict the popularity of topics which have not appeared in a microblogging website. Some existing works like TDT tasks have been done to detect and track topics. Some researches predict the popularity of online content based on their early popularity information. But these works predict the online content which has already happened. We are the first trying to predict the popu- larity of un-happened things. The sentiment of a user on the key phrases of a topic can influence the deci- sion of whether to discus about it. Based on this observation, we employ Markov Random Field (MRF) model and graph entropy model to compute the community sentiment energy of a topic, which is probably correlated with the real popular- ity of the topic. Experiments show the linear correlation between the community sentiment energy based on the MRF model and the real popularity of topics. We propose two models LinearMRF and EdgeMRF to predict the popularity of topics. The relative squared errors (RSE) of EdgeMRF can reach about 0.7 in all the ten datasets of "Jackie Chan" community. The value of RSE even reach 0.2112 in the dataset N um = 150 of "Zhi-hua Zhou" community. The results show the value of users' history sentiment on predicting the popularity of topics. It also shows the sentiment of a community can affect collective decision making of spreading a topic or not in the community. Our work can be used in many areas. For example, online social network marketing can use our work of predicting the popularity of topics to earn enough time in making plans for advertising. For potential candidate of government, it is very useful for them to find what the citizens care about for making helpful policies and earning the people's support. The performance can be improved since our predicting models are simple and straightforward. We'll try to improve the models in future. The early population information and the structure of social network are also very helpful and we'll add this information to our model to improve the performance of predicting the popularity of topics in future. Acknowledgements This work is supported by National Natural Science Foundation of China (Grant No. 61502517) and the National Defense Science and Technology Project Funds (Grant No. 3101283). 18 References Xiang Wang et al. 1. Anand, K., Bianconi, G.: Entropy measures for networks: Toward an information theory of complex topologies. Physical Review E 80(4), 045,102 (2009) 2. Bao, P., Shen, H.W., Huang, J., Cheng, X.Q.: Popularity prediction in microblogging network: a case study on sina weibo. In: Proceedings of the 22nd international conference on World Wide Web companion, pp. 177–178. International World Wide Web Conferences Steering Committee (2013) 3. Barbosa, L., Feng, J.: Robust sentiment detection on twitter from biased and noisy In: Proceedings of the 23rd International Conference on Computational Linguis- data. tics: Posters, pp. 36–44. Association for Computational Linguistics (2010) 4. Bifet, A., Frank, E.: Sentiment knowledge discovery in twitter streaming data. In: Discov- ery Science, pp. 1–15. Springer (2010) 5. Bollen, J., Mao, H., Zeng, X.: Twitter mood predicts the stock market. Journal of Com- putational Science 2(1), 1–8 (2011) 6. Bollen, J., Pepe, A., Mao, H.: Modeling public mood and emotion: Twitter sentiment and socio-economic phenomena. arXiv preprint arXiv:0911.1583 (2009) 7. Buckley, C.: Topic prediction based on comparative retrieval rankings. In: Proceedings of the 27th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '04, pp. 506–507. ACM, New York, NY, USA (2004). DOI 10.1145/1008992.1009093. URL http://doi.acm.org/10.1145/1008992.1009093 8. Crane, R., Sornette, D.: Robust dynamic classes revealed by measuring the response func- tion of a social system. Proceedings of the National Academy of Sciences 105(41), 15,649– 15,653 (2008) 9. Cruz, J.D., Bothorel, C., Poulet, F.: Entropy based community detection in augmented social networks. In: Computational aspects of social networks (cason), 2011 international conference on, pp. 163–168. IEEE (2011) 10. Damasio, A.: Descartes' error: Emotion, reason and the human brain. Random House (2008) 11. Dancey, C.P., Reidy, J.: Statistics without maths for psychology. Pearson Education (2007) 12. Davidov, D., Tsur, O., Rappoport, A.: Enhanced sentiment learning using twitter hashtags In: Proceedings of the 23rd International Conference on Computational and smileys. Linguistics: Posters, pp. 241–249. Association for Computational Linguistics (2010) 13. Diakopoulos, N.A., Shamma, D.A.: Characterizing debate performance via aggregated twitter sentiment. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI '10, pp. 1195–1198. ACM, New York, NY, USA (2010). DOI 10.1145/1753326.1753504. URL http://doi.acm.org/10.1145/1753326.1753504 14. Dolan, R.J.: Emotion, cognition, and behavior. science 298(5596), 1191–1194 (2002) 15. Figueiredo, F., Benevenuto, F., Almeida, J.M.: The tube over time: Characteriz- ing popularity growth of youtube videos. In: Proceedings of the Fourth ACM International Conference on Web Search and Data Mining, WSDM '11, pp. 745– 754. ACM, New York, NY, USA (2011). URL http://doi.acm.org/10.1145/1935826.1935925 DOI 10.1145/1935826.1935925. 16. Gao, S., Ma, J., Chen, Z.: Effective and effortless features for popularity prediction in microblogging network. In: Proceedings of the Companion Publication of the 23rd International Conference on World Wide Web Companion, WWW Companion '14, pp. 269–270. International World Wide Web Conferences Steering Committee, Repub- lic and Canton of Geneva, Switzerland (2014). DOI 10.1145/2567948.2577312. URL http://dx.doi.org/10.1145/2567948.2577312 17. Hong, L., Dan, O., Davison, B.D.: Predicting popular messages in twitter. In: Proceedings of the 20th international conference companion on World wide web, pp. 57–58. ACM (2011) 18. Kindermann, R., Snell, J.L., et al.: Markov random fields and their applications, vol. 1. American Mathematical Society Providence (1980) 19. Korner, J.: Coding of an information source having ambiguous alphabet and the entropy of graphs. In: 6th Prague conference on information theory, pp. 411–425 (1973) 20. Lee, J.G., Moon, S., Salamatian, K.: An approach to model and predict the popularity of online contents with explanatory factors. In: Web Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International Conference on, vol. 1, pp. 623–630. IEEE (2010) Title Suppressed Due to Excessive Length 19 21. Lerman, K., Hogg, T.: Using a model of social dynamics to predict popularity of news. In: Proceedings of the 19th international conference on World wide web, pp. 621–630. ACM (2010) 22. Li, S.Z.: Markov random field modeling in image analysis. Springer Science & Business Media (2009) 23. Metzler, D., Croft, W.B.: A markov random field model for term dependencies. In: Pro- ceedings of the 28th annual international ACM SIGIR conference on Research and devel- opment in information retrieval, pp. 472–479. ACM (2005) 24. Pinto, H., Almeida, J.M., Gon¸calves, M.A.: Using early view patterns to predict the pop- ularity of youtube videos. In: Proceedings of the Sixth ACM International Conference on Web Search and Data Mining, WSDM '13, pp. 365–374. ACM, New York, NY, USA (2013). DOI 10.1145/2433396.2433443. URL http://doi.acm.org/10.1145/2433396.2433443 25. Read, J.: Using emoticons to reduce dependency in machine learning techniques for sen- timent classification. In: Proceedings of the ACL student research workshop, pp. 43–48. Association for Computational Linguistics (2005) 26. Salganik, M.J., Dodds, P.S., Watts, D.J.: Experimental study of inequality and unpre- dictability in an artificial cultural market. science 311(5762), 854–856 (2006) 27. Shannon, C.E.: A mathematical theory of communication. ACM SIGMOBILE Mobile Computing and Communications Review 5(1), 3–55 (2001) 28. Simonyi, G.: Graph entropy: a survey. Combinatorial Optimization 20, 399–441 (1995) 29. Szabo, G., Huberman, B.A.: Predicting the popularity of online content. Communications of the ACM 53(8), 80–88 (2010) 30. Thelwall, M., Buckley, K., Paltoglou, G.: Sentiment in twitter events. Journal of the American Society for Information Science and Technology 62(2), 406–418 (2011) 31. Tong, H., Liu, Y., Peng, H., Tang, J.: Internet users' psychosocial attention prediction: Web hot topic prediction based on adaptive ar model. In: Computer Science and Information Technology, 2008. ICCSIT'08. International Conference on, pp. 458–462. IEEE (2008) 32. Tumasjan, A., Sprenger, T.O., Sandner, P.G., Welpe, I.M.: Predicting elections with twit- ter: What 140 characters reveal about political sentiment. ICWSM 10, 178–185 (2010) 33. Wikipedia: Pearson product-moment correlation coefficient (2015). URL https://en.wikipedia.org/wiki/Pearson_product-moment_correlation_coefficient 34. Wu, T., Timmers, M., Vleeschauwer, D.D., Leekwijck, W.V.: On the use of reservoir In: Evolving Internet (INTERNET), 2010 Second computing in popularity prediction. International Conference on, pp. 19–24. IEEE (2010) 35. Yin, P., Luo, P., Wang, M., Lee, W.C.: A straw shows which way the wind blows: ranking potentially popular items from early votes. In: Proceedings of the fifth ACM international conference on Web search and data mining, pp. 623–632. ACM (2012)
1808.04422
1
1808
2018-08-13T19:53:47
Social media and mobility landscape: uncovering spatial patterns of urban human mobility with multi source data
[ "cs.SI", "physics.soc-ph" ]
In this paper, we present a three-step methodological framework, including location identification, bias modification, and out-of-sample validation, so as to promote human mobility analysis with social media data. More specifically, we propose ways of identifying personal activity-specific places and commuting patterns in Beijing, China, based on Weibo (China's Twitter) check-in records, as well as modifying sample bias of check-in data with population synthesis technique. An independent citywide travel logistic survey is used as the benchmark for validating the results. Obvious differences are discerned from Weibo users' and survey respondents' activity-mobility patterns, while there is a large variation of population representativeness between data from the two sources. After bias modification, the similarity coefficient between commuting distance distributions of Weibo data and survey observations increases substantially from 23% to 63%. Synthetic data proves to be a satisfactory cost-effective alternative source of mobility information. The proposed framework can inform many applications related to human mobility, ranging from transportation, through urban planning to transport emission modelling.
cs.SI
cs
Social media and mobility landscape: uncovering spatial patterns of urban human mobility with multi source data Social media and mobility landscape Yilan Cuia, Xing Xieb, Yi Liua* a School of Environment, Tsinghua University, Beijing, 100084, China b Microsoft Research Asia, Microsoft Corporation, Beijing, 100080, China *Corresponding author: [email protected] Graphic abstract Highlights: Identify personal activity-specific places based on Weibo data and surveys Propose ways for detecting and moderating sample bias of Weibo data Present a graphic representation of urban activity intensity in Beijing, China Introduce the potential application of Weibo data for urban analysis     1 Abstract: In this paper, we present a three-step methodological framework, including location identification, bias modification, and out-of-sample validation, so as to promote human mobility analysis with social media data. More specifically, we propose ways of identifying personal activity-specific places and commuting patterns in Beijing, China, based on Weibo (China's Twitter) check-in records, as well as modifying sample bias of check-in data with population synthesis technique. An independent citywide travel logistic survey is used as the benchmark for validating the results. Obvious differences are discerned from Weibo users' and survey respondents' activity-mobility patterns, while there is a large variation of population representativeness between data from the two sources. After bias modification, the similarity coefficient between commuting distance distributions of Weibo data and survey observations increases substantially from 23% to 63%. Synthetic data proves to be a satisfactory cost-effective alternative source of mobility information. The proposed framework can inform many applications related to human mobility, ranging from transportation, through urban planning to transport emission modelling. Key words: social media, human mobility, population bias, sample reconstruction, data integration 1 Introduction Urban passenger transport is leading to a range of societal and environmental externalities including congestion, resource consumption, greenhouse gas emissions, and localized pollution. Travel demand is derived from individuals' need for performing activities at different geographic locations. A current trend of research in the field of human mobility is activity-based analysis (Zhang et al., 2013; Rieser et al., 2014; Wu et al., 2014), which takes into account individual's diverse travel demands behind spatial movements. Broadly stated, activity-based approaches pay close attention to 2 the responses to the common questions that each individual faces on a daily basis: 'what activity will I perform?', 'with whom?', 'when?', 'for how long?', 'how do I get there?' and so on (Ghauche, 2010). Such approach allows researchers to examine, in detail, the diversity of travel demands that spur movements, thus to dig into the driving forces of transport energy consumption and emissions. Therefore, identifying the purposes behind human movements becomes a crucial part of understanding human mobility. Such analysis relies heavily on the quality and representativeness of human space-time data, which is traditionally obtained through travel surveys. However, data collection is extremely time-consuming and expensive, which in turn limits its population coverage. Furthermore, such surveys are not carried out on a continuously temporal basis. For example, the most authoritative citywide travel survey in Beijing, China is only conducted every five years. Over the past decade, the introduction and penetration of location-based services have profoundly changed the way people live. People leave digital traces of their movements everywhere, when swiping smart cards on public buses, making phone calls with friends, or sharing activity related choices on online social networks. This large-scale user-generated data provide new perspectives for spatiotemporal analysis of travel behavior. Temporal, spatial, and textual information in this data are revealed by users in realistic situations, which makes them less prone to cheating. Since such data have already been collected to help operate systems or provide user-side services, additional uses for analysis incur little marginal cost. Different from Call Detail Records (CDR) (Isaacman et al., 2011), Smart Card Data (SCD) (Yuan et al., 2013; Zhou and Long, 2014), and trajectories derived from GPS trackers (Zhang et al., 2013), check-in data have two unique features, which make them more suitable for activity-based mobility analysis. First, check-in records not only contain geo- and time-tagged locations but also include the Point of Interests (POI) 3 categories of the venues indicating the potential functionalities of such locations (Hasan et al., 2013; Wu et al., 2014). Second, users' sociodemographic profiles are available, enabling comparative analysis of travel behavior for different social groups. Recently, a number of researchers have been using check-in data to understand and model how individuals move in time and space (Hasan et al., 2013; Wu et al., 2014; Hasan and Ukkusuri, 2014; Yang et al., 2015; Wang et al., 2015; Chen et al., 2016). However, these studies limit the understanding of mobility dynamics due to the lack of attention to the purposes behind human movements. Hasan et al. (2013), Wu et al. (2014), and Hasan and Ukkusuri (2014) simply identified activity based on the POI category of each geo-tagged location. Potential problems arise from this identification method. For example, checking in at a shopping mall does not necessarily indicate engaging in recreational activities; it may also be a shop manager complaining about his/her tedious day. Besides, each time users post a microblog, they have the option to choose a location to share from several nearby locations. Out of privacy and safety concerns, people tend to provide misleading information. Previous studies have demonstrated that human mobility shows a high degree of regularity (Hasan and Ukkusuri, 2014; Wu et al., 2014; Wang et al., 2015). Far from randomness, people spend much of their time at a few important places, such as home and workplace, where they visit regularly and often during the same period of the day (Isaacman et al., 2011). An individual's movements typically will either be centered around home, work, or somewhere in between the two locations as they commute in between them (Cho et al., 2011). Some studies have proposed suitable algorithms for predicting semantically meaningful places in somebody's life (especially home locations), based on the spatial and temporal features of movement records. The most commonly used method is a 'Most Check-ins' method. Home is assumed to be the location from which people most frequently 4 tweet (Pontes et al., 2012; Bojic et al., 2015; Hossain et al., 2016), (or make the maximum number of phone calls in the case of CDR (Isaacman et al., 2011), or most frequently visit in the case of SCD (Yuan et al., 2013)). In some cases, the sequence of a location in a user's daily movements (Zhou and Long, 2014; Hossain et al., 2016) or surrounding land use features (Zhou and Long, 2014) is used to determine the likelihood of corresponding activity. Despite the fascinating features mentioned above, it has been argued that the limited population representativeness would confine the scope of big data research on human mobility (Wu et al., 2014; Chen et al., 2016). Travel survey data, acquired through rigorous sampling methods, is considered as a relatively representative sample of the real population. However, only limited studies have conducted out-of-sample validation of big data with such a dataset, quantitatively analyzing the effect of representativeness of big data (Lenormand et al., 2014; Toole et al., 2015; Yang et al., 2015). Most of the time, validation is performed on a coarse-grained spatial scale, such as municipality (Lenormand et al., 2014) or town (Toole et al., 2015), because raw census data with high spatial resolution remains inaccessible to the public. It remains an interesting question to ponder whether social media check-in data would be suitable for regional activity-based travel analysis, whether and what mobility measures are sensitive towards sample bias (Chen et al., 2016), and most importantly, how to modify such bias. Population synthesis is a widely-adopted technique for creating a full population microdata based on limited number of observations, to enable analyzing estimates of variables at different spatial scales. It was first developed in the field of economics in the 1960s, and has since been introduced to the fields of geography and social sciences (Hermes and Poulsen, 2012; Ma et al., 2014), for example, to analyze social policy and population changes (Haase et al., 2010), 5 transportation (Beckman et al., 1996; Zhang et al., 2013; Ma et al., 2014), building energy consumption (Subbiah et al., 2013) and so on. In the transport-related field, the pioneering attempt of population synthesis goes back to 1996, when Beckman et al. (1996) applied Iterative Proportional Fitting (IPF) to create a baseline synthetic population of individuals and households, so as to estimate future travel demand. After years of implementation and testing, population synthesis has become a popular and cost-effective way for creating disaggregated data for spatial analysis and simulation, generating long-term forecasts, and examining the geographical effects of government policies (Zhang et al., 2013; Subbiah et al., 2013; Ma et al., 2014). In this article, we explore the potential application of this technique for sample bias modification. A critical review on current algorithms to generate synthetic spatial microdata can be found in Hermes and Poulsen (2012) and Müller and Axhausen (2010). In this study, we introduce how to identify home, work/school, and destination choices for non-commuting activities based on multi source data in a simple and straightforward way and apply classical methods of population synthesis to solve the bias-modifying problem of social media data in a provably promising way. Compared with existing studies on activity-based mobility analysis with check-in data, we go one-step further to detect and moderate the impact of sample representativeness on mobility measures at sufficiently high spatial granularity. 2 Materials 2.1 Study area As the capital city of China, Beijing was selected as our case study area. The city can be divided into four zones including inner area, functional extended area, new urban district, and ecological conservation area (Fig. 1). The inner-city districts of Dongcheng and Xicheng represent the 6 Fig. 1 Municipal districts of Beijing. The smallest geographical units in this figure represent the Traffic Analysis Zones. traditional business districts. The functional extended area includes the Chaoyang district in the northeast (which is home to the Beijing International Airport, and Beijing's growing central business district), Haidian in the northwest (which was deliberately developed as a university area, with most of the universities, research institutes, and hi-tech firms located there), Fengtai in the southwest (which is the interflow center of goods in the southwest Beijing), and Shijingshan in the far west (which is the heavy industry center in this city) (Ma et al., 2014).The new urban district composes Tongzhou in the east (where a new administrative sub-center is emerging), as well as districts of Shunyi, Daxing, Changping, and Fangshan. The ecological conservation area refers to the remote counties and villages. Traffic analysis zone (TAZ) is the unit of geography most commonly used in travel surveys. In the Forth Survey of Citywide Travel Logistics of Beijing, the metropolitan area was divided into 7 1,911 TAZs, with the zonal area ranging from 0.13km2 to 382.03km2, among which 87% is smaller than 5 km2. 2.2 The mobility datasets (1) User Profiles and Location Check-ins: This dataset contains 11,961,502 geo- and time-tagged check-in records from 135,736 venues in Beijing by 1,670,968 registered Sina Weibo users from Mar. 2011 to Sep. 2013, which was crawled through Sina Weibo API (Zhang et al., 2012). Each check-in contains the user ID, check-in time, the venue's geo-coordinates, and POI category. When registering for an account in Weibo, users can choose to share some of their personal information on their home pages, including gender, birthday, education background, and marital status etc. After removing users with less than 15 check-ins, we obtain 7,324,014 check-ins at 111,955 venues from 161,015 users where each user has 45 check-in records on average. (2) Fourth Survey of Citywide Travel Logistics of Beijing: This survey tracks more than one hundred thousand respondents' socio-economic attributes, as well as their detailed 24h travel diaries in a generic workday or weekend, including a list of activities participated and corresponding trips along with temporal, spatial and travel mode information. 2.3 User profiles In our Weibo sample, almost all the users provide their gender information, 46% users provide age information, and 53% users provide educational background. We found that Weibo is more popular among females, young people and people with high levels of education. Obvious differences exist in the age and education profiles of population covered by these two datasets (c.f. Fig. 2); whereas, only a slight difference of 4% is discovered in the gender profiles. 8 Fig. 2 User profiles. (a) Education background, (b) Age. Here, education background is classified into three categories; including primary (junior school and below), secondary (senior high school), and tertiary (college and above). 2.4 Categorizing travel demands To ease the analysis, daily activities are first classified into a limited number of categories. In this research, considering the temporal characteristics of travel demand inferred from trip records in survey data (c.f. Appendix A), we group activity-travel purpose into home, work (work/school), entertainment (eating out, shopping and other leisure activities), and other (personal business, business trip, visiting friends/relatives, etc.). 3 Methods 3.1 Ground truth for home and workplace identification Building the ground truth is challenging, because it involves identifying a Weibo user's home and workplace from several locations the user checked-in without being told. Intuitively, if someone visits the same residential building frequently, this place holds a big change to be a living place. Similarly, an office building where someone recursively checks-in, is more likely to be a working place. Besides, reading a Weibo content that says 'enjoying my new working station', one can easily tell that it might be sent from a workplace. Weibo content that says 'Good night, Beijing' is most 9 likely sent from home. In this research, we rely on POI category and content information together to build the ground truth for the home and work location identification algorithm. Firstly, we construct the ground truth for home by first filtering the locations each individual checks in for 4 days or above long, and with a POI category of residential place. Similarly, ground truth for workplace is filtered from locations each individual checks in for 4 days or above long, and with a POI category of corporation, school or industrial park. Then location with largest check-in days in each case is labeled as 'home' and 'work' respectively. Secondly, to improve the reliability, we further crawl the Weibo contents posted from these labelled locations, linked by user ID and geo-coordinates. Then, we select a set of 20 keywords (e.g. 'home', 'dormitory', 'sleep', 'office', 'work' etc.) which are most likely to be mentioned in Weibo contents sent from home or workplace (c.f. SI Table 1). Next, based on these keywords, we label 'home' or 'work' tag to each user's potential locations. For example, if at least one of the home-related words is contained in any of the Weibo contents posted from user's filtered locations, then this location would be labeled as 'home'. Finally, we only retain the filtered locations, which have been tagged the same label from the two steps. As a result, we obtain a training dataset containing 90,284 check-ins from 377 users, among which 296 users' homes and 180 users' workplaces are labelled. Here, the labeled location is represented by the geo-coordinates of the corresponding venue. As can be seen from Fig. 3 below, the frequency of home-based activity in ground truth data is much lower during early morning hours, when people are typically inactive. While, the frequency of work-based activity in ground truth is much higher during late night, which is probably because, people who work overtime tend to 10 check-in at workplace more frequently, thus overestimating the frequency of work-based activity at night. Apart from these, the basic temporal distribution patterns of home-based and work-based activity from ground truth data are consistent with those from survey data. It means that, even as a small portion in the Weibo data, this ground truth data would be sufficient for representing the regularity of the temporal patterns of home-based and work-based activities and is scalable to the whole Weibo data as well. It has to be mentioned that, the small size of ground truth data is largely due to the limitation of inferring home and work locations by POI category. Therefore, the labelling method introduced here is just for building the ground truth for training our proposed identification algorithm. Fig. 3. Temporal pattern of home-based (left) and work-based activity (right) from ground truth (up) and survey data (bottom). 11 3.2 Purpose-specific location identification 3.2.1 Identification algorithm We propose a threefold approach for home and work location identification adopted from Isaacman et al. (2011) on location identification with CDR, which has shown to be able to find users' important locations to within 3 miles 88% of the time. Existing studies have found strong agreement and robustness in human mobility patterns between CDR and check-in data (Cho et al., 2011; Lenormand et al., 2014). The factors used are listed below.  Days: The number of days on which the venue is geo-tagged.  Cluster Days: The number of days on which any venue in the cluster is geo-tagged. If two or more venues are geo-tagged on the same day, the day is counted only once.  Timespan: The number of days interval between the first and the last check-in with any venue in the cluster.  Total Days: The number of days between the first record and the last record in the dataset.  Work Event: The number of check-ins in the cluster on weekdays from 9am to 12pm and from 1pm to 6pm.  Home Event: The number of check-ins in the cluster on weekdays or weekends from 10pm to 7am.  Work/ Home Event Percentage: The percentage of 'Work/ Home Event' of each cluster in all clusters. We first spatially cluster the venues that appear in a user's check-in records. Because we do not have any prior knowledge regarding the number of clusters in each user's traces, which is probably different from one to another. As a result, we choose a distance-based clustering method (Isaacman et al., 2011; Chen et al., 2016). We first sort the unique venues in a user's check-in records in descending order based on 'Days'. Relative importance of a certain venue in an individual's traces is represented by the days this venue is checked-in, instead of the total number of check-ins. Because, 'Days' helps to decrease the influence of venues that are visited only on a few days, but that has a 12 burst of events on those days (Isaacman et al., 2011). Clustering starts with the first venue in the sorted list and makes this the centroid of the first cluster. For each subsequent venue, the algorithm would assign it to a corresponding cluster if it falls within a predetermined threshold radius, , of any existing cluster centroid, or make this the centroid of a new cluster otherwise. When a new venue is added to any existing cluster, the centroid of that cluster will be moved to the days-weighted center of all the venues within the cluster. The algorithm continues until all the venues in the sorted list have been visited. Then our identification algorithm runs to the second stage of filtering important clusters. Intuitively, important places in people's lives should be those that people visit frequently and recursively. A cluster will be assumed as important if it has been visited on more than a certain percentage of the total days, and the timespan in this cluster is more than a certain percentage of the total days. These translate to Eqs. (1)-(2) listed below. Here, , are decision boundary values. (1) (2) Finally, given all the important clusters, we infer where people live or work based on frequency of check-ins during pre-defined 'home' or 'work' event hours. As demonstrated in previous studies, for home identification, the most dominating factor is 'Home Event' (Isaacman et al., 2011) or number of check-ins (Hossain et al., 2016). For workplace identification, there are two dominating factors; location with higher 'Work Event' and lower 'Home Event' is more likely to be one's workplace (Isaacman et al., 2011). Rules for home and work identification are illustrated as the flowchart in Fig. 4. Here, and are decision boundary values. 13 rab/ClusterDaysTotalDaysa/TimespanTotalDaysb1k2k Fig. 4. Flowchart for identification of home location and work place. The algorithm for entertainment and other place identification starts with check-in records of a user with home or workplace identified. For whom, our identification algorithm has already differentiated places where one visits on a regular temporal basis from those one visits flexibly. After removing geo-tagged locations in the clusters defined as 'Home' or 'Work', we can simply label each remaining location as 'Entertainment', 'Other' or 'Unknown' based on their venue categories. 3.2.2 Controlled random search algorithm We need to adjust the five tuning parameters, , constantly until most individuals' resulting identified locations give the best possible fitting to the labelled ones in ground truth. A global optimization procedure called Controlled Random Search (CRS) is used for parameter calibration (Hendrix et al., 2002). In the context of minimization problems, CRS algorithm generates uniformly distributed 14 12,,,,rabkkp random points through , defined by the value ranges of parameter vector , and stores the points and corresponding function values . Let and be the largest and smallest function values in the storage, and and be the corresponding points. At each iteration, CRS randomly selects a subset of points from the storage. Then a new point is generated by reflecting a randomly selected point from the subset through the centroid of the other points. If the function value at is smaller than , then and replace and in the storage respectively. Then the algorithm updates the corresponding values of and as well. The process stops when the maximum number of iteration stages has been reached. The objective function is defined by Eqs. (3)-(5), which take both the identification accuracy and coverage into consideration, resulting in a number in [0, 1]. (3) (4) (5) Where, and represents the geo-coordinates of the labelled and identified home location of individual from ground truth. Similarly, and represents the labelled and identified work location of individual respectively. M* and N* are the number of users from ground truth whose home and work can be identified with our identification algorithm. , calculate the spherical distance between identified and labelled locations, which are 15 ()1,...,pffmaxfminfmaxmin,...,,1mm+11m+*m()*f*maxf*()*fmaxmaxfminfminN()()****,,22**121111maxmaxdisdisWWHHNMiijjfNMHWddij=+==**max((,)),maxHddisHHiMii= **max((,)),maxWddisWWjNjj= *HiHii*WjWjj()*,disHHii()*,disWWjj used as a measure of identification error. The error is normalized through dividing by its corresponding maximum value, and . Mean distance error is then weighted by the reciprocal of M* or N* to compensate for the accuracy gains at the cost of low coverage. In this study, clustering radius is set to be 20m, 50m, 70m, 100m, 200m, 300m, and 500m. Under each setting of , we use CRS algorithm to find the best estimates of the other four parameters. By numerical test, the settings of and N in this study are 200 and 20,000 respectively. 3.3 Sample reconstruction As is shown in Fig.2, there is a large variation of population representativeness between Weibo and survey data. Considering the strong influence of socio-demographics on people's activity participation and destination choices (Ma et al., 2014), the limitation of population coverage of Weibo data can only give us a biased understanding of human mobility. Therefore, we introduce a method for correcting population bias of check-in data by linking personal mobility patterns to these socio-demographics. The basic idea behind sample reconstruction is to select an optimal configuration from the partial sample of Weibo data, according to the known distributions of characteristics, such as age, gender, from aggregated constraints calculated with travel surveys. Then the reconstructed sample is a more representative configuration of the real population, whose sociodemographic is aligning closely to that of survey respondents, while maintaining the rich variety of its original activity mobility patterns. To proceed with a reliable sample reconstruction, an appropriate selection of constraint variables is crucial. First, the variables used need to be both included in the two data sources to 16 maxHdmaxWdrrp enable the sampling process (Kirk, 2013; Ma et al., 2014). Second, they should cover or at least be strongly related to the variables of interest (Kirk, 2013). Kruskal -- Wallis test, a non-parametric method for testing whether samples originate from distributions with the same median, is used to select attributes strongly related to travel behavior. Results show that, commuting distances vary significantly among people in different age groups and among people living in different regions (c.f. SI Table 2). People aged 30~40, and people living in suburban areas tend to commute further. While, gender and education background only have slight influences on individuals' commuting distances. In this study, we conduct sample reconstruction for commuters and non-commuters separately to account for the influence of employment status on individuals' mobility patterns. For each case, we use the tabulations of age, gender, and home district, as well as the cross-tabulations of age and gender at the TAZs level as constraints. Home district is defined as the district that Weibo users' identified home locations belong to. Besides, the difference between commuters and non-commuters are determined by whether their work locations can be identified or not. Flexible Modelling Framework (FMF), developed and tested at the University of Leeds since 2005, is an open source software framework for spatial population synthesis (Ma et al., 2014). It incorporates a static spatial simulation algorithm based on Simulated Annealing, which proves to be one of the most popular and effective methods for generating synthetic spatial microdata at different geographical scales (Kirk, 2013). In addition to the FMF population synthesizer, the traditional IPF and Combinatorial Optimization (CO) methods are still very popular (though they have drawbacks), especially in those cases where a simple and easy population synthesizer is adequate. The choice of FMF in our study is largely due to the availability of the open source software package that is relatively feasible to implement. 17 Simulated Annealing approach is executed for each TAZ individually. Individuals from each zone will first be given a unique person ID. The algorithm then clones, adjusts, and tests individuals in the generated population repeatedly until an appropriate set of individuals is established whose tabulated constraint variables give the best possible fit to the target aggregated sums. The goodness-of-fit level is measured as Total Absolute Error (Eq. (6)). (6) Where, is the count of individuals in category living in zone in survey data; is the count of individuals in category living in zone in the generated population. N is the number of TAZs. refers to one specific category in Table 1. M is the total number of categories. Table 1 Constraint configuration for commuters/non-commuters Constraint Variables Categories Gender Age Age by Gender Male (m), Female (f) 15-24, 25-26, 27-28, 29-30, 31-33, 34-39, 40-49, 50+ 15-24-f, 25-26-f, 27-28-f, 29-30-f, 31-33-f, 34-39-f, 40-49-f, 50+-f 15-24-m, 25-26-m, 27-28-m, 29-30-m, 31-33-m, 34-39-m, 40-49-m, 50+-m Home District Dongcheng, Xicheng, Chaoyang, Haidian, Shijingshan, Changping, Shunyi, Tongzhou, Daxing Fengtai, After sample reconstruction, activity-specific location choices of Weibo samples can be attached to the generated population based on the unique person ID. 18 11NMTAETEijijij=−==TijjiEijjij 3.4 Out-of-sample validation Here we select three indexes for evaluating the performance of our method, through out-of-sample validation with survey data, regarding spatial distribution pattern of activity-specific locations and distribution of commuting distance. In travel surveys, respondents' activity locations are mostly recorded using the TAZs code since GPS devices are rarely used to track the precise locations of individuals during surveys. Therefore, in this study, we use TAZ as the geographical unit for cross-validation between two data sources. Cosine Similarity (CS) is a measure of similarity between two non-zero high-dimensional vectors of an inner product space that measures the cosine of the angle between them (Wikipedia, 2017). In our study, each TAZ represents a unique dimension, and the region is characterized by a vector where the value of each dimension corresponds to the percentage of users with identified purpose-specific places located in corresponding TAZ. CS then can be used to measure how similar two spatial distribution maps are likely to be, which is defined as Eq. (7). CS takes the value in [0, 1]. A larger CS indicates a better fit. (7) Where: : The percentage of Weibo users with identified purpose-specific places located in TAZ i; : The percentage of survey respondents with recorded purpose-specific places located in TAZ i; N : The number of TAZs. 19 ()()12211CSNppiiiCSCSNNppiiii====CpiSpi As a supplement to CS, we also calculate the Distance between Centers of Gravity (DC) of identified locations with check-ins and recorded locations in surveys. In this case, the Centers of Gravity of purpose-specific activity distribution maps is defined as Eq. (8). The spherical distance between two centers is calculated from their longitudes and latitudes. (8) Where: : The latitude of centroid of TAZ ; : The longitude of centroid of TAZ ; : The number of activity-specific destination choices located in TAZ summed across all the individuals, and is the number of TAZs. We further compare the distribution of commuters by commuting distance traveled (one-way) from residence location to workplace, for Weibo's identified commuters and survey's self-reported commuters. Commuting distance is calculated as the spherical distance between individual's residence and work location. Coincidence Ratio (CR) measures the percent of the area that 'coincides' for the two curves of distribution to compare (Yang et al., 2015), as defined in Eq. (9). The maximum commuting distance in our dataset is about 120 km long, thus the length interval is identified as 0.24 km, which results in 500 intervals. CR ranges from 0 to 1, with a higher value indicating a better fit. 20 ,1111NNjjnnCentersXYnnjjjjNNiiii=====XiiYiiNiin (9) Where: : The percentage of commuting distance in interval i in check-in data; : The percentage of commuting distance in interval i in travel log survey; N: The number of intervals. 4 Results 4.1 Activity-mobility pattern The calibration results show that, all of the four parameters, concretely, give the best converging performance at the radius of 300 m (c.f. SI Figure 1 and SI Table 3), which is thus set to be the radius for our clustering algorithm; and, the best estimates of are set to be the means of the best 200 points in storage, which are 0.93%, 9.25%, 6.1%, and 1.92% respectively. Running the calibrated identification algorithm on the whole Weibo dataset, generates a newly labelled sample in which 65,450 users' home and 63,399 users' work place can be identified. The CS index for home spatial layout is 0.48. Hot spots for the residences of Weibo users are mostly distributed in the districts of Haidian and Chaoyang, where most schools and universities are located; whereas, hot spots for survey respondents' home locations are distributed in inner area and southern suburban regions (c.f. Fig. 5 a1 and a2). This is probably because Weibo users are mainly students, whose major residences are within the 'School District'. A high similarity of 0.65 for spatial distribution exists between Weibo users' and survey respondents' workplaces (c.f. Fig. 5 b1 and b2). In Beijing, the city center is still attractive regarding work opportunities and commercial 21 ()()min,1max,1CSNppiiiCRCSNppiii===CpiSpi12,,,abkk12,,,abkk Fig. 5 Validation of activity-specific locations identified from check-ins with independent travel logistic surveys. The base map shows the spatial layout of Beijing's administrative districts. Kernel density estimation is conducted to obtain a smooth distribution. (a1 and a2) The identified-home and recorded-home density maps for major metropolitan districts in Beijing. (b1 and b2) The identified and recorded workplace density maps of Beijing. (c1 and c2) The identified and recorded entertainment density maps of Beijing. infrastructure, where most employment is concentrated now, which may account partially for the strong coincidence between work distributions discerned from the two datasets. Compared to commuting locations, less consistency appears in the spatial distributions of locations for entertainment and other activities, which is around 0.30~0.35. As inferred from Fig. 5 c1 and c2, Weibo users' leisure areas are mostly towards the districts of Dongcheng and Chaoyang, whereas 22 survey respondents tend to go to the inner areas for entertainment. This is probably because Weibo users, representative of young population in a city, prefer commercial facilities such as shopping centers and bars that mostly located in the north and east of Beijing to public parks in the city center. Intuitively, one would not travel long distances to a shopping mall far away from home, when similar facilities are available nearby. Therefore, it is highly possible that most places where people participate in non-commuting activities are distributed around their living places. Therefore, hot spots for non-commuting activities are concentrated in the same region where most people live (for other density maps, see SI Figure 2). We further evaluate the commuting distance distribution of identified local commuters. Obvious difference exists between the two cumulative distribution curves, with the CR index of only 0.28; check-in data overestimate the frequency of zero-distance commuting (c.f. Fig. 7). In reality, some people may work at home or live at their workplace. For those individuals, our algorithm would end up with the same location identified as both home and workplace. The facts that students constitute a significant portion of Weibo users, and home-based workers would not be treated as commuters in travel surveys, are probably the reasons for this mismatch. 4.2 Sample reconstruction We perform sample reconstruction on the central three zones of inner area, functional extended area and new urban district to represent urban Beijing, because, as shown in our dataset, these zones account for 91% of all the population and over 99% of working opportunities of Beijing. Fangshan district is excluded for the limited number of sample data there. Based on the constraint variables we specify, only the Weibo samples whose age and gender information are available, and home locations can be identified as well as located within the selected districts, would be used for sample 23 reconstruction. These specifications give us a dataset composed of 24,518 samples. Our analysis shows that all the constraining features at the TAZ level are reproduced with no misclassification (c.f. SI Table 4). The reconstructed population can be seen as an artificial sample as representative as survey respondents under the constraints we formulate. The results show that socio-demographics and commuting patterns of the reconstructed population matches well with those of survey respondents, with the CS index for the spatial distribution of population and workplace as 100% and 65% respectively. A good match is achieved for the spatial distributions of the destinations for entertainment (54%) and for other activity (54%). Besides, all the centers of gravity migrate southwest after sample reconstruction (c.f. Fig. 6 b); the resulting new activity-specific centers move closer towards the corresponding centers discerned from survey data (c.f. Fig. 6 a). Fig. 6 Performance of sample reconstruction. (a) Distance between Centers of Gravity index before and after sample reconstruction for activity category of Home (H), Work (W), Entertainment (E) and Other (O). The transparent bars with un-bold data labels indicate the check-in data's baseline accuracy, expressed in terms of Weibo microdata-survey similarity. (b) Centers of Gravity of activity-specific spatial distribution maps. We refer to the check-in data as 'microdata', and reconstructed data as 'syn'. Movements of centers are denoted by arrows. Here, synthetic center coincides with survey center for home distributions. Generally, our proposed sample reconstruction technique for correcting sample bias works 24 relatively better for commuting activities than for non-commuting activities. There are two main reasons. First, working opportunities in Beijing are center-towards; meanwhile, the age profiles of commuters are normally concentrated within a specific age range, like 27 to 50, which is covered relatively sufficiently in both datasets. For non-commuting activities, the active participants are usually people aged 50 and above, who have more leisure time available after retirement. However, these people are under-represented in check-in data. Reconstructing a population with 'unbiased' age profiles will result in cloning just a limited number of elderly persons multiple times, which could only bring small modifications to the resulting activity spatial distributions. Second, compared with commuting activities, individuals usually have much more freedom when choosing recreational destinations. Therefore, it is quite likely that the discrepancies result from individual diversities. Furthermore, we examine at the sub-district level how the commuting distance distribution patterns change after sample reconstruction. In general, as compared with identified commuters from Weibo data, the commuting distance distribution curve of synthetic commuters from reconstructed population is more consistent with that of survey respondents (c.f. Fig. 7). More specifically, after sample reconstruction, the CR index is increased substantially from 0.23 to 0.63. Furthermore, in inner zone and functional extended zone, the district-specific CR index of the synthetic commuters are all approximately 0.50 or above (c.f. SI Table 5). Commuting distance distributions of commuters from new urban districts are only improved to a limited degree. This is probably because in these areas, much bigger diversity exists in residents' travel behaviors, while available data there may not be sufficient to reflect fully this large diversity. 25 Fig. 7 Commuting distance distributions. The direct and cumulative distribution curves of commuting distance. Here, 'Survey' refers to survey data; 'Microdata' refers to Weibo data after location identification; 'Synthesis' refers to generated population after sample reconstruction. After sample reconstruction, the frequency of zero-distance commuting has been largely reduced. The synthetic distribution curve is more consistent with survey data though it slightly overestimates the frequency of commuting distance longer than 3km. Based on the above analysis, we have demonstrated that sample reconstruction can be a useful sampling bias correction method to adjust the bias in social media data. However, discrepancies still exist between spatial mobility patterns discerned from synthetic and survey data. First, there are still other socio-demographics assumed to be influential on travel behavior, such as employment, occupation, housing area, and housing tenure (Ma et al., 2014), which are absent in Weibo users' profiles and thus cannot be included in our synthesis process. As a result, the generated population may not match well with survey respondents under these attributes. Second, check-in data and travel logistic survey data are both a representative sample from the total population and each just reflects one component of the entire array of complicated daily human behavior. Considering that the data we use are only a subset of all geo-tagged check-in records available on Weibo, when a sufficiently large dataset is utilized, the inferred results would improve further. 26 5 Conclusion and Discussion In this research, we explored the capacity of social media data for human mobility analysis. A three-step methodological framework, including purpose-specific location identification, bias modification, and out-of-sample validation, was proposed and then tested using check-in records crawled from Sina Weibo. An independent citywide travel survey was used as the benchmark dataset for validating the results. Our analysis shows that Weibo users' and survey respondents' demographic profiles and mobility patterns have distinct features. This implies a strong influence of socio-demographics on people's activity participation and destination choices. We first tested the possibility of using a spatial population synthesis technique to solve the bias-modifying problem of check-in data. Our results showed that socio-demographics and activity-specific spatial layouts of the reconstructed population match satisfactorily with those of survey respondents. Comparing the inferred results from big data to aggregated results from an independent travel survey represents a very important step towards big data validation. However, it should be noted that the inferred results at the individual level could have great uncertainty even though a high level of accuracy is observed at the aggregate level (Chen et al., 2016). Besides, the target distribution used for sample reconstruction in our study was extracted from the survey data. The extent to which the resulting synthetic population could represent the real one largely depends on the quality of the survey data. In general, such survey data have a relatively small sample size, compared with the whole population, and thus the data might not be representative enough in some cases. Another thing to keep in mind is that, check-in data and travel log survey data are both sampled from the total population, and each only presents a certain configuration of the reality. Therefore, combining knowledge learned from multi-source data would lead us much closer to the real system. The method we proposed in this 27 research would also be a straightforward and easy-undertaking technique for cross-domain integration of heterogeneous human spatiotemporal data. Another remaining challenge of using check-in data for transport-related analysis, especially in advanced travel demand models, is that it has missing activities, since users share their activities voluntarily. Moreover, information on the mode of transport is also missing. However, these are not the focus of this article. An attempt in this domain can be found in Hasan and Ukkusuri (2018), where they applied Continuous-Time Bayesian Network model to extract the true transition and duration distributions from the incomplete trajectories of Twitter users. Transportation mode can also be extracted from Weibo text using text mining and natural language processing approaches. As suggested by Rashidi et al. (2017), constructing a dictionary for this purpose is not as complicated. Social media check-in data opens up a novel dataset for urban analysis. Compared with traditional surveys, this dataset apparently has more advantages, including larger sample size, real-time updating, less-prone to cheating, and a much lower acquisition cost. Especially in new urban districts, where population size, structure, and mobility patterns are significantly changing, whereas the survey data is not available or too expensive to collect, this study has validated that through a proper way for analyzing Weibo data, such data can be a moderate and cost-effective alternative source of mobility information. The proposed framework can be extended in several directions. Relying on the commuting mode shares and emission intensities of each mode from supplementary databases, the commute estimates in our work can be easily extended to carbon footprints analysis. Another potential extension is to fill the missing activities in check-in sequences with the help of activity transition probabilities and purpose-specific trip distance distributions from travel surveys. Such models will provide valuable information for transportation emission modelling. 28 For instance, the activity-location sequences generated can be integrated with state-of-the-art network assignment model to obtain dynamic traffic flows on the road network, and then feed them to transport emission model, which will be able to infer the gas consumption and pollution emissions incurred by passenger travel at a high temporal and spatial scale. Most importantly, Weibo data makes a detailed activity-based travel analysis possible as geo-tagged venues are categorized based on the POI type of the visited places. Incorporating such information enables urban planners and environmental specialists to estimate the volume of air pollutants that would be generated during certain time intervals, between specific regions, and to fulfill different needs. This can facilitate a better understanding of urban organization and its environmental effects. The longitudinal nature of social media data could also enable planners to deal with valuable questions like 'how does human mobility evolve over a year?', 'what is the role of the underlying built environment in forming human mobility and further transportation emission?' Acknowledgements We would like to thank Fuzheng Zhang, Jianxun Lian, and Danyang Liu from Microsoft Research Asia for helping us crawl and manage Weibo check-in data. 29 Appendixes Appendix A Appendix Figure 1. Temporal features of main activity category. (a) Home; (b) Travel; (c) Work; (d) School; (e) Entertainment; (f) Eating out; (g) Other. 30 abcdefg00.050.10.150.20.250.30.350:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.20.40.60.811.20:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.10.20.30.40.50:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.020.040.060.080:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.020.040.060.080.10.120:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.0050.010.0150.020.0250.030.0350:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend00.010.020.030.040.050.060:001:002:003:004:005:006:007:008:009:0010:0011:0012:0013:0014:0015:0016:0017:0018:0019:0020:0021:0022:0023:00Frequenceweekdayweekend References Beckman R J, Baggerly K A, Mckay M D (1996). Creating synthetic baseline populations. Transportation Research Part A: Policy and Practice, 6(30): 415-429. Bojic I, Massaro E, Alexander B (2015). Choosing the right home location definition method for the given dataset. In: International Conference on Social Informatics, Springer International Publishing, 194-208. Chen C, Ma J, Susilo Y, Liu Y, Wang M (2016). The promises of big data and small data for travel behavior (aka human mobility) analysis. Transportation Research Part C: Emerging Technologies, 68: 285-299. Cho E, Myers S A, Leskovec J (2011). Friendship and mobility: user movement in location-based social networks. In: Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 1082-1090. Ghauche A. Integrated transportation and energy activity-based model (2010). Dissertation for the Master Degree. Cambridge: Massachusetts Institute of Technology. Haase D, Lautenbach S, Seppelt R (2010). Modeling and simulating residential mobility in a shrinking city using an agent-based approach. Environmental Modelling & Software, 25(10): 1225-1240. Hasan S, Ukkusuri S V (2014). Urban activity pattern classification using topic models from online geo-location data. Transportation Research Part C: Emerging Technologies, (44): 363-381. Hasan S, Ukkusuri S V (2018). Reconstructing activity location sequences from incomplete check-in data: a semi-markov continuous-time bayesian network model. IEEE Transactions on Intelligent Transportation Systems, 19(3): 687-698. Hasan S, Zhan X, Ukkusuri S V (2013). Understanding urban human activity and mobility patterns using large-scale location-based data from online social media. In: Proceedings of the 2nd ACM SIGKDD International Workshop on Urban Computing, ACM, 6. Hendrix E M T, Ortigosa P M, García I (2002). On the efficiency and effectiveness of controlled random search. In: Stochastic and Global Optimization. Boston: Springer ,129-145. Hermes K, Poulsen M (2012). A review of current methods to generate synthetic spatial microdata using reweighting and future directions. Computers, Environment and Urban Systems, 36(4): 281-290. Hossain N, Hu T, White A M, Luo J, Kautz H (2016). Inferring fine-grained details on user activities and home location from social media: detecting drinking-while-tweeting patterns in communities. arXiv preprint arXiv, 1603.03181. Isaacman S, Becker R, Caceres R, Kobourov S, Martonosi M, Rowland J et al (2011). Identifying important places in people's lives from cellular network data. In: International Conference on Pervasive Computing, Springer Berlin Heidelberg, 133-151. Kirk H (2013). Microsimulation model user guide (flexible modelling framework). Leeds: School of Geography, University of Leeds. Lenormand M, Picornell M, Cantu-Ros O G, Tugores A N, Louail T, Herranz R et al (2014). Cross-checking different sources of mobility information. PloS One, 9(8): e105184. Ma J, Heppenstall A, Harland K, Mitchell G (2014). Synthesising carbon emission for mega-cities: a static spatial microsimulation of transport CO2 from urban travel in Beijing. Computers, Environment and Urban Systems, 45: 78-88. Müller K, Axhausen K W (2010). Population synthesis for microsimulation: state of the art. ETH Zürich, Institut für Verkehrsplanung, Transporttechnik, Strassen-und Eisenbahnbau (IVT). Pontes T, Magno G, Vasconcelos M, Guptay A, Almeida J, Kumaraguruy P et al (2012). Beware of what you share: 31 inferring home location in social networks. In: 2012 IEEE 12th International Conference on Data Mining Workshops, IEEE, 571-578. Rashidi T H, Abbasi A, Maghrebi M, Hasan S, Walle T S (2017). Exploring the capacity of social media data for modelling travel behaviour: opportunities and challenges. Transportation Research Part C: Emerging Technologies, 75: 197-211. Rieser M, Dobler C, Dubernet T, Grether D, Horni A, Ammel G L et al (2014). MATSim user guide. Subbiah R, Lum K, Marathe A, Marathe M (2013). Activity based energy demand modeling for residential buildings. In: Innovative Smart Grid Technologies (ISGT), IEEE PES, 1-6. Toole J L, Colak S, Sturt B, Alexander L P, Evsukoff A, González M C (2015). The path most traveled: travel demand estimation using big data resources. Transportation Research Part C: Emerging Technologies, 58: 162-177. Wang Y, Yuan N J, Lian D, Xu L, Xie X, Chen E et al (2015). Regularity and conformity: location prediction using heterogeneous mobility data. In: Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, 1275-1284. Wikipedia online https://en.wikipedia.org/w/index.php?title=Cosine_similarity&oldid=767962382 (accessed March 7, 2017). Contributors Available (2017). Cosine similarity. at Wu L, Zhi Y, Sui Z, Liu Y (2014). Intra-urban human mobility and activity transition: evidence from social media check-in data. PloS One, 9(5): e97010. Yang F, Jin P J, Cheng Y, Zhang J, Ran B (2015). Origin-destination estimation for non-commuting trips using location-based social networking data. International Journal of Sustainable Transportation, 8(9): 551-564. Yuan N J, Wang Y, Zhang F, Xie X, Sun G (2013). Reconstructing individual mobility from smart card transactions: a space alignment approach. In: ICDM, IEEE, 877-886. Zhang F, Yuan N J, Xie X (2012). Data from 'LifeSpec: learning the spectrum of urban lifestyles'. Available online at https://www.microsoft.com/en-us/research/project/lifespec-learning-spectrum-urban-lifestyles-2/ (accessed March 7, 2017). Zhang L, Yang W, Wang J, Qian R (2013). Large-scale agent-based transport simulation in Shanghai, China. Transportation Research Record: Journal of the Transportation Research Board, 2399: 34-43. Zhou J, Long Y (2014). Jobs-housing balance of bus commuters in Beijing. Transportation Research Record: Journal of the Transportation Research Board, 2418: 1-10. 32 Supporting Information for Social media and mobility landscape: uncovering spatial patterns of urban human mobility with multi source data In this supporting information, we present the essential extended details of the results and analysis. Calibration Results This section gives the results of calibrating home and work identification algorithm with the ground truth data, given the optimal objective. Besides, we also evaluate the calibrated results based on mean distance error, standard deviation of distance error and identification coverage (that is, the share of users with home/work identified in those with home/work labelled from the ground truth) (c.f. SI Table 3). After 20,000 times of iteration, the objective functions under seven settings of clustering radius all converge to some single value. It means that the pre-set algorithmic control parameters of CRS (including, iteration stages N and initial points in storage p) are sufficiently moderate to generate a set of parameters with which most individuals' resulting identified home and workplaces give the best fittings to the labelled ones. We further calculate the 25th, 50th, 75th, 97.5th percentile error between the home and workplaces as identified by our algorithm and the labelled ones as in ground truth. Both algorithms perform well, achieving median errors of 0.08 km and 0.64 km, respectively. Moving out to the 75th percentile, the home algorithm continues to work well, with 2.90 km of error, whereas the work algorithm's error increases to 6.58 km. A further exploitation into the few cases with larger distance errors reveals that the poor performance usually happens to users who do not use Weibo frequently at workplace, or users who would post a microblog only when they are working overtime, which time period is not covered by the peak work event hours defined in our algorithm. In general, our home algorithm performs better than work algorithm. Sample Reconstruction It has to be noted that, in this study, due to the limited size of non-commuters identified with check-in dataset, population reconstruction for those has to sample from the whole microdata. Considering the dataset we use is only a subset of all geo-tagged check-in records available on Weibo, when a sufficiently large dataset is utilized, this process would improve further. 33 Figure 1 The first 200 best parameter estimates of CRS algorithm under different settings of clustering radius (m). The upper bond: indicates the maximum value, lower bond, the minimum value and center, the best estimate of objective function. Comparatively, all of the four parameters give the best converging performance at the radius of 300m. 34 Figure 2 Other activity density maps. The identified (up) and recorded (down) other activity density maps for the major metropolitan area in Beijing (person_ days/km2), with a Cosine Similarity index of 0.35. Among all the non-commuting locations, we calculate the number of days each unique venue is visited (Days). Then, the popularity of a certain place as a candidate location for other activity can be calculated as the sum of the corresponding Days of all the users. 35 Table 1 Bags of words used when building ground truth data Words Work/School: 上班/下班/上学/放学(work/school), 单位/公司(company); 办公室(office room); 工位 (working station); 教室(classroom); 加班(work overtime); 值班(on duty) Home: 家 (home), 床 (bed), 起 床 / 早 起 (wake up), 睡 觉 (sleep), 早 安 (morning), 晚 安 (good night), 宿舍/寝室(dormitory); 出门(go out) Table 2 Mean values of commuting distances by attributes Attributes female Gender male Distance(km) Attributes Distance(km) 2.20 2.02 Education primary secondary tertiary 2.01 2.10 2.13 Chi-sq (P) 0.01(0.91) Chi-sq (P) 0.00(0.99) 15~24 25~26 27~28 29~30 31~33 Age 34~39 40~49 50+ 1.81 1.67 2.12 2.53 2.66 2.58 1.86 0.93 Dongcheng Xicheng Chaoyang Haidian Shijingshan District Fengtai Changping Shunyi Tongzhou Daxing 1.89 1.53 2.07 1.39 3.27 2.82 3.03 3.25 3.49 2.50 Chi-sq (P) 335.92(0.00) Chi-sq(P) 103.64(0.00) Info: Kruskal -- Wallis test (or, KW test), a non-parametric method for testing whether samples originate from distributions with the same median, is used to select attributes strongly related to travel behavior. A significant KW test, with a P value close to zero, indicates that at least one sample is from a distribution with a different median. 36 Table 3 Calibration results of home and workplace identification Home Standard Deviation 6.83 6.76 6.63 6.64 6.89 6.54 7.32 Mean 3.32 3.24 3.20 3.18 3.43 3.18 3.67 Coverage Mean Work Standard Deviation Coverage 91% 88% 95% 92% 97% 92% 97% 4.60 4.42 4.69 4.66 4.66 4.48 5.21 7.97 7.87 7.76 7.90 7.29 7.25 7.87 87% 86% 93% 92% 96% 91% 99% Objective Function 4.28E-04 4.37E-04 4.38E-04 4.34E-04 5.05E-04 5.08E-04 5.03E-04 r(m) 20 50 70 100 200 300 500 Table 4 Representation of the model constraint at the TAZs level District Age Gender Age by Gender Commuting Non-commuting TAE CPE (%) TAE CPE (%) 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 Info: Total Absolute Error (TAE) and Cell Percentage Error (CPE) are used to evaluate the goodness-of-fit of the synthetic population. TAE is calculated with Eq. (6) in the manuscript, while CPE is derived by TAE/N*100, where N is the population of the relevant cell, zone or attribute. Table 5 Sub-district level Coincidence Ratio of commuting trip-length distribution before and after sample reconstruction Total Dongcheng Xicheng Chaoyang Haidian Fengtai Shijingshan Changping Shunyi Tongzhou Daxing Sample Synthesis Sample size 0.23 0.24 0.20 0.25 0.23 0.24 0.20 0.28 0.26 0.22 0.20 0.63 0.59 0.58 0.55 0.52 0.60 0.49 0.43 0.25 0.41 0.42 24,518 1,589 2,137 6,979 5,820 2,671 714 1,698 977 925 1,008 37
1212.1002
1
1212
2012-12-05T12:07:05
Stochastic Models of Misinformation Distribution in Online Social Networks
[ "cs.SI", "physics.soc-ph" ]
This report contains results of an experimental study of the distribution of misinformation in online social networks (OSNs). We consider the classification of the topologies of OSNs and analyze the parameters identified in order to relate the topology of a real network with one of the classes. We propose an algorithm for conducting a search for the percolation cluster in the social graph.
cs.SI
cs
    Konstantin  Abramov,  Yuri  Monakhov   STOCHASTIC  MODELS  OF  MISINFORMATION  DISTRIBUTION  IN  ONLINE  SOCIAL     NETWORKS     Department  of  Informatics  and  Information  Security,  Vladimir  State  University,  Vladimir   600000  Russian  Federation   This  report  contains  results  of  an  experimental  study  of  the  distribution  of   misinformation  in  online  social  networks  (OSNs).  We  consider  the  classification  of  the     topologies  of  OSNs  and  analyze  the  parameters  identified  in  order  to  relate  the   Results  of  current  research  show  the  intensive  growth  in  OSN  users’  activity  [1].  This   topology  of  a  real  network  with  one  of  the  classes.  We  propose  an  algorithm  for   phenomenon  is  observed  throughout  the  entire  Internet.  Currently  there  are  many  factors   conducting  a  search  for  the  percolation  cluster  in  the  social  graph.   enabling  massive  waves  of  misinformation  spread  through  different  social  media.  Finding   ways  to  mitigate  these  phenomena  is  an  extremely  actual  and  very  complicated  problem.   One  of  the  aspects  that  we  need  to  take  into  account  is  building  adequate  models  and   prediction  methods  for  the  misinformation  spread.  The  easiest  and  most  researched  way  to   model  (and  predict)  these  processes,  in  our  opinion,  is  to  use  the  classic  epidemiological   models  developed  in  19th  century  to  study  how  infectious  diseases  spread  among  the   population.  These  models  generally  are  based  on  systems  of  differential  equations.    Such   models  though  are  rather  primitive  and  they  don’t  take  into  the  account  some  of  the  vital   characteristics  of  the  misinformation  process[2].  Therefore  the  development  of  the  new   models  is  relevant  and  necessary  to  predict  the  spread  of  misinformation  and  to  mitigate  it.    Researchers  present  different  classifications  of  the  network  topologies  and  their   characteristic  properties.  According  to  one  of  these  classifications[3],  there  are  three   different  types  of  small  world  networks:  wide  scale,  single  scale  and  scale  free  (SF)   networks.  The  first  type  is  characterized  by  the  node  degree  distribution  function,  which  is   a  mix  of  power-­‐law  and  exponential  distributions.  The  primary  characteristic  of  the  second   type  is  an  absence  (or  very  low  percent)  of  the  nodes  with  high  degree,  i.e.  Watts-­‐Strogatz   networks.  Finally,  the  scale  free  networks  are  strictly  described  by  the  power-­‐law  node   degree  distribution,  meaning  the  probability  of  the  nodes  with  high  degree  of  connectivity   is  relatively  high.  The  most  known  example  of  the  SF  networks  is  the  Barabasi-­‐Albert  (BA)   network.      The  table  (Tab.  1)  describes  features  one  can  use  to  relate  the  OSN  topology  to  one  of   the  types[4].  These  features  are:   • the  number  of  connections  in  the  network  with  N  nodes  –  the  number  of  all   possible  connections  between  N  nodes;   • the  average  path  length  l  between  any  pair  of  vertices  (nodes);   • the  node  connectivity  degree  distribution  function  shows  the  probability  of  the   node  having  the  degree  of  k;   • the  clustering  coefficient  that  is  defined  as  the  probability  of  a  connection   between  two  nodes  having  a  common  neighbor.  This  probability  (for  an  i-­‐th   neighboring  node)  is  calculated  as   E i where ki    is  the  i-­‐th  neighboring  node  degree  and Еi  is  the  total  number  of   , C i 1= connections  between  k  nodes  adjacent  to  the  i-­‐th  node.  The  total  (or  average)   (k i ) 1- k i 2 clustering  coefficient  for  a  network  with  N  nodes  will  be   C 1 . Ci ∑= N i Tab.1 Feature Number of connections Average path length Basic topological features Barabasi-Albert Watts-Strogatz small world network scale free network ) 1-Nm ⋅ ( Nk ⋅ 2 ln~ ln N k N l m ln~:1 ; = 3 l m N > α :2≥ ln≈ ; BA 3 l N N α = ln≈ lnln/ BA 2 3 l N << α lnln≈ . BA ; Random networks (i.e. Erdos-Renyi graph) Nk ⋅ 2 ln~ ln N k C 5~ k N k~C N Clustering pC ~1→ k/N, pC 0pC coefficient >> 1→ > Power law: Node degree Poisson's law: Poisson's law: distribution α-k~ k k p(k) pN ( ) pN ( ) pN-e~kp pN-e~kp )( )( Gubanov,  Novikov  and  Chkhartishvili  in  their  book  [5]  provide  an  extensive  review  of   k ! k ! the  approaches  towards  social  network  modeling.  In  their  research  they  classify  netwoks   not  by  their  structure  but  rather  by  the  types  of  social  influence.  On  the  other  hand  their   statement  concerning  the  necessity  of  having  at  least  two  features  to  identify  the  network   type  is  well  applicable  in  our  case.  We  select  the  node  degree  distribution  function  and  the   clustering  coefficient  for  these  two  features.    During  the  research  we  had  extracted  the  topological  data  of  the  Facebook  OSN,  the   size  of  the  obtained  sample  equals  6927  nodes.  The  following  research  was  conducted  on   this  subgraph.    The  authors  have  conducted  a  comparison  between  the  node  degree  distribution   acquired  from  the  Facebook  OSN  subgraph  and  the  degree  distributions  of  small  world,   scale  free  and  Erdos-­‐Renyi  networks.  For  Erdos-­‐Renyi  and  small  world  networks  one  can   approximate  the  degree  distribution  with  Poisson’s  law,  and  for  scale  free  networks  the   distribution  of  the  degrees  is  approximated  by  power  law.  In  our  social  subraph  maximum   degree  equals  507,  minimum  degree  equals  1.  The  histogram  of  the  node  degree   distribution  of  the  sample  is  shown  in  Fig.  1     Fig.  1.  Node  degree  distribution  of  the  sample      It  is  well  known  that  the  characteristic  feature  of  scale  free  networks  is  the  presence  of   a  few  nodes  with  very  high  degrees  of  connectivity  and  a  mass  of  nodes  with  small   connectivity  degrees.  We  can  presume  that  the  obtained  sample  is  scale  free.  To  test  this   hypothesis  the  probabilities  of  a  node  having  different  degrees  were  calculated.  The  results   show  that  the  acquired  dataset  can  be  (with  sufficient  accuracy,  Δ=0,01)  approximated  by   a  power  function.  Therefore  the  degree  distribution  function  for  our  social  subgraph  is  that   of  a  scale  free  network.    The  value  of  a  clustering  coefficient  calculated  for  this  subgraph  complies  with  the   criterion  shown  in  Tab.  1,  which  is  typical  for  the  scale  free  networks.  We  therefore  can   conclude  that  our  Facebook  OSN  sample  has  the  scale  free  topology[6].      During  this  research  we  carried  out  the  simulation  of  the  misinformation  process  in   OSNs.  The  simulation  was  conducted  using  proprietary  softwrae  developed  by  authors.  The   most  commonly  used  models  of  social  influence  are  the  classic  epidemic  models,  such  as  SI,   SIR,  SIS,  PSIDR,  AAWP,  SIM.  Every  model  has  its  specific  features  and  no  model  is   universally  applicable.  In  this  research  we  use  SIR  model  as  the  source.    The  most  significant  result  we  achieve  from  the  simulation  is  that  in  most  cases  the   cluster  that  consists  of  R-­‐nodes  (nodes  “immune”  to  misinformation)  significantly  reduces   the  speed  of  spread  by  isolating  the  “infected”  nodes  or  spreaders  of  misinformation  from   the  nodes  “susceptible”  to  misinformation.  We  use  the  term  “cluster”  to  describe  the  linked   subgraph  constructed  from  the  nodes  with  high  clustering  coefficients.        [1]  Industry  report  of  the  Federal  Agency  for  Press  and  Mass  Communications  “Internet  in   Russia:  Status,  Trends  and  Prospects",  August  2010.  [Russian:  Отраслевой  доклад   REFERENCES   Федерального  агентства  по  печати  и  массовым  коммуникациям  «Интернет  в  России:   состояние,  тенденции  и  перспективы  развития»,  август  2010г.]     [2]  Konstantin  Abramov,  Yuri  Monakhov.  Modeling  of  unwanted  information  in  social   media  [text]  /  Proceedings  of  XXX  All-­‐Russian  Conference  on  problems  of  efficiency  and   safety  of  complex  engineering  and  information  systems.  Part  IV,  section  number  6.  -­‐   Serpukhov  VI  RV.  -­‐  2011.  -­‐  376  p.;  -­‐  P.  178-­‐182.  -­‐  ISBN  978-­‐5-­‐91954-­‐029-­‐8  [Russian:   Абрамов  К.Г.,  Монахов  Ю.М.  Моделирование  распространения  нежелательной   информации  в  социальных  медиа  [Текст]  //  Труды  XXX  Всероссийской  научно-­‐ технической  конференции.    Проблемы  эффективности  и  безопасности   функционирования  сложных  технических  и  информационных  систем.  Часть  IV,   секция  №6.  -­‐    Серпуховский  ВИ  РВ.  -­‐  2011.  -­‐  376  c.;  -­‐  С.  178-­‐182.  -­‐  ISBN  978-­‐5-­‐91954-­‐ 029-­‐8]    [3]  Leveille  J.  Epidemic  Spreading  in  Technological  Networks  //    M.  Sc.  Thesis,  HP  Labs   Bristol,  2002  –  100  pp.    [4]  Zharinov  IV,  Krylov  VV.  Construction  of  graphs  with  minimum  average  path  length  /  /   Bulletin  of  Izhevsk  State  Technical  University  -­‐  №  4,  2008.  -­‐P.  164-­‐169.  [Russian:  Жаринов   И.В.,  Крылов  В.В.  Конструирование  графов  с  минимальной  средней  длиной  пути  //   Вестник  Ижевского  государственного  технического  университета    -­‐№4,  2008.  –С.   164-­‐169.  ]    [5].  Gubanov  DA,  Novikov  DA,  Chkhartishvili  AG.    Models  of  influence  in  social  networks,   overview  of  classes  of  modern  models  of  social  networks,  2004.  [Russian:  Губанов  Д.А.,   Новиков  Д.А.,  Чхартишвили  А.Г.  «Модели  влияния  в  социальных  сетях»,  обзор   классов  современных  моделей  социальных  сетей,  2004.]    [6].  Yuri  Monakhov,  Konstantin  Abramov,  Alexandra  Nikitashenko.  On  the  question  of   improving  the  models  of  misinformation  spread  in  online  social  networks  //  Information   Systems  and  Technology  IST-­‐2011:  Proceedings  of  the  XVII  International  Scientific  and   Technical  Conference,  Nizhny  Novgorod,  2011  [Russian:  Абрамов  К.Г.,  Монахов  Ю.М.,   Никиташенко  А.В.  К  вопросу  об  уточнении  моделей  распространения   нежелательной  информации  в  социальных  сетях  Интернета  /  Информационные   системы  и  технологии  ИСТ-­‐2011:  материалы  XVII  международной  научно-­‐ технической  конференции  -­‐  Н.  Новгород:  -­‐  2011.  -­‐  ISBN  978-­‐5-­‐9902087-­‐2-­‐8]  
1303.5675
1
1303
2013-03-22T18:06:33
Markov random walk under constraint for discovering overlapping communities in complex networks
[ "cs.SI", "cond-mat.stat-mech", "physics.soc-ph" ]
Detection of overlapping communities in complex networks has motivated recent research in the relevant fields. Aiming this problem, we propose a Markov dynamics based algorithm, called UEOC, which means, 'unfold and extract overlapping communities'. In UEOC, when identifying each natural community that overlaps, a Markov random walk method combined with a constraint strategy, which is based on the corresponding annealed network (degree conserving random network), is performed to unfold the community. Then, a cutoff criterion with the aid of a local community function, called conductance, which can be thought of as the ratio between the number of edges inside the community and those leaving it, is presented to extract this emerged community from the entire network. The UEOC algorithm depends on only one parameter whose value can be easily set, and it requires no prior knowledge on the hidden community structures. The proposed UEOC has been evaluated both on synthetic benchmarks and on some real-world networks, and was compared with a set of competing algorithms. Experimental result has shown that UEOC is highly effective and efficient for discovering overlapping communities.
cs.SI
cs
Markov random walk under constraint for discovering overlapping communities in complex networks Di Jin1, Bo Yang1, Carlos Baquero2, Dayou Liu1, Dongxiao He1 and Jie Liu1 1 College of Computer Science and Technology, Jilin University, Changchun 130012, China 2 CCTD/DI, University of Minho, Braga, Portugal E-mail: [email protected], [email protected], [email protected], [email protected], [email protected] and [email protected] Abstract. Detection of overlapping communities in complex networks has motivated recent research in the relevant fields. Aiming this problem, we propose a Markov dynamics based algorithm, called UEOC, which means, “unfold and extract overlapping communities”. In UEOC, when identifying each natural community that overlaps, a Markov random walk method combined with a constraint strategy, which is based on the corresponding annealed network (degree conserving random network), is performed to unfold the community. Then, a cutoff criterion with the aid of a local community function, called conductance, which can be thought of as the ratio between the number of edges inside the community and those leaving it, is presented to extract this emerged community from the entire network. The UEOC algorithm depends on only one parameter whose value can be easily set, and it requires no prior knowledge on the hidden community structures. The proposed UEOC has been evaluated both on synthetic benchmarks and on some real-world networks, and was compared with a set of competing algorithms. Experimental result has shown that UEOC is highly effective and efficient for discovering overlapping communities. Keywords: analysis of algorithms, clustering techniques, network dynamics PACS: 89.75.Hc, 89.75.Fb, 02.10.Ox, 02.60.Cb 1. Introduction Many complex systems in real world exist in the form of networks, such as social networks, biological networks, Web networks, etc., which are collectively referred to as complex networks. One of the main problems in the study of complex networks is the detection of community structure, i.e. the division of a network into groups of nodes having dense intra-connections, and sparse inter-connections [1]. In the last few years, many different approaches have been proposed to uncover community structure in networks; the interested reader can consult the excellent and comprehensive survey by Fortunato [2]. However, it is well known that many real-world networks consist of communities that overlap because nodes are members of more than one community [3]. Such observation is visible in the numerous communities each of us belongs to, including those related to our scientific activities or personal life (school, hobby, family, and so on). Another, biological example is that a large fraction of proteins simultaneously belong to several protein complexes [4]. Thus, hard clustering is inadequate for the investigation of real-world networks with such overlapping communities. Instead, one requires methods that allow nodes to be members of more than one community in the network. Recently, a number of approaches to the detection of overlapping communities in graphs have been proposed. One type, among these methods, is based on the idea of clique percolation theory, i.e. that a cluster can be interpreted as the union of small fully connected sub-graphs that share nodes [3, 5, 6]. Another type of method transforms the interaction graph into the corresponding line graph in which edges represent nodes and nodes represent edges, and then apply a known clustering algorithm on the line graph [7-10]. A third type of method, which our work belongs to, discovers each natural community that overlaps by using some local property based approach [11-13]. Though there are already some algorithms for detecting overlapping communities, which have been presented recently, there is still ground for improvements in the performance. Moreover, while the Markov dynamics model has been successfully used in the area for community detection [14-18], unfortunately, the existing approaches still largely lack the ability to deal with overlapping communities. To the best of our knowledge, only to recent works, available in pre-print format, constitute exceptions to this. Esquivel et al. [19] generalized the map equation method [16] by releasing the constraint that a node can only belong to one module codebook, and made it able to measure how well one can compress a description of flow in the network when we partition it into modules with possible overlaps. Kim et al. [20] extended the map equation method [16], which is originally developed for node communities, in order to find link communities in networks, and made it able to find overlapping communities of nodes by partitioning links instead of nodes. In this paper, an algorithm UEOC based on the Markov dynamics model is proposed to discover communities that share nodes. In the UEOC approach, so as to detect all the natural communities, a Markov random walk method is combined with a new constraint strategy, which is based on the corresponding annealed network [21], and used to unfold each community. Then, a cutoff criterion with the aid of conductance, which is a local community fitness function [22], is applied to extract the emerged community. These extracted communities will naturally overlap if this configuration is present in the network. Furthermore, a strong point in our approach is that UEOC is not sensitive to the choice of its only parameter, and needs no prior knowledge on the community structure, such as the number of communities. 2. Algorithm 2.1. Overview of the UEOC Let N = (V, E) denote an unweighted and undirected network, where V is the set of nodes (or vertices) and E is the set of edges (or links). We define a cover of network N as a set of overlapping communities with a high density of edges. In this case, some nodes may belong to more than one community. This is an extension of the traditional concept of community detection (in which each node belongs to a single community), to account for possible overlapping communities. In our case, detecting a cover amounts to discovering the natural community of each node in network N. The straightforward way to compute a cover of a targeted network is to repeatedly detect the community for each single node. This is, however, computationally expensive. The natural communities of many nodes often coincide, so most of the computer time is spent to rediscover the same modules over and over. For our algorithm, UEOC, a more efficient way is summarized as follows. S1. Pick node s with maximum degree, which has not been assigned to any community; S2. Unfold the natural community of node s by a Markov random walk method combined with a constraint strategy; S3. Extract the emerged community of node s by a cutoff criterion based on a conductance function; S4. If there are still nodes that have not been assigned to any community, repeat from S1. The core of UEOC is how to unfold and extract the natural community of each node, and this directly decides the performance of our algorithm. For the first goal, a Markov random walk method combined with a constraint strategy is proposed here, and this will result in making each community clearly visible. For the second one, a cutoff criterion based on the conductance function is presented, so as to precisely extract the emerged community. 2.2. Unfolding a community Given a network N = (V, E), consider a stochastic process defined on N, in which an imaginary agent freely walks from one node to another along the links between them. When the agent arrives at one node, it will randomly select one of its neighbors and move there. Assume that X = {Xt, t  0} denote the agent positions, and P{Xt = j, 1  j  n} denote the probability that the agent arrives at node j after t steps walking. For t > 0 we have P{Xt X0, X1, …, Xt-1} = P{Xt Xt-1}. That is, the next state of the agent is completely decided by its previous state, which is called a Markov property. So, this stochastic process is a discrete Markov chain and its state space is V. Furthermore, Xt is homogeneous because P{Xt = j Xt-1 = i} = pij, where pij is the transition probability from node i to node j. In terms of the adjacency matrix of N, A = (aij)nn, pij is defined as (1). a   ir r Lets consider the Markov dynamics model above. Given a specific source node s for the l s i denotes the probability that this agent starts from node s and eventually ( ) agent, let l ( ) s i can be estimated arrives at an arbitrary destination node i within l steps. The value of (1) p ij ij a iteratively by (2). l  s ( ) i  p ri 1 ( ) r  (2) communities. Thus, in general, vector  n l   s 1 r  l s is called the l step transition probability distribution (vector). Note that the Here, sum of the probability values arriving at all the nodes from source node s will be 1, i.e.  n l . When step number l equals to 0, which means the agent is still on node s, then ( ) 1 i  s 1 i  0 0 ( ) ( ) s s equals to 1 and i equals to 0 for each i  s. s As the link density within a community is, in general, much higher than that between communities, a random walk agent that starts from the source node s should have more paths, to choose from, to reach the nodes in its own community within l steps, when the value of l is suitable. On the contrary, the agent should have much lower probability to arrive at the nodes outside its associated community. In other words, it will be difficult for the agent to escape from its existing community by passing those “bottleneck” links and to arrive at other l s should broadly meet the condition (3) when the step number l is suitable. In this equation, Cs denotes the community where node s is situated.   (3) l l   : ( ) ( ) i j  s s i C j C   s s However, though the above Markov method is well suitable for some simple networks, such as the benchmark graphs in the Newman model [1] and some small real networks, it is not so effective for some complicated networks, like the benchmark graphs in the Lancichinetti model [23] (such as in the example of figure 1(a)) and some large-scale real networks. Furthermore, this method is very sensitive to the choice of the step number l, which depicts a crucial influence in its performance. l s and shown in figure 1(b). As we can see, the associated probability values of many within community nodes are smaller than that of the l s does not fit condition (3) well enough for this relatively complicated network. Moreover, the result shown in this figure is the best performance case (when l equals to 3). It will become worse when step number l is greater or smaller than 3. In order to overcome these drawbacks, a Markov random walk method combined with a constraint strategy based on the corresponding annealed network is proposed here. The idea of our method arises in the intuition that a Markov random process on a network with community structure is different from that process on its corresponding annealed network without communities. Considering this, in each step, the probability that an agent starts from a specific source node s and arrives at each destination node i will be defined as the difference between its associated probability computed on the community network N and that on the corresponding annealed network R. Due to R having no community structure, the link density within a community in network N should be much higher than that in R, while the link density between communities in N should be much lower than that in R. Thus, under the constraint brought by the annealed network, this agent will be deterred from escaping it’s associated community and reach the nodes outside that community. This will also cause that, outside community nodes, thus it cannot unfold a clear community. This also means that There is an example, depicting vector the computed probability value of each within community node will be high, whilst that of each outside node will be relatively low and in most cases even equal to 0. Given network N = (V, E) with its degree distribution D, and the corresponding annealed network R V' E' with its degree distribution D' , it should be so that V V' , D D' ( , ) E E' . This means that N and R have the same degree distribution [21]. Let A = while (aij)nn denote the adjacency matrix of network N. There will be D = diag(d1, … dn), in which  i a denotes the degree of node i. Assume that B = (bij)nn is the adjacency matrix d ij j   l s , 0 q ij r  / ( ) max i  (4) (also called probability matrix) of R. We have  n d , which denotes the b d d ij i j r 1 r  expected number of links (or called expected link probability) between nodes i and j. Let qij denote the transition probability from node i to node j on graph R. It will be defined as (4). b ij   b ir l ( ) s i denote the Considering the constraint generated by this annealed network R, let probability that this agent starts from the source node s and eventually arrives at an arbitrary l ( ) s i can be estimated iteratively by (5). destination node i within l steps. The value of   n n 1 l     s 1 1 r r   l ( ) i   s n l   s 1 r    n 1 l   denotes the transition probability from node s to p s ri 1 r   n 1 l   node i within l steps on network N, while denotes that probability ( ) r q  ri s 1 r  l s i always a nonnegative computed on annealed network R. Furthermore, we make each ( ) value. Since the sum of the probability values arriving at all the nodes from source node s l s i after each step. should be 1, we also normalize ( ) An example for the proposed l step transition probability distribution l s is shown in figure 1(c). As we can see, the associated probability values of almost all within community nodes are greater than that of the outside community nodes, except for only a few special nodes whose community relations may be not very clear. In particular, there are 766 out of It’s obvious that (5) ( ) r q  ri p ri   1 l  s ( ) r  l  s ( ) i  ( ) r ( ) r  903 outside community nodes whose probability values are 0. Thus, it’s obvious that, l s can meet condition (3) well, and unfold a very clear community for source node s. Moreover, this Markov process will convergence very well when step number l is greater than some value (in particular, 20 was found to be a good lower value). Thus, its performance is not as sensitive as before to the parameter l. Later, we will offer some detailed analysis on this parameter. Furthermore, most complex networks have power-law degree distribution, which means there are more paths arriving at the nodes with high degrees than those with low degrees. If not compensated, this will lead to detrimental effects when unfolding communities. Thus, we take into account the effect of power-law degree distribution in complex networks, and propose a further improved l step transition probability distribution l s as defined as (6), where di denotes the degree of node i. Note that this equation is not iteratively computed. l l ( ) ( ) i i    s s n d l   i s 1 r  l s shown as figure 1(d). As we can see, this improved There is an example for vector l l method can unfold a more clear community, and s can meet (3) a little better than s . x 10-3 (6) l  s ( ) r   ( ) i ( ) i   l s , the probabilities of w ithin community nodes the probabilities of outside community nodes 8 7 6 5 4 3 2 1  n o i t u b i r t s i d y t i l i b a b o r p n o i t i s n a r t e h t 0 e d o n h c a e f o r e b m u n D I e h t 200 400 600 800 1000 0 0.04 0.035 0.03 0.025 0.02 0.015 0.01 0.005  n o i t u b i r t s i d y t i l i b a b o r p n o i t i s n a r t e h t 0 0 200 800 600 400 400 600 the ID number of each node the ID number of each node (a) (b) 1000 200 0 0 800 1000 the probabilities of w ithin community nodes the probabilities of outside community nodes the probabilities of w ithin community nodes the probabilities of outside community nodes 0.025  n o i t u b i r t s i d y t i l i b a b o r p n o i t i s n a r t e h t 0.02 0.015 0.01 0.005 0 0 800 800 200 200 1000 1000 400 600 400 600 the ID number of each node the ID number of each node (c) (d) Figure 1. An illustration for the Markov random walk method combined with our constraint strategy to unfold a community. (a) A benchmark network with power-law distribution of degree and community size by Lancichinetti model [23]. In this network, the number of nodes is 1000, the minimum community size is 20, the mixing parameter  is 0.3, and the number of overlapping nodes is 400. Here we just consider the largest community, which contains 97 nodes. They are all put on the top of the nodes sequence. The selected source node s is the one with maximum degree in this community. (b) The generated l step transition probability vector  according to (2). The best performance appears when l equals 3. (c) The generated l step transition probability vector  according to (5). Its performance is insensitive to the increase of parameter l after it is greater than 20. (d) The generated l step transition probability vector  according to (6). Its performance is insensitive to the increase of parameter l after it is greater than 20. Based on this above idea, a method for unfolding the community, which contains a specific source node s, will be described bellow. This method is called UC (Unfolding Community). l s ; S1. Calculate the l step transition probability vector of node s, which is S2. Rank all the nodes according to their associated probability values in descending order, producing the sorted node list L. After these two steps, almost all the within community nodes will be ranked on the top of the sorted node sequence L. The target community has now clearly emerged and is ready for detection. Now, by properly setting a cutoff point (to be explained in the next section), we can precisely extract the community’s nodes. Proposition 1. The time complexity of the UC is O(ln2), where l is the step number of the random walk agent, and n corresponds to the number of nodes in network N. l s by (5) and (6) will be O(ln2). In Proof. In S1, It’s obvious that the time to compute l s will be O(nlogn), derived from quick sorting algorithms. Thus, the S2, the time to rank time complexity of the UC will be O(ln2). 2.3. Underlying mechanism in Unfolding Community Let an agent freely walk on a network N. For any node i, j and step number l, the probability l that the agent starts from node i and arrives at node j within l steps will be ( ) j according i to (2). This is a discrete Markov process. From the analysis of [24], according to large deviation theory, we know that the Markov chain has n local mixing states, and the i-th local mixing state corresponds to the number of communities i. In particular, if the network N has a well-defined community structure with k clear communities, this Markov chain will stay, in a stable way, in the k-th local mixing state during a period of time with a probability of 1, called a metastable state in this situation. According to this theory [24], all the local mixing times of the Markov chain can be estimated by using the spectrum of its Markov generator (normalized graph Laplacians) M = I−P, where I is the identity matrix and P is (pij)nn according to (1). For an undirected network, M is positive semi-definite and has n non-negative real-valued eigenvalues ext ent iT iT be the entering time and exiting time of the 2  ). Let    n    1 2 and ( 0    o    1 / (1)) state. That is i-th local mixing state. We have . Reasonably, we can also use the exiting ext 1 (1 iT  i time of the (i+1)-th local mixing state to estimate the entering time of the i-th local mixing ext ent  . T T  1 1 i i i  There is an example shown as figure 2. In order to depict this Markov process more clearly, we use a simple network and adopt the transition probability matrix instead of the transition probability vector here. Figure 2(a) shows a Newman network [1] which contains a known community structure with four clear communities. Figure 2(b) shows the spectrum of this network. Figure 2(c) shows the exiting time of each local mixing state. Especially, it also offers the entering time and exiting time of the 4-th local mixing state, which corresponds to a metastable state and evidences the real community structure of the network. Figure 2(d)-(f) depict the process of the Markov chain when it goes through the metastable state and finally ent ext reaches the global mixing state. Figure 2(d) denotes the t1 (  ) step t T T 1 4 5 5 transition probability matrix when it begins to enter the metastable state which corresponds to ext the four clear communities. Figure 2(e) denotes the t2 (  ) step transition T 4 2 4 probability matrix when it begins to exit this metastable state. Figure 2(f) shows the t3 ext ent T T 2 1  ) step transition probability matrix after it enters the global 2 7   2   20 1 / 1 / 1 /       ( 3 t t mixing state and eventually converges to this state, where we now have t  i 3 ( ) j   / d j r d r for each node i and j. As we can see from this example, if a network has a community structure with k clear communities, there will be a short entering time (1/k+1) and a relatively long exiting time (1/k) for the k-th local mixing state, which denotes a metastable state. During this period of time, each community locally mixes together and we can observe the k communities of the network. Furthermore, the Markov chain will quickly converge to the global mixing state after it enters this state (> 1/2). e d o n h c a e f o r e b m u n D I e h t 20 40 60 80 100 120 1 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 1.6 1.4 1.2 1 0.8 0.6 0.4 0.2 0 i  X: 5 Y : 0.6212 X: 4 Y : 0.1535 10 8 6 4 2 X: 4 Y : 6.514 X: 5 Y : 1.61 i  / 1 20 40 60 80 100 120 the ID number of each node i i (a) (b) (c) 140 100 120 20 60 40 40 80 60 20 80 0 0 0 -0.2 0 20 40 60 80 100 120 0.07 0.06 0.05 0.04 0.03 0.02 0.01 e d o n h c a e f o r e b m u n D I e h t 20 40 60 80 100 120 0.025 0.02 0.015 0.01 0.005 e d o n h c a e f o r e b m u n D I e h t 100 120 140 x 10-3 13 12 11 10 9 8 7 6 5 4 e d o n h c a e f o r e b m u n D I e h t 20 40 60 80 100 120 20 20 40 60 20 40 60 80 100 120 80 100 120 40 60 80 100 120 the ID number of each node the ID number of each node the ID number of each node (d) (e) (f) Figure 2. An example to demonstrate the characteristic of the iteration process for the Markov chain according to (2) on a benchmark network by Newman model [1]. (a) A Newman network consists of 128 nodes divided into four groups of 32 nodes. Each node has on average 14 edges connecting it to members of the same group and 2 edges to members of other groups, with the expected degree 16. (b) The spectral distribution (i) of this network. (c) The exiting time (1/i) of the local mixing state for each number of communities. (d) The t1 (t1 = 1/5) step transition probability matrix when the Markov chain begins to enter the metastable state. (e) The t2 (t2 = 1/4) step transition probability matrix when the Markov chain begins to exit the metastable state. (f) The t3 (t2 > 1/2) step transition probability matrix when the global stable state is finally reached. Though the Markov chain of a random walk on the network contains a metastable state that corresponds to its real community structure, it will eventually reach the global mixing state, which denotes a trivial solution. For detecting communities, the followed intuition is that, if we can make the Markov chain remain and converge to this metastable state by deliberately adjusting transition probabilities, a nontrivial solution, which corresponds to the real community structure of the network, will be naturally attained due to this adjustment. Starting from this intuition, here we consider the difference between the Markov random process on a network N with community structure and that on its corresponding annealed network R without communities. It’s obvious that, the link density within a community in network N will be much higher than that in R, while the link density between communities in N will be much lower than that in R. Then, for any node i, j and step number l, if the l step transition probability from node i to node j computed on the community network N is no better (lower) than that computed on the annealed network R, we will have reason to believe that node i will have no chance of being in a same community of node j. Thus, we adjust and rescale the transition probability according to (5), which will make the probability that the constrained walker (agent) starts from node i and arrive at node j, within l steps, be null. It’s obvious that this will make the agent have almost no chance escaping from its own community, and the constrained Markov chain can hardly exit the metastable state that corresponds to the real community structure of the network. There is an example shown as figure 3, which corresponds to the case in figure 2. We find out that this constrained Markov chain can also enter the metastable state corresponding to the real community structure at time t1 = 1/5, which is shown as figure 3(a). However, it will not begin to exit the metastable state at time t2 = 1/4, but has almost converged to this state, which is shown as figure 3(b). At time t2 > 1/2, it has completely converged to the metastable state, which depicts the four clear communities shown as figure 3(c). As we can see from this example, the constrained Markov chain (according to (5)) has similar characteristics to the iteration process with the unconstrained Markov chain (according to (2)). However, the difference is that the unconstrained Markov chain will quickly converge to the global mixing sate after it enters this state (> 1/2), while the constrained Markov chain will quickly converge to the metastable sate that shows its k real communities after it enters this state (> 1/k+1). Therefore, we can make use of the spectrum of a network to approximate the convergence characteristics of the method UC. In fact, if the network has k real communities, the convergence time of the UC should be only a little longer than the entering time of the k-th local mixing state (> 1/k+1). 20 40 60 80 100 120 0.12 0.1 0.08 0.06 0.04 0.02 e d o n h c a e f o r e b m u n D I e h t e d o n h c a e f o r e b m u n D I e h t 20 40 60 80 100 120 0.045 0.04 0.035 0.03 0.025 0.02 0.015 0.01 0.005 0 20 40 60 80 100 120 0.045 0.04 0.035 0.03 0.025 0.02 0.015 0.01 0.005 e d o n h c a e f o r e b m u n D I e h t 20 20 40 60 20 40 60 80 100 120 80 100 120 40 60 80 100 120 the ID number of each node the ID number of each node the ID number of each node (a) (b) (c) Figure 3. An example that demonstrates the characteristics of the iteration process for the constrained Markov chain according to (5) on the network which is shown as figure 2(a). (a) The t1 (t1 = 1/5) step transition probability matrix of the constrained Markov chain, which corresponds to figure 2(d). (b) The t2 (t2 = 1/4) step transition probability matrix of the constrained Markov chain, which corresponds to figure 2(e). (c) The t3 (t2 > 1/2) step transition probability matrix of the constrained Markov chain, which corresponds to figure 2(f). It is noteworthy that the above analysis on the characteristics of the iteration process of our UC method is in a close to ideal situation. It becomes more complex when dealing with networks depicting overlapping communities and some more complex topological properties, such as the sample network in figure 1(a) and for some large real-world networks. However, as we can see from figure 1, our UC method can still clearly unfold each node’s community and it’s also effective in this relatively complicated situation. Later, we will give some detailed analysis on the convergence characteristics of the UC in the experimental section of this article. 2.4. Extracting the emerged community As the community emerged from UC by computing the l step transition probability vector l s , so that the associated probability values of the within community nodes are much greater than those of outside community nodes, the community associated to source node s can be easily distilled by designing a suitable cutoff criterion. At first we considered a simple method that takes the average probability value  of all   n l  s 1 i  whose associated probabilities are greater than  as the detected community. For instance, in figure 4(b), the black line denotes the average probability  as cutoff value. We find out that, although this can make all the within community nodes present in the same community, it will also include several outside nodes into this community. Let the structural similarity [25] of the nodes as a cutoff value, which is defined as  ( ) / i n . Then we extract the nodes two arbitrary sets v and w be v w  / v w . This average cutoff method will show that  the structural similarity between the extracted community and the actual community is 0.8068. It’s obvious that the method is far from ideal to extract the emerged community on the sample network, even though this network already depicts some complexity. In order to improve this result and propose a more effective cutoff method, a well-known conductance function [22], corresponding to the weak definition of community [26], is used here in substitute of the less efficient  boundary. The conductance can be simply thought of as the ratio between the number of edges inside the community and those leaving it. More formally, conductance (S) of a set of nodes S is (S) = cS/min(Vol(S), Vol(V \S)), where cS denotes the size of the edge boundary, cS =  u {(u, v) : uS, vS}, and Vol(S) = u S d , where du is the degree of node u. Thus, in particular, more community-like sets of nodes have lower conductance. Moreover, this community function has some local characteristics, making it suitable to extract the emerged community. Based on the ranked node list L obtained from UC, the emerged community can be easily distilled by computing the cut position that corresponds to the minimum conductance value, and taking it as the cutoff point along this ranked list of nodes. We can now summarize the method to extract the emerged community. This method is called EC (Extract Community). S1. Remove the nodes whose associated probability is 0 from the sorted node list L; S2. Compute the conductance value of the community corresponding to each cut position; S3. Take the community corresponding to the minimum conductance as the extracted one. Here we consider an example illustrating EC operation when extracting the emerged community, which is shown as figure 4 and corresponds to the case in figure 1. In figure 4(a), the blue curve denotes that the conductance value varies with the cut position. The pink triangle indicates the cutoff position corresponding to the minimum conductance value, while the black inverted triangle denotes the cutoff position corresponding to that of the average probability  as cutoff value. In figure 4(b), the pink line denotes the cutoff value corresponding to the cut position that makes the conductance of the community to be minimal. It’s obvious that, EC can very effectively extract the community, which has emerged by UC, and the structural similarity between the extracted community and the real one is now much higher, 0.9379. 1 0.9 0.8 0.7 0.6 s e u l a v e c n a t c u d n o c g n i d n o p s e r r o c e h t the sequence of conductance values the cut pos corresponding to  the cut pos corresponding to min conductance the probabilities of w ithin community nodes the probabilities of outside community nodes average probability  as cutoff value local min conductance as cutoff criterion 0.025 0.02 0.015 0.01 0.005  n o i t u b i r t s i d y t i l i b a b o r p n o i t i s n a r t e h t 0.5 0 250 0 0 800 200 1000 50 200 150 100 400 600 the cutoff position of the sorted nodes the ID number of each node (a) (b) Figure 4. An illustration EC extraction of the emerged community, which comes from figure 1. (a) The conductance value for the extracted community as a function of the cutoff position of the sorted node sequence L. These nodes are ranked according to their probabilities in descending order. There are only 234 of 1000 nodes whose associated probabilities are greater than 0, thus the x-axis is just in the range of 1~234. (b) Extracting the emerged community by l s via two types of cutoff criterions. cutting the l step transition probability vector Proposition 2. The time complexity of the EC is smaller than O(dn2), where d denotes the average degree of all the nodes. Proof. It’s obvious that S2 is the most computationally costly step in EC. We employ an incremental method to calculate the conductance value for each cut pos in the node list L. When the cut pos equals to 1, there is S1 = {L(1)} where L(1) denotes the first node in the 1 = dL(1), Vol(S1) = dL(1), and Vol(V \S1) = m Vol(S1) where m is the sorted node list L, cS number of edges in the network. When the cut pos equals to k, there should be Sk = Sk-1  {L(k)}, cS k-1 + dL(k)  2*Sk  NL(k) where NL(k) denotes the neighbor set of node k = cS L(k), Vol(Sk) = Vol(Sk-1) + dL(k), and Vol(V \Sk) = m  Vol(Sk). It’s obvious that, for each cut pos k, Sk  NL(k) is the most costly step, whose time complexity is Sk*NL(k) = k*dL(k). Due to k being placed in the range of 1  k  kmax where kmax << n, the time complexity of EC should k 1 max , which is much smaller than O(dn2). be * k d ( ) L k k  Proposition 3. The time complexity of UEOC is O(lKn2), where K denotes the number of communities. Proof. From proposition 1 and proposition 2, it’s obvious that the time to unfold and extract a community is O((l+d)n2). As there are K communities in the cover, the time complexity of UEOC is O((l+d)Kn2). Since the average degree d can be regarded as a constant as most complex networks are sparse graphs, it results that the time complexity of UEOC can also be given by O(lKn2). There is a simple example to illustrate our UEOC method, which is shown as figure 5. As we can see, the UC subroutine induces two clear overlapping communities by calculating the transition probabilities. Meanwhile, the EC subroutine easily extracts these two communities by using our cut strategy. Furthermore, on this simple network this algorithm will attain convergence within five iterations. (a) (b) Figure 5. A simple example showing UEOC operation for the detection of overlapping communities. (a) A simple network with two overlapping communities. Node 3 is the overlapping node. (b) The result attained by the UEOC. The UC subroutine unfolds each source node’s community by calculating the transition probabilities. The EC subroutine extracts each emerged community by using our cut strategy. 3. Experiments and evaluation In order to evaluate the performance of algorithm UEOC, we tested it in benchmark computer-generated networks as well as on some widely used real-word networks. Two well-known algorithms CPM [3] and LFM [11] were selected to compare with UEOC. We conclude by analyzing the step number parameter l, which is defined in this algorithm. There is only one parameter l in UEOC. Here, we set l = 20 based on the experimental analysis in Sec. 3.3. Thus, the time complexity of UEOC can now be given by O(Kn2). For CPM, we set k = 4, which will return the best overall results [3]. For LFM, we set  = 1, which is a natural choice, as it is the ratio of the internal degree to the total degree of the community [11]. All experiments are done on a single Dell Server (Intel(R) Xeon(R) CPU 5130 @ 2.00GHz 2.00GHz processor with 4Gbytes of main memory), and the source code of the algorithms used here can be obtained from the authors. 3.1. Computer-generated networks Here, we adopt two kinds of randomly generated synthetic networks (following both Newman model [1] and the Lancichinetti model [23]) with a known community structure, in order to evaluate the performance of the different algorithms. There are various standard measures [27] that can be used to compare the known community structure of the benchmark and the one delivered by the algorithm. Unfortunately, most of these are not suitable for overlapping communities. The exception is a new variant of the Mutual Information measure, which has been widely used in the scientific area and was extended to handle overlapping communities [11]. We adopt this Normalized Mutual Information (NMI) as the accuracy measure in the following experiments. 3.1.1. Benchmarks by Newman model. The first type of synthetic networks employed here is that proposed by Newman at al. [1]. For these benchmarks, each graph consists of n = 128 vertices divided into four groups of 32 nodes. Each vertex has on average zin edges connecting it to members of the same group and zout edges to members of other groups, with zin and zout chosen so that the total expected degree zin+zout = 16. As zout is increased, starting from small initial values, the resulting graphs become more challenging to the community detection algorithms. Especially, when zout is greater than 8, meaning that the number of within-community edges is less than that of between-community edges for per vertex, the network doesn’t have a community structure [1]. In figure 6(a), we show the NMI accuracy attained by each algorithm as a function of zout. As we can see, our algorithm UEOC outperforms CPM and LFM in terms of NMI accuracy on these benchmarks. Computational speed is another very important criterion to evaluate the performance of an algorithm. Time complexity analysis for UEOC has been covered under proposition 3 in Sec. 2.4 and refined by the second paragraph in Sec. 3. Nevertheless, here we show the actual running time of UEOC from an experimental angle, in order to further evaluate its efficiency. Here we also address synthetic networks based on the Newman model [1]. In this case, each graph consists of n = 40a vertices divided into forty groups of a nodes. Each vertex has on average zin = 10 edges connecting it to members of the same group and zout = 6 edges to members of other groups. The only difference between the networks used here and the former ones is that, now zout is fixed while the community size a is changeable. Figure 6(b)-(d) shows the actual running time of the UEOC and LFM. As we can see, when the community number K is a constant, the square root of the running time by UEOC is nearly proportional to the number of nodes in the network, which is shown as figure 6(c). In the meantime, its efficiency is the same as that of the function y=ax2+b, which is shown as figure 6(d). Thus, the experiment concurs with the analysis on the time complexity for UEOC, which is O(Kn2) when parameter l is set at 20. As far as we know, the worst-case computational complexity of LFM is O(n2logn) [11], even though the efficiency of LFM seems to be better than UEOC on our test graphs, which is shown as figure 6(d). Meanwhile, the time complexity of CPM is non-polynomial even though it proves to be very efficient when applied to the real networks [3]. Thus, the efficiency (time complexity) of UEOC should be competitive with the efficiency of LFM, and higher than that of CPM. UEOC 60 50 40 30 20 10 ) d n o c e s ( e m i t g n i n n u r l a u t c a e h t CPM LFM UEOC 0 8 6 4 2 1000 2000 3000 4000 5000 6000 7000 8000 9000 number of inter-community edges per vertex z out the number of nodes in the network (a) (b) 0 0 n o i t a m r o f n i l a u t u m d e z i l a m r o n 1 0.8 0.6 0.4 0.2 0 8 7 6 5 4 3 2 1 e m i t g n i n n u r e h t f o t o o r e r a u q s 0 0 LFM UEOC y=ax2+b UEOC 102 101 100 10-1 ) 2 n ( O d n a C O E U , M F L e h t f o n o s i r a p m o c 103 1000 2000 3000 4000 5000 6000 7000 8000 9000 the number of nodes in the network the number of nodes in the network (c) (d) Figure 6. Testing the performance of UEOC on artificial networks under the Newman model. Error bars show the standard deviations estimated from 50 graphs. (a) Comparison of UEOC with CPM and LFM in terms of NMI accuracy. (b) Actual running time of UEOC as a function of the network scale. (c) Square root of the running time of UECO as a function of the network scale. (d) Efficiency of LFM, UECO and O(n2) under the log-log plots. 104 3.1.2. Benchmarks by Lancichinetti model. There are some basic statistical properties found in real networks, such as heterogeneous distributions of degree and community size, that are not found in benchmark networks based on Newman model. Accordingly, a new type of benchmark proposed by Lancichinetti et al. [23] is here adopted to further evaluate the accuracy of these algorithms. This class of benchmark networks not only has the property of heterogeneous distributions of degree and community size, but also can exhibit overlapping community structure. Like the experiment designed by Lancichinetti et al. [23] to test CPM’s ability to detect overlapping communities, the parameters setting for the Lancichinetti benchmarks are as follows. The network size n is 1000, the minimum community size cmin is set to either 10 or 20, the mixing parameter  (each vertex shares a fraction  of its edges with vertices in other communities) is set to either 0.1 or 0.3, the fraction of overlapping vertices (on/n) varies from 0 to 0.5 with interval 0.05. We keep the remaining parameters fixed: the average degree d is 20, the maximum degree dmax is 2.5*d, the maximum community size cmax is 5*cmin, the 1 0.9 0.8 0.7 0.6 0.5 0.4 n o i t a m r o f n i l a u t u m d e z i l a m r o n CPM LFM UEOC CPM LFM UEOC 1 0.9 0.8 0.7 0.6 0.5 0.4 n o i t a m r o f n i l a u t u m d e z i l a m r o n 0.3 0 1 0.9 0.8 0.7 0.6 0.5 0.4 n o i t a m r o f n i l a u t u m d e z i l a m r o n 0.3 number of communities, each overlapping vertex belongs to (denoted om), is 2, and the exponents of the power-law distribution of vertex degrees 1 and community sizes 2 are -2 and -1, respectively. This design space leads to four sets of benchmarks. Figure 7 shows the results that compare UEOC with CPM and LFM in terms of NMI accuracy on the heterogeneous artificial networks with overlapping communities. As we can see, UEOC is most effective for networks with relatively big communities while CPM gives its best results for networks with small communities, and LFM has medium performance along both cases. Moreover, the quality of UEOC is relatively stationary with the increase of mixing parameter , while that of the other two algorithms quickly declines in this situation. Thus, it’s clear that our algorithm UEOC is competitive with, or better, than the other two algorithms on the Lancichinetti benchmarks. n=1000 u=0.1 cmin=10 cmax=50 n=1000 u=0.3 cmin=10 cmax=50 0.5 0.4 0.3 0.2 0.1 0.4 0.3 0.2 0.1 fraction of overlapping nodes fraction of overlapping nodes (a) (b) n=1000 u=0.3 cmin=20 cmax=100 n=1000 u=0.1 cmin=20 cmax=100 0 0.3 0.5 1 0.9 0.8 0.7 0.6 0.5 0.4 n o i t a m r o f n i l a u t u m d e z i l a m r o n CPM LFM UEOC CPM LFM UEOC 0.3 0 0 0.5 0.5 0.1 0.4 0.3 0.2 0.1 0.4 0.3 0.2 fraction of overlapping nodes fraction of overlapping nodes (c) (d) Figure 7. NMI accuracy of each algorithm as a function of the fraction of overlapping nodes. Error bars show the standard deviations estimated from 50 graphs. (a) Comparison on synthetic networks with small mixing parameter and small communities ( = 0.1, cmin = 10, cmax = 50). (b) Comparison on synthetic networks with big mixing parameter and small communities ( = 0.3, cmin = 10, cmax = 50). (c) Comparison on synthetic networks with small mixing parameter and big communities ( = 0.1, cmin = 20, cmax = 100). (d) Comparison on synthetic networks with big mixing parameter and big communities ( = 0.3, cmin = 20, cmax = 100). 3.2. Real-world networks As real networks may have some different topological properties from the synthetic ones, we now consider several widely used real-world networks to further evaluate the performance of these algorithms. These networks are listed in table 1. As the inherent community structure for real networks is usually unknown, we make use of two widely used quality measures for overlapping communities in order to evaluate the performance of the algorithms. The first one is the average conductance (AC), used by Leskovec et al. [22], which maps the average value of conductance for all the communities in a cover. The AC is defined as (7), where K denotes the number of communities, Ci denotes the i-th community, and (S) denotes the conductance of a community S. The calculation of (S) has been already given in Sec. 2.4. AC K 1    (7) ) ( C i K 1 i  The second one is a variant of the commonly used modularity (Q) metric [28], which is defined for overlapping communities by Shen et al. [5]. This extended modularity (EQ) is defined bellow (8), where m denotes the number of total edges, Ci denotes the i-th community, Ov denotes the number of communities which node v belongs to, dv denotes the degree of node v. EQ  1 2 m   , i v w C  (8) 1 O O v w    A vw  d d v w 2 m    i It is noteworthy that, the quality of a cover is better when its AC-value is lower, whereas it is better when its EQ-value is higher. Table 2 shows the results that compares UEOC with CPM and LFM in terms of both AC and EQ measures on the real-world networks described in table 1. As we can see, the AC quality of UEOC is markedly better than that of CPM and LFM, while the EQ quality of UEOC is also competitive with that of these two algorithms. To sum up, our algorithm is also very effective on real-word networks. Table 1. Real-world networks used here. Descriptions V Networks E 1/2 78 7.5602 Zachary’s karate club [29] 34 karate Dolphin social network [30] 25.4027 160 62 dolphin Books about US politics [31] 26.4520 441 105 polbooks 613 7.3097 American College football [1] 115 football Emails of human interactions [32] 8.2563 5,451 1,133 email word 31,784 6.8955 Word semantic network [3] 7,207 Table 2. The average result of 50 runs by UEOC, CPM and LFM on real networks. EQ-values (the greater the better) AC-values (the smaller the better) UEOC LFM CPM UEOC LFM CPM 0.4750 0.3201 0.6028 0.5206 0.1147 0.2648 0.3846 0.3887 0.3470 0.2908 0.4494 0.3846 0.5996 0.2823 0.5158 0.5593 0.3895 0.3696 0.2528 0.4744 0.4093 0.2749 0.4308 0.4155 0.3506 0.4627 0.7018 0.6937 0.2282 0.2641 0.4553 0.1648 0.8089 0.7286 0.1624 0.1389 Karate Dolphin football polbooks email word 3.3. Parameters analysis Sec. 2.3 shows that, if a network contains k real communities, the convergence time of the UC should be a little longer than of the entering time in the k-th local mixing state (metastable state), which is 1/k+1. However, the actual community structure of most real-world networks is unknown. Thus, we adopt the entering time of the global mixing state (1/2), which is greater than the entering time of the metastable state (1/k+1), to coarsely evaluate the convergence time of the UC. As we can see from table 1, the 1/2 of all these real networks used in this paper is very small, meanwhile, they are found to be independent of the network scale. Thus, it shows that the UC will converge fast in the general case. Moreover, in order to further study the convergence characteristics of the UC, we also proceed to supply some quantitative analysis on the iteration number l from an experimental angle. l s will be updated and, thus, In the UC, after each step, the transition probability vector the ranking of all nodes will be changed according to the probability values incoming from l source node s. As long as s is stationary, or say, all members of the source community are put on the top of the sorted nodes sequence, it will be good enough for our purpose of unfolding a community. Thus, the convergence of UC can be evaluated by considering the convergence of the transition probability vector, or that of the sorted node sequence. Figure 8 shows the convergence process of the UC with the increase of step number l. In figure 8(a), the x-axis refers to the l-value, and the y-axis refers to the difference between the two consecutive transition probability vectors, which is defined as the Euclidean distance between them. In figure 8(b), the x-axis still refers to the l-value, while the y-axis refers to the difference between the two consecutive sorted nodes lists L1 and L2, defined as nnz(L1L2), which counts the number of non-zeros of a given vector. We have tested different l values, in the range 1  l  20, for all real networks mentioned in the paper. It’s clear that the transition probability vector and the sorted node list can both converge well within 20 steps on each of the networks. Through these experiments, we also have found that UC in fact converges very quickly, thus its performance is insensitive to the choice of the parameter l when it is greater than 20. karate network (34 nodes) dolphin network (62 nodes) polbooks network (105 nodes) football network (115 nodes) email network (1133 nodes) word network (7207 nodes) 0.16 0.14 0.12 0.1 0.08 0.06 0.04 0.02 s r o t c e v y t i l i b a b o r p t n e c a j d a n e e w t e b e c n e r e f f i d karate network (34 nodes) dolphin network (62 nodes) polbooks network (105 nodes) football network (115 nodes) email network (1133 nodes) word network (7207 nodes) 8000 7000 6000 5000 4000 3000 2000 1000 s e c n e u q e s s e d o n t n e c a j d a n e e w t e b e c n e r e f f i d 0 0 5 0 0 5 15 20 10 10 L-steps L-steps (a) (b) Figure 8. Convergence analysis of UC with the increase of parameter l. For each network, the node with maximum degree is selected as source node s here. (a) Convergence process of the transition probability vector with the increase of step number l. (b) Convergence process of the sorted node sequence with the increase of step number l. 20 15 4. Discussion and conclusion In this work, we have developed a new algorithm, called UEOC, for the identification of overlapping communities in complex networks. The key idea behind it rests on a Markov random walk method combined with a constraint strategy, based on which the UC phase can clearly unfold each natural community that overlaps. Thereafter, the community emerged by UC will be extracted from the entire network by the EC subroutine, which is an effective cutoff method based on a conductance function. Furthermore, the UEOC depends on only one parameter whose value can be easily set and requires no prior knowledge on the community structure, namely the number of communities. We have tested this algorithm by using different types of networks. On Newman benchmarks, the accuracy of UEOC is higher than that of CPM and LFM. On Lancichinetti benchmarks, UEOC is most effective for networks with relatively big communities, and its clustering accuracy is relatively stationary with the increase of the mixing parameter. On real networks, the performance of our algorithm is in overall also better than that of the other two algorithms. It is noteworthy that, there is also a similar approach so called Markov Cluster Algorithm (MCL) [14], which has been widely applied for discovering communities in graphs [33, 34]. The MCL and our method UEOC have in common that they both are based on the dynamic of Markov random walk, and detect the communities present in networks by changing and adjusting the Markov chain. However, they also have some important difference. The MCL simulates many random walks (or flows) on the network. By raising the transition probabilities to a certain power greater than one, it strengthens flow where it is already strong, and weakens flow where it is weak. By repeating the process an underlying community structure will gradually become visible. The process ends up with a number of regions with strong internal flow (communities), separated by ‘dry’ boundaries with hardly any flow. Different from the MCL, our method UEOC makes use of the distinction between the Markov random process on a network with community structure and that on its corresponding annealed network without communities. By preventing the walker (or flow) from escaping its own community, it makes the constrained Markov chain converge to a metastable state instead of the global mixing state, which then unfolds the real community structure of the network. Furthermore, the UEOC is a local community finding method that is able to detect the community of each node. Moreover, it can be also effectively used to discover overlapping communities from networks that hold them. Other research, covering local methods for community detection, also harbors some potential for the detection of overlapping communities in complex networks. In 2002, Flake et al. [35] proposed an approach called Maximum Flow Communities (MFC). This method is based on the Max Flow-Min Cut theorem [36], stating that the maximum flow is identical to the minimum cut. Therefore, if you know the maximum flow between two points, you also know what edges you would have to remove to completely disconnect the same two points. The MFC has been successfully applied to the Web community mining area. However, this method is sensitive to the choice of its initial seed vertices, and its computational complexity, O(mnlog(n2/m)), is significant. In 2004, Costa [37] presents a hub-based approach to community finding in complex networks. After identifying the network nodes with highest degree (the so-called hubs), the network is flooded with wavefronts of labels emanating from the hubs, accounting for the identification of the involved communities. This method is simple, efficient and proved to be effective for some social networks organized around hubs. However, it has the following drawback: the number of communities detected is arbitrarily preassigned and the algorithm neglects the possibility of having two hubs within the same community. In 2005, Bagrow et al. [38] proposed another efficient hub-based method for detecting local communities. This algorithm works by expanding an l shell outward from some starting vertex j and comparing the change in total emerging degree to some threshold . When this change is lower than a given value , the l shell ceases to grow and all vertices covered by shells of a depth  l are listed as members of vertex j’s community. This method is also suitable for the graphs organized around hubs, such as most social networks. However, it sensitive to the choice of its starting vertex j and the setting of the threshold value . A potential compensating solution could be that, one would run the algorithm multiple times by using different starting vertices, and then achieve a group consensus as to which vertices belong to which communities. Different from these previous works, our algorithm UEOC is based on the Markov random walk on networks. It simulates the constrained probability flow starting from an arbitrary source node, and makes the local community of this node gradually appear during the iteration process. It is noteworthy that, our method is insensitive to the choice of its only one parameter (step number l), and it can effectively discover each node’s local community for the more general networks. Concluding, our future work can be laid as follows. In most real-word networks, there are often some marginal nodes, which will cause no energy change even they belong to several different communities. Generally speaking, if one does not comprehend the real meanings of the network structure, it will be very difficult for an algorithm to distinguish whether a specific marginal node is an overlapping node which plays an important role in the network and belongs to multi-communities, or an outlier which is just a isolated role in the network and belongs to none of these communities. However, it’s very important for an algorithm to be able to identify both overlapping nodes and outliers in the real world. As far as we know, most of the current approaches including our method UEOC can only discover overlapping nodes, but cannot distinguish outliers. Thus, it will be promising to design a type of algorithm that can not only detect overlapping nodes, but also outliers. Therefore, we will take this direction in our future work so as to further improve the presented UEOC method. Moreover, as we argued, the efficiency of UEOC is competitive with the efficiency of LFM and higher than that of CPM. Nevertheless, in order to deal with some large-scale networks such as WWW, Internet etc., it’s still important to improve it by exploring some potential optimization angles. Thus, we also intend to further use UEOC in some applied research areas, such as biological networks analysis, Web community mining, etc., and try to uncover and interpret the significant overlapping community structure that one can expect to be found. Acknowledgments This work was supported by National Natural Science Foundation of China under Grant Nos. 60873149, 60973088, the National High-Tech Research and Development Plan of China under Grant No. 2006AA10Z245, the Open Project Program of the National Laboratory of Pattern Recognition, and the Erasmus Mundus Project of European Commission. References [1] Girvan M and Newman M E J, Community structure in social and biological networks, 2002 Proc. Natl. Acad. Sci. 9(12) 7821-7826 [2] Fortunato S, Community detection in graphs, 2010 Phys. Rep. 486(3-5) 75-174 [3] Palla G, Derenyi I, Farkas I and Vicsek T, Uncovering the overlapping community structures of complex networks in nature and society, 2005 Nature 435(7043) 814-818 [4] Gavin A C, Bosche M and Krause R, Functional organization of the yeast proteome by systematic analysis of protein complexes, 2002 Nature 415 141-147 [5] Shen H, Cheng X, Cai K and Hu M, Detect overlapping and hierarchical community structure in networks, 2009 Physica A, 388(8) 1706-1712 [6] Evans T S, Clique graphs and overlapping communities, 2010 J. Stat. Mech. P12037 [7] Pereira J B, Enright A J and Ouzounis C A, Detection of functional modules from protein interaction networks, 2004 Proteins 54(1) 49–57 [8] Evans T S and Lambiotte R, Line graphs, link partitions and overlapping communities, 2009 Phys. Rev. E 80 016105 [9] Evans T S and Lambiotte R, Line graphs of weighted networks for overlapping communities, 2010 Eur. Phys. J. B 77(2) 265-272 [10] Ahn Y Y, Bagrow J P and Lehmann S, Link communities reveal multiscale complexity in networks, 2010 nature 466 761-764 [11] Lancichinetti A, Fortunato S and Kertesz J, Detecting the overlapping and hierarchical community structure in complex networks, 2009 New J. Phys. 11 033015 [12] Lee C, Reid F, McDaid A and Hurley N, Detecting highly overlapping community structure by greedy clique expansion, 2010 SNA-KDD’10: Proc. 4th International Workshop on Social Network Mining and Analysis (Washington DC, USA: ACM) pp33-42 [13] Havemann F, Heinz M, Struck A and Gläser J, Identification of overlapping communities and their hierarchy by locally calculating community-changing resolution levels, 2011 J. Stat. Mech. P01023 [14] Stijn van Dongen, 2000 Graph clustering by flow simulation, Ph.D. thesis, University of Utrecht, Utrecht, Netherlands [15] Yang B, Cheung W K and Liu J, Community mining from signed social networks, 2007 IEEE Transactions on Knowledge and Data Engineering 19 1333-1348 [16] Rosvall M and Bergstrom C T, Maps of random walks on complex networks reveal community structure, 2008 Proc. Natl. Acad. Sci. 105 1118-1123 [17] E W, Li T and Vanden-Eijnden E, Optimal partition and effective dynamics of complex networks 2008 Proc. Natl. Acad. Sci. 105 7907 [18] Steinhaeuser K and Chawla N V, Identifying and evaluating community structure in complex networks, 2010 Pattern Recognition Letters 31(5) 413-421 [19] Esquivel A V and Rosvall M, Compression of flow can reveal overlapping modular organization in networks, arXiv:1105.0812v1 [20] Kim Y and Jeong H, The map equation for link community, arXiv:1105.0257v1 [21] Newman M E J, Strogatz S H and Watts D J, Random graphs with arbitrary degree distributions and their applications, 2001 Phys. Rev. E 64 026118 [22] Leskovec J, Lang K J and Mahoney M W, Empirical comparison of algorithms for network community detection, 2010 WWW’10: Proc. 19th International World Wide Web Conference (Raleigh, North Carolina USA: ACM) pp631-640 [23] Lancichinetti A and Fortunato S, Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities, 2009 Phys. Rev. E 80 016118 [24] Yang B, Liu J and Feng J, On the spectral characterization and scalable mining of network communities, 2011 IEEE Transactions on Knowledge and Data Engineering, 17 Nov. 2010. IEEE computer Society Digital Library. IEEE Computer Society, <http://doi.ieeecomputersociety.org/10.1109/TKDE.2010.233> [25] Xu X, Yuruk N, Feng Z and Schweiger T A J, SCAN: a structural clustering algorithm for networks, 2007 KDD’07: Proc. 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (New York, NY, USA: ACM) pp824-833 [26] Radicchi F, Castellano C, Cecconi F, Loreto V and Parisi D, Defining and identifying communities in networks. 2004 Proc. Natl. Acad. Sci. 101(9) 2658- 2663 [27] Danon L, Duch J, Diaz-Guilera A and Arenas A, Comparing community structure identification, 2005 J. Stat. Mech. P09008 [28] Newman M E J and Girvan M, Finding and evaluating community structure in networks, 2004 Phys. Rev. E 69 026113 [29] Zachary W W, An information flow model for conflict and fission in small groups, 1977 Journal of Anthropological. Research 33 452-473 [30] Lusseau D, The emergent properties of a dolphin social network, 2003 Proc. Biol. Sci. 270(Suppl2) S186-8 [31] Newman M E J, Modularity and community structure in networks, 2006 Proc. Natl. Acad. Sci. 103(23) 8577-8582 [32] Guimerà R, Danon L, Diaz-Guilera A, Giralt F and Arenas A, Self-similar community structure in a network of human interactions, 2003 Phys. Rev. E 68 065103 [33] Capocci A, Rao F and Caldarelli G, Taxonomy and clustering in collaborative systems: The case of the on-line encyclopedia Wikipedia, 2008 EPL 81 28006 [34] Vlasblom J and Wodak S J, Markov clustering versus affinity propagation for the partitioning of protein interaction graphs, 2009 BMC Bioinformatics 10 99-112 [35] Flake G W, Lawrence S, Giles C L and Coetzee F M, Self-organization and identification of web communities, 2002 IEEE Computer 35(3) 66-70. [36] Ford L R and Fulkerson D R, Maximal flow through a network, 1956 Canadian J. Math 8(3) 399-404 [37] Costa L F, Hub-based community finding, 2004 Arxiv: cond-mat/0405022. [38] Bagrow J P and Bollt E M, Local method for detecting communities, 2005 Phys. Rev. E 72 046108
1012.4621
1
1012
2010-12-21T11:49:15
Self-organized Emergence of Navigability on Small-World Networks
[ "cs.SI", "physics.soc-ph" ]
This paper mainly investigates why small-world networks are navigable and how to navigate small-world networks. We find that the navigability can naturally emerge from self-organization in the absence of prior knowledge about underlying reference frames of networks. Through a process of information exchange and accumulation on networks, a hidden metric space for navigation on networks is constructed. Navigation based on distances between vertices in the hidden metric space can efficiently deliver messages on small-world networks, in which long range connections play an important role. Numerical simulations further suggest that high cluster coefficient and low diameter are both necessary for navigability. These interesting results provide profound insights into scalable routing on the Internet due to its distributed and localized requirements.
cs.SI
cs
Self-organized Emergence of Navigability on Small-World Networks Zhao Zhuo1, Shi-Min Cai1,∗ Zhong-Qian Fu1,† and Wen-Xu Wang2 1Department of Electronic Science and Technology, University of Science and Technology of China, Hefei Anhui, 230026, PR China 2Department of Systems Science, School of Management, Center for Complexity Research, Beijing Normal University, Beijing 100875, China (Dated: November 10, 2018) This paper mainly investigates why small-world networks are navigable and how to navigate small-world networks. We find that the navigability can naturally emerge from self-organization in the absence of prior knowledge about underlying reference frames of networks. Through a process of information exchange and accumulation on networks, a hidden metric space for navigation on networks is constructed. Navigation based on distances between vertices in the hidden metric space can efficiently deliver messages on small-world networks, in which long range connections play an important role. Numerical simulations further suggest that high cluster coefficient and low diameter are both necessary for navigability. These interesting results provide profound insights into scalable routing on the Internet due to its distributed and localized requirements. PACS numbers: 89.75.Fb, 89.20.Ff, 05.40.-a, 89.75.Da I. INTRODUCTION Small-world (SW) networks are ubiquitous in nature and society. Travers and Milgram discovered small-world phenomenon through delivering letters among people in late 1960s [1]. In the experiment, each participant could only deliver letters to a single acquaintance who was more possible to deliver letters to target persons based on their own judgement. Relying on this greedy routing strat- egy, or so-called navigation, at last 29 percent of letters reached target persons and the average length of acquain- tance chains of letters that were successfully sent was 6. Recent experiments have proved that the greedy rout- ing strategy could efficiently pass messages on email net- works and online social service networks [2 -- 4]. These striking results suggest that people are connected with much shorter chains than our imagination and they can find the short paths based solely on local information, re- gardless of the network size and the topological distances among people. Navigability of SW networks has gained tremendous interests of scientists. A variety of models have been proposed to explain the underlying mechanisms that en- sure finding shortest paths based exclusively on local in- formation [5 -- 7]. In these models, networks were gener- ated based on underlying reference frames, e.g. grids, hierarchy, and hyperbolic spaces, which determined how networks were organized. Vertices were contained in the underlying reference frames which provided definitions of distances between vertices, and adjacent vertices were more likely to be connected. Navigation was modeled by greedy routing: messages were sent to one neighbor near- est to the target in underlying reference frames, which ∗Electronic address: [email protected] †Electronic address: [email protected] was efficient for passing messages if vertices were aware of positions of its neighbors and targets. Indeed, the afore- mentioned works suggest that networks act as an overlay on underlying reference frames during navigation. There- fore, navigability of networks are based on the fact that the underlying reference frames are navigable. In these models, efficient navigation needs prior knowledge about organization of networks. However, several real large-size networks, e.g. email networks and online social service networks, are self-organized, so that it's hard for indi- viduals to be aware of underlying reference frames and discover their exact positions. Here, we aim to address the navigability of SW net- works through a different way: establishing a general scheme for efficient navigation, regardless of the under- lying reference frames of networks. This kind of prob- lems have been considered before. One method is to re- construct underlying reference frames, e.g. embedding networks generated by Kleinberg's model into Euclidean plane and reconstructing the dimension of the underlying lattice when network generated by long-range percolation [8, 9]. The other method is to embed a network into a metric space and ensure that distances between vertices are proportional to shortest path length through a proper embedding algorithm, regardless of underlying reference frames [10 -- 12]. We construct a scheme for navigation following the idea of metric space. The embedding algorithm is in- spired by the fact that navigation on social networks is based on information exchanged and accumulated by communication, which is used to determine who among the acquaintances are 'socially closest' to target persons. Therefore we embed networks into a metric space through a process of information exchange and accumulation, in which vertices find their positions by distributed and lo- calized self-organization. It is demonstrated by numerical simulations that the self-organized algorithm can estab- lish a scheme for efficient navigation, irrespective of the underlying reference frames of networks, and we find that the navigability of networks is influenced by SW proper- ties which are characterized by low diameter and high cluster coefficient. where di is the degree of vertex i. Equations (4) and (5) can be rewritten in matrix form as the combinations of eigenvectors of normal matrix N of network 2 P0 = X0 = VA, II. ALGORITHM TO ESTABLISH NAVIGATION SCHEME Xt = NXt−1 = NtX0 = VDtA, (6) (7) (8) The key for addressing the navigability lies in the self- organized embedding algorithm in the absence of prior knowledge about underlying reference frames. In our al- gorithm, an m-dimension Euclidean space is chosen as the metric space to define distances between vertices. Then we follow the self-organized process of information exchange and accumulation on social networks, which is described as follows xi,t = f (xj,t−1), j ∈ Ni, pi,t = pj,t−1 + xi,t, (1) (2) where Ni is the set of immediate neighbors of vertex i. Vectors x and p consist of m elements corresponding to the m dimensions of metric space. The vector x is cou- pled through the network topology and simultaneously updated according to Eq. (1), while position vector p is the cumulative summation of historical vector x. Since information exchange in Eq. (1) is restricted between vertices and their direct neighbors, the algorithm is dis- tributed and localized. Meanwhile, distances between vertices will be constant if vector x can converge after sufficient evolving steps. Moreover, vertices can be seen as flocking in a metric space, and vectors x and p rep- resent velocity and position, like in Vicseck model [13]. Velocities of tightly connected vertices synchronize more quickly. Therefore, vertices connected by shorter paths will gather in the metric space, which ensures that the distances between vertices in the metric space are asso- ciated with path lengths on networks. Messages can be delivered along short paths by navigation based on dis- tances in the metric space. Many dynamics can be applied as a realization of Eq. (1), such as chaotic oscillators coupled by networks which can synchronize depending on suitable coupling strengths. For the purpose of its simplicity, we choose the updating rule of vector x as follows: at every time step, values of xi is the average of its neighbors and the initial pi,0 equals to xi,0. Then the algorithm can be written as p0 = x0, xi,t = 1 di Xj xj,t−1, j ∈ Ni, pi,t = pi,t−1 + xi,t, (3) (4) (5) Pt = Pt−1 + Xt = V(I + Di)A. t Xi=1 Every row of matrices X and P is the vector of velocities and positions of each vertex. Columns of matrix V are the eigenvectors of N. A consists of linear combination coefficients when eigenvectors of N are chosen as basis vectors. Matrix D is a diagonal matrix with eigenvalues of normal matrix on the main diagonal. Because eigen- values of N are in the interval [−1, 1], for long enough evolving time t, we get the final position matrix P as P = VEA. (9) Matrix E is a diagonal matrix whose ith diagonal ele- ment is 1/(1 − λi), where λi is the eigenvalue of normal matrix. It can be seen that eigenvectors corresponding to large eigenvalues play more important roles in the po- sition matrix as a result of the factor 1/(1 − λi). Since the positions of vertices in the metric space are linear combinations of eigenvectors of normal matrix, it demonstrates that the embedding can represent network topology, which is reflected by the fact that adjacent ver- tices in the metric space are connected by shorter paths on network. The distance between vertex i and j after sufficient evolving time is (vi,k − vj,k)#2 ((vi,k − vj,k))2+ m d2 i,j = 1 − λk m n ak,l Xl=1" n Xk=1 1 − λk(cid:21)2 Xk=1(cid:20) ak,l Xl=1 Xq=p+1 Xp=1 Xl=1 m n n = 2 ap,laq,l (1 − λp)(1 − λq) (vi,p − vj,p)(vi,q − vj,q), (10) where ai,j and vi,j are the elements of matrix A and V, respectively. If elements of X0 are uniformly dis- tributed in interval [−1, 1], the elements of matrix A have the following properties: hai,ji = 0, hai,jak,li = 0 and ha2 i,ji = hx2i. In addition, if m is sufficiently large, the distance can be expressed by d2 i,j = n Xk=1 mhx2i (1 − λk)2 (vi,k − vj,k)2. (11) Equation (11) shows that the distances between vertices can be seen as those in the situation that position values of vertices are elements of weighted eigenvectors of nor- mal matrix. Due to the factor (1 − λk)−2, distances are mostly determined by eigenvectors associated with large eigenvalues. It has been proved that these eigenvectors are the solutions of following constrained optimization problem [14]. Let the energy of system z(x) be defined as z(x) = 1 2 x′Lx, (12) where L is the Laplace matrix of network and x are posi- tion values assigned to the vertices together with a con- straint x′Kx = 1, (13) where matrix K is a diagonal matrix whose ith main di- agonal element is the degree of vertex i. Let λ1 < λ2 < . . . < λn−1 < λn = 1 be the eigenvalues, and the corre- sponding eigenvectors under constraint of Eq. (13) are v1, v2, . . . , vn−1 and vn. The minimum nontrivial value of z is 1 − λn−1, and the relevant position vector x is vn−1. If the energy reaches the minimum nontrivial value, ver- tices which are connected by a number of short paths are sufficiently close in the metric space constructed by eigenvectors, which ensures that distances in the metric space correspond to path lengths on networks. Due to the fact that similar vertices are more likely to be connected, it's natural to evaluate similarities based on the number of paths between vertices and the length of paths in the absence of prior knowledge of underlying reference frames [15]. Through this evaluation, vertices connected by more and shorter paths, which will be adja- cent in the metric space after self-organized embedding, are deemed to be more similar. Therefore, the results of embedding algorithm are in consistent with the basic ideas of underlying reference frames: similar vertices are adjacent, and more likely to be connected. III. EXPERIMENTAL RESULTS A. Experimental Results of Small-World Networks Generated by WS Model The self-organized embedding algorithm is applied to build navigation scheme on SW networks generated by WS (Watts-Strogatz) model, in which SW properties re- sult from rewiring edges of original regular network at probability p [16]. The chosen original regular network has n=1000 vertices, and each vertex link to k=10 near- est others. The diameters and cluster coefficients of net- works at different rewiring probabilities are shown in Fig. 1(a). Experimental results are averaged over 20 network realizations. As shown in Fig 1(a), even for the small rewiring probability, the diameters of networks decrease sharply while the cluster coefficients are nearly the same as the original regular network. 3 At the beginning of embedding algorithm, every vertex is assigned an initial velocity xi,0, whose values of each dimension are uniformly distributed within [−0.5, 0.5]. Dimensions of metric spaces chosen to be m = 5, 10 and 20 are to investigate how the metric space influences nav- igation. The embedding algorithm is terminated when the velocities of vertices reaches a certain synchroniza- tion level. We defined the synchronization error of xi of dimension k at evolving time t as et(k) = 1 n n (xi,t(k) − hxi,t(k)i)2. Xi=1 (14) When the synchronization errors of velocities at each di- mension are less than a small value, which is chosen as 10−4, the embedding algorithm is terminated. The greedy routing strategy to simulate navigation on networks can be described as follows: vertices are aware of positions of their neighbors in the metric space and po- sitions of targets are transmitted by messages. Messages are passed through current hop to the neighbor closest to targets at each step. To avoid loops, messages are prohibited from neighbors that have been visited. The routing will terminate if message reaches target or all the neighbors of current hop have been visited. We randomly pick 104 source and target pairs for every network to be navigated. Notice that the navigation is not symmetric, e.g. navigation from vertex i to j is not equivalent to navigation from j to i because the local environments of vertex i and j are different. Efficient navigation is de- fined by the fact that messages are successfully passed to targets along the shortest paths. Therefore, we exam- ine two metrics to evaluate navigability: the successfully routing rate (the ratio of number of successfully routing messages and all messages) and the stretch (average of the ratios of routing path length and shortest path length of each message). Figure 1(b), (c) and (d) show that the successfully routing rates and stretches are as a function of rewiring probability p for the hidden metric space of different di- mension. When rewired connections start to arise, suc- cessfully routing rates increase quickly, whereas stretches grow much slower until cluster coefficients drop sharply. As a result of the different growing speeds, high success- fully routing rates and low stretches, which indicates the efficient navigation and strong navigability, simultane- ously occur when the networks show small-world proper- ties, and are much more apparent for the hidden metric space of larger dimensions. In other words, the larger dimension of hidden metric space is useful to improve performances of navigation, which is reflected by higher successfully routing rates and lower stretches at the same rewiring probability. Long range connections, or the so-called weak ties in sociology, play an important role in activities on net- works, e.g. information which people receive through weak ties is more useful and successfully routing messages on Email networks are conducted primarily through in- diameter cluster coefficien 100 80 60 40 20 0 r e t e m a d i 1E-4 1E-3 0.1 1 0.01 p (a) diameter and cluster coefficient e t a r g n i t u o r y l l u f s s e c c u s successfully routing rate stretch 1.0 0.9 0.8 0.7 0.6 0.5 1E-4 1E-3 0.1 1 0.01 p (c) m = 10 0.8 0.6 0.4 0.2 0.0 15 10 5 0 l c u s t e r c o e f f i c e n i s t r e t c h 4 s t r e t c h 20 15 10 5 0 10 s t r e t c h 5 successfully routing rate stretch 1.0 0.9 0.8 0.7 0.6 0.5 0.4 1E-4 1E-3 0.1 1 0.01 p (b) m = 5 successfully routing rate stretch 1.0 0.9 0.8 0.7 0.6 1E-4 1E-3 0.01 p (d) m = 20 0.1 0 1 e t a r g n i t u o r y l l u f s s e c c u s e t a r g n i t u o r y l l u f s s e c c u s FIG. 1: (Color online) Diameter and cluster coefficient as a function of rewiring probability p (a); performance of greedy routing for different dimension of metric space (b) m = 5, (c) m = 10 and (d) m = 20. Networks are generated by WS model [16]. Numerical simulations at each p are averaged over 20 realizations of model. SW networks show strong navigability with high successfully routing rate and low stretch for all dimensions. In particular, the SW properties are necessary for navigability, and the large metric space dimension is useful to improve navigability. termediate to weak strength ties [2, 17]. Hence it is wor- thy of studying that long range connections affect nav- igation by passing messages to vertices far away from each other on networks. We calculate the distributions of shortest path length between all pairs and success- fully routed pairs at different rewiring probability p when the metric space dimension is 20 (see in Fig. 2). When there are fewer long range connections, navigation finds more nearby targets than those far away. The reason is that many messages can't travel far away from the start vertices on networks with high cluster coefficients result- ing from quickly arriving at the vertices whose neighbors have been all visited. As the number of long range con- nections increases, messages can escape from the local area of source vertices and travel a long distance on net- works to arrive at targets. Therefore, targets are suc- cessfully reached at the same probability for different path length from sources. Moreover, the two distribu- tions have agreed well with each other when the rewiring probability is 0.0008, which results in sufficiently small number of long-range connections compared to the total number of connections. The weak ties are extremely use- ful in the sense that even if a few long range connections exist, messages could be passed to the whole network. This fact also explains why the successfully routing rates immediately increase fast when there are only a few long range connections. Navigability of networks in terms of self-organized em- bedding algorithm is based on the fact that distances in the metric space are associated with similarities of ver- tices extracted from topology. However, we can't ensure that distance between every vertex pairs represents its similarity in the absence of central control, e.g. adjacent vertices in the metric space may not be tightly connected. Actually, greedy routings performed on networks consist of two parts: properly directed part is more relevant to 0.025 0.020 0.015 0.010 0.005 0.000 n o i t u b i r t s d i 0.025 0.020 0.015 0.010 0.005 0.000 n o i t u b i r t s d i 0 0 5 successfully routing messages all routing messages successfully routing messages all routing messages 0.025 0.020 0.015 0.010 0.005 0.000 n o i t u b i r t s d i 40 20 80 shortest path length 60 100 0 40 20 80 shortest path length 60 100 (a) p = 0.0001 (b) p = 0.0002 successfully routing messages all routing messages successfully routing messages all routing messages 0.04 0.03 n o i t u b i r t s d i 0.02 0.01 40 20 80 shortest path length 60 100 0.00 0 40 20 80 shortest path length 60 100 (c) p = 0.0004 (d) p = 0.0008 FIG. 2: (Color online) Distributions of shortest path length between vertices of all routing messages and successfully routing messages for different rewiring probability p:(a) p = 0.0001, (b) p = 0.0002, (c) p = 0.0004 and (d) p = 0.0008. As the number of long range connections increases, messages can escape from the local area of source vertices and travel a long distance. The two distribution have agreed well with each other even when the rewiring probability is still very small. These results reflects the power of weak ties: even if a few long range connections exist, messages could be passed to the whole network. navigation, while the remaining part is more tendency to random walks. For numerical simulations on SW net- works, when cluster coefficients stay at a high value, there are clusters consisting of tightly connected similar vertices, which satisfies the organizing rules of networks based on underlying reference frames. In this case, net- work topology can be mapped into a hidden metric space by self-organized embedding algorithm. Meanwhile, mes- sages cannot travel along paths through random walk on networks with high cluster coefficients because they are easy to reach a vertex, all of whose neighbors have been visited. Successfully passed messages on highly clustered networks are mostly routed by navigation, which leads to low stretches. When cluster coefficients drops quickly, the local clusters vanish by randomly rewired connec- tions and vertices are randomly placed in the hidden metric space, which differs the embedding of networks from the network topology. In this regard, random walks can travel a long path to reach targets because vertices have little common neighbors. Therefore, most messages are successfully delivered by random walks, which leads to large stretches and the successfully routing rates are close to 1. B. Experimental Results of Small-World Networks with Power-Law Degree Distribution Many real SW networks have the power-law degree dis- tribution p(k) ∼ k−γ, such as the Internet and WWW. They are called scale-free networks in which there are ver- tices with much larger degrees than randomly connected networks, such as ER (Erdos-R´enyi) model. The largest degree of scale-free network is proportional to N 1/(γ−1), where N is the number of vertices in networks. The BA (Barab´asi-Albert) model has been proposed to explain 10 8 6 4 2 0 r e t e m a d i e t a r g n i t u o r y l l u f s s e c c u s 1.0 0.9 0.8 0.7 0.6 0.5 2 2 diameter cluster coefficient 3 exponent 4 (a) diameter and cluster coefficient 0.8 0.6 0.4 0.2 0.0 15 10 5 successfully routing rate stretch 0 4 3 exponent (c) m = 10 l c u s t e r c o e f f i c e n i t s t r e t c h e t a r g n i t u o r y l l u f s s e c c u s 1.0 0.9 0.8 0.7 0.6 0.5 e t a r g n i t u o r y l l u f s s e c c u s 1.0 0.9 0.8 0.7 0.6 0.5 2 2 6 s t r e t c h 15 10 5 0 4 10 5 s t r e t c h 0 4 successfully routing rate stretch 3 exponent (b) m = 5 successfully routing rate stretch 3 exponent (d) m = 20 FIG. 3: (Color online) Diameter and cluster coefficient as a function of exponent γ (a); performance of greedy routing for different dimension of metric space (b) m = 5, (c) m = 10 and (d) m = 20. Networks are generated by the generalized BA model [19, 20]. Experimental results at each γ are averaged over 20 realizations of the model. Scale-free networks with small exponent γ show strong navigability represented by high successfully routing rate and low stretch for all dimensions. Like the results of SW models, both high cluster coefficient and low diameter are also necessary for navigability, and the large metric space dimension is also helpful to improve navigability. the emergence of power-law degree distributions based on the ideal of preferential attachment [18]. We also investi- gate the navigability of scale-free networks generated by the generalized BA model [19, 20]. In this model, a ver- tex is added in the network with m connections at each step. The probability of attaching to an existing vertex of degree k is proportional to k + k0, where the offset k0 is a constant. Note that k0 being larger than −m is to ensure positive probabilities. This model yields a power- law degree distribution with exponent γ = 3 + k0/m. Negative values of k0 lead to exponent less than 3, which has been observed in many real complex networks. The scale-free networks consist of 103 vertices together with m = 3 and the offset k0 being turnable to get expo- nent γ from 2 to 4. Results for different γ are averaged over 20 networks. Small-world properties of scale-free networks are shown in Fig. 3(a). It is interesting that the cluster coefficients of scale-free networks quickly decrease with the growth of exponent, meanwhile the diameters only increase a little. Thus, the scale-free networks with small exponents exhibit strong SW properties. We con- struct a metric space and exactly execute greedy routing similar to SW models. Figure 3(b), (c) and (d) show the performance of navigation for different exponent γ. It demonstrates that when networks exhibit SW properties with small γ, strong navigability emerges. Stretches are also affected by cluster coefficients because topology of highly clustered networks can be more properly mapped into a metric space. In addition, it can be seen that the high degree nodes act as hubs in navigation on scale-free networks [7]. Therefore, as γ increases, successfully rout- ing rates slightly drop because the highest degrees de- crease. However, when cluster coefficients continuously decrease, successfully routing rates start to increase be- 7 cause most messages are passed by random walks, which also lead to large stretches. IV. CONCLUSION In conclusion, we have well investigated the self- organized emergence of navigability on SW networks via mapping network topology into an Euclidean hidden met- ric spaces through a simple embedding algorithm inspired by information exchanging and accumulating and estab- lished in the absence of prior knowledge of underlying reference frames of networks. It has been demonstrated that high navigability emerges only if networks exhibit strong small-world properties. Because of the lacking of prior knowledge of underlying reference frames, the self- organized embedding algorithm can establish navigable scheme for different kinds of SW networks, which is sup- ported by the results of SW networks generated by WS model and BA model. Underlying reference frames, in which similar vertices are adjacent and connected at higher probability, explain how real complex networks are organized based on sim- ilarities between individuals. Since the clustering ten- dency of small-world networks satisfies the preferential attachment in underlying reference frames, the hidden metric space based on vertices similarities can be estab- lished by a universal algorithm, regardless of the explicit organizing pattern of networks. The self-organized navigation may be a possible ap- proach available for scalable routing on the Internet, which has gained lots interests recently. Many algorithms have been proposed to reduce the storage space of rout- ing table without remarkable increase of routing path lengths, e.g. the compact routing schemes [21 -- 23]. The size of routing table could be reduced to polylogarith- mic of the network size in compact routing with stretch smaller than 3, yet global topology and central control required to build routing scheme in these algorithm have to demand large amount of communications on networks. In our work, since the constructing hidden metric space and greedy routing are distributed and localized in a self- organized way, communication are restricted between im- mediate connected vertices. Meanwhile, the sizes of rout- ing tables are the degrees of vertices, and stretches are quite small when the networks show small-world prop- erties. Comparing with previous work on navigation [5 -- 7], our work may provide profound insights into scalable routing scheme through a self-organized way in the ab- sence of prior knowledge. Acknowledgments This work is supported by the National Natural Sci- ence Foundation of China under Grant Nos. 60874090, 60974079, 61004102. S-MC appreciates the financial sup- port of K.C. Wong Education Foundation, China Post- doctoral Science Foundation, and Youth Innovation fund- ing of University of Science and Technology of China. [1] J. Travers and S. Milgram, Sociometry 32, 425 (1969). [2] P. S. Dodds, R. Muhamad, and D. J. Watts, Science 301, 827 (2003). [12] F. Dabek, R. Cox, F. Kaashoek, and R. Morris, ACM SIGCOMM Comput. Commun. Rev. 34(4), 15 (2004). [13] T.Vicsek, A.Czirok, E.B.Jacob, and O.Schodhet, Phys. [3] L. Adamic, and E. Adar, Social Networks 27(3), 187 Rev. Lett. 75, 1226 (1995). (2005). [4] D. Liben-Nowell, J. Novak, R. Kummar, P. Raghavan, and A. Tomkins, Proc. Natl. Acad. Sci. USA 102(33), 11623 (2005). [14] A. Capocci, V. D. P. Servedio, G. Galdarelli, and F. Co- laiori, Physica A 352, 669 (2005). [15] E. A. Leicht, P. Holme, and M. E. J. Newman, Phys. Rev. E 73, 023120(2006) [5] J. Kleinberg, Nature 406, 845 (2000) [6] D. J. Watts, P. S. Dodds, and M. E. J. Newman, Science [16] D. J. Watts and S. H. Strogatz, Science 393, 6684 (1998). [17] M. Granovetter, Amer. Jour. Sociology, 78(6), 1360 296, 1302 (2002). (1973). [7] M. Bogun´a, D. Krioukov, and K. C. Claffy, Nature Physics 5, 74 (2009). [8] O. Sandberg, Distributed Routing in Small-World Net- works, Proceedings of the eight Workshop on Algorithms Engineering and Experiment, 144 (2006). [18] A. L. Barab´asi and R. Albert, Science 286, 509 (1999). [19] S. N. Dorogovtsev and J. F. F. Mendes, Phys. Rev. Lett. 85, 4633 (2000). [20] P. L. Krapivsky and S. Redner, Phys. Rev. E 63, 066123 (2001). [9] I. Benjamini and N. Berger, Random Struct. Algor. 19, [21] I. Abraham, C. Gavoille, D. Malkhi, and N. Nisan, and 102 (2001). [10] P. Francis, S. Jamin, V. Paxson, L. Zhang, D. F. Gryniewicz, and Y. Jin, An architecture for a global In- ternet host distance estimation service, Proceedings of IEEE INFOCOM '99, 210 (1999) [11] T. S. E. Ng and H. Zhang, Predicting Internet network distance with coordinates-based approaches, Proceedings of IEEE INFOCOM '02, 170 (2002). M. Thorup, ACM Trans. Algor. 4(3), 37 (2008). [22] A. Brady and L. Cowen, Compact routing on power-law graphs with additive stretch, Proceedings of the eight Workshop on Algorithms Engineering and Experiment, 119 (2006). [23] M. Thorup and U. Zwick, Compact routing schemes, Pro- ceedings of ACM SPAA '01, 1 (2001).
1808.09922
1
1808
2018-08-29T16:50:16
Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness
[ "cs.SI" ]
Today's social media platforms enable to spread both authentic and fake news very quickly. Some approaches have been proposed to automatically detect such "fake" news based on their content, but it is difficult to agree on universal criteria of authenticity (which can be bypassed by adversaries once known). Besides, it is obviously impossible to have each news item checked by a human. In this paper, we a mechanism to limit the spread of fake news which is not based on content. It can be implemented as a plugin on a social media platform. The principle is as follows: a team of fact-checkers reviews a small number of news items (the most popular ones), which enables to have an estimation of each user's inclination to share fake news items. Then, using a Bayesian approach, we estimate the trustworthiness of future news items, and treat accordingly those of them that pass a certain "untrustworthiness" threshold. We then evaluate the effectiveness and overhead of this technique on a large Twitter graph. We show that having a few thousands users exposed to one given news item enables to reach a very precise estimation of its reliability. We thus identify more than 99% of fake news items with no false positives. The performance impact is very small: the induced overhead on the 90th percentile latency is less than 3%, and less than 8% on the throughput of user operations.
cs.SI
cs
Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness Oana Balmau EPFL [email protected] Alexandre Maurer EPFL [email protected] Rachid Guerraoui EPFL [email protected] Matej Pavlovic EPFL [email protected] Anne-Marie Kermarrec [email protected] Mediego, EPFL [email protected] Willy Zwaenepoel EPFL 8 1 0 2 g u A 9 2 ] I S . s c [ 1 v 2 2 9 9 0 . 8 0 8 1 : v i X r a ABSTRACT Today's social media platforms enable to spread both authentic and fake news very quickly. Some approaches have been proposed to automatically detect such "fake" news based on their content, but it is difficult to agree on universal criteria of authenticity (which can be bypassed by adversaries once known). Besides, it is obviously impossible to have each news item checked by a human. In this paper, we a mechanism to limit the spread of fake news which is not based on content. It can be implemented as a plugin on a social media platform. The principle is as follows: a team of fact- checkers reviews a small number of news items (the most popular ones), which enables to have an estimation of each user's inclina- tion to share fake news items. Then, using a Bayesian approach, we estimate the trustworthiness of future news items, and treat accordingly those of them that pass a certain "untrustworthiness" threshold. We then evaluate the effectiveness and overhead of this tech- nique on a large Twitter graph. We show that having a few thou- sands users exposed to one given news item enables to reach a very precise estimation of its reliability. We thus identify more than 99% of fake news items with no false positives. The performance impact is very small: the induced overhead on the 90th percentile latency is less than 3%, and less than 8% on the throughput of user operations. 1 INTRODUCTION The expression "fake news" has become very popular after the 2016 presidential election in the United States. Both political sides accused each other of spreading false information on social media, in order to influence public opinion. Fake news have also been involved in Brexit and seem to have played a crucial role in the French election. The phenomenon is considered by many as a threat to democracy, since the proportion of people getting their news from social media is significantly increasing [1]. Facebook and Google took a first concrete measure by removing advertising money from websites sharing a significant number of fake news [2]. This, however, does not apply to websites that do not rely on such money: popular blogs, non-professional streaming Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s). , , © Copyright held by the owner/author(s). channels, or media relying on donations, to name a few. Facebook also considered labeling some news items as "disputed" when inde- pendent human fact-checkers contest their reliability [3]. However, there cannot be enough certified human fact-checkers for a world- wide social network. While it is very easy to share fake news, it may take very long to check them, clearly too long to prevent them from getting viral. We present Credulix, the first content-agnostic system to pre- vent fake news from getting viral. From a software perspective, Credulix is a plugin to a social media platform. From a more ab- stract perspective, it can also be viewed as a vaccine for the social network. Assuming the system has been exposed to some (small) amount of fake news in the past, Credulix enables it to prevent fu- ture fake news from becoming viral. It is important to note that our approach does not exclude other (e.g. content-based) approaches, but complements them. At the heart of our approach lies a simple but powerful Bayesian result we prove in this paper, estimating the credibility of news items based on which users shared them and how these users treated fake news in the past. News items considered fake with a sufficiently high probability can then be prevented from further dissemination, i.e., from becoming viral. Our Bayesian result is in the spirit of Condorcet's jury Theorem [26], which states that a very high level of reliability can be achieved by a large number of weakly reliable individuals. To determine the probability of falsehood of a news item X, we look at the behavior of users towards X. This particular behavior had a certain a priori probability to happen. We compute this probability, based on what we call user credulity records: records of which fact-checked items users have seen and shared. Then, after determining the average fraction of fake news on the social network, we apply Laplace's Rule of Succession [73] and then Bayes' Theorem [45] to obtain the desired probability. Credulix does retain the idea of using a team of certified human fact-checkers. However, we acknowledge that they cannot review all news items. Such an overwhelming task would possibly require even more fact-checkers than users. Here, the fact-checkers only check a few viral news items, i.e., ideally news items that have , , Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel been shared and seen the most on the social network1. Many such fact-checking initiatives already exist all around the world [6 -- 10]. Such checks enable us to build user credulity records. Our Bayesian formula determines the probability that a given news item is fake using the records of users who viewed or shared it. When this prob- ability goes beyond a threshold (say 99.9999%), the social network can react accordingly. E.g., it may stop showing the news item in other users' news feeds. It is important to note that our approach does not require any users to share a large amount of fake news. It suffices that some users share more fake news than others. Our approach is generic in the sense that it does not depend on any specific criteria. Here, for instance, we look at what users share to determine if a news item is fake. However, the approach is independent of the precise meanings of "share" and "fake": they could respectively be replaced by ("like" or "report") and ("funny", "offensive", "politically liberal" or "politically conservative"). Turning the theory behind Credulix into a system deployable in practice is a non-trivial task. In this paper we address these challenges as well. In particular, we present a practical approach to computing news item credibility in a fast, incremental manner. We implement Credulix as a standalone Java plugin and connect it to Twissandra [22] (an open source Twitter clone), which serves as a baseline system. Credulix interferes very little with the critical path of users' operations and thus has a minimal impact on user request latency. We evaluate Credulix in terms of its capacity to detect fake news as well as its performance overhead when applied to a real social network of over 41M users [49]. After fact- checking the 1024 most popular news items (out of a total of over 35M items), over 99% of unchecked fake news items are correctly detected by Credulix. We also show that Credulix does not incur significant overhead in terms of throughput and latency of user operations (sharing items and viewing the news feed): average latency increases by at most 5%, while average throughput decreases by at most 8%. The paper is organized as follows. Section 2 presents the theoret- ical principles behind Credulix. Section 3 presents the design and implementation of Credulix. Section 4 reports on our evaluation results. Section 5 discusses the limitations and tradeoffs posed by Credulix. Section 6 discusses related work and Section 7 concludes. 2 THEORETICAL FOUNDATIONS In this section we give an intuition of the theoretical result underly- ing Credulix, followed by its formalization as a theorem. We finally show how to restate the problem in a way that allows efficient, fast computation of news item credibility. 2.1 Intuition The context is a social network where users can post news items, such as links to newspapers or blog articles. Users exposed to these 1Some news items are indeed seen by millions, and are easy to check a posteriori. For instance, according to CNN [4], the following fake news items were read by millions: "Thousands of fraudulent ballots for Clinton uncovered"; "Elizabeth Warren endorsed Bernie Sanders"; "The NBA cancels 2017 All-Star Game in North Carolina". According to BuzzFeed [5], the fake news item "Obama Signs Executive Order Banning The Pledge Of Allegiance In Schools Nationwide" got more than 2 millions engagements on Facebook, and "Pope Francis Shocks World, Endorses Donald Trump for President, Releases Statement" almost 1 million. Figure 1: News item falsehood probability computation. Figure 2: Users reacting to new item X. news items can in turn share them with other users (Twitter follow- ers, Facebook friends etc.). The social network has a fact-checking team whose role is to determine whether certain news items are fake (according to some definition of fake)2. The news items that the fact-checking team needs to check is very low compared to the total number of items in the social network. The Main Steps. Our approach goes through the following three main steps: (1) The fact-checking team reviews few news items (ideally those that have been the most viral ones in the past). This is considered the ground truth in our context. (2) Credulix creates a probabilistic model of each user's sharing behavior based on their reactions (share / not share) to the fact-checked items in Step (1). This captures the likelihood of a user to share true (resp. fake) news items. (3) For a new, unchecked news item X, we use the behavior models generated in Step (2) to determine the probability that X is fake, based on who viewed and shared X. A high-level view of our technique is depicted in Figure 1. We use a Bayesian approach. For example, if an item is mostly shared by users with high estimated probabilities of sharing fake items, while users with high estimated probabilities of sharing true items rarely share it, we consider the item likely to be fake (Figure 2). Preventing the Spread of Fake News. Once we estimate the probability of a news item X being fake, preventing its spread becomes easy. Let p0 be any cutoff probability threshold. Each time a user views or shares X, we compute p, the probability of X being fake, which we detail below. If p ≥ p0 (i.e., X has a probability at least p0 to be fake), Credulix stops showing X in the news feed of users, preventing X from spreading and becoming viral. 2.2 Basic Fake News Detection User Behavior. We model the behavior of a user u using the two following probabilities: 2Our truth and falsehood criteria here are as good as the fact-checking team. Fact-checkednewsitemsNo. viewed/shared/true/fake news items for each userGlobal fraction of fake newsBehavioral model of users exposed to XNews item XProbability that X is fakeXProbsharefakeProbsharetrueProbsharefakeProbsharetrueX probably fakeSHARE XNO SHARE Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness , ,  u∈S PT (u)  u∈S PF(u) • If X is true, the probability of E is P(ET) = u∈V −S(1 − PT (u)) = πT (V , S). • If X is fake, the probability of E is P(EF) = u∈V −S(1 − PF(u)) = πF(V , S). The probability that X is fake (independently of E) is P(F) = д∗, and the probability that X is true (independently of E) is P(T) = 1 − д∗. Thus, we can determine the probability that E is true: P(E) = P(ET)P(T) + P(EF)P(F) = (1 − д∗)πT (V , S) + д∗πF(V , S). P(FE) = P(EF)P(F)/P(E) according to Bayes' Theorem [45]. Then, P(FE) = д∗πF(V , S)/(д∗πF(V , S)+(1−д∗)πT (V , S)) = p(V , S). Thus, the result. □ If д∗ is unknown, we assume that д is a lower bound of д∗. We get in this case the following theorem. Theorem 2. For д ≤ д∗, a news item viewed by a set of users V and shared by a set of users S is fake with probability at least p(V , S). Proof. First, note that πT (V , S) and πF(V , S) are strictly positive by definition. Thus, the ratio πT (V , S)/πF(V , S) is always strictly positive. ∀x ∈ (0, 1), let д(x) = xπF(V , S)/(xπF(V , S) + (1 − x)πT (V , S)). Then, p(V , S) = h(д), and according to Theorem 1, the news item is fake with probability h(д∗). Written differently, д(x) = 1/(1 + k(x)), with k(x) = (1/x − 1)πT (V , S)/πF(V , S). As д ≤ д∗, 1/д ≥ 1/д∗, 1 + k(д) ≥ 1 + k(д∗) and h(д) ≤ h(д∗). Thus, the result. □ 2.3 Fast Fake News Detection Credulix' measure of credibility of a news item X is the probability p(V , S) that X is fake. An obvious way to compute this probability is to recalculate p(V , S) using eq. (1) each time X is viewed or shared by a user. Doing so, however, would be very expensive in terms of computation. Below, we show an efficient method for computing news item credibility. We first describe the computation of UCRs, and then present our fast, incremental approach for computing news item credibility using item ratings and UCR scores. This is crucial for efficiently running Credulix in practice. Computing User Credulity Records (UCRs). Recall that the four values (vT (u), sT (u), vF(u), sF(u)) constituting a UCR only concern fact-checked news items. We thus update the UCR of user u (increment one of these four values) in the following two scenarios. (1) When u views or shares a news item that has been fact- checked (i.e., is known to be true or fake). (2) Upon fact-checking a news item that u had been exposed to. In general, the more fact-checked news items a user u has seen and shared, the more meaningful u's UCR. Users who have not been exposed to any fact-checked items cannot contribute to Credulix. Item Rating. In addition to p(V , S), we introduce another measure of how confident Credulix is about X being fake: the item rating α(V , S), whose role is equivalent to that of p(V , S). We define it as α(V , S) = πT (V , S)/πF(V , S), V and S being the sets of users that viewed and shared X, respectively. If we also define α0 = (1/p0 − • PT (u): probability that u shares a news item if it is true. • PF(u): probability that u shares a news item if it is fake. The probabilities PT (u) and PF(u) are assumed to be independent between users. In practice, this is the case if the decision to share a news item X is mainly determined by X itself. We obtain estimates of PT (u) and PF(u) for each user based on the user's behavior (share / not share) with respect to fact- checked items. For any given user u, let vT (u) (resp. sT (u)) de- note the number of fact-checked true news items viewed (resp. shared) by u, and vF(u) (resp. sF(u)) the number of fact-checked fake news items viewed (resp. shared) by u. We call the tuple (vT (u), sT (u), vF(u), sF(u)) the User Credulity Record (UCR) of u. User behavior has been modeled similarly in prior work, for instance, in Curb [44]. In Curb, users exposed to a news item decide probabilistically whether to share it, potentially exposing all their followers to it. Curb relies on very similar metrics, namely the num- bers of viewed and shared items for each user, and the probabilities that users would share true or false news items. on the UCR: For any given user u, we define the following functions, based • β1(u) = (sT (u) + 1)/(vT (u) + 2) • β2(u) = (sF(u) + 1)/(vF(u) + 2) • β3(u) = (vT (u) − sT (u) + 1)/(vT (u) + 2) • β4(u) = (vF(u) − sF(u) + 1)/(vF(u) + 2) According to Laplace's Rule of Succession [73], we have PT (u) = β1(u) and PF(u) = β2(u). Probability of a News Item Being Fake. At the heart of Credulix lies a formula to compute the likelihood of a new (not fact-checked) news item X to be fake. Let V and S be any two sets of users that have viewed and shared X, respectively. The probability that X is fake, p(V , S) is computed as: p(V , S) = дπF(V , S)/(дπF(V , S) + (1 − д)πT (V , S)) (1) Where: • πT (V , S) = • πF(V , S) = u∈S β1(u) u∈S β2(u) u∈V −S β3(u) u∈V −S β4(u), and • д is the estimated global fraction of fake news items in the social network, with д ∈ (0, 1). д can be estimated by fact-checking a set of news items picked uniformly at random from the whole social network. Let д∗ be the real fraction of fake news items in the social network. We distinguish two cases: д∗ is known, and д∗ is unknown. If д∗ is known, we have the following theorem. Theorem 1. Let д = д∗. A news item viewed by a set of users V and shared by a set of users S is fake with probability p(V , S). Proof. Consider a news item X that has not been fact-checked. Consider the following events: E : X viewed by a set of users V and shared by a set of users S. F : X is fake. T : X is true. Our goal is to evaluate P(FE): the probability that X is fake knowing E. , , Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel Figure 4: CREDULIX' view operation. Despite the fast computtation described in Section 2.3, there are still notable challenges posed by turning an algorithm into a practical system. In order for the Credulix plugin to be usable in practice, it must not impair user experience. In particular, its impact on the latency and throughput of user operations (retrieving news feeds or tweeting/sharing articles) must be small. Our design is motivated by minimizing Credulix' system resource overhead. Selective Item Tracking. Every second, approximately 6000 new tweets appear on Twitter and 50000 new posts are created on Face- book [11, 12]. Monitoring the credibility of all these items would pose significant resource overhead. With Credulix, each view / share event requires an additional update to the news item's meta- data. However, we do not need to keep track of all the items in the system, but just the ones that show a potential of becoming viral. Credulix requires each item's metadata to contain an additional bit indicating whether that item is tracked. The rating of item X is only computed and kept up to date by Credulix if X is tracked. We set the tracked bit for item X when X is shared by an influ- ential user. We define influential users as users who have a high number of followers. The intuition behind this approach is that a news item is more likely to become viral if it is disseminated by a well-connected user [43]. The follower threshold necessary for a user to be considered influential is a system parameter. It can be chosen, for instance, as an absolute threshold on the number of followers or relatively to the other users (e.g., the first n most pop- ular users are influential). There are many methods to determine influential users [25, 34, 35, 50, 57, 66, 67] or the likelihood of items to become viral [27, 39, 40, 51, 55, 68, 71, 72]. For simplicity, in our experiments we consider the 5% most popular users influential. Interaction with the Social Media Platform. We consider two basic operations a user u can perform: • Sharing a news item and • Viewing her own news feed. Sharing is the operation of disseminating a news item to all of u's followers (e.g., tweeting, sharing, updating Facebook status etc.). Viewing is the action of refreshing the news feed, to see new posts shared by users that u follows. In the following, we describe how these operations are performed in a social network platform (in- spired by Twitter) without Credulix (Baseline) and with Credulix. We assume that, like in Twitter, all users' news feeds are repre- sented as lists of item IDs and stored in memory, while the item contents are stored in an item data store [13]. Figure 3: CREDULIX' share operation. 1)/(1/д−1) as the rating threshold corresponding to the probability threshold p0, then, p(V , S) ≥ p0 is equivalent to α(V , S) ≤ α0. We have p(V , S) = дπF(V , S)/(дπF(V , S) + (1 − д)πT (V , S)) = д/(д + (1 − д)(πT (V , S)/πF(V , S))) = д/(д + (1 − д)α(V , S)). We have p(V , S) ≥ p0 if and only if д/p(V , S) ≤ д/p0, that is: д + (1 − д)α(V , S) ≤ д/p0, which is equivalent to α(V , S) ≤ (1/p0−1)/(1/д− 1), that is: α(V , S) ≤ α0. When the item X with α(V , S) ≤ α0 is about to be displayed in a user's news feed, Credulix suppresses X. Note that α0 can be a fixed constant used throughout the system, but may also be part of the account settings of each user, giving users the ability to control how "confident" the system needs to be about the falsehood of an item before suppressing it. According to the definition of πT (V , S) and πF(V , S), each time X is viewed (resp. shared) by a new user u, we can update X's rating α(V , S) by multiplying it by γv(u) = β1(u)/β2(u) (resp. γs(u) = β3(u)/β4(u)). We call γv(u) and γs(u) respectively the view score and share score of u's UCR, as their value only depends on u's UCR. Consequently, when a user views or shares X, we only need to access a single UCR in order to update the rating of X. This is what allows Credulix to update news item credibility fast, without recomputing eq. (1) each time the item is seen by a user. In what follows, we refer to γv(u) and γs(u) as u's UCR score. The more a UCR score differs from 1, the stronger its influence on an item rating (which is computed as a product of UCR scores). We consider a UCR score to be useful if it is different from 1. 3 CREDULIX AS A SOCIAL MEDIA PLUGIN Credulix can be seen as a plugin to an existing social network, like, for instance, Facebook's translation feature. The translator observes the content displayed to users, translating it from one language to another. Similarly, Credulix observes news items about to be displayed to users and tags or suppresses those considered fake. User UItem X1Share Item XGet followersUser GraphAdd X IDto U's followers'news feeds...Items Data StoreCREDULIXnoyesStore XratingStore Xif X is newBASELINE SHARINGCREDULIX SHARINGXUX bodyyesRatingstopno23U1News feedUnNews feedU followers list4X tracked?U influential?Track XUpdateX rating4User UView news feedGet U news feed item IDs…Items Data StoreGet itemsCREDULIXReturn filtered itemsStore new ratingsU news feed itemsBASELINE NEWS VIEWINGCREDULIX NEWS VIEWING31X1Xn2Filter itemsUpdateratings if items are tracked45 Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness , , Baseline Sharing. A schema of the Share operation is shown in Figure 3. The regular flow of the operation is shown in blue and Credulix is shown in orange. User u shares an item X (1). First, the social graph is queried to retrieve u's followers (2). The system then appends the ID of X to the news feeds of u's followers (3). Finally, if X is a new item, the body of X is stored in a data store (4). Sharing with Credulix. If u is not an influential user, the flow of the share operation described above stays the same. If u is influential, we mark X as tracked and associate an item rating with X, because we expect X to potentially become viral. If X is tracked, Credulix updates the rating of X using u's UCR share score. Thus, for tracked items, Credulix may require one additional write to the data store compared to the Baseline version, in order to store the updated item rating. This is done off the critical path of the user request, hence not affecting request latency. Baseline News Feed Viewing. A schema of the View operation is shown in Figure 4. User u requests her news feed (1). For each item ID in u's news feed (stored in memory), the system retrieves the corresponding item body from the data store (2) and sends all of them back to the user (3). Viewing News Feed with Credulix. Credulix augments the View operation in two ways. First, after the news feed articles are retrieved from the data store, Credulix checks the ratings of the items, filtering out the items with a high probability of being fake. Second, if u's news feed contains tracked items, Credulix updates the rating of those items using u's UCR view score. Hence, a supplementary write to the data store is necessary, compared to the Baseline version, for storing the items' updated ratings. Again, we do this in the background, not impacting user request latency. 4 EVALUATION In this section, we evaluate our implementation of Credulix as a stand-alone Java plugin. We implement a Twitter clone where the share and view operation executions are depicted in Figures 3 and 4. We refer to the Twitter clone as Baseline and we compare it to the variant with Credulix plugged in, which we call Credulix. For the data store of the Baseline we use Twissandra's data store [22], running Cassandra version 2.2.9 [19]. The goals of our evaluation are the following. First, we explore Credulix's fake news detecting efficiency. Second, we measure the performance overhead of our implementation. More precisely, we show that: (1) Credulix efficiently stops the majority of fake news from be- coming viral, with no false positives. Credulix reduces the number of times a viral fake news item is viewed from hun- dreds of millions to hundreds of thousands (in Section 4.2). (2) Credulix succeeds in stopping the majority of fake news from becoming viral for various user behaviors in terms of how likely users are to share news items they are exposed to (in Section 4.3). (3) Credulix's impact on system performance is negligible for both throughput and latency (in Section 4.4). 4.1 Experimental Setup We perform our evaluation using a real Twitter graph of over 41M users [49]. We consider users to be influential (as defined in Sec- tion 3) if they are among the 5% most followed users. We use a set of tweets obtained by crawling Twitter to get a distribution of item popularity. Out of over 35M tweets we crawled, the 1024 (0.003%) most popular tweets are retweeted almost 90 million times, which corresponds to over 16% of all the retweets. Two key values influence Credulix' behavior: • r: The number of fact-checked news items during UCR cre- ation (i.e., the number of news items constituting the ground truth). In our experiments we use a value of r = 1024, which causes one third of the user population to have useful UCR scores (more than enough for reliable fake item detection). • msp: The max share probability models users' intrinsic shar- ing behavior: how likely users are to share news items they are exposed to. This models how users react to news items. It is not a system parameter of Credulix. We expect msp to be different for different news items, as some items become viral (high msp) and some do not (low msp). Regardless of what the real value of msp is, Credulix effectively prevents fake items from going viral, as we show later. While the network and the tweets come from real datasets, we generate the user behavior (i.e., probability to share fake and true news items), as we explain in the remainder of this section. We proceed in two steps. (1) UCR creation: determining the UCR (i.e., vT , sT , vF , sF ) for each user based on propagation of fact-checked news items. (2) Fake item detection: using the UCRs obtained in the previous step, we use Credulix to detect fake news items and stop them from spreading. This two-step separation is only conceptual. In a production system, both UCR creation and fake item detection happen continuously and concurrently. UCR Creation. For each user u, we set PT (u) and PF(u) (see Sec- tion 2) to values chosen uniformly at random between 0 and msp. The likelihood of a user to share true or fake news is the main user characteristic used by Credulix. This approach yields differ- ent types of user behavior. We take a subset of r tweets from our tweet dataset and consider this subset the ground truth, randomly assigning truth values to news items. To create the UCRs, we propagate r items through the social graph. We assign each of the r items a target share count, which corresponds to its number of retweets in our dataset. The propa- gation proceeds by exposing a random user u to the propagated item X and having u decide (based on PT (u) and PF(u)) whether to share X or not. If u shares X, we show X to all u's followers that have not yet seen it. During item propagation, we keep track of how many true/fake items each user has seen/shared and update the UCRs accordingly. We repeat this process until one of the following conditions is fulfilled: (1) The target number of shares is reached. (2) At least 80% of users have been exposed to X, at which point we consider the network saturated. , , Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel Fake Item Detection. After creating the UCRs, we measure how effectively these can be leveraged to detect fake news. To this end, in the second step of the evaluation, we propagate tweets through the social graph. One such experiment consists of injecting an item in the system, by making a random user u share it. The propagation happens as in the previous phase, with two important differences: (1) Since in this second step the item we propagate is not fact- checked, we do not update u's UCR. Instead, whenever u is exposed to an item, we update that item's rating using u's UCR score. We use the share score if u shares the item, otherwise we use the view score (see Section 2). (2) We only propagate the item once, continuing until the prop- agation stops naturally, or until the probability of an item being fake reaches p0 = 0.999999. We repeat this experiment 500 times with a fake news item and 500 times with a true news item to obtain the results presented later in this section. We conduct the experiments on a 48-core machine, with four 12-core Intel Xeon E7-4830 v3 processors operating at 2.1 GHz, 512 GB of RAM, running Ubuntu 16.04. 4.2 Stopping Fake News from Becoming Viral This experiment presents the end-to-end impact of Credulix on the number of times users are exposed to fake news. To this end, we measure the number of times a user is exposed to a fake news item in two scenarios: (1) Baseline propagation of fake news items. (2) Propagation of fake items, where we stop propagating an item when Credulix labels it as fake with high probability. Figure 5 conveys results for items with varying rates of virality, modeled by our msp parameter. It shows how many times a user has been exposed to a fake item, cumulatively over the total number of fake items that we disseminate. We can see that regardless of how viral the items would naturally become, Credulix is able to timely detect the fake items before they spread to too many users. Credulix restricts the number of views from hundreds of millions to tens or hundreds of thousands. None of our experiments encountered false positives (i.e., true items being incorrectly labeled as fake). Considering the increas- ing responsibility being attributed to social network providers as mediators of information, it is crucial that true news items are not accidentally marked as fake. 4.3 Fake News Detection Relative to Sharing Probability In Figure 6 we plot the percentage of fake items displayed with Credulix for two graph sizes. On a smaller graph of 1M users generated with the SNAP generator [52], Credulix achieves a lower fake item detection rate. This is because the impact of fact- checked items is smaller on a small graph, leading to fewer users with relevant UCR scores. This result suggests that on a real social graph that is larger than the one we use, Credulix would be more efficient than in our experiments. Figure 6 also shows how the detection rate depends on the ten- dency of users to share news items (that we model using msp). The Figure 5: Fake news spreading with CREDULIX, as a func- tion of msp (lower is better). For low msp, news items do not become viral. For high msp, CREDULIX blocks the majority of fake news items. Figure 6: Fake news spreading with CREDULIX, as a func- tion of msp, for different social graph sizes (lower is better). more viral the items get (the higher the msp value), the more effec- tive Credulix becomes at fake item detection. Intuitively, the more items users share, the more precisely we are able to estimate their sharing behavior. The lower detection rate for small msp values does not pose a problem in practice, as a low msp also means that items naturally do not become viral. While not visible in the plot, it is worth noting that not only the relative amount of viewed fake items decreases, but also the absolute one. For example, while for msp = 1/32 a fake news item has been displayed almost 3k times (out of over 84k for Baseline), for msp = 1/16 a fake item has only been displayed 1.2k times (out of over 128k Baseline) in the 1M graph. Interestingly, with increasing tendency of items to go viral (i.e. increasing msp), even the absolute number of displayed fake items decreases. The relative decrease effect is not due to an absolute increase for Baseline. Instead, it is due to a higher msp value ensuring more spreading of (both true and fake) news items in our UCR creation phase. This in turn produces better UCRs, increasing Credulix' effectiveness. 4.4 CREDULIX Overhead In this experiment, we evaluate Credulix' impact on user opera- tions' (viewing and sharing) throughput and latency. We present our results for four workloads, each corresponding to a value of msp discussed above (Figures 5 and 6). The four workloads are summarized in Table 1. We present results for two social graph sizes: 41M users, and 1M users, with 16 worker threads serving 00.511.5200.050.10.15Number of views (Billions)Maximum share probability (msp)CREDULIXBaseline1/81/161/321/6404812162000.050.10.15% Fake items displayedMaximum share probability (msp)CREDULIX, 1M graphCREDULIX, 41M graph1/81/161/321/64000.511.5200.050.10.15Number of views (Billions)Maximum share probability (msp)CREDULIXBaseline1/81/161/321/6404812162000.050.10.15% Fake items displayedMaximum share probability (msp)CREDULIX, 1M graphCREDULIX, 41M graph1/81/161/321/640 Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness , , Figure 7: Credulix's throughput overhead Figure 8: Credulix's latency overhead: 94% views user operations, showing that the Credulix's overhead in terms of throughput and latency is low. Figure 7 shows the throughput comparison between Credulix and Baseline, for the four workloads. The throughput penalty caused by Credulix is at most 8%. The impact on throughput is predominantly caused by Credulix' background tasks, as detailed in Section 3. Moreover, Credulix does not add significant overhead relative to the Baseline as the graph size increases. The throughput differences between the two graph sizes are not larger than 10%. This is due to our design which relies on selective item tracking. Figures 8 and 9 show view and share latencies for the 94% views and 99.9% views workloads, respectively. The latency values for the two other workloads are similar and we omit them for brevity. For the 41M User Twitter graph, the average and 90th percentile latencies are roughly the same for Credulix and for Baseline. We notice, however, heavier fluctuations for the 1M User graph. Overall, latency increases by at most 17%, at the 90th percentile, while the median latency is the same for both operations, for both systems, for both graphs (4 microseconds per operation). The low overhead in latency is due to Credulix keeping its computation outside the critical path. Standard deviation of latencies is high both for the Baseline and for Credulix, for both share and view operations. The high variation in latency is caused by the intrinsic differences between the users; for instance, share operations of a user with more followers need to propagate to more users than posts of users with few or no followers. The high 99th percentile latency for both systems results from Twissandra (our Baseline) being implemented in Java, a language (in)famous for its garbage collection breaks. Certain operations, during which garbage collection is performed by the JVM, thus experience very high latencies. This effect is not inherent to the system itself, but is caused by the Java implementation and can be avoided by using a language with explicit memory management. msp Value 1/8 1/16 1/32 1/64 % Views, % Shares 94% Views, 6% Shares 97% Views, 3% Shares 99% Views, 1% Shares 99.9% Views, 0.1% Shares Table 1: Workload Characteristics. The only parameter we vary is msp, from which the view/share ratio follows. Figure 9: Credulix's latency overhead: 99.9% views The impact of garbage collection is stronger with Credulix than with Baseline, as Credulix creates more short-lived objects in mem- ory to orchestrate its background tasks. In addition to the intrinsic differences between users discussed above, garbage collection also significantly contributes to the high standard deviation observed in all latencies. 5 DISCUSSION AND LIMITATIONS We believe that Credulix is a good step towards addressing the fake news problem, but we do not claim it to be the ultimate solution. Credulix is one of many possible layers of protection against fake news and can be used independently of other mechanisms. With Credulix in place, news items can still be analyzed based on content using other algorithms. It is the combination of several approaches that can create a strong defense against the fake news phenomenon. This section discusses the limitations of Credulix. News Propagation. Credulix does not prevent users from ac- tively pulling any (including fake) news stories directly from their sources. Credulix identifies fake news on a social media platform and, if used as we suggest, prevents users from being notified about other users sharing fake news items. Manual Fact-Checking. Credulix relies on manual fact-checking and thus can only be as good as the fact-checkers. Only users who have been exposed to manually fact-checked items can be leveraged by Credulix. However, fact-checking a small number of popular news items is sufficient to obtain enough users with usable UCRs. Fact-checking a small number of news items is feasible, especially given the recent upsurge of fact-checking initiatives [6 -- 10]. 00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% Views00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% ViewsBaselineCREDULIX050100150Avg90p99pAvg90p99pAvg90p99pAvg90p99p41M Usr.1M Usr.41M Usr.1M Usr.MicrosecondsView LatencyShare Latency00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% ViewsBaselineCREDULIX94% Views -- 6% Shares Workload99.9% Views -- 0.1% Shares Workload050100150Avg90p99pAvg90p99pMicrosecondsView LatencyShare Latency00.20.40.60.8141M1M41M1M41M1M41M1MRelative Throughput94% Views97% Views99% Views99.9% ViewsBaselineCREDULIX41M Usr.1M Usr.41M Usr.1M Usr.Avg90p99pAvg90p99p , , Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel User Behavior. Credulix's algorithm is based on the assumption that among those users exposed to fact-checked news items, some share more fake items than others. Analogous assumptions are commonly used in other contexts such as recommender systems. For example, a user-based recommender system would not be useful if all users behaved the same way, i.e. everybody giving the same ratings to the same items. Note that, even in the case where all users did behave the same, running Credulix would not negatively impact the behavior of the system: Credulix would not detect any fake news items, nor would it classify fake news items as true. Our approach shines when the inclination of most users to share fake news does not change too quickly over time. Looking at social media today, some people seem indeed to consciously and consistently spread more fake news than others [14 -- 16]. In fact, many systems that are being successfully applied in practice (e.g. reputation systems, or systems based on collaborative filtering) fundamentally rely on this same assumption. Malicious Attacks. The assumption that users do not change their behavior too quickly could, however, potentially be exploited by a malicious adversary. Such an adversary controlling many machine- operated user accounts could deceive the system by breaking this assumption. For example, all accounts controlled by the adversary could be sharing only true reviewed news items for an extended period of time and then suddenly share an un-reviewed fake one (or do the opposite, if the goal is to prevent a truthful news item from being disseminated). Even then, a successful attack would only enable the spread of the news item, without guaranteeing its virality. Moreover, the adversary runs a risk that the fake item will later be fact-checked and thus will appear in their UCRs, reducing the chances of repeating this attack with another fake item. In fact, the more popular such an item becomes (which is the likely goal of the adversary), the higher the chance of it being fact-checked. The trade-off between false positives and false negatives is expressed by the p0 parameter (see Section 2), i.e. the certainty required to flag an item as fake. A high value of p0 might make it easier for the adversary to "smuggle" fake items in the system, but makes it more difficult to prevent true news items from spreading. Updating of the Ground Truth. Like any vaccine, Credulix re- lies on a fraction of fake news to exist in the social network in order to be efficient. If Credulix stops the fake news from becoming viral, then the system might lack the ground truth to make future predictions. Hence, there might be periods when fake news can appear again. To avoid such fluctuations, Credulix' ground truth should be continuously updated with some of the most current fake news items. Credulix' evolution in time, including changes in user behavior as well as updating of the ground truth related to system dynamics, are research directions we are considering for future work. Filtering News. One could argue that removing some news items from users' news feeds might be seen as a limitation, even as a form of censorship. But social media already take that liberty as they display to users only about 10% of the news that they could show. Rather than censorship, Credulix should be viewed as an effort to ensure the highest possible quality of the items displayed, considering the credibility of an item to be one of the quality criteria. 6 RELATED WORK Credulix shares similarities with reputation systems [46, 61, 63], in creating profiles for users (UCRs in Credulix) and in assuming that the future behavior of users will be similar to their past behavior. In our approach, however, users are not rated directly by other users. Instead, we compute users' UCRs based on their reaction to what we consider ground truth (fact-checked items). Credulix also resembles recommender systems [23, 24, 29, 32, 48, 53, 54, 58, 62, 65] in the sense that it pre-selects items for users to see. Unlike in recommender systems, however, the pre-selection is independent of the requesting user. Our goal is not to provide a personalized selection. Another approach to detect fake news is to automatically check content [28]. Content analysis can also help detect machine-generated fake blogs [47] or social spam using many popular tags for irrele- vant content [56]. Another line of research has been motivated by the role of social networks for news dissemmination in the case of catastrophic events such as hurricanes and earthquakes[38, 42]. News item credibility can also be inferred by applying machine learning techniques [30], by using a set of reliable content as a training set [64], or by analyzing a set of predetermined features [37]. Other parameters of interest are linguistic quantifiers [69], swear words, pronouns or emoticons [36]. Yet, a malicious agent knowing these specific features could use them to spread fake news. Following the events of 2016, Facebook received much media attention concerning their politics about "fake news". Their first aproach was to assess news sources reliability in a centralized way [17]. Recently, Facebook launched community-based assesment ex- periment [18]: asking the users to evaluate the reliability of various news sources. The idea is to give more exposure to news sources that are "broadly trusted"'. Our approach is finer-grained and goes to the level of news items. Facebook also used third-party fact checkers to look at articles flagged by users. Dispute Finder [31] also takes a community approach asking users not only to flag claims they believe to be disputed, but also to link the disputed claim to a reliable source that refutes it. Credulix, does not look at concrete claims, but infers the trustworthiness of news items based on user behavior. Fact-checking tools can help to annotate documents and to cre- ate knowledge bases [20, 21, 33, 59, 60]. Automated verification of claims about structured data, or finding interesting claims that can be made over a given set of data has been researched as well [41, 70]. These tools facilitate the fact-checking process that Credulix relies on, but by themselves do not prevent the spreading of fake news. Curb [44], is algorithm that is close to Credulix in several aspects. Like Credulix, it leverages the crowd to detect and reduce the spread of fake news and misinformation and assumes a very similar user behavior model. Curb, however, focuses on the problem of which items to fact-check and when, relying on users to manually flag items. Curb only prevents the spreading of items that have been fact-checked. In addition, it assumes fact-checking to happen instantaneously, i.e., a fake item selected for fact-checking by Curb is assumed to stop spreading immediately, without taking into ac- count the considerable fact-checking delay. Credulix could benefit from Curb by using it as a fact-checking module. Limiting the Spread of Fake News on Social Media Platforms by Evaluating Users' Trustworthiness , , 7 CONCLUSIONS We presented Credulix, the first content-agnostic system to detect and limit the spread of fake news on social networks with a very small performance overhead. Using a Bayesian approach, Credulix learns from human fact-checking to compute the probability of falsehood of news items, based on who shared them. Applied to a real-world social network of 41M users, Credulix prevents the vast majority (over 99%) of fake news items from becoming viral, with no false positives. REFERENCES [1] [n. d.]. investigate-threat-democracy. news-presidential-election/. https://www.theguardian.com/media/2017/jan/29/fake-news-mps- [2] [n. d.]. http://money.cnn.com/2016/11/15/technology/facebook-google-fake- [3] [n. d.]. http://learningenglish.voanews.com/a/facebook-fake-news/3752639.html. [4] [n. d.]. http://money.cnn.com/2016/11/02/media/fake-news-stories/. [5] [n. d.]. http://nymag.com/selectall/2016/12/here-are-the-most-viral-fake-news- stories-of-2016.html. [6] [n. d.]. http://www.politifact.com/. [7] [n. d.]. https://www.snopes.com/. [8] [n. d.]. https://www.washingtonpost.com/news/fact-checker/. [9] [n. d.]. https://www.truthorfiction.com/. [10] [n. d.]. https://fullfact.org/. [11] [n. d.]. http://www.internetlivestats.com/twitter-statistics/. [12] [n. d.]. internet-activity/. http://www.zettasphere.com/mind-boggling-stats-for-1-second-of- sources. [13] [n. d.]. https://www.infoq.com/presentations/Twitter-Timeline-Scalability. [14] [n. d.]. http://www.bbc.com/news/magazine-38168281. [15] [n. http://www.reuters.com/article/us-france-election-cyber- d.]. idUSKBN15S192. [16] [n. d.]. https://www.washingtonpost.com/news/the-fix/wp/2016/11/22/a-harsh- truth-about-fake-news-some-people-are-super-gullible. [17] [n. d.]. https://www.washingtonpost.com/news/the- switch/wp/2018/01/19/facebook-will-now-ask-its-users-to-rank-news- organizations-they-trust. [18] [n. d.]. https://techcrunch.com/2018/01/19/facebooks-news-feed-update-trusted- [19] [n. d.]. Cassandra. http://cassandra.apache.org/. [20] [n. d.]. DocumentCloud. https://www.documentcloud.org/. [21] [n. d.]. Open Calais. http://opencalais.com/. [22] [n. d.]. Twissandra Twitter clone, build on top of Cassandra. https://github.com/ twissandra/twissandra/. [23] J. Ahn and X. Amatriain. 2010. Towards Fully Distributed and Privacy-Preserving Recommendations via Expert Collaborative Filtering and RESTful Linked Data. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, Vol. 1. [24] Xavier Amatriain, Neal Lathia, Josep M Pujol, Haewoon Kwak, and Nuria Oliver. 2009. A collaborative filtering approach based on expert opinions from the web. SIGIR. [25] Cigdem Aslay, Francesco Bonchi, Laks V. S. Lakshmanan, and Wei Lu. 2017. Revenue Maximization in Incentivized Social Advertising. VLDB (2017). [26] David Austen-Smith and Jeffrey S. Banks. [n. d.]. Information Aggregation, Rationality, and the Condorcet Jury Theorem. American Political Science Review. [27] Wei Chen, Chi Wang, and Yajun Wang. 2010. Scalable Influence Maximization for Prevalent Viral Marketing in Large-scale Social Networks. In ACM SIGKDD. [28] Giovanni Luca Ciampaglia, Prashant Shiralkar, Luis M. Rocha, Johan Bollen, Filippo Menczer, and Alessandro Flammini. 2015. Computational Fact Checking from Knowledge Networks. PLOS ONE (2015). [29] Gianmarco De Francisci Morales, Aristides Gionis, and Claudio Lucchese. 2012. From chatter to headlines: harnessing the real-time web for personalized news recommendation. In WSDM. [30] P. Dewan and P. Kumaraguru. 2015. Towards automatic real time identification [31] Rob Ennals, Beth Trushkowsky, and John Mark Agosta. 2010. Highlighting of malicious posts on Facebook. In PST. Disputed Claims on the Web. In WWW. [32] Kiran Garimella, Gianmarco De Francisc iMorales, Aristides Gionis, and Michael Mathioudakis. 2017. Mary, Mary, Quite Contrary: Exposing Twitter Users to Contrarian News. In WWW Companion. [33] François Goasdoué, Konstantinos Karanasos, Yannis Katsis, Julien Leblay, Ioana Manolescu, and Stamatis Zampetakis. 2013. Fact Checking and Analyzing the Web. In ACM SIGMOD. [34] Amit Goyal, Francesco Bonchi, and Laks V.S. Lakshmanan. 2008. Discovering Leaders from Community Actions. In CIKM. [35] Amit Goyal, Francesco Bonchi, and Laks V.S. Lakshmanan. 2010. Learning Influence Probabilities in Social Networks. In WSDM. [36] Aditi Gupta and Ponnurangam Kumaraguru. 2012. Credibility Ranking of Tweets During High Impact Events. In PSOSM. [37] Aditi Gupta, Ponnurangam Kumaraguru, Carlos Castillo, and Patrick Meier. 2014. TweetCred: Real-Time Credibility Assessment of Content on Twitter. In SocInfo. [38] Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: Characterizing and Identifying Fake Images on Twitter During Hurricane Sandy. In WWW. [39] Viet Ha-Thuc, Yelena Mejova, Christopher Harris, and Padmini Srinivasan. 2009. A relevance-based topic model for news event tracking. In SIGIR. [40] Viet Ha-Thuc, Yelena Mejova, Christopher Harris, and Padmini Srinivasan. 2010. News event modeling and tracking in the social web with ontological guidance. In ICSC. [41] Naeemul Hassan, Afroza Sultana, You Wu, Gensheng Zhang, Chengkai Li, Jun Yang, and Cong Yu. 2014. Data in, Fact out: Automated Monitoring of Facts by FactWatcher. VLDB (2014). [42] Muhammad Imran, Carlos Castillo, Fernando Diaz, and Sarah Vieweg. 2015. Processing Social Media Messages in Mass Emergency: A Survey. ACM CSUR (2015). [43] Maximilian Jenders, Gjergji Kasneci, and Felix Naumann. 2013. Analyzing and Predicting Viral Tweets. In WWW Companion. [44] Jooyeon Kim, Behzad Tabibian, Alice Oh, Bernhard Schölkopf, and Manuel Gomez Rodriguez. 2018. Leveraging the Crowd to Detect and Reduce the Spread of Fake News and Misinformation. In WSDM. [45] Karl-Rudolf Koch. 1990. Bayes' Theorem. Bayesian Inference with Geodetic Applications (1990). [46] Marios Kokkodis and Panagiotis G. Ipeirotis. 2013. Have You Done Anything Like That?: Predicting Performance Using Inter-category Reputation. In WSDM. [47] Pranam Kolari, Akshay Java, Tim Finin, Tim Oates, and Anupam Joshi. 2006. Detecting Spam Blogs: A Machine Learning Approach. In AAAI. [48] Danai Koutra, Paul N Bennett, and Eric Horvitz. 2015. Events and controversies: Influences of a shocking news event on information seeking. In WWW. [49] Haewoon Kwak, Changhyun Lee, Hosung Park, and Sue Moon. 2010. What is Twitter, a social network or a news media?. In WWW. [50] Janette Lehmann, Carlos Castillo, Mounia Lalmas, and Ethan Zuckerman. 2013. Finding news curators in Twitter. In WWW Companion. [51] Kristina Lerman and Tad Hogg. 2010. Using a model of social dynamics to predict popularity of news. In WWW. [52] Jure Leskovec and Andrej Krevl. 2014. SNAP Datasets: Stanford Large Network Dataset Collection. http://snap.stanford.edu/data. [53] Chen Lin, Runquan Xie, Lei Li, Zhenhua Huang, and Tao Li. 2012. Premise: Personalized news recommendation via implicit social experts. In CIKM. [54] Nathan N Liu, Xiangrui Meng, Chao Liu, and Qiang Yang. 2011. Wisdom of the better few: cold start recommendation via representative based rating elicitation. In RecSys. [55] Xiaoyan Lu and Boleslaw Szymanski. 2017. Predicting Viral News Events in Online Media. In IPDPSW. tion. In AIRWeb. [56] Benjamin Markines, Ciro Cattuto, and Filippo Menczer. 2009. Social spam detec- (1997). [57] Michael Mathioudakis and Nick Koudas. 2009. Efficient identification of starters and followers in social media. In EDBT. [58] Kensuke Onuma, Hanghang Tong, and Christos Faloutsos. 2009. TANGENT: a novel, 'Surprise me', recommendation algorithm. In KDD. [59] Ravali Pochampally, Anish Das Sarma, Xin Luna Dong, Alexandra Meliou, and Divesh Srivastava. 2014. Fusing Data with Correlations. In ACM SIGMOD. [60] Theodoros Rekatsinas, Amol Deshpande, Xin Luna Dong, Lise Getoor, and Divesh Srivastava. 2016. SourceSight: Enabling Effective Source Selection. In ACM SIGMOD. [61] Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Repu- tation Systems. Commun. ACM (2000). [62] Paul Resnick and Hal R Varian. 1997. Recommender systems. Commun. ACM [63] Marko A Rodriguez, Daniel J Steinbock, Jennifer H Watkins, Carlos Gershenson, Johan Bollen, Victor Grey, et al. 2007. Smartocracy: Social networks for collective decision making. In HICSS. [64] Kanda Runapongsa Saikaew and Chaluemwut Noyunsan. 2015. Features for International Scholarly and measuring credibility on facebook information. Scientific Research & Innovation (2015). [65] Xiaoyuan Su and Taghi M Khoshgoftaar. 2009. A survey of collaborative filtering techniques. Advances in artificial intelligence, Article 4 (2009). [66] Jie Tang, Jimeng Sun, Chi Wang, and Zi Yang. 2009. Social Influence Analysis in Large-scale Networks. In ACM SIGKDD. [67] Ming-Feng Tsai, Chih-Wei Tzeng, Zhe-Li Lin, and Arbee L. P. Chen. 2014. Dis- covering leaders from social network by action cascade. Social Network Analysis and Mining (2014). , , Oana Balmau, Rachid Guerraoui, Anne-Marie Kermarrec, Alexandre Maurer, Matej Pavlovic, and Willy Zwaenepoel [68] Sharan Vaswani, Branislav Kveton, Zheng Wen, Mohammad Ghavamzadeh, Laks V. S. Lakshmanan, and Mark Schmidt. [n. d.]. Model-Independent Online Learning for Influence Maximization. In Proceedings of the 34th International Conference on Machine Learning. [69] Marco Viviani and Gabriella Pasi. 2016. A Multi-criteria Decision Making Ap- proach for the Assessment of Information Credibility in Social Media. In WILF. [70] You Wu, Brett Walenz, Peggy Li, Andrew Shim, Emre Sonmez, Pankaj K. Agarwal, Chengkai Li, Jun Yang, and Cong Yu. 2014. iCheck: Computationally Combating "Lies, D -- ned Lies, and Statistics". In ACM SIGMOD. [71] Yang Yang, Jie Tang, Cane Wing-ki Leung, Yizhou Sun, Qicong Chen, Juanzi Li, and Qiang Yang. 2015. RAIN: Social Role-Aware Information Diffusion.. In AAAI. [72] Y. Yang, Z. Wang, J. Pei, and E. Chen. 2017. Tracking Influential Individuals in Dynamic Networks. IEEE Transactions on Knowledge and Data Engineering (2017). [73] Sandy L. Zabell. 1989. The rule of succession. Erkenntnis (1989).
1406.2909
2
1406
2015-06-11T13:23:11
Identification of Patient Zero in Static and Temporal Networks - Robustness and Limitations
[ "cs.SI", "physics.soc-ph" ]
Detection of patient-zero can give new insights to the epidemiologists about the nature of first transmissions into a population. In this paper, we study the statistical inference problem of detecting the source of epidemics from a snapshot of spreading on an arbitrary network structure. By using exact analytic calculations and Monte Carlo estimators, we demonstrate the detectability limits for the SIR model, which primarily depend on the spreading process characteristics. Finally, we demonstrate the applicability of the approach in a case of a simulated sexually transmitted infection spreading over an empirical temporal network of sexual interactions.
cs.SI
cs
Identification of Patient Zero in Static and Temporal Networks - Robustness and Limitations Nino Antulov-Fantulin Computational Biology and Bioinformatics Group, Division of Electronics, Rudjer Boskovi´c Institute, Zagreb 10000, Croatia Alen Lanci´c Faculty of Science, Department of Mathematics, University of Zagreb, Zagreb 10000, Croatia Computational Biology and Bioinformatics Group, Division of Electronics, Rudjer Boskovi´c Institute, Zagreb 10000, Croatia Tomislav Smuc Theoretical Physics Division, Rudjer Boskovi´c Institute, Zagreb 10000, Croatia and Catholic University of Croatia, Zagreb, Croatia Hrvoje Stefanci´c Mile Siki´c Faculty of Electrical Engineering and Computing, Department of Electronic Systems and Information Processing, University of Zagreb, Zagreb 10000, Croatia∗ and Bioinformatics Institute, A*STAR, Singapore 138671, Republic of Singapore (Dated: September 17, 2018) Detection of patient-zero can give new insights to the epidemiologists about the nature of first transmissions into a population. In this paper, we study the statistical inference problem of detecting the source of epidemics from a snapshot of spreading on an arbitrary network structure. By using exact analytic calculations and Monte Carlo estimators, we demonstrate the detectability limits for the SIR model, which primarily depend on the spreading process characteristics. Finally, we demonstrate the applicability of the approach in a case of a simulated sexually transmitted infection spreading over an empirical temporal network of sexual interactions. INTRODUCTION One of the most prevalent types of dynamic processes of public interest characteristic for the real-life complex networks are contagion processes [1 -- 7]. Epidemiologists detect the epidemic source or the patient-zero either by analysing the temporal genetic evolution of virus strains [8 -- 10], which can be time-demanding or try to do a con- tact backtracking [11] from the available observed data. However, in cases where the information on the times of contact is unknown or incomplete or the infection is asymptomatic or subclinical the backtracking method is no longer adequate. Due to its practical aspects and the- oretical importance, the epidemic source detection prob- lem on contact networks has recently gained a lot of at- tention in the complex network science community. This has led to the development of many different source de- tection estimators for static networks, which vary in their assumptions on the network structure (locally tree-like) or on the spreading process compartmental models (SI, SIR) [12 -- 21] or both. In the case of the SIR model (Susceptible-Infected- Recovered) there are two different approaches. Zhu et. al. proposed a sample path counting approach [15], where they proved that the source node minimizes the maximum distance (Jordan centrality) to the infected nodes on infinite trees. Lokhov et. al. used a dynamic message-passing algorithm (DMP) for the SIR model to estimate the probability that a given node produces the observed snapshot. They use a mean-field-like approx- imation (node independence approximation) and an as- sumption of a tree-like contact network to compute the source likelihoods [17]. Altarelli. et. al. remove the independence assumption and use the message passing method with an assumption of a tree-like contact network to estimate the source [18]. In our study, we drop all the network structure and node independence assumptions and analyse the source probability estimators for general compartmental models. The main contributions of our paper are the following: (i) we developed the analytic combinatoric, as well as the Monte-Carlo methods (Direct and Soft Margin) for determining exact and approximate source probability distribution, and have also produced the benchmark so- lutions on the 4-connected regular lattice structure; (ii) we measured the source detectability by using the normalized Shannon entropy of the estimated source probability distribution for each of the source detection problems, and have observed the existence of some highly detectable, as well as some highly undetectable regimes for the SIR and other spreading models. We notice that the detectability primarily depends on the spreading pro- cess characteristics; (iii) using the simulations of the sexually transmitted infection (STI) on a realistic time interval of 200 days on an empirical temporal network of sexual contacts we demonstrate the robustness of the Soft Margin source estimator. METHODS In a general case, the contact-network during an epi- demic process can be temporal and weighted, but we first concentrate our analysis on a static undirected and non- weighted network G = (V, E), where V denotes a set of nodes and E denotes a set of edges. The random bi- nary vector ~R indicates which nodes got infected up to a certain time T . For the contagion model, we use the SIR model with the simultaneous updates in time de- scribed by the probability p that an infected node infects a susceptible neighbour node in one discrete step and the probability q that an infected node recovers in one dis- crete step. We observe one epidemic realization ~r∗ of ~R at a time T of the SIR process (p, q, T ) on a network G and want to calculate the source posterior probabilities P (Θ = θi ~R = ~r∗). We have developed two complemen- tary approaches that can provide exact posterior proba- bility distributions over nodes in the spreading realization ~r∗ via the Bayesian approach: the direct Monte-Carlo ap- proach and analytical combinatoric approach. Using the direct Monte-Carlo approach, for each potential source node i (infected node in the realiza- tion ~r∗), a large number n of epidemic spreading sim- ulations with maximum duration T is performed with i as an epidemic source. The number of simulations ni which coincides with the realization ~r∗ is recorded. To cut down on the extensive calculation required for the Monte-Carlo simulations, we employ a pruning mecha- nism (no errors introduced), stopping the simulations at t < T if the current simulation realization has infected a node which is not infected in ~r∗. The probability of the node i being the source of the epidemic is then calculated as P (Θ = θi ~R = ~r∗) = ni/Pj nj. The statistical sig- nificance of the direct Monte-Carlo results are controlled with the convergence conditions. For more information, see SI section 2. An alternative approach, the analytical combina- toric approach assigns to each node of degree n a gen- erating function which is maximally (n + 1)-dimensional, which captures the events of node first infection and infection spreading through its edges at specific times. Then, by multiplication of the generating functions of all the infected nodes from a realization, we are able to 2 FIG. 1. Plots A, B and C: Box plots depicting distribution of entropy values (H) of source probability distributions for a number of randomly generated spreading realizations across with different (p, q) parameters on the 4-connected lattice: N = 30 × 30 nodes with T = 5, calculated by the direct Monte-Carlo method with 106 − 108 simulations per source. merge all contributions together and get the source prob- ability distribution. In the SI section 1, along with the detailed description of analytical combinatoric method, we demonstrate the correspondence between the direct Monte-Carlo and analytical combinatorics. The detailed description of analytical combinatoric method can be found in SI section 1. A serious disadvantage of the analytical method is that the calculations become pro- hibitively intricate in the case of non tree-like configura- tions. We have generated a series of benchmark cases on a 4-connected lattice (N = 30 × 30), for which we have calculated the probability distributions over the poten- tial source candidates using the direct Monte-Carlo esti- mator (see the SI section 4). The source detectability D(~r∗) = 1 − H(~r∗), is characterized via the normalized Shannon entropy H (normalization by entropy of uni- form distribution) of the calculated probability distribu- tion P (Θ = θi ~R = ~r∗). Results depicting distributions of H for different parts of the SIR parameter space for the regular lattice are given in Figure 1 plots A, B and C. Figures show quali- tatively the same detectability behaviour across p param- eter, for different values of parameter q. It is important to observe the existence of three different regions: low detectability-high entropy region (p < 0.2), intermediate detectability-intermediate entropy region (0.2 < p < 0.7) and high detectability-low entropy region (p > 0.7). We observe that the detectability transition is still present 3 between a fixed realization ~r∗ and a random vector real- ization that comes from SIR process with the source θ. The empirical cumulative distribution function of the n samples from the random variable ϕ( ~r∗, ~Rθ) is denoted Fθ(x), where x is the value of the similarity variable. By taking the derivative of Fθ(x), we get the PDF estimate: fθ(x) = d dx Fθ(x) = 1 n n Xi=1 δ (x − ϕ( ~r∗, ~rθ,i)) , (1) where δ(x) denotes the Dirac delta distribution. Having defined the PDF for the observed similarities fθ(x), we can now define the main Soft-Margin inference expression as: P ( ~R = ~r∗Θ = θ) = Z 1 0 wa(x) fθ(x)dx, (2) where wa(x) is a weighting function. We use the following Gaussian weighting form: wa(x) = exp(−(x−1)2/a2). In the limit where the parameter a → 0, we obtain the direct Monte-Carlo likelihood estimation. For cases when the parameter a > 0, we obtain an estimator which estimates the likelihood by using the weighting function wa(x) to accept contributions from realizations whose similarity to observed realization is less than 1. Using the property of delta distribution, we simplify the expression for the Soft Margin estimator to (for more details see SI section 5): P ( ~R = ~r∗Θ = θ) = 1 n exp(cid:18) −(ϕ( ~r∗, ~rθ,i) − 1)2 a2 (cid:19) . n Xi=1 (3) Note, that alternative view on the Soft margin estimator is the non-parametric density estimation with the Gaus- sian kernels [22]. Finally, we do not need to set the Soft Margin width parameter a in advance. After we calcu- late the estimated PDF for every potential source Fθ(x), we can choose the parameter a as the infimum of the set of parameters for which the PDFs have converged. The implementation details, time complexity analysis and pruning mechanism for the Soft Margin estimator can be found in the SI sections 5, 6 and 7. RESULTS We now demonstrate the applicability of our inference framework to detect the source of the simulated STI epi- demic spreading in an empirical temporal network of sex- ual contacts in Brazil (see Figure 3 plot A). This pub- licly available dataset [23] was obtained from Brazilian Internet community and is used as an approximation of temporal sexual contacts. The dataset (see SI section 8) consists out of the triplets (vi, vj, t), which represents the event that the nodes vi and vj had a sexual interaction at FIG. 2. Plots A, B and C: Box plots depicting distribution of entropy values (H) of source probability distributions for a number of realizations starting from the central node denoted with red colour on the 4-connected lattice with different sizes (3 × 3, 5 × 5 and 7 × 7) with the SIR model for q = 0.5, T = 5 and different p values, calculated with the Soft Margin method with the (104 - 106) simulations per source and adaptive a chosen from the convergence condition. even for different spreading models (SI, ISS, IC) and we observe the interplay of the network size and stopping time T on the detectability (see SI section 10 and Fig- ure 2). In Figure 2, plot A, we observe that in a regime, when the network size restricts the epidemic spreading but not the epidemic itself via its natural evolution char- acterized by the parameters (p, q) or stopping time T , the entropy is high as the realizations from different sources are almost identical. As application of direct Monte-Carlo and analytical combinatoric approaches becomes prohibitively expen- sive for realistic network sizes, we formulate an estimator which is much more efficient in approximating the true underlying source probability distribution for the partic- ular epidemic spread. We continue with the definition of the Soft-Margin estimator, a generalization of the Monte-Carlo inference method, in which direct Monte- Carlo method represents a limiting case. In order to pro- ceed we first need to introduce some useful definitions. The random binary vector ~Rθ describes the outcome of epidemic process and sample vectors: {~rθ,1, ..., ~rθ,n} de- scribe n independent outcomes of that process. Each sample vector ~rθ,i is obtained using the Monte Carlo sim- ulation of the contagion process with the θ as the source. We measure the similarity between vectors ~r1 and ~r2 by the Jaccard similarity function ϕ : (RN × RN ) → [0, 1] calculated as the ratio of the size of the interaction of set of infected nodes in ~r1, ~r2 and the size of their union. The random variable ϕ( ~r∗, ~Rθ) measures the similarity 4 by marginalization procedure (see SI section 5). The re- laxation of knowing the starting point of the epidemic t0 is done by using the marginalization over time, sampling over all possible starting points t0 from a uniform prob- ability distribution over [t0 − ǫ, t0 + ǫ], 2ǫ = {0, 50, 100} days. In Figure 3 plot C, we show the summary results from 500 independent experiments, when the starting time t0 was chosen from the interval of [100 − 200] days, the end of the epidemic was set to the day t = 300 and using different uniform priors (ǫ) for the moment t0. Us- ing the uniform uncertainty of ǫ = 50 days, we can still detect the source within its first neighbourhood (distance 0 and 1 from the source) in approximately 60% of exper- iments. These results are of great practical importance, since in reality we do not know the exact starting times, but rather only an upper and a lower bound on starting point. Next, we demonstrate how the uncertainty in the tem- poral orderings of interactions within a time window of the length ∆ affects the performance of source detection. We use a randomization algorithm which permutes time stamps inside of a bin of ∆ days from the start to the end of the contact interaction network in a non-overlapping way. From Figure 3, plot D, we observe that higher un- certainty in orderings (higher ∆) reduces the detectabil- ity of the source of infection. However, the estimation framework is robust to small-scale interaction noise. We have also shown that our Soft Margin algorithm es- timates source probabilities with much higher precision than other estimators (Jordan and DMP estimator) on benchmark cases by comparing the results against the di- rect Monte-Carlo source probability estimations on regu- lar lattice (see SI section 3). Results for source detection for different values of (p, q) parameters and for the case when only a random subset of the node states is observed can be found in SI section 9. DISCUSSION The assumption about missing dynamic information about times of infection or recovery in our case study seems rather plausible for two realistic cases: STI infec- tions and computer viruses. Many STIs generate silent epidemics since many of them are unrecognized, asymp- tomatic or subclinical as the pathogens are being trans- mitted from patients with mild or totally absent symp- toms. A large number of people with STIs: chlamydia [24], gonorrhea [24], Human papillomavirus and other show mild or no symptoms at all. The second motivation comes from silent spreading of a certain class of computer viruses and worms through computer networks which be- come active simultaneously on a specific date. Unlike other approaches [12 -- 21], we identified different source detectability regimes and our methodology is applicable to arbitrary network structures, and is limited solely by FIG. 3. Plot A: Visualization of a part of the aggregated em- pirical temporal network of sexual contacts in Brazil [23]. In plots B,C and D the performance is measured as the fraction of 500 experiments with specific graph distance of the max- imum likelihood candidate to the true source. The average execution time of a single experiment to calculate source prob- ability distribution over all potential candidates was around 12 seconds (on 50 cpu cores) with 20000 STI simulations per node. Plot B: The baseline performance of a random esti- mator, which uniformly assigns likelihood to potential nodes. Plot C: The influence of prior knowledge about initial out- break moment [t0 − ǫ, t0 + ǫ] of the outbreak on performance. Plot D: The influence of randomized temporal ordering of in- teractions within ∆ days, with ǫ = 0 (we know the starting time t0) on performance. a time t. First 1000 days in original dataset are discarded due to the transient period with sparse encounters [23] and therefore all temporal moments are measured rela- tive to day 1000, as have done the authors in the original study [23]. For our temporal network, we use the SIR model (p = 0.3, q = 0.01) for STI. The upper limit of the transmission probability for the STI that was previously used on this contact network is p = 0.3 [23]. The recovery parameter q = 0.01 represents a disease with the mean recovery of 100 days. Note that here the calculation of exact source proba- bility distributions is computationally too demanding for both the direct Monte-Carlo and the analytical combina- toric method. Therefore, we use the Soft Margin esti- mator with the smallest width a for which the ML node probability estimate converged. Our experiments consist of two parts: (i) simulation of STI spreading through a temporal network of sexual contacts and (ii) detection of the patient zero from the observed process. In order to demonstrate applicability of the approach in realistic conditions, we introduce uncertainty in the epidemic starting time t0, and later on also with respect to node states in observed epidemic realization. Note, that uncertainties in (p, q) parameters can also be relaxed the ability to computationally produce realizations of the particular contagion process. ACKNOWLEDGMENTS The authors would like to thank: Professor Dirk Brockmann for valuable discussions about the epidemic source detection problems during internship of NAF at the Robert Koch-Institute in Berlin, Germany. For proofreading the manuscript we would like to thank: Vinko Zlati´c, Sebastian Krause and Ana Bulovi´c. The work is financed in part by: the Croatian Science Founda- tion under the project number I-1701-2014, the EU-FET project MULTIPLEX under the grant number 317532 and the FP7-REGPOT-2012-2013-1 InnoMol project un- der the grant number 316289. Disclaimer: The authors of this study used the pub- lished existing dataset of sexual contacts in high-end prostitution because it contains valuable and rarely avail- able information on temporal network of contacts serving as pathways of STD spreading. It is important to note that the use of this dataset does not reflect the authors' views, opinions and attitudes on prostitution and it does not in any way imply that the authors support the activ- ities documented in the dataset or the way the data were gathered. ∗ Corresponding mail: [email protected] [1] A. Vespignani, Nat Phys 8, 32 (2012), ISSN 1745-2473, URL http://dx.doi.org/10.1038/nphys2160. [2] W. Broeck, C. Gioannini, B. Goncalves, M. Quag- and A. Vespignani, BMC (2011), URL giotto, V. Colizza, Infectious Diseases http://www.biomedcentral.com/1471-2334/11/37. (2011) 11, 37 C. M. Schneider, [3] M. Tizzoni, P. Bajardi, A. Decuyper, G. Kon V. Blondel, Kam King, and V. Colizza, Z. Smoreda, M. C. Gonzlez, PLoS Comput Biol 10, (2014), URL http://dx.doi.org/10.1371%2Fjournal.pcbi.1003716. and A. Vespig- URL [4] V. Colizza, R. P. Phys Satorras, 3, nani, http://dx.doi.org/10.1038/nphys560. e1003716 (2007), Nat 276 [5] C. Castellano and R. Pastor-Satorras, Phys Rev Lett 105, 218701 (2010). [6] R. Pastor-Satorras and A. Vespignani, Phys. Rev. Lett. 86, 3200 (2001). [7] N. Antulov-Fantulin, A. Lancic, fancic, and M. Sikic, Information H. Ste- Sciences 239, http://dx.doi.org/10.1016/j.ins.2013.03.036. ISSN 0020-0255, (2013), 226 5 URL [8] M. Worobey, G.-Z. Han, and A. Rambaut, Pro- Sciences ISSN 1091-6490, URL ceedings pp. http://dx.doi.org/10.1073/pnas.1324197111. the National Academy 201324197+ (2014), of of [9] X. Du, L. Dong, Y. Lan, Y. Peng, A. Wu, Y. Zhang, W. Huang, D. Wang, M. Wang, Y. Guo, et al., Nature Communications 3, 709 (2012), URL http://dx.doi.org/10.1038/ncomms1710. and 9, S. D. W. [10] E. M. Volz Biol PLoS Comput URL http://dx.doi.org/10.1371%2Fjournal.pcbi.1003397. [11] D. M. Auerbach, W. W. Darrow, H. W. Jaffe, of ISSN 0002-9343, URL and J. W. Curran, The American Journal Medicine 76, 487 http://dx.doi.org/10.1016/0002-9343(84)90668-5. Frost, (2013), e1003397 (1984), [12] D. Shah and T. Zaman, the on ACM SIGMETRICS Measurement systems (ACM, New York, NY, USA, 2010), SIGMETRICS '10, ISBN 978-1-4503-0038-4, URL http://doi.acm.org/10.1145/1811039.1811063. in Proceedings of conference and modeling pp. 203 -- 214, international computer of [13] W. Dong, W. Zhang, and C. W. Tan, in Proceedings of the IEEE Intl. Symp. on Information Theory 2013 (2013), URL http://dx.doi.org/10.1109/ISIT.2013.6620711. [14] Z. Wang, W. Dong, W. Zhang, and C. W. Tan, SIGMET- RICS Perform. Eval. Rev. 42, 1 (2014), ISSN 0163-5999, URL http://doi.acm.org/10.1145/2637364.2591993. in IEEE/ACM Transactions (2014), vol.PP, no.99, pp.1, URL on Networking http://dx.doi.org/10.1109/TNET.2014.2364972. [15] K. Zhu and L. Ying, [16] P. C. Pinto, P. Thiran, and M. Vetterli, Phys- ical Review Letters 109, 068702+ (2012), URL http://dx.doi.org/10.1103/PhysRevLett.109.068702. [17] A. Y. Lokhov, M. M´ezard, H. Ohta, and L. Zde- 012801 (2014), URL borov´a, Phys. Rev. E 90, http://link.aps.org/doi/10.1103/PhysRevE.90.012801. A. Altarelli, [18] F. A. Phys. Rev. Lett. http://link.aps.org/doi/10.1103/PhysRevLett.112.118701. Dall'Asta, Zecchina, (2014), URL Lage-Castellanos, and 118701 Braunstein, L. R. 112, [19] N. Antulov-Fantulin, A. Lancic, H. Stefancic, M. Sikic, and T. Smuc, Proceedings of 2014 IEEE Eighth and International Conference Self-Organizing Systems Workshops (2014), URL http://dx.doi.org/10.1109/SASOW.2014.35. Self-Adaptive on [20] C. H. Comin and L. da Phys. http://link.aps.org/doi/10.1103/PhysRevE.84.056105. (2011), 056105 Rev. 84, E Fontoura Costa, URL [21] D. Brockmann and D. 342, http://dx.doi.org/10.1126/science.1245200. (2013), ISSN 1337 Helbing, 1095-9203, Science URL [22] J. S. Marron and D. Nolan, Statistics & Probability Let- ters 7, 195 (1988). [23] L. E. C. Rocha, F. Liljeros, and P. Holme, PLoS Comput Biol 7, (2011), URL http://dx.doi.org/10.1371%2Fjournal.pcbi.1001109. [24] E. L. Korenromp et al., Int J STD AIDS 13, 91 (2002). e1001109
1506.01760
1
1506
2015-06-05T01:13:54
Predicting Neighbor Distribution in Heterogeneous Information Networks
[ "cs.SI", "physics.soc-ph" ]
Recently, considerable attention has been devoted to the prediction problems arising from heterogeneous information networks. In this paper, we present a new prediction task, Neighbor Distribution Prediction (NDP), which aims at predicting the distribution of the labels on neighbors of a given node and is valuable for many different applications in heterogeneous information networks. The challenges of NDP mainly come from three aspects: the infinity of the state space of a neighbor distribution, the sparsity of available data, and how to fairly evaluate the predictions. To address these challenges, we first propose an Evolution Factor Model (EFM) for NDP, which utilizes two new structures proposed in this paper, i.e. Neighbor Distribution Vector (NDV) to represent the state of a given node's neighbors, and Neighbor Label Evolution Matrix (NLEM) to capture the dynamics of a neighbor distribution, respectively. We further propose a learning algorithm for Evolution Factor Model. To overcome the problem of data sparsity, the learning algorithm first clusters all the nodes and learns an NLEM for each cluster instead of for each node. For fairly evaluating the predicting results, we propose a new metric: Virtual Accuracy (VA), which takes into consideration both the absolute accuracy and the predictability of a node. Extensive experiments conducted on three real datasets from different domains validate the effectiveness of our proposed model EFM and metric VA.
cs.SI
cs
Predicting Neighbor Distribution in Heterogeneous Information Networks Yuchi Ma∗ Ning Yang† Chuan Li‡ Lei Zhang§ Philip S. Yu¶k Abstract Recently, considerable attention has been devoted to the prediction problems arising from heterogeneous information networks. In this paper, we present a new prediction task, Neighbor Distribution Prediction (NDP), which aims at predicting the distribution of the labels on neighbors of a given node and is valuable for many different applications in heterogeneous information networks. The challenges of NDP mainly come from three aspects: the infinity of the state space of a neighbor distribution, the sparsity of available data, and how to fairly evaluate the predictions. To address these challenges, we first propose an Evolution Factor Model (EFM) for NDP, which utilizes two new structures proposed in this paper, i.e. Neighbor Distribution Vector (NDV) to represent the state of a given node's neighbors, and Neighbor Label Evolution Matrix (NLEM) to capture the dynamics of a neighbor distribution, respectively. We further propose a learning algorithm for Evolution Factor Model. To overcome the problem of data sparsity, the learning algorithm first clusters all the nodes and learns an NLEM for each cluster instead of for each node. For fairly evaluating the predicting results, we propose a new metric: Virtual Accuracy (VA), which takes into consideration both the absolute accuracy and the predictability of a node. Extensive experiments conducted on three real datasets from different domains validate the effectiveness of our proposed model EFM and metric VA. 1 Introduction As part of the recent surge of research on information networks, considerable attention has been devoted to prediction problems in heterogeneous information net- works. The existing researches, however, mainly focus just on the predictions around a single link. For exam- ∗School of Computer Science, Sichuan University, Chengdu, China. [email protected] †Corresponding author. School of Computer Science, Sichuan University, Chengdu, China. [email protected] ‡School of Computer Science, Sichuan University, Chengdu, China. [email protected] §School of Computer Science, Sichuan University, Chengdu, China. [email protected] ¶Department of Computer Science, University of Illinois at Chicago, Chicago, USA. [email protected] kInstitute for Data Science, Tsinghua University, Beijing, China. ple, some works are interested in predicting whether or when a link will be built in the future [4, 6, 7, 16, 14, 12], and some works concern predicting strength of a link, such as predicting the ratings that customers will give to items or locations [9, 11, 3, 2]. Existing researches sur- prisingly pay little attention to the prediction of neigh- bor distributions, where states of neighbors are consid- ered as a whole. Romance Action Crime Movie Genre : Romance Movie 1 User A Movie Genre : Action Crime Movie 2 Neighbor Distribution of User A Figure 1: Neighbors Distribution Fig. 1 offers an illustration of neighbor distribution. The left part of Fig. 1 illustrates User A has two movie nodes as its neighbors, which means User A rented two movies. The neighbor distribution of node User A is the distribution of labels on its neighbor nodes, as shown by the right part of Fig. 1, where the neighbors of a given node have equal weight, and the weight of a neighbor node is uniformly divided by its labels. The neighbor distribution of a node usually evolves over time. For example, a user might rent movies of different genres as his/her taste changes. Such evolution makes the prediction of neighbor distributions valuable for many different applications. if Motivating Example For an online sports video provider, the type distribution of subscribers is crucial to develop its sales strategy. The provider may be misled, it only takes the recent sales data into consideration, and ignores the evolutionary feature of the type distribution. For example, the soccer fans are the major subscribers on May 2014, which may lead the provider to put more soccer advertisements online. However, the soccer fans are increasing slowly on May, and become the major subscribers on June 2014, as the opening of four-yearly soccer celebration "World Cup". Traditional recommender system methods may ignore the tiny increase of soccer fans on May. In this paper, we aim at the problem of predict- ing the neighbor distribution of a given node in a het- erogeneous information network, which has three main challenges we have to overcome: propose a prediction metric in Section 4. We present the experimental results and analysis in Section 5. Finally, we discuss related works in Section 6, and conclude in Section 7. • Infinite state space of neighbor distribu- tions Since the fraction of a label is a real value, the number of possible states of a neighbor distribution is theoretically infinite. Traditional temporal models such as Markov chain cannot serve our goal because they of- ten assume a finite state space. • Sparsity of heterogeneous links In most cases, the links between one specific node and its heteroge- neous neighbors are relatively sparse compared with the huge volume of a whole data set, e.g., "publish- ing" in DBLP, "rating" in Netflix and "checking in" in Foursquare. The sparsity of links between heteroge- neous nodes makes it harder to mine sufficient mean- ingful patterns for individuals. • Fairly evaluating predictions Not all nodes are equally predictable, hence the traditional metrics that just take absolute accuracy into account are unable to appropriately assess the predictions for the nodes that are less predictable. We need a new metric that can treat every node fairly. In this paper, inspired by the idea of Factor Model [17, 18], we propose an Evolution Factor Model (EFM) to accurately predict neighbor distributions from the sparse data. Our main contributions can be summarized as follows: (1) We introduce an Evolution Factor Model (EFM) for accurately predicting neighbor distributions. EFM employs our proposed data structures, Neighbor Distribution Vector (NDV) and Neighbor Label Evolution Matrix (NLEM), to represent the infinite state space of a neighbor distribution and capture the evolution of neighbor distributions respectively. (2) We propose a new prediction metric, Virtual Ac- curacy (VA), which takes into consideration both the absolute accuracy and the difficulty of a pre- diction to fairly evaluate the prediction results of nodes with different predictabilities. (3) We conduct extensive experiments on three real datasets, and compare EFM with an empirical method and two existing methods. The results validate the performance of our proposed model, algorithm and accuracy metric. The rest of this paper is organized as follows. We give the problem definition and formalization in Section 2. In Section 3, we describe our prediction model EFM, and further present the learning algorithm for EFM. We discuss the predictability of nodes and 2 Problem Definition 2.1 Heterogeneous Information Network A het- erogeneous information network contains multiple types of objects and links. In this paper, we only consider those heterogeneous information networks with star net- work schema [13], i.e., links only exist between the cen- ter type of nodes as target nodes, and several other types of nodes as attribute nodes. For example, in Location Based Social Network, the target nodes are users, and the attribute nodes can be venues, ratings or tips. We denote the heterogeneous information networks with star network schema by G = hV, Ei, where V is the node set and E is the link set. We denote the target and attribute node set by X ⊂ V and U ⊂ V respectively. The nodes and the links in networks are being constructed and destructed over time. In order to capture the dynamics, we use time window, which is denoted by T , to capture the neighbor distribution with timeliness from dynamic networks. The node set and the attribute node set in T are denoted by VT and UT . We use Th, Tc and Tf to represent the historical, current and future time windows respectively. 2.2 Label Distribution Vector Assuming the universal label set of a given attribute node set U is denoted by βU = nβ(1) U , ..., β(i) U , ..., β(n) U o, where β(i) is a label, and n is the number of label types, U the definition of label distribution vector is given as follow: Distribution Definition 2.1. Label Vector (LDV) For a given attribute node u ∈ U, its LDV, −→v u ∈ Rn, is defined as: −→v u = (v(1) u , ..., v(n) u , ..., v(i) u ), (2.1) where n is the number of all attribute nodes' label types; Iu(β(i) U ) ) is 1 if u has the label β(i) v(i) u = k=1 Iu(β(k) U U ) and 0, otherwise. , Iu(β(i) U Pn , LDV measures the label distribution of an attribute node, which is fixed. For example, the labels of an article are subject areas, thus the LDV depicts the direction of this article. 2.3 Neighbor Distribution Vector Definition 2.2. Neighbor Distribution Vector (NDV) For a given target node x ∈ X , the NDV of x's attribute node neighbors U′T ⊆ UT in time window T , −→w x(U′T ) ∈ Rn, is defined as: (2.2) x , ..., w(n) x ), −→w x(U′T ) = (w(1) Pu∈U ′ T+n U ′ (v(i) where n is the number of the given attribute nodes' label types; w(i) u )+1 x = T , i ∈ [1, n]. Hereinafter, we just denote a NDV by −→w x if the context is unambiguous. Note that: (1) For smoothing, we add 1 in the numerator and n in the denominator of w(i) x . (2) A node has an NDV corresponding to each different type of attribute node neighbors. For example, in DBLP, there are two type of attribute nodes, which are "Articles" and "Journals"; therefore, the target node "Scholar" should have two NDVs, one for its "Article" neighbors and the other for its "Journal" neighbors. 2.4 Problem Statement Based on NDV, we can formally state the problem of Neighbor Distribution Prediction (NDP) as follow : Assigned the historical, current and future time window Th, Tc and Tf respectively, given a target node x and its NDV of x's attribute node neighbors U in time window Th and Tc, we want to predict −→w x(U′Tf ). 3 Evolution Factor Model In this section, we describe our Evolution Factor Model (EFM). At first, we briefly introduce the basic idea of Factor Model. 3.1 Evolution Factor Model Recommender system methods based on latent factor matrix model take the data in historical and current time window as a whole, but dismiss the evolution of the network. In order to capture the dynamics, Evolution Factor Model first stores the probability of changes from one label to another, which leads to the following definition of Neighbor Label Evolution Matrix (NLEM). Definition 3.1. Neighbor Label Evolution Ma- trix For a given node x, its Neighbor Label Evolution Matrix of attribute nodes U from time window Tp to Tq, ∈ Rn×n, is a matrix in which a denoted by L cell Lx(i, j) is the probability that x's neighbor label changes from β(j) to β(i), i.e., <U ′ ,U ′ Tp Tq > x (3.3) Lx(i, j) = P (β(i)β(j)). the transformation of its historical NDV, −→w x(U′Th+Tc) <U ′ x Th ,U ′ Tc > , which leads to our EFM through its NLEM L as follows: (3.4) −→w x(U′Tf ) = L <U ′ x Th ,U ′ Tc > × −→w x(U′Th+Tc). DB ML DM IP DB ML DM IP DB ML DM IP 0.251 Scholar A DB ML DM 0.22 0.22 0.55 0.02 IP 0.058 NLEM Scholar B The Predicted NDV DB ML DM IP DB ML DM IP 0.7 0.2 0.1 0 Scholar A 0 0.2 0 0.8 Scholar B The Historical NDV Figure 2: An example of Evolution Factor Model Fig. 2 gives an example that shows how EFM In Fig. 2, there are four labels representing works. different research directions: DB (Data Base), ML (Ma- chine Learning), DM (Data Mining), IP (Image Process- ing). A cell (i, j) of NLEM represents the probability that scholars change their research directions from i to j. By given an NLEM learned from historical data, and the current NDVs of Scholar A and Scholar B, we can infer their next NDVs by transforming their historical NDVs by the learned NLEM. Note that the essence of the matrix product in EFM is different from that in a general factor model. In a general factor model, the matrix product is static, which consider the data in historical and current time window as a whole. In contrast, NLEM, in our EFM, which can capture the changes from historical time window to current time window agilely, and changes as the given target node's neighbor labels evolve over time. 3.2 Model Learning To overcome the issue of data sparsity, in the light of the heuristic knowledge that similar individuals have similar behaviors, we first apply a clustering algorithm to all the target nodes, and learn the NLEM for the cluster which x belongs to. According to this idea, given target node x and the node set X ′ consisting of the nodes belonging to the same cluster of x, we can learn NLEM as follow: Evolution Factor Model Based on NLEM, for a ) as given target node x, we can predict its NDV −→w x(U′Tf (3.5) L <U ′ x Th ,U ′ Tc > = argmin L X x′∈X ′ ǫ2, ). where ǫ = c−→w x′(U′Tc ) − −→w x′ (U′Tc), L ∈ Rn×n, c−→w x′(U′Tc ) = L × −→w x′(U′Th Note that c−→w x′(U′Tc ) is an estimate of −→w x′(U′Tc ) for target node x′. So NLEM is actually defined as the optimal matrix that minimizes the overall error of the estimates over all target nodes in X . Thus, for learning NLEM, we adopt least square method to establish linear regression, indicating the NDVs in Th and Tc as follows: the similarities are measured by Euclidean distances between NDVs. The selection of K is discussed in Section V. 3.3 Prediction Given a target node x, its NDV −→w x(U′Th+Tc ) and the , the prediction of −→w x(U′Tf learned NLEM L can be made by EFM(Equation (3.4)). <U ′ ,U ′ Th Tc > ) x <U ′ x Th ,U ′ Tc > = (X T X)−1X T Y, 4 Prediction Metric (3.6) L where ) ... X =  X (1) = −→w x(1) (U′Th  X (N ) = −→w x(N ) (U′Th Y =  Y (1) = −→w x(1) (U′Tc )  Y (N ) = −→w x(N )(U′Tc) ...     ) , . The learning algorithm for EFM is shown in Algorithm 1. Algorithm 1 (x, Th, Tc,XTh ,XTc ,U, K) INPUT: Learning Algorithm for EFM x: A given node; Th: Assigned historical time window; Tc: Assigned current time window; XTh : A subset of X in time window Th; XTc : A subset of X in time window Tc; U: The given attribute node set; K: The parameter of K-means; OUTPUT: ,U ′ <U ′ Th Tc L x > : The NLEM needed to be learned; ) and −→w x′(U′Tc ); tween −→w x′(U′Th ); 1: X ′ = Φ, X = 0, Y = 0, W = {x′ x′ ∈ XTh ,XTc}; 2: for each x′ ∈ W do 3: Compute −→w x′(U′Th 4: end for 5: Do K−means on W based on the similarities be- 6: X ′ = {the nodes of the cluster that x belongs to}; 7: for i = 1 to X ′ do 8: X (i) = −→w x(i) (U′Th ); Y (i) = −→w x(i) (U′Tc ); ,U ′ according to Equation (3.6), where inverse matrix is computed by Gauss Jordan method; 9: 10: end for 11: Compute L <U ′ Th Tc > x In our learning algorithm, any classical clustering algorithm is qualified for our learning algorithm. We choose K-means as the clustering algorithm, where 4.1 Normalized Absolute Accuracy We can intuitively measure the absolute accuracy of pre- dictions for the given node x in terms of the Euclidean distance between a true −→w x and its estimate c−→w x. By Definition 2, components of an NDV are positive and the sum of them is equal to 1, so the Euclidean distance between any two NDVs is less than or equal to √2. Then we can define the normalised absolute accuracy as follow: (4.7) ηx = 1 − d( b−→w x,−→w x) √2 , where d(c−→w x,−→w x) is the Euclidean distance between c−→w x and −→w x. 4.2 Predictability As we have mentioned, it is unfair to assess a prediction just in terms of absolute accuracy, since the predictabil- ity of nodes are different. Intuitively, the predictability of a node is relevant to its susceptibility to the similar homogeneous nodes. Specifically, the easier the node can be influenced by others, the more disordered its temporal pattern is, and the greater its predictability is. For example, in a given research field, the leading scholars' directions are dif- ficult to capture, because they change their research directions rarely and such changes are mainly break- throughs. These changes can hardly be predicted com- pared with their long-term stable studies. In contrast, the research direction of a PhD candidate is more likely influenced by his/her supervisor or the leading scholars. Inspired by this observation, we can define Prediction Difficulty as the measure on how difficult to predict a given node's NDV. Definition 4.1. Prediction Difficulty (PD) For a node x, the prediction difficulty of its NDV of attribute node neighbors U′T in time window T , denoted by gx(U′T ) is defined as: gx(U′T ) = 1 − hx(U′T )/2, where hx(U′T ) is the temporal entropy of x's NDV in time window T , and hx(U′T ) = −Pn i=1 w(i) x (U′T )lognw(i) x (U′T ). i=1 Note that, w(i) ∈ (0, 1), so hx(U′T ) > 0, and when w(i) = 1/n,∀i ∈ [1, n], hx(U′T ) reaches the maximum, which equals −Pn 1 1 n = 1. Thus, n logn hx(U′T ) ∈ (0, 1] and gx(U′T ) ∈ [1/2, 1). In Definition 4, we use temporal entropy hx(U′T ) to measure how disordered a node's temporal pattern is. We can see the more disordered the temporal pattern, the greater the temporal entropy, and consequently the less the prediction difficulty, which is in line with our expectation. 4.3 Virtual Accuracy Now we further define Virtual Accuracy based on abso- lute accuracy and prediction difficulty as follow: Definition 4.2. Virtual Accuracy (VA) For a pre- diction of −→w x(U, Tf ), its Virtual Accuracy, denoted by δx, is defined as: (4.8) δx = ηx × gx, where ηx is the absolute accuracy and gx is the predic- tion difficulty. As Equation (4.8) shows, we define VA of a predic- tion as the product of the absolute accuracy and the predictability of that prediction. Since ηx and gx are both nonnegative, it is obvious that VA favors the pre- dictions whose absolute accuracy and difficulty are both great. As we can see in later experiments, ηx is nega- tively correlated with gx. Thus even the absolute accu- racy of a difficult prediction is low, the VA of it can still be expected be not low since its prediction difficulty is large. On the other hand, even the absolute accuracy of an easy prediction is high, the VA of it is expected to be low due to its small prediction difficulty. 5 Experimental Evaluation 5.1 Datasets We learn the NLEM from the NDVs in Th and Tc. For predicting neighbor distribution, we take the NDVs in Th + Tc as training set, and the NDVs in Tf as test set. The datasets we use to validate our model and algorithm are from three different domains, DBLP (a Coauthor Network), Netflix (a Movie Rental Network), and Foursquare (a Location Based Social Network). The summary of datasets is shown in Table 1 DBLP [15] indexes more than about 230 million articles and contains massive links to home pages of computer scientists. The labels of "Article" contain 25 directions on Computer Science, thus an NDV of a "Scholar" node consists of 25 components. By as- signed historical, current and future time window Th = [2006, 2010), Tc = [2010, 2011) and Tf = [2011, 2012], we randomly select 1000 scholars who published arti- cles in all the three time window. Netflix [1] contains about more than 100 million rating records from about 480, 000 customers over about 17, 000 movie titles. The labels of "Movie" contain 28 genres crawled from the website IMDb [5], thus an NDV of a "User" node consists of 28 components. By assigned historical, current and future time window Th = [Apr.12th 2005, Oct.12th 2005), Tc = [Oct.12th 2005, Nov.12th 2005) and Tf = [Nov.12th 2005, Dec.12th 2005], we randomly select 1, 000 users who have movie rating records in all the three time window. Foursquare[2] involves about 4.3 million friend- ships and about 80, 000 check-in tips of users during 3 years. The labels of "Venue" contain 8 categories given by Foursquare. By assigned historical, current and future time window Th = [0 day), Tc = [966 day], we randomly select 500 users who have check-in records during in all the three time window. day) and Tf = [996 day, 1026 day, 996 day, 966 th th th th th th 5.2 Baseline In order to demonstrate the effectiveness of our EFM, we compare our method with the following baseline methods: • MVM (Mean Value Method) MVM is an empirical method. It takes the mean of the latest NDVs of the nodes in the cluster that the predicted node belongs to, as the estimate of the next NDV of a given node. • MF (Basic Matrix Factorization)[17] MF is proposed by B. Webb to solve the movie recommender problem in Netflix Price. MF assumes the features of objects can be expressed as a series of factors, and different types of objects have factors with the same amount. When predicting the preference of the given objects of type A for the objects of type B, the preferences (which is called "ratings" in many cases) can be expressed as the product of the factors of the given objects of type A and B. The general expression of factor model is: (5.9) R = P QT , where P ∈ RN×D is the factor matrix of the objects of type A. Q ∈ RM×D is the factor matrix of objects of type B. N and M are the number of the objects of type A and the number of the objects of type B, respectively. D is the factor number. Dataset Network The type of The type of #Neighbor's lables #Predicted Nodes predicted nodes predicted node's neighbors DBLP Netflix Foursquare heterogeneous heterogeneous heterogeneous author user user paper movie venue 25 28 8 1000 1000 500 Table 1: Summary of Datasets. • BiasedMF (Biased Matrix Factorization)[9] Bi- asedMF is proposed by Paterek, which is an exten- sion of Basic Matrix Factorization. BiasedMF adds biased rates to the objects of either type. The pre- diction formula is: (5.10) ru,m = bu + bm +Pn k=1 pu,k · qm,k, where ru,m is an estimate of rate that the object u of type A gives to the object m of type B. The pu,k and qm,k are the cells of the factor matrixes of type A and type B respectively. bu and bm are the biases of object u and m respectively. In our experiments, we set the parameters of MF and BiasedMF as learning rate η = 0.001 and punishing parameter λ = 0.02, as suggested by Paterek [9] and Gorrell et al. [3]. We choose the number of NDV components as the latent feature numbers in MF and BiasedMF. Thus the feature numbers of DBLP, Netfilix and Foursquare are 25, 28 and 8 respectively. 5.3 The Determination of K Learning Algorithm for EFM requires the number of clusters, K, as the input when it invokes a K-means procedure, so we have to determine K before we start our experiments. For each dataset, we first randomly select 500 nodes from it, then apply our model to make predictions for these nodes and choose the K that maximizes the average absolute accuracy of the predictions. As Fig. 3 shows, we finally get K = 5 for DBLP, K = 1 for Netflix, and K = 155, 156 for Foursquare during [2 : 00, 3 : 00] and [11 : 00, 12 : 00] respectively. 99.90% 66.60% 33.30% y c a r u c c A e t u l o s b A DBLP Netflix 90.00% 85.00% 80.00% y c a r u c c A e t u l o s b A [2:00,3:00] [11:00,12:00] 0.00% 1 34 67 k 100 75.00% 1 251 k 501 (a) DBLP and Netflix (b) Foursquare Figure 3: The Selection of K 5.4 The Validation of Predictability Now we investigate how the absolute accuracy of a pre- diction correlates with its prediction difficulty. For each dataset, we first rank the nodes by PD in descending or- der, then divide the nodes into five groups. The nodes in a same group have equal PD. Finally we observe the absolute accuracies by applying EFM and three baseline methods, MVM, MF and BiasedMF, on the five groups respectively. The results are shown in Fig. 4. We can see that the absolute accuracies of the methods we use in the experiments decrease in overall with the increase of the prediction difficulty. Such result validates our assumption that the more disordered the temporal pattern of a node is, the greater its predictability is. It also shows the necessity to assess a model by a fair metric which should take the predictability into consideration. Note that, on Foursquare, the absolute accuracies of baseline methods do not decrease linearly with PD. It is because the human's daily routines are not all the same, which leads to the fluctuation of absolute accuracies of baseline methods. The absolute accuracy of EFM, however, has a linear decrease with PD. It is because EFM is not limited to the recognition of daily pattern, but instead takes the evolution regularity (represented by the neighbor label evolution matrix in EFM) into consideration. For example, the office workers who like nightlife can go to the nightclub for sleepover only on Weekends. For the nodes of that type, the two empirical methods can not perform as expected because the activities of sleepover on weekends are not common to everyone (which is the reason why MVM's curve fluctuates), or to an individual on everyday (which is the reason why the curve of MF and BiasedMF fluctuate). 5.5 The Comparison between EFM and Base- line Methods In this part, we compare the virtual accuracy of EFM with three baseline methods: MVM, MF and BiasedMF. The summarized result is shown in Fig. 5 and the de- tailed result is listed in Table 2. Our remarks on the result are as follows: 100.00% 92.00% 84.00% 76.00% 94.00% 71.00% 48.00% 25.00% y c a r u c c A e t u l o s b A y c a r u c c A e t u l o s b A 84.00% 76.00% 68.00% 60.00% 0.0011 0.0117 0.0249 0.0339 0.1148 0.1680 0.1984 0.2220 0.2530 0.3224 Prediction Difficulty (PD) Prediction Difficulty (PD) (a) DBLP (b) Netflix 99.60% 76.40% 53.20% 30.00% 0.3205 0.5133 0.6845 0.9492 0.9892 0.3718 0.5792 0.7731 0.9856 0.9918 Prediction Difficulty (PD) Prediction Difficulty (PD) (c) Foursquare [2:00, 3:00] (d) Foursquare [11:00, 12:00] EFM MVM MF BiasedMF which performs similarly to MVM on DBLP and Netflix, but far worse on Foursquare. (4) EFM outperforms MVM, MF and BiasedMF es- pecially on Foursquare. This is because the three baseline methods only pay attention to the daily pattern (MVM) or the profile of users (MF and Bi- asedMF). However, the activities in Foursquare are limited to not only the daily pattern or profile of users, but also the evolution regularity over weeks, even months. In summary, EFM is a robust and effective method. The VA of EFM is generally better than all the baseline methods. Figure 4: The Relationship between Absolute Accuracy and Prediction Difficulty on Three Datasets 6 Related Work y c a r u c c A l a u t r i V EFM MVM MF BiasedMF 0.60 0.50 0.40 0.30 DBLP Netflix Foursquare (2:00~3:00) Foursquare (11:00~12:00) Figure 5: The Comparison of VA between EFM and Baseline Methods Method DBLP Netflix EFM MVM MF BiasedMF 0.5049 0.4359 0.4937 0.4360 0.4960 0.4216 0.4917 0.4217 Foursquare [2:00, 3:00] Foursquare [11:00, 12:00] 0.5722 0.5179 0.3793 0.4381 0.5606 0.5032 0.3619 0.4852 Table 2: Virtual Accuracies of EFM, MVM, MF and BiasedMF (1) EFM performs far better than MVM on all the datasets, while MVM has the worst performance on the Netflix and DBLP datasets. (2) Although having the worst performance on the two Foursquare datasets, MF does have a good performance on Netflix dataset comparing with the other baseline methods, since MF is originally proposed for the movie recommendation problem in Netflix. EFM, however, still performs better than MF, which is because EFM can take into consideration not only the profile of the predicted nodes, but also the evolution regularity. (3) As shown in Fig. 5, EFM outperforms BiasedMF, Three domains are relevant to our work, namely link prediction, rating prediction and factor model. [16] Link Prediction: Hasan et al. [4] first introduces supervised learning to predict whether a link will be built in the future. Wang et al. introduces probabilistic model for link prediction. Leroy et al. [6] solves the cold start problem in link prediction. Lichtenwalter et al. [7] proposes new perspectives and methods in link prediction. Taskar et al. [14] propose a method to address the problem of link prediction in heterogeneous networks, based on the observations of the attributes of the objects. Sun et al. [12] extends the traditional link prediction to relationship prediction, which not only predicts whether it will happen, but also infers when it will happen. However, Sun's work, still focuses on the predictions of a single link. Rating Prediction (Recommender System): Basically, the methods predicting ratings of links fall into two categories: memory-based algorithms and model-based algorithms. The memory-based algorithms directly make predictions based on homogeneous neigh- bors of a given node [8, 10, 19], while model-based al- gorithms make predictions based on a prediction model learned in advance. Savia et al.[11] proposes a predic- tion model based on bayesian networks. These existing methods pay insufficient attention to the evolution of neighbor distributions. Factor Model: Factor Model assumes the features of objects can be expressed as a series of factors, which is also called Matrix Factorization (MF). MF is first proposed by Webb[17] to solve the movie recommender problem in Netflix Price. Based on Webb's work, G. Gorrell et al.[3] optimize the learning rate and the punishing parameter in MF. Paterek [9] proposes Biased Matrix Factorization (BiasedMF) to improve the performance of MF. However, the existing methods [8] G. Linden, B. Smith, and J. York. Amazon.com recommendations: Item-to-item collaborative filtering. 2003. [9] A. Paterek. Improving regularized singular value de- composition for collaborative filtering. In Proceedings of KDD cup and workshop, volume 2007, pages 5 -- 8, 2007. [10] B. Sarwar, G. Karypis, J. Konstan, and J. Riedl. Item-based collaborative filteringrecommendation al- gorithms. 2001. [11] E. Savia, K. Puolamaki, and S. Kaski. Latent grouping models for user preference prediction. Machine Learn- ing, 74(1):75 -- 109, 2009. [12] Y. Sun, J. Han, C. C. Aggarwal, and N. V. Chawla. When will it happen? - relationship prediction in het- erogeneous information networks. WSDM' 12, pages 663 -- 672, 2012. [13] Y. Sun, J. Tang, J. Han, C. Chen, and M. Gupta. Co-evolution of multi-typed objects in dynamic star networks. IEEE TKDE, 2013. [14] B. Taskar, M. fai Wong, P. Abbeel, and D. Koller. Link prediction in relational data. NIP' 03, 2003. [15] D. Team. Dblp. URL http://dblp.uni-trier.de/. [16] C. Wang, V. Satuluri, and S. Parthasarathy. Local ICDM' 07, probabilistic models for link prediction. pages 322 -- 331, 2007. [17] B. Webb. Netflix update: Try this at home. URL http://sifter.org/simon/journal/20061211.html. [18] K. Yehuda, B. Robert, and V. Chris. Matrix factoriza- tion techniques for recommender systems. Computer, 42(8):30 -- 37, 2009. [19] K. Yu, A. Schwaighofer, V. Tresp, X. Xu, and H. P. Kriegel. Probabilistic memorybased collaborative fil- tering. IEEE TKDE, 16(1):56 -- 69, 2004. can not capture the dynamics of neighbor distributions agilely, which is exactly why we propose a new model EFM for our goal. 7 Conclusion In this paper, we present a new prediction problem, Neighbor Distribution Prediction in heterogeneous in- formation network. To address this problem, we pro- pose an Evolution Factor Model (EFM), which takes Neighbor Label Evolution Matrix (NLEM) as the dy- namic factor, and predicts the next NDV of a given node by transforming its current NDV by the NLEM. We also propose a learning algorithm for EFM, which learns the NLEM from the homogeneous nodes which are in the same cluster as a given node. For fairly evaluating the predictions made by differ- ent methods, we propose Virtual Accuracy, which not only measures the absolute accuracy, but also takes the difficulty of a prediction into consideration. We conduct the experiments on the datasets from three different applications, and compare EFM with three baseline methods: Mean Value Method, Basic Matrix Factorization and Biased Matrix Factorization. The results show EFM outperforms all the baseline methods in overall. Acknowledgments This work is supported by the National Science Founda- tion of China under Grant Nos. 61173099, 61103043 and the Doctoral Fund of Ministry of Education of China under Grant No. 20110181120062. This work is also supported in part by NSF through grants CNS-1115234, DBI-0960443, and OISE-1129076, and US Department of Army through grant W911NF-12-1-0066. References [1] Netflix prize. URL http://www.netflixprize.com. [2] J. Bao, Y. Zheng, and M. F. Mokbel. Location-based and preference-aware recommendation using sparse geo-social networking data. GIS 2012, 2012. [3] G. Gorrell and B. Webb. Generalized hebbian algo- rithm for incremental latent semantic analysis. In Pro- ceedings of Interspeech, 2006. [4] M. A. Hasan, V. Chaoji, S. Salem, and M. Zaki. Link prediction using supervised learning. SDM' 06 work- shop on Link Analysis, Counterterrorism and Security, 2006. [5] IMDb. URL http://www.imdb.com/. [6] V. Leroy, B. B. Cambazoglu, and F. Bonchi. Cold start link prediction. KDD' 10, 2010. [7] R. N. Lichtenwalter, J. T. Lussier, and N. V. Chawla. New perspectives and methods in link prediction. KDD' 10, 2010.
1304.6459
5
1304
2016-05-12T07:40:07
Measuring Transport Difficulty of Data Dissemination in Large-Scale Online Social Networks: An Interest-Driven Case
[ "cs.SI", "cs.NI" ]
In this paper, we aim to model the formation of data dissemination in online social networks (OSNs), and measure the transport difficulty of generated data traffic. We focus on a usual type of interest-driven social sessions in OSNs, called \emph{Social-InterestCast}, under which a user will autonomously determine whether to view the content from his followees depending on his interest. It is challenging to figure out the formation mechanism of such a Social-InterestCast, since it involves multiple interrelated factors such as users' social relationships, users' interests, and content semantics. We propose a four-layered system model, consisting of physical layer, social layer, content layer, and session layer. By this model we successfully obtain the geographical distribution of Social-InterestCast sessions, serving as the precondition for quantifying data transport difficulty. We define the fundamental limit of \emph{transport load} as a new metric, called \emph{transport complexity}, i.e., the \emph{minimum required} transport load for an OSN over a given carrier network. Specifically, we derive the transport complexity for Social-InterestCast sessions in a large-scale OSN over the carrier network with optimal communication architecture. The results can act as the common lower bounds on transport load for Social-InterestCast over any carrier networks. To the best of our knowledge, this is the first work to measure the transport difficulty for data dissemination in OSNs by modeling session patterns with the interest-driven characteristics.
cs.SI
cs
Measuring Transport Difficulty of Data Dissemination in Large-Scale Online Social Networks: An Interest-Driven Case 6 1 0 2 y a M 2 1 ] I S . s c [ 5 v 9 5 4 6 . 4 0 3 1 : v i X r a Cheng Wang, Zhenzhen Zhang, Jieren Zhou, Yuan He, Jipeng Cui, Changjun Jiang Department of Computer Science and Technology Tongji University, Shanghai, China [email protected] ABSTRACT In this paper, we aim to model the formation of data dissem- ination in online social networks (OSNs), and measure the transport difficulty of generated data traffic. We focus on a usual type of interest-driven social sessions in OSNs, called Social-InterestCast, under which a user will autonomously determine whether to view the content from his followees depending on his interest. It is challenging to figure out the formation mechanism of such a Social-InterestCast, since it involves multiple interrelated factors such as users' social relationships, users' interests, and content semantics. We propose a four-layered system model, consisting of physi- cal layer, social layer, content layer, and session layer. By this model we successfully obtain the geographical distribu- tion of Social-InterestCast sessions, serving as the precondi- tion for quantifying data transport difficulty. We define the fundamental limit of transport load as a new metric, called transport complexity, i.e., the minimum required transport load for an OSN over a given carrier network. Specifically, we derive the transport complexity for Social-InterestCast sessions in a large-scale OSN over the carrier network with optimal communication architecture. The results can act as the common lower bounds on transport load for Social- InterestCast over any carrier networks. To the best of our knowledge, this is the first work to measure the transport dif- ficulty for data dissemination in OSNs by modeling session patterns with the interest-driven characteristics. Keywords Online social networks, data dissemination, transport load, fundamental limits, scaling behavior 1. INTRODUCTION As social networking services are becoming increasingly popular, online social networks (OSNs) play a growing role in individuals' daily lives. The user population of OSNs has grown drastically in recent years. According to the research proceeded by Statista1 demonstrated that the number of so- cial network users worldwide in 2014 had reached 1.87 bil- 1One of the largest statistics portals, http://www.statista.com/ lion and estimated that there will be around 2.72 billion so- cial network users around the globe in 2019 [1]. In addition, people are spending more and more time on OSNs. For ex- ample, in January 2015, GlobalWebIndex2 showed that the average user spends 1.72 hours per day on social platforms, which represents about 28 percent of all online activity [2]. What's more, various kinds of social applications are con- stantly emerging, which are rendering an increasing user population of OSNs and providing users with more types of content to choose from, e.g., audios, videos, and pictures. In addition, OSNs are covering a wider range around the world. All of the factors involved above are resulting in the heavy load imposed on the carrier communication network of OSNs. Furthermore, the load in the OSNs will increase continually with the expansion of OSNs. Over a long period of time, this growth will give rise to the limitation of Internet's bandwidth, so practically mea- suring the load imposed by OSNs enjoys a crucial mean- ing. To measure such a load, i.e., the load imposed on the carrier communication network by the OSN, we first intro- duce a metric called transport load. It is defined as the product of two key factors: data generating rate at users and transport distance of messages. The former depends on the format of message (e.g., text, picture, and video, etc.) and the performance request in terms of quality of service (e.g., throughput, latency, and deliver ratio, etc.). The lat- ter is directly determined by the geographical distribution of dissemination sessions and the communication architec- ture of network. Both parameters are critical for measuring the transport capacity of networks. To be specific, it is de- fined as the product of bits and the transport distance over which the data is successfully transported from the source to the intended destinations. In this work, we further de- fine the fundamental limit of such transport load as transport complexity, i.e., the minimum required transport load for an OSN over a given carrier communication network. We note that, unlike some classical performance metrics, e.g., net- work capacity, the transport complexity is a metric to define the fundamental transport difficulty of a specific data com- 2A market research firm running world's largest market research study on the digital consumer, https://www.globalwebindex.net/ Transport Capability of A Network How well a network can do for a given application of data transportation? Transport Difficulty of An Application How difficult for a given network to make an application of data transportation? Transport Capacity Transport Complexity Maximum Achievable Transport Throughput Minimum Required Transport Load Figure 1: Transport Complexity vs. Transport Capacity. They are the typical and intuitive metrics of the trans- port difficulty of an application and the transport capa- bility of a network, respectively. The transport capabil- ity is the capability of a network in terms of data trans- portation, while the transport difficulty is the inherent difficulty of an application in terms of data transporta- tion. munication applications instead of the transport capability of a given network for specific applications. Regarding the essential difference between transport capacity of a network and transport complexity of a data transport application, we give an explicit explanation with the help of the illustration in Figure 1. For computing the transport load, the first thing is to comb rightly the procedure of a data dissemination in OSNs. From our perspective, the session can be divided into two suc- cessive phases: Passive Phase and Initiative Phase. In the passive phase, a source user holding a message sends the digest of this message to all his followers. The followers passively receive this digest. This process of such a dis- semination just acts like a broadcast in all the followers of this source user. We call this process Social-BroadCast, and sessions generated in this process are straightforward called Social-BroadCast sessions. In the initiative phase, according to the interest, a user will autonomously determine whether to download the complete message based on the digest of a message from who he follows, [40]. We define such a dis- semination process Social-InterestCast and sessions gener- ated in this process are Social-InterestCast sessions. In our work, the Social-InterestCast is defined by taking into ac- count specific user interests and their effects on session gen- eration. We give an intuitive explanation as follows: There exists usually a user-message mapping between the user set and message set, [43]. That is, when a user broadcasts a message to others, only the users whose interests are con- sistent with the topic of the message can be the potential destinations. For example, if a user broadcasts a video mes- sage characterized by several words (a digest or a title) in his Facebook, only the followers who are interested in this message will open the video file. It is convincing that this behavior occurs due to an underlying user-message map- ping. In fact, the transport load in the former process, i.e., the transport load for the Social-BroadCast has been inves- tigated in [37], then our focus of this work is to model the formation of a Social-InterestCast. Accordingly, we propose a four-layered model consisting of the physical layer, social layer, content layer, and session layer, as illustrated in Fig- ure 2. Compared with the three-layered model in [37], this model introduces a content layer where the relationship links are defined as the semantic similarity among the messages. We take an example shown in Figure 2 to explain this pro- cedure: A user delivers a "Message 1". Then, all his four followers can receive the glance (or say abstract) of "Mes- sage 1". Finally, only two followers are filtered through the content layer to act as the valid destinations due to their in- terests to "Message 1". After the preparations made above, we compute the trans- port load. Recall its definition, we first need to investigate the complex geographic characteristics of data dissemina- tion sessions in OSNs, i.e., the spacial distribution of traf- fic sessions (the location distribution of sources and destina- tions). We adopt the following three steps (as shown in Figure 3) to get the spacial distribution of Social-InterestCast sessions depending on users' geographical distribution: ✄ Firstly, we model the spatial distribution of social rela- tionships, i.e., the geographical distribution of followers, by investigating the correlations between user's social relation- ship formation and geographical distribution. We adopt the population-based model in [37] for the advantages in realis- tic and analytical aspects. ✄ Secondly, we build the user-content interest mapping by matching the topics of content and interests of users. Un- der the Social-InterestCast, for measuring the transport com- plexity, it is important to estimate how many followers of a source user will be interested in a given message and make a decision to view it. We divide this problem into two cases in terms of the dependency among followers' decisions and the attractivity difference of message content. To be specific, when the decisions of a source user's followers are non- independent, Matthew Effect [30] should be considered due to the preferential attachment of some messages that have at- tracted more followers; when the attractivity of messages is of significant difference, the preferential attachment of some popular messages comes on the stage. Furthermore, com- bining with the experimental results based on Foursquare users' dataset [11], we get that: Under both cases above, for a source user, say vk, we reasonably assume that the number of destinations of a session from vk follows a Zipf's distri- bution whose parameters depend on the degree of node vk. ✄ Thirdly, we model the spatial distribution of traffic ses- sions, i.e., the geographical distribution of session sources and destinations, by combining the effects of both users' so- cial relationships on the social layer and the user-content in- terest mapping across the social and content layers. 2 1 3 Session(cid:3) Layer Content(cid:3) Layer Social(cid:3) Layer Physical(cid:3) Layer Physical(cid:3) Proximity Social(cid:3) Relationship Interest(cid:3) Mapping Content(cid:3) Correlation Data(cid:3) Flow Figure 2: InterestCast. Four-layered Architecture and Social- Session(cid:3)Layer(cid:3) Content(cid:3)Layer(cid:3) Social(cid:3)Layer(cid:3) Physical(cid:3)Layer(cid:3) Geographical(cid:3)Distribution(cid:3) of(cid:3)Social(cid:3)Relationships Geographical(cid:3)Distribution(cid:3) of(cid:3)Traffic(cid:3)Sessions User(cid:882)Content(cid:3) Interest(cid:3)Mapping Step(cid:3)1 Step(cid:3)2 Step(cid:3)3 Figure 3: Three Steps for Modeling The Generation of Traffic Sessions. Based on these three steps, we can obtain the geographi- cal distribution of traffic sessions, and thereby compute the bound on the aggregate transport distance over which the data is successfully transported from the source to the in- tended destinations. Under a realistic assumption that ev- ery source sustains a data generating rate of constant or- der, our result demonstrates that the transport complexity for Social-InterestCast in an OSN over a carrier network with an optimal communication architecture varies in the range (cid:2)Θ(n), Θ(n2)(cid:3) depending on the clustering exponents of re- lationship degree, relationship formation and dissemination pattern, where n is the user number of the OSN. The aforementioned results for Social-InterestCast clarify the differences from those for data dissemination in conven- tional communication networks, and can serve as a valuable metric to measure network performance and the difficulty of data dissemination in large-scale networks. Furthermore, if a specific carrier communication network is introduced, our results on transport distances can also play an important role in analyzing some system performances, e.g., network ca- pacity and latency. To the best of our knowledge, this is the first work to mea- sure the transport difficulty for data dissemination in OSNs for modeling session patterns by taking into account the interest- driven characteristic and users' behaviour in real-world OSNs. The rest of this paper is organized as follows. Firstly, we show the related work in Section 2, and give the metric of transport difficulty in Section 3. In Section 4, we propose our system model of Social-InterestCast. In Section 5, we derive the transport complexity for the Social-InterestCast. Finally, we draw a conclusion and make a discussion on our future work in Section 6. 2. RELATED WORK Online social networks (OSNs) provide a platform for hun- dreds of millions of the Internet users worldwide to produce and consume content. Users in OSNs have the access to the unprecedented large-scale information repository [21]. Moreover, OSNs play an important role in the information diffusion by increasing the spread of novel information and diverse viewpoints, and have shown their power in many situations [10]. There are some representative topics that have been extensively studied in the research community of OSNs, such as detecting popular topics [29], digging po- tential popularity of contents [7], modeling information dif- fusion [23, 31], identifying influential spreaders, leaders or followers [33], presenting influence mechanisms [26], max- imizing the spread of an information epidemic [24], predict- ing the properties/signs of links [42] and the missing prefer- ence of a user [27], estimating the proximity of social net- works [34], and exploring security issues [36], and so on. However, most existing work mainly focused on the infor- mation diffusion scheme in overlay relationship networks of users in social networking sites/services (SNSs), [41]. Meanwhile, as SNSs become increasingly popular for in- formation exchange, the traffic generated by social appli- cations rapidly expands [4]. A report of Shareaholic [5] showed that, between November 2012 and November 2013, social media referral traffic from the top five social media sites increased by 111% while search traffic from the top five search engines had decreased by 6%. Therefore, besides the analysis of information diffusion schemes in overlay social networks [10,24,29,31], and the gain of social relationships in terms of the information dissemination [17, 39], an in- depth understanding of the impact of increasing traffic gen- erated by OSNs on carrier communication networks, e.g., the Internet, is convincingly necessary for evaluating current OSNs systems, optimizing network architectures and the de- ployment of servers for OSNs, and even designing future OSNs [16]. To address this issue, we need to propose prac- tical modeling and effective analytic methods for content distribution of OSNs implemented in carrier communication networks, since OSNs change both information propagation schemes and traffic session patterns in communication net- works due to the involvement of overlay social relationships, users' preferences and decisions, [20]. Accordingly, in this paper, we aim at modeling content distribution [8] in OSNs, and measuring its transport difficulty imposed on the carrier communication networks of OSNs. The most relevant work investigating the load imposed on the carrier communication network is [37], where the met- ric called transport load (or traffic load ) was proposed to quantify such a load. In [37], only a theoretical lower bound on transport load was derived without sufficiently clarifying the role of this result in measuring the transport difficulty of data dissemination for specific online social networking applications. We state that transport difficulty for a specific application should be an intrinsic property of this applica- tion when the carrier network is given. Consequently, the metric for transport difficulty should be a fundamental limit of a certain metric on transport burden. From such a per- spective, we define the fundamental limit of transport load as a new metric called transport complexity, i.e., the mini- mum required transport load for an OSN over a given car- rier network. Besides this, comparing with [37], we make some significant improvements in this work: In [37], the au- thors proposed a three-layered model to formulate data dis- semination sessions for social applications in OSNs. The session generation is simply modeled as Social-BroadCast, where the source broadcasts messages to all of its followers, and all followers have to be the passive destinations. Appar- ently, they neglected the important features of session gen- eration in OSNs, i.e., the fact that the generation of traffic sessions depends on both users' social relationships and the user-content interest mappings. Accordingly, in this work, we focus on an interest-driven session pattern, called Social- InteretCast. To model its formation, we introduce a content layer as an interest-based filter to build interest links from users to messages, and propose a four-layered system model as illustrated in Figure 2. i=1. Let a subset S = {uS,k}ns 3. METRIC OF TRANSPORT DIFFICULTY Considering an online social network (OSN), denoted by N, consisting of n users, we denote the set of all users by U = {ui}n k=1 ⊆ U denote the set of all sources, where S = ns. Denote a data dis- semination session from a source uS,k by an ordered pair DS,k =< uS,k,DS,k >, where DS,k is the set of all desti- nations of uS,k. In this work, we intend to investigate the transport diffi- culty for data dissemination in OSNs, i.e., the load on the carrier communication networks generated by a specific so- cial applications. To quantify such a load, we introduce a metric from [37], called transport load, which depends on two factors: data requested rate and data transport distance. Data Requested Rate: Data requested rate is determined by QoS (quality of service) of the application. For data dis- semination applications in OSNs, the QoS of data transport applications is usually set up according to the generating rate of content at source users, i.e., the so-called data arrival rate. Moreover, data requested rate is generally defined as a certain portion of data arrival rate. In other words, a portion of data arriving at the source user is requested to be success- fully disseminated. Therefore, we reasonably assume that the data requested rate has the same order as the data ar- rival rate. The temporal behavior of messages arriving at a user in an OSN has been addressed by analyzing some real-life OSNs, [12,32]. For example, Perera et al. [32] developed a software architecture that uses a Twitter application program interface (API) to collect the tweets sent to specific users. They indi- cated that the arrival process of new tweets to a user can be modeled as a Poisson Process. In this paper, we just take it as an empirical argument for assuming the data arrival for a user as a data source follows a Poisson Process, [32]. In our work, for each session DS,k =< uS,k,DS,k >, we simply set the data requested rate to be a portion of the data arrival rate. Then, we can denote the data requested rate by a vector ΛS = (λS,1, λS,2,··· , λS,ns), where λS,k is the rate of a Poisson Process at user uS,k (for k = 1, 2,··· , ns). In practice, the data arrival rate is dispensable on the scale of the specific OSN, i.e., the value of n, although the data arrival rate depends on many factors, such as the specific form and quality of social services. Combining the facts that the data requested rate is a certain portion of the data arrival rate, we can make a reasonable and practical assumption that λS,k = Θ(1) for k = 1, 2,··· , ns. In this work, we aim to analyze the fundamental limits on the transport load for data dissemination in OSNs according to the network size. Therefore, it is appropriate to note at this point that the specific distribution of data requested rate has no impact on the results (in order sense) as long as it holds that λS,k = Θ(1) for k = 1, 2,··· , ns. This is why we do not make an intensive study of the specific distribution of data requested rates. Data Transport Distance: The data transport distance is comprehensively determined by traffic session pattern of the application, communication network architecture, and transmission schemes. For a given transmission scheme in a given OSN N, say SN, define a vector DS (SN) = (dS,1(SN), dS,2(SN),··· , dS,ns(SN)) , where dS,k(SN) represents the transport distance over which the message for session DS,k is successfully transported from the source uS,k to all destinations. Transport Load and Transport Complexity: In the OSN N, given a specific carrier communication network, define the transport load for a dissemination session, say DS,k, as eLN,S(DS,k) = λS,k · dS,k(SN). Furthermore, the aggregated transport load for dissemination sessions from all sources in S can be defined as LN,S = minSN∈S ΛS ∗ DS(SN), (1) where S is the set of all feasible transmission schemes, and ∗ is an inner product. duce the feasible transport load. Based on the definition of transport load, we further intro- DEFINITION 1 (FEASIBLE TRANSPORT LOAD). For a social data dissemination with a set of social sessions DS = k=1, we say that the transport load LN,S is feasible if {DS,k}n and only if there exists an appropriate transmission scheme with a communication deployment, denoted by SN, such that it holds that DS(SN)∗ΛS ≤ LN,S ensuring that the network throughput of ΛS is achievable. Based on the definition of feasible transport load, we fi- nally define the transport complexity. DEFINITION 2 (TRANSPORT COMPLEXITY). We say that the transport complexity of the class of random social data disseminations DS is of order Θ(f (n)) bit-meters per sec- ond if there are deterministic constants c1 > 0 and c2 < ∞ such that: There exists a communication architecture N and corresponding transmission schemes such that lim n−→∞ Pr(LN,S = c1 · f (n) is feasible) = 1, and for any possible communication architectures and trans- mission schemes, it holds that: lim inf n−→∞ Pr(LN,S = c2 · f (n) is feasible) < 1. 4. MODEL OF SOCIAL-INTERESTCAST For each session, the geographical distribution of the source and destination(s) plays a key role in generating the transport load. So it is critical to analyze the correlation between the spatial distribution of sessions and geographical distribution of users in online social networks (OSNs). To address this issue, we propose a four-layered model, consisting of the physical layer, social layer, content layer, and session layer, as illustrated in Figure 2. 4.1 Four-Layered System Model 4.1.1 Physical Layer- Physical Network Deployment The deployment of the so-called physical network can be divided into two parts. The first is the geographical distri- bution of social users. The second is the communication architecture of the carrier network. Geographical Distribution of Social Users: We con- sider the random network consisting of a random number N (with E(N ) = n)3 users who are randomly distributed over a square region of area S := n, where E[N ] = n. To avoid border effects, we consider wraparound conditions at the network edges, i.e., the network area is assumed to be the surface of a two-dimensional Torus O. To simplify the de- scription, we assume that the number of nodes is exactly n, 3Throughout the paper, let E[X] denote the mean of a random vari- able X. k=1, without chang- and denote the set of nodes by V = {vk}n ing our results in order sense. We make a compromise in the generality and practicality of the geographical distribution of social users, in order to concentrate on clarifying the impacts of users' interest on the session formation. Specifically, we follow the setting where all users are distributed according to a homogeneous Poisson point process, taking no account of the inhomogeneous property of the uneven population dis- tribution in real-life OSNs. The derived results are expected to serve as the basis for investigating more realistic scenar- ios under the more practical but complex deployment mod- els, such as the Clustering Random Model (CRM) according to the shotnoise Cox process [6] and Multi-center Gaussian Model (MGM) in [15]. Communication Architecture of Carrier Network: For online social networking services, we state that the carrier network is indeed the mobile Internet. This means that there is hardly a uniform communication architecture, e.g., cen- tralized or distributed network architecture, practically char- acterizing the architecture of a real-world carrier network for OSNs. This is also the reason why we derive the transport complexity for Social-InterestCast sessions over the carrier network with optimal communication architecture. The re- sults can serve as the common lower bounds on transport complexity for Social-InterestCast sessions over any carrier networks. 4.1.2 Social Layer- Social Relationship To model the geographical distribution of relationships, we introduce the population-distance-based model from [37]. In [37], Wang et al. provided a numerical evaluation for this social model based on a Brightkite users' dataset [18]. Be- fore deciding to adopt this model, we complement an eval- uation based on another dataset from [22], i.e., a Gowalla users' dataset. For the completeness, we include the evalua- tions based on these datasets in Appendix B. Let D(u, r) denote the disk centered at a node u with ra- dius r in the deployment region O, and let N (u, r) denote the number of nodes contained in D(u, r). Then, for any two nodes, say u and v, we can define the population-distance from u to v as N (u,u − v), where u − v denotes the Euclidean distance between node u and node v. For completeness, we include the population-distance-based model as follows: For a node vk ∈ V, we construct its re- lationship set Fk of qk (qk ≥ 1) follower nodes by the fol- lowing procedures: For a particular node vk ∈ V, denote the number of followers by qk, we assume that it follows a Zipf's distribution [28], i.e., Pr(qk = l) =(cid:18)Xn−1 j=1 j−γ(cid:19)−1 · l−γ. (2) Note that we accordingly give a numerical evaluation based on Gowalla dataset [22] for the Zipf's degree distribution in Appendix B.2. Then, to model the geographical distribution of social re- lationships, we make the position of node vk as the reference point and choose qk points independently on the torus region O according to a probability distribution with the following density function: fvk (X) = Φk(S, β) · (E[N (vk,X − vk)] + 1)−β , where the random variable X := (x, y) denotes the position of a selected point in the deployment region, and β ∈ [0,∞) represents the clustering exponent of relationship formation; the coefficient Φk(S, β) > 0 depends on β and S (the area of deployment region), and it satisfies: (3) (4) (E[N (vk,X − vk)] + 1)−β dX = 1. Φk(S, β) ·ZO Further, we determine the nearest followers for specific users. Let Ak = {pki}qk i=1 denote the set of these qk points. Let vki be the nearest node to pki, for 1 ≤ i ≤ qk (ties are broken randomly). Denote the set of these qk nodes by Fk = {vki}qk i=1. We call point pki the anchor point of vki, and define a set Pk := {vk} ∪ Ak. In this model, we can observe that the degree distribution above depends on the specific network size, i.e., the num- ber of users n. Note that the correlation between the users' degree distribution and geographical distribution should not be neglected, although we simplify it in this work. We will entirely address this issue in the future work. Throughout this paper, we use P(γ, β) to denote the population-distance- based model. Here, γ and β denote the clustering exponents of relationship degree and relationship formation, respec- tively. For their detailed meanings, please refer to Eq.(2) and Eq.(3), respectively. 4.1.3 Content Layer- User-Content Interest Mapping In this work, we focus on the case where a user only view the messages within his interest. Then, modeling the map- ping between users and content is the first critical step for the final generation of traffic sessions. The basic idea for this issue is to build the interest links from users to mes- sages according to the similarity of users' interests to mes- sage semantics. Specifically, we dig the user's interest by abstracting the topics of all his posted messages. 4.1.4 Session Layer- Data Traffic Session When observing users' behaviour in real-life OSNs, there exists a significant feature of traffic session in OSNs, i.e., the users' intrinsic interest and subjective choice are often indis- pensable for forming the sessions, [25]. For all the common traffic patterns in OSN, we focus on a typical data dissem- ination, called SocialCast, which can be divided into two successive phases: Passive Phase and Initiative Phase. In the passive phase, a source user holding a message sends self-appointedly the digest of this message to all his fol- lowers. The followers passively receive this digest. This process just acts like a broadcast in all the followers of this source user. This process is called Social-BroadCast in [37]. In the initiative phase, according to the interest, a user will autonomously determine whether to download the complete message based on the digest of a message from who he fol- lows. We define such an interest-driven dissemination pro- cess Social-InterestCast. The Social-InterestCast is defined by taking into account specific user interests and their ef- fects on session generation. Our focus in this work is Social- InterestCast. 4.2 Social-InterestCast In real-life OSNs, there exists naturally a common phe- nomenon: When a user broadcasts messages to others, the number of potential destinations is depending on underlying relationships among users (both the source and destinations), [25]. For a delivered message, to explore the characteristics of source user and final destinations, we begin with studying relationships between users and messages. Then, it is com- mon that if a user broadcasts a message characterized by sev- eral words (abstract/digest) in his Facebook, only the users whose interests are consistent with the topic of the message can be the final destinations. We say that this behavior oc- curs due to an underlying user-message mapping between user set and message set. For such type of session, we call it Social-InterestCast, which is different from Unicast in [9] and Social-BroadCast in [37]. In the following, we firstly dig the distribution of destinations of Social-InterestCast ses- sions based on a real-life dataset of Foursquare [11]. 4.2.1 Analyzing Social-InterestCast Formation In this part, we aim to analyze the distribution of destina- tion number for Social-InterestCast by exploring the session formation mechanism over a real-life Foursquare dataset [11]. Foursquare was created in 2009. It is a location-based social networking service provider where users share their loca- tions via "checking-in" function. The dataset contains 104, 478 check-in tips generated by 31, 544 users in Los Angeles (LA). It provides the follower lists and check-in messages of all users. In real-life OSNs, the users' intrinsic interest and subjec- tive choice are usually indispensable for forming the traffic sessions. Under such a common type of sessions, a user will autonomously determine whether to download the content from whom he follows depending on his interest, [14]. We apply the Latent Dirichlet Allocation (LDA) [13] to extract topics from the check-in messages generated by users. LDA assumes that words of each document are drawn from a mix- ture of topics. We define all messages generated by a user, say v, as a user document cv. Then, we apply LDA model to extract the topic distribution θcv, serving as user's interests. Figure 4 depicts the LDA model. With the user's interest distribution θcv, we introduce Jensen-Shannon divergence JSD(PQ) [19] to measure the similarity between users' interest θcv and newly arrived message θcnew. In our evaluation, we assume that only when the user's in- terest θcv is similar to the message's topic distribution θcnew, user v will further view the newly arrived message cnew. In φ λ θ z User Interest/ Message Topic w Word Document Corpus and are the super parameters of LDA mod- is the topic distribution of user document, i.e., user Figure 4: el, interest or message topic, and Figure 4: λ is the hyperparameter of LDA model, φ is the topic-word distribution, θ is the topic distribution of user document, i.e., user interest, z denotes the latent topic in document cv, and w is an observed word. is a word of the message in message set. is the topic assignment of 800 800 400 400 i s n o s s e S c i f i c e p S f t o r e b m u N e a g e r g g A e h T 0 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 The Number of Destinations of A Session i s n o s s e S c i f i c e p S f t o r e b m u N e a g e r g g A e h T 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Figure 5: Destinations Distribution with Relationship Degree = 22 The Number of Destinations of A Session Figure 5: Destinations Distribution with Relationship Degree qk = 22. 4. Destinations Distribution with larity between users' interest and newly arrived message = 22 new In our evaluation, we assume that only when the user's in- new is similar to the message's topic distribution other words, when the value of JSD(θcvθcnew) is smaller than that of a pre-defined threshold δ, the user v is selected as a final destination of the message cnew. terest user will further view the newly arrived message new. In new is smaller other words, when the value of J SD As illustrated in Figure 5, one of the experimental results than that of a pre-defined threshold , the user is selected as a final destination of the message new based on Foursquare dataset [11] shows the distribution of session destinations initiated from users who have 22 fol- lowers. In Figure 5, the X-axis denotes the number of des- tinations at a certain degree 22, the Y -axis denotes the num- ber of cases where destination number equals X. We can see that Y decreases rapidly at first and then gently with the increasing of X. As in Figure 5 illustrated, one of the experimental result- s based on Foursquare dataset [11] shows the distribution of session destinations initiated from users who have 22 follow- -axis denotes the number of destina- ers. In Figure 5, the tions at a certain degree 22, the -axis denotes the number of cases where destination number equals . We can see that decreases rapidly at first and then gently with the in- To provide more insights, Figure 6 illustrates the distri- creasing of 5. Destinations Distribution of Foursquare Messages. butions of destination number for different relationship de- gree qk with the threshold δ = 6.5. Since users with larger relationship degree cannot show convincingly the statistical characteristics due to the small number of such users (the small sample size), we have removed those users whose de- gree is larger than 32 to obtain a more representative result. In Figure 6, the experimental result in each subfigure shows that the distribution of destination number for each Social- In order to provide more insights, we include the distribu- tions of destination number for different relationship degree on Foursquare dataset [9], one of the experimental with the threshold = 6 in Figure 6. Here, Figure 6 only gives the results with degree from to 32, since user- is showed in Fig.4. , and In Fig.4, the friendship degree is 22 of of to of destinations at certain degree, experimental results based on the threshold = 6 For the completeness of validations, we include some other in Fig.5. we want to say that due to the number of users with degree is few, which cannot show the general of destinations distribution, So Fig.5 only gives degree from to 42 to all cases above, the experimental result in each L V Q R V V H 6  F L I L F H S 6  I  W R  U H E P X 1 H D J H U J J $ H K 7            GHJUHH  GHJUHH  GHJUHH  GHJUHH  GHJUHH  GHJUHH  GHJUHH            GHJUHH   GHJUHH   GHJUHH   GHJUHH   GHJUHH         GHJUHH   GHJUHH    GHJUHH   GHJUHH    GHJUHH    GHJUHH           GHJUHH    GHJUHH    GHJUHH    GHJUHH    GHJUHH    GHJUHH                   GHJUHH  GHJUHH  GHJUHH  GHJUHH    GHJUHH    GHJUHH  7KH1XPEHURI'HVWLQDWLRQVRI$6HVVLRQ Figure 6: Destinations Distribution in Foursquare. Figure 6: Destinations Distribution in Foursquare. InterestCast session appears a long-tailed feature. s with larger relationship degree cannot show convincingly the statistical characteristics due to the small number of such users. Note that the long-tailed property in the distribution of destination number is just derived under our hypothetical formation mechanism of Social-InterestCast using LDA model. The experimental result in each figure provides an insight that the distribution of destination number for each Social As an important empirical argument, Li et al. [25] has pro- InterestCast session appears a long-tailed feature. As an em- vided a numerical validation based on RenRen dataset for pirical argument for this result, Li et al. [24] has provided such a long-tailed distribution by counting the ratio of the a numerical validation based on Renren dataset for such a number of viewed videos and that of the received videos long-tailed distribution. from friends. 4.2.2 Modeling Social-InterestCast 4.2.2 Modeling Social-InterestCast Based on the observations above, we assume that the dis- tribution of session destinations for Social-InterestCast fol- lows approximately a Zipf's distribution. To be specific, fo a source node , based on the dependency among follower- s' decisions and the attractivity difference of message con tent, we make a reasonable assumption that the number of destinations follows a Zipf's distribution whose parameters depend on the relationship degree of Based on the result in Section 4.2.1, we assume that the distribution of session destinations for Social-InterestCast follows approximately a Zipf's distribution. Specifically, for a source node vk, based on the dependency among follow- ers' decisions and the attractivity difference of message con- tent, we make a reasonable assumption that the number of destinations follows a Zipf's distribution whose parameters depend on the relationship degree of vk, i.e., Pr( ) = i.e. (5) (5) · d−ϕk , m−ϕk(cid:19)−1 Pr(dk = dqk = l) =(cid:18)Xl , and is the number of final destinations of a session ini- where is the exponent of data dis- tiated by semination. Here, for problem simplification, we first study the special case where where dk is the number of final destinations of a session ini- tiated by vk, and ϕk ∈ [0,∞) is the exponent of data dis- semination. Here, for problem simplification, we first study In the following Section 5, we mainly study this type of the special case where ϕk ≡ ϕ for every vk. data disseminations and give the corresponding results for transport complexity. In the following Section 5, we mainly study this type of data disseminations and give the corresponding results for transport complexity. 5. TRANSPORT COMPLEXITY FOR for every m=1 [0 =1 SOCIAL-INTERESTCAST 5. TRANSPORT COMPLEXITY FOR In this section, we aim to derive the transport complexity for Social-InterestCast. SOCIAL-INTERESTCAST 5.1 Social-InterestCast Sessions In this section, we aim to derive the transport complexity for Social-InterestCast. 5.1 Social-InterestCast Sessions Denote a Social-InterestCast session by an ordered pair if a user sends a message characterized by several words (an abstract) in his Facebook, only the users whose of the message can be We say that this behavior occurs due , which is a more common session pattern than in [29] and Social-BroadCast in [7]. In the following, to model the internal mathematical rule in this, we first provide 1) Validations Based on Foursquare Dataset: In this sec- we give the validation based on Foursquare dataset [9] to find out the distribution of session destinations for Social- to Foursquare: Foursquare was created in It is a location-based social networking service provider by "checking-in" function, by in Los Angeles (LA) and it was collected using It provides each user with the friend lists and of Social-InterestCast Session Destinations: In Foursquare dataset [9], each of user has personal interests, to facilitate the comprehension of users' interests, we first A) [41] to extract xt generated by users. For LDA, it is assumed that words of each document are arised from a of topics. What's more, LDA allows each document to share multiple topics with different proportions, and each words with the joint influence of word proportions To be specific, in our validation, is an arbitrary random user) with the check-in tips generated by users. Then we apply LDA model to extract the topics , we introduce Kullback-Leibler Divergence to measure the similarities of KL distance in the dataset, xt , θ DI k = {pki}dk k =< vk,Ik >, where vk is the source and each element vki in Ik = {vki}dk i=1 is the nearest node to the correspond- i=1, the random variable dk denotes ing pki in AI k, i.e., the the number of potential destinations for session DI followers of vk who are interested in the message from vk in this session. We call point pki the anchor point of vki, and define a set P I k. Then, we can get the following lemma. k := {vk} ∪ AI LEMMA 1. For a Social-InterestCast session DI k, when dk = ω(1), with probability 1, it holds that EMST(AI k) = Θ( EMST(P I k)) = Θ(LI P (β, dk)), where EMST(·) denotes the Euclidean minimum spanning tree over a set, and (6) where 1 < β < 2; it holds that β > 2; β = 2; 0 ≤ β < 1.  EMST(AI LI P(β, dk) = PROOF. By Lemma 4 in Appendix A, with probability 1, Θ(cid:0)√dk(cid:1) , Θ(cid:0)√dk · log n(cid:1) , 2(cid:17) , Θ(cid:16)√dk · n1− β log n(cid:17) , β = 1; Θ(cid:16)√dk ·q n Θ(cid:0)√dk · √n(cid:1) , k) = Θ(pdk ·ZOpfX0 (X)dX), fX0 (X) = Θ(cid:0)(X − X02 + 1)−β(cid:1) , Θ(cid:16)(cid:0)log n · (X − X02 + 1)(cid:1)−1(cid:17) , β = 1; Θ(cid:0)nβ−1 · (X − X02 + 1)−β(cid:1) , Next, we computeROpfX0 (X)dX. According to the value 2! ZOpfX0 (X)dX = Θ n = Θ(cid:16)n (1) When 0 ≤ β < 1, (X − X02 + 1) (2) When β = 1, of β, we have: ·ZO 2(cid:17) = Θ (√n). · n1− β √log n ·ZO ZOpfX0 (X)dX = Θ 1 (X − X02 + 1) 2! β > 1; dX dX (3) When β > 1, = Θ(cid:16) 1√log n · √n(cid:17) = Θ(cid:16)q n log n(cid:17). 2! . 2(cid:19) = Θ(cid:16)n1− β 2(cid:17); ZOpfX0 (X)dX = Θ ZO when 1 < β < 2, Θ(cid:18)RO when β = 2, Θ(cid:16)RO (X−X02+1)(cid:17)=Θ (log n); (X − X02 + 1) (X−X02+1) dX Especially, dX dX β β β−1 β β−1 2 2 1 0 ≤ β < 1. when β > 2, Θ(cid:18)RO dX (X−X02+1) 2(cid:19)=Θ (1). β Then, by summarizing the derived results above, we can obtain that EMST(AI k) = Θ(LI P(β, dk) is defined in Eq.(6). P(β, dk)), where LI Let L denote the smallest distance from the points in AI k to point X0. We can get that EMST(AI k) ≤ EMST(P I k) + L, Furthermore, according to the fact that L = O( EMST(AI with probability 1, we get EMST(P I k) = Θ( EMST(AI which finally completes the proof. k) ≤ EMST(AI k)) k)), 5.2 Main Results on Transport Complexity 5.2.1 Bounds on Aggregated Transport Distance lowing theorem. k=1 EMST(P I The bound on the transport complexity depends on the k), which we compute in the fol- value ofPn THEOREM 1. For all Social-InterestCast sessions {DI probability, the order ofPn k}n with the Zipf's distribution as defined in Eq.(5), with high k) holds as pre- k=1 EMST(P I sented in Table 1. PROOF. Let Tl denote the number of users with l destina- tions. Then, by laws of larger numbers (LLN, Lemma 5 in Appendix A), we have k=1 Tl = n · Pr(qk = l) = n ·(cid:18)Xn−1 j=1 j−γ(cid:19)−1 · (l)−γ. For all sessions {DI k}n k=1, we define two sets: K1 := {kqk = Θ(1)},K∞ := {kqk = ω(1)}. Then, it follows that (7) Xn k=1 EMST(P I k) =bΣ1 +bΣ∞, where k). k),bΣ∞ = Xk∈K∞ EMST(P I bΣ1 = Xk∈K1 EMST(P I We first address the part of bΣ1. Since for qk = Θ(1), it k) = Θ(X−vk), we then havebΣ1 = holds that EMST(P I Pk∈K1 X − vk. For k ∈ K1, we define a sequence of ran- k := X − vk/√n, which have finite mean- dom variables φ1 k] = E[X−vk]/√n, where E[X−vk] ing as follows: E[φ1 is given in Lemma 5 of [37]. Then, according to Lemma 4, with probability 1, it holds that k(cid:17) , bΣ1 = Θ(cid:16)√n ·Xk∈K1 φ1 andPk∈K1 φ1 k/K1 = Θ(E [X − vk/√n]), where K1 denotes the cardinality of set K1. Therefore, Xk∈K1 φ1 k = Θ(cid:0)K1 · E(cid:2)X − vk/√n(cid:3)(cid:1) . Table 1: The Order ofPn 1 < β < 2 Θ(n2− β β = 2 Θ(n · log n) , γ ≥ 0; k=1 EMST(P I k) β = 1 Θ(n ϕ \ β ϕ > 3 2 ϕ = 3 2 1 < ϕ < 3 2 ϕ = 1 0 ≤ ϕ < 1 β > 2 Θ(n) , γ ≥ 0; γ > 1; Θ(n · log n), Θ(n),     0 ≤ γ ≤ 1. Θ(n), 7 γ > 5 2 − ϕ; Θ(n · log n), γ = 5 2 − ϕ; 2−γ−ϕ), Θ(n 1 < γ < 5 2−ϕ/ log n), γ = 1; 2−ϕ), 0 ≤ γ < 1. Θ(n Θ(n 5 5 2 − ϕ; Θ(n), Θ(n Θ(n Θ(n 3 5 γ ≥ 3 2 ; 2−γ/ log n), 1 < γ < 3 2 ; 2 /(log n)2), γ = 1; 2 / log n), 0 ≤ γ < 1. 3 Θ(n), 5 γ > 3 2 ; Θ(n · log n), γ = 3 2 ; 2−γ), Θ(n 1 < γ < 3 2 ; 2 / log n), γ = 1; 2 ), 0 ≤ γ < 1. Θ(n Θ(n 3 3     Θ(n · log n), γ > 1; Θ(n · (log n)2), 0 ≤ γ ≤ 1. 7 Θ(n · log n), γ > 5 2 − ϕ; Θ(n · (log n)2), γ = 5 2 − ϕ; 2−γ−ϕ · log n), Θ(n 1 < γ < 5 2 − ϕ; 2−ϕ), γ = 1; 2−ϕ · log n), 0 ≤ γ < 1. Θ(n Θ(n 5 5 5 Θ(n · log n), γ ≥ 3 2 ; 2−γ), Θ(n 1 < γ < 3 2 ; 2 / log n), γ = 1; 2 ), 0 ≤ γ < 1. Θ(n Θ(n 3 3 5 Θ(n · log n), γ > 3 2 ; Θ(n · (log n)2), γ = 3 2 ; 2−γ · log n), Θ(n 1 < γ < 3 2 ; 2 ), γ = 1; 2 · log n), 0 ≤ γ < 1. Θ(n Θ(n 3 3 Θ(n2− β 2 ) , γ ≥ 0; γ > 1; 2 ), Θ(n2− β Θ(n2− β Θ(n2− β 2 · log n), 0 ≤ γ ≤ 1. 2 ), γ > 5 7 7 9 2 ), 2 − ϕ; 2 · log n), γ = 5 2 − ϕ; 2 −γ−ϕ− β 2 ), 1 < γ < 5 2 − ϕ; 2 −ϕ− β 2 / log n), γ = 1; 2 −ϕ− β 0 ≤ γ < 1. 2 ), γ ≥ 3 2 ; 2 −γ− β 2 / log n), 1 < γ < 3 2 ; 2 − β γ = 1; 2 − β 2 / log n), 0 ≤ γ < 1. 2 ), γ > 3 2 ; 2 /(log n)2), 5 5 7 Θ(n2− β Θ(n Θ(n Θ(n Θ(n Θ(n Θ(n Θ(n2− β Θ(n2− β 7 5 2 · log n), γ = 3 2 ; 2 −γ− β 2 ), 1 < γ < 3 2 ; 2 − β 2 / log n), γ = 1; 2 − β 2 ), 0 ≤ γ < 1. 5 Θ(n Θ(n Θ(n     3 3 3 3 3 Θ(n Θ(n Θ(n γ = 5 2 /√log n) , γ ≥ 0; 2 /√log n), γ > 1; 2 · √log n), 0 ≤ γ ≤ 1. 2 /√log n), γ > 5 2 − ϕ; 2 · √log n), Θ(n 2 − ϕ; Θ(n4−γ−ϕ/√log n), 1 < γ < 5 2 − ϕ; Θ(n3−ϕ/(log n) 2 ), Θ(n3−ϕ/√log n), 0 ≤ γ < 1. 2 /√log n), γ ≥ 3 2 ; Θ(n3−γ/(log n) 1 < γ < 3 2 ; 2 ), Θ(n2/(log n) γ = 1; Θ(n 2 ), 3 5 3 3 γ = 1; 3 3 3 Θ(n γ = 3 2 ; Θ(n2/(log n) 2 ), 0 ≤ γ < 1. 2 /√log n), γ > 3 2 ; 2 · √log n), Θ(n Θ(n3−γ/√log n), 1 < γ < 3 2 ; Θ(n2/(log n) 2 ), Θ(n2/√log n), 0 ≤ γ < 1. γ = 1; 3     2 − ϕ; 0 ≤ β < 1 Θ(n 3 3 3 3 Θ(n Θ(n 2 ) , γ ≥ 0. Θ(n 2 ), γ > 1; 2 · log n), 0 ≤ γ ≤ 1. 2 ), γ > 5 2 · log n), γ = 5 Θ(n4−γ−ϕ), 2 − ϕ; 2 − ϕ; 1 < γ < 5 Θ(n3−ϕ/ log n), Θ(n 3 γ = 1; Θ(n3−ϕ), 3 Θ(n 0 ≤ γ < 1. 2 ), γ ≥ 3 2 ; Θ(n3−γ/ log n), 1 < γ < 3 2 ; Θ(n2/(log n)2), γ = 1; Θ(n2/ log n), 3 Θ(n 0 ≤ γ < 1. 2 ), γ > 3 2 ; 2 · log n), γ = 3 2 ; Θ(n3−γ), Θ(n 3 1 < γ < 3 2 ; Θ(n2/ log n), γ = 1; Θ(n2), 0 ≤ γ < 1.     Then, by Lemma 5 in Appendix A, with probability 1, it holds that where LI P 5), with probability 1, it follows that (β, dk) is defined in Eq.(6). And using LLN (Lemma bΣ1 = Θ(cid:0)K1 · E[X − vk](cid:1) . Next, we consider bΣ∞. By introducing anchor points, all k) with k ∈ K∞ are indepen- random variables EMST(P I dent. For users with follower number in K∞, we define two sets: (8) ∞, where Then, it follows that ∞ = {kdk = ω (1)}. K∞1 = {kdk = Θ (1)},K∞ bΣ∞ =bΣ∞1 +bΣ∞ ∞ = Xk∈K∞ k(cid:1),bΣ∞ EMST(cid:0)P I bΣ∞1 = Xk∈K∞ k(cid:1). EMST(cid:0)P I We first consider the K∞1 . For dk = Θ (1), the order of bΣ∞1 is lower than that of bΣ1. For the final summation, the specific value ofbΣ∞1 is relatively infinitesimal. Next, we consider K∞ ∞ probability 1, it holds that P(β, dk)(cid:1) , EMST(cid:0)P I k(cid:1) = Θ(cid:0)LI . According to Lemma 1, with ∞ 1 l=2 Xl ∞ =Xn−1 bΣ∞ Tl · Pr(dk = dqk = l) · LI P (β, d) . (10) Combining with Eq.(7), Eq.(8), Eq.(9) and Eq.(10), we com- plete the proof of Theorem 1. d=1 5.2.2 Tight Bounds on Transport Complexity Firstly, we give the main result (Theorem 2), i.e., the scal- ing laws of transport complexity, and prove them tight bounds on the transport complexity by deriving lower bounds (Lemma 2) and computing upper bounds (Lemma 3), respectively. (9) THEOREM 2. Let CI N denote the transport complexity for Social-InterestCast sessions in a large-scale OSN over the carrier network with optimal communication architecture. Then, it holds that CI N = Θ (G (β, γ, ϕ)) , where G (β, γ, ϕ) depends on the clustering exponents of re- lationship degree γ, relationship formation β and dissemi- nation pattern ϕ, and the value is presented in Table 3 in Appendix C. Note that the results in Table 3 synthetically depend on three parameters, i.e., γ, β, and ϕ. This contributes to the informative and comprehensive form of results. For carding the flow and improving the readability, we move the detailed results to Appendix C (Table 3). We will provide an intuitive explanation and discussion on the results in Section 5.2.3. In the following proofs, we let LI N denote the transport complexity for all data dissemination sessions in OSN N. Lower Bounds on Transport Complexity: The follow- ing Lemma 2 demonstrates a lower bound on transport com- plexity for OSN N. LEMMA 2. For the Social-InterestCast with the Zipf's distribution as defined in Eq.(5), it holds that LI N = Ω (G (β, γ, ϕ)) , where G (β, γ, ϕ) is presented in Table 3 in Appendix C. PROOF. Since Tl · Pr(dk = dqk = l) · d! , dk = Θ n−1Xl=1 nXk=1 we can get thatPn described in Table 2. Additionally, for all vk ∈ V, k=1 dk = W (γ, ϕ) , where W (γ, ϕ) is lXd=1 Table 2: The Number of All Destinations, W (γ, ϕ) ϕ ϕ > 2 ϕ = 2 1 < ϕ < 2 ϕ = 1 0 ≤ ϕ < 1 W (γ, ϕ) Θ(n) , γ ≥ 0. ( Θ(n), γ > 1; γ > 3 − ϕ; γ = 3 − ϕ; 1 < γ < 3 − ϕ; 0 ≤ γ < 1. γ ≥ 2; Θ(n · log n), 0 ≤ γ ≤ 1. Θ(n), Θ(n · log n), Θ(n4−γ−ϕ), Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), Θ(n), Θ(n3−γ/ log n), 1 < γ < 2; Θ(n2/(log n)2), γ = 1; Θ(n2/ log n), Θ(n), Θ(n · log n), Θ(n3−γ), Θ(n2/ log n), γ = 1; Θ(n2), γ > 2; γ = 2; 1 < γ < 2; 0 ≤ γ < 1. 0 ≤ γ < 1.    E[vki − pki] = Θ Z √n 0 x · e−π·x2 dx! . That is, E[vki − pki] = Θ (1) . Therefore, according to Lemma 5, with probability 1, it follows that dk(cid:17) = Θ (W (γ, ϕ)) . k=1Xdk Xn i=1 vki−pki = Θ(cid:16)Xn (11) k=1 G(β, γ, ϕ) Θ(n3−ϕ) Θ(n3−ϕ/ log n) Θ(2 − β 2 ) 0 • 1 1 < β < 2, 1 < ϕ < 3 2 γ ≥ 3 − ϕ : 1 < γ < 3 − ϕ : γ = 1 : 0 ≤ γ < 1 : • Θ(n4−γ−ϕ) 3 − ϕ γ e 7: The Order of Lower Bounds on The Derived Figure 7: The Order of Lower Bounds on The Derived Transport Load, Transport Complexity, G (β, γ, ϕ), under 1 < β < 2 and ϕ < 1 < ϕ < 3/2. β, γ, ϕ , under < β < Combining with Theorem 1, for all Social-InterestCast ses- k, k = 1, 2, ..., n, with high probability, it holds that sions DI Xn k=1 EMST(DI 6. CONCLUSION AND FUTURE WORK k) = Ω (G (β, γ, ϕ)) , To measure the transport difficulty for data dissemination where G (β, γ, ϕ) is provided in Table 3 in Appendix C. in online social networks (OSNs), we have defined a new Then, we complete the proof of Lemma 2. . To model the formation of the interest-driven social session, i.e., Social-InterestCast, Upper Bounds on Transport Complexity: Here, we an- we have proposed a four-layered architecture to model the alyze the upper bounds on transport complexity for Social- dissemination in OSNs, including the physical layer, InterestCast sessions over an optimal carrier network, i.e., , content layer, and session layer. By analyz- a dedicated carrier communication network for this applica- vances among these four layers, we have ob- tion. In such a carrier network, a dedicated link can be built of dis- for every link in EMST(P I k), k = 1, 2,··· , n. Therefore, in OSNs. We have presented the den- from Lemma 1 and Theorem 1, for Social-InterestCast ses- of general social relationship distribution and sions, the aggregated transport distances of each session and of bounds on transport load for large-scale all sessions can respectively reach to the orders as presented we have derived the tight lower bound in Eq.(6) and Table 1. Then, we have on transport complexity of Social-InterestCast. work still remains to be done. Main issues are as LEMMA 3. For the Social-InterestCast with the Zipf's LI distribution as defined in Eq.(5), it holds that N = O (G (β, γ, ϕ)) , In our work, although we have assumed that users are it is also applicable to the mobile scenario where each moves within a bounded distance from exact one where G (β, γ, ϕ) is presented in Table 3 in Appendix C. , in our numerical evaluation, we have of each mobile user as his stat- 5.2.3 Explanation of Results ic location. However, mobile users in real-life scenario are Based on the complete results in Table 3 in Appendix by more than one home point rather than C, we can observe that the final results vary in the range exact one home point. Therefore, it is necessary to further e into account a more realistic model for users distribu- in the physical deployment layer, such as Multi-center (cid:2)Θ(n), Θ(n2)(cid:3), when the parameters γ, β, and ϕ have dif- ferent values in the range [0, +∞). For Table 3, it is too complex to provide a clear insight on the results. To facilitate the understanding of our results, we choose a case of results and make them visualized. Figure 7 illustrates the results for the case 1 < β < 2 and 1 < ϕ < 3 2 . Next, we mainly discuss the impacts of the clustering ex- ponents of relationship degree γ, relationship formation β and dissemination pattern ϕ on the transport complexity. Our result demonstrates that the transport complexity for Social- We have provided only the explicit result for the model of users. This of real- & social-based information dissemi- a subsequent traffic session initiated from a is usually triggered by the previous session from an- However, we have focused exclusively on the val model without considering the correlations of InterestCast is non-increasing within the range(cid:2)Θ(n), Θ(n2)(cid:3) in terms of the parameters γ, β, and ϕ. An intuitive explana- tion for this impact can be provided as follows: Under each Social-InterestCast, a larger clustering exponent of relation- ship degree γ can limit the number of friends of each user or the advantages of the introduced in [14]. γ, β overly accumulate the transport distance of such a dis- on the explanation as follows: For a data dissemination, the of the last hop is relatively infinitesimal to the ag- gate distance of this dissemination. What's more, for the of scaling laws issue, we only care about the order of transport load imposed on the carrier communication net- works of OSNs. Anyway, it is a significant work to seek for a more accurate and practical metric to measure the transport of data dissemination in OSNs. 7. REFERENCES worldwide-social-network-users/. fic forecast update, 2013-2018. G. Alfano, M. Garetto, and E. Leonardi. Capacity E. Altman. A stochastic game approach for M. M. Amble, P. Parag, S. Shakkottai, and L. Ying. E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The of social networks in information diffusion. In Proc. ACM WWW 2012 J. Bao, Y. Zheng, and M. F. Mokbel. Location-based F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. into smaller upper bound with high probability, then leads to a lower transport complexity; a larger clustering expo- nent of relationship formation β makes the followers more closer to each user with high probability, then possibly re- duces the total transport distance of each Social-InterestCast session, finally also leads to a lower transport complexity; a larger clustering exponent of dissemination pattern ϕ leads to a smaller probability that the source chooses larger num- ber of destinations from its followers, which leads to a lower transport load. ric overly accumulate the transport distance of such a dis- semination. Even so, our results are still reasonable based on the explanation as follows: For a data dissemination, the distance of the last hop is relatively infinitesimal to the ag- gregate distance of this dissemination. What's more, for the feature of scaling laws issue, we only care about the order of transport load imposed on the carrier communication net- works of OSNs. Anyway, it is a significant work to seek for a more accurate and practical metric to measure the transport difficulty of data dissemination in OSNs. 6. CONCLUSION AND FUTURE WORK To measure the transport difficulty for data dissemination in online social networks (OSNs), we have defined a new metric, called transport complexity. To model the formation of the interest-driven social session, i.e., Social-InterestCast, we have proposed a four-layered architecture to model the data dissemination in OSNs, including the physical layer, so- cial layer, content layer, and session layer. By analyzing mu- tual relevances among these four layers, we have obtained the geographical distribution characteristics of dissemina- tion sessions in OSNs. We have presented the density func- tion of general social relationship distribution and the gen- eral form of bounds on transport load for large-scale OSNs. Furthermore, we have derived the tight bounds on transport complexity of Social-InterestCast. 7. REFERENCES [1] http://www.statista.com/statistics/278414/number-of- worldwide-social-network-users/. [2] https://www.globalwebindex.net/blog/daily-time- spent-on-social-networks-rises-to-1-72-hours. [3] http://snap.stanford.edu/data/loc-brightkite.html. [4] Cisco visual networking index: Global mobile data traffic forecast update, 2013-2018. [5] Shareaholic's search traffic vs. social referrals report. https://blog.shareaholic.com/search-traffic-social-referrals-12-2013/. [6] G. Alfano, M. Garetto, and E. Leonardi. Capacity scaling of wireless networks with inhomogeneous node density: Upper bounds. IEEE Journal on Selected Areas in Communications, 27(7):1147 -- 1157, 2009. Much work still remains to be done. Main issues are listed [7] E. Altman. A stochastic game approach for as follows: ✄ In our work, although we have assumed that users are static, it is also applicable to the mobile scenario where each mobile user moves within a bounded distance from exact one home point. Actually, in our numerical evaluation, we have made the most visited point of each mobile user as his static location. However, mobile users in real-life scenario are usu- ally constrained by more than one home point rather than exact one home point. Therefore, it is necessary to further take into account a more realistic model for users distribu- tion in the physical deployment layer, such as Multi-center Gaussian Model (MGM) in [15]. ✄ We have provided only the explicit result for the model with homogeneous geographical distribution of users. This cannot still highlight sufficiently the characteristics of real- life OSNs or the advantages of the population-distance-based model. ✄ Under the profile & social-based information dissemi- nation pattern, a subsequent traffic session initiated from a source is often triggered by the previous session from an- other source. However, we have focused exclusively on the data arrival model without considering the correlations of data generating processes. ✄ When applying the metric transport complexity to wire- less broadcast, the definition will overestimate the transport difficulty for data dissemination in OSNs. To be specific, in some scenarios, data targeted to multiple destinations can be transmitted by a simple wireless broadcast, while our met- competition over popularity in social networks. Dynamic Games and Applications, 3(2):313 -- 323, 2013. [8] M. M. Amble, P. Parag, S. Shakkottai, and L. Ying. Content-aware caching and traffic management in content distribution networks. In Proc. IEEE INFOCOM 2011. [9] B. Azimdoost and H. Sadjadpour. Capacity of scale free wireless networks. In Proc. IEEE GlobeCom 2012. [10] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. The role of social networks in information diffusion. In Proc. ACM WWW 2012. [11] J. Bao, Y. Zheng, and M. F. Mokbel. Location-based and preference-aware recommendation using sparse geo-social networking data. Gis, pages 199 -- 208, 2012. [12] F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. In Proc. ACM IMC 2009. [13] D. M. Blei, A. Y. Ng, M. I. Jordan, and J. Lafferty. Latent dirichlet allocation. Journal of Machine Learning Research, 3:993 -- 1022, 2003. [14] Y. Borghol, S. Ardon, N. Carlsson, D. Eager, and A. Mahanti. The untold story of the clones: content-agnostic factors that impact youtube video popularity. In Proc. ACM SIGKDD 2012. [15] I. K. C. Cheng, H. Yang and M. R. Lyu. Fused matrix factorization with geographical and social influence in R. Chandramouli. Twitter analytics: Architecture, tools and analysis. In Proc. IEEE MILCOM 2010. [33] M. Shafiq, M. Ilyas, A. Liu, and H. Radha. Identifying leaders and followers in online social networks. IEEE Journal on Selected Areas in Communications, 31(9):618 -- 628, 2013. [34] H. H. Song, B. Savas, T. W. Cho, V. Dave, Z. Lu, I. S. Dhillon, Y. Zhang, and L. Qiu. Clustered embedding of massive social networks. In Proc. ACM SIGMETRICS PER 2012. [35] J. Steele. Growth rates of Euclidean minimal spanning trees with power weighted edges. The Annals of Probability, 16(4):1767 -- 1787, 1988. [36] M. Tavakolifard and K. Almeroth. Social computing: an intersection of recommender systems, trust/reputation systems, and social networks. IEEE Network, 26(4):53 -- 58, 2012. [37] C. Wang, S. Tang, L. Yang, Y. Guo, F. Li, and C. Jiang. Modeling data dissemination in online social networks: A geographical perspective on bounding network traffic load. In Proc. ACM MobiHoc 2014. [38] D. Williams. Probability with martingales. Cambridge university press, 1991. [39] O. Yagan, D. Qian, J. Zhang, and D. Cochran. Conjoining speeds up information diffusion in overlaying social-physical networks. IEEE Journal on Selected Areas in Communications, 31(6):1038 -- 1048, 2013. [40] M. Yan, J. Sang, and C. Xu. Mining cross-network association for youtube video promotion. In Proc. ACM Multimedia 2014. [41] X. Yang, Y. Guo, and Y. Liu. Bayesian-inference-based recommendation in online social networks. IEEE Transactions on Parallel and Distributed Systems, 24(4):642 -- 651, 2012. [42] J. Ye, H. Cheng, Z. Zhu, and M. Chen. Predicting positive and negative links in signed social networks by transfer learning. In Proc. ACM WWW 2013. [43] R. Zhou, S. Khemmarat, and L. Gao. The impact of youtube recommendation system on video views. In Proc. ACM IMC 2010. location-based social networks. In Proc. AAAI 2012. [16] K.-C. Chen, M. Chiang, and H. V. Poor. From technological networks to social networks. IEEE Journal on Selected Areas in Communications, 31(31):548 -- 572, 2013. [17] X. Chen, B. Proulx, X. Gong, and J. Zhang. Social trust and social reciprocity based cooperative D2D communications. In Proc. ACM MobiHoc 2013. [18] E. Cho, S. A. Myers, and J. Leskovec. Friendship and mobility: User movement in location-based social networks. In Proc. ACM SIGKDD 2011. [19] I. S. Dhillon, S. Mallela, and R. Kumar. Enhanced word clustering for hierarchical text classification. In Proc. ACM SIGKDD 2002. [20] L. Fu, J. Zhang, and X. Wang. Evolution-cast: Temporal evolution in wireless social networks and its impact on capacity. IEEE Transactions on Parallel and Distributed Systems, 25(10):2583 -- 2594, 2014. [21] A. Guille, H. Hacid, C. Favre, and D. A. Zighed. Information diffusion in online social networks: A survey. ACM SIGMOD Record, 42(2):17 -- 28, 2013. [22] T. Hossmann, T. Spyropoulos, and F. Legendre. Putting contacts into context: Mobility modeling beyond inter-contact times. In Proc. ACM MobiHoc 2011. [23] Y. Jin, J. Ok, Y. Yi, and J. Shin. On the impact of global information on diffusion of innovations over social networks. In Proc. IEEE INFOCOM 2013. [24] K. Kandhway and J. Kuri. Campaigning in heterogeneous social networks: Optimal control of si information epidemics. IEEE/ACM Transactions on Networking, PP(99), 2014. [25] H. Li, X. Cheng, and J. Liu. Understanding video sharing propagation in social networks: Measurement and analysis. Acm Transactions on Multimedia Computing Communications & Applications, 10(4):1 -- 20, 2014. [26] Y. Li, B. Q. Zhao, and J. Lui. On modeling product advertisement in large-scale online social networks. IEEE/ACM Transactions on Networking, 20(5):1412 -- 1425, 2012. [27] X. Liu and K. Aberer. Soco: a social network aided context-aware recommender system. In Proc. ACM WWW 2013. [28] C. Manning and H. Schutze. Foundations of statistical natural language processing. MIT press, 1999. [29] M. Mathioudakis and N. Koudas. Twittermonitor: trend detection over the twitter stream. In Proc. ACM SIGMOD 2010. [30] R. K. Merton et al. The matthew effect in science. Science, 159(3810):56 -- 63, 1968. [31] S. A. Myers, C. Zhu, and J. Leskovec. Information diffusion and external influence in networks. In Proc. ACM SIGKDD 2012. [32] R. Perera, S. Anand, K. Subbalakshmi, and APPENDIX A. SOME USEFUL LEMMAS We provide some useful lemmas as follows: LEMMA 4 (MINIMAL SPANNING TREE [35]). Let Xi, 1 ≤ i < ∞, denote independent random variables with val- ues in Rd, d ≥ 2, and let Mn denote the cost of a minimal spanning tree of a complete graph with vertex set {Xi}n i=1, where the cost of an edge (Xi, Xj) is given by Ψ((Xi − Xj)). Here, Xi − Xj denotes the Euclidean distance between Xi and Xj and Ψ is a monotone function. For bounded random variables and 0 < σ < d, it holds that as n → ∞, with probability 1, one has Mn ∼ c1(σ, d) · n d−σ d f (X) d−σ d dX, ·ZRd provided Ψ(x) ∼ xσ, where f (X) is the density of the ab- solutely continuous part of the distribution of the {Xi}. LEMMA 5 (KOLMOGOROV'S STRONG LLN [38]). Let {Xn} be an i.i.d. sequence of random variables having fi- nite mean: For ∀n, E[Xn] < ∞. Then, a strong law of large numbers (LLN) applies to the sample mean: ¯Xn a.s.−→ E[Xn], where a.s.−→ denotes almost sure convergence. B. EVALUATIONS BASED ON GOWALLA DATASET AND BRIGHTKITE DATASET In this section, we provide the evaluations of the adopted 55 50 45 40 35 30 e d u t i t a L = Y 25 −130 −120 −110 −100 −90 X=Longitude −80 −70 −60 Figure 8: The geographical position of Gowalla Users in North America. B.2 Evaluation of Degree Distribution In this work, we assume that the number of followers of a particular node vk ∈ V, denoted by qk, follows a Zipf's distribution [28], i.e., Pr(qk = l) =(cid:18)Xn−1 j=1 j−γ(cid:19)−1 · l−γ. Next, we validate the Zipf's degree distribution of social re- lationships by investigating the negative linear correlation between degree distribution model and population-distance-based model using Gowalla and Brightkite users datasets [18, 22]. B.1 Gowalla and Brightkite Datasets Gowalla and Brightkite were both created in 2007. They were once two location-based social networking service providers where users shared their locations by "checking-in" func- tion, [3, 18, 22]. For Gowalla, the relationship network con- sists of 196, 591 nodes and 950, 327 undirected edges. The Gowalla users' dataset in [22] collected a total of 6, 442, 890 checkins of these users over the period from February 2009 to October 2010. It provides each user with the incoming and outgoing follower lists as well as the latitude and lon- gitude. For Brightkite, the relationship network consists of 58, 228 nodes and 214, 078 directed edges. The Brightkite users' dataset in [18] collected a total of 4, 491, 143 check- ins of these users over the period from April 2008 to October 2010. It provides each user with the incoming and outgoing follower lists. In our evaluations, because of the deficiency of users' data in Asia and other areas, for Gowalla users' dataset [22], we extracted 52, 161 users who locate in North America to im- prove the accuracy and decrease the computation complex- ity. Figure 8 shows the geographical distribution of users in North America. Y and X represent the latitude and longi- tude of users' locations, respectively. Y := Nout(Kout) and X := Kout, where Kout represents an outgoing degree, and Nout(Kout) denotes the number of the users with an outgoing degree Kout. In Gowalla and Brightkite datasets [18, 22], the correla- tion between Y and X is described as in Figure 9. It shows that the correlation is approximately to be a line segment with negative slope, which basically matches our proposed model. B.3 Evaluation of Population-Distance-Based Model We discretize the network area O into a lattice consisting of 120, 000 points. Each point acts as a candidate anchor point. We denote this lattice by Od. Let d(u, p) denote the distance between user u and a ran- dom position/cell p in Od that serves as a candidate anchor point. Let D(u, p) denote the disk centered at u with a ra- dius d(u, p). Let N (u, p) denote the number of nodes in the disk D(u, p). Let vp denote the closest user to the candidate anchor point p. Furthermore, we define a variable I(u, vp) = 1 · {vp is a follower of u}. We validate the geographical distribution of relationships by investigating the negative linear correlation between Y (a) (b) Figure 9: (a) is the validation for social degree distribution of Gowalla users, while (b) is of Brightkite users from [37]. (a) (b) Figure 10: (a) is the validation for Population-Distance-Based social probability distribution of Gowalla users, while (b) is of Brightkite users. and X, where X denotes a number of nodes contained in a certain disk, and Y := 1 E · XI(u,vp)=1 1 · {N (u, p) = N}, with E denoting the set of all social links, respectively. In real-world dataset, the candidate anchor points located on the sea or in the desert are quite far from their nearest users, which leads to a high probability of outer sphere of users chosen to be a follower of vk. To get rid of these can- didate anchor points which are apart from the corresponding users, we set a threshold distance df to filter such positions as outliers. In this Gowalla dataset [22], df is set to be 200 kilometers, which makes the positions p cover most of the land and filter the ocean area simultaneously. In the Gowalla and Brightkite datasets [18, 22], the corre- lation between Y and X is described by Figure 10. It shows that the correlation tendency is approximated very coarsely to a line segment with a negative slope. The experimental result also basically validates the model, although it does not perfectly match. The main reason of mismatch possibly lies in the facts as follows: (1) The lo- cations of users in these datasets are actually the positions where they check-in, instead of the place where they usu- ally stay. (2) Based on these dataset, more than 90% results fall within the cases with X > 103. The accumulation of experimental errors here leads to the "bloated" tails in the evaluation figures. C. COMPLETE MAIN RESULTS Here, we summarize the main results of a complete form in the following table: β > 2 β = 2 1 < β < 2 β = 1 Table 3: The Order of Transport Complexity, G (β, γ, ϕ) Θ(n · log n), γ ≥ 0 Θ(n · log n) , γ ≥ 0. Θ(n2− β 2 ), γ ≥ 0 Θ(n2− β 2 ), γ ≥ 0. Θ(n Θ(n 3 2 /√log n), γ ≥ 0 2 /√log n) , γ ≥ 0. 3 0 ≤ β < 1 Θ(n 3 2 ), γ ≥ 0 Θ(n 3 2 ), γ ≥ 0. ϕ \ β ϕ > 2 ϕ = 2 3 2 < ϕ < 2 ϕ = 3 2 1 < ϕ < 3 2 ϕ = 1 0 ≤ ϕ < 1 Θ(n), γ ≥ 0       Θ(n), γ > 1; Θ(n · log n), 0 ≤ γ ≤ 1. Θ(n), γ > 3 − ϕ; Θ(n · log n), γ = 3 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ; Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. Θ(n), γ > 3 2 ; Θ(n · log n), γ = 3 2 ; 2−γ), 1 < γ < 3 2 ; Θ(n 5 Θ(n 3 2 / log n), γ = 1; 3 Θ(n 2 ), 0 ≤ γ < 1. Θ(n), γ > 3 − ϕ; Θ(n · log n), γ = 3 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ; Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. Θ(n), γ ≥ 2; Θ(n3−γ/ log n), 1 < γ < 2; Θ(n2/(log n)2), γ = 1; Θ(n2/ log n), 0 ≤ γ < 1. Θ(n), γ > 2; Θ(n · log n), γ = 2; Θ(n3−γ), 1 < γ < 2; Θ(n2/ log n), γ = 1; Θ(n2), 0 ≤ γ < 1.      Θ(n · log n), γ ≥ 3 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ; Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. Θ(n · log n), γ ≥ 3 2 ; 2−γ), 1 < γ < 3 2 ; Θ(n 5 Θ(n 3 2 / log n), γ = 1; Θ(n 3 2 ), 0 ≤ γ < 1. Θ(n · log n), γ ≥ 3 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ; Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. Θ(n · log n), γ ≥ 2; Θ(n3−γ/ log n), 1 < γ < 2; Θ(n2/(log n)2), γ = 1; Θ(n2/ log n), 0 ≤ γ < 1. Θ(n · log n), γ ≥ 2; Θ(n3−γ), 1 < γ < 2; Θ(n2/ log n), γ = 1; Θ(n2), 0 ≤ γ < 1. Θ(n2− β 2 ), γ ≥ 0. Θ(n 3 2 /√log n), γ ≥ 0. Θ(n 3 2 ), γ ≥ 0. Θ(n2− β 2 ), γ ≥ 3 2 ; Θ(n 5 2−γ), 1 < γ < 3 2 ; Θ(n 3 2 / log n), γ = 1; Θ(n 3 2 ), 0 ≤ γ < 1. Θ(n2− β 2 ), γ ≥ 3 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 3 − ϕ; Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. 2 ), γ > 3 2 ; Θ(n2− β Θ(n3−γ/ log n), 1 < γ ≤ 3 2 ; Θ(n2/(log n)2), γ = 1; Θ(n2/ log n), 0 ≤ γ < 1. 2 ), γ ≥ 2; Θ(2 − β Θ(n3−γ), 1 < γ < 2; Θ(n2/ log n), γ = 1; Θ(n2), 0 ≤ γ < 1.         3 2 /√log n), γ > 1; 2 · √log n), 0 ≤ γ ≤ 1. 3 Θ(n Θ(n Θ(n Θ(n 3 2 /√log n), γ > 5 2 · √log n), γ = 5 3 2 − ϕ; 2 − ϕ; 2 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 5 Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. 2 /√log n), γ ≥ 3 Θ(n 2 ; 3 Θ(n3−γ/ log n), 1 < γ < 3 2 ; Θ(n2/(log n)2), γ = 1; 3 Θ(n2/ log n), 0 ≤ γ < 1. 2 /√log n), γ > 3 Θ(n 2 ; 2 · √log n), γ = 3 2 ; Θ(n3−γ), 1 < γ < 3 2 ; Θ(n 3 Θ(n2/ log n), γ = 1; Θ(n2), 0 ≤ γ < 1. Θ(n 3 2 ), γ > 1; Θ(n 3 2 · log n), 0 ≤ γ ≤ 1. Θ(n Θ(n 3 2 ), γ > 5 2 − ϕ; 2 · log n), γ = 5 3 2 − ϕ; Θ(n4−γ−ϕ), 1 < γ < 5 2 − ϕ; Θ(n3−ϕ/ log n), γ = 1; Θ(n3−ϕ), 0 ≤ γ < 1. Θ(n 2 ), γ ≥ 3 2 ; 3 Θ(n3−γ/ log n), 1 < γ < 3 2 ; Θ(n2/(log n)2), γ = 1; Θ(n2/ log n), 0 ≤ γ < 1. Θ(n 2 ), γ > 3 2 ; 3 3 Θ(n 2 · log n), γ = 3 2 ; Θ(n3−γ), 1 < γ < 3 2 ; Θ(n2/ log n), γ = 1; Θ(n2), 0 ≤ γ < 1.    
1802.04936
1
1802
2018-02-14T02:53:20
MemeSequencer: Sparse Matching for Embedding Image Macros
[ "cs.SI", "cs.CV", "cs.MM" ]
The analysis of the creation, mutation, and propagation of social media content on the Internet is an essential problem in computational social science, affecting areas ranging from marketing to political mobilization. A first step towards understanding the evolution of images online is the analysis of rapidly modifying and propagating memetic imagery or `memes'. However, a pitfall in proceeding with such an investigation is the current incapability to produce a robust semantic space for such imagery, capable of understanding differences in Image Macros. In this study, we provide a first step in the systematic study of image evolution on the Internet, by proposing an algorithm based on sparse representations and deep learning to decouple various types of content in such images and produce a rich semantic embedding. We demonstrate the benefits of our approach on a variety of tasks pertaining to memes and Image Macros, such as image clustering, image retrieval, topic prediction and virality prediction, surpassing the existing methods on each. In addition to its utility on quantitative tasks, our method opens up the possibility of obtaining the first large-scale understanding of the evolution and propagation of memetic imagery.
cs.SI
cs
MemeSequencer: Sparse Matching for Embedding Image Macros Abhimanyu Dubey Massachusetts Institute of Technology [email protected] Esteban Moro Massachusetts Institute of Technology Universidad Carlos III de Madrid [email protected] Massachusetts Institute of Technology Manuel Cebrian [email protected] Iyad Rahwan Massachusetts Institute of Technology [email protected] 8 1 0 2 b e F 4 1 ] I S . s c [ 1 v 6 3 9 4 0 . 2 0 8 1 : v i X r a ABSTRACT The analysis of the creation, mutation, and propagation of social me- dia content on the Internet is an essential problem in computational social science, affecting areas ranging from marketing to political mobilization. A first step towards understanding the evolution of images online is the analysis of rapidly modifying and propagating memetic imagery or 'memes'. However, a pitfall in proceeding with such an investigation is the current incapability to produce a robust semantic space for such imagery, capable of understanding differ- ences in Image Macros. In this study, we provide a first step in the systematic study of image evolution on the Internet, by proposing an algorithm based on sparse representations and deep learning to decouple various types of content in such images and produce a rich semantic embedding. We demonstrate the benefits of our approach on a variety of tasks pertaining to memes and Image Macros, such as image clustering, image retrieval, topic prediction and virality prediction, surpassing the existing methods on each. In addition to its utility on quantitative tasks, our method opens up the possibility of obtaining the first large-scale understanding of the evolution and propagation of memetic imagery. KEYWORDS image virality, image macros, feature extraction, sparse representa- tion, embeddings, social network analysis, content understanding ACM Reference Format: Abhimanyu Dubey, Esteban Moro, Manuel Cebrian, and Iyad Rahwan. 2018. MemeSequencer: Sparse Matching for Embedding Image Macros. In WWW 2018: The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New York, NY, USA, 11 pages. https://doi.org/https://doi.org/10.1145/3178876. 3186021 1 INTRODUCTION Social networks have increasingly become an integral part of mod- ern life. Recent research in computational social science has focused on detecting the most shared content, the extent and pace of shar- ing of content, and the most influential content-sharing agents in a Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. WWW 2018, April 23–27, 2018, Lyon, France © 2018 Association for Computing Machinery. ACM ISBN 978-1-4503-5639-8. https://doi.org/https://doi.org/10.1145/3178876.3186021 social network [6–10]. This line of inquiry, based on the study of predicting and understanding content virality has also risen interest in computer science [13, 52]. Content diffusion online can be un- derstood as a product of two intertwined properties: i) the nature of the content, its evolution and mutations, and ii) the properties of the social network on which it propagates. Diffusion of content and cascade prediction have received sub- stantial attention in this domain. Several lines of recent research have focused on understanding and predicting cascades [13], the probabilities of information diffusion in cascades [47], and the recur- rence of cascades [14]. These cascades are crucial in understanding the influence of the underlying social network on predicting the extent of propagation (popularity or virality) and provide strong insights into the importance of strong community structures in content propagation [54]. Extensive research has also been done in understanding the strength and extent of online community struc- tures and their impact on information diffusion [53, 55]. With increased online big data collection and processing, re- search has focused on understanding content virality through the information contained in online imagery or text [5, 17, 26]. Con- trary to the earlier mentioned research, this line of focus looks at the impact of content in predicting virality, independently from the network structure and its constituent effects of social reinforce- ment, homophily and spreading pattern. Using computer vision techniques, studies have looked at regions of images that promote content virality [20, 24]. An interesting combination of these two different lines of re- search is the study of evolution of information in social networks [3]. Since many memes exist in the social network that persist by mu- tating constantly [16, 17], understanding the mutations that are responsible for accelerating or hindering the popularity of a meme can be influential in content creation and understanding the cul- tural composition of online communities. An issue, however, with this line of study is the difficulty in isolating the underlying cultural meme from its various manifestations in online content [34, 48]. Identifying latent cultural memes from content such as tweets has been attempted first by Leskovec et al.[37], utilizing topic modeling, without explicitly considering mutations in content. Approaches such as n-grams and deep neural representations of text [23] have also been utilized to some success. When operat- ing on Twitter data, hashtags provide a grounded and less noisy representation of a meme, that has been utilized in studying the propagation of associated content on social networks [42, 46]. The work of Coscia [16, 17] has studied the nature of competition be- tween image macros online. The systematic study of mutations, sparse representation to identify template images from each Im- age Macro, and then using the obtained template, decouples the overlaid information from the base template. We then proceed to extract multimodal features from each image, resulting in a rich, informative and robust feature representation. Using this feature representation, we demonstrate remarkable improvements across several qualitiative and quantitative tasks involving social media imagery, demonstrating the conceptual and functional superiority of our approach from other baseline techniques. In cases where the template set is not known beforehand, we also provide an algorithm that can recover the template image from a set of sample macros based on median blending of images. 2 METHOD Our method is based on a strong underlying assumption – memetic imagery online contains substantial amounts of Image Macros, that are constructed from a set of template images by choosing a tem- plate image and overlaying text and/or additional imagery on it. This assumption is exploited in our formulation. We begin the al- gorithmic description with preliminaries: Target Set: Our target set T is the set of images that we wish to embed in a semantically-grounded space. In our experiments, this usually is the dataset that we conduct experiments on, scraped from websites such as Memegenerator [17] or Quickmeme [16]. We use this set of images to construct the set of template images, following Algorithm 2, that we then use for Sparse Matching and feature extraction. Template Set: The template set S is the set of images with no overlays that we match each image in the target set with, to obtain the decoupled Image Macro representation. This template set can be supplied beforehand, but in case it is not, we construct it from the Target Set itself using an algorithm involving Sparse Matching and Median Blending. Overlay Types: Figure 1 specifies the typical kinds of overlays on template images to produce Image Macros. The most common overlay is simple text in a white font (as shown in the section 'text overlay'). There can be modifications in the color or the addition of an image, which fall under the category of 'image overlay'. Addi- tionally, both these things may be present together, images of which fall in the 'combined overlay' category. We take care of minute vari- ations in color across images by contrast normalization. The goal of our Sparse Matching algorithm is to obtain the tem- plate image any sample Image Macro has been constructed from. Using this template image, we can then decouple the image over- lay from the Macro, and process the overlay and corresponding template separately to decouple the local context (specified by the overlay) and the global context (specified by the template). 2.1 Algorithm Overview Our task can be summarized as learning an embedding function : Rn → Rd that maps images to a low-dimensional embed- f ding that preserves semantic content. To create an embedding, our method follows three distinct subroutines as described below: (1) Overlay Decoupling: The first step of the algorithm is to identify and separate the overlaid content from the template image. To do this we employ global image contrast normalization followed Figure 1: A sample image macro ("Futurama Fry") with its most common overlays. however, still remains elusive under these approaches, and to the best of our knowledge, there is no work on the evolution of image- based memes. In this work, we provide a systematic framework and associated semantic feature space to study memetic imagery. Unlike the evo- lution of text, images mutate and evolve in a relatively controlled manner on the Internet, typical of which is the propagation of Im- age Macros, the most common type of online visual meme [34]. As described by Knobel and Lankshear [34], an Image Macro is the representation of an idea using an image superimposed with text optional alternative imagery. This form of representing a meme has been incredibly successful at dissemination, and is extremely popular on social networks [25]. In their most common form, Image Macros usually possess one or two lines of text flanking the template image in the center. Ad- ditionally, they may have altered imagery superimposed on the template image as well. Their etymology stems from the usage of the word "macro" in computer science, as a 'rule or a pattern that maps an input to an output' [38]. This highlights the usage of the Image Macro as a general purpose meme representation, that can be altered to fit the context specified by the overlaid text. The combination of the overarching memetic theme provided by the instantly-recognizable template image with the subtle contextual information provided by the overlaid text or imagery creates an instantly perceivable new meme that is versatile and adapted to the targeted community, justifying its prevalence in social media. Scientific inquiry involving the propagation of these Image Macros can hence provide a stronger signal in understanding the transformation of cultural memes. The primary problem, which we focus on in this work, is the creation of a semantic representation for Image Macros that preserve the semantic information in each image macro while mapping different instances of image macros created from the same base template image close together, preserv- ing the global context (supplied by the image), while additionally maintaining the individual context provided by each image macro. The baseline technique to solve a problem such as this would be to use deep neural network features, which have shown tremendous capabilities in encapsulating information from images. However, deep convolutional networks cannot decouple the overlaid imagery and template imagery, and process the overlay as noise, when the overlay in fact provides critical contextual information about the macro itself. This results in a loss of information from the macros, mapping most of them to the similar representation, which only amplifies as more overlays are made. In this study, we create an algorithm that first uses the idea of templatetextimagecombinedoverlay types by ℓ1-sparse reconstruction, first introduced in the seminal work on face recognition by Wright et al. [56]. (2) Image Feature Extraction: Image features learnt through deep convolutional neural networks (CNNs) for object classifica- tion have been shown to be tremendously powerful at capturing semantic information, and have excelled at a variety of inference tasks [21]. To capture the semantic content of the imagery, we use deep CNNs trained on image classification, and then finetuned on our target task. (3) Textual Feature Extraction: To augment the information provided by the image features, we additionally extract text present in the images using optical character recognition (OCR), and aug- ment our embedding with features extracted from this text data. To learn these text features, we use a deep recurrent neural net- work [39], inspired by their immense success in a variety of infer- ence tasks in the domain of natural language processing [15, 27, 61]. After overlay decoupling and multimodal feature extraction, we concatenate the obtained text and image features to produce a powerful embedding for image retrieval and clustering of the tar- get meme imagery, whose representational strength we verify in several experiments as described later. 2.2 Decoupling Overlays from Templates The first subroutine of our method involves decoupling the image overlay from the template it was produced from. This can be done using a straightforward pixel-wise subtraction, however, we do not have the source template of each image a priori, which makes the first task the identification or matching of the correct template image from the provided test image. We begin by first normalizing the color in the image with a global pixel-wise mean normalization, to remove the slight aberrations in color across images. We then downsample each image in both the template image set S and target image set T to a fixed resolution of 48 × 48 pixels. Consider these downsampled sets as Sd (template set) and Td (target set) respectively. Given these sets of normalized, downsampled images, we now describe the sparse representation algorithm. 2.2.1 Sparse Representation. Introduced by Wright et al. [56], the sparse representation algorithm provides a framework for in- ference under the assumption that the training samples lie on a subspace. Hence, each input test point can be written as a sparse linear combination of the training points. If we consider the train- ing set to be the set of downsampled template meme images Sd, and test set to be each image in the target set Td, we can apply the sparse representation algorithm to match each sample in Td to a sample in Sd. By this process, we can effectively recover the original template the macro was created from, and decouple the template from the overlay. Matching: Let the total number of images present across all templates be m, and images in each class i be given by mi. Hence, i =1 mi = m. Given a set Sd,i of mi images, represented as a matrix [s1,i , ..., smi,i] ∈ Rn×mi belonging to class i, any new target sample y ∈ Td ⊂ Rn belonging to template i will approximately lie in the linear span of the training samples of Sd,i. Hence: k y = α1,i s1,i + α2,i s2,i + α3,i s3,i + ... + αmi,i smi,i (1) Where αi, j ∈ R. If we consider the set of all classes Sd = ∪k i (Sd,i), we can write the matrix for all the mi samples from each of the k classes as: A := [Sd,1, Sd,2, ..., Sd,k] = [s1,1, s2,1, ..., smk,k] (2) Using this, we can write the linear representation of y over all training samples as: y = Ax0 ∈ Rn , subject to Ax = y x0 = arg min∥x∥0 (3) where, x0 = [0, ..., 0, α1,i , α2,i , ..., αmi,i , 0, ..., 0]⊤ ∈ Rm is a coeffi- cient vector with zero entries except for samples belonging to class i. As proposed in [56], to obtain the sparsest solution of the above equation, we have to solve the following ℓ0 optimization problem: (4) This corresponds to finding a coefficient vector x0 that contains the smallest number of non-zero entries. This problem in its current form is to find the sparsest solution of an underdetermined linear system, and is NP-hard, and even difficult to approximate [4]. As proposed in [11, 22, 56], under certain assumptions of sparsity, the ℓ0 minimization solution is equivalent to the ℓ1 minimization solution. We therefore solve the following problem: , subject to Ax = y (5) This corresponds to finding a coefficient vector x0 that has the min- ). Using standard linear programming methods, one can solve this problem in polynomial time [12]. As de- scribed in detail in [56], this algorithm recovers the correct training class even in the presence of severe occlusion (as provided by the overlaid text and/or pictures to an image), and heavy amounts of random noise. Hence, this method is ideal in our application case. Our algorithm is described in Algorithm 1. We begin by computing imum ℓ1-norm (m x1 = arg min∥x∥1 (i) i =1 x i Algorithm 1: Template Matching via Sparse Representation :Template Set Sd, Target Set Td, threshold tr , no. of Input different templates k Output:Matched Set Od 1 Set Od ← ∅ 2 Compute A ← [s1,1, s2,1, ..., smk,k] 3 for Image ti in Td do x ← arg min∥x∥1 4 if ∥Ax − ti ∥2 ≤ tr then 5 6 7 Compute zc ←mc for Class c from 1 to k do , subject to Ax = ti j=1 1{xj,c > 0} end Set z(i) ← [z1, z2, z3, ..., zk] Compute z(i) ← arg max(z(i)) Set Od ← Od ∪ {s1, z(i)} Set Od ← Od ∪ {ti} 8 9 10 11 else 12 13 14 15 end 16 return Od end Algorithm 2: Template Set Construction :Target Set Td, thresholds tr , tb Input Output:Template Set Sd 1 Set Sd,t ← ∅, Sd ← ∅ 2 for Image ti in Td do 3 4 5 6 7 8 9 10 11 12 13 Set Uti ← ∅ Set cti ← 0 if Sd,t = ∅ then Set Sd,t ← Sd,t ∪ {ti} Set Uti ← {ti} Compute A from Sd (from Algorithm 1 step 2) x ← arg min∥x∥1 if ∥Ax − ti ∥2 ≤ tr then Compute sz(i) ∈ Sd (from Algorithm 1) Set Us z(i) ← Us z(i) ∪ {ti} if cs z(i) = 0 then , subject to Ax = ti else Set v ← PixelWiseMedianBlending(Us z(i) ) if ∥v − sz(i)∥2 ≤ tb then Set sz(i) ← v Set cs z(i) = 1 14 15 16 17 end end else Set Sd ← Sd∪ Augment(si) Set Sd,t ← Sd,t ∪ {ti} Set Uti ← {ti} 18 19 20 21 22 23 24 end 25 for Image si in Sd,t do 26 27 end 28 return Sd pixel is the median of the corresponding pixels in all the images (referred to as PixelWiseMedianBlending). For every input image, we proceed in a similar manner until the new obtained median image is within a small error of the median image in the previous iteration (we check if ∥v−sz(i)∥2 ≤ tb, if yes, we reach convergence for image sz(i), and set cs z(i) = 1). After convergence, we do not alter the template image. Figure 2 describes how the median image evolves with increasing iterations. Once we have passed through all images in the target set, we augment the produced template set by random flips and crops of each template image (procedure described as 'Augment'). This is done since several Image Macros are also created from flipped and cropped versions of the template image, and this method ensures that every test image is mapped to a template correctly. This algo- rithm is described in Algorithm 2. 2.3 Image Feature Extraction Once we have completed the first procedure involving decoupling the overlay, we are ready to extract features that encapsulate the semantic visual content present in the imagery. A wide variety of image features have been experimented with in computer vision Figure 2: Sample recovery of the template images "Willy Wonka" and "Success Kid" from the target set examples. We show the ob- tained template at (a) 0 iterations, (b) 10 iterations, (c) 20 iterations, (d) 50 iterations and (e) 100 iterations. our downsampled template and target sets Sd and Td respectively, and set the output set mathb f Od to the empty set. For each im- age ti in the target set, we first compute the sparse representation weights x as described earlier. Using the components of the sparse representation, we then proceed to evaluate the number of non-zero weights present for samples of each template class and store it in variable zc for template class c. Owing to the sparse representation formulation, we find that only the matched template class possesses non-zero components. We then assign the template class by choos- ing the class with the maximum number of non-zero sparse weights, and assign the blank template image as the corrected set for the input sample ti. In case no matching template is found (the error in reconstruction is larger than a threshold tr , that is ∥Ax− ti ∥2 > tr ), we return the target image itself as the matched template. Once we have the assigned template image s1, z(i), we can de- couple the overlay from the template by computing the decoupled overlay as ti − s1, z(i), which can then help us do decoupled feature extraction. A caveat of this algorithm is that it requires an exhaus- tive template set to filter images successfully. However, in practical cases, we might not have the template set S, in which case the next algorithm to construct the template image set S from the target image set T can be used. Creation of Template Set: To construct a template set auto- matically from the target set, we describe an algorithm that utilizes the concept of median blending in image processing [59]. Median Blending is a commonly used technique in image processing to obtain a stable image from several noisy images. The central idea is to iteratively grow the template set and refine the template via successive median blending. We begin with an empty pre-augmented template set Sd,t , and iterate over the target set. For the first iteration, we simply add the input image itself to Sd,t , since our template set is empty. From here on, we maintain a set of template images Uti for every template ti we identify (hence, for the first iteration, we add the first image to the set Uti ). For every subsequent image, we compute the sparse coefficients sz(i) using Sd,t , and if the input image matches with a template (even if a template is garbled, the sparse representation will ensure a sparse match, which we evaluate via the reconstruc- tion error ∥Ax − ti ∥2). If a match is found, we add the input image to the set of images corresponding to the matched template image (Us z(i) ). We construct the new version of the template by blending all of the images in the set of matched images corresponding to that template. This blending is done by creating a new image where each (a)(b)(c)(d)(e) Figure 3: The central feature extraction pipeline. literature pertaining to web and social media [20, 24, 32]. An emerg- ing consensus in computer vision has been the extreme efficiency of deep neural network features in capturing semantic content for classification and understanding, as described in Donahue et al. [21]. From this, we continue all image feature extraction using on deep neural network models. 2.3.1 Convolutional Neural Networks. The immense popularity of convolutional neural networks across a wide variety of computer vision tasks have made it our default choice for feature extraction. Following standard practice in computer vision [20, 24], we consider neural network models trained on the image classification dataset ImageNet [19], and additionally consider models first trained on ImageNet followed by further fine-tuning on virality prediction datasets. 2.3.2 Decoupled Feature Extraction. For each image ti in the target set T, we extract features from two separate images. We first extract features from the matched image from the template set oi ∈ O, and then compute the difference image di = ti − oi, and extract features from this image as well, eventually concatenating the two sets of features to form our final feature vector vi. Hence, (6) Here, f () is a function that maps an image to a multidimensional semantic feature vector, and is obtained from a CNN. Since the basic overlaying of text or additional imagery would be treated as noise by the CNN, we separate the two components and extract features separately. This ensures that images belonging to the same base template have features that are closer together in semantic space. vi = [f (oi), f (ti − oi)] 2.4 Textual Feature Extraction Since most memetic imagery possess modfications in the form of overlaid text, we can exploit them to produce stronger represen- tations by a text extraction pipeline. For this, we first run Optical Character Recognition(OCR) to obtain the text (if any) contained in the image. Following this, we extract deep neural network fea- tures based on standard practices in the field of natural language processing using deep learning [40, 58, 60]. Optical Character Recognition: We use the Tesseract [51] pack- age for OCR, and trim excess trailing text. 2.4.1 Word2Vec Pooling. Here we extract word2vec [40] rep- resentations (following [41, 58, 60]) for each word present in the sentence, and to produce the final representation, we average over the individual word2vec representations. The word2vec implemen- tation used is GenSim [45] with dimensionality 1000. 2.4.2 Skip-Thought Vectors. Kiros et al. [33] introduce Skip- Thought Vectors, a generic encoding scheme for sentences. The immense versatility of skip-thought vectors on a wide variety of sentence classification tasks makes them a good choice for sentence embedding creation. To extract the skip-thought (ST) features, we simply supply the extracted text to the skip-thought model, and extract the penultimate layer features. If in the OCR phase, we do not find any text present in the image, we later replace the features with the mean text feature for that template across all images in the Target Set, in order to min- imize the impact on nearest neighbor retrieval and classification. We provide ablation and comparative studies to assess the individ- ual performance of each of the 2 abovementioned techniques in a variety of classification tasks, and find impressive results across the board, as summarized in the experiments section. Algorithm Summary: After image correction and individual ex- traction of text and image features, as described in Figure 3, we obtain an informative and flexible feature representation, that pre- serves semantic content in the presence of overlaid text and/or imagery. We analyse the effectiveness of our obtained represen- tation across a variety of experiments, as described in the next section. target macro set (T)template set (S)Sparse Matchingx(cid:7629)matched templatedecoupled overlayOCRImage Feature Extractor (CNN)Text Feature Extractor(RNN or Word2Vec)oh you just graduated? you must know everything.Feature Representationtemplate image featuresoverlay image featuresoverlay text features Figure 4: Evaluation of Sparse Matching on Clustering - variation of Silhouette Score (left), and Davies-Bouldin Index (right). 3 EVALUATION 3.1 Experimental Setup To showcase the effectiveness of our representation for memetic imagery, we perform a variety of qualitative and quantitative assess- ments. For all experiments, we use a setup involving NVIDIA TITAN X GPUs, and our implementation is done using the PyTorch [43] and TensorFlow [2] frameworks. For each of the individual lan- guage and vision models, we use their publicly available weights and implementations (we use GenSim [45] for Word2Vec). The Sparse Matching technique has two components - the im- age feature extractor (denoted as I), and the text feature extractor (denoted as T ), giving us results of the form Sparse Matching(I ,T) for that particular choice of feature extractors. For each experiment we conduct, we vary both the feature extractors to create different variants of the algorithm, which are all compared with (i) baseline feature extractors, (ii) previous state-of-the-art algorithms on our target tasks, (iii) each feature extractor individually and (iv) the naive combination of both feature extractors, providing an exhaus- tive set of comparative techniques. The CNN feature extractors we use are AlexNet [35], VGGNet-16 [49], and ResNet-18 [28]. As our results depict, the more powerful image feature extractors(ResNets and VGGNet-16) provide consistently higher performance. The target datasets for our task are datasets pertaining to memetic imagery, typically scraped from websites such as Memegenerator, Reddit or Quickmeme. There has been interest from both the com- puter vision and computational social science communities in un- derstanding such imagery, and we use the popular datasets used in these studies, with a total of 5 test splits used: (1) Viral Images Dataset [20]: Introduced in [20], the Viral Im- ages Dataset is a set of viral images filtered from the original dataset collected by Lakkaraju et al. [36] from Reddit over a period of 4 years. The dataset contains 10,078 images along with a metric for virality from 20 different image categories. This dataset contains 3 testing splits of data - (i)Viral-Complete(VCom), which is a collec- tion of randomly selected pairs of images, (ii)Viral-Pairs(VPair), which is a collection image pairs where an image from the top 250 most-viral images is paired with an image from the top 250 least viral images, and (iii) Viral-RandomPairs(VRPairs), which is a set of image pairs, where one image is sampled from the top 250 most viral images, and the other is sampled at random. We utilise the predetermined training, validation and test splits. (2) Memegenerator Dataset [17]: This dataset is a collection of meme images scraped from the website Memegenerator, from a period of June 27th, 2013 to July 6, 2013, accompanied with the number of upvotes for each meme as well. With a total of 326,181 images, this is the largest meme dataset, of which we use a random 70% for training, 10% images for validation and 20% for testing. (3) Quickmeme Dataset [16]: Similar to the Memegenerator Dataset, this dataset is scraped from the website Quickmeme from October 2012. This dataset has a total of 178,801 images, and here as well, we use an 70-20-10 train-test-val split. The end product of our algorithm is a versatile and efficient feature representation which can be potentially useful for several inference tasks involving online imagery, especially those that are propagated through social media, such as memes. To evalaute the efficacy of our proposed algorithm, the most natural initial experiment would be the image clustering and retrieval. A common task online would be phrased as "given a certain test image I and image set SI, what are the images in SI that are most similar (in semantic content) to the test image I?", and indeed, this is the first target task we design our algorithm for, and to evaluate our algorithm on this task, we look at three separate qualitative and quantitative experiments, as summarized below: 3.2 Image Clustering and Retrieval Clustering Analysis: A summarizable version of the retrieval task is the task of image clustering - understanding how our feature representation embeds the space of images. Considering that these images form smaller subsets in semantic space, we would expect distinct clusters being formed in the embedding space. Since we do not necessarily have labels for classes in most of our datasets, to assess the quality of clustering we first compare the internal cluster- ing metrics for our representation with the existing state-of-the-art and baseline methods. The Silhouette Score [44](SS) and the Davies- Bouldin Index [18](DBI) are two popular internal metrics used to quantifiably determine the quality of clustering of a representa- tion. We proceed by clustering points from the Memegenerator Dataset [16] and vary the number of desired clusters, to obtain the clustering indices for each feature extraction algorithm as functions 01020304050607080Number of Clusters0.40.50.60.70.80.91.01.1Mean of Silhouette IndexClustering Analysis via Silhouette IndexResNetAlexNetAlexNet + Word2VecResNet + SkipThoughtSparse Matching(AlexNet, Word2Vec)Sparse Matching(ResNet, SkipThought)01020304050607080Number of Clusters0.40.50.60.70.80.91.01.1Mean of DBI IndexClustering Analysis via DBI IndexResNetAlexNetAlexNet + Word2VecResNet + SkipThoughtSparse Matching(AlexNet, Word2Vec)Sparse Matching(ResNet, SkipThought) of the number of clusters required. Here, we use the clustering algo- rithm K-means, with an off-the-shelf implementation in Scipy [31]. The desiderata for efficient clustering are separable clusters, with no significant overlap, and high similarity within clusters. Or, put succintly, high intra-cluster similarity, and low inter-cluster similarity. If we consider the Silhouette Score (SS), for clusters that are balanced in size and fairly separable, we desire a low mean value of SI across clusters, and a low deviation of SS across clusters as well - representing the average deviation of cluster items from the cluster mean. Figure 4a summarizes the results for SS analy- sis, which demonstrates the distinctive clustering our algorithm provides. Similarly, for the metric DBI (Figure 4b), we consider the Euclidean distance as the distance metric, and observe consistently lower values, consolidating the efficiency of our algorithm in creat- ing rich feature representations. Image Retrieval and Visualization: The previous set of re- sults provide a quantiative summary of the improved clustering provided by our algorithm, but do not make precise an intuition to validate our representation. To strengthen the qualitative intu- ition behind the performance of our algorithm, we visualize using a nearest neighbor retrieval. We provide a set of example image retrieval queries, and com- pare the retrieved images for the nearest neighbours of the query in feature space. As summarized in Figure 5, the sparse matching algorithm is robust to changes in text information, and by decou- pling the text, base template and overlaid imagery, we see a richer embedding that preserves these changes in semantic space, whereas other algorithms simply treat an aberration or overlaid text as noise, providing poorer retrieval results. Just simply using image features retrieves visually similar images, yet, their text content is dissimilar. Using simply text features proceeds with the reverse effect, with various imagery being returned. Our method, however, returns a semantically aligned set of images. Observing the robustness of our representation and the quali- tiative improvements in image retrieval, a natural extension would be understanding the performance of the feature representation on more complex tasks involving online imagery, such as inferring the popularity, content and timeline of an image. These quantitative evaluation tasks are motivated by several observations on online imagery and online content itself. It has long been established in social science literature that memetic content on the internet is ephemeral and rapidly evolving [20, 24, 36], which makes the chal- lenge of predicting the nature of content and the timeline of its existence an interesting problem. Building on this line of thought, we now describe the quantitative experiments we perform to assess our algorithm. 3.3 Quantitative Evaluation We perform a series of varied inference tasks to assess the quality of representations generated by our algorithm. The general frame- work for evaluation in these experiments is as follows - (i) we first select a CNN-based image feature extractor from the set of CNNs described earlier, and select one of two text feature extractors, (ii) the CNN feature extractor is fine-tuned naively on the target task using the assigned training set, and (iii) we extract both image features and text features from the designated neural networks, Accuracy(%) Algorithm SVM + Image Features [20] SVM + 2x2 Dense HOG Features Finetuned AlexNet [35] Finetuned VGGNet16 [49] Finetuned ResNet18[49] SVM + Word2VecPooling [40] SVM + SkipThought Features [33] SVM + ResNet18 + Word2VecPooling [40] SVM + ResNet18 + SkipThought Features [33] Xiao and Lee [57] Singh and Lee [50] Dubey and Agarwal [24] Sparse Matching (AlexNet, Word2VecPooling) Sparse Matching (VGGNet16, Word2VecPooling) Sparse Matching (ResNet18, Word2VecPooling) Sparse Matching (AlexNet, SkipThought) Sparse Matching (VGGNet16, SkipThought) Sparse Matching (ResNet18, SkipThought) Table 1: On both tasks of topic and timeline prediction, we observe that Sparse Matching provides substantial improve- ments in performance. Topic Timeline 41.09 43.08 53.89 57.21 58.17 55.19 58.81 65.35 69.18 70.57 71.85 75.57 72.18 76.08 77.85 74.23 78.98 80.69 24.14 25.18 32.15 33.02 35.16 18.07 19.15 32.15 34.06 38.18 37.09 40.17 37.15 39.57 40.88 43.44 45.78 46.91 following the Sparse Matching algorithm. Finally, once the features are obtained, we train a multiclass SVM classifier [29] for each of the following inference tasks. If the task is a ranking task (as Virality Prediction), we train a RankSVM [30] instead. Topic Prediction: The Viral Images Dataset [20] is constructed of images scraped from Reddit [1], along with the subreddits these images were posted to. The subreddits are curated lists belonging to a particular genre or topic of content, and example subreddits are /r/funny, /r/aww, /r/wtf, /r/gaming and /r/atheism, and the resulting inference task is that of predicting the correct topic or subreddit the image was posted to. The task is challenging primarily owing to the overlap in im- agery across categories, and the overlap in context as well. For example, several categories may contain images of different an- imals or people, as well as a significant overlap in the template images that might be used. We compare our performance on this task with several benchmark and preivous state-of-the-art methods on this task, summarized in Table 1. Since there are 20 different categories, random chance performs at 5%. Due to the immense overlap in content, naive algorithms perform poorly, with less than 50% prediction accuracy. By just considering the text content itself, we see a slight increase in performance, which increases further still when both feature modalities are combined (image CNN is fine-tuned). However, as hypothesized, these features are corrupted by the coupling of text and image content, and hence perform averagely. Approaches that take context into account, such as the work of Singh and Lee [50], and Dubey and Agarwal [24] perform much better, however, they face challenges in decoupling text information. Finally, we see that Sparse Matching performs substantially better, with a maximum gain (with ResNet18 visual features and Skip Thought language features), of 5.12% in performance. Timeline Prediction: The results of the preivous experiment provide us with evidence regarding the representational power Algorithm RankSVM + Image Features [20] RankSVM + 2x2 Dense HOG Features RankSVM + AlexNet fc7 Features [35] RankSVM + VGGNet-16 fc7 Features [49] RankSVM + Word2VecPooling [40] RankSVM + SkipThought [33] RankSVM + ResNet18 + Word2VecPooling [40] RankSVM + ResNet18 + SkipThought [33] Xiao and Lee [57] Singh and Lee [50] Dubey and Agarwal [24] Sparse Matching (AlexNet, Word2VecPooling) Sparse Matching (VGGNet16, Word2VecPooling) Sparse Matching (ResNet18, Word2VecPooling) Sparse Matching (AlexNet, SkipThought) Sparse Matching (VGGNet, SkipThought) Sparse Matching (ResNet18, SkipThought) 53.40 52.75 54.41 55.18 60.11 63.06 66.05 69.36 63.25 65.87 68.09 70.02 70.93 71.87 70.86 71.54 73.03 61.60 58.81 61.93 63.01 61.78 64.12 70.98 74.51 75.23 76.20 78.38 82.21 83.03 84.19 83.05 83.98 85.15 58.49 56.92 58.58 59.15 59.94 60.23 70.33 72.09 73.22 74.38 76.95 80.04 81.15 81.96 81.29 82.34 82.62 VCom[20] VPairs[20] VRPairs[20] MemeGenerator[16] QuickMeme[17] Percentage Accuracy on Dataset 59.12 58.87 59.91 60.12 61.49 65.57 71.06 75.53 70.11 72.25 74.43 79.53 79.94 80.01 80.25 81.16 81.80 57.05 55.56 58.03 61.12 62.02 64.28 69.45 73.81 71.21 70.08 74.51 79.95 80.22 80.27 80.16 80.87 80.91 Table 2: Comparison of performance on the task of virality prediction. We observe that with our feature representation performance is unmatched compared to the existing state-of-the-art, by a significant margin. of our method. An extension of the first experiment would be to predict, along with the topic of the content, the time period it was posted in. Applications of such a task are present in content cre- ation, and prediction of popularity trends in social media. Since content on viral image websites and memes are continually evolv- ing, we see that the content alone can be a strong indicator of the time period it represents, as displayed by our prediction results in Column 2 of Table 1. We observe that naive baselines for both basic image features and text features fail miserably at this task, capturing very little in- formation about the context of an image, crucial for a task like timeline prediction. Deep image features perform slightly better, and a combination of deep image features and text features provides good performance, which is ousted by previous virality prediction techniques, and Sparse Matching. The decoupled context provides a signficant boost over the previous state-of-the-art, with an im- provement of 6.74%. Virality Prediction: With the impressive increase in perfor- mance on timeline prediction, we have evidence supporting the improved ability of our method to identify temporal distinctions in memetic imagery. This demonstration leads us to our final quantita- tive experiment, virality prediction. As summarized by recent work on detection of viral content and cascades in social networks [36], capturing virality is a difficult problem, with challenges arising from the presence short-lived content, rapidly evolving diverse imagery. With our model, however, we hypothesize that predicting virality would be possible with greater efficiency owing to the stronger, robust representation. Hence, we evaluate the prediction performance on the primary inference task of virality prediction, following the methodology introduced in [24]. Here, the prediction of virality is taken to be a pairwise classification task, where given an input pair of images, the algorithm needs to predict the more viral image of the two. This evaluation scheme has been shown to be robust to network effects [24], and is representative of evaluation of the image vi- rality based on the content alone. We follow the same procedure, replacing our SVM classifier with a Ranking SVM [30] classifier to learn a function that provides pairwise predictions. We evaluate our algorithm on 5 different datasets - the 3 test splits of the Viral Images Dataset [20] - (i) Viral-Complete, (ii) Viral Pairs, and (iii) Viral-RandomPairs, and the Memegenerator [16] and Quickmeme datasets [17]. For all experiments where a train-test split is not pre- defined, we use a 70-20-10 (train-test-val) split, following standard protocol. Our experiment is summarized in Table 2. Note here that since this is a pairwise prediction task, random chance performs at 50%. Again, as seen in the previous experiments, naive image-based al- gorithms perform only slightly better than random chance, with accuracies around 50-60%. Operating only on extracted text data gives us slightly better performance, but it fails to generalize since a lot of imagery do not possess any relevant text at all, which provides the algorithms with only noise. Sparse Matching provides large improvements, as high as 7.37% in some cases. Even the weakest versions of Sparse Matching perform 3.8% better than the previous state-of-the-art. Finally, we attempt to analyse the durability of our method in virality prediction. Since the nature of viral content changes rapidly over time, we would want to learn a classifier that can perform well for longer periods of time, given an input training set taken at any prior time. We would not want to keep re-training our algorithm often as new data keeps coming in, and reduce the time spent up- dating our model. To ascertain the invariance of methods in such a manner, we devise a final quantitative experiment. Temporal Robustness Analysis: To examine the resilience of our algorithm to evolving data, we devise the following experiment: The Memegenerator dataset [16] contains images from 13 different time periods, as described earlier. We select data from the ith time period as our training data, and test the trained algorithm on the 4 DISCUSSION AND FUTURE WORK In this work, we introduced the task of understanding the creation, mutation and propagation of image macros online as a represen- tation for the growth and evolution of a meme. We introduced a method that succesfully maps any arbitrary image macro to the template it was created from, and then embeds it into a powerful semantic space. We demonstrated the robustness and richness of the semantic embedding space via a variety of relevant experiments on online imagery - image retrieval, clustering, content analysis, popularity analysis and temporal evolution, all with remarkable performance. Our work is the first of its kind in the domain of web con- tent analysis that looks at the virality prediction problem through the lens of the Image Macro structure, and successfully exploits it. While prior work in the domain of virality prediction from content has focused on the originality of memes [17], popularity-promoting regions within meme images [24], relative attributes and category analysis [20], our approach provides a technique to systematically study the evolution of ideas and memes online. As a demonstration of this technique, we provide a sample phy- logenetic tree constructed from the pairwise distances between different image macros, obtained using our algorithm (see Figure 6). This tree displays the mutation of memes from a popular tem- plate, created using MATLAB's seqlinkage command (the figure displays selected nodes). We see that our embedding is powerful enough to capture subtle evolutionary patterns in the mutation of the meme, with children being semantically linked either through imagery (note the subtree with the hat overlay), or through text (subtree with pokemon text). With large amounts of time-series meme imagery, our embedding technique paves way for the study of systematic evolution of ideas on the Internet. All previous efforts in the study of image virality have been futile at extracting these subtle variations in memes, and creating evolutionary trees such as the one displayed, despite having success at the task of predicting virality [20, 24]. Our contribution through this work enables the large-scale study and analysis of such evo- lutionary trends online, with numerous applications in combining Figure 6: Pruned phylogenetic tree constructed from 1 meme template and its neighbours using distances gener- ated by Sparse Matching. Figure 5: 4-Nearest neighbour image retrieval results for two sample queries. Accuracy(%) Algorithm SVM + Image Features [20] SVM + 2x2 Dense HOG Features Finetuned AlexNet [35] Finetuned VGGNet16 [49] Finetuned ResNet18 [49] SVM + Word2VecPooling [40] SVM + SkipThought Features [33] SVM + Finetuned ResNet18 + Word2VecPooling [40] SVM + Finetuned ResNet18 + SkipThought Features [33] Xiao and Lee [57] Singh and Lee [50] Dubey and Agarwal [24] Sparse Matching (AlexNet, Word2VecPooling) Sparse Matching (VGGNet16, Word2VecPooling) Sparse Matching (ResNet18, Word2VecPooling) Sparse Matching (AlexNet, SkipThought) Sparse Matching (VGGNet16, SkipThought) Sparse Matching (ResNet18, SkipThought) Table 3: Evaluation of Sparse Matching on the Temporal Ro- bustness task. 51.02 51.18 51.75 51.56 51.97 52.02 52.95 55.68 56.35 62.67 61.98 62.83 61.78 61.97 63.49 64.07 64.18 65.12 k−1 k − i sets of test images from subsequent time periods. We perform i =1 (k − i) = k(k−1) total experiments, which in our case is 78. We report the average obtained performance for each algorithm, summarized in Table 3. It is vital to understand the difficulty of this task compared to the previous virality prediction experiment. For each time period, we have (on average) only 7% of the previously available training data, which provides a very sparse signal. This is consistent with the observation that most methods (including naive deep learning algorithms) perform very close to random chance, given the lower correlation between the observed training data and the test data. We still observe, however, that specialized methods perform much better than random chance, and Sparse Matching provides the best performance, showcasing again the richness and versatility of the method in capturing context. 2 Query ImageImage FeaturesText FeaturesSparse Matching the effects of content and network structure in understanding infor- mation diffusion and evolution. Such a study can be influential in creating methods for identifying original content and their sources, and creating a robust science for understanding how multimedia propagates on the Internet. REFERENCES [1] [n. d.]. reddit: the front page of the internet. http://www.reddit.com/. ([n. d.]). Accessed: 2017-09-30. [2] Martín Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. [n. d.]. TensorFlow: A System for Large-Scale Machine Learning. [3] Lada A Adamic, Thomas M Lento, Eytan Adar, and Pauline C Ng. 2016. Informa- tion evolution in social networks. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. ACM, 473–482. [4] Edoardo Amaldi and Viggo Kann. 1998. On the approximability of minimizing nonzero variables or unsatisfied relations in linear systems. Theoretical Computer Science 209, 1-2 (1998), 237–260. [5] Eytan Bakshy, Itamar Rosenn, Cameron Marlow, and Lada Adamic. 2012. The role of social networks in information diffusion. In Proceedings of the 21st international conference on World Wide Web. ACM, 519–528. [6] Albert-László Barabási. 2016. Network science. Cambridge university press. [7] Jonah Berger and Katherine L Milkman. 2012. What makes online content viral? Journal of marketing research 49, 2 (2012), 192–205. [8] Jonah Berger and Eric M Schwartz. 2011. What drives immediate and ongoing word of mouth? Journal of Marketing Research 48, 5 (2011), 869–880. [9] Vincent Buskens and Jeroen Weesie. 2000. Cooperation via social networks. Analyse & Kritik 22, 1 (2000), 44–74. [10] Vincent Buskens and Kazuo Yamaguchi. 1999. A new model for information diffusion in heterogeneous social networks. Sociological methodology 29, 1 (1999), 281–325. [11] Emmanuel J Candes, Justin K Romberg, and Terence Tao. 2006. Stable signal recovery from incomplete and inaccurate measurements. Communications on pure and applied mathematics 59, 8 (2006), 1207–1223. [12] Scott Shaobing Chen, David L Donoho, and Michael A Saunders. 2001. Atomic decomposition by basis pursuit. SIAM review 43, 1 (2001), 129–159. [13] Justin Cheng, Lada Adamic, P Alex Dow, Jon Michael Kleinberg, and Jure Leskovec. 2014. Can cascades be predicted?. In Proceedings of the 23rd inter- national conference on World wide web. ACM, 925–936. [14] Justin Cheng, Lada A Adamic, Jon M Kleinberg, and Jure Leskovec. 2016. Do Cascades Recur?. In Proceedings of the 25th International Conference on World Wide Web. International World Wide Web Conferences Steering Committee, 671–681. [15] Ronan Collobert and Jason Weston. 2008. A unified architecture for natural lan- guage processing: Deep neural networks with multitask learning. In Proceedings of the 25th international conference on Machine learning. ACM, 160–167. [16] Michele Coscia. 2013. Competition and Success in the Meme Pool: A Case Study [17] Michele Coscia. 2014. Average is boring: How similarity kills a meme's success. on Quickmeme. com. Scientific reports 4 (2014), 6477. [18] David L Davies and Donald W Bouldin. 1979. A cluster separation measure. IEEE transactions on pattern analysis and machine intelligence 2 (1979), 224–227. [19] Jia Deng, Wei Dong, Richard Socher, Li-Jia Li, Kai Li, and Li Fei-Fei. 2009. Ima- genet: A large-scale hierarchical image database. In Computer Vision and Pattern Recognition, 2009. CVPR 2009. IEEE Conference on. IEEE, 248–255. [20] Arturo Deza and Devi Parikh. 2015. Understanding image virality. In Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition. 1818–1826. [21] Jeff Donahue, Yangqing Jia, Oriol Vinyals, Judy Hoffman, Ning Zhang, Eric Tzeng, and Trevor Darrell. 2014. Decaf: A deep convolutional activation feature for generic visual recognition. In International conference on machine learning. 647–655. [22] David L Donoho. 2006. For most large underdetermined systems of linear equa- tions the minimal ÃřÂİÂŞÂĄ1-norm solution is also the sparsest solution. Com- munications on pure and applied mathematics 59, 6 (2006), 797–829. [23] Cícero Nogueira Dos Santos and Maira Gatti. 2014. Deep Convolutional Neural Networks for Sentiment Analysis of Short Texts.. In COLING. 69–78. [24] Abhimanyu Dubey and Sumeet Agarwal. 2017. Modeling Image Virality with Pairwise Spatial Transformer Networks. In Proceedings of the 2017 ACM on Multi- media Conference, MM 2017, Mountain View, CA, USA, October 23-27, 2017. 663–671. https://doi.org/10.1145/3123266.3123333 [25] Phil Edwards. [n. d.]. The reason every meme uses that one font. https://www. vox.com/2015/7/26/9036993/meme-font-impact/. ([n. d.]). Accessed: 2017-09-30. [26] James P Gleeson, Kevin P OâĂŹSullivan, Raquel A Baños, and Yamir Moreno. 2016. Effects of network structure, competition and memory time on social spreading phenomena. Physical Review X 6, 2 (2016), 021019. tions 5 (2001). [27] Alex Graves and Jurgen Schmidhuber. 2005. Framewise phoneme classification with bidirectional LSTM and other neural network architectures. Neural Networks 18, 5 (2005), 602–610. [28] Kaiming He, Xiangyu Zhang, Shaoqing Ren, and Jian Sun. 2016. Deep residual learning for image recognition. In Proceedings of the IEEE conference on computer vision and pattern recognition. 770–778. [29] Chih-Wei Hsu and Chih-Jen Lin. 2002. A comparison of methods for multiclass IEEE transactions on Neural Networks 13, 2 (2002), support vector machines. 415–425. [30] Thorsten Joachims. 2002. Optimizing search engines using clickthrough data. In Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 133–142. [31] Eric Jones, Travis Oliphant, Pearu Peterson, et al. 2001–. SciPy: Open source scientific tools for Python. (2001–). http://www.scipy.org/ [Online; accessed 9/30/2017]. [32] Aditya Khosla, Atish Das Sarma, and Raffay Hamid. 2014. What makes an image popular?. In Proceedings of the 23rd international conference on World wide web. ACM, 867–876. [33] Ryan Kiros, Yukun Zhu, Ruslan R Salakhutdinov, Richard Zemel, Raquel Urtasun, Antonio Torralba, and Sanja Fidler. 2015. Skip-thought vectors. In Advances in neural information processing systems. 3294–3302. [34] Michele Knobel and Colin Lankshear. [n. d.]. Online memes, affinities, and cultural production. ([n. d.]). [35] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classifica- tion with deep convolutional neural networks. In Advances in neural information processing systems. 1097–1105. [36] Himabindu Lakkaraju, Julian J McAuley, and Jure Leskovec. 2013. What's in a Name? Understanding the Interplay between Titles, Content, and Communities in Social Media. (2013). [37] Jure Leskovec, Lars Backstrom, and Jon Kleinberg. 2009. Meme-tracking and the dynamics of the news cycle. In Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 497–506. [38] M Douglas McIlroy. 1960. Macro instruction extensions of compiler languages. Commun. ACM 3, 4 (1960), 214–220. [39] LR Medsker and LC Jain. 2001. Recurrent neural networks. Design and Applica- [40] Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg S Corrado, and Jeff Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111–3119. [41] Nasrin Mostafazadeh, Nathanael Chambers, Xiaodong He, Devi Parikh, Dhruv Batra, Lucy Vanderwende, Pushmeet Kohli, and James Allen. 2016. A corpus and evaluation framework for deeper understanding of commonsense stories. arXiv preprint arXiv:1604.01696 (2016). [42] Ruth Page. 2012. The linguistics of self-branding and micro-celebrity in Twitter: The role of hashtags. Discourse & communication 6, 2 (2012), 181–201. [43] Adam Paszke, Sam Gross, and Soumith Chintala. 2017. PyTorch. (2017). [44] Slobodan Petrovic. 2006. A comparison between the silhouette index and the davies-bouldin index in labelling ids clusters. In Proceedings of the 11th Nordic Workshop of Secure IT Systems. 53–64. [45] R Rehurek and P Sojka. 2011. Gensim–python framework for vector space modelling. NLP Centre, Faculty of Informatics, Masaryk University, Brno, Czech Republic 3, 2 (2011). [46] Daniel M Romero, Brendan Meeder, and Jon Kleinberg. 2011. Differences in the mechanics of information diffusion across topics: idioms, political hashtags, and complex contagion on twitter. In Proceedings of the 20th international conference on World wide web. ACM, 695–704. [47] Kazumi Saito, Ryohei Nakano, and Masahiro Kimura. 2008. Prediction of informa- tion diffusion probabilities for independent cascade model. In Knowledge-based intelligent information and engineering systems. Springer, 67–75. [48] Limor Shifman. 2013. Memes in a digital world: Reconciling with a conceptual troublemaker. Journal of Computer-Mediated Communication 18, 3 (2013), 362– 377. [49] Karen Simonyan and Andrew Zisserman. 2014. Very deep convolutional networks for large-scale image recognition. arXiv preprint arXiv:1409.1556 (2014). [50] Krishna Kumar Singh and Yong Jae Lee. 2016. End-to-end localization and ranking for relative attributes. In European Conference on Computer Vision. Springer, 753– 769. [51] Ray Smith. 2007. An overview of the Tesseract OCR engine. In Document Analysis and Recognition, 2007. ICDAR 2007. Ninth International Conference on, Vol. 2. IEEE, 629–633. [52] Thomas W Valente. 1995. Network models of the diffusion of innovations. (1995). [53] Lilian Weng and Filippo Menczer. 2015. Topicality and impact in social media: diverse messages, focused messengers. PloS one 10, 2 (2015), e0118410. [54] Lilian Weng, Filipspo Menczer, and Yong-Yeol Ahn. 2013. Virality prediction and community structure in social networks. Scientific reports 3 (2013), 2522. [55] Lilian Weng, Filippo Menczer, and Yong-Yeol Ahn. 2014. Predicting Successful Memes Using Network and Community Structure.. In ICWSM. [56] John Wright, Allen Y Yang, Arvind Ganesh, S Shankar Sastry, and Yi Ma. 2009. Robust face recognition via sparse representation. IEEE transactions on pattern analysis and machine intelligence 31, 2 (2009), 210–227. [57] Fanyi Xiao and Yong Jae Lee. 2015. Discovering the spatial extent of relative attributes. In Proceedings of the IEEE International Conference on Computer Vision. 1458–1466. [58] Zichao Yang, Diyi Yang, Chris Dyer, Xiaodong He, Alexander J Smola, and Ed- uard H Hovy. 2016. Hierarchical Attention Networks for Document Classification.. In HLT-NAACL. 1480–1489. [59] Chenxi Zhang, Jizhou Gao, Oliver Wang, Pierre Georgel, Ruigang Yang, James Davis, Jan-Michael Frahm, and Marc Pollefeys. 2014. Personal photograph en- hancement using internet photo collections. IEEE transactions on visualization [60] Ye Zhang and Byron Wallace. 2015. A sensitivity analysis of (and practitioners' guide to) convolutional neural networks for sentence classification. arXiv preprint arXiv:1510.03820 (2015). [61] Xiaoqing Zheng, Hanyang Chen, and Tianyu Xu. 2013. Deep Learning for Chinese and computer graphics 20, 2 (2014), 262–275. Word Segmentation and POS Tagging.. In EMNLP. 647–657.
1705.10512
2
1705
2017-11-17T16:14:58
Towards Psychometrics-based Friend Recommendations in Social Networking Services
[ "cs.SI" ]
Two of the defining elements of Social Networking Services are the social profile, containing information about the user, and the social graph, containing information about the connections between users. Social Networking Services are used to connect to known people as well as to discover new contacts. Current friend recommendation mechanisms typically utilize the social graph. In this paper, we argue that psychometrics, the field of measuring personality traits, can help make meaningful friend recommendations based on an extended social profile containing collected smartphone sensor data. This will support the development of highly distributed Social Networking Services without central knowledge of the social graph.
cs.SI
cs
IEEE Copyright Notice Copyright (c) 2017 IEEE Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Published in: 2017 IEEE International Conference on AI & Mobile Services (IEEE AIMS 2017), June 25-30, 2017 DOI: 10.1109/AIMS.2017.22 Preprint from: https://arxiv.org/abs/1705.10512 Print at: https://doi.org/10.1109/AIMS.2017.22 Cite as: BibTeX: 7 1 0 2 v o N 7 1 ] I S . s c [ 2 v 2 1 5 0 1 . 5 0 7 1 : v i X r a F. Beierle, K. Grunert, S. Göndör, and V. Schlüter, "Towards Psychometrics-Based Friend Recommendations in Social Networking Services," in 2017 IEEE International Conference on AI & Mobile Services (AIMS). IEEE, 2017, pp. 105–108. @inproceedings{beierle_towards_2017, author = {Beierle, Felix and Grunert, Kai and G{\"o}nd{\"o}r, Sebastian and Schl{\"u}ter, Viktor}, title = {Towards {{Psychometrics}}-{{based Friend Recommendations}} in {{Social Networking Services}}}, booktitle = {2017 {{IEEE International Conference}} on {{AI \& Mobile Services}} ({{AIMS}})}, publisher = {{IEEE}}, year = {2017}, pages = {105--108} } Towards Psychometrics-based Friend Recommendations in Social Networking Services Felix Beierle∗, Kai Grunert∗, Sebastian Gondor∗, Viktor Schluter† ∗ Service-centric Networking Telekom Innovation Laboratories / Technische Universitat Berlin Berlin, Germany {beierle, kai.grunert, sebastian.goendoer}@tu-berlin.de † Technische Universitat Berlin, Berlin, Germany [email protected] Abstract-Two of the defining elements of Social Networking Services are the social profile, containing information about the user, and the social graph, containing information about the connections between users. Social Networking Services are used to connect to known people as well as to discover new contacts. Current friend recommendation mechanisms typically utilize the social graph. In this paper, we argue that psychometrics, the field of measuring personality traits, can help make meaningful friend recommendations based on an extended social profile containing collected smartphone sensor data. This will support the development of highly distributed Social Networking Services without central knowledge of the social graph. I. INTRODUCTION Social Networking Services (SNSs) are one of the most used services on the World Wide Web [1]. Two typical ele- ments of a SNS are the social profile, containing information about a user, for example her interests, and the social graph, containing information about the connections between users. In our previous work, we argued that the smartphone is the optimal social networking device [2]. It typically has only one user and, with recent developments in smartphone sensor technologies and available APIs, more and more personal data – like location traces, most frequently used apps, etc. – is available that could potentially extend existing social profiles. One of the typical applications in SNSs are friend rec- ommendations. When recommending new connections in an SNS, typically, the social graph is utilized [3]. While doing so enables the incorporation of graph-based properties like the number of mutual friends, there are also studies that look into the similarity of attributes of neighboring nodes, thus incor- porating the social profile in the recommendation process [4]. The basis for the cited studies about friend recommendations is the insight that homophily – the tendency for people to associate themselves with people who are similar to them – is structuring any type of network [5]. Looking further into the fields of psychology and social sciences, psychometrics, the academic field that deals with measuring psychological personality traits, seems like a promising research area provid- ing results that could help improve friend recommendations in SNSs. Recently, the company Cambridge Analytica was in the media because of their alleged success in utilizing psychometrics in targeted political campaign advertisements [6], though their impact on the campaign remains somewhat unclear [7]. Although the use case is different – targeted advertising instead of friend recommendation – this shows the potential of applying psychology research results to other fields. In this paper, we argue that combining current smart- phone technologies with findings from psychometrics will enable meaningful friend recommendations based on social profiles without requiring knowledge of the social graph. Our main contributions of this short paper is a thorough analysis of the theoretical background of psychometrics in relation to SNSs and mobile devices, including a proposal of how to integrate the insights into friend recommendations in SNSs. II. ANALYSIS AND CONCEPT In this section, we give a detailed analysis of relevant work related to psychometrics, social networking, and smartphone usage. In Section II-A, we give a literature review on how and why people actually connect with each other in (offline) social networks. We outline the concepts of homophily and personality from psychology and social sciences. In order to ensure that the same concepts hold true in SNSs, we look into existing research on SNSs and personality in Section II-B. In Section II-C, we investigate the relationship between smart- phone usage and personality. As we will deal with attributes of users rather then existing connections between users, we will look at existing definitions and components of social profiles in Section II-D. A. Psychology and Social Sciences In this section, we want to investigate two concepts from psychology and social sciences: homophily and personality. Those two concepts will help us conceptualize the parameters we need in a system for psychometrics-based friend recom- mendations. Furthermore, it will answer the questions "When do people become friends?", i.e., "When do people create edges in a social graph?", which are necessary to be asked in social networking. Homophily is the concept that people tend to associate themselves with other people that are similar to them. Ac- cording to McPherson et al., this principle structures network ties of every type, including friendship, work, or partnership [5]. Some of the categories in which people have homophilic contacts are ethnicity, age, education, and gender. The social profile is representing a user. The personality of a person influences a multitude of aspects, e.g., job per- formance, satisfaction, or romantic success [8] and is a "key determinant for the friendship formation process" [9]. One of the established ways to talk and research about personality is the so-called Big Five or Five-Factor model [10], [11]. The five personality factors spell the acronym OCEAN and are openness to experience, conscientiousness, extraversion, agreeableness, and neuroticism. In their study, Selfhout et al. show the importance of homophily for friendship networks [12]. For three of the five factors (openness to experience, extraversion, and agreeableness), they conclude that people tend to select friends with similar levels of those traits. Additionally to friendship, there are several studies finding correlations between different aspects of everyday life and the five factors. Especially interesting for social networking related questions is the correlations between the five factors and preferences or interests. [13] and [14] are two of the studies that find correlations between personality and the music the persons prefer to listen to. As we will show in Section II-D, music preference is a typical element for a social profile. It is the most commonly filled attribute in publicly accessible Facebook profiles after gender [15]. B. Social Networking Services and Personality that Several studies suggest the findings about (offline) social networks are also valid when dealing with SNSs. Liu claims the social profile is a "performance" by the user who expresses herself by crafting the profile [16]. While this might be true, various studies show that this does not imply that this "performance" distorts the personality that is expressed in the profile. For example, Back et al. conclude in their study that "Facebook Profiles Reflect Actual Personality, Not Self- Idealization," as the title of their paper indicates [17]. In their study, Goldbeck et al. show that Facebook profiles can be used to predict personality [8]. Another study comes to the same conclusion and shows "that Facebook-based personality impressions show some consensus for all Big Five dimen- sions" [18]. C. Smartphone Usage and Personality Some studies on pre-smartphone-era cell phones found cor- relations between personality traits and mobile phone usage. For example, these are the results of a study done on the general use of mobile phones (calls, text messages, changing ringtones and wallpapers) [19], as well as of a study about using mobile phone games [20]. While these studies were based on self reports by users, Chittaranjan et al. conducted two user studies in which they collected usage data on Nokia N95 phones [21], [22]. In those studies, the authors were looking at Bluetooth scan data, call text messages, calling profiles, and application usage. At the time the study was conducted, apps were not as common as nowadays with Android and iOS. The authors state that "features derived from logs, the App Logs were sparse due to the low frequency of usage of some of the applications" [22]. It will be interesting to compare the results from their study to a new study where the usage of apps is commonplace. The results of the cited studies indicate that "several aggregated features obtained from smartphone usage data can be indicators of the Big-Five traits" [22]. In a more recent study, Lane and Manner showed relations between the usage of apps and the five personality dimensions [23]. Apps were categorized in different application types: communication, games, multimedia, productivity, travel, and utilities. Overall, the referenced studies indicate strong cor- relations between smartphone usage behavior and personality traits. D. Social Profiles The social profile is one of the central elements of SNSs. In Boyd and Ellison's definition of Social Network Sites, the "public or semi-public profile within a bounded system" is the first defining element, and the "backbone" of the SNS [24]. Typical elements of a social profile are "age, location, interests, and an 'about me' section," and a photo. In [25], the social profile is the first defining functionality of an SNS. Here, the authors call the functionality "identity management," as the profile is a "representation of the own person." In a survey paper about SNSs, the social profile is described as the "core" of an Online Social Network [26]. Another recent survey describes the creation and maintenance of user profiles as the "basic functionality" of SNSs [27]. In [28], several SNSs from different categories, like general (e.g. Facebook), business oriented (e.g. LinkedIn) or special purpose (e.g. Twitter), were analyzed. The social profile is an element that is present in all of those SNSs. Rohani and Hock state that the type of information included in social profiles differs between different SNSs [29]. In their analysis of publicly disclosed Facebook profile information, Farahbakhsh et al. distinguish between personal and interest-based attributes [15]. Personal attributes include a friend list, current city, hometown, gender, birthday, employers, college, and high school. Interest- based attributes are music, movie, book, television, games, teams, sports, athletes, activities, interests, and inspirations. Lampe et al. distinguish between three different types of information: referents, interests, and contact [30]. Referents include verifiable attributes: hometown, high school, residence, concentration. Contact information are also verifiable, for example website, email, address, or birthday. As the authors indicate, interests are less verifiable. Interests include an 'about me' section, favorite music, movies, TV shows, books, quotes, and political views. As the cited studies in Section II-C and also social networking related studies (e.g., [31]) suggest, more detailed user data additional to the data typically available in a social profile can help improve recommendations in SNSs. III. CONCEPT AND PROTOTYPE Research in psychology and social sciences indicates that homophily in age, education, etc., as well as in personality traits, is a strong indicator for friendship, i.e., for the creation of an edge in a social graph. Several of the aforementioned studies conclude with findings about correlations between smartphone usage and personality traits. Combining those insights, in order to make meaningful recommendations for new connections in an SNS, we can recommend users that show a similar behavioral pattern with their smarthphones. As the existing studies suggest, this will indicate the similarity of their personality traits. Doing this, we do not necessarily need to know which behavior indicates which personality trait. Such a mechanism for friend recommendations can have several benefits: (1) By logging information about the smart- phone usage behavior (a lot of which can be done unobtru- sively, see [32]), we could automatically set up or update an existing social profile in an SNS, eliminating or reducing the tedious task to keep such a profile up to date [30]. (2) When fully relying on social profile data for friend recommendations, the social graph is not needed in the recommendation process. This will enable the development of highly distributed SNSs, for example in device-to-device scenarios where two randomly meeting people could determine – without contacting some centralized server – how similar they are and thus are recom- mended to be friends. (3) By collecting highly personalized user data, further studies in the fields of psychometrics could be possible. We are implementing an Android prototype. With the Google Awareness API, Google offers to get the user's current time, location, nearby places, nearby beacons, headphone state, activity, and weather.1 Android also enables developers to retrieve a list of the most frequently used apps. Most music players broadcast what the user is listening to, so other apps can retrieve this information. The available APIs and mechanisms allow for an unobtrusive collection of user data on Android smartphones. After collecting the mentioned data, in order to estimate their similarity, two users can share their data in a device-to-device manner by utilizing appropriate data structures and technologies like Bluetooth, Wi-Fi Direct, or Wi-Fi Aware. IV. RELATED WORK In this section, we review related work on smartphone sensor data collection (Section IV-A) and on link prediction in SNSs (Section IV-B). A. Smartphone Data Collection In [33], the authors survey the state of the art of "Antic- ipatory Mobile Computing," describing how the advances in mobile technology will enable predicting future contexts and acting on it. This field has some similarities to our work, especially with respect to collecting and using sensor data, but it does not focus on social networking. In [34], the authors present a framework called "BaranC" for monitoring and analyzing digital interaction of users with their smartphones. The architecture uses cloud technologies 1https://developers.google.com/awareness/ to analyze data and thus raises privacy concerns. The goal of BaranC is not social networking but offering personalized services. In another work by the same authors, an application utilizing their framework is presented [35], predicting the next application a user will use. Wang et al. present a system that collects a multitude of sensor data from mobile devices and queries the users with questionnaires. The collected data is then used to accurately predict the GPA of the undergraduate students who partici- pated [36]. Xiong et al. present a system for social sciences studies that collects sensor data and enables researchers to create surveys for study participants [37]. Again, in both those cases, the developed concepts did not focus on social networking. B. Link Prediction One of the common ways to research about links in social networks is link prediction. The key difference to our work is that here, the social graph is used to calculate the prediction or recommendation, while our approach is also feasible in device- to-device mobile SNS scenarios where the social graph is not known. Yin et al. analyzed links in social networks based on "intuition-based" aspects: homophily (shared attributes), rarity (matching uncommon attributes), social influence (more likely to link to person that shares attributes with existing friends), common friendship (mutual friends), social closeness (being close to each other in the social graph), preferential attachment (more likely to link to a popular person) [3]. Most aspects focus on the social graph or global knowledge about attribute distribution (in the case of rarity). In the work by Mohajureen et al., the authors use the attributes of neighboring nodes in the friend recommendation process [4]. For this algorithm to work, the social graph as well as the features of each user have to be available. A somewhat special case of link prediction or friend rec- ommendation is described in WhozThat? [38]. Here, the idea is to retrieve information about another person you just met. Via Bluetooth, user handles from an SNS are exchanged and data about the other person can be retrieved from that SNS. As described in Section III, by following our concept, the same scenario can be realized in a distributed manner without contacting existing centralized SNS. V. CONCLUSION AND FUTURE WORK In this paper, we proposed the extension of social profiles with smartphone sensor data. We showed that research results from the field of psychometrics suggest that we then can calculate relevant friend recommendations based on those profiles, without utilizing the social graph. This will enable recommendations in highly distributed SNSs. Future work includes conducting a user study with our pro- totype to confirm our conclusions. Furthermore, in the device- to-device SNS scenario, the issue of privacy-awareness will be further investigated so that similarity estimations between users are possible without sharing all the collected sensitive sensor data. ACKNOWLEDGMENT This work has received funding from the European Union's Horizon 2020 research and innovation program under grant agreement No 645342, project reTHINK and from project DYNAMIC2 (grant No 01IS12056), which is funded as part of the Software Campus initiative by the German Federal Ministry of Education and Research (BMBF). REFERENCES [1] S. Greenwood, A. Perrin, and M. Duggan. (2016, Nov.) So- cial Media Update 2016. http://www.pewinternet.org/2016/11/11/ social-media-update-2016/. [2] F. Beierle, S. Gondor, and A. Kupper, "Towards a Three-tiered Social Graph in Decentralized Online Social Networks," in Proc. 7th Interna- tional Workshop on Hot Topics in Planet-Scale mObile Computing and Online Social neTworking (HotPOST). ACM, Jun. 2015, pp. 1–6. [3] Z. Yin, M. Gupta, T. Weninger, and J. Han, "A Unified Framework for Link Recommendation Using Random Walks," in Proc. 2010 Interna- tional Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, Aug. 2010, pp. 152–159. [4] M. Mohajireen, C. Ellepola, M. Perera, I. Kahanda, and U. Kanewala, "Relational Similarity Model for Suggesting Friends in Online Social Networks," in Proc. 2011 6th International Conference on Industrial and Information Systems (ICIIS). IEEE, Aug. 2011, pp. 334–339. [5] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a Feather: Homophily in Social Networks," Annual Review of Sociology, vol. 27, pp. 415–444, 2001. [6] R. Blakely. (2016, Sep.) Data new trump-calls-in-brexit-experts-to-target-voters-pf0hwcts9. Trump. voters for 20 million scientists http://www.thetimes.co.uk/article/ target [7] N. Confessore and D. Hakim. (2017, Mar.) Data Firm Says 'Secret Sauce' Aided Trump; Many Scoff. https://www.nytimes.com/2017/03/ 06/us/politics/cambridge-analytica.html. [8] J. Golbeck, C. Robles, and K. Turner, "Predicting Personality with Social Media," in Proc. CHI '11 Extended Abstracts on Human Factors in Computing Systems (CHI EA). ACM, May 2011, pp. 253–262. [9] S. Burgess, E. Sanderson, and M. Umana-Aponte, School Ties: An Analysis of Homophily in an Adolescent Friendship Network, ser. CMPO Working Paper Series. Centre for Market and Public Organisation, 2011, no. 11/267. [10] E. C. Tupes and R. E. Christal, "Recurrent Personality Factors Based on Trait Ratings," Journal of Personality, vol. 60, no. 2, pp. 225–251, Jun. 1992. [11] R. R. McCrae and O. P. John, "An Introduction to the Five-Factor Model and Its Applications," Journal of Personality, vol. 60, no. 2, pp. 175–215, 1992. [12] M. Selfhout, W. Burk, S. Branje, J. Denissen, M. Van Aken, and W. Meeus, "Emerging Late Adolescent Friendship Networks and Big Five Personality Traits: A Social Network Approach," Journal of Per- sonality, vol. 78, no. 2, pp. 509–538, Apr. 2010. [13] D. Rawlings and V. Ciancarelli, "Music Preference and the Five-Factor Model of the NEO Personality Inventory," Psychology of Music, vol. 25, no. 2, pp. 120–132, Oct. 1997. [14] P. J. Rentfrow and S. D. Gosling, "The Do Re Mi's of Everyday Life: The Structure and Personality Correlates of Music Preferences." Journal of Personality and Social Psychology, vol. 84, no. 6, pp. 1236–1256, 2003. [15] R. Farahbakhsh, X. Han, A. Cuevas, and N. Crespi, "Analysis of publicly disclosed information in Facebook profiles," in Proc. 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). ACM, Aug. 2013, pp. 699–705. [16] H. Liu, "Social Network Profiles as Taste Performances," Journal of Computer-Mediated Communication, vol. 13, no. 1, pp. 252–275, Oct. 2007. [17] M. D. Back, J. M. Stopfer, S. Vazire, S. Gaddis, S. C. Schmukle, B. Egloff, and S. D. Gosling, "Facebook Profiles Reflect Actual Per- sonality, Not Self-Idealization," Psychological Science, vol. 21, no. 3, pp. 372–374, Jan. 2010. 2http://www.dynamic-project.de [18] S. D. Gosling, S. Gaddis, and S. Vazire, "Personality Impressions Based on Facebook Profiles," in Proc. International AAAI Conference on Weblogs and Social Media (ICWSM). AAAI, 2007, pp. 1–4. [19] S. Butt and J. G. Phillips, "Personality and self reported mobile phone use," Computers in Human Behavior, vol. 24, no. 2, pp. 346–360, Mar. 2008. [20] J. G. Phillips, S. Butt, and A. Blaszczynski, "Personality and Self- Reported Use of Mobile Phones for Games," CyberPsychology & Behavior, vol. 9, no. 6, pp. 753–758, Dec. 2006. [21] G. Chittaranjan, J. Blom, and D. Gatica-Perez, "Who's Who with Big- Five: Analyzing and Classifying Personality Traits with Smartphones," in Proc. 2011 15th Annual International Symposium on Wearable Computers (ISWC). IEEE, Jun. 2011, pp. 29–36. [22] --, "Mining large-scale smartphone data for personality studies," Personal and Ubiquitous Computing, vol. 17, no. 3, pp. 433–450, Mar. 2013. [23] W. Lane and C. Manner, "The influence of personality traits on mobile phone application preferences," Journal of Economics & Behavioral Studies, vol. 4, no. 5, pp. 252–260, 2012. [24] D. M. Boyd and N. B. Ellison, "Social Network Sites: Definition, His- tory, and Scholarship," Journal of Computer-Mediated Communication, vol. 13, no. 1, pp. 210–230, Oct. 2007. [25] A. Richter and M. Koch, "Functions of Social Networking Services," in Proc. 8th International Conference on the Design of Cooperative Systems (COOP), May 2008, pp. 87–98. [26] J. Heidemann, M. Klier, and F. Probst, "Online social networks: A survey of a global phenomenon," Computer Networks, vol. 56, no. 18, pp. 3866– 3878, Dec. 2012. [27] T. Paul, A. Famulari, and T. Strufe, "A survey on decentralized Online Social Networks," Computer Networks, vol. 75, Part A, pp. 437–452, Dec. 2014. [28] S. Gondor, F. Beierle, S. Sharhan, H. Hebbo, E. Kucukbayraktar, and A. Kupper, "SONIC: Bridging the Gap between Different Online Social Network Platforms," in Proc. 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity). IEEE, Dec. 2015, pp. 399–406. [29] V. A. Rohani and O. S. Hock, "On Social Network Web Sites: Defini- tion, Features, Architectures and Analysis Tools," Journal of Computer Engineering, vol. 1, pp. 3–11, 2009. [30] C. A. Lampe, N. Ellison, and C. Steinfield, "A Familiar Face(Book): Profile Elements As Signals in an Online Social Network," in Proc. SIGCHI Conference on Human Factors in Computing Systems (CHI). ACM, Apr. 2007, pp. 435–444. [31] J. Bao, Y. Zheng, D. Wilkie, and M. Mokbel, "Recommendations in Location-based Social Networks: A Survey," Geoinformatica, vol. 19, no. 3, pp. 525–565, 2015. [32] F. Beierle, K. Grunert, S. Gondor, and A. Kupper, "Privacy-aware Social Music Playlist Generation," in Proc. 2016 IEEE International Conference on Communications (ICC). IEEE, May 2016, pp. 5650– 5656. [33] V. Pejovic and M. Musolesi, "Anticipatory Mobile Computing: A Survey of the State of the Art and Research Challenges," ACM Computing Surveys, vol. 47, no. 3, pp. 1–29, Apr. 2015. [34] M. Hashemi and J. Herbert, "User Interaction Monitoring and Analysis Framework," in Proc. 2016 IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft). ACM, 2016, pp. 7–8. [35] --, "A Next Application Prediction Service Using the BaranC Frame- work," in Proc. 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC). IEEE, Jun. 2016, pp. 519–523. [36] R. Wang, G. Harari, P. Hao, X. Zhou, and A. T. Campbell, "SmartGPA: How Smartphones Can Assess and Predict Academic Performance of College Students," in Proc. 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). ACM, Sep. 2015, pp. 295–306. [37] H. Xiong, Y. Huang, L. E. Barnes, and M. S. Gerber, "Sensus: A Cross- platform, General-purpose System for Mobile Crowdsensing in Human- subject Studies," in Proc. 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing (UbiComp). ACM, Sep. 2016, pp. 415–426. [38] A. Beach, M. Gartrell, S. Akkala, J. Elston, J. Kelley, K. Nishimoto, B. Ray, S. Razgulin, K. Sundaresan, B. Surendar, M. Terada, and R. Han, "WhozThat? Evolving an Ecosystem for Context-Aware Mobile Social Networks," IEEE Network, vol. 22, no. 4, pp. 50–55, 2008.
1806.07955
1
1806
2018-06-11T11:36:43
Growing Better Graphs With Latent-Variable Probabilistic Graph Grammars
[ "cs.SI", "cs.AI" ]
Recent work in graph models has found that probabilistic hyperedge replacement grammars (HRGs) can be extracted from graphs and used to generate new random graphs with graph properties and substructures close to the original. In this paper, we show how to add latent variables to the model, trained using Expectation-Maximization, to generate still better graphs, that is, ones that generalize better to the test data. We evaluate the new method by separating training and test graphs, building the model on the former and measuring the likelihood of the latter, as a more stringent test of how well the model can generalize to new graphs. On this metric, we find that our latent-variable HRGs consistently outperform several existing graph models and provide interesting insights into the building blocks of real world networks.
cs.SI
cs
Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars 8 1 0 2 n u J 1 1 ] I S . s c [ 1 v 5 5 9 7 0 . 6 0 8 1 : v i X r a Xinyi Wang Carnegie Mellon University Pi(cid:138)sburgh, PA 15213 [email protected] Tim Weninger University of Notre Dame Notre Dame, IN 46556 [email protected] ABSTRACT Recent work in graph models has found that probabilistic hyper- edge replacement grammars (HRGs) can be extracted from graphs and used to generate new random graphs with graph properties and substructures close to the original. In this paper, we show how to add latent variables to the model, trained using Expectation- Maximization, to generate still be(cid:138)er graphs, that is, ones that generalize be(cid:138)er to the test data. We evaluate the new method by separating training and test graphs, building the model on the for- mer and measuring the likelihood of the la(cid:138)er, as a more stringent test of how well the model can generalize to new graphs. On this metric, we (cid:128)nd that our latent-variable HRGs consistently outper- form several existing graph models and provide interesting insights into the building blocks of real world networks. ACM Reference format: Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang. 2016. Growing Be(cid:138)er Graphs With Latent-Variable Probabilistic Graph Grammars. In Proceedings of KDD, London, UK, August 2018 (KDD'18), 9 pages. DOI: 10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Detecting, interpreting and comparing structures and properties of network data about social interactions and complex physical phe- nomena is critically important to a variety of problems. However, this is a di(cid:129)cult task because comparisons between two or more networks can involve checking for graph or subgraph isomorphism, for which no tractable solution is known. Instead, various network properties (e.g., degree distribution, centrality distributions) have been used to describe and compare networks. Another approach is to consider a network's global structure as a by-product of a graph's local substructures [22]. More sophisticated graph statistics are based on counting the number of small motifs [16] or graphlets [4] present in the graph and comparing their Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a fee. Request permissions from [email protected]. KDD'18, London, UK © 2016 ACM. 978-x-xxxx-xxxx-x/YY/MM...$15.00 DOI: 10.1145/nnnnnnn.nnnnnnn Salvador Aguinaga University of Notre Dame Notre Dame, IN 46556 [email protected] David Chiang University of Notre Dame Notre Dame, IN 46556 [email protected] distributions [23]. Unfortunately, graphlet counting presupposes that all possible graphlets be enumerated ahead of time. Because the number of unique graphlets increases exponentially with the number of nodes in the graphlet, previous work has been limited to graphlets of at most (cid:128)ve nodes. An alternative to developing sophisticated graph statistics is to learn graph generation models that encode properties of the graph in various ways. Graph generators like the Exponential Ran- dom Graph Model (ERGM) [20], the Chung-Lu Edge Con(cid:128)guration Model (CL) [8], the Stochastic Kronecker Graph (SKG) [12], and the Block Two-Level Erdos-R´enyi Model (BTER) [21] can be (cid:128)(cid:138)ed to real-world graphs. Recent work has found that many social and information net- works have a more-or-less tree-like structure, which implies that de- tailed topological properties can be identi(cid:128)ed and extracted from a graph's tree decomposition [1]. Based on these (cid:128)ndings, Aguinaga et al. de- scribed a method to turn a graph's tree decomposition into a Hyper- edge Replacement Grammar (HRG) [2]. (cid:140)e HRG model can then generate new graphs with properties similar to the original. One limitation of the HRG model is that the instructions for reassembling the building blocks, i.e., the graph grammar, encode only enough information to ensure that the result is well-formed. HRG production rules are extracted directly from the tree decom- position; some rules from the top of the tree, some from the middle of the tree, and some from the bo(cid:138)om of the tree. (cid:140)en, to generate an new graph that is similar to the original graph, we would expect that rules from the top of the tree decomposition are applied (cid:128)rst, rules from the middle next, and rules from the leaves of the tree are applied last. However, when generating a new graph the HRG model applies rules probabilistically; where a rule's probability rel- ative to its frequency in the grammar. However, when generating a new graph, the rules in HRG models have no context on when they should (cid:128)re. HRG models are in need of a mechanism that corrects for this problem by providing context to the rules. In the present work, we make three contributions: (1) We improve the HRG model by encoding context in latent variables. (2) We propose a methodology for evaluating our model that enforces a strict separation between training and test data, in order to guard against over(cid:128)(cid:138)ing. (3) We test our model on 6 train/test pairs of graphs and (cid:128)nd that it discovers a be(cid:138)er model, that is, one that generalizes KDD'18, August 2018, London, UK Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang 1 Graph 2 3 5 4 6 Tree Decomposition η0 3,4,5 ⇒ η1 4,5 4,5,6 η2 η21 3,4,5 2,3,4,5 2,5 1,2,5 Tree Decomposition η0 3,4,5 η1 4,5 4,5,6 η2 η21 3,4,5 2,3,4,5 2,5 1,2,5 Rule N2 N3 → 2 3 5 4 Figure 1: An example graph and its tree decomposition. (cid:135)e width of this tree decomposition is 3, i.e., the size of the largest bag minus 1. (cid:135)e sepset between each bag and its parent is labeled in blue. Bags are labeled (η0, etc.) for illus- tration purposes only. Figure 2: Extraction of an HRG production rule from η2 con- taining graph vertices {2,3,4,5}. (cid:135)e LHS of the production rule corresponds to the sepset of the bag and its parent. (cid:135)e RHS of the production rule contains nodes from the bag, ter- minal edges induced from the original graph, and nontermi- nal edges from the sepset between the bag and its children. be(cid:138)er to the test data, than the original HRG model as well as Kronecker and Chung-Lu models. 2 BACKGROUND Before we introduce our model, we (cid:128)rst provide an overview and examples of the HRG model. 2.1 Hyperedge Replacement Grammars Like a context free string grammar (CFG), an HRG has a set of production rules A → R, where A is called the le(cid:137)-hand side (LHS) and R is called the right-hand side (RHS). In an HRG, a rule's RHS is a graph (or hypergraph) with zero or more external nodes. Applying the rule replaces a hyperedge labeled A with the graph R; the nodes formerly joined by the hyperedge are merged with the external nodes of R. (cid:140)e HRG generates a graph by starting with the start nonterminal, S, and applying rules until no more nonterminal- labeled hyperedges remain. 2.2 Tree Decomposition Given a graph H = (V , E), a tree decomposition is a tree whose nodes, called bags, are labeled with subsets of V , in such a way that the following properties are satis(cid:128)ed: • For each node v ∈ V , there is a bag η that contains v. • For each edge (u, v) ∈ E, there is a bag η that contains u • If bags η and η(cid:48) contain v, then all the bags on the path and v. from η to η(cid:48) also contain v. If η(cid:48) is the parent of η, de(cid:128)ne ¯η = η(cid:48)∩η (also known as the sepset between η(cid:48) and η). If η is the root, then ¯η = ∅. All graphs can be decomposed (though not uniquely) into a tree decomposition, as shown in Fig. 1. In simple terms, a tree decomposition of a graph organizes its nodes into overlapping bags that form a tree. (cid:140)e width of the tree decomposition, which is related to the size of the largest bag, measures how tree-like the graph is. Finding optimal tree decompositions is NP-hard, but there is signi(cid:128)cant interest in (cid:128)nding fast approximations because many computationally di(cid:129)cult problems can be solved e(cid:129)ciently when the data is constrained to be a tree-like structure. 2.3 Grammar Extraction Aguinaga et al. [2] extract HRG rules from a graph, guided by a tree decomposition of the graph. For example, Figure 2 illustrates how one HRG rule is extracted from a tree decomposition. If we assume that the tree decomposition is rooted, then every bag η of the tree decomposition corresponds to an edge-induced subgraph, which we write Gη, de(cid:128)ned as follows: For each edge (u, v) ∈ E, if every bag η(cid:48) containing u, v is either equal to η or a descendant of η, then (u, v) ∈ Hη. For example, in Figure 1, the bag η2 = {2, 3, 4, 5} corresponds to the subgraph Hη2 whose edges are 1–2, 1–5, 2–3, 2–4, and 3–5. If H = (V , E) is a graph and H(cid:48) = (V (cid:48), E(cid:48)) is an edge-induced subgraph of H, we de(cid:128)ne an external node of H(cid:48) to be any node of H(cid:48) that has a neighbor not in H(cid:48). (cid:140)en, de(cid:128)ne the operation of replacing H(cid:48) with a hyperedge to be: • Remove all edges in E(cid:48). • Remove all nodes in V (cid:48) except for the external nodes. • Add a hyperedge joining the external nodes. Every bag η also induces a HRG rule N ¯η → R, where R is constructed as follows. • Make a copy of Hη. • Label the nodes in ¯η as external nodes. • For each child ηi of η, replace Hηi N ¯ηi . with a hyperedge labeled For example, in Figure 2, the bag η2 induces the rule shown at right. (cid:140)e LHS is N3 because the sepset between η2 and its parent has three nodes (3, 4, 5); in the RHS, these three nodes are marked as external. (cid:140)e node numbers are for illustration purposes only; they are not actually stored with the production rules. (cid:140)e RHS has two terminal edges (2–3, 2–4) from the original graph and one nonterminal edge (2–5) corresponding to the sepset between η2 and its one child. A(cid:137)er an HRG is extracted from the tree decomposition, its pro- duction rules are gathered into a set, merging identical rules and assigning to each unique rule (A → R) a probability P(A → R) = P(R A) proportional to how many times it was encountered during extraction. (cid:140)is grammar can then be used to randomly generate new graphs, or compute the probability of another graph. Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars KDD'18, August 2018, London, UK η, Xi η, Xi η, Xi η, Xi η1, Yj η2, Zk η1, Yj η2, Zk Figure 3: Inside and outside probabilities. Here, a hyper- edge labeled Xi with three external nodes has generated a subgraph η. (cid:135)e inside probability (le(cid:133)) of η, Xi is the prob- ability of all the subderivations that generate subgraph η from Xi. (cid:135)e outside probability (right) is the probability of all the partial derivations that generate the complement of subgraph η, with a hyperedge labeled Xi in place of the subgraph. Figure 4: Computation of inside and outside probabilities. Here, a hyperedge labeled Xi has been rewritten with a rule rhs with two hyperedges labeled Yj and Zk . At le(cid:133), the inside probability of η, Xi is incremented by the product of the rule and the inside probabilities of η1, Yj and η2, Zk . At right, the outside probability of η1, Yj is incremented by the product of the outside probability of η, Xi, the rule, and the inside probability of η2, Zk . 3 LATENT VARIABLE PROBABILISTIC HYPEREDGE REPLACEMENT GRAMMARS Here, we improve upon the HRG model by encoding more context into the model via latent variables, in a process that is analogous to how a (cid:128)rst-order Markov chain can simulate a higher-order Markov chain by expanding the state space. In this section, we adopt a notational shortcut. In an HRG pro- duction A → R, the RHS R is a hypergraph fragment containing zero or more hyperedges with nonterminal labels Y1, . . . , Yr . We suppress the graph structure of R and write the rule simply as X → Y1 · · · Yr . 3.1 Nonterminal Splitting Following previous work on probabilistic CFGs [15, 17], we in- crease the context-sensitivity of the grammar by spli(cid:138)ing each nonterminal symbol X in the grammar into n di(cid:130)erent subsymbols, Xi , . . . , Xn, which could potentially represent di(cid:130)erent contexts that the rule is used in. (cid:140)us, each rule in the original grammar is replaced with several subrules that use all possible combinations of the subsymbols of its nonterminal symbols. For example, if n = 2, the rule N2 →  would be split into 1 →  and N2 N2 In general, a rule with r nonterminal symbols on its right-hand side is split into nr +1 subrules. 2 → . 3.2 Learning A(cid:137)er obtaining an n-split grammar from the training graphs, we want to learn probabilities for the subrules that maximize the likeli- hood of the training graphs and their tree decompositions. Here we use Expectation-Maximization (EM) [9]. In the E (Expectation) step, we use the Inside-Outside algorithm [11] to compute the expected count of each subrule given the training data, and in the M (Maxi- mization) step, we update the subrule probabilities by normalizing their expected counts. (cid:140)ese expected counts can be computed e(cid:129)ciently using dy- namic programming. Given a tree decomposition T , consider a bag η and its corresponding subgraph Hη. (cid:140)e grammar extrac- tion method of Background Section 2.3 assigns Hη a nonterminal symbol, which we write X. Let Xi be a subsymbol of X. (cid:140)e inside probability of Hη with label Xi, wri(cid:138)en as Pin(η, Xi), is the total probability of all derivations starting from Xi and ending in Hη. (cid:140)e outside probability of Hη with label Xi, wri(cid:138)en as Pout(η, Xi), is the total probability of all derivations starting from S and ending in H with Hη replaced with a hyperedge labeled Xi. See Figure 3. (cid:140)e inside probabilities can be calculated recursively, from smaller subgraphs to larger subgraphs. We assume that bag η has at most two children, which follows if T is in Chomsky Normal Form [7]. If η has two children, let η1 and η2 be the children, let Y and Z be the labels of Hη1 and Hη2, and let Yj be and Zk be subsymbols of Y and Z. (cid:140)en the inside probability of Hη with subsymbol Xi is de(cid:128)ned by: P(Xi → YjZk) Pin(η1, Yj) Pin(η2, Zk) (cid:140)e outside probabilities are calculated top-down. If a bag η has two children, then the outside probabilities of its children are de(cid:128)ned by: P(Xi → YjZk) Pout(η, Xi) Pin(η2, Zk) P(Xi → YjZk) Pout(η, Xi) Pin(η1, Yk). and similarly if η has only one child: P(Xi → Yj) Pin(η1, Yj) j or no children: Pin(η, Xi) = P(Xi → ). Pin(η, Xi) = Pin(η, Xi) = j,k Pout(η1, Yj) = Pout(η2, Zk) = i,k i, j KDD'18, August 2018, London, UK Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang See Figure 4 for an illustration of this computation. Similarly, if η has only one child: Pout(η1, Yj) = i P(Xi → Yj) Pout(η, Xi). In the Expectation step, we compute the posterior probability of each subrule at each bag of each training tree decomposition T : P(η, Xi → YjZk T) = P(η, Xi → Yj T) = P(η, Xi →  T) = 1 P(T) Pout(η, Xi)P(Xi → YjZk) · Pin(η1, Yj)Pin(η2, Zk) 1 P(T) Pout(η, Xi)P(Xi → Yj)Pin(η1, Yj) 1 P(T) Pout(η, Xi)P(Xi → ) where P(T) = Pin(η0, S) and η0 is the root bag of T . (cid:140)e expected count of each subrule is calculated by summing over the posterior probability of the rule over all nodes of all training trees: P(η, Xi → α T) E[c(Xi → α)] =   trees T where α is any right-hand side. η∈T In the Maximization step, we use the expected counts calculated above to update the rule probabilities: P(Xi → α) :=  E[c(Xi → α)] α(cid:48) E[c(Xi → α(cid:48))] . (cid:140)ese probabilities are then used to repeat the E step. (cid:140)e method is guaranteed to converge to a local maximum of the likelihood function, but not necessarily to a global maximum. 4 EVALUATION Current research in graph modelling and graph generation evaluate their results by comparing the generated graphs with the original graph by aggregate properties like degree distribution, clustering coe(cid:129)cients, or diameter [2, 3, 5, 12, 13, 21]. (cid:140)ere are two potential problems with such metrics. First, these metrics do not test how well the model generalizes to model other graphs that represent similar data. Second, they are heuristics from which a generated graph's "goodness" is di(cid:129)cult to de(cid:128)ne or standardize. We discuss and address both of these problems in this section. 4.1 Train/Test Data Comparing generated graphs with the original graph cannot test how well the model generalizes to other graphs that represent similar data or di(cid:130)erent versions of the same network phenomena. To see why, consider the extreme case, in which a model simply memorizes the entire original graph. (cid:140)en, the generated graphs are all identical to the original graph and therefore score perfectly according to these metrics. (cid:140)is is akin to over(cid:128)(cid:138)ing a machine learning classi(cid:128)er on training data and then testing it on the same data, which would not reveal whether the model is able to generalize to unseen instances. In standard data mining and machine learning tasks, the over(cid:128)t- ting problem is typically addressed through cross-validation or by evaluating on heldout test data sets. In the present work, we adapt the idea of using heldout test data to evaluate graph grammars. In experiments on synthetic graphs, this means that we generate two random graphs using the same model and parameters; we des- ignate one as the training graph and the other as the test graph. In experiments on real world graphs, we identify two graphs that represent the same phenomenon, e.g., citations or collaborations, and we mark one as the training graph and one as the test graph. In reality, we might not be able to (cid:128)nd test graphs that have sim- ilar properties as the training graph. Fortunately, cross-validation can also be adapted to cases where no test graph is available by using disjoint subgraph samples from a single graph. 4.2 Likelihood In addition to the possibility of over(cid:128)(cid:138)ing, high-level aggregations of graph properties may not always be good comparators of two or more graphs. Indeed, examples abound in related literature showing how vastly di(cid:130)erent graphs can share similar aggregate statistics [23]. We propose, as an additional metric, to evaluate models by using them to measure the likelihood of a test graph or graphs. Intuitively, this measures how well a model extracted from the training graph generalizes to a test graph. If the model simply memorizes the entire training graph, then it will have zero likelihood (the worst possible) on the test graph. If the model is be(cid:138)er able to generalize to new graphs, then it will have higher likelihood on the test graph. Unfortunately, it is not always computationally feasible to com- pute the likelihood of graphs under previous models. But with HRGs, it can be computed in linear time given a tree decomposition. (It would also be possible, but slower, to sum the probabilities of all possible tree decompositions [6].) (cid:140)e likelihood on a test graph is simply Pin(η0, S), where η0 is the root of the tree decomposition. Note that the model probabilities are estimated from the training graphs, even when computing likelihood on test graphs. As this number is usually very small, it's common to take logs and deal with log-likelihoods. 4.3 Smoothing A problem arises, however, if the test graph uses a rule that does not exist in the grammar extracted from the training graph. (cid:140)en the inside probability will be zero (or a log-probability of −∞). (cid:140)is is because an HRG missing any necessary rules to construct the test graph cannot generate the test graph exactly, and therefore results in a zero probability. In this case, we would still like to perform meaningful com- parisons between models, if possible. So we apply smoothing as follows. To test an HRG H on a test graph, we (cid:128)rst extract an HRG, H(cid:48), from the test graph using the latent-variable HRG method. De- (cid:128)ne an unknown rule to be a rule in H(cid:48) but not in H. (cid:140)en for each unknown rule, we add the rule to H with a probability of . We can then compute the log likelihood on the test graph under the augmented grammar H ∪ H(cid:48). (cid:140)e (cid:128)nal test log likelihood is calculated as L = LH∪H(cid:48) − c(H (cid:48) \ H) · log  where LH∪H(cid:48) is the log likelihood of the test graph under the aug- mented grammar, c(H(cid:48) \ H) is the number of times that unknown rules are used in the test graph, and  is the probability of each unknown rule. Note that as long as  is much smaller than the Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars KDD'18, August 2018, London, UK Table 1: Datasets used in experiments Synth Real Citation Type Name Barabasi-Albert train-ba test-ba Wa(cid:138)s-Strogatz train-ws test-ws train-cit-Hep(cid:140) test-cit-HepPh train-as-topo test-as-733 train-amazon0312 test-amazon0302 train-wiki-vote test-wiki-talk Wikipedia Purchase Internet Nodes 30,000 30,000 30,000 30,000 27,770 34,546 34,761 6,474 Edges 59,996 59,996 60,000 60,000 352,807 421,578 171,403 13,895 400,727 3,200,440 262,111 1,234,877 103,689 2,394,385 5,021,410 7,115 probability of any known rule, its value is irrelevant because L does not depend on it. Ideally, we would like the number of unknown rules to be zero. In our experiments, we (cid:128)nd that increasing the number of train- ing graphs and/or decreasing the size of the training graphs can bring this number to zero or close to zero. Note that if two HRGs have di(cid:130)ering sets of unknown rules, then it is not meaningful to compare their log-likelihood on test graphs. But if two HRGs have identical sets of unknown rules, then their log-likelihoods can be meaningfully compared. We will exploit this fact when evaluating models with latent variables in the next section. 5 EXPERIMENTS In this section we test the ability of the latent-variable HRG (laHRG) to generate graphs using the train-test framework described above. We vary n, the number of subsymbols that each nonterminal symbol is split into, from 1 to 4. Note that the 1-split laHRG model is identical to the original HRG method. By varying the number of splits, we will be able to (cid:128)nd the value that optimizes the test likelihood. We have provided all of the source code and data analysis scripts at h(cid:138)ps://github.com/cindyxinyiwang/laHRG. 5.1 Setup Given a training graph, we extract and train a latent-variable HRG from the graph. (cid:140)en we evaluate the goodness of the grammar by calculating the log likelihood that the test graph could be generated from the grammar. For evaluation, we need to make sure that the test graph is disjoint from the training graph to guard against over(cid:128)(cid:138)ing. Here we introduce two techniques to achieve that: 1. we partition a single graph into two disjoint parts so that they do not have overlapping vertices. (cid:140)en we train laHRG from one part of the graph, and calculate the log likelihood of the other disjoint part; 2. we choose 2 graphs of the same type, and use one for training and the other for evaluation. We evaluate laHRG with log likelihood metric for both evalua- tion methods mentioned above on 6 types of graphs: 2 synthetic graphs (generated from random graph generators), and 4 real world graphs. For the (cid:128)rst evaluation method, we use 1 graph, each from 6 di(cid:130)erent types of graphs, and partition the graph for training and testing purpose. For the second evaluation method, we do not partition the training graph, but choose 1 additional graph from each type of graphs for testing. (cid:140)e graphs were obtained from the SNAP1 and KONECT2 graph repositories and are listed in Table 1. Many of these graphs are too large for a tree decomposition to be calculated. Instead, we randomly sampled a set of (cid:128)xed-size subgraphs from the training graph and a set of (cid:128)xed-size subgraphs from the test graph. Besides the concern from the calculation of large tree decompositions, sampling multiple graphs is also impor- tant for the extraction of a broad set of rules. Recall that if a single rule required to generate the test graph is not found within the training graph, then the likelihood will be 0. (cid:140)erefore, large test graphs would require many more training graphs in order to reduce (or hopefully eliminate) the need for smoothing. In all experiments, we extract 500 samples of size-25 subgraphs from the training graph. We extract an HRG from each size-25 subgraph, perform nonterminal spli(cid:138)ing and EM training. (cid:140)e 500 HRGs are then combined and their weights are normalized to create the (cid:128)nal laHRG model. We also take 4 samples of size-25 subgraphs from the test graph, calculate the log-likelihood of each under the laHRG model, and report the mean log-likelihood and con(cid:128)dence interval. We chose these parameters empirically such that there is no need for smoothing. If we were to increase the subgraph size for the test graphs, then we would also need to increase the number of training graph samples or rely on smoothing to ensure non-zero likelihood. To compute tree decompositions, we used a reimplementation of the (cid:139)ickBB algorithm [10], with only the "simplicial" and "almost- simplicial" heuristics. 5.2 Log-Likelihood Results (cid:140)is section explains the performance of laHRG in terms of log- likelihood metric on test graph for two di(cid:130)erent train-test split methods mentioned in the previous section. We mainly analyze the results for the second method: train on one graph and test on another graph of the same type. (cid:140)e (cid:128)rst method has similar results, and we include them here to show that our evaluation method also works for graphs that are di(cid:129)cult to (cid:128)nd di(cid:130)erent test graphs of the same type. 5.2.1 Validate on Di(cid:128)erent Graph of Same Type. We (cid:128)rst show the log-likelihood results on synthetic datasets. (cid:140)e two random graph models, the Barabasi-Albert graph and Wa(cid:138)s-Strogatz graph, generate very di(cid:130)erent graph types. (cid:140)e four panels in Fig. 5 show the log-likelihood results of four combinations of training graphs and test graphs. Higher is be(cid:138)er. As a sanity check, we also trained an laHRG model on a Barabasi- Albert graph and tested it against a Wa(cid:138)s-Strogatz graph and vice versa. We expect to see much lower log-liklihood scores because the laHRG trained on one type of graph should be di(cid:130)erent than another type of graph. (cid:140)e top-right and bo(cid:138)om-le(cid:137) panels in Fig. 5 1h(cid:138)ps://snap.stanford.edu/data 2h(cid:138)p://konect.uni-koblenz.de KDD'18, August 2018, London, UK Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang ba-train ws-train Barabasi-Albert Wa(cid:138)s-Strogatz ) L ( d o o h i l e k i l g o l ) L ( d o o h i l e k i l g o l ) L ( d o o h i l e k i l g o l −200 −300 −400 −200 −300 −400 −200 −300 −400 Citation Internet Purchase Wikipedia 1 2 3 4 1 2 3 4 # of splits (n) # of splits (n) Figure 7: Loglikelihood on subgraphs that are disjoint from training graphs. Trends similar to Fig. 6 and Fig. 5 can be ob- served with this method. Error bars indicate 95% con(cid:128)dence intervals. Higher is better. over(cid:128)(cid:138)ing. (cid:140)e increase in node-spli(cid:138)ing allows laHRG to (cid:128)ne- tune the rule probabilities to the training graph, which we (cid:128)nd does not always generalize to the test graph. 5.2.2 Validate on Disjoint Subgraph. If it is di(cid:129)cult to (cid:128)nd a test graph of the same type with the training graph, it is still possible to evaluate laHRG with the log likelihood metric. We can partition the graph into two disjoint parts, and use one for training and the other for testing. Fig. 7 shows the log likelihood of the test sub- graphs that are disjoint from the training graphs. Again, spli(cid:138)ing nonterminal symbols increase the log likelihood on the test graph, but as the number of splits (n) increases, log likelihood decreases due to over(cid:128)(cid:138)ing. 5.3 Comparing against other Graph Generators (cid:140)e log-likelihood metric is a principled approach to calculating the performance of a graph generator. Unfortunately, other graph generators are not capable of performing this type of likelihood calculation. In order to compare the laHRG graph model to other state of the art graph generators including the Kronecker [12] and Chung-Lu [8] models, we revert to traditional graph metrics to compare a generated graph to a test graph(not against the original graph). Among the many choices for heuristic graph comparison metrics, we chose the degree distribution and graphlet correlation distance (GCD). Recall that the sampling of 25-node subgraphs was necessary to ensure a non-zero probability for the log likelihood evaluation. No such requirement exists for evaluation on GCD. Nevertheless, −100 −200 −300 −400 −100 −200 −300 −400 t s e t - a b ) L ( d o o h i l e k i l - g o l t s e t - s w ) L ( d o o h i l e k i l - g o l 1 (none) 2 3 4 1 2 3 4 (none) # of splits (n) # of splits (n) Figure 5: On synthetic graphs, splitting nonterminal sym- bols (n ≥ 2) always improves log-likelihood on the test graph, as compared to no splitting (n = 1). We did not ob- serve over(cid:128)tting up to n = 4. Le(cid:133)/right column: train on Barabasi-Albert (ba) or Watts-Strogatz (ws). Top/bottom row: test on ba/ws. −200 −300 −400 ) L ( d o o h i l e k i l g o l Citation Internet Purchase Wikipedia 2 1 (none) 3 4 # of splits (n) Figure 6: On real-world graphs, splitting nonterminal sym- bols (n ≥ 2) always improves log-likelihood on the test graph, as compared to no splitting (n = 1), peaking at 2 or 3 splits and then dropping due to over(cid:128)tting. Error bars in- dicate 95% con(cid:128)dence intervals. Higher is better. show that this is indeed the case; the log-likelihood measure and the laHRG model pass the sanity check. Next we extracted and tested the laHRG model on real world graphs. (cid:140)e log-likelihood results are illustrated in Fig. 6 for laHRG models of up to 4-splits. We (cid:128)nd that the log-likelihood scores peak at n = 2 or 3 and then decreases when n = 4. Recall that laHRG is the same as HRG [2] when n = 1. Based on the results from Fig. 6, we (cid:128)nd that spli(cid:138)ing does indeed increase HRG's ability to generate the test graph. However, as increasing n shows diminishing returns and sometimes decreases performance. (cid:140)e decrease in log likelihood when n > 2 is caused by model Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars KDD'18, August 2018, London, UK to maintain an apples to apples comparison, we performed similar graph sampling methods for degree distribution distance and GCD: we trained Kronecker and Chung-Lu models on a 25-node subgraph from the training graph, generated a 25-node graph, compared the generated graph against a 25-node subgraph of the test graph, and repeated this process 500 times. As a baseline, we also compared the training and test graph directly to get a basic sense of their similarity. So, we directly compared 25-node subgraphs from the training graph to 25-node subgraphs of the test graph without any model. We repeated this direct comparison 500 times and report the mean and 95% con(cid:128)- dence interval. We call this the "Direct" comparison because it does not involve any graph generation. 5.3.1 Degree Distribution Distance. In the present work we ap- ply the degree distribution distance of Przulj [18] to compare two or more degree distributions. Lower degree distribution distance between two graphs means they are more similar. which is de(cid:128)ned as follows. Given a graph H, we (cid:128)rst scale and normalize the degree distribution of H: SH(k) = dH(k) k SH(k) NH(k) = SH(k) ∞ TH = k =1 in order to reduce the e(cid:130)ect of higher degree nodes, where dH(K) is the number of nodes in H that have a degree of k. (cid:140)en we calculate the distance between two degree distributions D (dH , dH(cid:48)) as: TH (cid:118)(cid:117)(cid:116) ∞ k =1 D (dH , dH(cid:48)) = 1√2 (NH(k) − NH(cid:48)(k))2 , which is essentially a normalized sum of squares between the two distributions. We call this metric the degree distribution distance. Because this is a "distance" metric low values indicate high similar- ity. Figure 8 illustrates the results of the degree distribution distance. Recall that the laHRG is identical to HRG [2] when n = 1. (cid:140)e Kronecker and Chung-Lu do not have an n parameter, so their plots are (cid:131)at. All points represent the mean of 500 repetitions; each point contains error bars indicating the 95% con(cid:128)dence intervals – although many error bars are too small to be seen. (cid:140)e laHRG model generates graphs that more closely follow the degree distribution of the test graph than graphs generated by Kronecker and Chung-Lu models. Higher nonterminal spli(cid:138)ing, i.e., n > 1, shows li(cid:138)le change on the degree distribution distance. It is expected that the Direct baseline outperforms all graph models, because the Direct baseline simply compares two graphs generated from the exact same generation process, which rewards an over(cid:128)t model. Here, the HRG models predict the test graph's degree distribu- tion be(cid:138)er than the Direct baseline does; whether this is because they generalize be(cid:138)er, or due to chance, or some other reason, would need further analysis to determine. In any case, nonterminal spli(cid:138)ing (n ≥ 2) has only a slight e(cid:130)ect on the model, generally 0.8 0.6 0.4 0.2 0 0.8 0.6 0.4 0.2 0 0.8 0.6 0.4 0.2 0 e c n a t s i d e e r g e d e c n a t s i d e e r g e d e c n a t s i d e e r g e d Barabasi-Albert Wa(cid:138)s-Strogatz Citation Internet Purchase Wikipedia 1 2 3 4 1 2 3 4 (none) (none) # of splits (n) # of splits (n) laHRG Kron Chung-Lu Direct Figure 8: HRG models are shown to generate graphs with lower (= better) degree distribution distance to the test graph when compared to other models. Splitting nonterminals (n ≥ 2) sometimes decreases degree distance but sometimes increases it. a(cid:138)racting the degree distribution toward the training graph's and away from the test graph's. Interestingly, the Direct baseline has similar or be(cid:138)er perfor- mance than the Kronecker and Chung-Lu methods. It is unlikely that these results can be completely explained by over(cid:128)(cid:138)ing. In- stead, Kronecker or Chung-Lu methods may perform poorly due to under(cid:128)(cid:138)ing, wherein these models do not model the training graph well enough. More work is needed to understand these results. 5.3.2 Graphlet Correlation Distance. Although the degree dis- tribution is the most well known and widely adopted graph com- parison metric, it is far from complete. (cid:140)e degree distribution can be easily mimicked by two very large and di(cid:130)erent networks. For example, previous work has shown that it is easy to construct two or more networks with exactly the same degree distribution but substantially di(cid:130)erent structure and function [14, 19]. (cid:140)ere is mounting evidence which argues that the graphlet comparisons are a be(cid:138)er way to measure the similarity between two graphs [18, 22]. Recent work from systems biology has identi(cid:128)ed a metric called the Graphlet Correlation Distance (GCD). (cid:140)e GCD computes the distance between two graphlet correlation matrices – one matrix for each graph [24]. Because the GCD is a distance metric, low val- ues indicate high similarity where the GCD is 0 i(cid:130) the two graphs are isomorphic. KDD'18, August 2018, London, UK Xinyi Wang, Salvador Aguinaga, Tim Weninger, and David Chiang Barabasi-Albert Wa(cid:138)s-Strogatz Table 2: Number of rules/parameters in grammars extracted from training graphs D C G D C G D C G 6 4 2 0 6 4 2 0 6 4 2 0 Citation Internet Purchase Wikipedia 1 2 3 4 1 2 3 4 Train Citation Internet Purchase Wikipedia Barabasi-Albert Wa(cid:138)s-Strogatz 1 1,156 1,005 969 1,065 48 60 n 3 19,885 14,057 18,237 20,891 930 1,023 2 7,193 5,686 6,196 6,891 298 346 4 44,410 29,247 38,186 42,841 2,126 2,380 particular graph property, but directly measures the ability of the graph generator to generate the test graph. 6 GRAMMAR ANALYSIS Recall that the HRG models merges two production rules if they are identical. Spli(cid:138)ing rules produces subrules that have the same structure, but di(cid:130)erent symbols, so they cannot be merged; spli(cid:138)ing nonterminal nodes will therefore increase the size of the grammar. In the worst case, the blowup could be cubic in n. Table 2 shows the sizes of all the grammars used in the experiments. Because rules with probability zero are excluded, the blowup is slightly less than cubic. Here we see a trade-o(cid:130) between model size and performance. (cid:140)e larger the grammar gets, the be(cid:138)er it is able to (cid:128)t the training graph. On the other hand, we prefer smaller models to mitigate the possibility of over(cid:128)(cid:138)ing. If we had not used separate training and test graphs, it would not be clear how to manage this trade-o(cid:130), but our evaluation is able to demonstrate that larger grammars (up to a point) are indeed able to generalize to new data. What do the HRG grammars look like? (cid:140)e models learned by unsupervised methods like EM can o(cid:137)en be di(cid:129)cult to interpret, especially when the number of splits is high and the grammar is large. Figure 10 shows selected 2-split rules extracted from the as-topo training graph, namely, those with probability at least 0.1 and with at most two external nodes. We can see that the subsymbols behave quite di(cid:130)erently from each other. For example, the N2 1 rule adds a connection between its two external nodes (via a third node), whereas none of the N2 2 rules adds a connection (perhaps because, as can be seen in the RHS of the N0 rule, they are already neighbors). What can we learn from these graph grammars? (cid:140)is is an open question. If we assume that the tree decomposition provides a meaningful representation of the original graph, then we may be able to interrogate and assign meaning to these rules depending on their context. But we save this as a ma(cid:138)er for future work. 7 CONCLUSION (cid:140)is present work identi(cid:128)es and addresses two problems in applying Hyperedge Replacement Grammars (HRGs) to network data [2] by adding latent variables in order to make production rules more sensitive to context and by introducing a principled evaluation (none) (none) # of splits (n) # of splits (n) laHRG Kron Chung-Lu Direct Figure 9: HRG models are shown to generate graphs with lower (= better) graphlet correlation di(cid:130)erence (GCD) to the test graph, when compared with other models. Splitting nonterminals (n ≥ 2) sometimes inproves GCD and some- times decreases it. Figure 9 illustrates the results of the GCD. Recall that the laHRG is identical to HRG [10] when n = 1. (cid:140)e Kronecker and Chung- Lu do not have an n parameter, so their plots are (cid:131)at. All points represent the mean of 500 repetitions; each point contains error bars indicating the 95 con(cid:128)dence intervals (cid:128)(cid:147) although many error bars are too small to be seen. (cid:140)e Direct baseline illustrates how similar the training and test graphs are. As expected, we (cid:128)nd that the Direct comparison is best on the random Wa(cid:138)s-Strogatz graphs. But laHRG outperforms it on all of the real-world graphs. 5.4 Comparison with Log Likelihood Metric GCD and Degree Distribution metrics indicate that laHRG is a be(cid:138)er graph generator than other options like Kron and Chung- Lu graph generators, but our experiments seem to suggest that spli(cid:138)ing nonterminals in HRG does not have much e(cid:130)ect in terms of GCD and Degree Distribution. However, nonterminal spli(cid:138)ing does increase log likelihood of the test graph, as explained in Section 5.2. (cid:140)is discrepancy is probably because log likelihood metric is able to capture more general structure and properties of a graph than GCD and Degree Distribution. Both GCD and Degree Distribution only focus on a speci(cid:128)c graph property, which might not be perfectly correlated with overall structure of a graph. On the other hand, the log likelihood metric we propose does not overemphasize a Growing Be(cid:130)er Graphs With Latent-Variable Probabilistic Graph Grammars KDD'18, August 2018, London, UK [12] [13] [2] Salvador Aguinaga, Rodrigo Palacios, David Chiang, and Tim Weninger. 2016. Growing Graphs from Hyperedge Replacement Graph Grammars. In Proc. CIKM. 469–478. [3] Salvador Aguinaga and Tim Weninger. 2016. (cid:140)e in(cid:128)nity mirror test for analyzing the robustness of graph generators. (2016). arXiv preprint arXiv:1606.04412. [4] Nesreen K Ahmed, Jennifer Neville, Ryan A Rossi, and Nick Du(cid:129)eld. 2015. [5] Deepayan Chakrabarti and Christos Faloutsos. 2006. Graph mining: Laws, E(cid:129)cient graphlet counting for large networks. In Proc. ICDM. 1–10. generators, and algorithms. Comput. Surveys 38, 1 (2006), 2. [6] David Chiang, Jacob Andreas, Daniel Bauer, Karl Moritz Hermann, Bevan Jones, and Kevin Knight. 2013. Parsing Graphs with Hyperedge Replacement Gram- mars.. In Proc. ACL. 924–932. [7] Noam Chomsky. 1959. On certain formal properties of grammars. Information and control 2, 2 (1959), 137–167. [8] Fan Chung and Linyuan Lu. 2002. Connected Components in Random Graphs with Given Expected Degree Sequences. Annals of Combinatorics 6, 2 (2002), 125(cid:128)(cid:147)145. [9] A. P. Dempster, N. M. Laird, and D. B. Rubin. 1977. Maximum likelihood from incomplete data via the EM algorithm. Journal of the Royal Statistical Society, Series B 39, 1 (1977), 1–38. [10] Vibhav Gogate and Rina Dechter. 2004. A Complete Anytime Algorithm for Treewidth. In Uncertainty in Arti(cid:128)cial Intelligence (UAI). 201–208. [11] K. Lari and S. J. Young. 1990. (cid:140)e estimation of stochastic context-free grammars using the Inside-Outside algorithm. Computer Speech and Language 4 (1990), 35–56. Jure Leskovec, Deepayan Chakrabarti, Jon Kleinberg, Christos Faloutsos, and Zoubin Ghahramani. 2010. Kronecker graphs: An approach to modeling net- works. Journal of Machine Learning Research 11 (2010), 985–1042. Jure Leskovec, Jon Kleinberg, and Christos Faloutsos. 2005. Graphs over time: densi(cid:128)cation laws, shrinking diameters and possible explanations. In Proc. KDD. 177–187. [14] Lun Li, David Alderson, John C Doyle, and Walter Willinger. 2005. Towards a theory of scale-free graphs: De(cid:128)nition, properties, and implications. Internet Mathematics 2, 4 (2005), 431–523. [15] Takuya Matsuzaki, Yusuke Miyao, and Jun'ichi Tsujii. 2005. Probabilistic CFG with Latent Annotations. In Proceedings of the 43rd Annual Meeting of the Associ- ation for Computational Linguistics (ACL '05). Ann Arbor, Michigan, 75–82. [16] Ron Milo, Shai Shen-Orr, Shalev Itzkovitz, Nadav Kashtan, Dmitri Chklovskii, and Uri Alon. 2002. Network motifs: simple building blocks of complex networks. Science 298, 5594 (2002), 824–827. [17] Slav Petrov, Leon Barre(cid:138), Romain (cid:140)ibaux, and Dan Klein. 2006. Learning Accurate, Compact, and Interpretable Tree Annotation. In Proceedings of the 21st International Conference on Computational Linguistics and 44th Annual Meeting of the ACL. 433(cid:128)(cid:147)440. [18] Natasa Przulj. 2007. Biological network comparison using graphlet degree distribution. Bioinformatics 23, 2 (2007), e177–e183. scale-free or geometric? Bioinformatics 20, 18 (2004), 3508–3515. [20] Garry Robins, Pip Pa(cid:138)ison, Yuval Kalish, and Dean Lusher. 2007. An introduction to exponential random graph (p*) models for social networks. Social Networks 29, 2 (2007), 173(cid:128)(cid:147)191. [21] Comandur Seshadhri, Tamara G Kolda, and Ali Pinar. 2012. Community structure and scale-free collections of Erdos-R´enyi graphs. Physical Review E 85, 5 (2012), 056109. Johan Ugander, Lars Backstrom, and Jon Kleinberg. 2013. Subgraph frequencies: Mapping the empirical and extremal geography of large graph collections. In Proc. WWW. 1307–1318. Omer Nebil Yaveroglu, Noel Malod-Dognin, Darren Davis, Zoran Levnajic, Vuk Janjic, Rasa Karapandza, Aleksandar Stojmirovic, and Natasa Przulj. 2014. Re- vealing the hidden language of complex networks. Scienti(cid:128)c Reports 4 (2014), 4547. Omer Nebil Yaveroglu, Tijana Milenkovi´c, and Natasa Przulj. 2015. Proper evaluation of alignment-free network comparison methods. Bioinformatics 31, 16 (2015), 2697–2704. [19] Natasa Przulj, Derek G Corneil, and Igor Jurisica. 2004. Modeling interactome: [23] [22] [24] N2 2 N1 1 N0 0.22−−−→ N1 1 0.88−−−→ N1 2 0.64−−−→ N2 1 0.70−−−→ N2 2 0.60−−−→ N2 2 0.18−−−→ N2 2 0.14−−−→ N2 2 N1 1 N1 1 N1 1 N1 2 Figure 10: Rules extracted from as-topo, 2-split nontermi- nals, showing only those with probability at least 0.1 and with at most two external nodes. methodology that computes the log likelihood that an HRG model generates a graph. To guard against the possibility of the new model over(cid:128)(cid:138)ing the original graph, we enforced a separation between the original graph from which the model is trained and a di(cid:130)erent graph on which the model is tested. (cid:140)is methodology should be be(cid:138)er at selecting models that generalize well to new data. We con(cid:128)rmed Aguinaga et al.'s original (cid:128)nding that HRGs perform be(cid:138)er than the widely-used Kronecker and Chung-Lu models, and showed that adding latent variables usually improves performance further. Furthermore, we evaluated our method against the original HRG model by directly measuring the log-likelihood of the test graphs under all models. (cid:140)is metric is more principled than aggregation of statistics of select graph properties. Under this metric, our method improves over the original in all cases, peaking at either n = 2 or 3 splits. HRGs extracted from tree decompositions are large. Spli(cid:138)ing nonterminals grows the model even more. But our (cid:128)nding that 2- or 3-split grammars still generalize be(cid:138)er to unseen graphs suggests that these models are not unreasonably large. It remains for future work to test this claim by evaluating other generative graph models on test graphs distinct from training graphs. It should also be possible to simplify the HRG and laHRG models by trying to prune low-probability rules while maintaining high performance. Finally, more analysis is needed to provide an interpretation for the pa(cid:138)erns automatically discovered by laHRGs. REFERENCES [1] Aaron B. Adcock, Blair D. Sullivan, and Michael W. Mahoney. 2016. Tree decom- positions and social graphs. Internet Mathematics 12, 5 (2016), 315–361.
1612.08447
1
1612
2016-12-26T21:50:42
Higher-order organization of complex networks
[ "cs.SI", "cs.DM", "physics.soc-ph" ]
Networks are a fundamental tool for understanding and modeling complex systems in physics, biology, neuroscience, engineering, and social science. Many networks are known to exhibit rich, lower-order connectivity patterns that can be captured at the level of individual nodes and edges. However, higher-order organization of complex networks---at the level of small network subgraphs---remains largely unknown. Here we develop a generalized framework for clustering networks based on higher-order connectivity patterns. This framework provides mathematical guarantees on the optimality of obtained clusters and scales to networks with billions of edges. The framework reveals higher-order organization in a number of networks including information propagation units in neuronal networks and hub structure in transportation networks. Results show that networks exhibit rich higher-order organizational structures that are exposed by clustering based on higher-order connectivity patterns.
cs.SI
cs
Higher-order organization of complex networks Austin R. Benson,1 David F. Gleich,2 Jure Leskovec3∗ 1Institute for Computational and Mathematical Engineering, Stanford University 2Department of Computer Science, Purdue University 3Computer Science Department, Stanford University ∗To whom correspondence should be addressed; E-mail: [email protected] Networks are a fundamental tool for understanding and modeling complex systems in physics, biology, neuroscience, engineering, and social science. Many networks are known to exhibit rich, lower-order connectivity patterns that can be captured at the level of individual nodes and edges. However, higher-order organization of complex networks-at the level of small network subgraphs- remains largely unknown. Here we develop a generalized framework for clus- tering networks based on higher-order connectivity patterns. This framework provides mathematical guarantees on the optimality of obtained clusters and scales to networks with billions of edges. The framework reveals higher-order organization in a number of networks including information propagation units in neuronal networks and hub structure in transportation networks. Results show that networks exhibit rich higher-order organizational structures that are exposed by clustering based on higher-order connectivity patterns. 1 Networks are a standard representation of data throughout the sciences, and higher-order connectivity patterns are essential to understanding the fundamental structures that control and mediate the behavior of many complex systems (1–7). The most common higher-order struc- tures are small network subgraphs, which we refer to as network motifs (Figure 1A). Network motifs are considered building blocks for complex networks (1, 8). For example, feedforward loops (Figure 1A M5) have proven fundamental to understanding transcriptional regulation net- works (9), triangular motifs (Figure 1A M1–M7) are crucial for social networks (4), open bidi- rectional wedges (Figure 1A M13) are key to structural hubs in the brain (10), and two-hop paths (Figure 1A M8–M13) are essential to understanding air traffic patterns (5). While network motifs have been recognized as fundamental units of networks, the higher-order organization of networks at the level of network motifs largely remains an open question. Here we use higher-order network structures to gain new insights into the organization of complex systems. We develop a framework that identifies clusters of network motifs. For each network motif (Figure 1A), a different higher-order clustering may be revealed (Figure 1B), which means that different organizational patterns are exposed depending on the chosen motif. Conceptually, given a network motif M, our framework searches for a cluster of nodes S with two goals. First, the nodes in S should participate in many instances of M. Second, the set S should avoid cutting instances of M, which occurs when only a subset of the nodes from a motif are in the set S (Figure 1B). More precisely, given a motif M, the higher-order clustering framework aims to find a cluster (defined by a set of nodes S) that minimizes the following ratio: φM (S) = cutM (S, ¯S)/ min(volM (S), volM ( ¯S)), (1) where ¯S denotes the remainder of the nodes (the complement of S), cutM (S, ¯S) is the number of instances of motif M with at least one node in S and one in ¯S, and volM (S) is the number of nodes in instances of M that reside in S. Equation 1 is a generalization of the conductance 2 metric in spectral graph theory, one of the most useful graph partitioning scores (11). We refer to φM (S) as the motif conductance of S with respect to M. Finding the exact set of nodes S that minimizes the motif conductance is computation- ally infeasible (12). To approximately minimize Equation 1 and hence identify higher-order clusters, we develop an optimization framework that provably finds near-optimal clusters (Sup- plementary Materials (13)). We extend the spectral graph clustering methodology, which is based on the eigenvalues and eigenvectors of matrices associated with the graph (11), to ac- count for higher-order structures in networks. The resulting method maintains the properties of traditional spectral graph clustering: computational efficiency, ease of implementation, and mathematical guarantees on the near-optimality of obtained clusters. Specifically, the clusters identified by our higher-order clustering framework satisfy the motif Cheeger inequality (14), which means that our optimization framework finds clusters that are at most a quadratic factor away from optimal. The algorithm (illustrated in Figure 1C) efficiently identifies a cluster of nodes S as follows: • Step 1: Given a network and a motif M of interest, form the motif adjacency matrix WM whose entries (i, j) are the co-occurrence counts of nodes i and j in the motif M: (WM )ij = number of instances of M that contain nodes i and j. (2) • Step 2: Compute the spectral ordering σ of the nodes from the normalized motif Laplacian matrix constructed via WM (15). • Step 3: Find the prefix set of σ with the smallest motif conductance, formally: S := arg minr φM (Sr), where Sr = {σ1, . . . , σr}. For triangular motifs, the algorithm scales to networks with billions of edges and typically only takes several hours to process graphs of such size. On smaller networks with hundreds 3 of thousands of edges, the algorithm can process motifs up to size 9 (13). While the worst- case computational complexity of the algorithm for triangular motifs is Θ(m1.5) , where m is the number of edges in the network, in practice the algorithm is much faster. By analyzing 16 real-world networks where the number of edges m ranges from 159,000 to 2 billion we found the computational complexity to scale as Θ(m1.2). Moreover, the algorithm can easily be parallelized and sampling techniques can be used to further improve performance (16). The framework can be applied to directed, undirected, and weighted networks as well as motifs (13). Moreover, it can also be applied to networks with positive and negative signs on the edges, which are common in social networks (friend vs. foe or trust vs. distrust edges) and metabolic networks (edges signifying activation vs. inhibition) (13). The framework can be used to identify higher-order structure in networks where domain knowledge suggests the motif of interest. In the Supplementary Material (13) we also show that when domain-specific higher- order pattern is not known in advance, the framework can also serve to identify which motifs are important for the modular organization of a given network (13). Such a general framework allows for a study of complex higher-order organizational structures in a number of different networks using individual motifs and sets of motifs. The framework and mathematical theory immediately extend to other spectral methods such as localized algorithms that find clusters around a seed node (17) and algorithms for finding overlapping clusters (18). To find several clusters, one can use embeddings from multiple eigenvectors and k-means clustering (13,19) or apply recursive bi-partitioning (13, 20). The framework can serve to identify higher-order modular organization of networks. We apply the higher-order clustering framework to the C. elegans neuronal network, where the four- node "bi-fan" motif (Figure 2A) is over-expressed (1). The higher-order clustering framework then reveals the organization of the motif within the C. elegans neuronal network. We find a cluster of 20 neurons in the frontal section with low bi-fan motif conductance (Figure 2B). 4 The cluster shows a way that nictation is controlled. Within the cluster, ring motor neurons (RMEL/V/R), proposed pioneers of the nerve ring (21), propagate information to IL2 neurons, regulators of nictation (22), through the neuron RIH and several inner labial sensory neurons (Figure 2C). Our framework contextualizes the sifnifance of the bi-fan motif in this control mechanism. The framework also provides new insights into network organization beyond the clustering of nodes based only on edges. Results on a transportation reachability network (23) demonstrate how it finds the essential hub interconnection airports (Figure 3). These appear as extrema on the primary spectral direction (Figure 3C) when two-hop motifs (Figure 3A) are used to capture highly connected nodes and non-hubs. (The first spectral coordinate of the normalized motif Laplacian embedding was positively correlated with the airport city's metropolitan population with Pearson correlation 99% confidence interval [0.33, 0.53]). The secondary spectral direc- tion identified the West-East geography in the North American flight network (it was negatively correlated with the airport city's longitude with Pearson correlation 99% confidence interval [-0.66, -0.50]). On the other hand, edge-based methods conflate geography and hub structure. For example, Atlanta, a large hub, is embedded next to Salina, a non-hub, with an edge-based method (Figure 3D). Our higher-order network clustering framework unifies motif analysis and network partitioning- two fundamental tools in network science-and reveals new organizational patterns and mod- ules in complex systems. Prior efforts along these lines do not provide worst-case perfor- mance guarantees on the obtained clustering (24), do not reveal which motifs organize the network (25), or rely on expanding the size of the network (26, 27). Theoretical results in the Supplementary Material (13) also explain why classes of hypergraph partitioning methods are more general than previously assumed and how motif-based clustering provides a rigorous framework for the special case of partitioning directed graphs. Finally, the higher-order net- 5 work clustering framework is generally applicable to a wide range of networks types, including directed, undirected, weighted, and signed networks. 6 Figure 1: Higher-order network structures and the higher-order network clustering framework. A: Higher-order structures are captured by network motifs. For example, all 13 connected three-node directed motifs are shown here. B: Clustering of a network based on motif M7. For a given motif M, our framework aims to find a set of nodes S that minimizes motif conductance, φM (S), which we define as the ratio of the number of motifs cut (filled triangles cut) to the minimum number of nodes in instances of the motif in either S or ¯S (13). In this case, there is one motif cut. C: The higher-order network clustering framework. Given a graph and a motif of interest (in this case, M7), the framework forms a motif adjacency matrix (WM) by counting the number of times two nodes co-occur in an instance of the motif. An eigenvector of a Laplacian transformation of the motif adjacency matrix is then computed. The ordering σ of the nodes provided by the components of the eigenvector (15) produces nested sets Sr = {σ1, . . . , σr} of increasing size r. We prove that the set Sr with the smallest motif-based conductance, φM (Sr), is a near-optimal higher-order cluster (13). 7 ABC Figure 2: Higher-order cluster in the C. elegans neuronal network (28). A: The 4-node "bi-fan" motif, which is over-expressed in neuronal networks (1). Intuitively, this motif de- scribes a cooperative propagation of information from the nodes on the left to the nodes on the right. B: The best higher-order cluster in the C. elegans frontal neuronal network based on the motif in (A). The cluster contains three ring motor neurons (RMEL/V/R; cyan) with many outgoing connections, serving as the source of information; six inner labial sensory neurons (IL2DL/VR/R/DR/VL; orange) with many incoming connections, serving as the destination of information; and four URA neurons (purple) acting as intermediaries. These RME neurons have been proposed as pioneers for the nerve ring (21), while the IL2 neurons are known reg- ulators of nictation (22), and the higher-order cluster exposes their organization. The cluster also reveals that RIH serves as a critical intermediary of information processing. This neuron has incoming links from all three RME neurons, outgoing connections to five of the six IL2 neurons, and the largest total number of connections of any neuron in the cluster. C: Illustration of the higher-order cluster in the context of the entire network. Node locations are the true two- dimensional spatial embedding of the neurons. Most information flows from left to right, and we see that RME/V/R/L and RIH serve as sources of information to the neurons on the right. 8 Figure 3: Higher-order spectral analysis of a network of airports in Canada and the United States (23). A: The three higher-order structures used in our analysis. Each motif is "an- chored" by the blue nodes i and j, which means our framework only seeks to cluster together the blue nodes. Specifically, the motif adjacency matrix adds weight to the (i, j) edge based on the number of third intermediary nodes (green squares). The first two motifs correspond to highly-connected cities and the motif on the right connects non-hubs to non-hubs. B: The top 50 most populous cities in the United States which correspond to nodes in the network. The edge thickness is proportional to the weight in the motif adjacency matrix WM. The thick, dark lines indicate that large weights correspond to popular mainline routes. C: Embedding of nodes provided by their corresponding components of the first two non-trivial eigenvectors of the normalized Laplacian for WM. The marked cities are eight large U.S. hubs (green), three West coast non-hubs (red), and three East coast non-hubs (purple). The primary spectral coor- dinate (left to right) reveals how much of a hub the city is, and the second spectral coordinate (top to bottom) captures West-East geography (13). D: Embedding of nodes provided by their corresponding components in the first two non-trivial eigenvectors of the standard, edge-based (non-higher-order) normalized Laplacian. This method does not capture the hub and geography found by the higher-order method. For example, Atlanta, the largest hub, is in the center of the embedding, next to Salina, a non-hub. 9 S1 Derivation and analysis of the motif-based spectral clus- tering method We now cover the background and theory for deriving and understanding the method presented in the main text. We will start by reviewing the graph Laplacian and cut and volume measures for sets of vertices in a graph. We then define network motifs in Section S1.2 and generalizes the notions of cut and volume to motifs. Our new theory is presented in Section S1.6 and then we summarize some extensions of the method. Finally, we relate our method to existing methods for directed graph clustering and hypergraph partitioning. S1.1 Review of the graph Laplacian for weighted, undirected graphs Consider a weighted, undirected graph G = (V, E), with V = n. Further assume that G has no isolated nodes. Let W encode the weights, of the graph, i.e., Wij = Wji = weight of edge (i, j). The diagonal degree matrix D is defined as Dii =(cid:80)n j=1 Wij, and the graph Laplacian is defined as L = D − W . We now relate these matrices to the conductance of a set S, φ(G)(S): φ(G)(S) = cut(G)(S, ¯S)/ min(vol(G)(S), vol(G)( ¯S)), (S3) (S4) (S5) (cid:88) (cid:88) i∈S, j∈ ¯S Wij, cut(G)(S, ¯S) = vol(G)(S) = Dii i∈S Here, ¯S = V \S. (Note that conductance is a symmetric measure in S and ¯S, i.e., φ(G)(S) = φ(G)( ¯S).) Conceptually, the cut and volume measures are defined as follows: cut(G)(S, ¯S) = weighted sum of weights of edges that are cut vol(G)(S) = weighted number of edge end points in S (S6) (S7) Since we have assumed G has no isolated nodes, vol(G)(S) > 0. If G is disconnected, then for any connected component C, φ(G)(C) = 0. Thus, we usually consider breaking G into S10 connected components as a pre-processing step for algorithms that try to find low-conductance sets. We now relate the cut metric to a quadratic form on L. Later, we will derive a similar form for a motif cut measure. Note that for any vector y ∈ Rn, (cid:88) (i,j)∈E yT Ly = wij(yi − yj)2. (S8) Now, define x to be an indicator vector for a set of nodes S i.e., xi = 1 if node i is in S and xi = 0 if node i is in ¯S. Note that if an edge (i, j) is cut, then xi and xj take different values and (xi − xj)2 = 1; otherwise, (xi − xj)2 = 0. Thus, xT Lx = cut(G)(S, ¯S). (S9) S1.2 Definition of network motifs We now define network motifs as used in our work. We note that there are alternative definitions in the literature (1). We consider motifs to be a pattern of edges on a small number of nodes (see Figure S4). Formally, we define a motif on k nodes by a tuple (B,A), where B is a k× k binary matrix and A ⊂ {1, 2, . . . , k} is a set of anchor nodes. The matrix B encodes the edge pattern between the k nodes, and A labels a relevant subset of nodes for defining motif conductance. In many cases, A is the entire set of nodes. Let χA be a selection function that takes the subset of a k-tuple indexed by A, and let set(·) be the operator that takes an (ordered) tuple to an (unordered) set. Specifically, set((v1, v2, . . . , vk)) = {v1, v2, . . . , vk}. The set of motifs in an unweighted (possibly directed) graph with adjacency matrix A, denoted M (B,A), is defined by M (B,A) = {(set(v), set(χA(v))) v ∈ V k, v1, . . . , vk distinct, Av = B}, (S10) S11 Figure S4: A: Illustration of network motifs used throughout the main text and supplementary material. The motif Medge is used to represent equivalence to undirected the graph. B: Diagram of motif definitions. The motif is defined by a binary matrix B and an anchor set of nodes. The figure shows an anchored version of motif M2 with anchors on the nodes that form the bi-directional edge. There are two instances of the motif in the graph on the right. Note that ({a, b, d},{a, b}) is not included in the set of motif instances because the induced subgraph on the nodes a, b, and d is not isomorphic to the graph defined by B. where Av is the k × k adjacency matrix on the subgraph induced by the k nodes of the ordered vector v. Figure S4 illustrates these definitions. The set operator is a convenient way to avoid duplicates when defining M (B,A) for motifs exhibiting symmetries. Henceforth, we will just use (v, χA(v)) to denote (set(v), set(χA(v))) when discussing elements of M (B,A). Further- more, we call any (v, χA(v)) ∈ M (B,A) a motif instance. When B and A are arbitrary or clear from context, we will simply denote the motif set by M. We call motifs where χA(v) = v simple motifs and motifs where χA(v) (cid:54)= v anchored motifs. Motif analysis in the literature has mostly analyzed simple motifs (29). However, the anchored motif provides us with a more general framework, and we use an anchored motif for S12 M3M5M4M1M2M8M7M6M9M10M11M12M13MbifanMedge+edcbaM2AB the analysis of the transportation reachability network. Often, a distinction is made between a functional and a structural motif (30) (or a subgraph and an induced subgraph (31)) to distinguish whether a motif specifies simply the existence of a set of edges (functional motif or subgraph) or the existence and non-existence of edges (structural motif or induced subgraph). By the definition in Equation S10, we refer to structural motifs in this work. Note that functional motifs consist of a set of structural motifs. Our cluster- ing framework allows for the simultaneous consideration of several motifs (see Section S1.9), so we have not lost any generality in our definitions. S1.3 Definition of motif conductance Recall that the key definitions for defining conductance are the notions of cut and volume. For an unweighted graph, these are φ(G)(S, ¯S) = cut(G)(S, ¯S)/ min(vol(G)(S), vol(G)( ¯S)), cut(G)(S, ¯S) = number of edges cut, vol(G)(S) = number of edge end points in S. (S11) (S12) (S13) Our conceptual definition of motif conductance simply replaces an edge with a motif instance of type M: M (S) = cut(G) φ(G) M ( ¯S)), M (S, ¯S)/ min(vol(G) M (S), vol(G) cut(G) M (S, ¯S) = number of motif instances cut, vol(G) M (S) = number of motif instance end points in S. (S14) (S15) (S16) We say that a motif instance is cut if there is at least one anchor node in S and at least one S13 anchor node in ¯S. We can formalize this when given a motif set M as in Equation S10: cut(G) M (S, ¯S) = vol(G) M (S) = (cid:88) (cid:88) (v,χA(v))∈M (v,χA(v))∈M i∈χA(v) 1(∃ i, j ∈ χA(v) i ∈ S, j ∈ ¯S), (cid:88) 1(i ∈ S), (S17) (S18) where 1(s) is the truth-value indicator function on s, i.e., 1(s) takes the value 1 if the statement s is true and 0 otherwise. Note that Equation S17 makes explicit use of the anchor set A. The motif cut measure only counts an instance of a motif as cut if the anchor nodes are separated, and the motif volume counts the number of anchored nodes in the set. However, two nodes in an achor set may a part of several motif instances. Specifically, following the definition in Equation S10, there may be many different v with the same χA(v), and the nodes in χA(v) still get counted proportional to the number of motif instances. S1.4 Definition of the motif adjacency matrix and motif Laplacian Given an unweighted, directed graph and a motif set M, we conceptually define the motif adjacency matrix by (WM )ij = number of motif instances in M where i and j participate in the motif. (S19) Or, formally, (WM )ij = (cid:88) (v,χA(v))∈M 1({i, j} ⊂ χA(v)), (S20) for i (cid:54)= j. Note that weight is added to (WM )ij only if i and j appear in the anchor set. This is important for the transportation reachability network analyzed in the main text and in Section S6, where weight is added between cities i and j based on the number of intermediary cities that can be traversed between them. Next, we define the motif diagonal degree matrix by (DM )ii = (cid:80)n j=1(WM )ij and the motif Laplacian as LM = DM − WM. Finally, the normalized motif Laplacian is LM = S14 M = I − D −1/2 −1/2 D M LM D forms LM and derive the main clustering method that uses an eigenvector of LM. −1/2 M . The theory in the next section will examine quadratic −1/2 M WM D S1.5 Algorithm for finding a single cluster We are now ready to describe the algorithm for finding a single cluster in a graph. The algorithm finds a partition of the nodes into S and ¯S. The motif conductance is symmetric in the sense M ( ¯S), so either set of nodes (S or ¯S) could be interpreted as a cluster. How- ever, in practice, it is common that one set is substantially smaller than the other. We consider M (S) = φ(G) that φ(G) this smaller set to represent a module in the network. The algorithm is based on the Fiedler partition (32) of the motif weighted adjacency matrix and is presented below in Algorithm 1.1 Algorithm 1: Motif-based clustering algorithm for finding a single cluster. DM ← diagonal matrix with (DM )ii =(cid:80) Input: Directed, unweighted graph G and motif M Output: Motif-based cluster (subset of nodes in G) (WM )ij ← number of instances of M that contain nodes i and j. GM ← weighted graph induced WM z ← eigenvector of second smallest eigenvalue for LM = I − D σi ← to be index of D −1/2 M z with ith smallest value /* Sweep over all prefixes of σ S ← arg minl φ(GM )(Sl), where Sl = {σ1, . . . , σl} if S < ¯S then j(WM )ij −1/2 M WM D −1/2 M */ else return S return ¯S It is often informative to look at all conductance values found from the sweep procedure. We refer to a plot of φ(GM )(Sl) versus l as a sweep profile plot. In the following subection, we show that when the motif has three nodes, φ(GM )(Sl) = φ(G) M (Sl). In this case, the sweep profile shows how motif conductance varies with the size of the sets in Algorithm 1. In the following subsection, we show that when the motif M has three nodes, the cluster 1An implementation of Algorithm 1 is available in SNAP. See http://snap.stanford.edu/ higher-order/. S15 satisfies φ(G) √ M (S) ≤ 4 φ∗, where φ∗ is the smallest motif conductance over all sets of nodes. In other words, the cluster is nearly optimal. Later, we extend this algorithm to allow for signed, colored, and weighted motifs and to simultaneously finding multiple clusters. S1.6 Motif Cheeger inequality for network motifs with three nodes We now derive the motif Cheeger inequality for simple three-node motifs, or, in general, motifs with three anchor nodes. The crux of this result is deriving a relationship between the motif con- ductance function and the weighted motif adjacency matrix, from which the Cheeger inequality is essentially a corollary. For the rest of this section, we will use the following notation. Given an unweighted, directed G and a motif M, the corresponding weighted graph defined by Equa- tion S20 is denoted by GM. The following Lemma relates the motif volume to the volume in the weighted graph. This lemma applies to any anchor set A consisting of at least two nodes. For our main result, we will apply the lemma assuming A = 3. However, we will apply the lemma more generally when discussing four node motifs in Section S1.7. Lemma 1. Let G = (V, E) be a directed, unweighted graph and let GM be the weighted graph for a motif on k nodes and A ≥ 2 anchor nodes. Then for any S ⊂ V , vol(G) M (S) = 1 A − 1 vol(GM )(S) Proof. Consider an instance (v, χA(v)) of a motif. Let (u1, . . . , uA) = χA(v). By Equa- tion S20, (WM )u1,j is incremented by one for j = u2, . . . , uA. Since (DM )u1,u1 =(cid:80) j (WM )u1,j, the motif end point u1 is counted A − 1 times. S16 Figure S5: Illustrations of the quadratic forms on indicator functions for set assignment. Here, the blue nodes have assignment to set S and the green nodes have assignment to set ¯S. The quadratic function gives the penalty for cutting that motif. A: Illustration of Equation S21. The quadratic form is proportional to the indicator on whether or not the motif is cut. B: Illustration of Equation S22. The quadratic form is equal to zero when all nodes are in the same set. However, the form penalizes 2/2 splits more than 3/1 splits. The following lemma states that the truth value for determining whether three binary vari- ables in {−1, 1} are not all equal is a quadratic function of the variables (see Figure S5). Be- cause this function is quadratic, we will be able to relate motif cuts on three nodes to a quadratic form on the motif Laplacian. S17 xi2 + xj2 + xk2 - xixj - xjxk -xkxi =xi = 1xj = 1xk = 1ijkxi = -1xj = -1xk = -1ijkxi = 1xj = 1xk = -1ijkxi = 1xj = -1xk = -1ijk0044iikjlxj = 1xk = 1xi = 1xl = 1iikjlxj = -1xk = -1xi = -1xl = -1iikjlxj = 1xk = -1xi = 1xl = 1iikjlxj = -1xk = -1xi = 1xl = -1iikjlxj = 1xk = -1xi = 1xl = -1006686 - xixj - xixk - xixl - xjxk - xjxl - xkxl =BA Lemma 2. Let xi, xj, xk ∈ {−1, 1}. Then 4 · 1(xi, xj, xk not all the same) = x2 k − xixj − xjxk − xkxi. i + x2 j + x2 It will be easier to derive our results with binary indicator variables taking values in {−1, 1}. However, in terms of the quadratic form on the Laplacian, we have already seen how indicator vectors taking values in {0, 1} relate to the cut value (Equation S9). The following lemma shows that the {0, 1} and {−1, 1} indicator vectors are equivalent, up to a constant, for defining the cut measure in terms of the Laplacian. Lemma 3. Let z ∈ {0, 1}n and define x by xi = 1 if zi = 1 and xi = −1 if zi = 0. Then for any graph Laplacian L = D − W , 4zT Lz = xT Lx. Proof. (cid:88) (i,j)∈E xT Lx = Wij(xi − xj)2 = (cid:88) (i,j)∈E Wij4(zi − zj)2 = 4zT Lz. The next lemma contains the essential result that relates motif cuts in the original graph G to weighted edge cuts in GM. In particular, the lemma shows that the motif cut measure is proportional to the cut on the weighted graph defined in Equation S19 when there are three anchor nodes. Lemma 4. Let G = (V, E) be a directed, unweighted graph and let GM be the weighted graph for a motif with A = 3. Then for any S ⊂ V , cut(G) M (S, ¯S) = 1 2 cut(GM )(S, ¯S) S18 Proof. Let x ∈ {−1, 1}n be an indicator vector of the node set S. (cid:88) (cid:88) (v,{i,j,k})∈M 4 · cut(G) M (S, ¯S) = = = 4 · 1(xi, xj, xk not all the same) (cid:1) − (xixj + xjxk + xkxi) (cid:0)x2 i + x2 j + x2 k xT WM x (v,{i,j,k})∈M xT DM x − 1 1 2 2 1 2 xT LM x = = 2 · cut(GM )(S, ¯S). The first equality follows from the definition of cut motifs (Equation S17). The second equality follows from Lemma 2. The third equality follows from Lemma 1 and Equation S20. The fourth equality follows from the definition of LM. The fifth equality follows from Lemma 3. We are now ready to prove our main result, namely that motif conductance on the orig- inal graph G is equivalent to conductance on the weighted graph GM when there are three anchor nodes. The result is a consequence of the volume and cut relationships provided by Lemmas 1 and 4. Theorem 5. Let G = (V, E) be a directed, unweighted graph and let WM be the weighted adjacency matrix for any motif with A = 3. Then for any S ⊂ V , φ(G) M (S) = φ(GM )(S) In other words, when the number of anchor nodes is 3, the motif conductance is equal to the conductance on the weighted graph defined by Equation S19. Proof. When A = 3, the motif cut and motif volume are both equal to half the motif cut and motif volume measures by Lemmas 1 and 4. S19 For any motif with three anchor nodes, conductance on the weighted graph is equal to the motif conductance. Because of this, we can use results from spectral graph theory for weighted graphs (32) and re-interpret the results in terms of motif conductance. In particular, we get the following "motif Cheeger inequality". Theorem 6. Motif Cheeger Inequality. Suppose we use Algorithm 1 to find a low-motif con- M (S(cid:48)) be the optimal motif conductance over any set of nodes ductance set S. Let φ∗ = minS(cid:48) φ(G) S(cid:48). Then 1. φ(G) √ M (S) ≤ 4 φ∗ and 2. φ∗ ≥ λ2/2 Proof. The result follows from Theorem 5 and the standard Cheeger ineqaulity (32). The first part of the result says that the set of nodes S is within a quadratic factor of optimal. This provides the mathematical guarantees that our procedure finds a good cluster in a graph, if one exists. The second result provides a lower bound on the optimal motif conductance in terms of the eigenvalue. We use this bound in our analysis of a food web (see Section S7.1) to show that certain motifs do not provide good clusters, regardless of the procedure to select S. S1.7 Discussion of motif Cheeger inequality for network motifs with four or more nodes Analogs of the indicator function in Lemma 2 for four or more variables are not quadratic. Subsequently, for motifs with A > 3, we no longer get the motif Cheeger inequalities guaran- teed by Theorem 6. That being said, solutions found by motif-based partitioning approximate a related value of conductance. We now provide the details. We begin with a lemma that shows a functional form for four binary variables taking values in {−1, 1} to not all be equal. We see that it is quartic, not quadratic. S20 Lemma 7. Let xi, xj, xk, xl ∈ {−1, 1}. Then the indicator function on all four elements not being equal is 8 · 1(xi, xj, xk, xl not all the same) (S21) = (7 − xixj − xixk − xixl − xjxk − xjxl − xkxl − xixjxkxl) . We almost have a quadratic form, if not for the quartic term xixjxkxl. However, we could use the following related quadratic form: 6 − xixj − xixk − xixl − xjxk − xjxl − xkxl  0 xi, xj, xk, xl are all the same 6 exactly three of xi, xj, xk, xl are the same 8 exactly two of xi, xj, xk, xl are −1. = (S22) The quadratic still takes value 0 if all four entries are the same, and takes a non-zero value otherwise. However, the quadratic takes a larger value if exactly two of the entries are −1. Figure S5 illustrates this idea. From this, we can provide an analogous statement to Lemma 4 for motifs with A = 4. Lemma 8. Let G = (V, E) be a directed, unweighted graph and let GM be the weighted graph for a motif with A = 4. Then for any S ⊂ V , cut(G) M (S, ¯S) = 1 3 cut(GM )(S, ¯S) − (cid:88) (v,{i,j,k,l})∈M · 1(exactly two of i, j, k, l in S) 1 3 S21 Proof. Let x ∈ {−1, 1}n be an indicator vector of the node set S. 6 · cut(G) M (S, ¯S) + 2 · 1(exactly two of i, j, k, l in S) 6 − xixj − xixk − xixl − xjxk − xjxl − xkxl (cid:1) − (xixj + xixk + xixl + xjxk + xjxl + xkxl) (cid:88) (v,{i,j,k,l})∈M i + x2 j + x2 k + x2 l xT WM x (cid:88) (cid:88) (cid:0)x2 = = = (v,{i,j,k,l})∈M 3 2 (v,{i,j,k,l})∈M xT DM x − 1 1 2 2 1 2 xT LM x = = 2 · cut(GM )(S, ¯S). The first equality follows from Equations S17 and S22. The third equality follows from Lemma 1. The fourth equality follows from the definition of LM. The fifth equality follows from Lemma 3. With four anchor nodes, the motif cut in G is slightly different than the weighted cut in the weighted graph GM. However, Lemma 1 says that the motif volume in G is still the same as the weighted volume in GM. We use this to derive the following result. Theorem 9. Let G = (V, E) be a directed, unweighted graph and let WM be the weighted adjacency matrix for any motif with A = 4. Then for any S ⊂ V , (cid:80) M (S) = φ(GM )(S) − φ(G) (v,{i,j,k,l})∈M 1(exactly two of i, j, k, l in S) vol(GM )(S) In other words, when there are four anchor nodes, the weighting scheme in Equation S19 models the exact conductance with an additional penalty for splitting the four anchor nodes into two groups of two. Proof. This follows from Lemmas 1 and 8. S22 To summarize, we still get a Cheeger inequality from the weighted graph, but it is in terms of a penalized version of the motif conductance φ(G) M (S). However, the penalty makes sense-if the group of four nodes is "more split" (2 and 2 as opposed to 3 and 1), the penalty is larger. When A > 4, we can derive similar penalized approximations to φ(G) M (S). S1.8 Methods for simultaneously finding multiple clusters For clustering a network into k > 2 clusters based on motifs, we could recursively cut the graph using the sweep procedure with some stopping criterion (20). For example, we could continue to cut the largest remaining cluster until the graph is partitioned into some pre-specified number of clusters. We refer to this method as recursive bi-partitioning. In addition, we can use the following method of Ng et al. (19). Algorithm 2: Motif-based clustering algorithm for finding several clusters. DM ← diagonal matrix with (DM )ii =(cid:80) Input: Directed, unweighted graph G, motif M, number of clusters k Output: k disjoint motif-based clusters (WM )ij ← number of instances of M that contain nodes i and j. z1, . . . , zk ← eigenvectors of k smallest eigenvalues for LM = I − D Yij ← zij/ Embed node i into Rk by taking the ith row of the matrix Y Run k-means clustering on the embedded nodes This method does not have the same Cheeger-like guarantee on quality. However, recent (cid:113)(cid:80)k j(WM )ij j=1 z2 ij −1/2 M WM D −1/2 M theory shows that by replacing k-means with a different clustering algorithm, there is a perfor- mance guarantee (33). While this provides motivation, we use k-means for its simplicity and empirical success. S1.9 Extensions of the method for simultaneously analyzing several net- work motifs All of our results carry through when considering several motifs simultaneously. In particular, suppose we are interested in clustering based on motif sets M1, . . . , Mq for q different motifs. S23 Further suppose that we want to weight the impact of some motifs more than other motifs. Let WMj be the weighted adjacency matrix for motif Mj, j = 1, . . . , q, and let αj ≥ 0 be the weight of motif Mj, then we can form the weighted adjacency matrix WM = αjWMj . (S23) Now, the cut and volume measures are simply weighted sums by linearity. Suppose that the j=1 Mj all have three anchor nodes and let GM be the weighted graph corresponding to WM. Then q(cid:88) q(cid:88) cut(GM )(S, ¯S) = αjcut(G) Mj (S, ¯S), vol(GM )(S) = αjvol(G) Mj (S), j=1 j=1 and Theorem 6 applies to a weighted motif conductance equal to (cid:80)q (cid:16)(cid:80)q j=1 αjcut(G) Mj (S),(cid:80)q (S, ¯S) j=1 αjvol(G) Mj j=1 αjvol(G) Mj ( ¯S) min q(cid:88) (cid:17). S1.10 Extensions of the method to signed, colored, and weighted motifs Our results easily generalize for signed networks. We only have to generalize Equation S10 by allowing the adjacency matrix B to be signed. Extending the method for motifs where the edges or nodes are "colored" or "labeled" is similar. If the edges are colored, then we again just allow the adjacency matrix B to capture this information. If the nodes in the motif are colored, we only count motif instances with the specified pattern. We can also generalize the notions of motif cut and motif volume for "weighted motifs", i.e., each motif has an associated nonnegative weight. Let ω(v,χA(v)) be the weight of a motif instance. Our cut and volume metrics are then (cid:88) (cid:88) (v,χA(v))∈M cut(G) M (S, ¯S) = vol(G) M (S) = ω(v,χA(v)) 1(∃ i, j ∈ χA(v) i ∈ S, j ∈ ¯S), (cid:88) 1(i ∈ S). (v,χA(v))∈M i∈χA(v) ω(v,χA(v)) S24 Subsequently, we adjust the motif adjacency matrix as follows: (cid:88) (WM )ij = (v,χA(v))∈M ω(v,χA(v)) 1({i, j} ⊂ χA(v)) (S24) S1.11 Connections to directed graph partitioning Our framework also provides a way to analyze methods for clustering directed graphs. Exist- ing principled generalizations of undirected graph partitioning to directed graph partitioning proceed from graph circulations (34) or random walks (35) and are difficult to interpret. Our motif-based clustering framework provides a simple, rigorous framework for directed graph partitioning. For example, consider the common heuristic of clustering the symmetrized graph W = A + AT , where A is the (directed) adjacency matrix (36). Following Theorem 5, conductance-minimizing methods for partitioning W are actually trying to minimize a weighted sum of motif-based conductances for the directed edge motif and the bi-directional edge motif: (cid:20)0 1 (cid:21) 0 0 (cid:20)0 1 (cid:21) 1 0 , B1 = , B2 = where both motifs are simple (A = {1, 2}). If W1 and W2 are the motif adjacency matrices for B1 and B2, then A + AT = W = W1 + 2W2. This weighting scheme gives a weight of two to bi-directional edges in the original graph and a weight of one to uni-directional edges. An alternative strategy for clustering a directed graph is to simply remove the direction on all edges, treating bi-directional and uni-directional edges the same. The resulting adjacency matrix is equivalent to the motif adjacency matrix for the bi-directional and uni-directional edges (without any relative weighting). Formally, W = W1 + W2. We refer to this "motif" as Medge (Figure S4), which will later provide a convenient notation when discussing both motif- based clustering and edge-based clustering. S25 S1.12 Connections to hypergraph partitioning Finally, we contextualize our method in the context of existing literature on hypergraph par- titioning. The problem of partitioning a graph based on relationships between more than two nodes has been studied in hypergraph partitioning (37), and we can interpret motifs as hy- peredges in a graph. In contrast to existing hypergraph partitioning problems, we induce the hyperedges from motifs rather than take the hyperedges as given a priori. The goal with our analysis of the Florida Bay food web, for example, was to find which hyperedge sets (induced by a motif) provide a good clustering of the network (see Section S7.1). In general, our motif-based spectral clustering methodology falls into the area of encoding a hypergraph partitioning problem by a graph partitioning problem (38, 39). With simple mo- tifs on k nodes, the motif Laplacian LM formed from WM (Equation S20) is a special case of the Rodr´ıguez Laplacian (38, 40) for k-regular hypergraphs. The motif Cheeger inequality we proved (Theorem 6) explains why this Laplacian is appropriate for 3-regular hypergraphs. Specifically, it respects the standard cut and volume metrics for graph partitioning. S2 Computational complexity and scalability of the method We now analyze the computation of the higher-order clustering method. We first provide a theoretical analysis of the computational complexity, which depends on motif. After, we empir- ically analyze the time to find clusters for triangular motifs on a variety of real-world networks, ranging in size from a few hundred thousand edges to nearly two billion edges. Finally, we show that we can practically compute the motif adjacency matrix for motifs up to size 9 on a number of real-world networks. S26 S2.1 Analysis of computational complexity We now analyze the computational complexity of the algorithm presented in Theorem 6. Over- all, the complexity of the algorithm is governed by the computations of the motif adjacency matrix WM, an eigenvector, and the sweep cut procedure. For simplicity, we assume that we can access edges in a graph in O(1) time and access and modify matrix entries in O(1) time. Let m and n denote the number of edges in the graph. Theoretically, the eigenvector can be computed in O((m + n)(log n)O(1)) time using fast Laplacian solvers (41). For the sweep cut, it takes O(n log n) to sort the indices given the eigenvector using a standard sorting algorithm such is merge sort. Computing motif conductance for each set Sr in the sweep also takes linear term. In pratice, the sweep cut step takes a small fraction of the total running time of the al- gorithm. For the remainder of the analysis, we consider the more nuanced issue of the time to compute WM. The computational time to form WM is bounded by the time to find all instances of the motif in the graph. Naively, for a motif on k nodes, we can compute WM in Θ(nk) time by checking each k-tuple of nodes. Furthermore, there are cases where there are Θ(nk) motif instances in the graph, e.g., there are Θ(n3) triangles in a complete graph. However, since most real-world networks are sparse, we instead focus on the complexity of algorithms in terms of the number of edges and the maximum degree in the graph. For this case, there are several efficient practical algorithms for real networks with available software (42–46). Theoretically, motif counting is efficient. Here we consider four classes of motifs: (1) triangles, (2) wedges (connected, non-triangle three-node motifs), (3) four-node motifs, and (4) k-cliques. Let m be the number of edges in a graph. Latapy analyzed a number of algorithms for listing all triangles in an undirected network, including an algorithm that has computational complexity Θ(m1.5) (47). For a directed graph G, we can use the following algorithm: (1) form a new graph Gundir by removing the direction from all edges in G (2) find all triangles in Gundir, S27 (3) for every triangle in Gundir, check which directed triangle motif it is in G. Since step 1 is linear and we can perform the check in step 3 in O(1) time, the same Θ(m1.5) complexity holds for directed networks. This analysis holds regardless of the structure of the networks. However, additional properties of the network can lead to improved algorithms. For example, in networks with a power law degree sequence with exponent greater than 7/2, Berry et al. provide a randomized algorithm with expected running time Θ(m) (48). In the case of a bounded degree graph, enumerating over all nodes and checking all pairs of neighbors takes time Θ(nd2 max), where dmax is the maximum degree in the graph. We note that with triangular motifs, the number of non-zeros in WM is less than the number of non-zeros in the original adjacency matrix. Thus, we do not have to worry about additional storage requirements. Next, we consider wedges (open triangles). We can list all wedges by looking at every pair of neighbors of every node. This algorithm has Θ(nd2 max) computational complexity, where n is the number of nodes and dmax is again the maximum degree in the graph (a more precise bound j d2 j ), where dj is the degree of node j.) If the graph is sparse, the motif adjacency matrix will have more non-zeros than the original adjacency matrix, so additional storage is is Θ((cid:80) has O((cid:80) required. Specifically, there is fill-in for all two-hop neighbors, so the motif adjacency matrix j d2 j ) non-zeros. This is impractical for large real-world networks but manageable for modestly sized networks. Marcus and Shavitt present an algorithm for listing all four-node motifs in an undirected graph in O(m2) time (49). We can employ the same edge direction check as for triangles to extend this result to directed graphs. Chiba and Nishizeki develop an algorithm for finding a representation of all quadrangles (motif on four nodes that contains a four-node cycle as a subgraph) in O(am) time and O(m) space, where a is the arboricity of the graph (50). The ar- boricity of any connected graph is bounded by O(m1/2), so this algorithm runs in time O(m3/2). Chiba and Nishizeki present an algorithms for k-clique enumeration that also depends on S28 the arboricity of the graph. Specifically, they provide an algorithm for enumerating all k-cliques in O(kak−2m) time, where a is the arboricity of the graph. This algorithm achieves the Θ(m3/2) bound for arbitrary graphs. (We note that the triangle listing sub-case is similar in spirit to the algorithm proposed by Schank and Wagner (51)). For four-node cliques, the algorithm runs in time O(m2) time, which matches the complexity of Marcus and Shavitt (49). We note that we could also employ approximation algorithms to estimate the weights in the motif adjacency matrix (52). Such methods balance computation time and accuracy. Finally, we note that the computation of WM and the computation of the eigenvector are suitable for parallel computation. There are already distributed algorithms for triangle enumeration (53), and the (parallel) eigenvector computation of a sparse matrix is a classical problem in scientific computing (54, 55). S2.2 Experimental results on triangular motifs In this section, we demonstrate that our method scales to real-world networks with billions of edges. We tested the scalability of our method on 16 large directed graphs from a va- riety of real-world applications. These networks range from a couple hundred thousand to two billion edges and from 10 thousand to over 50 million nodes. Table S1 lists short de- scriptions of these networks. The wiki-RfA, email-EuAll, cit-HepPh, web-NotreDame, ama- zon0601, wiki-Talk, ego-Gplus, soc-Pokec, and soc-LiveJournal1 networks were downloaded from the SNAP collection at http://snap.stanford.edu/data/ (56). The uk-2014- tpd, uk-2014-host, enwiki-2013, uk-2002, arabic-2005, twitter-2010, and sk-2005 networks were downloaded from the Laboratory for Web Algorithmics collection at http://law.di. unimi.it/datasets.php (57–60). Links to all datasets are available on our project web- site: http://snap.stanford.edu/higher-order/. Recall that Algorithm 1 consists of two major computational components: S29 1. Form the weighted graph WM. 2. Compute the eigenvector z of second smallest eigenvalue of the matrix LM. After computing the eigenvector, we sort the vertices and loop over prefix sets to find the lowest motif conductance set. We consider these final steps as part of the eigenvector computation for our performance experiments. For each network in Table S1, we ran the method for all directed triangular motifs (M1– M7). To compute WM, we used a standard algorithm that meets the O(m3/2) bound (47, 51) with some additional pre-processing based on the motif. Specifically, the algorithm is: 1. Take motif type M and graph G as input. 2. (Pre-processing.) If M is M1 or M5, remove all bi-directional edges in G since these motifs only contain uni-directional edges. If M is M4, remove all uni-directional edges in G as this motif only contains bi-directional edges. 3. Form the undirected graph Gundir by removing the direction of all edges in G. 4. Let du be the degree of node u in Gundir. Order the nodes in Gundir by increasing degree, breaking ties arbitrarily. Denote this ordering by ψ. 5. For every edge undirected edge {u, v} in Gundir, if ψu < ψv, add directed edge (u, v) to Gdir; otherwise, add directed edge (v, u) to Gdir. 6. For every node in u in Gdir and every pair of directed edges (u, v) and (u, w), check to see if u, v, and w form motif M in G. If they do, check if the triangle forms motif M in G and update WM accordingly. The algorithm runs in time Θ(m3/2) time in the worst case, and is also known as an effective heuristic for real-world networks (48). After, we find the largest connected component of the S30 graph corresponding to the motif adjacency matrix WM, form the motif normalized Laplacian LM of the largest component, and compute the eigenvector of second smallest eigenvalue of LM. To compute the eigenvector, we use MATLAB's eigs routine with tolerance 1e-4 and the "smallest algebraic" option for the eigenvalue type. Table S2 lists the time to compute WM and the time to compute the eigenvector for each network. We omitted the time to read the graph from disk because this time strongly depends on how the graph is compressed. All experiments ran on a 40-core server with four 2.4 GHz Intel Xeon E7-4870 processors. All computations of WM were in serial and the computations of the eigenvectors were in parallel. Over all networks and all motifs, the longest computation of WM (including pre-processing time) was for M2 on the sk-2005 network and took roughly 52.8 hours. The longest eigenvector computation was for M6 on the sk-2005 network, and took about 1.62 hours. We note that WM only needs to be computed once per network, regardless of the eventual number of clusters that are extracted. Also, the computation of WM can easily be accelerated by parallel computing (the enumeration of motifs can be done in parallel over nodes, for example) or by more sophisticated algorithms (48). In this work, we perform the computation of WM in serial in order to better understand the scalability. In theory, the triangle enumeration time is O(m1.5). We fit a linear regression of the log of the computation time of the last step of the enumeration algorithm to the regressor log(m) and a constant term: log(time) ∼ a log(m) + b (S25) If the computations truly took cm1.5 for some constant c, then the regression coefficient for log(m) would be 1.5. Because of the pre-processing of the algorithm, the number of edges m depends on the motif. For example, with motifs M1 and M5, we only count the number of uni-directional edges. The pre-processing time, which is linear in the total number of edges, S31 is not included in the time. The regression coefficient for log(m) (a in Equation S25) was found to be smaller 1.5 for each motif (Table S3). The largest regression coefficient was 1.31 for M3 (with 95% confidence interval 1.31 ± 0.19). We also performed a regression over the aggregate times of the motifs, and the regression coefficient was 1.17 (with 95% confidence interval 1.17 ± 0.09). We conclude that on real-world datasets, the algorithm for computing WM performs much better than the worst-case guarantees. Table S1: Summary of networks used in scalability experiments with triangular motifs. The total number of edges is the sum of the number of unidirectional edges and twice the number of bidirectional edges. Name description Adminship voting on Wikipedia Emails in a research institution Citations for papers on arXiv HEP-PH wiki-RfA email-EuAll cit-HepPh web-NotreDame Hyperlinks on nd.edu domain Product co-purchasing on Amazon amazon0601 Wikipedia users interactions wiki-Talk Circles on Google+ ego-Gplus top private domain links on .uk web uk-2014-tpd Pokec friendships soc-Pokec uk-2014-host Host links on .uk web soc-LiveJournal1 LiveJournal friendships enwiki-2013 uk-2002 arabic-2005 twitter-2010 sk-2005 Hyperlinks on English Wikipedia Hyperlinks on .uk web Hyperlinks on arabic-language web pages Twitter followers Hyperlinks on .sk web # nodes 10.8K 265K 34.5K 326K 403K 2.39M 108K 1.77M 1.63M 4.77M 4.85M 4.21M 18.5M 22.7M 41.7M 50.6M unidir. # edges total bidir. 189K 175K 7.00K 419K 310K 54.5K 422K 420K 657 1.47M 711K 380K 3.39M 1.50M 944K 5.02M 4.30M 362K 13.7M 10.8M 1.44M 16.9M 13.7M 1.58M 30.6M 14.0M 8.32M 46.8M 33.7M 6.55M 68.5M 17.2M 25.6M 101M 82.6M 9.37M 292M 231M 30.5M 631M 477M 77.3M 1.47B 937M 266M 1.93B 1.69B 120M S32 Table S2: Time to compute the motif adjacency matrix WM and the second eigenvector of the motif normalized Laplacian LM in seconds for each directed triangular motif. Network wiki-RfA email-EuAll cit-HepPh web-NotreDame amazon0601 wiki-Talk ego-Gplus uk-2014-tpd soc-Pokec uk-2014-host soc-LiveJournal1 enwiki-2013 uk-2002 arabic-2005 twitter-2010 sk-2005 Motif adjacency matrix WM M3 M1 1.71e+00 1.19e+00 4.74e-01 6.26e-01 2.73e+00 7.65e+00 2.33e+01 9.42e-01 6.91e+00 2.35e+00 2.20e+01 1.07e+01 1.73e+03 8.55e+02 4.07e+02 8.10e+01 4.17e+01 1.21e+02 2.76e+03 9.98e+02 6.24e+02 9.08e+01 7.09e+02 8.36e+02 5.17e+03 1.47e+03 6.05e+04 6.51e+03 1.21e+04 1.31e+05 1.29e+05 5.52e+04 M2 2.67e+00 8.29e-01 3.36e+00 2.39e+01 8.66e+00 3.00e+01 2.42e+03 5.31e+02 1.34e+02 4.68e+03 7.66e+02 9.62e+02 8.59e+03 7.64e+04 1.38e+05 1.63e+05 M7 M6 5.40e-01 M5 M4 1.79e+00 2.42e+00 2.35e+00 2.06e-02 5.02e-01 5.41e-01 2.46e-01 6.22e+00 8.20e+00 3.29e+00 3.35e+00 2.30e+00 1.17e+00 8.29e+00 8.40e+00 1.82e+00 2.94e+00 5.47e+00 5.73e+00 3.11e+00 1.35e+01 2.09e+01 2.10e+01 2.08e+01 1.63e+03 2.07e+03 2.17e+03 2.56e+01 1.15e+02 3.04e+02 2.85e+02 3.04e+01 4.88e+01 1.00e+02 1.04e+02 8.90e+01 1.32e+03 2.89e+03 2.99e+03 1.24e+02 1.24e+02 4.41e+02 4.49e+02 3.13e+01 9.77e+02 8.19e+02 8.38e+02 2.45e+02 1.73e+03 4.53e+03 5.29e+03 6.08e+03 8.39e+03 3.59e+04 3.69e+04 3.33e+04 1.99e+04 8.03e+04 7.65e+04 1.55e+04 5.23e+04 9.64e+04 8.42e+04 3.62e-01 6.96e-01 M2 2.12e-01 1.62e-01 M4 2.12e-01 1.62e-01 5.97e-01 3.62e-01 4.62e+00 6.96e-01 Second eigenvector of LM M5 M3 M1 2.12e-01 1.22e-01 1.14e-01 1.62e-01 2.29e-01 2.43e-01 2.11e+00 2.10e+00 2.11e+00 2.10e+00 2.10e+00 3.62e-01 1.86e-01 1.23e-01 6.96e-01 1.28e+00 2.40e+00 2.51e+00 2.40e+00 2.40e+00 4.42e+00 1.68e+01 2.11e+01 1.68e+01 1.68e+01 3.59e+00 9.66e+00 9.92e+00 4.35e+00 9.66e+00 1.96e+00 1.75e+01 3.91e+01 1.75e+01 1.75e+01 1.81e+01 4.38e+01 6.80e+01 2.04e+01 4.38e+01 2.32e+00 2.20e+01 1.06e+02 2.20e+01 2.20e+01 2.18e+01 7.58e+01 8.45e+01 7.58e+01 7.58e+01 1.66e+01 8.65e+01 2.52e+02 8.65e+01 8.65e+01 1.98e+01 1.64e+02 4.80e+02 3.26e+02 1.64e+02 2.23e+02 1.23e+03 1.95e+03 1.23e+03 1.23e+03 5.73e+01 2.94e+02 7.98e+02 2.94e+02 2.94e+02 M7 M6 2.93e-01 2.94e-01 1.92e-01 2.35e-01 2.24e+00 2.30e+00 2.06e+00 9.61e-01 4.97e+00 4.53e+00 2.54e+00 4.52e+00 2.57e+01 4.42e+01 2.10e+01 2.16e+01 2.39e+01 2.45e+01 8.28e+01 8.73e+01 4.49e+01 6.13e+01 2.14e+02 1.48e+02 7.87e+02 5.32e+02 1.95e+03 1.40e+03 2.22e+03 2.18e+03 5.83e+03 3.81e+03 Table S3: The 95% confidence interval (CI) for the regression coefficient of the regressor log(m) in a linear model for predicting the time to compute WM, based on the computational results for the networks in Table S1. The algorithm runs is guranteed to run in time O(m3/2). "Combined" refers to the regression coefficient when considering all of the times. Motif M1 1.20 ± 0.19 95% CI M2 1.30 ± 0.20 M3 1.31 ± 0.19 M4 0.90 ± 0.31 M5 1.20 ± 0.20 M6 1.27 ± 1.21 M7 1.27 ± 0.21 Combined 1.17 ± 0.09 S33 S2.3 Experimental results on k-cliques On smaller graphs, we can compute larger motifs. To illustrate the computation time, we formed the motif adjacency matrix W based on the k-cliques motif for k = 4, . . . , 9. We implemented the k-clique enumeration algorithm by Chiba and Nishizeki with the additional pre-processing of computing the (k − 1)-core of the graph. (This pre-processing improves the running time in practice but does not affect the asymptotic complexity.) The motif adjacency matrices for k-cliques are sparser than the adjacency matrix of the original graph. Thus, we do not worry about spatial complexity for these motifs. We ran the algorithm on nine real-world networks, ranging from roughly four thousande nodes and 88 thousand edges to over two million nodes and around five million edges (see Table S4.) Each network contained at least one 9-clique and hence at least one k-clique for k < 9. All networks were downloaded from the SNAP collection at http://snap.stanford. edu/data/ (56). All computations ran on the same server as for the triangular motifs and again there was no parallelism. We terminated computations after two hours. For five of the nine networks, the time to compute WM for the k-clique motif was under two hours for k = 4, . . . , 9 (Table S5). And for each network, the computation finished within two hours for k = 4, 5, 6. The smallest network (in terms of number of nodes and number of edges) was the Facebook ego network, where it took just under two hours to comptue WM for the 6-clique motif and over two hours for the 7-clique motif. This network has around 80,000 edges. On the other hand, for the YouTube network, which contains nearly 3 million edges, we could compute WM for the 9-clique motif in under a minute. We conclude that it is possible to use our frameworks with motifs much larger than the three-node motifs on which we performed many of our experiments. However, the number of edges is not that correlated with the running time to compute WM. This makes sense becuse the Chiba and Nishizeki algorithm complexity is O(ak−2m), where a is the arboricity of the graph. S34 Hence, the dependence on the number of edges is always linear. Table S4: Summary of networks used in scalability experiments with k-clique motifs. For each graph, we consider all edges as undirected. description Facebook friendships Adminship voting on Wikipedia author co-authorship Emails in a research institution paper citations Network ego-Facebook wiki-RfA ca-AstroPh email-EuAll cit-HepPh soc-Slashdot0811 Slashdot user interactions com-DBLP com-Youtube wiki-Talk author co-authorship User friendships Wikipedia users interactions # nodes # edges 88.2K 4.04K 10.8K 182K 198K 18.8K 364K 265K 421K 34.5K 77.4K 469K 317K 1.05M 1.13M 2.99M 2.39M 4.66M Table S5: Time to compute WM for k-clique motifs (seconds). Only computations that finished within two hours are listed. Network ego-Facebook wiki-RfA ca-AstroPh email-EuAll cit-HepPh soc-Slashdot0811 com-DBLP com-Youtube wiki-Talk Number of nodes in clique (k) 4 14 6 5 1 3 3 9 12 64 5 317 22 35 2 6 12 129 17 466 6 6816 63 285 4 11 55 3234 25 2898 7 – 134 2164 5 18 282 – 33 – 8 – 218 – 6 30 1018 – 35 – 9 – 286 – 6 36 2836 – 33 – S35 S3 Matrix-based interpretation of the motif-weighted adja- cency matrix For several motifs, the motif adjacency matrix WM (Equation S19) has a simple formula in terms of the adjacency matrix of the original, directed, unweighted graph, G. Let A be the adjacency matrix for G and let U and B be the adjacency matrix of the unidirectional and bidirectional links of G. Formally, B = A◦ AT and U = A− B, where ◦ denotes the Hadamard (entry-wise) product. Table S6 lists the formula of WM for motifs M1, M2, M3, M4, M5, M6, and M7 (see Figure S4) in terms of the matrices U and B. The central computational kernel in these computations is (X · Y ) ◦ Z. When X, Y , and Z are sparse, efficient parallel algorithms have been developed and analyzed (61). If the adjacency matrix is sparse, then computing WM for these motifs falls into this framework. Table S6: Matrix-based formulations of the weighted motif adjacency matrix WM (Equa- tion S19) for all triangular three-node simple motifs. P ◦ Q denotes the Hadamard (entry-wise) products of matrices P and Q. If A is the adjacency matrix of a directed, unweighted graph G, then B = A ◦ AT and U = A − B. Note that in all cases, WM is symmetric. Motif M1 M2 M3 M4 M5 M6 M7 Matrix computations C = (U · U ) ◦ U T C = (B · U ) ◦ U T + (U · B) ◦ U T + (U · U ) ◦ B C = (B · B) ◦ U + (B · U ) ◦ B + (U · B) ◦ B C = (B · B) ◦ B C = (U · U ) ◦ U + (U · U T ) ◦ U + (U T · U ) ◦ U C = (U · B) ◦ U + (B · U T ) ◦ U T + (U T · U ) ◦ B C = (U T · B) ◦ U T + (B · U ) ◦ U + (U · U T ) ◦ B WM = C + C T C + C T C + C T C C + C T C C With these matrix formulations, implementing the motif-based spectral partitioning algo- rithm for modestly sized graphs is straightforward. However, these computations become slower than standard fast triangle enumeration algorithms when the networks are large and sparse. Nevertheless, the matrix formulations provide a simple and elegant computational S36 c o n d u c t a n c e s ] = M o t i f S p e c t r a l P a r t i t i o n M 6 (A) f u n c t i o n [ S , Sbar , 1 2 % S p e c t r a l p a r t i t i o n i n g f o r m o t i f M 6 3 4 B = s p o n e s (A & A ' ) ; % b i d i r e c t i o n a l 5 U = A − B ; % u n i d i r e c t i o n a l l i n k s l i n k s 6 7 % Form m o t i f a d j a c e n c y m a t r i x f o r m o t i f M 6 . 8 % For d i f f e r e n t m o t i f s , 9 W = (B ∗ U' ) .∗ U + (U' ∗ U) .∗ U' + (U ∗ B) r e p l a c e t h i s .∗ B ; l i n e w i t h a n o t h e r m a t r i x f o r m u l a t i o n . 10 11 % Compute e i g e n v e c t o r o f m o t i f n o r m a l i z e d L a p l a c i a n 12 D s q r t = f u l l ( sum (W, 2 ) ) ; 13 D s q r t ( D s q r t = 0 ) = 1 . / 14 15 Ln = s p a r s e ( I , 16 17 % Matlab ' s e i g s 18 J , −V .∗ ( D s q r t ( I ) ' s a ' ) ; e i g o r d e r ] = s o r t ( d i a g ( lambdas ) ) ; lambdas ] = e i g s ( Ln , 2 , sometimes o u t o f o r d e r .∗ D s q r t ( J ) ) , J , V] = f i n d (W) ; s q r t ( D s q r t ( D s q r t = 0 ) ) ; [ I , [ Z , e i g o r d e r ( end ) ) ; [ , y = D s q r t 19 i s .∗ Z ( : , s i z e (A, 1 ) , s i z e (A, 2 ) ) ; t i m e sweep p r o c e d u r e 20 21 % L i n e a r [ , o r d e r ] = s o r t ( y ) ; 22 23 C = W( o r d e r , o r d e r ) ; 24 C sums = f u l l ( sum (C , 2 ) ) ; volumes = cumsum ( C sums ) ; 25 v o l u m e s o t h e r = f u l l ( sum ( sum (W) ) ) ∗ ones ( l e n g t h ( o r d e r ) , 1 ) − volumes ; c o n d u c t a n c e s = cumsum ( C sums − 2 ∗ sum ( t r i l (C ) , 2 ) ) [ , s p l i t ] = min ( c o n d u c t a n c e s ) ; 26 27 28 29 S = o r d e r ( 1 : s p l i t ) ; 30 Sbar = o r d e r ( ( s p l i t + 1 ) : end ) ; . / min ( volumes , v o l u m e s o t h e r ) ; Figure S6: MATLAB implementation of the motif-based spectral partitioning algorithm for motif M6. For other motifs, line 9 can be replaced with the formulations from Table S6. method for the motif adjacency matrix WM. To demonstrate, Figure S6 provides a complete MATLAB implementation of Algorithm 1 for M6 (Figure S4). The entire algorithm including comments comrpises 28 lines of code. An alternative matrix formulation comes from a motif-node adjacency matrix. Let M (B,A) be a motif set and number the instances of the motif 1, . . . ,M, so that (vi, χA(vi)) is the ith motif. Define the M× n motif-node adjacency matrix AM by (AM )ij = 1(j ∈ χA(vi)). Then S37 (WM )ij = (AT M AM )ij, i (cid:54)= j. (S26) This provides a convenient algebraic formulation for defining the weighted motif adjacency matrix. However, in practice, we do not use this formulation for any computations. S4 Alternative clustering algorithms for evaluation For our experiments, we compare our spectral motif-based custering to the following methods: • Standard, edge-based spectral clustering, which is a special case of motif-based cluster- ing. In particular, the motifs B1 = (cid:20)0 1 (cid:21) 1 0 , B2 = (cid:20)0 1 (cid:21) 0 0 , A = {1, 2} (S27) correspond to removing directionality from a directed graph. We refer to the union of these two motifs as Medge. • Infomap, which is based on the map equation (62). Software for Infomap was down- loaded from http://mapequation.org/code.html. We run the algorithm the algorithm for directed links when the network under consideration is directed. • The Louvain method (63). Software for the Louvain method was downloaded from https://perso.uclouvain.be/vincent.blondel/research/louvain. html We use the "oriented" version of the Louvain method for directed graphs. Infomap and the Louvain method are purely clustering methods in the sense that they take as input the graph and produce as output a set of labels for the nodes in the graph. In contrast to the spectral methods, we do not have control over the number of clusters. Also, only the spectral methods provide embeddings of the nodes into euclidean space, which is useful for S38 visualization. Thus, for our analysis of the transportation reachiability network in Section S6, we only compare spectral methods. S5 Details and comparison against existing methods for the C. elegans network We now provide more details on the cluster found for the C. elegans network of frontal neu- rons (28). In this network, the nodes are neurons and the edges are synapses. The net- work data was downloaded from http://www.biological-networks.org/pubs/ suppl/celegans131.zip. S5.1 Connected components of the motif adjacency matrices We again first onsider the connected components of the motif adjacency matrices as a pre- processing step. For our analysis, we consider use Mbifan, M8, and Medge (Figure S4). The original network has 131 nodes and 764 edges. The largest connected component of the motif adjacency matrix for motif Mbifan contains 112 nodes. The remaining 19 nodes are isolated and correspond to the neurons AFDL, AIAR, AINR, ASGL/R, ASIL/R, ASJL/R, ASKL/R, AVL, AWAL, AWCR, RID, RMFL, SIADR, and SIBDL/R. The largest connected component of the motif adjacency matrix for motif M8 contains 127 nodes. The remaining 4 nodes are isolated and correspond to the neurons ASJL/R and SIBDL/R. The original network is weakly connected, so the motif adjacency matrix for Medge is connected. S5.2 Comparison of bi-fan motif cluster to clusters found by existing meth- ods We found the motif-based clusters for motifs Mbifan, M8, and Medge by running Algorithm 1 on the largest connected component of the motif adjacency matrix. Sweep profile plots (φM (S) as S39 Figure S7: Sweep profile plot (φM (S) as a function of S from the sweep in Algorithm 1) for Mbifan (green) M8 (dark blue), and Medge (light blue). a function of S from the sweep in Algorithm 1) are shown in Figure S7 and show that the size of the Mbifan returned by Algorithm 1 cluster is smaller than the clusters for M8 and Medge. In fact, the motif-based clusters for M8 and Medge essentially bisect the graph, containing 63 of 127 and 64 of 131 nodes, respectively. Of the 63 nodes in the M8-based cluster, only 2 are in the edge-based cluster, so these partitions give roughly the same information. Next, we compare the clusters found by existing methods to the Mbifan-based cluster found by Algorithm 1. We will show that existing methods do not find the same group of nodes. Let Sbifan be the Mbifan-based cluster, which consists of 20 nodes. The nodes correspond to the following neurons: IL1DL/VL, IL2DL/DR/VL/VR/L/R, OLQDL/R, RIH, RIPL/R, RMEL/R/V, and URADL/DR/VL/VR. The partitions based on M8 and Medge provide two sets of nodes each. For the subsequent analysis, we consider the set with the largest number of overlapping nodes with Sbifan. Call these sets SM8 and Sedge. We also consider the cluster found by Infomap and the Louvain method with the largest overlap with Sbifan. Call these sets SI and SL. To compare the most similar clusters found by other methods to Sbifan, we look at two metrics. First, how many neurons in Sbifan are in a cluster found by existing methods (in other S40 1001011020.10.20.30.40.50.60.70.80.9Motif conductanceSets Sr words, the overlap). A cluster consisting of all nodes in the graph would trivially have 100% overlap with Sbifan but loses all precision in the cluster identification. Thus, we also consider the sizes of the clusters. These metrics are summarized as follows: Sbifan ∩ SM8 = 20, Sbifan ∩ Sedge = 20, Sbifan ∩ SL = 13, Sbifan ∩ SI = 19, SM8 = 68 Sedge = 64 SL = 27 SI = 114 We see that Sbifan is a subset of SM8 and Sedge and has substantial overlap with SI. However, Sbifan is by far the smallest of all of these sets. We conclude that existing methods do not capture the same information as motif Mbifan. To further investigate the structure found by existing methods, we show the clusters Sedge and SM8 in Figure S8. From the figure, we see that spectral clustering based on edges or motif M8 simply finds a spatially coherent cluster, rather than the control structure formed by the nodes in Sbifan. S41 Figure S8: Illustration of motif-based clusters with true two-dimensional spatial dimensions of the frontal neurons of C. elegans. A: The Mbifan-based cluster consists of the labeled dark blue nodes. B: Partitioning the graph based on motif M8, where the labeled dark blue nodes are the nodes on the side of the partition with largest overlap of the nodes in A. C: Partitioning the graph based on edges, where the labeled dark blue nodes are the nodes on the side of the partition with largest overlap of the nodes in A. Note that the partitions in Figures B and C capture the cluster in Figure A, but also contain many other nodes. Essentially, the partitions in B and C are just capturing spatial information. S42 S6 Details and comparison against existing methods for the transportation reachability network The nodes in the transportation reachability network are airports in the United States and Canada. There is an edge from city i to city j if the estimated travel time from i to j is less than some threshold (23). The network is not symmetric. The network with estimated travel times was downloaded from http://www.psi.toronto.edu/affinitypropagation/TravelRouting.mat and http://www.psi.toronto.edu/affinitypropagation/TravelRoutingCityNames. txt. We collected the latitude, longitude, and metropolitan populations of the cities using WolframAlpha and Wikipedia. All of the data is available on our project web page: http: //snap.stanford.edu/higher-order/. S6.1 Methods for spectral embeddings We compared the motif-based spectral embedding of the transportation reachability network to spectral embeddings from other connectivity matrices. For this analysis, we ignore the travel times times and only consider the topology of the network. The two-dimensional spectral em- bedding for a graph defined by a (weighted) adjacency matrix W ∈ Rn×n comes from Algo- rithm 2: 1. Form the normalized Laplacian L = I − D−1/2W D−1/2, where D is the diagonal degree matrix with Dii =(cid:80) j Wij. 2. Compute the first 3 eigenvectors z1, z2, z3 of smallest eigenvalues for L (z1 has the small- est eigenvalue). 3. Form the normalized matrix Y ∈ Rn×3 by Yij = zij/ ij. j=1 z2 (cid:113)(cid:80)3 S43 4. Define the primary and secondary spectral coordinates of node i to be Yi2 and Yi3, respec- tively. We consider the following three matrices W . 1. Motif: The sum of the motif adjacency matrix (Equation S20) for three different anchored motifs: B1 = 0 1 1 1 0 1 1 1 0  , B2 = 0 1 1 1 0 1 0 1 0  , B3 = 0 1 0 1 0 1 0 1 0  , A = {1, 3}. (S28) If S is the matrix of bidirectional links in the graph (Sij = 1 if and only if Aij = Aji = 1), then the motif adjacency matrix for these motifs is WM = S2. The resulting embedding is shown in Figure 4C of the main text. 2. Undirected: The adjacency matrix is formed by ignoring edge direction. This is the standard spectral embedding. The resulting embedding is shown in Figure 4D of the main text. 3. Undirected complement: The adjacency matrix is formed by taking the complement of the undirected adjacency matrix. This matrix tends to connect non-hubs to each other. The networks represented by each adjacency matrices are all connected. S6.2 Comparison of motif-based embedding to other embeddings We computed 99% confidence intervals for the Pearson correlation of the primary spectral co- ordinate with the metropolitan population of the city using the Pearson correlation coefficient. Table S7 lists the confidence intervals. (Since eigenvectors are only unique up to sign, the con- fidence intervals are symmetric about 0. We list the interval with the largest positive end point S44 Table S7: Summary of Pearson correlations for spectral embeddings of the transportation reach- ability network. We list the 99% confidence interval for the Pearson correlation coefficient. Embedding Motif Undirected Undirected complement Primary spectral coordinate and metropolitan population 99% confidence interval 0.43 ± 0.09 0.11 ± 0.12 0.31 ± 0.11 Secondary spectral coordinate and longitude 99% confidence interval 0.59 ± 0.08 0.39 ± 0.11 0.10 ± 0.12 under this permutation to be consistent across embeddings.) The motif-based primary spectral coordinate has the strongest correlation with the city populations. We repeated the computations for the correlation between the secondary spectral coordinate and the longitude of the city. Again, the motif-based clustering has the strongest correlation. Furthermore, the lower end of the confidence interval for the motif-based embedding was above the higher end of the confidence interval for the other three embeddings. Finally, in order to visualize these relationships, we computed Loess regressions of city metropolitan population and longitude against the primary and secondary spectral coordinates for each of the embeddings (Figure S9). The sign of the eigenvector used in each regression was chosen to match correlation shown in Figures 3C and 3D in the main text (primary spectral coordinate positively correlated with population and secondary spectral coordinate negatively correlated with longitude). The Loess regressions visualize the stronger correlation of the motif- based spectral coordinates with the metropolitan popuatlion and longitude. We conclude that the embedding provided by the motif adjacency matrix more strongly captures the hub nature of airports and West-East geography of the network. To gain further in- sight into the relationship of the primary spectral coordinate's relationship with the hub airports, we visualize the adjacency matrix in Figure S10, where the nodes are ordered by the spectral ordering. We see a clear relationship between the spectral ordering and the connectivity. S45 Figure S9: Loess regressions of city metropolitan population against the primary spectral co- ordinate (top) and longitude against secondary spectral coordinate (bottom) for the motif (left), undirected (middle), and undirected complement (right) adjacency matrices. Figure S10: Visualization of transportation reachability network. Nodes are ordered by the spectral ordering provided by the motif adjacency matrix. A black dot means no edge exists in the network. For the edges in the network, lighter colors mean longer estimated travel times. S46 S7 Additional case studies We next use motif-based clustering to analyze several additional networks. Our main goal is to show that motif-based clusters find markedly different structures in many real-world networks compared to edge-based clusters. For the case of a transcription regulation network of yeast, we also show that motif-based clustering more accurately finds known functional modules com- pared to existing methods. On the English Wikipedia article network and the Twitter network, we identify motifs that find anomalous clusters. On the Stanford web graph and in collabora- tion networks, we use motifs that have previously been studied in the literature and see how they reveal organizational structure in the networks. S7.1 Motif M6 in the Florida Bay food web We now apply the higher-order clustering framework on the Florida Bay ecosystem food web (64). The dataset was downloaded from http://vlado.fmf.uni-lj.si/pub/networks/ data/bio/foodweb/Florida.paj. In this network, the nodes are compartments (roughly, organisms and species) and the edges represent directed carbon exchange (in many cases, this means that species j eats species i). Motifs model energy flow patterns between several species. S7.1.1 Identifying higher-order modular organization In this case study, we use the framework to identify higher-order modular organization of net- works. We focus on three motifs: M5 corresponds to a hierarchical flow of energy where species i and j are energy sources (prey) for species k, and i is also an energy source for j; M6 models two species that prey on each other and then compete to feed on a common third species; and M8 describes a single species serving as an energy source for two non-interacting species. Mo- tif M5 is considered a building block for food webs (65, 66), and the prevalence of motif M6 is predicted by a certain niche model (67). S47 The framework reveals that low motif conductance (high-quality) clusters only exist for mo- tif M6 (motif conductance 0.12), whereas clusters based on motifs M5 or M8 have high motif conductance (see Figure S11). In fact, the motif Cheeger inequality (Theorem 6) guarantees that clustering based on motif M5 or M8 will always have larger motif conductance that cluster- ing based on M6. The inequality says that the motif conductance for any cluster in a connected motif adjacency matrix is at least half of the second smallest eigenvalue of the motif-normalized Laplacian. However, finding the cluster with optimal conductance is still computationally in- feasible in general (68). The lower bounds using the largest connected component of the motif adjacency matrix for motifs M5, M6, and M8 were 0.2195, 0.0335, and 0.2191, and the clusters found by the Algorithm 1 had motif conductances of 0.4414, 0.1200, and 0.4145. Thus, the cluster S found by the algorithm for M6 has smaller motif M6-conductance (0.12) than any possible cluster's motif-M5 or motif-M8 conductance. To state this formally, let C be the cluster found by the algorithm for motif M6 and let HM be the largest connected component of motif adjacency matrix for motif M. Then φM6(HM6, C) ≤ min (cid:110) min S φM5(HM5, S), min S φM8(HM8, S) (cid:111) . (S29) This means that, in terms of motif conductance, any cluster based on motifs M5 or M8 is worse than the cluser found by the algorithm in Theorem 6 for motif M6. We note that the same conclusions hold for edge-based clustering. For motif Medge, the lower bound on conductance was 0.2194 and the cluster found by the algorithm had conductance 0.4083. S7.1.2 Analysis of higher-order modular organization Subsequently, we used motif M6 to cluster the food web, revealing four clusters (Figure S11). Three represent well-known aquatic layers: (i) the pelagic system; (ii) the benthic predators of eels, toadfish, and crabs; (iii) the sea-floor ecosystem of macroinvertebrates. The fourth S48 cluster identifies microfauna supported by particulate organic carbon in water and free bacteria. Table S9 lists the nodes in each cluster. We also measured how well the motif-based clusters correlate to known ground truth system subgroup classifications of the nodes (64). These classes are microbial, zooplankton, and sedi- ment organism microfauna; detritus; pelagic, demersal, and benthic fishes; demseral, seagrass, and algae producers; and macroinvertebrates (Table S9).2 We also consider a set of labels which does not include the subclassification for microfauna and producers. In this case, the labels are microfauna; detritus; pelagic, demersal, and benthic fishes; producers; and macroinvertebrates. To quantify how well the clusters found by motif-based clustering reflect the ground truth labels, we used several standard evaluation criteria: adjusted rand index, F1 score, normal- ized mutual information, and purity (69). We compared these results to the clusters of several methods using the same evaluation criteria. In total, we evaluated six methods: 1. Motif-based clustering with the embedding + k-means algorithm (Algorithm 2) with 500 iterations of k-means. 2. Motif-based clustering with recursive bi-partitioning (repeated application of Algorithm 1 on the largest remaining compoennt). The process continues to cut the largest cluster until there are 4 total. 3. Edge-based clustering with the embedding + k-means algorithm, again with 500 iterations of k-means. 4. Edge-based clustering with recursive bi-partitioning with the same partitioning process. 5. The Infomap algorithm. 2The classifications are also available on our project web page: http://snap.stanford.edu/ higher-order/. S49 6. The Louvain method. For the first four algorithms, we control the number of clusters, which we set to 4. For the last two algorithms, we cannot control the number of clusters. However, both methods found 4 clusters. Table S10 shows that the motif-based clustering by embedding + k-means had the best performance for each classification criterion on both classifications. We conclude that the or- ganization of compartments in the Florida Bay foodweb are better described motif M6 than by edges. S7.1.3 Connected components of the motif adjacency matrices Finally, we discuss the discuss the preprocessing step of our method, where we compute com- puted connected components of the motif adjacency matrices. The original network has 128 nodes and 2106 edges. The largest connected component of the motif adjacency matrix for mo- tif M5 contains 127 of the 128 nodes. The node corresponding to the compartment of "roots" is the only node not in the largest connected component. The two largest connected compo- nents of the motif adjacency matrix for motif M6 contain 12 and 50 nodes. The remaining 66 nodes are isolated. Table S8 lists the nodes in each component. We note that the group of 12 nodes corresponds to the green cluster in Figure S11. The motif adjacency matrix for M8 is connected. The original network is weakly connected, so the motif adjacency matrix for Medge is also connected. S50 Figure S11: Higher-order organization of the Florida Bay food web. A: Sweep profile plot (φ(G) M (S) as a function of S from the sweep in Algorithm 1) for different motifs on the Florida Bay ecosystem food web (64). A priori it is not clear whether the network is organized based on a given motif. For example, motifs M5 (green) and M8 (blue) do not reveal any higher-order organization (motif conductance has high values). However, the downward spikes of the red curve show that M6 reveals rich higher-order modular structure (7). Ecologically, motif M6 corresponds to two species mutually feeding on each other and also preying on a common third species. B: Clustering of the food web based on motif M6. (For illustration, edges not participating in at least one instance of the motif are omitted.) The clustering reveals three known aquatic layers: pelagic fishes (yellow), benthic fishes and crabs (red), and sea-floor macroinvertebrates (blue) as well as a cluster of microfauna and detritus (green). Our framework identifies these modules with higher accuracy (61%) than existing methods (48–53%). C: A higher-order cluster (yellow nodes in (B)) shows how motif M6 occurs in the pelagic layer. The needlefish and other pelagic fishes eat each other while several other fishes are prey for these two species. D: Another higher-order cluster (green nodes in (B)) shows how motif M6 occurs between microorganisms. Here, several microfauna decompose into Particulate Organic Carbon in the water (water POC) but also consume water POC. Free bacteria serves as an energy source for both the microfauna and water POC. S51 Table S8: Connected components of the Florida Bay foodweb motif adjacency matrix for motif M6. There are 50 nodes in component 1, 12 nodes in component 2, and 66 isolated nodes. Two largest components Compartment (node) Benthic Phytoplankton Thalassia Halodule Syringodium Drift Algae Epiphytes Predatory Gastropods Detritivorous Polychaetes Predatory Polychaetes Suspension Feeding Polych Macrobenthos Benthic Crustaceans Detritivorous Amphipods Herbivorous Amphipods Isopods Herbivorous Shrimp Predatory Shrimp Pink Shrimp Benthic Flagellates Benthic Ciliates Meiofauna Other Cnidaridae Silverside Echinoderma Bivalves Detritivorous Gastropods Detritivorous Crabs Omnivorous Crabs Predatory Crabs Callinectes sapidus (blue crab) Mullet Blennies Code Goby Clown Goby Flatfish Sardines Anchovy Bay Anchovy Lizardfish Catfish Eels Toadfish Brotalus Halfbeaks Needlefish Goldspotted killifish Rainwater killifish Other Pelagic Fishes Other Demersal Fishes Benthic Particulate Organic Carbon (Benthic POC) Free Bacteria Water Flagellates Water Cilitaes Acartia Tonsa Oithona nana Paracalanus Other Copepoda Meroplankton Other Zooplankton Sponges Water Particulate Organic Carbon (Water POC) Input Component index 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 2 2 2 S52 Isolated nodes Compartment (node) Barracuda 2 µm Spherical Phytoplankt Synedococcus Oscillatoria Small Diatoms (<20 µm) Big Diatoms (>20 µm) Dinoflagellates Other Phytoplankton Roots Coral Epiphytic Gastropods Thor Floridanus Lobster Stone Crab Sharks Rays Tarpon Bonefish Other Killifish Snook Sailfin Molly Hawksbill Turtle Dolphin Other Horsefish Gulf Pipefish Dwarf Seahorse Grouper Jacks Pompano Other Snapper Gray Snapper Mojarra Grunt Porgy Pinfish Scianids Spotted Seatrout Red Drum Spadefish Parrotfish Mackerel Filefishes Puffer Loon Greeb Pelican Comorant Big Herons and Egrets Small Herons and Egrets Ibis Roseate Spoonbill Herbivorous Ducks Omnivorous Ducks Predatory Ducks Raptors Gruiformes Small Shorebirds Gulls and Terns Kingfisher Crocodiles Loggerhead Turtle Green Turtle Manatee Dissolved Organic Carbon (DOC) Output Respiration Table S9: Ecological classification of nodes in the Florida Bay foodweb. Colors correspond to the colors in the clustering of Figure S11. Classification 1 Compartment (node) Microbial microfauna Free Bacteria Microbial microfauna Water Flagellates Microbial microfauna Water Cilitaes Zooplankton microfauna Acartia Tonsa Zooplankton microfauna Oithona nana Zooplankton microfauna Paracalanus Zooplankton microfauna Other Copepoda Zooplankton microfauna Meroplankton Zooplankton microfauna Other Zooplankton Macroinvertebrates Sponges Detritus Water POC Detritus Input Pelagic Fishes Sardines Pelagic Fishes Anchovy Pelagic Fishes Bay Anchovy Pelagic Fishes Halfbeaks Pelagic Fishes Needlefish Fishes Demersal Goldspotted killifish Fishes Demersal Rainwater killifish Pelagic Fishes Silverside Pelagic Fishes Other Pelagic Fishes Macroinvertebrates Detritivorous Crabs Macroinvertebrates Predatory Crabs Macroinvertebrates Callinectus sapidus Benthic Fishes Lizardfish Fishes Demersal Eels Benthic Fishes Code Goby Benthic Fishes Clown Goby Macroinvertebrates Herbivorous Shrimp Producer Demersal Benthic Phytoplankton Producer Seagrass Thalassia Producer Seagrass Halodule Producer Seagrass Syringodium Producer Algae Drift Algae Producer Algae Epiphytes Sediment Organism microfauna Microfauna Benthic Flagellates Sediment Organism microfauna Microfauna Benthic Ciliates Sediment Organism microfauna Microfauna Meiofauna Macroinvertebrates Other Cnidaridae Macroinvertebrates Echinoderma Macroinvertebrates Bivalves Macroinvertebrates Detritivorous Gastropods Predatory Gastropods Macroinvertebrates Detritivorous Polychaetes Macroinvertebrates Predatory Polychaetes Macroinvertebrates Suspension Feeding Polych Macroinvertebrates Macroinvertebrates Macrobenthos Benthic Crustaceans Macroinvertebrates Macroinvertebrates Detritivorous Amphipods Macroinvertebrates Herbivorous Amphipods Macroinvertebrates Isopods Macroinvertebrates Predatory Shrimp Pink Shrimp Macroinvertebrates Macroinvertebrates Omnivorous Crabs Benthic Fishes Catfish Pelagic Fishes Mullet Detritus Benthic POC Benthic Fishes Toadfish Brotalus Fishes Demersal Benthic Fishes Blennies Benthic Fishes Flatfish Other Demersal Fishes Fishes Demersal Assignment Classification 2 Green Microfauna Green Microfauna Green Microfauna Green Microfauna Green Microfauna Green Microfauna Green Microfauna Green Microfauna Microfauna Green Macroinvertebrates Green Green Detritus Green Detritus Yellow Pelagic Fishes Pelagic Fishes Yellow Yellow Pelagic Fishes Yellow Pelagic Fishes Yellow Pelagic Fishes Yellow Fishes Demersal Yellow Fishes Demersal Pelagic Fishes Yellow Pelagic Fishes Yellow Macroinvertebrates Red Macroinvertebrates Red Macroinvertebrates Red Benthic Fishes Red Red Fishes Demersal Red Benthic Fishes Benthic Fishes Red Macroinvertebrates Red Blue Producer Producer Blue Blue Producer Blue Producer Blue Producer Blue Producer Blue Blue Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Macroinvertebrates Blue Blue Benthic Fishes Blue Pelagic Fishes Blue Detritus Blue Benthic Fishes Fishes Demersal Blue Blue Benthic Fishes Blue Benthic Fishes Fishes Demersal Blue S53 Table S10: Comparison of motif-based algorithms against other methods in finding ground truth structure in the Florida Bay food web (64). Performance for identifying the two classifications provided in Table S9 was evaluated based on Adjusted Rand Index (ARI), F1 score, Normalized Mutual Information (NMI), and Purity. In all cases, the motif-based methods have the best performance. Evaluation Motif embedding Motif recursive Edge embedding Edge recursive bi-partitioning bi-partitioning + k-means + k-means 1 n o i t a c fi i s s a l C 2 n o i t a c fi i s s a l C ARI F1 NMI Purity ARI F1 NMI Purity 0.3005 0.4437 0.5040 0.5645 0.3265 0.4802 0.4822 0.6129 0.2156 0.3853 0.4468 0.5323 0.2356 0.4214 0.4185 0.5806 0.1564 0.3180 0.4112 0.4032 0.1814 0.3550 0.3533 0.4839 0.1226 0.2888 0.3879 0.4194 0.1190 0.3035 0.3034 0.4355 Infomap Louvain 0.1423 0.3100 0.4035 0.4194 0.1592 0.3416 0.3471 0.4677 0.2207 0.4068 0.4220 0.5323 0.2207 0.4068 0.4220 0.5323 S7.2 Coherent feedforward loops in the S. cerevisiae transcriptional reg- ulation network In this network, each node is an operon (a group of genes in a mRNA molecule), and a directed edge from operon i to operon j means that i is regulated by a transcriptional factor encoded by j (29). Edges are directed and signed. A positive sign represents activation and a negative sign represents repression. The network data was downloaded from http://www.weizmann. ac.il/mcb/UriAlon/sites/mcb.UriAlon/files/uploads/NMpaper/yeastdata. mat and http://www.weizmann.ac.il/mcb/UriAlon/sites/mcb.UriAlon/files/ uploads/DownloadableData/list_of_ffls.pdf. For this case study, we examine the coherent feedforward loop motif (see Figure S12), which act as sign-sensitive delay elements in transcriptional regulation networks (2, 9). Formally, the feedforward loop is represented by the following signed motifs 0 + + 0 0 + 0 0 0  , B2 = 0 − − 0 0 + 0 0 0  , B3 = 0 + − 0 0 − 0 0 0  , B4 = 0 − + 0 0 − 0 0 0  . (S30) B1 = S54 Table S11: Connected components of size greater than one for the motif adjacency matrix in the S. cerevisiae network for the coherent feedforward loop. Size 18 9 9 6 6 5 3 3 3 operons ALPHA1, CLN1, CLN2, GAL11, HO, MCM1, MFALPHA1, PHO5, SIN3, SPT16, STA1, STA2, STE3, STE6, SWI1, SWI4/SWI6, TUP1, SNF2/SWI1 HXT11, HXT9, IPT1, PDR1, PDR3, PDR5, SNQ2, YOR1, YRR1 GCN4, ILV1, ILV2, ILV5, LEU3, LEU4, MET16, MET17, MET4 CHO1, CHO2, INO2, INO2/INO4, OPI3, UME6 DAL80, DAL80/GZF3, GAP1, GAT1, GLN1, GLN3 CYC1, GAL1, GAL4, MIG1, HAP2/3/4/5 ADH2, CCR4, SPT6 CDC19, RAP1, REB1 DIT1, IME1, RIM101 These motifs have the same edge pattern and only differ in sign. All of the motifs are simple (A = {1, 2, 3}). For our analysis, we consider all coherent feedforward loops that are subgraphs on the induced subgraph of any three nodes. However, there is only one instance where the coherent feedforward loop itself is a subgraph but not an induced subgraph on three nodes. Specifically, the induced subgraph by DAL80, GAT1, and GLN3 contains a bi-directional edge between DAL80 and GAT1, unidirectional edges from DAL80 and GAT1 to GLN3. S7.2.1 Connected components of the adjacency matrices Again, we analyze the component structure of the motif adjacency matrix as a pre-processing step. The original network consists of 690 nodes and 1082 edges, and its largest weakly con- nected component consists of 664 nodes and 1066 edges. Every coherent feedforward loop in the network resides in the largest weakly connected component, so we subsequently consider this sub-network in the following analysis. Of the 664 nodes in the network, only 62 participate in a coherent feedforward loop. Forming the motif adjacency matrix results in nine connected components, of sizes 18, 9, 9, 6, 6, 5, 3, 3, and 3. The operons for the connected components consisting of more than one node is listed in Table S11. S55 S7.2.2 Comparison against existing methods We note that, although the original network is connected, the motif adjacency matrix corre- sponds to a disconnected graph. This already reveals much of the structure in the network (Figure S12). Indeed, this "shattering" of the graph into components for the feedforward loop has previously been observed in transcriptional regulation networks (70). We additionally used Algorithm 1 to partition the largest connected component of the motif adjacency matrix (con- sisting of 18 nodes). This revealed the cluster {CLN2, CLN1, SWI4/SWI6, SPT16, HO}, which contains three coherent feedforward loops (Figure S12). All three instances of the motif cor- respond to the function "cell cycle and mating type switch". The motifs in this cluster are the only feedforward loops for which the function is described in Reference (9). Using the same procedure on the undirected version of the induced subgraph of the 18 nodes (i.e., using mo- tif Medge) results in the cluster {CLN1, CLN2, SPT16, SWI4/SWI6 }. This cluster breaks the coherent feedforward loop formed by HO, SWI4/SWI6, and SPT16. We also evaluated our method based on the classification of motif functionality (9).3 In total, there are 12 different functionalities and 29 instances of labeled coherent feedforward loops. We considered the motif-based clustering of the graph to be the connected components of the motif adjacency matrix with the additional partition of the largest connected component. To form an edge-based clustering, we used the embedding + k-means algorithm on the undirected graph (i.e., motif Medge) with k = 12 clusters. We also clustered the graph using Infomap and the Louvain method. Table S12 summarizes the results. We see that the motif-based clustering coherently labels all 29 motifs in the sense that the three nodes in every instance of a labeled motif is placed in the same cluster. The edge-based spectral, Infomap, and Louvain clustering coherently labeled 25, 23, and 23 motifs, respectively. 3The functionalities may be downloaded from our project web page: http://snap.stanford.edu/ higher-order/. S56 We measured the accuracy of each clustering method as the rand index (69) on the coher- ently labeled motifs, multiplied by the fraction of coherently labeled motifs. The motif-based clustering had the highest accuracy. We conclude that motif-based clustering provides an advan- tage over edge-based clustering methods in identifying functionalities of coherent feedforward loops in the the S. cerevisiae transcriptional regulation network. S57 Figure S12: Higher-order organization of the S. cerevisiae transcriptional regulation network. A: The four higher-order structures used by our higher-order clustering method, which can model signed motifs. These are coherent feedfoward loop motifs, which act as sign-sensitive delay elements in transcriptional regulation networks (2). The edge signs refer to activation (positive) or repression (negative). B: Six higher-order clusters revealed by the motifs in (A). Clusters show functional modules consisting of several motifs (coherent feedforward loops), which were previously studied individually (9). The higher-order clustering framework identi- fies the functional modules with higher accuracy (97%) than existing methods (68–82%). C–D: Two higher-order clusters from (B). In these clusters, all edges have positive sign. The func- tionality of the motifs in the modules correspond to drug resistance (C) or cell cycle and mating type match (D). The clustering suggests that coherent feedforward loops function together as a single processing unit rather than as independent elements. S58 Table S12: Classification of coherent feedforward loop motifs by several clustering methods. In a given motif instance, we say that it is coherently labeled if the nodes comprising the motif are in the same cluster. If a motif is not coherently labeled, a "-1" is listed. The accuracy is the rand index on the labels and motif functionality on coherently labeled motifs, multiplied by the fraction of coherently labeled motifs. Motif nodes Function Motif-based Edge-based Infomap Louvain Class label pheromone response Metionine biosynthesis Metionine biosynthesis Leucine and branched amino acid biosynthesis Leucine and branched amino acid biosynthesis Leucine and branched amino acid biosynthesis Leucine and branched amino acid biosynthesis Nitrogen utilization Nitrogen utilization GAL11 ALPHA1 GCN4 GCN4 GCN4 GCN4 GCN4 GCN4 GLN3 GLN3 GLN3 GLN3 MIG1 MIG1 PDR1 PDR1 PDR1 PDR1 PDR1 PDR1 PDR1 PDR1 RIM101 SPT16 SPT16 SPT16 TUP1 UME6 UME6 UME6 MFALPHA1 MET16 MET4 MET17 MET4 ILV1 LEU3 ILV2 LEU3 ILV5 LEU3 LEU4 LEU3 GAP1 GAT1 DAL80 GAT1 DAL80/GZF3 Glutamate synthetase GAT1 Glutamate synthetase GAT1 GLN1 formation of apocytochromes HAP2/3/4/5 CYC1 Galactokinase GAL1 GAL4 Drug resistance SNQ2 YRR1 Drug resistance YOR1 YRR1 PDR3 HXT11 Drug resistance Drug resistance HXT9 PDR3 Drug resistance PDR5 PDR3 Drug resistance IPT1 PDR3 Drug resistance SNQ2 PDR3 Drug resistance PDR3 YOR1 IME1 DIT1 sporulation-specific Cell cycle and mating type switch SWI4/SWI6 CLN1 Cell cycle and mating type switch SWI4/SWI6 CLN2 SWI4/SWI6 HO Cell cycle and mating type switch ALPHA1 INO2/INO4 CHO1 INO2/INO4 CHO2 INO2/INO4 OPI3 MFALPHA1 Mating factor alpha Phospholipid biosynthesis Phospholipid biosynthesis Phospholipid biosynthesis 1 2 2 2 2 2 2 3 3 3 3 4 4 5 5 5 5 5 5 5 5 6 7 7 7 1 8 8 8 1 2 2 2 2 2 2 3 3 3 3 4 -1 5 5 5 5 5 5 5 5 6 -1 -1 -1 1 6 6 6 -1 1 1 1 1 1 1 1 1 1 1 -1 -1 2 2 2 2 2 2 2 2 3 4 -1 -1 -1 5 5 5 -1 -1 -1 1 1 1 1 2 2 2 2 -1 -1 3 3 3 3 3 3 3 3 4 5 5 -1 5 4 4 4 Frac. coherently labeled Accuracy 29 / 29 0.97 25 / 29 0.82 23 / 29 0.68 23 / 29 0.76 S7.3 Motif M6 in the English Wikipedia article network The English Wikipedia network (57–59) consists of 4.21 million nodes (representing articles) and 101.31 million edges, where an edge from node i to node j means that there is a hyperlink from the ith article to the jth article. The network data was downloaded from http://law. di.unimi.it/webdata/enwiki-2013/. We used Algorithm 1 to find a motif-based cluster for motif M6 and Medge (the algorithm was run on the largest connected component of the motif adjacency matrix). The clusters are shown in Figure S13. The nodes in the motif-based cluster are cities and barangays (small S59 administrative divisions) in the Philippines. The cluster has a set of nodes with many outgoing links that form the source node in motif M6. In total, the cluster consists of 22 nodes and 338 edges. The linking pattern appears anomalous and suggests that perhaps the pages uplinking should receive reciprocated links. On the other hand, the edge-based cluster is much larger cluster and does not have too much structure. The cluster consists of several high-degree nodes and their neighbors. S60 Figure S13: Clusters from the English Wikipedia hyperlink network (57–59). A–C: Motif- based cluster (A) for motif M6 (B). The cluster consists of cities and small administrative di- visions in the Philippines. The green nodes have many bi-direction links with each other and many incoming links from orange nodes at the bottom of the figure. The spy plot illustrates this network structure (C). D–F: Cluster (D) for undirected edges (E). The cluster has a few very high-degree nodes, as evidenced by the spy plot (F). S61 S7.4 Motif M6 in the Twitter follower network We also analyzed the complete 2010 Twitter follower graph (58, 59, 71). The graph consists 41.65 million nodes (users) and 1.47 billion edges, where an edge from node i to node j signifies that user i is followed by user j on the social network. The network data was downloaded from http://law.di.unimi.it/webdata/twitter-2010/. We used Algorithm 1 to find a motif-based cluster for motif M6 (the algorithm was run on the largest connected component of the motif adjacency matrix). The cluster contains 151 nodes and consists of two disconnected components. Here, we consider the smaller of the two components, which consists of 38 nodes. We also found an edge-based cluster on the undirected graph (using Algorithm 1 with motif Medge). This cluster consists of 44 nodes. Figure S14 illustrates the motif-based and edge-based clusters. Both clusters capture anoma- lies in the graph. The motif-based cluster consists of holding accounts for a photography com- pany. The nodes that form bi-directional links have completed profiles (contain a profile pic- ture) while several nodes with incomplete profiles (without a profile picture) are followed by the completed accounts. The edge-based cluster is a near clique, where the user screen names all begin with "LC ". We suspect that the similar usernames are either true social communities, holding accounts, or bots. (For the most part, their tweets are protected, so we could not verify if any of these scenarios are true). Interestingly, both M6 and Medge find anomalous clusters. However, their structures are quite different. We conclude that M6 can lead to the detection of new anomalous clusters in social networks. S62 Figure S14: Clusters in the 2010 Twitter follower network (58, 59, 71). A–C: Motif-based cluster (A) for motif M6 (B). All accounts are holding accounts for a photography company. The green nodes correspond to accounts that have completed profiles, while the orange accounts have incomplete profiles. The spy plot illustrates how the cluster is formed around this motif (C). D–F: Cluster (D) for edge-based clustering (E). The cluster consists of a near-clique (F) where all users have the prefix "LC ". S63 S7.5 Motif M7 in the Stanford web graph The Stanford web graph (7, 56) consists of 281,903 nodes and 2,312,497 edges, where an edge from node i to node j means that there is a hyperlink from the ith web page to the jth web page. Here, all of the web pages come from the Stanford domain. The network data was downloaded from http://snap.stanford.edu/data/web-Stanford.html. We used Algorithm 1 to find a motif-based cluster for motif M7, a motif that is over- expressed in web graphs (1). An illustration of the cluster and an edge-based cluster (i.e., using Algorithm 1 with Medge) are in Figure S15. Interestingly, both clusters exhibits a core- periphery structure, albeit markedly different ones. The motif-based cluster contains several core nodes with large in-degree. Such core nodes comprise the sink node in motif M7. On the periphery are several clusters within which are many bi-directional links (as illustrated by the spy plot in Figure S15). The nodes in these clusters then up-link to the core nodes. This type of organizational unit suggests an explanation for why motif M7 is over-expressed: clusters of similar pages tend to uplink to more central pages. The edge-based cluster also has a few nodes with large in-degree, serving as a small core. On the periphery are the neighbors of these nodes, which themselves tend not to be connected (as illustrated by the spy plot). S64 Figure S15: Clusters in the Stanford web graph (7). A–C: Motif-based cluster (A) for motif M7 (B). The cluster has a core group of nodes with many incoming links (serving as the sink node in M7; shown in orange) and several periphery groups that are tied together (the bi-directional link in M7; shown in green) and also up-link to the core. This is evident from the spy plot (C). D–F: Cluster (C) for undirected edges (B). The cluster contains a few high-degree nodes and their neighbors, and the neighbors tend to not be connected, as illustrated by the splot (F). S65 S7.6 Semi-cliques in collaboration networks We used Algorithm 1 to identify clusters of a four-node motif (the semi-clique) that has been studied in conjunction with researcher productivity in collaboration networks (72) (see Fig- ure S16). We found a motif-based cluster in two different collaboration networks. Each one is derived from co-authorship in papers submitted to the arXiv under a certain category; here, we analyze the "High Energy Physics–Theory" (HepTh) and "Condensed Matter Physics" (Cond- Mat) categories (56,73). The HepTh network has 23,133 nodes and 93,497 edges and the Cond- Mat network has 9,877 nodes and 25,998 edges. The HepTh network data was downloaded from http://snap.stanford.edu/data/ca-HepTh.html and the CondMat net- work data was downloaded from http://snap.stanford.edu/data/ca-CondMat. html. Figure S16 shows the two clusters for each of the collaboration networks. In both networks, the motif-based cluster consists of a core group of nodes and similarly-sized groups on the periphery. The core group of nodes correspond to the nodes of degree 3 in the motif and the pe- riphery group nodes correspond to the nodes of degree 2. One explanation for this organization is that there is a small small group of authors that writes papers with different research groups. Alternatively, the co-authorship could come from a single research group, where senior authors are included on all of the papers and junior authors on a subset of the papers. On the other hand, the edge-based clusters (i.e., result of Algorithm 1 for Medge) are a clique in the HepTh netowork and a clique with a few dangling nodes in the CondMat network. The dense clusters are quite different from the sparser clusters based on the semi-clique. Such dense clusters are not that surprising. For example, a clique could arise from a single paper published by a group of authors. S66 Figure S16: Clusters in co-authorship networks (73). A–E: Best motif-based cluster for the semi-clique motif (E) in the High Energy Physics–Theory collaboration network (A) and the Condensed Matter Physics collaboration network (C). Corresponding spy plots are shown in (B) and (D). F–I: Best edge-based (I) cluster in the High Energy Physics–Theory collaboration network (F) and the Condensed Matter Physics collaboration network (H). Corresponding spy plots are shown in (G) and (I). S67 S8 Data availability All data is available at our project web site at http://snap.stanford.edu/higher-order/. The web site includes links to datasets used for experiments throughout the supplementary ma- terial (7, 56, 58–60, 74–83). S68 References and Notes 1. R. Milo, et al., Science 298, 824 (2002). 2. S. Mangan, A. Zaslaver, U. Alon, Journal of molecular biology 334, 197 (2003). 3. J. Yang, J. Leskovec, Proceedings of the IEEE 102, 1892 (2014). 4. P. W. Holland, S. Leinhardt, American Journal of Sociology pp. 492–513 (1970). 5. M. Rosvall, A. V. Esquivel, A. Lancichinetti, J. D. West, R. Lambiotte, Nature communi- cations 5 (2014). 6. N. Przulj, D. G. Corneil, I. Jurisica, Bioinformatics 20, 3508 (2004). 7. J. Leskovec, K. J. Lang, A. Dasgupta, M. W. Mahoney, Internet Mathematics 6, 29 (2009). 8. O. N. Yaveroglu, et al., Scientific reports 4 (2014). 9. S. Mangan, U. Alon, Proceedings of the National Academy of Sciences 100, 11980 (2003). 10. C. J. Honey, R. Kotter, M. Breakspear, O. Sporns, Proceedings of the National Academy of Sciences 104, 10240 (2007). 11. S. E. Schaeffer, Computer Science Review 1, 27 (2007). 12. Minimizing φM (S) is NP-hard, which follows from the NP-hardness of the traditional def- inition of conductance (68). 13. See the Supplementary Material. 4(cid:112)φ∗ 14. Formally, when the motif has three nodes, the selected cluster S satisfies φM (S) ≤ M is the smallest motif conductance of any possible node set S. M ≤ 1, where φ∗ This inequality is proved in the Supplementary Material. S69 agonal matrix with the row-sums of WM on the diagonal (Dii =(cid:80) 15. The normalized motif Laplacian matrix is LM = D−1/2(D − WM )D−1/2, where D is a di- j(WM )ij), and D−1/2 is −1/2 the same matrix with the inverse square-roots on the diagonal (D j(WM )ij). ii = 1/ The spectral ordering σ is the by-value ordering of D−1/2z, where z is the eigenvector cor- responding to the second smallest eigenvalue of LM, i.e., σi is the index of D−1/2z with the ith smallest value. (cid:113)(cid:80) 16. C. Seshadhri, A. Pinar, T. G. Kolda, Statistical Analysis and Data Mining: The ASA Data Science Journal 7, 294 (2014). 17. R. Andersen, F. Chung, K. Lang, Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (2006), pp. 475–486. 18. J. J. Whang, I. S. Dhillon, D. F. Gleich, SIAM Data Mining (2015). 19. A. Y. Ng, M. I. Jordan, Y. Weiss, Advances in Neural Information Processing Systems 14 (2002), pp. 849–856. 20. D. Boley, Data Mining and Knowledge Discovery 2, 325 (1998). 21. D. L. Riddle, T. Blumenthal, B. J. Meyer, et al., eds., C. elegans II (Cold Spring Harbor Laboratory Press, 1997), second edn. 22. H. Lee, et al., Nature neuroscience 15, 107 (2012). 23. B. J. Frey, D. Dueck, Science 315, 972 (2007). 24. B. Serrour, A. Arenas, S. G´omez, Computer Communications 34, 629 (2011). 25. T. Michoel, A. Joshi, B. Nachtergaele, Y. Van de Peer, Molecular BioSystems 7, 2769 (2011). S70 26. A. R. Benson, D. F. Gleich, J. Leskovec, SIAM Data Mining (2015). 27. F. Krzakala, et al., Proceedings of the National Academy of Sciences 110, 20935 (2013). 28. M. Kaiser, C. C. Hilgetag, PLoS Computational Biology 2, e95 (2006). 29. U. Alon, Nature Reviews Genetics 8, 450 (2007). 30. O. Sporns, R. Kotter, PLoS Biology 2, e369 (2004). 31. A. Inokuchi, T. Washio, H. Motoda, Principles of Data Mining and Knowledge Discovery (Springer, 2000), pp. 13–23. 32. F. R. Chung, Proceedings of ICCM (Citeseer, 2007), vol. 2, p. 378. 33. J. R. Lee, S. O. Gharan, L. Trevisan, Journal of the ACM 61, 37 (2014). 34. F. Chung, Annals of Combinatorics 9, 1 (2005). 35. D. Boley, G. Ranjan, Z.-L. Zhang, Linear Algebra and its Applications 435, 224 (2011). 36. F. D. Malliaros, M. Vazirgiannis, Physics Reports 533, 95 (2013). 37. G. Karypis, R. Aggarwal, V. Kumar, S. Shekhar, Very Large Scale Integration (VLSI) Sys- tems, IEEE Transactions on 7, 69 (1999). 38. S. Agarwal, K. Branson, S. Belongie, Proceedings of the 23rd International Conference on Machine Learning (ACM, 2006), pp. 17–24. 39. D. Zhou, J. Huang, B. Scholkopf, Advances in Neural Information Processing Systems 19 (MIT Press, 2006), pp. 1601–1608. 40. J. Rodr´ıguez, Linear and Multilinear Algebra 50, 1 (2002). S71 41. L. Trevisan, Lecture notes on expansion, sparsest cut, and spectral graph theory, http:// www.eecs.berkeley.edu/luca/books/expanders.pdf. Accessed June 28, 2015. 42. S. Demeyer, et al., PloS ONE 8, e61183 (2013). 43. M. Houbraken, et al., PLoS ONE 9, e97896 (2014). 44. S. Wernicke, IEEE/ACM Transactions on Computational Biology and Bioinformatics 3, 347 (2006). 45. S. Wernicke, F. Rasche, Bioinformatics 22, 1152 (2006). 46. C. R. Aberger, A. Notzli, K. Olukotun, C. R´e, arXiv preprint arXiv:1503.02368 (2015). 47. M. Latapy, Theoretical Computer Science 407, 458 (2008). 48. J. W. Berry, et al., Proceedings of the 5th Conference on Innovations in Theoretical Com- puter Science (ACM, New York, NY, USA, 2014), pp. 225–234. 49. D. Marcus, Y. Shavitt, IEEE 30th International Conference on Distributed Computing Sys- tems Workshops (2010), pp. 92–98. 50. N. Chiba, T. Nishizeki, SIAM Journal on Computing 14, 210 (1985). 51. T. Schank, D. Wagner, Experimental and Efficient Algorithms (Springer, 2005), pp. 606– 609. 52. L. Becchetti, P. Boldi, C. Castillo, A. Gionis, Proceedings of the 14th ACM SIGKDD inter- national conference on Knowledge discovery and data mining (ACM, 2008), pp. 16–24. 53. J. Cohen, Computing in Science & Engineering 11, 29 (2009). S72 54. B. N. Parlett, The Symmetric Eigenvalue Problem, vol. 7 (SIAM, 1980). 55. K. J. Maschhoff, D. C. Sorensen, Applied Parallel Computing Industrial Computation and Optimization (Springer, 1996), pp. 478–486. 56. J. Leskovec, A. Krevl, SNAP Datasets: Stanford large network dataset collection, http: //snap.stanford.edu/data (2014). 57. P. Boldi, B. Codenotti, M. Santini, S. Vigna, Software: Practice and Experience 34, 711 (2004). 58. P. Boldi, S. Vigna, Proceedings of the 13th International Conference on World Wide Web (ACM, 2004), pp. 595–602. 59. P. Boldi, M. Rosa, M. Santini, S. Vigna, Proceedings of the 20th International Conference on World Wide Web (ACM, 2011), pp. 587–596. 60. P. Boldi, A. Marino, M. Santini, S. Vigna, Proceedings of the companion publication of the 23rd international conference on World wide web companion (International World Wide Web Conferences Steering Committee, 2014), pp. 227–228. 61. A. Azad, A. Buluc¸, J. R. Gilbert, Proceedings of the IPDPSW, Workshop on Graph Algo- rithm Building Blocks (GABB) (2015), pp. 804–811. 62. M. Rosvall, C. T. Bergstrom, Proceedings of the National Academy of Sciences 105, 1118 (2008). 63. V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Journal of statistical mechanics: theory and experiment 2008, P10008 (2008). S73 64. R. E. Ulanowicz, C. Bondavalli, M. S. Egnotovich, Trophic Dynamics in South Florida Ecosystem, FY 97: The Florida Bay Ecosystem, Tech. Rep. CBL 98-123, Chesapeake Bio- logical Laboratory, Solomons, MD (1998). 65. J. Bascompte, C. J. Meli´an, E. Sala, Proceedings of the National Academy of Sciences of the United States of America 102, 5443 (2005). 66. J. Bascompte, et al., Science 325, 416 (2009). 67. D. B. Stouffer, J. Camacho, W. Jiang, L. A. N. Amaral, Proceedings of the Royal Society of London B: Biological Sciences 274, 1931 (2007). 68. D. Wagner, F. Wagner, Proceedings of the 18th International Symposium on Mathematical Foundations of Computer Science (1993), pp. 744–750. 69. C. D. Manning, P. Raghavan, H. Schutze, et al., Introduction to Information Retrieval, vol. 1 (Cambridge university press Cambridge, 2008). 70. R. Dobrin, Q. K. Beg, A.-L. Barab´asi, Z. N. Oltvai, BMC bioinformatics 5, 10 (2004). 71. H. Kwak, C. Lee, H. Park, S. Moon, Proceedings of the 19th International Conference on World Wide Web (ACM, 2010), pp. 591–600. 72. T. Chakraborty, N. Ganguly, A. Mukherjee, Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on (IEEE, 2014), pp. 130– 137. 73. J. Leskovec, J. Kleinberg, C. Faloutsos, ACM Transactions on Knowledge Discovery from Data (TKDD) 1, 2 (2007). S74 74. R. West, H. S. Paskov, J. Leskovec, C. Potts, Transactions of the Association for Computa- tional Linguistics 2, 297 (2014). 75. J. Leskovec, J. Kleinberg, C. Faloutsos, Proceedings of the eleventh ACM SIGKDD inter- national conference on Knowledge discovery in data mining (ACM, 2005), pp. 177–187. 76. J. Gehrke, P. Ginsparg, J. Kleinberg, ACM SIGKDD Explorations Newsletter 5, 149 (2003). 77. R. Albert, H. Jeong, A.-L. Barab´asi, Nature 401, 130 (1999). 78. J. Leskovec, L. A. Adamic, B. A. Huberman, ACM Transactions on the Web (TWEB) 1, 5 (2007). 79. J. Leskovec, D. P. Huttenlocher, J. M. Kleinberg, ICWSM (2010). 80. J. Leskovec, J. J. Mcauley, Advances in neural information processing systems (2012), pp. 539–547. 81. L. Takac, M. Zabovsky, International Scientific Conference and International Workshop Present Day Trends of Innovations (2012), pp. 1–6. 82. L. Backstrom, D. Huttenlocher, J. Kleinberg, X. Lan, Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (ACM, 2006), pp. 44–54. 83. J. Yang, J. Leskovec, 2012 IEEE 12th International Conference on Data Mining (IEEE, 2012), pp. 745–754. S75 Authors would like to thank Rok Sosic for insightful comments. ARB acknowledges the support of a Stanford Graduate Fellowship. DFG acknowledges the support of NSF CCF- 1149756 and IIS-1422918 and DARPA SIMPLEX. JL acknowledges the support of NSF IIS- 1149837 and CNS-1010921, NIH BD2K, DARPA XDATA and SIMPLEX, Boeing, Lightspeed, and Volkswagen. S76
1506.04571
1
1506
2015-06-15T12:43:45
A community role approach to assess social capitalists visibility in the Twitter network
[ "cs.SI", "physics.soc-ph" ]
In the context of Twitter, social capitalists are specific users trying to increase their number of followers and interactions by any means. These users are not healthy for the service, because they are either spammers or real users flawing the notions of influence and visibility. Studying their behavior and understanding their position in Twit-ter is thus of important interest. It is also necessary to analyze how these methods effectively affect user visibility. Based on a recently proposed method allowing to identify social capitalists, we tackle both points by studying how they are organized, and how their links spread across the Twitter follower-followee network. To that aim, we consider their position in the network w.r.t. its community structure. We use the concept of community role of a node, which describes its position in a network depending on its connectiv-ity at the community level. However, the topological measures originally defined to characterize these roles consider only certain aspects of the community-related connectivity, and rely on a set of empirically fixed thresholds. We first show the limitations of these measures, before extending and generalizing them. Moreover, we use an unsupervised approach to identify the roles, in order to provide more flexibility relatively to the studied system. We then apply our method to the case of social capitalists and show they are highly visible on Twitter, due to the specific roles they hold.
cs.SI
cs
Noname manuscript No. (will be inserted by the editor) A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network Nicolas Dugu´e · Vincent Labatut · Anthony Perez 5 1 0 2 n u J 5 1 ] I S . s c [ 1 v 1 7 5 4 0 . 6 0 5 1 : v i X r a the date of receipt and acceptance should be inserted later Abstract In the context of Twitter, social capitalists are specific users trying to increase their number of followers and interactions by any means. These users are not healthy for the service, because they are either spammers or real users flawing the notions of influence and visibility. Study- ing their behavior and understanding their position in Twit- ter is thus of important interest. It is also necessary to an- alyze how these methods effectively affect user visibility. Based on a recently proposed method allowing to identify social capitalists, we tackle both points by studying how they are organized, and how their links spread across the Twitter follower-followee network. To that aim, we consider their position in the network w.r.t. its community structure. We use the concept of community role of a node, which de- scribes its position in a network depending on its connectiv- ity at the community level. However, the topological mea- sures originally defined to characterize these roles consider only certain aspects of the community-related connectivity, and rely on a set of empirically fixed thresholds. We first show the limitations of these measures, before extending and generalizing them. Moreover, we use an unsupervised approach to identify the roles, in order to provide more flex- ibility relatively to the studied system. We then apply our method to the case of social capitalists and show they are highly visible on Twitter, due to the specific roles they hold. Keywords Twitter, Social network, Social capitalism, influence, community roles Nicolas Dugu´e, Anthony Perez Universit´e d'Orl´eans, LIFO EA 4022, F-45067 Orl´eans, France E-mail: {anthony.perez}{nicolas.dugue}@univ-orleans.fr Vincent Labatut Universit´e d'Avignon, LIA EA 4128, F-84911 Avignon, France E-mail: [email protected] 1 Introduction The last decade has been marked by an increase in both the number of online social networking services and the number of users of such services. This observation is particularly relevant when considering Twitter, which had 200 million accounts in April 2011 [3] and reached 500 millions in Oc- tober 2012 [14]. Twitter is mostly used to share, seek and de- bate some information, or to let the world know about daily events [15]. The amount of information shared on Twitter is considerable: there are about 1 billion tweets posted every two and a half days [24]. While focusing on microblogging, Twitter can be considered as a social networking service, since it includes social features. Indeed, to see the messages of other users, a Twitter user has to follow them (i.e. make a subscription). Furthermore, a user can retweet [26] other users' tweets, for instance when he finds them interesting and wants to share them with his followers 1. Besides, users can mention other users to draw their attention by adding @UserName in their message. Some Twitter users are trying to use these particular properties to spread efficiently some information [11]. One of the simplest way to reach this objective is to gain as many followers as possible, since this gives a higher visi- bility to the user's tweets when using the network search en- gines [11]. These specific users are called social capitalists. They have been recently pointed out by Ghosh et al. [11] in a study related to link-farming in Twitter. They noticed in particular that users responding the most to the solicita- tion of spammers are in fact real, active users. To increase their number of followers, social capitalists use several tech- niques [7,11], the most common one being to follow a lot of users regardless of their content, just hoping to be followed back. Because of this lack of interest in the content produced by the users they follow, social capitalists are not healthy for a service such as Twitter. Indeed, this behavior helps spam- mers gaining influence [11], and more generally makes the task of finding relevant information harder for regular users. Identifying them and studying their behavior in Twitter are therefore two very important tasks to improve the service, since they can allow designing better search engines or func- tioning rules. In a recent article, Dugu´e & Perez [7] have designed a method to efficiently detect social capitalists. In order to better understand how they are organized, how re- ally visible they are, and how their links spread across the network, we propose to characterize the position of social capitalists relatively to the community structure of the net- work [8]. In its simplest form, the community structure of a com- plex network can be defined as a partition of its node set, 1 For a given user, a followee (or friend in the Twitter API) is a user he subscribed to, and a follower is a user that subscribed to him. 2 Nicolas Dugu´e et al. each part corresponding to a community. Community detec- tion methods generally try to perform this partition in order to obtain densely connected groups of nodes, relatively to the rest of the network [23]. Hundreds of such algorithms have been defined in the last ten years, see [9] for a very de- tailed review of the domain. The notion of community struc- ture is particularly interesting because it allows studying the network at an intermediate level, compared to the more clas- sic global (whole network) and local (node neighborhood) approaches. The concept of community role is a good illustration of this characteristic. It consists in describing a node depending on the position it holds in its own community. We base our work on the Guimer`a & Amaral approach of the community role [12]. After having applied a standard community de- tection method, Guimer`a & Amaral characterize each node according to two ad hoc measures, each one describing a specific aspect of the community-related connectivity. The node role is then selected among 7 predefined ones by com- paring the two values to some empirically fixed thresholds assumed as universal. In this paper, we study the community roles of so- cial capitalists within a freely-available Twitter follower- followee network provided by Cha et al. [5]. In a first place, we highlight two important limitations of the community role approach described by Guimer`a & Amaral [12]. We show that the existing measures used to characterize the node's position do not take into account all aspects of the community-related external connectivity of a node. More- over, we object the assumption of universality of the thresh- olds applied to the measures in order to distinguish the dif- ferent node roles. The dataset we use constitutes a counter- example showing the original thresholds are not relevant for all systems. We then explain how to tackle these limitations. We first introduce three new measures to characterize the ex- ternal connectivity of a node in a more complete and detailed way. We then describe an unsupervised approach aiming at identifying the node roles without using fixed thresholds. Fi- nally, we apply our method on the Twitter network to deter- mine the position of social capitalists, and show they occupy specific roles in the network. In particular, most of them are well connected to their community, and overall a large part of them spread their links outside their community very effi- ciently. This gives meaningful insights regarding the actual visibility of these users. Indeed, they occupy roles leading to a high visibility in Twitter. We first present the concept of social capitalists in Twit- ter in more details (Section 2). Next, we describe the method proposed by Guimer`a & Amaral [12] to identify the commu- nity roles of nodes (Section 3.1) and provide some elements regarding its limitation (Section 3.2.1). We then describe the solutions we propose to tackle these limitations (Sec- tion 3.3.1) and apply our method to study the roles of so- cial capitalists in Twitter (Section 4). Finally, we discuss the works related to the notion of community role (Section 5). 2 Social capitalists 2.1 Definition Similarly to what is observed on the Web, where site admin- istrators perform links exchange in order to increase their visibility, some social network users seek to maximize their number of virtual relationships. Because microblogging net- works are focused on sharing information, not on develop- ing friendship links, Twitter is particularly well-suited to ob- serve and study this kind of behavior. Such users are called social capitalists in [7,11] or friends infiltrators in [18]. In the rest of paper, we call these users social capital- ists. These users exploit two relatively straightforward tech- niques, based on the reciprocation of the follow link: -- FMIFY (Follow Me and I Follow You): the user ensures its potential followers that he will follow them back; -- IFYFM (I Follow You, Follow Me): on the contrary, the user systematically follows other users, hoping to be fol- lowed back. Social capitalists are not healthy for a social networking service, since their methods to gain visibility and influence are not based on the production of relevant content and on getting a higher credibility. From this point of view, their high number of followers can be considered as undeserved, and biases all services based on the assumption that visible users produce or fetch interesting content (e.g. search or rec- ommendation engines). Social capitalists were introduced by Ghosh et al [11] in a paper studying spam on Twitter. They noticed that users responding the most to the solicitations of spammers are real (i.e. neither bots nor fake accounts), active and even sometimes popular users. These users are engaged in a link exchange process such as the two described above. Using this observation, Ghosh et al. manually constituted a list of 100000 social capitalists -- namely the most responsive ones to the solicitations of spammers. Social capitalists were also mentioned as a subset of spammers in [18,19] where authors succeed in building a robust classifier to detect spammers from regular users. In both these papers, social capitalists (called friends infiltrators by the authors) are not specifically studied. Furthermore, these papers neither studied the actual visibility of social capitalists nor the topological properties of their corresponding positions in the network. In [7], Dugu´e & Perez proposed an automatic method to detect social capitalists. In this article, our work is based on a list of social capitalists identified through this method, which is why it is presented in detail in the next section. A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network 3 Based on this list, we could compare the position and visibil- ity of regular users and social capitalists through the notion of community role. 2.2 Measures The set of followees and the set of followers of a given user largely intersect when the said user applies social capitalism techniques. Based on this observation, Dugu´e & Perez [7] designed an automatic method to detect efficiently these users. It relies on three purely topological measures, i.e. it does not consider any content. The first measure, called overlap index and introduced in [10], enables to detect po- tential social capitalists. The second, called ratio, allows to determine if a given social capitalist uses the FMIFY or IFYFM principle. The third is simply the incoming degree, and indicates if the social capitalist was successful in apply- ing these principles. All of them are defined on the follower- followee network, which is a directed graph G = (V,A) whose nodes V represent users and links A correspond to follower-to-followee relationships. In this network, the in- neighborhood Nin(u) = {v ∈ V : (v,u) ∈ A} of a node u corresponds to the followers of the user represented by u, whereas his out-neighborhood Nout (u) ={v∈V : (u,v)∈ A} corresponds to his followees. The overlap index O(u) of a node u is given by: O(u) = Nin(u)∩ Nout (u) min{Nin(u),Nout (u)} (1) This measure is processed for all nodes, allowing to iden- tify social capitalists. Indeed, an overlap index close to 1 indicates the intersection of followers and followees is quite high, and so we can conclude the considered user applied either the FMIFY or IFYFM principle. On the contrary, a value close to 0 means he is not a social capitalist. The ratio r(u) of a node u is defined as: r(u) = Nin(u) Nout (u) (2) This measure is processed for all social capitalists too, and allows to classify them more precisely. According to Dugu´e & Perez [7], social capitalists following the IFYFM princi- ple have a ratio greater than 1 (i.e. more followees than fol- lowers), whereas those using FMIFY have a ratio smaller than 1. In both cases, the ratio is expected to be close to 1. However, the analysis conducted in [7] highlighted a third behavior, called passive. Unlike other social capital- ists (called active), these passive users consider they have reached a sufficient level of influence, and therefore do not need to increase their number of followers. At this point, they stop applying the aforementioned principles, but still get more and more followers due to their high visibility. Consequently, their ratio is much smaller than 1. By processing the cardinalities of the incoming and out- going neighborhoods, we obtain the in- and out-degrees, noted din(u) = Nin(u) and dout (u) = Nout (u), respec- tively. The former, which corresponds to the number of fol- lowers, is used by Dugu´e & Perez [7] as a third criterion, in order to determine if a social capitalist was successful in the application of the FMIFY and IFYFM principles. They de- fine low in-degree social capitalists as social capitalists hav- ing between less than 10000 followers, and high in-degree social capitalists as those having more than 10000 follow- ers. The latter are efficiently gaining followers, and are con- sidered successful, whereas the former are still less popular. 2.3 Detection In [7], Dugu´e & Perez applied their method to the 2009 data collected by Cha et al. [5]. They empirically determined that a threshold of 0.74 for the overlap index allows a high accu- racy detection. They also added two constraints: the first is to consider only users with more than 500 followers, in or- der to focus on successful social capitalists, i.e. ones having effectively gained followers. This means low degree social capitalists have an in-degree between 500 and 10,000. The second constraint sets up a minimum of 500 followees, in order to avoid detecting users whose high overlap index is due only to a very small number of followees. Dugu´e & Perez detected approximately 160000 social capitalists. Table 1 shows how they are distributed over the various types of identified behaviors. It is interesting to no- tice that in this network, most users with more than 10000 followers are social capitalists (70%). Moreover, users with such a number of followers constitute less than 0.1% of the network. din(u) > 500 dout (u) Number > 500 161424 > 10000 > 500 5743 r(u) > 1 [0.7;1] > 1 [0.7;1] < 0.7 % 68% 25% 66% 25% 9% Table 1 Social capitalists detected on the entire Cha et al. [5] network, with O(u) > 0.74. In the experimental part of this work, we decided to use the same method to identify social capitalists in the stud- ied data, instead of the list manually curated by Ghosh et al. [11]. The reason for this is that the latter is less exhaus- tive, since it excludes users not following spammers, and does not contain spammers nor bots. Dugu´e & Perez de- tected approximately 160.000 social capitalists when Ghosh et al. [11] detected 100000 users. Furthermore, some of 4 Nicolas Dugu´e et al. the listed social capitalists have only a few followers, or only a few reciprocal followers-followee links. Finally, the method proposed by Dugu´e and Perez [7] detected 80% of the 100000 social capitalists listed by Ghosh et al. 3 Identifying Community Roles We now present in more details the concept of community role in a complex network. Our work relies on the method proposed by Guimer`a & Amaral [12].We first introduce the original measures of Guimer`a & Amaral, then highlight their limitations, and finally propose some solutions to these problems. 3.1 Original approach In order to characterize the roles of nodes relatively to com- munities, Guimer`a & Amaral [12] defined two complemen- tary measures which allow them to place each node in a 2D role space. Then, they proposed several thresholds to dis- cretize this space, each resulting subspace corresponding to a specific role. In this section, we first describe the measures, then the method used to identify the roles. We then propose a trivial extension to directed networks. 3.1.1 Role Measures Both measures are related to the internal and external con- nectivity of the node with respect to its community. In other words, they deal with how a node is connected with other nodes inside and outside of its own community, respectively. The first measure, called within-module degree, is based on the notion of z-score. Since the z-score will be used again afterwards, we define it here in a generic manner. Let f (u) be any function defined on the vertices, that is f associates a numerical value to any vertex u of the considered graph. The z-score Z f (u) w.r.t. the community of u is defined by: (cid:16) di(u) (cid:17)2 i The second measure, called participation coefficient, is (4) d(u) defined as follows: P(u) = 1−∑ where d(u) denotes the total degree of the node (i.e. the number of links it has with any other nodes), and di(u) the community degree of u (i.e. the number of links it has with nodes of community Ci). Note that when Ci corresponds to the community of u, then di(u) = dint (u). Roughly speaking, the participation coefficient evaluates the connectivity of a node to the community structure in general. If it is close to 0, then the node is connected to one community only (likely its own). On the contrary, if it is close to 1, then the node is uniformly linked to a large number of communities. 3.1.2 Community Roles Both measures are used to characterize the role of a node within its community. Guimer`a & Amaral [12] defined 7 dif- ferent roles by discretizing the 2D space formed by z and P using empirically determined thresholds. They first used a threshold on the within-module degree, which allowed them to distinguish hubs (that is, nodes with z (cid:62) 2.5) from other nodes, called non-hubs. Such hubs are considered as highly linked to their community, when com- pared to other nodes of the same community. Note that the word hub usually refers to a node with a central position in the whole network, whereas here, the focus is on the com- munity. In other words, in the rest of this article, hub implic- itly means community hub. z ≥ 2.5 < 2.5 Hub Non- Hub Community role P ≤ 0.30 Provincial ]0.30;0.75] Connector Kinless > 0.75 Ultra-peripheral ≤ 0.05 Peripheral Connector Kinless ]0.05;0.62] ]0.62;0.80] > 0.80 External connectivity Low Strong Very strong Very low Low Strong Very strong Z f (u) = f (u)− µi( f ) σi( f ) ,u ∈ Ci (3) Table 2 Guimer`a & Amaral's roles and the corresponding z and P thresholds [12]. where Ci stands for community number i, and µi( f ) and σi( f ) respectively denote the mean and standard deviation of f over the nodes belonging to community Ci. Now, let dint (u) be the internal degree of a node u, i.e. the number of links u has with nodes belonging to its own community. Then, the within-module degree of a node u, noted z(u) by Guimer`a & Amaral [12], corresponds to the z-score of its internal degree. Note that z evaluates the con- nectivity of a node with its own community, with respect to that of the other nodes of the same community. Those two categories are then subdivided using several thresholds defined on the participation coefficient, as shown in Table 2. By order of increasing P, we have: provincial or (ultra-)peripheral, connector and kinless nodes. The two first roles correspond to nodes essentially connected to their community and very (or even completely) isolated from the rest of the network. The third one concerns nodes connected to a number of nodes outside their community. Nodes hold- ing the fourth role are connected to many different commu- A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network 5 nities. Note this is independent from the density of their in- ternal connections: a node can be very well connected in its own community, but not to the rest of the network, in which case it is an ultra-peripheral hub. 3.1.3 Directed Variants Many networks representing real-world systems, such as the Twitter follower-followee network we study here, are di- rected. Of course, it is possible to analyze them through the undirected method, but this would result in a loss of informa- tion. Yet, extending these measures is quite straightforward: the standard way of proceeding consists in distinguishing in- coming and outgoing links. In our case, this results in using 4 measures instead of 2: in- and out- versions of both the within-module degree and participation coefficient. First, based on the in-degree introduced in section 2.2 and the internal degree from section 3.1.1, let us define the internal in-degree of a node, noted din int. It corresponds to the number of incoming links the node has inside its commu- nity. By processing the z-score of this value, one can derive the within-module in-degree, noted zin. Similarly, let us note din the community in-degree, i.e. the number of incoming i links a node has from nodes in community Ci. We can now define the incoming participation coefficient, noted Pin, by substituting din to d and din to di in Equation (4). With the i same approach, we define zout and Pout, using the outgoing counterparts dout, dout int and dout In the rest of the article, we call this set of measures the directed variants, by opposition to the original measures of Guimer`a & Amaral [12]. . i 3.2 Limitations of this approach We identify two limitations in the approach of Guimer`a & Amaral [12]. The first concerns the way the participation co- efficient represents the nodes external connectivity, whereas the second is related to the threshold used for the within- module degree. 3.2.1 External Connectivity We claim that the external connectivity of a given node, i.e. the way it is connected to communities other than its own, can be precisely described in three ways: first, by consider- ing its diversity, i.e. the number of concerned communities ; second, in terms of intensity, i.e. the number of external links ; and third, relatively to its heterogeneity, i.e. the distri- bution of external links over communities. The participation coefficient combines several of these aspects, mainly focus- ing on heterogeneity, which lowers its discriminant power. This is illustrated in Figure 1: the external connectivity of the central node is very different in each one of the presented situations. However, P is the same in all cases. Fig. 1 Each color represents a community. In each case, the participa- tion coefficient P of the central node is 0.58. In order to be more illustrative, let us consider two users from our data, which have the same community role accord- ing to the original measures. We select two nodes both hav- ing a z greater than 2.5 and a P close to 0.25. So accord- ing to Guimer`a & Amaral [12] (see Table 2), they both are provincial hubs, and should have a similar behavior w.r.t. the community structure of the network. However, let us now point out that the first user is connected to 50 nodes outside its community, whereas the second one has 200000 connections. This means they actually play different roles in the community structure, either because the second one is connected to much more communities than the first one, or because its number of links with external communities is much larger than for the first user. Similar observations can be made for the directed variants of the participation coeffi- cient. The measures used to define the external connectivity should take this difference into account and assign different roles to these nodes. 3.2.2 Fixed Thresholds As indicated in the supplementary discussion of [12], the thresholds originally used to identify the roles were obtained empirically. Guimer`a & Amaral first processed P and z for different types of data: metabolic, proteome, transportation, collaboration, computer and random networks. Then, they detected basins of attraction, corresponding to regularities observed over all the studied networks. Each role mentioned earlier corresponds to one of these basins, and the thresholds were obtained by estimating their boundaries. Implicitly, these thresholds are supposed to be univer- sal, but this can be criticized. First, Guimer`a & Amaral used only one community detection method. A different commu- nity detection method can lead to a different community structure, and therefore possibly different basins of attrac- tion. Furthermore, z is not normalized, in the sense it has no fixed boundaries. There is no guarantee the threshold origi- nally defined for this measure will stay meaningful on other networks. As a matter of fact, the values obtained for z in our experiments are far higher for some nodes than the ones 6 Nicolas Dugu´e et al. observed by Guimer`a & Amaral. We also observe that the proportion of nodes considered as hubs (i.e. z ≥ 2.5) by Guimer`a & Amaral is much smaller in our network than in the networks they consider: 0.35% in ours versus 2% in theirs. These thresholds seem to be at least sensitive either to the size of the data, the structure of the network, or to the community detection method. It is therefore necessary to process new thresholds, more appropriate to the considered data. However, the method used by Guimer`a & Amaral [12] itself is difficult to apply, it requires a lot of data. Furthermore, this method assumes that thresholds are universal, which is disproved by our data. 3.3 Proposed Approach In this section, we propose some solutions to overcome the limitations of the original approach. First, the participation coefficient mixes several aspects of the external connectiv- ity, which lowers its discriminant power: we introduce sev- eral measures to represent these aspects separately. Second, the thresholds used to define the roles do not necessarily hold for all systems: we show how to apply an unsupervised method instead. 3.3.1 Generalized Measures In place of the single participation coefficient, we propose 3 new measures aiming at representing separately the aspects of external connectivity: diversity, intensity and heterogene- ity. A fourth measure equivalent to the within-degree coeffi- cient is used to describe the internal connectivity. Because we deal with directed links, each one of these measures exists in two versions: incoming and outgoing (as explained in section 3.1.3), effectively resulting in 8 mea- sures. However, for simplicity matters, we ignore link direc- tions when presenting them in the rest of this section. All our measures are expressed as z-scores (cf. Equation (3)). We know community sizes are generally power-law- distributed, as described in [17], which means their sizes are heterogeneous. Our community-based z-scores allow to nor- malize the measures relatively to the community size, and therefore to take this heterogeneity into account. Diversity. The diversity D(u) evaluates the number of communities to which a node u is connected (other than its own), w.r.t. the other nodes of its community. This measure does not take into account the number of links u has to each community. Let ε(u) be the number of external communities to which u is connected. The diversity is defined as the z- score of ε w.r.t. the community of u. It is thus obtained by substituting ε to f in Equation (3). External intensity. The external intensity Iext (u) of a node u measures the amount of links u has with communities other than its own, w.r.t. the other nodes of its community. Let dext (u) be the external degree of u, that is the number of links u has with nodes belonging to another community than its own. The external intensity is defined as the z-score of the external degree, i.e. we obtain it by substituting dext to f in Equation (3). Heterogeneity. The heterogeneity H(u) of a node u measures the variation of the number of links a node u has, from one community to another. To that aim, we compute the standard deviation of the number of links u has to each community. We note this value δ (u). The heterogeneity is thus the z-score of δ w.r.t. the community of u. As previ- ously, it can be obtained by substituting δ to f in Equa- tion (3). Internal intensity. In order to represent the internal con- nectivity of the node u, we use the z measure of Guimer`a & Amaral [12]. Indeed, it is based on the notion of z-score, and is thus consistent with our other measures. Moreover, we do not need to add measures such as diversity or heterogeneity, since we consider one node can belong only to one commu- nity. Due to the symmetry of this measure with the external intensity, we refer to z as the internal intensity, and note it Iint (u). 3.3.2 Unsupervised Role Identification Our second modification concerns the way roles are defined. As mentioned before, the thresholds defined by Guimer`a & Amaral [12] are not necessarily valid for all data. More- over, the consideration of link directions and our general- ization of the measures invalidate the existing thresholds, since we now have 8 distinct measures, all different from the original ones. We could try estimating more appropri- ate thresholds, but as explained in section 3.2.2, the method originally used by Guimer`a & Amaral [12] to estimate their thresholds is impractical since it requires a certain amount of data. The fact our measures are all z-scores also weakens the possibility to get thresholds applicable to all systems, which means the estimation process should potentially be performed again for each studied system. To overcome these problems, we propose to apply an automatic method instead, by using unsupervised classifica- tion. First, we process all the measures for the considered data. Then, a cluster analysis method is applied. Each one of the clusters identified in the 8-dimensional role space is con- sidered as a community role. This method is not affected by the number of measures used, and allows to adjust thresh- olds to the studied system. If the number of roles is known in advance, for instance because of some properties of the studied system, then one can use an appropriate clustering method such as k-means, which allows specifying the num- ber k of clusters to find. Otherwise, it is possible to use clus- ter quality measures to determine which k is the most appro- A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network 7 priate ; or to apply directly a method able to estimate at the same time the optimal number of clusters and the clusters themselves. 4 Community Roles of Social Capitalists In this section, we present the results we obtained on a Twit- ter network using the methods presented in Section 3. We first introduce the data and tools we used, then the roles we identified. We then focus social capitalists and the roles they hold. 4.1 Data and Tools We analyze a freely-available anonymized Twitter follower- followee network, collected in 2009 by Cha et al. [5]. It con- tains about 55 million nodes representing Twitter users, and almost 2 billion directed links corresponding to follower- followee relationships. We had to consider the size of these data when choosing our analysis tools. For community detection, we selected the Louvain method [2], because it is widespread and proved to be very efficient when dealing with large networks. We retrieved the C++ source code published by its authors, and adapted it in order to optimize the directed version of the modularity measure, as defined by Leicht and Newman [20]. Empirical benchmarks show that our adapted version performs better than the original one on directed network. All the role mea- sures, that is Guimer`a & Amaral's original measures, their directed variants (section 3.1) and our new measures (sec- tion 3.3), were computed using the community structure de- tected through these means. We also implemented them in C++, using the same sparse matrix data structure than the one used in the Louvain method. All resulting values were normalized, in order to avoid scale difference problems when conducting the cluster anal- ysis. The clustering was performed using an open source im- plementation of a distributed version of k-means [21]. Since we do not know the expected number of roles, we applied this algorithm for k ranging from 2 to 15, and selected the best partition in terms of Davies-Bouldin index [6]. We se- lected this index because it is a good compromise between the reliability of the estimated quality of the clusters, and the computing time it requires. All pre- and post-processing scripts related to the cluster analysis were implemented in R. The whole source code is freely available online2. Be- cause we are dealing with 55 millions of objects and only 8 attributes, we know that a lot of local maximums exist while minimizing the within-cluster sum of squares with the k-means algorithm. In this paper, we are specifically looking 2 https://github.com/CompNet/Orleans for assessing the social capitalists visibility in the Twitter network. To achieve this goal, we do not necessarily need to get the best partition of the role space. We are actually looking for a partition in which clusters are well separated and interpretable according to Guimer`a & Amaral's termi- nology. With such a partition, it is possible to look at the specific roles held by social capitalists in these clusters and to determine their actual visibility. 4.2 Roles Expected for Social Capitalists We expect the degree of social capitalists to play an impor- tant role considering their position (see Section 2). High in- degree social capitalists (namely greater than 10000) should be well connected to their communities -hubs- or to the other communities -connectors, or both. Being connectors would indicate they obtained a high visibility on the whole network and not only in their own communities. Furthermore, because we take the direction of links into account in our measures, we expect social capitalists to be discriminated according to their ratio, i.e. the number of out- going links divided by the number of incoming links. We es- pecially expect high in-degree social capitalists with a small ratio (so-called passive social capitalists according to [7]) to be highly connected to their communities and to the rest of the graph. Considering low degree social capitalists, it is not possible to predict their roles without any further informa- tion. The study will thus be of great interest to characterize their visibility. 4.3 Detected Roles For the sake of completeness, we first used the directed mea- sures (section 3.1) of Guimer`a & Amaral [12]. As mentioned in Section 3.2.2, the threshold they defined for z is irrelevant for our data. Furthermore, this threshold was determined for an undirected version. So we adopted here the unsupervised role identification method we proposed (section 3.3.2). 4.3.1 Directed Variants A correlation study shows zout and zin are slightly correlated (with a correlation coefficient ρ < 0.3), whereas the cor- relation is zero for all other pairs of measures. This seems to confirm the interest of considering link directions in the role measures. When doing the cluster analysis, the most separated clusters are obtained for k = 6. An ANOVA fol- lowed by post hoc tests (t-test with Bonferroni's correction) showed significant differences exist between all clusters and for all measures. An analysis of the distribution of high in-degree social capitalists in these clusters shows that a few of these users 8 Nicolas Dugu´e et al. occupy a connector hub role. This is quite expected as said in section 4.2. However, most of the high in-degree social cap- italists are considered as non-hubs and peripheral or ultra- peripheral nodes. More than 60% of the users with a high ratio are classified as ultra-peripheral nodes for both incom- ing and outgoing directions, which is rather surprising since they have a really high degree. However, they are classi- fied in a cluster with low z and P (both in- and out- ver- sions). The low z indicates these users are not much con- nected to their community (relatively to the other nodes of the same community), and must thus be more connected to other communities. Still, P does not highlight this aspect of their community-related connectivity, and they appear as pe- ripheral. This inconsistency of the detected roles confirms the limitations of P described in section 3.2.1. 4.3.2 Generalized Measures The correlation between the generalized measures is very low overall, ranging from almost 0 to 0.4. In particular, both versions of the same measure (incoming vs. outgoing) are only slightly correlated, which is another confirmation of the interest of considering link directions. Only three measures are strongly correlated: internal and external intensities and heterogeneity (ρ ranging from 0.78 to 0.92). The relation between both intensities seems to indicate that variations on the total degree globally affect similarly internal and exter- nal degrees. The very strong correlation observed between heterogeneity and intensity means only nodes with low in- tensity are homogeneously connected to external communi- ties, whereas nodes with many links are connected hetero- geneously. Similarly to the directed measures, the most separated clusters are obtained with k = 6. These 6 clusters are given in Table 3 with their sizes and roles. However, the correspon- dance with the original nomenclature is rougher, since these measures are farther from the original ones. The average of each measure per cluster is showed in Table 4. Like before, ANOVA and post hoc tests showed significant differences between all clusters and for all measures. We now conduct a detailed analysis of the different roles we obtain. C 1 2 3 4 5 6 Size 24543667 304 303674 11929722 10828599 4973717 Role Proportion Ultra-peripheral non-hubs 46.68% Kinless hubs < 0.01% 0.58% Connector hubs 22.69% Incoming Peripheral non-hubs 20.59% Outgoing Peripheral non-hubs Connector non-hubs 9.46% Table 3 Clusters detected with the generalized measures: cluster num- ber C used in the paper, sizes in terms of node count and proportion of the whole network, and roles according to the Guimer`a & Amaral [12] nomenclature. Cluster 1. Because both internal intensity versions (equiva- lent to z) are negative, nodes in this cluster cannot be hubs. The negative external measures indicate these nodes are not connectors either. We can thus consider them as ultra- peripheral non-hubs. This cluster is the largest one, with 47% of the network nodes. This confirms the matching with this role, whose nodes constitute generally most of the net- work. Clusters 4 and 5. Cluster 4 is very similar to Cluster 1. However, its incoming diversity is 0.69. These nodes are again peripheral, because the external intensity is negative. Still, incoming links come from a larger number of commu- nities. Cluster 5 is also similar to Cluster 1. However, both versions of diversity are positive for this cluster, with an out- going diversity of 0.60. External links are thus connected to a larger number of communities. Clusters 4 and 5 are the second (23%) and third (21%) largest ones, respectively. By gathering all the peripheral and ultra-peripheral nodes, we obtain 91% nodes of the network. Cluster 6. The internal intensity is still close to 0 but posi- tive. Thus, these nodes are non-hubs, even if they are more connected to their community than those of the previous clusters. Like the other external measures, the external in- tensity is low but still positive. These nodes are relatively well-connected to other communities, and we can therefore consider them as connectors. Both versions of the diversity are relatively high, which indicates these nodes are not only more connected to their community as well as others, but also to a larger number of distinct communities. Cluster 3. The high internal intensity allows us to state that these nodes are hubs. Furthermore, the high external mea- sures indicate these nodes are connected to a high number of nodes from a lot of other communities, and thus are connec- tor hubs. Notice outgoing measures are higher. This cluster represents only 0.6% of the network, meaning this role is very uncommon. Cluster 2. This observation is even more valid for Cluster 2, which represents much less than 1% of the nodes. For this cluster, all measures are really high. The incoming versions are always higher than their outgoing counterparts. We call these users kinless hubs according to Guimer`a & Amaral's nomenclature. It is worth noticing that, whatever the considered mea- sures, some of the roles defined by Guimer`a & Amaral [12] are not represented in the studied network. This is consistent with the remarks previously made for other data by Guimer`a & Amaral [12], and confirms the necessity of having an un- supervised approach to define roles in function of measures. It is also consistent with the strong correlation observed be- tween internal and external intensities: missing roles would be nodes possessing a high internal intensity but a low ex- ternal one, or vice-versa. However, those are very infrequent in our network. A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network 9 Cluster 1 2 3 4 5 6 Cluster 1 2 3 4 5 6 Iout int −0.12 94.22 5.52 −0.04 −0.03 0.48 Iout ext −0.09 113.87 5.28 −0.07 −0.03 0.35 Iin int Dout Din −0.03 −0.55 −0.80 88.40 7.18 311.27 3.10 1.40 5.60 0.00 −0.37 0.69 −0.01 0.19 0.60 0.12 1.96 1.70 Iin ext −0.04 283.79 1.43 0.00 −0.02 0.12 Hout −0.12 112.79 6.76 −0.10 −0.04 0.53 Hin −0.06 285.57 2.34 −0.01 −0.02 0.19 Table 4 Average generalized measures obtained for the 6 detected clusters . 4.4 Relations between clusters We now discuss how the nodes are connected depending on the role they hold. Figure 2 is a simplified representation of this interconnection pattern. The outgoing links of ultra-peripheral (Cluster 1) and peripheral (Clusters 4 and 5) nodes target mainly kinless hubs (Cluster 2) and connectors (Clusters 3 and 6), repre- senting 74% (Cluster 1), 82% (Cluster 4), and 74% (Clus- ter 5) of their connections. These (ultra-)peripheral nodes, which are the most frequent in the network, thus mainly fol- low very connected users, probably the most influent and relevant ones. This seems consistant: they follow only a few users, and so choose the most visible ones. Connector nodes (Clusters 3 and 6) are mainly linked to other connectors nodes. They have the tightest connection, since their arcs amounts to a total of 43% of the network links. This is worth noticing, because these clusters are far from being the largest ones. They are also largely connected to the rest of the clusters too, especially with outgoing links. Connectors follow massively users of all clusters, so we sup- pose they constitute the backbone of the network. Kinless hubs (Cluster 2) are massively followed by non- hubs, representing 38% (Cluster 1), 43% (Cluster 4), 19% (Cluster 5) and 8% (Cluster 6) of these Clusters' outgoing links. And interestingly, the links coming from kinless hubs target the same clusters: 9% go to Cluster 1, 20% to Clus- ter 4, 22% to Cluster 5 and 41% to Cluster 6. This means the most visible and popular nodes of the network mostly follow and are followed by much less popular users. One could have expected the network to be hierarchically orga- nized around roles, with more peripheral nodes connected to less peripheral nodes. But this is clearly not the case. First, (ultra-)peripheral nodes are marginally connected to other nodes holding the same role, they prefer to follow connec- tors and/or hubs. Second, kinless and connector hubs, al- Fig. 2 Interconnection between clusters. A vertex Ci corresponds to Cluster i from Table 3. An arc (i, j) represents the set of links connect- ing nodes from Cluster i to nodes from Cluster j, labeled with 3 values. Each value describes which proportion of links the arc represents, rela- tively to 3 distinct sets: first relatively to all links starting from Cluster i, second relatively to all links in the whole network, and third rela- tively to all links ending in Cluster j. The arc thickness is proportional to the second value, the vertex size to the number of nodes the corre- sponding cluster contains. For matters of readability, arcs representing less than 1% of the network links and 10% of the cluster links are not displayed. though well connected to connector non-hubs, do not have direct links, i.e. these users do not follow each other. 4.5 Position of Social Capitalists As stated previously, we use a list of approximately 160000 social capitalists detected by Dugu´e & Perez [7]. In the fol- lowing, we analyze how social capitalists are distributed am- ongst the detected roles. As explained in Section 2, we split social capitalists according to their in-degree (number of fol- lowers). Recall that low in-degree social capitalists have an in-degree between 500 and 10000, and high in-degree so- cial capitalists an in-degree greater than 10000. These social capitalists are known for having especially well succeeded in their goal of gaining visibility. The tables in this section describe how the various types of social capitalists are distributed over the clusters. In each cell, the first row is the proportion of social capitalists be- longing to the corresponding cluster, and the second one is the proportion of cluster nodes which are social capitalists. Values of interest are indicated in bold and discussed in the text. (41%) 10% (29%)C1C2C3C4C5C6(20%) 1% (5%)(11%) 1% (5%)(16%) 1% (2%)(20%) <1% (1%)(22%) <1% (1%)(41%) <1% (<1%)(11%) 3% (51%)(15%) 4% (19%)(16%) 4% (31%)(16%) 4% (35%)(43%) 4% (31%)(22%) 2% (10%)(17%) 2% (4%)(19%) 3% (22%)(25%) 4% (17%)(11%) 2% (13%)(30%) 4% (13%)(4%) 2% (33%)(8%) 4% (29%)(23%) 10% (49%)(13%) 6% (45%)(12%) 5% (44%)(40%) 18% (51%)(11%) 2% (13%)(38%) 2% (16%) 10 Nicolas Dugu´e et al. 4.5.1 Low in-degree social capitalists 4.5.2 High in-degree social capitalists Low in-degree social capitalists are mostly assigned to three clusters: 3, 5 and 6 (see Table 5). Most of them belong to Cluster 6, which contains non-hub connector nodes. These nodes, which have only slightly more external connections than the others, are nevertheless connected to far more com- munities. Social capitalists in this cluster seem to have ap- plied a specific strategy consisting in creating links with many communities. This strategy is still not completely working, though, as shown by the relatively low external in- coming intensity (meaning they do not have that many fol- lowers). Nodes from Cluster 3 are connector hubs, who follow more users than the others. Because IFYFM social capital- ists have a ratio greater than 1 and thus more followees than followers, it is quite intuitive to observe that they are twice as many than the other users in this cluster. The high outgo- ing diversity of Cluster 3 tells us that these social capitalists follow users from a large variety of communities, not only theirs (to which they are well connected). The high external outgoing intensity shows that these users massively engage in the IFYFM process, but did not yet receive a lot of fol- lowing back, as shown by their low external incoming in- tensity. Finally, roughly 20% of social capitalists with ratio r < 1 belong to Cluster 5, which contains non-hub peripheral nodes. This shows that a non-neglictible share of social cap- italists are isolated relatively to both their community and the other ones. Most of the high in-degree social capitalists are gathered in Cluster 3 (see Table 6), corresponding to connector hubs. This is consistent with the fact these users have a high de- gree. Users of Cluster 3 have a high outgoing diversity and a high outgoing external intensity: this shows they practice the IFYFM strategy actively, by following a lot of users from a wide range of communities. The rest of these users is con- tained in Cluster 2. Nodes in these clusters are kinless hubs and can thus be considered as successful users. Indeed, they are massively followed by a very high number of users from an extremely large variety of communities. Only high in- degree social capitalists with a ratio smaller than 0.7 and a few with a ratio smaller than 1 are classified in this cluster. This is consistent with the roles one could expect for social capitalists (Section 4.2). Ratio r ≤ 0.7 0.7 < r ≤ 1 r > 1 Ratio r ≤ 0.7 0.7 < r ≤ 1 r > 1 Cluster 1 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% Cluster 4 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% Cluster 2 12.14% 21.05% 1.55% 7.24% 0.03% 0.33% Cluster 5 0.00% 0.00% 0.00% 0.00% 0.00% 0.00% Cluster 3 87.29% 0.15% 95.64% 0.45% 97.99% 1.22% Cluster 6 0.57% < 0.01% 2.81% < 0.01% 1.98% < 0.01% Ratio r ≤ 1 r > 1 Ratio r ≤ 1 r > 1 Cluster 1 0.01% < 0.01% 0.03% < 0.01% Cluster 4 3.42% 0.14% 0.48% < 0.01% Cluster 2 0.00% 0.00% 0.00% 0.00% Cluster 5 18.28% 0.08% 14.31% 0.14% Cluster 3 23.10% 3.71% 18.78% 6.61% Cluster 6 55.19% 0.54% 66.40% 1.43% Table 6 Distribution of high in-degree social capitalists over clusters obtained from the generalized measures. These observations mean that most of these users are well connected in their communities but also with the rest of the network. This shows the efficiency of these users strate- gies. Indeed, most of the users are linked to a wide range of communities, and thus reach a high visibility in a large part of the network. Table 5 Distribution of low in-degree social capitalists over clusters obtained from the generalized measures. 5 Related Works These observations show that most of these users are deeply engaged in a process of soliciting users from other communities, not only theirs. Some of them are even mas- sively following users from a wide diversity of communities. This tends to show that these users may obtain an actual visi- bility across many communities of the network by spreading their links efficiently. The notion of role in network science first appeared in the seventies. Two nodes are considered as holding the same roles if they are structurally equivalent [22], namely if they share the same neighbors in the graph representing their re- lations [4]. This notion also appears in block models, where networks are partitioned as groups sharing the same patterns of relations [13]. In both cases, the concept of role is defined globally, i.e. relatively to the whole network. A Community Role Approach To Assess Social Capitalists Visibility in the Twitter Network 11 More recently, Guimer`a & Amaral introduced the con- cept of community role to study metabolic networks [12], by considering node connectivity at the level of the com- munity structure, i.e. an intermediate level. As explained in Section 3.1, they fist apply a standard community detection method, and then characterize each node according to two ad hoc measures, each one describing a specific aspect of the community-related connectivity. The first expresses the intensity of its connections to the rest of its own community, whereas the second quantifies how uniformly it is connected to all communities. The node role is then selected among 7 predefined ones by comparing the two values to some empir- ically fixed thresholds. Guimer`a & Amaral showed certain systems possess a role invariance property: when several in- stances of the system are considered, nodes are different but roles are similarly distributed. Scripps et al. [25], apparently unaware of Guimer`a & Amaral's work, later adopted a similar approach, but this time for influence maximization and link-based classifica- tion purposes. They also use two measures: first the degree, to assess the intensity of the general node connectivity, and second an ad hoc measure, to reflect the number of com- munities to which it is connected. They then use arbitrary thresholds to define 4 distinct roles. Even more recently, Klimm et al. [16] criticized Guimer`a & Amaral's approach, and proposed a modifica- tion based on two different measures. They first defined the hubness index, which compares the degree of a node u with the probability for this node to have the same number of links in a subgraph with fixed density and size. Their local hubness index is a variant using the density and size of the community containing u while their global hubness index uses the whole network density and size. They claim nor- malizing the internal degree with this method (using density and size) leads to better results than with the z-score used by Guimer`a & Amaral. However, the expected improvement is not clearly shown in the article. The second measure is a modification of the participation coefficient, taking the form of a normalized vector representing the participation of a node to each community of the network. They also intro- duced a dispersion index that is a normalized vector repre- senting the participation of a node to each community he is connected to. The limitations we highlighted for the origi- nal participation coefficient are also valid for these two vari- ants: none of them is able to model all aspects of the external connectivity of a node. The first measure still encapsulates all aspects of the external connectivity, while the second one deals simultaneously with its heterogeneity and diversity (cf. Section 3.2.1). Furthermore, Klimm et al. do not propose a method to assign roles to nodes according to their measures, even empirically, they only analyze a few small biological networks. 6 Conclusion In this article, our goal is to characterize the position of so- cial capitalists in Twitter. For this purpose, we propose an extension of the method defined by Guimer`a & Amaral [12] to characterize the community role of nodes in complex net- works. We first define directed variants of the original mea- sures, and extend them further in order to take into account the different aspects of node connectivity. Then, we propose an unsupervised method to determine roles based on these measures. It has the advantage of being independant from the studied system. Finally, we apply our tools to a follower- followee Twitter network. We find out the different kinds of social capitalists occupy very specific roles. Those of low in-degree are mostly connectors non-hubs. This shows they are engaged in a process of spreading links across the whole network, and not only their own community. Those of high in-degree are classified as kinless or connectors hubs, de- pending on their ratio r. This shows the efficiency of their strategies, which lead to a high visibility for a vast part of the network, not only for their own community. The most direct perspective for our work is to assess its robustness. In particular, it is important to know how the sta- bility of the detected communities and clusters affects the identified roles. In this study, our aim was to assess the so- cial capitalist visibility, which is independant of this goal. Furthermore, the very large size of the data prevented us to do so efficiently. On a related note, we want to apply our method to other smaller systems, in order to check for its general relevance. The method itself can also be extended in two ways. First, it would be relatively straightforward to take link weights into account (although this was not needed for this work). Second, and more interestingly, it is also pos- sible to adapt it to overlapping communities (by opposition to the mutually exclusive communities considered in this work) in a very natural way, by introducing additional in- ternal measures symmetrical to the existing external ones. This could be a very useful modification when studying so- cial networks, since those are supposed to possess this kind of community structures, in which a node can belong to sev- eral communities at once [1]. References 1. S. Arora, R. Ge, S. Sachdeva, and G. Schoenebeck. Finding over- lapping communities in social networks: Toward a rigorous ap- proach. In EC'12, 2012. 2. V. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast J. Stat. Mech., unfolding of communities in large networks. 10:P10008, 2008. 3. B. Bosker. Twitter: We now have over 200 million accounts, 2011. 4. Ronald S. Burt. Detecting role equivalence. Social Networks, 12(1):83 -- 97, 1990. 5. Meeyoung Cha, Hamed Haddadi, Fabricio Benevenuto, and Kr- ishna P. Gummadi. Measuring User Influence in Twitter: The Mil- 12 Nicolas Dugu´e et al. lion Follower Fallacy. In ICWSM '10: Proc. of int. AAAI Confer- ence on Weblogs and Social, 2010. 6. D. Davies and D. Bouldin. A cluster separation measure. IEEE Trans. Pattern Anal. Mach. Intell., 1(2):224 -- 227, 1979. 7. N. Dugu´e and A. Perez. Social capitalists on Twitter: detection, evolution and behavioral analysis. Social Network Analysis and Mining, 4(1):1 -- 15, 2014. 8. Nicolas Dugu, Vincent Labatut, and Anthony Perez. Identifying the community roles of social capitalists in the twitter network. In IEEE/ACM International Conference on Advances in Social Net- work Analysis and Mining (ASONAM), pages 371 -- 374, Beijing, CN, 2014. 9. S. Fortunato. Community detection in graphs. Phys. Rep., 486(3- 5):75 -- 174, Feb 2010. 10. G. Gaylord Simpson. Mammals and the nature of continents. Am. J. of Science, (241):1 -- 41, 1943. 11. S. Ghosh, B. Viswanath, F. Kooti, N. Sharma, G. Korlam, F. Ben- evenuto, N. Ganguly, and K. Gummadi. Understanding and com- bating link farming in the twitter social network. In WWW, pages 61 -- 70, 2012. 12. R. Guimer`a and L. Amaral. Functional cartography of complex metabolic networks. Nature, 433:895 -- 900, 2005. 13. Paul W. Holland, Kathryn Blackmond Laskey, and Samuel Lein- Social Networks, hardt. Stochastic blockmodels: First steps. 5(2):109 -- 137, 1983. 14. R. Holt. Twitter in numbers, 2013. 15. Akshay Java, Xiaodan Song, Tim Finin, and Belle Tseng. Why we twitter: understanding microblogging usage and communities. In Proceedings of the 9th WebKDD and 1st SNA-KDD 2007 work- shop on Web mining and social network analysis, WebKDD/SNA- KDD '07, pages 56 -- 65, 2007. 16. Florian Klimm, Javier Borge-Holthoefer, Niels Wessel, Jrgen Kurths, and Gorka Zamora-Lpez. Individual nodes contribution to the mesoscale of complex networks. New Journal of Physics, 16(12):125006, 2014. 17. A. Lancichinetti, M. Kivela, J. Saramaki, and S. Fortunato. Char- acterizing the community structure of complex networks. PLoS ONE, 5(8):e11976, 2010. 18. Kyumin Lee, James Caverlee, and Steve Webb. Uncovering social spammers: Social honeypots + machine learning. In Proceedings of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, SIGIR '10, pages 435 -- 442, New York, NY, USA, 2010. ACM. 19. Kyumin Lee, Brian Eoff, and James Caverlee. Seven months with the devils: A long-term study of content polluters on twitter. In In- ternational AAAI Conference on Weblogs and Social Media, 2011. 20. E. A. Leicht and M. E. J. Newman. Community structure in di- rected networks. Phys. Rev. Lett., 100(11):118703, 2008. 21. W.-K. Liao. Parallel k-means data clustering, Oct 2009. 22. Franois Lorrain and Harrison C. White. Structural equivalence of individuals in social networks. The Journal of Mathematical Sociology, 1(1):49 -- 80, 1971. 23. M. E. J. Newman and M. Girvan. Finding and evaluating commu- nity structure in networks. Phys. Rev. E, 69(2):026113, 2004. 24. S. Rodgers. Behind the numbers: how to understand big moments on Twitter, August 2013. 25. J. Scripps, P.-N. Tan, and A.-H. Esfahanian. Node roles and com- munity structure in networks. In WebKDD/SNAKDD, pages 26 -- 35, 2007. 26. B. Suh, L. Hong, P. Pirolli, and E. H. Chi. Want to be retweeted? large scale analytics on factors impacting retweet in twitter net- work. In SCA'10, pages 177 -- 184, 2010.
1605.01895
1
1605
2016-05-06T11:29:30
Sentiment-enhanced Multidimensional Analysis of Online Social Networks: Perception of the Mediterranean Refugees Crisis
[ "cs.SI" ]
We propose an analytical framework able to investigate discussions about polarized topics in online social networks from many different angles. The framework supports the analysis of social networks along several dimensions: time, space and sentiment. We show that the proposed analytical framework and the methodology can be used to mine knowledge about the perception of complex social phenomena. We selected the refugee crisis discussions over Twitter as the case study. This difficult and controversial topic is an increasingly important issue for the EU. The raw stream of tweets is enriched with space information (user and mentioned locations), and sentiment (positive vs. negative) w.r.t. refugees. Our study shows differences in positive and negative sentiment in EU countries, in particular in UK, and by matching events, locations and perception it underlines opinion dynamics and common prejudices regarding the refugees.
cs.SI
cs
Sentiment-enhanced Multidimensional Analysis of Online Social Networks: Perception of the Mediterranean Refugees Crisis [UNDER REVIEW] Mauro Coletto∗†, Claudio Lucchese†, Cristina Ioana Muntean†, Franco Maria Nardini†, Andrea Esuli†, Chiara Renso†, Raffaele Perego† ∗ IMT School for Advanced Studies Lucca † ISTI - CNR Pisa email: {name.surname}@isti.cnr.it Abstract-We propose an analytical framework able to in- vestigate discussions about polarized topics in online social networks from many different angles. The framework supports the analysis of social networks along several dimensions: time, space and sentiment. We show that the proposed analyti- cal framework and the methodology can be used to mine knowledge about the perception of complex social phenomena. We selected the refugee crisis discussions over Twitter as the case study. This difficult and controversial topic is an increasingly important issue for the EU. The raw stream of tweets is enriched with space information (user and mentioned locations), and sentiment (positive vs. negative) w.r.t. refugees. Our study shows differences in positive and negative sentiment in EU countries, in particular in UK, and by matching events, locations and perception it underlines opinion dynamics and common prejudices regarding the refugees. 1. Introduction Figure 1: The routes to European countries (source Business Insider - Europol, Reuters, Washington Post, AFP, ICMPD). We are recently witnessing one of the largest movement of migrants and refugees from Asian, African and Middle- east countries towards Europe. The United Nations High Commissioner for Refugees (UNHCR) estimates one mil- lion of refugees arrived to the Mediterranean coasts in 2015 mainly from Syria (49%), Afghanistan (21%) and Iraq (8%). Figure 1 reports main routes to EU coasts and to northern Europe. The largest wave of arrivals started in August 2015 following a main route through Turkey, Greece, Macedonia, Hungary and Austria to Germany, France, UK and other northern European countries. Since then, this phenomenon has been in spotlight of the media, which have reported an increasing number of events related to migrants, such as the additional border controls established by Hungary, Austria and Germany, the several incidents happened to refugees, or the touching photo of the young Syrian boy found dead on the seashore in Turkey in September 2015. The implications of this refugee crisis are several and complex. The whole phenomenon is nowadays object of a heated and polarized debate. Understanding how the debate is framed between governmental organizations, media and citizens may help to better handle this emergency. Through the analysis of the Twitter online social network, we address the following questions: "How is the European population perceiving this phenomenon? What is the general opinion of each country? How is perception influenced by events? What is the impact on public opinion of news related to refugees? How does perception evolve in time in different European countries?" Social media may help in answering these relevant ques- tions but the volume of messages exchanged is massive and the extraction of sentiment is challenging. Basic anal- yses of the phenomenon through Twitter have been already performed by media in a simplistic way, mainly through manual analysis of content, news and hashtags for small samples of tweets. For instance, the usage of terms refugees and migrants have been compared1 in offline and online media. The former indicates someone forced to leave her country to avoid war or imprisonment, the latter is instead someone moving from his/her country searching for better 1. https://storify.com/ImagineEurope/what-is-associated-with-europe living conditions. Additional basic quantitative analyses on Twitter hashtags about refugees have been performed, i.e. the #welcome refugees and #germany hashtags are used mainly from outside Germany2. These are a few examples on simple analyses performed. However a more comprehen- sive work trying to analyze the perception of users about these events, shaped across places and time, is still missing. In this work we propose an analytical framework to interpret social trends from large tweet collections by ex- tracting and crossing information about the following three dimensions: time, location and sentiment. We describe the methodology to: 1) extract relevant spatial information, 2) enrich data with the sentiment of the message and of the user (retrieved in an automatic iterative way through Machine Learning), 3) perform multidimensional analyses consider- ing content and locations in time. The approach is general and can be easily adapted to any topic of interest involving multiple dimensions. It is scalable due to the automatic enrichment procedure. For the scope of this paper we use our framework to outline the European perception of the refugee crisis. 2. Related Work There is a significant increase of interest in collecting and analysing geo-located data from online social networks (OSNs). Several works study different aspects of the geo- graphical dimension of OSNs, a broad study on this argu- ment is reported in [1]. The authors propose a framework to compare social networks based on two new measures: one captures the geographical closeness of a node with its network neighborhood and a clustering coefficient weighted on the geographical distance between nodes. Twitter geo- located posts are studied in [2] to understand how Twit- ter social ties are affected by distance. Linked users are identified as "egos" and "alters" and the distance between them is analyzed by considering the correlation with the air travel connection distance and with national borders and languages. An analogous objective is the focus of [3] where the authors infer the location of 12 million Twitter users in a world-wide dataset. Differently from the previous paper, they study the correlation between the Twitter population and the socio-economic status of a country, suggesting that high developed countries are characterized by a larger Twitter usage. The geographical properties of Twitter are also useful to study the movements of people and migration phenomena. A study of mobility using geo-located Twit- ter messages is presented in [4]. The authors introduce a detailed study aimed at estimating international travelers based on the country of residence. They identify a number of characteristics including radius of gyration and mobility rate to describe the traveling phenomena thorough the Twitter lens. Authors in [5] show how the analysis of 500,000 geo-located Twitter users may help to predict the migration turning points and to better understand migration in OECD 2. http://orientalreview.org/2015/09/21/who-is-twitter-luring-refugees-to- germany/ countries. The authors estimate the migration rate of users moving from one "home" country to another country. The reported results depict some interesting trends such as the decrease of migration from Mexico to US, consistent with official estimations. Twitter is also exploited to better understand how the communication flows during political movements and events [6]. This work studies Twitter data covering the birth and maturation of the American anti-capitalist movement Occupy Wall Street. The authors analyze the geo-spatial dimension of tweets in combination with the communication dimension building a geographic profile for the communi- cation activity of the movement. An extensive analysis of these data produced many interesting results. For example, it appears that proximity to events plays a major role in determining which content receives the most attention in contrast to the stream of domestic political communication. Using Twitter for opinion mining and user polarization is a vast subject [7]. The sentiment analysis methods proposed are many, mainly based on dictionaries and on learning tech- niques through unsupervised [8] and supervised methods (lexicon-based method [9]) and combinations [10]. Opinion mining techniques are widely used in particular in the polit- ical context [11] and in particular on Twitter [12]. Recently new approaches based on polarization, controversy and topic tracking in time have been proposed [13], [14]. The idea of these approaches is to polarize users of a social network in groups based on their opinion on a particular topic and tracking their behavior over time. These approaches are based on network measures and clustering [13] or hashtag classification through probabilistic models [14] with no use of dictionary-based techniques. The novelty of our proposal compared to the state-of- the-art approaches is mainly the fact that we propose an analytical framework to study a mass event from Twitter messages as a combination of three dimensions: time, space and sentiment. The sentiment analysis method adopted is efficient in track polarization over Twitter w.r.t. other more generic methods. Differently from many approaches study- ing migration, we do not base our analyses on the change of location of Twitter users to measure the flow of individuals through space, but rather we aim at understanding the impact on the EU citizens perception of migrants movements. 3. The Analytical Framework In this section we introduce the analytical framework detailing the data collection phase and the analytical dimen- sions, namely the spatial, temporal and sentiment dimension. The final multi-dimensional dataset can be analyzed and queried along these axes and, more interestingly, on combi- nations between them. The main datasets and the notation used is summarized in Table 1. We used the Twitter streaming API to collect English tweets data under the Gardenhose agreement (10% of all tweets in Twitter) in period from mid August to mid Sept 2015, noted with G, out of which we selected the tweets related to the refugee crisis topic, called the relevant tweets TABLE 1: Notation summary. Symbol G T Tc+ Tc− TM L TU L U Uc+ Uc− UL Description Collected English tweets Tweets related to the refugee crisis Positive sentiment tweets Negative sentiment tweets Tweets with mentioned location Tweets with user location Users Users with positive sentiment Users with negative sentiment Users with country location # Total 97,693,321 1,238,921 459,544 387,374 421,512 101,765 480,660 213,920 104,126 47,824 (denoted as T ). We did this by manually choosing a subset of 200 hashtags frequently used and specifically related to refugees in the period of analysis. From T we extracted information about three main dimensions: spatial, tempo- ral, and sentiment-based, resulting in the set of users and tweets as reported in Table 1. 3.1. Spatial and Temporal Dimensions For each tweet we extract two kinds of spatial infor- mation if present: the user location of the person posting the message and the mentioned locations within the tweet text. The user location is structured in two levels, the city (if present) and the country. The user city is identified from the GPS coordinates or place field when available. Since GPS and place data are quite rare (about 3.5K in all dataset) we used the free-text user location field to enrich location metadata. We identified locations in the user generated field based on location data from the Geonames3 dictionary which fed a parsing and matching heuristic procedure. This tech- nique provides high-resolution, high-quality geo-location in presence of meaningful user location data [15]. The user country is collected in a similar way and when not explicitly present we infer from the city. The mentioned locations in the text are also represented at city and country level, and they are extracted from tweets' text with the same heuristic procedure as for user location. We limit our analysis to the perception and sentiment of European citizens. For the mentioned locations we are also interested to the countries involved in the migration crisis. The numbers of tweets with user location TU L and mentioned locations TM L are reported in Table 1. Finally, we extracted the publishing time of each tweet and the period of time when each user was active. This in- formation is necessary to study the evolution of the migrant crisis phenomenon and users' perception over time. 3.2. Sentiment Dimension We are interested in understanding if the user has a pos- itive feeling in welcoming the migrants or if he/she mainly expresses negative feelings (fear, worry, hate). Therefore, the dataset is enriched with information about the sentiment for both of tweets and users. 3. http://www.geonames.org/ Algorithm 1 P T R Algorithm Require: a set of users U, their tweets T with hashtags H, a set of hashtags H 0 c for each class c ∈ C Ensure: Classification of users Uc and hashtags Hc 1: procedure P T R( {H 0 2: 3: c}c∈C ) c }c∈C ← TWCLASS(cid:0){H τ c }c∈C ← USCLASS(cid:0){T τ c }c∈C ,T(cid:1) c }c∈C ,U(cid:1) 4: 5: (cid:46) Classify tweets on the basis of the used hashtags (cid:46) Classify users on the basis of the written tweets τ ← 0 repeat {T τ {U τ {H τ +1 τ ← τ + 1 c (cid:46) Find better hashtags on the basis of U τ c }c∈C ← HTCLASS({U τ c }c∈C) 6: 7: until convergence 8: return {U τ 9: 10: end procedure c }c∈C,{T τ c }c∈C,{H τ c }c∈C We consider two polarized classes c ∈ C: pro refugees (c+) and against refugees (c−). We implemented and mod- ified the algorithm P T R [14] to assign a class to each polarized tweet and to each polarized user in an iterative way by considering his/her tweets and the hashtags contained. The approach proposed in [14] is suitable to track polarized users according to a specific topic which is in our case the "refugees phenomenon". gorithm receives an initial set of polarized hastags (cid:8)H 0 The Alg. 1 illustrates the procedure. As input the al- (initial seed) for each class c and the collection of relevant tweets T . The initial seeds have been selected by analyzing the most frequent among about 95 K unique hashtags: (cid:9) c H 0 c+ = #refugeeswelcome #refugeesnotmigrants #welcomerefugees H 0 c− = #refugeesnotwelcome #migrantsnotwelcome #norefugees The initial seed H 0 c+ is used in 36K tweets, whereas hashtags in class c− are used in only 2K tweets. One of the benefits of P T R is that after only a few iterations the results are less dependent on the size of the original seed, correcting the unbalanced number of occurrences of the seed by class c in the data. The internal functions of Alg. 1 are defined as follows: • TWCLASS: a tweet is polarized to one class c only if it contains only hashtags of one class {Hc}c∈C. • USCLASS: a user is polarized to one class c only if his polarized tweets of class c are at least twice the number of his polarized tweets of any other class. • HTCLASS: an hashtag h is assigned to one class c if Sc(h) > β · Sc(cid:48)(h) ∀c(cid:48) (cid:54)= c, where Sc(h) is the conjunct probability of observing h in tweets polarized to class c, and not observing h in the tweets polarized to other classes. (For our experiments β = 0.005 was chosen after empirical evaluation.) The procedure adds information about polarization of the users by polarized hashtags extension through the analysis of all the tweets written by an already polarized users and not only the polarized tweets. The iterative procedure has been run 4 times until convergence has been reached. : We excluded from the hashtags retrieved by P T R all the hashtags which directly mention a city or a country. This is to keep the sentiment value independent by the location in computing of the polarization. The combination of location and sentiment is done by crossing the space and sentiment. Alg. 1 extracts new hashtags at each iteration. We report the most relevant retrieved hashtags in addition to seed ones after the final iteration of the algorithm for each class c: H τ =f inal c+ #campliberty #health #humanrights #marchofhope #migrantmarch #refugee #refugeecrisis #refugeemarch #refugeescrisis #sharehumanity #solidarity #syriacrisis #trainofhope H τ =f inal c− : #alqaeda #guns #illegalimmigration #illegals #invasion #isis #islamicstate #justice #migrant #migrantcrisis #muslimcrimes #muslims #no2eu #noamnesty #nomoremigrants #nomorerefugees #patriot #quran #stoptheeu #taliban #terrorism From the analysis of the extracted hashtags we can see that people with a positive sentiment prefer to use the term refugees, while people with a negative sentiment refer to them as migrants, thus minimizing the fact that they are escaping war and persecution. Users with a negative sentiment frequently use refugees and the Islamic religion together, somehow correlating, in a prejudicial way, refugees with Islam and terrorism. Finally, we observe that individ- uals with negative sentiment are often patriotic and not pro Europe. Note that the algorithm, may classify both users and tweets as non polarized, thus favoring accuracy of truly polarized content. The polarization algorithm was able to assign the sentiment to 68% of the tweets and to 66% of the users in our dataset. Regarding EU-geolocated tweets and users, the algorithm assigned the sentiment to 73% of tweets and to 71% of the users. 4. Refugees Crisis Perception Analysis Our study is driven by the analytical questions below: AQ1: Is it possible to capture the dynamic of the refugees migration? AQ2: What is the sentiment of users across Europe in relation to the refugee crisis? What is the evolution of the perception in countries affected by the phenomenon? AQ3: Are users more polarized in countries most im- pacted by the migration flow? 4.1. Spatial and temporal analysis We navigate our multidimensional dataset by first analysing the spatial and temporal dimensions to answer AQ1. These analysis can quantify the volumes of relevant Twitter messages based on the countries of the users and the country mentions, since these volumes are strong indicators of real-world events [16]. Figure 2 depicts the total number of tweets for the 20 most active countries. Since the dataset is in English most of the tweets (56.1%) come from users located in United Kingdom (UK), Figure 2: TU L per top-20 countries in log scale. Figure 3: T per day and top pieces of news. therefore in Section 4.2.3 we focus our analysis on UK. Nevertheless, a significant fraction of the data come from other countries, e.g., France (FR) accounts for 6.9% of the tweets and Germany (DE) accounts for 5.9%. Without loss of generality, our methodology can be extended to other languages by simply extending the seed hashtags used in the sentiment dimension construction. As far as the mention location is concerned, we see that users from 51 countries mention 154 countries Europe, Asia and Africa. This is analyzed in further detail in Section 4.2.3. Figure 3 illustrates tweets volumes along the temporal dimension, therefore relating volumes to events, summarized in Table 2. This clearly includes all the tweets in T and not only the geo-located ones. We observed significant volume peaks in days August 19, September 4 and September 19. As we can see from the table, these days match the major events since the UK and France security deal signed on the 18 of August regarding Calais, the drowned Syrian boy found in a beach, Hungary takes refugees to Austrian border by bus in days 2 to 4 September, and migrants breaking through Hungarian border on September 16. Next, we analyze location mention to a country related to the refugee migration. Figure 4 reports the volumes of tweets mentioning the EU countries most impacted by the GBFRDEIENLESBEITSETRGRCHDKALFINOATRUHUPT102103104Number of tweetsNumber of tweets per country08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17020000400006000080000100000120000140000160000Number of tweetsUK & FR Calais security dealDeath of Alan Kurdi & refugees cross AT-HU borderMigrants break HU border facing arrests TABLE 2: Major events during the observation period as reported by UK Newspapers 18.08 UK and France to sign Calais security deal. 20-21.08 Macedonian police teargas thousands of refugees crossing from Greece and declares state of emergency over surge in migrants & refugees. 71 dead refugees found dead in truck in Austria. Angela Merkel: Europe as a whole must help with refugees. Hungary closes main Budapest station to refugees. Alan Kurdi drowned off the shores of Turkey. 27-28.08 31.08 1.09 2.09 4-6.09 Migrants are allowed to cross the Austro-Hungarian border; 8.09 14.09 15.09 16.09 17.09 Refugees welcomed warmly in Germany. Hungarian Journalist appears to kick and trip fleeing refugees. Austria followed Germany's suit and instituted border controls; Refugee boat sinking: dozens including children drown off Greek island. Croatia started to experience the first major waves of refugees; Hungary announced it would start arresting people crossing the border illegally. Refugee crisis escalates as people break through Hungarian border; Hungary had detained 519 people and pressed criminal charges against 46 for trespassing, leading to pursue alternative routes through Croatia from Serbia. Croatia decided to close its border with Serbia. refugees route, namely Austria, Germany, Croatia, Mace- donia, Hungary, Serbia, Greece. We see that there is an interesting correspondence between the peaks of mentions and the events timeline. An evident peak for Germany, Aus- tria and Hungary is the first week of September, probably related to the issues of borders being opened to refugees. We also notice a peak of mentions of Croatia corresponding to the close of borders with Serbia. Macedonia also sees and important increase of mentions around the 20 of August, probably in relation to the Macedonian Police using gas towards refugees. Similarly, Figure 5 focuses on the mention of relevant non European countries. The number of tweets mentioning Syria increases dramatically after the aforementioned facts of September 4, Turkey has a peak the day 4 of September due probably to the young kid found on the beach. We also observe how the mentions to other countries remains more or less stable along this period to witness the fact that they were not directly related to the events reported by the media in that period and that involved mainly the Syrian refugees. From a content standpoint we tracked how hashtags Figure 5: Non-EU country mentions per day in log scale. usage is closely related to the relevant events. We have counted the frequency of each hashtag in each day, then performed a two-pass normalization. First we normalized the frequencies of hashtags on each day so as to avoid that days with lower recorded traffic are given less importance. Then we normalized each hashtag over the observed period, so that the values are comparable among different hashtags. We then measured the variance of the normalized frequencies, considering that hashtags with higher variance are those with a more unbalanced distribution among days. The hypothesis is that the unbalanced distribution is due to a close relation of the hashtag with a specific temporal event (usually one or two days). Figure 6 shows the resulting twenty highest- variance hashtags. The plot shows how this simple method allowed us to quickly spot hot topic in the observed stream of tweets and to correctly place them in time. 4.2. Sentiment Analysis To answer the analytical question AQ2, we analyze the perception of the refugee crisis phenomenon by the European countries by exploiting the sentiment and location Figure 4: EU country mentions per day in log scale. Figure 6: Highest-variance hashtags per day; intense red represents higher relative freq. 08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17100101102103104105Number of tweetsCroatiaHungaryAustriaGermanySerbiaMacedoniaGreece08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17101102103104105106Number of tweetsSyriaNigeriaIvory CoastIsraelTurkeyLybiaIraqIranHashtag / Day20150805…20150817201508192015082020150821201508222015082320150824201508252015082620150828201508292015083020150831201509012015090420150906201509092015091020150911201509122015091320150914201509152015091620150917#AshrafMassacre#bbcqt#CNNDebate#WorldHumanitarianDay#MigrantMarch#IStandWithAhmed#Aylan#AhmedMohamed#Remember911#syrianchild#HumanityWashedAshore#NeverForget911#AylanKurdi#BorderForce#WHD2015#FreeThe7#StopSilence#Ahmadiyya#BreathingChemicals#ChemicalAssad (a) Global perception (b) Internal perception (c) External perception Figure 7: Index ρ across European countries: red corresponds to a higher predominance of positive sentiment, yellow indicates lower ρ. (a) Refers to the whole dataset. (b) Is limited to users when mentioning locations in the their own country. (c) Is limited to users otherwise. dimensions of the Twitter users in our dataset. To simplify the notation in the following we refer to UL simply by U. Let us define ρ the ratio between the number of polarized users pro refugees and the number of users against refugees: ρ = Uc+ Uc− The index ρ gives a compact indication of the sentiment of a group of users. We first analyze the sentiment across the various coun- tries, and we then differentiate between discussion about internal and external locations. 4.2.1. Sentiment by country. Figure 7(a) shows the value of ρ for users belonging to the different European countries. We observe that Eastern countries in general are less positive than Western countries. In particular, Russia and Turkey have a low sentiment index probably because they are highly affected by the flow of arrivals. On the contrary, countries like Germany and Austria are more positive and this can be confirmed by the news reporting their decision of opening borders to migrants. Among western countries, France, UK, Italy and Netherlands have a low ρ index. In Italy the large amount of refugees arrived mainly through the sea directly from Lybia or Tunisia and the tone of the discussion is often characterized by negative notes. In France the sentiment confirms all worries about, probably, the situation of the Calais jungle. The situation in Greece appears very different. The sentiment is positive even though this country remains by far the largest single entry point for new sea arrivals in the Mediterranean, followed by Italy. Greece captured the attention of humanitarian organizations. Countries like Ireland, Norway or Portugal are less interested by the phe- nomenon and therefore their perception might result more positive. Even for Spain ρ is not particularly low since the problem of refugees coming from Western Mediterranean was limited in number of people compared to central and eastern countries. 4.2.2. Internal and external country perception of the refugees crisis. In the following we study the perceived sentiment in relation to the user country. We denote as internal perception the sentiment of a user when mentioning his/her own country (or a city in his/her country). External perception refers to polarized tweets with no internal refer- ences. Figure 7(b) shows the sentiment ratio ρ by country considering the internal perception, thus tweets mentioning the country itself. The ρ computation is this case refers to the users of a country who mentioned in their tweets the country itself (or indirectly a city in the country). We report only the countries for which we have a minimum amount of data. We can see that Russia, France and Turkey have a really low ρ index. We conjecture that the sentiment of a person, when the problem involves directly his/her own country, could be more negative since we are generally more critical when issues are closer to ourselves. The external perception ratio is depicted in Figure 7(b). Comparing the two maps, we see that internal and external perception is stable for UK and Sweden. Other countries have a much lower internal sentiment ρ than external, and this is the case of France, Russia and Turkey. All these countries were indeed facing many critical problems due to the arrival of refugees to their borders. The case of Calais is one of the most significant examples which could explain the case of the low ratio in France. Germany, Hungary and Greece, on the contrary, have a better internal perception which might be due to the decision of Germany to open borders to allow many people to transit from Hungary to Germany, releasing the extremely difficult situation at the national borders. 4.2.3. Sentiment Analysis: the UK case. In this section we focus on the sentiment analysis of UK citizens, as UK is the most represented country in our dataset and therefore a more detailed sentiment analyses can be done. Indeed, for UK we detail the results at the granularity of the city level. Figure 8 (left) shows the number of polarized users UL in Figure 8: Positive and negative users for different cities in UK in all period (left) before (center) and after (right) September 4. In the infographic the pies/bars show the number of polarized positive and negative users by city and the heat map in background indicates the value of ρ for the cities considered in the legend. For some cities the tweets are not sufficient to compute polarization, therefore when the heat degrades to 0 it indicates no data. the most represented cities of the country, with at least 100 polarized users in the dataset. We can see from the heatmap that there is a gradient of polarization from south to north in the sentiment. This could be due to the fact that the cities in the south, and London in particular, were more involved in the welcoming process of refugees and this might have gen- erated more discontent even though the general perception is quite positive. From the time series of ρ for UK users we see an increase in the general sentiment ratio of the country after September 4. We find news4 regarding that period from BBC and we think that the increase in the sentiment polarization could be be due mainly to the decision of the Prime Minister Cameron of acting with "head and heart" to help refugees. He allocated substantial amounts of money to humanitarian aid becoming, at that time, the second largest bilateral donor of aid to the Syrian conflict (after the US). Figure 8 (middle) and (right), shows the comparison of the opinion in UK before and after September 4, respectively. We highlight again a gradient of polarization from north to south in both cases even though the sentiment ratio ρ before and after that day is completely overturned. After September 4 the spreading of positive news in UK increases the sentiment and the volume of relevant tweets in all the country and probably government position reflects the sentiment of a vast majority of users which show support to refugees in their digital statements. 4.3. Mentioned Location Analysis The last analysis we conducted aims at answering AQ3 by studying the sentiment of the tweets when mentioning specific countries. We show how events impact differently the volume of tweets with positive or negative sentiment. Furthermore, we relate the sentiment changes to events. Figure 9 (a-c) shows the sentiment of tweets when mentioning three of the countries most impacted by the 4. Sept, 04: http://www.bbc.com/news/uk-34148913 – Sept, 16: http:// www.bbc.com/news/uk-34268604 refugees routes: Hungary, Austria and Croatia. We highlight an overall low number of mentions to these countries until the beginning of September. In the case of Hungary and Austria there is a sudden increase at the beginning of September in the overall number of mentions, predominantly for c+ with a relative increase in c−. This is mostly due to the overall positive sentiment towards the events from the previous days (the death of Alan Kurdi, the young boy found he drowned), but also due to the good news of migrants being allowed to cross the Austro-Hungarian border. The negative sentiment starts to appear, and continues to grow, until the middle of September when the negative class tends to increase more than the positive one. Here we have tweets expressing negative feelings towards border controls on behalf of Austria (13-15 Sept) and Hungary arresting refugees crossing the border illegally (15-17 Sept). Croatia comes into play towards the end of our observation period when on the September 16th becomes a valid alternative to Hungary which closed its borders with Serbia. A similar analysis has been done for Greece, Macedonia and Serbia, all countries facing critical moments, but due to lack of space we are omitting here. In Figure 9 (d-f) we look at the sentiment in relation to the mentions of UK, France and Germany. Both UK and Germany are rather balanced between positive and negative tweets. Germany presents exceptions on certain days when a positive feeling arises in support to the sad incidents related to refugees. We notice that the official media news at the end of August reported that Germany was welcoming refugees, while UK started showing a positive sentiment after the dramatic facts of Alan Kurdi and the announcement of taking in 20,000 refugees by 2020. France seems to have more negative feelings, probably due to the difficult situation in Calais and news about victims trying to across to UK while a positive peak appears in correspondence to the young victim found. (a) Tweet sentiment for Hungary (b) Tweet sentiment for Austria (c) Tweet sentiment for Croatia (d) Tweet sentiment for UK (e) Tweet sentiment for France (f) Tweet sentiment for Germany Figure 9: Tweet sentiment for country mentions per day. 5. Conclusions and Future Work We proposed an adaptive and scalable multidimensional framework to analyze the spatial, temporal and sentiment aspects of a polarized topic discussed in an online social network. As a case study we used a Twitter dataset related to the Mediterrean refugee crisis. Besides enriching tweets with spatial and temporal information, a contribution of this paper is the sentiment enrichment able to identify the polarity of users and tweets. The combination of the sentiment aspects with the temporal and spatial dimension is an added value that allows us to infer interesting insights. Our analysis revealed that European users are sensitive to major events and mostly express positive sentiments for the refugees, but in some cases this attitude suddenly changes when countries are exposed more closely to the migration flow. As a future work we intend to adapt the framework to a real-time streaming scenario and to add more dimensions such as the type of user and the network relationships in the Twitter user graph. Acknowledgments. This work was partially supported by the EC H2020 Program INFRAIA-1-2014-2015 SoBigData: Social Mining & Big Data Ecosystem (654024). References [1] S. Scellato, C. Mascolo, M. Musolesi, and V. Latora, "Distance matters: Geo-social metrics for online social networks," in Conference on Online Social Networks, ser. WOSN'10, 2010. [3] [2] Y. Takhteyev, A. Gruzd, and B. Wellman, "Geography of Twitter networks," Social Networks, vol. 34, no. 1, pp. 73 – 81, 2012. J. Kulshrestha, F. Kooti, A. Nikravesh, and K. P. Gummadi, "Geo- graphic dissection of the Twitter network," in Proceedings of the Sixth International AAAI Conference on Weblogs and Social Media, 2012. [4] B. Hawelka, I. Sitko, E. Beinat, S. Sobolevsky, P. Kazakopoulos, and C. Ratti, "Geo-located Twitter as proxy for global mobility patterns," Cartography and Geographic Information Science, vol. 41, no. 3, pp. 260–271, 2014. [5] E. Zagheni, V. R. K. Garimella, I. Weber, and B. State, "Inferring international and internal migration patterns from Twitter data," in WWW Conference, ser. WWW'14 Companion, 2014. [6] M. D. Conover, C. Davis, E. Ferrara, K. McKelvey, F. Menczer, and A. Flammini, "The geospatial characteristics of a social movement communication network," PloS one, vol. 8, no. 3, 2013. [7] B. Pang and L. Lee, "Opinion mining and sentiment analysis," Foundations and trends in information retrieval, vol. 2, no. 1-2, pp. 1–135, 2008. [8] A. Pak and P. Paroubek, "Twitter as a corpus for sentiment analysis and opinion mining." in LREc, vol. 10, 2010, pp. 1320–1326. [9] M. Taboada, J. Brooke, M. Tofiloski, K. Voll, and M. Stede, "Lexicon- based methods for sentiment analysis," Computational linguistics, vol. 37, no. 2, pp. 267–307, 2011. [10] O. Kolchyna, T. T. Souza, P. Treleaven, and T. Aste, "Twitter senti- ment analysis: Lexicon method, machine learning method and their combination," arXiv preprint arXiv:1507.00955, 2015. [11] L. A. Adamic and N. Glance, "The political blogosphere and the 2004 us election: divided they blog," in Proceedings of the 3rd international workshop on Link discovery. ACM, 2005, pp. 36–43. [12] M. Coletto, C. Lucchese, S. Orlando, and R. Perego, "Electoral predictions with twitter: a machine-learning approach," in IIR 2015, Cagliari, Italy, 2015. [13] K. Garimella, G. De Francisci Morales, A. Gionis, and M. Math- ioudakis, "Quantifying controversy in social media," in ACM Inter- national Conference on Web Search and Data Mining, ser. WSDM '16, 2016, pp. 33–42. [14] M. Coletto, C. Lucchese, S. Orlando, and R. Perego, "Polarized user and topic tracking in twitter," in SIGIR 2016, Pisa, Italy, 2016. [15] J.-P. Onnela, S. Arbesman, M. C. Gonz´alez, A.-L. Barab´asi, and N. A. Christakis, "Geographic constraints on social network groups," PLoS one, vol. 6, no. 4, p. e16939, 2011. [16] J. Weng and B.-S. Lee, "Event detection in twitter." ICWSM, vol. 11, pp. 401–408, 2011. 08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17050010001500200025003000Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-1702004006008001000120014001600Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2408-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-170100200300400500600Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-1705001000150020002500Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17050100150200250Number of tweetsNegativePositive08-0508-0608-1108-1208-1308-1508-1608-1908-2008-2108-2208-2308-2408-2508-2608-2808-2908-3009-0109-0409-0609-0909-1009-1109-1209-1309-1409-1509-1609-17020040060080010001200Number of tweetsNegativePositive
1508.06143
1
1508
2015-08-25T13:26:16
Pedestrian Static Trajectory Analysis of a Hypermarket
[ "cs.SI", "physics.soc-ph" ]
In this paper, we propose a combination of pedestrian data collection and analysis and modeling that may yield higher competitive advantage in the business environment. The data collection is only based on simple inventory and questionnaire surveys on a hypermarket to obtain trajectory path of pedestrian movement. Though the data has limitation by using static trajectories, our techniques showed that it is possible to obtain aggregation of flow pattern and alley attractiveness similar to the result of aggregation using dynamic trajectory. A case study of a real hypermarket demonstrates that daily necessity products are closely related to higher flow pattern. Using the proposed method, we are also able to quantify pedestrian behavior that shoppers tend to walk about 7 times higher than the ideal shortest path
cs.SI
cs
Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 Pedestrian Static Trajectory Analysis of a Hypermarket Kardi TEKNOMO Associate Professor Information Systems and Computer Science Ateneo de Manila University Loyola Heights, Quezon City Philippines Fax: +63-2-426-6071 E-mail: [email protected] Gloria P. GERILLA Assistant Professor Department of Civil Engineering De LaSalle University Taft Avenue, Manila Philippines Fax: +63-2-635-2693 E-mail: [email protected] Abstract: In this paper, we propose a combination of pedestrian data collection and analysis and modeling that may yield higher competitive advantage in the business environment. The data collection is only based on simple inventory and questionnaire surveys on a hypermarket to obtain trajectory path of pedestrian movement. Though the data has limitation by using static trajectories, our techniques showed that it is possible to obtain aggregation of flow pattern and alley attractiveness similar to the result of aggregation using dynamic trajectory. A case study of a real hypermarket demonstrates that daily necessity products are closely related to higher flow pattern. Using the proposed method, we are also able to quantify pedestrian behavior that shoppers tend to walk about 7 times higher than the ideal shortest path. Key Words: alley attractiveness index, static trajectory, flow pattern, questionnaire 1. INTRODUCTION With the growth of a city into larger regions and new urban city centers are repositioned, traditional markets have been transformed gradually into groceries stores, supermarkets, and hypermarket. As business becomes more competitive, new strategies to improve shopping experience as well as competing in price and product and service quality and lifestyle are necessary. For a shopping center to stay with competitive advantage, it needs better knowledge on shopping behavior and more accurate measurement on shoppers (i.e. pedestrian) behavior. While traditional demand on the shopping center are derived from counting the number of people coming in the shopping center, new types of gadgets allow shopping centers’ owners to track each pedestrian traveling around the shops over time and space. The result of such gadget is a pedestrian trajectory which is an abstraction of path taken by a pedestrian in a system from the time a pedestrian enters the system until pedestrian goes out of the system. Dynamic pedestrian trajectory can be obtained through pedestrian tracking technology such as such as GPS, Wireless (mobile phone and PDA) as well as RFID and multiple view of video camera are used for both indoor and outdoor business environment (Teknomo 2006). Such trajectory contains dynamic data along the path that the shoppers passed in the mall. The aggregation of dynamic trajectory analysis over time produces flow pattern which represents attractiveness of alleys based on the frequency of trajectory in the alley. For many practical applications, especially in developing countries where the labor cost is Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 much cheaper than electronic devices, however, such pedestrian tracking technologies and gadgets are still very much costly and require advanced knowledge on its utilization. A more straightforward technique is needed to gain flow pattern resulting from the trajectory analysis. In this paper, we propose a simple technique to obtain trajectory data merely using questionnaire survey. Compared to advanced pedestrian tracking technology, our technique has limitation to obtain only static data. Thus, we give name to such pedestrian path as static trajectory. However, in this paper we will show that such limitation does not hinder us to obtain similar results as dynamic trajectory analysis in terms of flow pattern and measurement of alley attractiveness. Using static trajectory analysis, the objective of this paper is to answer several important questions such as which alleys on the stores get more flow than the others and which product- items are preferable than the others. To be precise, our goal in trajectory analysis is to find flow pattern and finally to derive alley attractiveness. To the best of our knowledge, this is the first paper to describe about static trajectory from questionnaire survey to analyze pedestrian and shopper’s behavior. The future applications of static trajectory analysis, however, are much farther beyond what is addressed in this paper. For example, the static trajectory analysis has potential applications like the following: • Evaluation of marketing strategy: Panel data before and after marketing strategy (e.g. discount, promotion, bargain sales, etc.) could show how well the marketing strategy is. • Understanding shopper behavior: Knowing pedestrian flow data is also useful to learn the behavior of shoppers. Weekend visitors, for example, have different shopping behavior characteristics than weekday visitors, lunch time visitors mostly coming for food rather than to buy clothes. Pedestrian flow data over time explain the cyclical demand and trend of number of visitors. Business needs to know when the peak and lowest number of visitors is such that all the marketing strategy can be targeted to more appropriate customers. • Provide best design for best rental prices: to make almost all alleys have pedestrian flow beyond a minimum threshold level. Bad design if certain alleys receives only very few pedestrian flow. Flow pattern may also reveal relative shop prices (or rental fee) based on alley attractiveness. Higher flow pattern goes through the alley must be higher demand, therefore higher price per floor area. • Finding best shop location: for shop owner who would like to find a place where the pedestrian flow is the highest (but still under certain threshold of crowd level) or within some specified preferable range • Best design of shop layout: Trajectory analysis (from both real data and pedestrian simulation) may reveal preference map: which alleys on the stores get more flow than the others. The remainder of the paper is organized as follows. The next section, we describe how the data collection was done based on inventory survey and questionnaire survey, then network analysis of inventory survey is described in Section 3. In Section 4 and 5, we explain the analysis of trajectory based on combination of the questionnaire survey and inventory survey. Section 4 describes the behavioral inference of shoppers’ walking distance while Section 5 emphasizes the flow pattern and alley attractiveness indices that are important for business application. The analysis of the two surveys is combined in Section 5. Finally conclusions are Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 drawn in the last section. 2. DATA COLLECTION To proof our concept on static trajectory analysis, we utilize the data that have been gathered by Siahaan in a hypermarket in Surabaya as mere case study. This section explains only the data collection process in relation to our concept. Readers who are interested to read further about the questionnaire data can refer to (Siahaan, 2007). Two types of data collection were done. The first data collection is an inventory of the hypermarket layout configuration and products sellable along all the alleys by category. The second data collection was done using questionnaire survey. The inventory data collection was performed with the aid of an architectural layout sketch of the hypermarket where the geometrical measurement has been posted. Adjustment of the geometry (length and width in top view) was observed and noted as the surveyor walks along the alleys. Figure 1 illustrates the results of inventory survey. The hypermarket is divided into several sections such as groceries, clothing, electronics, home furnishing and so on. There is only a single main entry which is also utilized as an exit point and there is a single main exit. There are also several peripheral shops located between the two main gates. For our study, the main focus is only pedestrian behavior inside the hypermarket and ignores the trajectories toward the peripheral shops. Figure 1. Results of the inventory survey To quantify our proposed trajectory analysis above, a questionnaire survey with in depth interview was done in Giant Hypermarket Surabaya, Indonesia. The questions in the survey consist of two main parts: 1. Trajectory of each shopper in the hypermarket 2. Shopping behavior which consists of socio economic data (gender, net income, education level, type of work and age), activities in the mall (such as shopping purpose, duration, number of companions and total spending) and shopping trip characteristics such as shopping frequency. Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 For the scope of this paper, however, our focus will be on the analysis of first part of the questionnaire survey. The statistical analysis of the second parts of the questionnaire is omitted because it has been reported elsewhere (Siahaan, 2007). Figure 2. Example questionnaires and a static trajectory drawn by a shopper #160 To obtain pedestrian static trajectory via questionnaire survey, each respondent were requested to draw their route on provided floor plan or map of the shops. Figure 1 shows the example of a trajectory path drawn by a respondent. The interview was done after the respondents went out of the cashiers, thus they have completed their shopping journey inside the hypermarket. We call the trajectory static trajectory because the time information is missing. At preliminary survey, time stamp data and shopping items that they picked along the route were also included. The attempt to include time stamp along the path was done with much difficulties as most respondents have forgotten it. We also found out that the shopping items data along the route were not so accurate compared to their actual list of shopping items, therefore we disregard these data and retain only the route or static trajectories because of its high accuracy. Each interview took about 10 to 20 minutes during weekdays. As the time is not part of equation, the survey can be done even during off peak. Total respondents were 204 with only 188 respondents considered as complete and valid. The invalid data were mostly due to incomplete trajectories or their trajectories are not readable. 2. NETWORK ANALYSIS From the inventory survey and architectural layout plan, we select a position in the middle of the alleys to be the nodes of the network graph while each alley is represented by a link. Figure 3 illustrates the network graph of walkway along the hypermarket. The coding of the nodes is arbitrary but we prefer to be represented in alphabetical order from A-Z, AA-BZ and Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 1a-1j. In total we employ 88 nodes and 139 links. Some link such as BX-BZ consists of three actual nodes of the graph representation but for the analysis we only employ 2 nodes for simplicity without losing generality. Except the links that pass through the cashiers which is only one way, all the other links are two ways because the pedestrians can walk in two directions. Figure 3. Graph model of alleys in the hypermarket and sample of nodes coordinates The coordinates of each node were measured directly from the map (see example on Figure 3 right) and adjacency matrix A to represent the structure of the network was derived. Distance matrix D indicates the length of each link was computed based on Euclidean distance between coordinates of two nodes. The value of each element in a distance matrix represents length of the link (connected nodes). Unconnected vertices are represented by infinity distance. The distance matrix and the adjacency matrices are sparse matrix with most of the entries located near the diagonal elements but the diagonal elements themselves are zero. As the matrix size is rather large (88 by 88), it is valuable to scale the matrix values into a color map of an image to see the pattern. The left hand side of Figure 4 shows the distance matrix that is mapped into an image with a color scale that indicates the brighter color with a higher value. Unsymmetrical on the middle left of the image is due to one way links passing through the cashiers. The actual values of the top-left part of the distance matrix are shown on the right of Figure 4 together with the coding of the nodes. Figure 4. Mapping of distance matrix (left) and top left corner of the distance matrix (right) Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 The geometric arrangement of the alleys inside a hypermarket can be measured indirectly through statistical indices of the distribution of shortest path distances between all pairs of nodes. The shortest path distance was computed using the Floyd-Warshall algorithm (Cormen et al, 2001), which finds shortest paths between all pairs of nodes in the network graph. Figure 5 left shows the mapping of all-pairs shortest-path distance matrix into heating color map. Higher distance has heating red color and lower distance value is indicated by a cool blue color. The figure clearly shows that the shortest path distance matrix values are not only on the surrounding diagonal elements as the distance matrix. The diagonal elements are all zeros. The value of each element in the shortest distance matrix represents shortest path length between any two nodes on the network graph. The right Figure 5 illustrates the top left values of the all pair shortest path distance matrix. Comparing these values to the distance matrix in Figure 4 right, we can see that the non-infinity values of the distance matrix are actually embedded inside the shortest path distance matrix. Figure 5. Mapping of all shortest path distance matrix and top left corner of the matrix The distribution of all non-zero pairs with the shortest path distance is skewed to the right as shown in Figure 6. The mean of the distribution is 38.87 meters (95% confidence interval is between 38.87 to 38.88 meters) while the median is 36.5 meters and mode of 27.5. The maximum shortest path distance can reach up to 123.1 meters with standard deviation of 21.4 meters and inter quartile range of 30.5 meters. The Box plot on the bottom of Figure 6 indicates skewness of 0.5573 and distance above 98.75 meters can be considered as outliers. We will compare these figures later with the results of trajectories analysis in Section 4. Figure 6. Distribution of all pairs shortest path distance matrix and its box plot Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 4. STATIC TRAJECTORY ANALYSIS In this and the next sections we describe the analysis results of the questionnaire survey on trajectory path of the shopper and combine them with the results of inventory survey that has been explained in the previous section. Pedestrian trajectory can be represented as an NTXY database (first proposed by Teknomo et al 2000) which consists of a pedestrian ID number, time slice when the data is recorded from the top view 2 dimensional coordinate based on some local reference coordinate system. Notation N indicates pedestrian number, T represents time stamp where the trajectory are recorded along each coordinate (X, Y). The tracking is performed for each pedestrian over time and space. A static trajectory is a reduction of pedestrian trajectory to include only space list of coordinates for each pedestrian (i.e. only NXY). From the questionnaire survey, pedestrian trajectory is drawn by the respondent to indicate his or her journey inside the hypermarket. The trajectory drawing is then mapped into the nearest links and nodes of the network graph and coded as node sequence. For example, for a shopper with code number 160 where its trajectory was drawn in Figure 2, has nodes sequence of 1a- A-B-D-F-H-J-I-K-L-N-M-K-X-AA-AD-AG-AJ-AM-AL-AO-AP-AS-AR-AU-AV-AY-BB- BE-BH-BK-BL-BO-BN-BQ-BR-BO-BL-BI-BF-BC-AZ-1d-1c-1b as illustrated in Figure 7. Figure 7. Mapping of trajectory of a shopper into network graph produces nodes sequence. Once the mapping of the trajectories drawn by the respondents was done for all 188 samples, our static trajectories become a set of node sequences. As the coordinates of each node is known, we can easily compute the walking distance of each pedestrian inside the hypermarket from the node sequence as cumulative of length of the links along the trajectory path of the shopper. We must give note, however, that the walking distance computed is not the actual walking distance but only approximation of the walking distance because the real pedestrian trajectories has been transformed twice from actual behavior into the respondent’s drawing pad and then mapped into the network graph. Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 Figure 8. Distribution and box plot of link walking distance Figure 8 exhibits the distribution of link walking distance for all 188 shoppers in the sample. The mean of the distribution of walking distance is 265.14 meters (95% confidence interval is between 264.40 to 265.88) while the median is 267.8 meters and mode of 152 meters. The maximum link-walking distance is about 430 meters with standard deviation of 70.82 meters and interquartile range of 95 meters. The Box plot on the bottom of Figure 8 indicates skewness of -0.15 close to symmetric distribution and walking distance below 77.8 meters or above 457.8 meters can be considered as outliers. It would be remarkable to compare this outlier boundary value to the central tendency of all the pairs with shortest path distance because more than 95% of the distribution of shortest path distance is under the lower bound outlier threshold value of the link walking distance. Based on the above finding, we propose a simple index to compare the distribution of the walking distance and the distribution of non-zero all pairs shortest path distance. Our indicator is simply a median ratio λ= median link walking distance median all pair shortest path distance (1) We use median instead of mean because the skewness of the two distributions are not equal and median is more robust central tendency than mean. The value of our indicator of median ratioλ is always higher than one because we compare the aggregation of actual walking distance to the ideal shortest path walking distance for all cases. Nearer the value of λ to unity may indicate simplicity of the layout arrangement that the shoppers can go straightforward almost similar to the shortest path from any points. . It means that the actual walking distance is 7 In our case study, we have times longer than the ideal shortest path. In other words, shoppers do not walk in the shortest path which is probably a well known common sense. However, our indicator and our case study are able to yield a quantitative verification of this common sense. 36.5 7.34 = λ= 267.8 Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 5. FLOW PATTERN AND ALLEY ATTRACTIVENESS The main objective of trajectory analysis is to find flow pattern and finally to derive alley attractiveness. In this section, we will describe how we will obtain the alley attractiveness from static trajectory analysis. The alley attractiveness is useful to answer several important business questions such as which alleys on the stores get more flow than the others and which product-items are preferable than the others. First, we will clarify the terminologies and assumptions, and then we will detail the computation and results of the analysis. Using static trajectory analysis, the frequency of trajectories passing through each alley is aggregated to represent flow pattern. We called it ‘flow’ rather than ‘density’ because they come from frequency aggregation of trajectories over a time period of the study rather than within an instant of time. Some critical readers may argue that the static trajectory come from questionnaire samples which do not represent true flow or density. However, flow pattern is not equal to the flow rate in traffic engineering sense. Flow pattern is an index based on flow to show which alley has higher visitors compared to the other alleys. To distinguish from the term ‘flow rate’ that is normally used in traffic engineering studies; we give a name ‘flow pattern’ because it does indeed represent the pattern of the flow over different alleys in a business environment. The flow pattern on each alley represents demand to that particular alley as the people pass through the alley and see the display or the product items, there is a higher chance that the product items would be picked up and put into their shopping baskets. For the designer or owner of shopping center and business environment, flow patterns give very useful information on which part of stores have higher flow than the others parts. Higher pedestrian flow pattern is highly correlated to the rental fee of the stores. When the flow pattern is derived from dynamic trajectories (that can be obtained through tracking devices such as RFID and GPS), the trajectories are aggregated as frequency of passing the alley over small time interval (e.g. 5 minutes or 15 minutes) and finally aggregated again by averaging them over the time interval of the study period or over the number of the flow. This final aggregation is basically static that it does not contain any information regarding time (except the study period). Assuming the same amount of total time study period, the aggregation of static trajectories over all samples (in the limit sense that we have infinitely many of such static trajectories) would eventually approach the equivalent of the final aggregation of the dynamic trajectories. Hence, we can utilize the information of the static trajectories as an approximation of the real flow pattern. The computation of flow pattern is straightforward as counting the frequency of trajectories passing through each alley. An alley is represented by a link in the network graph. As the trajectories have been transformed into nodes sequences and, the link frequency can be put into a flow matrix F which is equivalent to the adjacency matrix A with all ones elements being replaced with the flow pattern. Table 1 shows the pseudo code for the algorithm to compute flow matrix. The flow matrix contains the flow pattern or frequency of each link on the network graph on each direction over the study time period. Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 Table 1: Algorithm for computation of flow pattern For each respondent For each trajectory For each link in the trajectory F (node origin, node destination) = F (node origin, node destination) + 1 Next link Next trajectory Next respondent The values of flow matrix F are illustrated in Figure 9. The flow matrix has a similar pattern to distance matrix (Figure 4) but the values are different. Higher flow has heat orange color and lower distance value is indicated by a cool blue color. The maximum value of flow pattern is 265 pedestrians per alley. Figure 9. Pattern of flow matrix (left) and its top right values (right) Figure 10. Spatial distribution of flow pattern To see the spatial distribution of flow pattern (in term of total trajectories passing each alley), the values of the flow patterns are divided into 4 categories to indicate very high, high, medium and low values such that they can be scaled into the thickness of the network graph as shown in Figure 10. This spatial distribution information is very useful to distinguish which alleys on the hypermarket have more flow than the others. Relating flow pattern with Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 the products and services along these alleys reveals the relationship between the design of store layout and products arrangement. Changing the store layout and rearranging goods inside the store will eventually change the trajectory movement pattern of visitors to move around and in turn alter the spatial pattern of the indices. In our case study, we attempted to correlate the spatial distribution of flow pattern with the product items on the hypermarket. Relating the products along the high alley attractiveness index of Figure 10 points out that high flow pattern is related to two factors. The first major factor is that they are located in the main major route to the items that the shoppers actually want to buy. The second factor that signifies high flow pattern is the alley containing product items of daily usage such as food, cosmetics and groceries. It is interesting to see the products that related to low alley attractiveness index (dash line in Figure 10): rice cooker, mixer, stove, fan, dispenser, furniture, bed cover, adult’s clothing and frozen products. These product items are clearly non-daily usage and therefore less attractive than the other necessity products. Though flow pattern indicates the demand of each alley, the value of flow pattern itself is affected by the number of samples. As the number of sample is affected by the study area and time, the distribution of flow pattern values would be differ. This is because flow pattern gives only absolute values for the particular alley in the study area. When we would like to compare the different supermarket or hypermarket or different study period on the same study area, we need only relative values of flow pattern. Figure 11. Distribution and box plot of alley attractiveness index values To obtain relative values of flow pattern, we need to normalize the values of flow pattern (by division toward maximum flow pattern) to make it into an index between 0 and 1. We call the normalization of flow pattern as Alley Attractiveness Index denoted by α because it represents the attractiveness of each alley. Matrix of alley attractiveness index α as formulated in Equation (2) has exactly the same pattern as flow pattern (see Figure 9) as it is only scaled by a scalar of maximum flow pattern. (2) α = F F max( ) Proceedings of the Eastern Asia Society for Transportation Studies, Vol.7, 2009 α> ≈ 0.59 0.6 Alley Attractiveness Index shows which alley inside the hypermarket has higher visitors compared to the others. The distribution of alley attractiveness indices as shown in Figure 11 is clearly skewed to the right with skewness index 1.65. The mean distribution of αis 0.2147 (95% confidence interval is between 0.2130 and 0.2163) with median 0.1455 and mode of 0.0061. The standard deviation is 0.2223 and interquartile range of 0.2121. In our case study, the values of are considered outliers. As the value of alley attractiveness index is between 0 and 1, one can easily multiply that by the maximum rent value to obtain the relative rental values of shops along the alley. 6. CONCLUSIONS We have shown a simple yet novel method to collect static trajectory data from questionnaire and analyze them into shopper’s behaviors and flow pattern or alley attractiveness indices. The alley attractiveness has been demonstrated through case study that it is useful to answer important business questions such as which alleys on the stores get more flow than the others and which product-items are preferable than the others. For our case study, daily necessity products are closely related to higher flow pattern. We also found out from our case study that the actual walking distance is about 7 times longer than the ideal shortest path. Thus, significantly we can state that shoppers do not walk in shortest path. Shopping walking distance inside the hypermarket below 77.8 meter or above 457.8 meters can be considered as unusual or outliers. ACKNOWLEDGEMENTS The authors are grateful for the questionnaire data collected by Andi Siahaan and Harry Patmadjaja from Petra Christian University, Surabaya Indonesia and also for the support of the management team from Giant Hypermarket Pondok Chandra Surabaya. REFERENCES Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2001) Introduction to Algorithms, Second Edition, the MIT Press, Cambridge. Siahaan, A. (2007) Shopping trip and pedestrian behavior in a shopping mall, BSCE thesis, Petra Christian University, Surabaya (in Indonesian). Teknomo K. (2006) How Could Recent Pedestrian Technologies Assist You? Keynote Lecture International Symposium on Lowland Technology September 12-14, 2006, Saga, Japan Teknomo, K., Takeyama, Y. and Inamura, H. (2000), Data Collection Method for Pedestrian Movement Variables, Dimensi Teknik Sipil - Journal of Civil Engineering Science and Technology, Vol. 2 no 1, pp. 43-48.
1610.06251
1
1610
2016-10-20T00:16:05
DeepGraph: Graph Structure Predicts Network Growth
[ "cs.SI", "cs.LG" ]
The topological (or graph) structures of real-world networks are known to be predictive of multiple dynamic properties of the networks. Conventionally, a graph structure is represented using an adjacency matrix or a set of hand-crafted structural features. These representations either fail to highlight local and global properties of the graph or suffer from a severe loss of structural information. There lacks an effective graph representation, which hinges the realization of the predictive power of network structures. In this study, we propose to learn the represention of a graph, or the topological structure of a network, through a deep learning model. This end-to-end prediction model, named DeepGraph, takes the input of the raw adjacency matrix of a real-world network and outputs a prediction of the growth of the network. The adjacency matrix is first represented using a graph descriptor based on the heat kernel signature, which is then passed through a multi-column, multi-resolution convolutional neural network. Extensive experiments on five large collections of real-world networks demonstrate that the proposed prediction model significantly improves the effectiveness of existing methods, including linear or nonlinear regressors that use hand-crafted features, graph kernels, and competing deep learning methods.
cs.SI
cs
DeepGraph: Graph Structure Predicts Network Growth Cheng Li1, Xiaoxiao Guo∗2, Qiaozhu Mei1,2 1School of Information, University of Michigan, Ann Arbor, MI, USA 2Department of EECS, University of Michigan, Ann Arbor, MI, USA {lichengz, guoxiao, qmei}@umich.edu 6 1 0 2 t c O 0 2 ] I S . s c [ 1 v 1 5 2 6 0 . 0 1 6 1 : v i X r a ABSTRACT The topological (or graph) structures of real-world networks are known to be predictive of multiple dynamic properties of the net- works. Conventionally, a graph structure is represented using an adjacency matrix or a set of hand-crafted structural features. These representations either fail to highlight local and global properties of the graph or suffer from a severe loss of structural information. There lacks an effective graph representation, which hinges the re- alization of the predictive power of network structures. In this study, we propose to learn the represention of a graph, or the topological structure of a network, through a deep learn- ing model. This end-to-end prediction model, named DeepGraph, takes the input of the raw adjacency matrix of a real-world network and outputs a prediction of the growth of the network. The ad- jacency matrix is first represented using a graph descriptor based on the heat kernel signature, which is then passed through a multi- column, multi-resolution convolutional neural network. Extensive experiments on five large collections of real-world networks demon- strate that the proposed prediction model significantly improves the effectiveness of existing methods, including linear or nonlinear re- gressors that use hand-crafted features, graph kernels, and compet- ing deep learning methods. Categories and Subject Descriptors H.4 [Information Systems Applications]: Miscellaneous General Terms Algorithms, Experimentation Keywords Graph Representation, Network Growth, Deep Learning 1. INTRODUCTION Today we are surrounded by real-world networks of people, in- formation, and technology. These heterogeneous, large scale, and Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Copyright 20XX ACM X-XXXXX-XX-X/XX/XX ...$15.00. fast evolving networks have provided a new perspective of scien- tific research, which has resulted in a rapid development of new theories, algorithms, and applications. How to model and predict the dynamic properties of social or in- formation networks has received considerable attentions recently [33, 42, 1, 27, 20, 35, 8]. These properties may include the size of the network or a subgraph (e.g., size of a community), the influence of cascades or contagions in the network (e.g., number of adopters), metrics of individual nodes or structures (e.g., degree or diameter), or even external properties that are not directly observed from the network structure (e.g., prestige, productivity or revenue of a node or a community). All these properties change over time, and their dynamics can be generally referred to as the growth of a network1. Indeed, the prestige of an individual node grows with the size of its ego-network. The influence range of a diffusion grows with the size of the diffusion network, subgraph of people who have adopted the diffusion. Accurate prediction of network growth has many valu- able applications. For example, predicting the growth of research communities helps scientists to identify promising research direc- tions; predicting the growth of social groups helps social network vendors optimize their marketing strategies; predicting the growth of the diffusion of a rumor helps analysts to estimate its potential damage and apply intervention in time. Taking a typical data mining perspective, most existing methods extract features from both the network itself and any external in- formation sources available. A function is learned that takes these features as input and outputs a predicted value of the network prop- erty in the future [1]. From many explorations on different genres of networks, there has been a consensus in literature that features extracted from the topological structure of the network (a.k.a., the graph) are generally very informative in these prediction tasks [1, 8]. As a comparison, other types of information, e.g., content or demographics, are only useful in certain scenarios. For example, the content of a hashtag is predictive to its diffusion [43] and ho- mophily (e.g., similar demongraphics) is predictive to the growth of social groups [7], but these effects are not generalizable to other networks and other dynamic properties. In this study, we focus on investigating the predictive power of the graph structure of a net- work on its growth. Existing structural features are typically hand-crafted based on theoretical and empirical findings in the social network literature. For example, open triads with two strong ties are likely to be closed in the near future [11]; dense communities are resistant to novel information and they grow slower than others [16]; nodes span- ning structural holes are likely to gain social capital and experience a rapid growth of its prestige and other properties [6]. Features 1The growth refers to both the increment and decrement of the dy- namic properties of the networks, i.e., positive or negative growth. such as network density, clustering coefficients, triadic profiles, and structural holes are therefore designed to implement these in- tuitions and represent the graph structure. Despite the success in predicting network growth, there are ob- servable issues of representing the topological structure of a net- work using these hand-crafted features. Some of them only de- scribe a global property of the network, such as network density or degree distribution; some of them provide a fine-grained descrip- tion of local structures but fail to capture global information, such as triads and other substructures; others lie between the two ex- tremes, such as structural holes. None of these features is able to fully represent both the local and the global structure of a graph and the complex interaction between local and global properties. On the other hand, these heuristic features usually have a limited characterization power of networks, as many networks may share the same feature representation. For example, most real-world net- works at scale may have a similar (power-law) degree distribution, and two very different networks may happen to have the same ratio of closed triangles. Taking a machine-learning point of view, we are intrigued by the following questions: what is a suitable repre- sentation of network structure and how effective is such a represen- tation when used to predict network growth? Our answers to the two questions are inspired by the recent de- velopments in deep learning and graph representation. We intro- duce a graph descriptor that is based on the Heat Kernel Signature (HKS) [31], which serves as a universal low-level representation of the topological structures of networks. HKS has been success- fully employed in representing the surface of 3D objects [13, 39]. By modeling the amount of heat flow over nodes of a network over time, HKS successfully stores both the global and the local struc- tural information of the entire network. Using a histogram to de- scribe the probability distribution of heat values at a series of time points [13, 39], isomorphic networks (networks with the same topo- logical structure) can be mapped to a unique representation at little loss of structural information. However, unlike 3D objects which are composed of polygon meshes, the structures of networks vary in shape, size, and complex local structures. To address this issue, some computations of HKS need to be approximated carefully. In- spired by the semantics of the HKS-based graph descriptors, we propose a multicolumn, multiresolution neural network that learns latent hierarchical representations of graphs on top of the HKS- based graph descriptor. The proposed deep neural network, named DeepGraph, predicts network growth in an end-to-end process. We conduct extensive experiments to evaluate the effectiveness of DeepGraph. Different growing properties are predicted for five genres of real-world networks, including cascade networks and ego- networks. Empirical results show that our method outperforms baseline approaches that use alternative graph representations, hand- crafted features, or existing deep learning architectures. High-level representations learned by DeepGraph well connect to existing find- ings in the social network literature. The rest of the paper starts with Section 2, which summarizes the related literature. In Section 3, we formulate the data mining prob- lem and describe how HKS is used to represent the network struc- ture and how the deep neural network is architected. We present the design and the results of empirical experiments in Section 4 and Section 5, and then conclude the paper in Section 6. 2. RELATED WORK Predicting the growth of networks or the evolution of certain properties of networks has been widely studied. People attempt to predict the dynamics of various network metrics or aggregated activities in a network, e.g., the number of up-votes on Digg sto- ries [33], the number of newly infected nodes in diffusion [42], the growth of a community [1, 27], or the dynamics of a cascade [20, 35, 8]. In these studies, a set of problem-specific features are usu- ally manually designed based on the network structure, textual con- tent, user demographics, historical statistics, and other sources of information. Among them, the features extracted from the network structure are both effective in individual tasks and robust across dif- ferent tasks. In this work, we limit our focus on information purely from the network structure. Finding a suitable representation of the topological structure of a network has always been a critical preliminary step of network analysis. Conventionally, a network is represented as an adjacency matrix or a sparse list of edges. However, these lossless repre- sentations do not effectively present the structural characteristics of the network. Moreover, they are sensitive to the manipulation of node orders, making networks with the same topological struc- ture mapped to different representations. Other approaches repre- sent the network structure with a series of network metrics and/or a set of structural patterns (e.g., triads [19], quads [37], or meta- paths [32]). Arbitrary higher-order substructures can be included, such as communities and structural holes. These bag-of-substructures better capture local patterns of the network structure.The major problem of this approach is that it is computationally infeasible to enumerate high-order substructures, and low-level substructures have limited representation power of the global structure of the net- work. As a result, many different networks may share the same or similar bag-of-substructures. In graph classification, a myriad of graph kernel methods are pro- posed which compute pairwise similarities between graphs [17, 2, 30, 29]. For example, graphlets [29, 36] computes the graph sim- ilarity based on the distribution of induced, non-isomorphic sub- graphs. Some other graph kernels integrate frequent graph mining into the model training process [28, 26]. Graph kernels provide an indirect representation of networks so that similar structured net- works yield a high value through the graph kernel function. The burden of graph kernels is the design of effective kernels. In the paper, we compare existing graph kernels to highlight the flexibil- ity of our model. Recently, researchers have started to apply deep learning to net- work structure representation learning. Several proposals have been made to learn a low-dimensional vector representation of individual nodes by considering their neighborhood [34, 25, 15]. Deep learn- ing techniques have also improved graph kernels for graph structure learning[40, 41, 23]. Recently, Niepert et al. [24] applied convo- lution over receptive fields constructed by sequence of neighboring nodes. These methods focus only on the local structure of a graph and graph kernels require expensive pairwise comparisons. In the paper, we compare our model to these alternative deep learning ap- proaches and show the performance advantage of our model. Heat kernels have been studied for the task of graph cluster- ing [3], graph partitioning [12], and modeling social network mar- keting processes [21]. These applications rely on the raw output of heat kernels for a variety of tasks, rather than developing a sig- nature, nor do they abstract representation of graphs base on heat kernels. In the community of computer vision, Heat kernel signa- ture has been successfully used to model 3D objects [31, 13, 39], whose surfaces are defined by polygon meshes, a network com- posed of simple convex polygons. In contrast, real-world networks are consist of various shapes, sizes, and local structures. How to represent arbitary networks with heat kernel signatures and how to predict network growth using such a signature remain a challenging question to be studied. 3. DEEPGRAPH FOR NETWORK GROWTH PREDICTION We propose a unified predictive neural network model to learn graph structure representation for network growth prediction prob- lem. The proposed predictive model, named DeepGraph, combines heat kernel signature and deep neural networks. Below we describe the two key components of our model, (1) a heat kernel signa- ture based graph descriptor and (2) a deep multi-column, multi- resolution convolutional neural network, in turn, following a brief definition of the network growth prediction problem. 3.1 Problem Formulation and Notations Given a real-world network snapshot at time t, denote its graph structure as G(t) = (V, E), with a set of nodes V and a set of edges E. A node i ∈ V represents an entity (e.g., an actor in a social network or a paper in a citation network), an edge (i, j) ∈ E represents a relationship (e.g., friendship, citation, or influence) between node i and node j. An adjacency matrix W ∈ RV ×V encodes the topological structure of the graph G. In this work, we consider the binary adjacency matrix. Its element wij is 1 if and only if (i, j) ∈ E and 0 otherwise. A network property is a function that maps a graph structure G(t) to a property value y(t) ∈ R. For example, a network prop- erty could be the number of friends given a user's Facebook ego- network. A network growth predictor is a function that maps a graph structure G(t) to a property value y(t(cid:48)) at time t(cid:48), satisfy- ing t(cid:48) > t. For example, a network growth predictor could map a user's Facebook ego-network of this year to the number of friends next year. , y(t(cid:48) The network growth prediction can be naturally formulated as a supervised learning problem. Specifically, the problem is to de- rive a network growth predictor f given a training set of tuples )}M {(G(ti) i=1 to minimize the prediction error over a test set of tuples {(G(tj ) j > tj, minj(tj) > maxi(ti), and minj(t(cid:48) i). The time order- ing constraints highlights the practical motivation that we are inter- ested in using historical data to predict future properties of current networks.2 To apply a machine learning algorithm, it is critical to first represent the graph G(t) computationally, such as using a vec- tor of features. j=1 satisfying ∀i t(cid:48) )}N i > ti, ∀j t(cid:48) j) > maxi(t(cid:48) (t(cid:48) j ) j Notice that such a representation can consider different sources of information when a particular type of real-world network is con- sidered: the graph structure, the profiles of the nodes, the semantics of the edges, the activities of the nodes, and the information con- tent being circled within the network. We focus our investigation onto solely the graph (topological) structure, as the structural infor- mation is ubiquitously available in all types of networks and it is known to be predictive to the growth of the network. We leave a multi-modal representation of the network for future work. 3.2 Heat Kernel Signature based , y j i) i i Graph Descriptors The motivation in adopting Heat Kernel Signature (HKS) is its theoretical proven properties in representing graphs: HKS is an in- trinsic and informative representation for graphs [31]. Intrinsic- ness means that isomorphic graphs map to the same HKS repre- sentation, and informativeness means if two graphs have the same HKS representation, then they must be isomorphic graphs. Our 2In practice, researchers focus on a specially case of the network growth prediction problem with the equal interval increment con- straint, t(cid:48) i − ti = C > 0 [20, 35]. j − tj = t(cid:48) HKS-based graph descriptor builds on the theoretical properties of HKS and further provides universal representations for graph with different sizes in network growth prediction. Heat kernel function. Formally, the heat kernel hz(i, j), a func- tion of two nodes i, j at any given diffusion step z, denotes the amount of aggregated heat flow through all edges among two nodes after diffusion step z3. In computer vision, graphs are stored as meshed networks and heat kernels are computed by finding eigen- functions of the Laplace-Beltrami operator [31]. However, meshed networks are not available for most real-world networks. Instead, we use eigenfunction expansion of a graph Laplacian [31, 3] to compute the heat kernel for information networks. Given a graph G = (V, E, W ), the graph Laplacian is defined as: L = D − W the summation of rows of W : Dii = (cid:80) where D is a diagonal degree matrix with diagonal entries being j wij. The normalized (1) Laplacian of the graph is given by − 1 LN = D 2 LD − 1 2 The heat kernel is then defined as V (cid:88) (2) (3) hz(i, j) = −λkzφk(i)φk(j) e k=1 and φk is the k-th eigenfunction s.t.(cid:80) where λk is the k-th eigenvalue of the normalized Laplacian LN i φk(i)2 = 1. Note that the eigenvalues might be unreal in the case of directed graphs. There has been studies on how to tackle this problem [9]. In this work, for simplicity, we convert directed graphs to undirected ones by applying W = (W + W )/2. (cid:124) Heat kernel signature. Heat kernel signature was introduced to mitigate the computation bottleneck of using heat kernel functions in representing graphs. Both heat kernel and heat kernel signature are proven to be intrinsic and stable against noises. However, the computation complexity of using heat kernel as a point signature is overwhelming since the point signature, {kt(v, .)}t>0 , is de- fined on the product of temporal and spatial domain. Heat kernel signature simplifies the computation by considering only a subset of product of temporal and spatial domain while keeping as much information as possible. Specifically, heat kernel signature reduces the computation complexity by only requiring hz(v, v) over a finite set of N diffusion steps z ∈ {z1, z2, ..., zN} for ∀v ∈ V without losing the intrinsic and informative properties. Formally, a heat kernel signature (HKS) is a matrix H ∈ RV ×N satisfying Hij = hzj (i, i) (4) These time points are sampled with equal difference after loga- rithm [31], such that log zn − log zn−1 = log zn+1 − log zn. Graph descriptor. The practical issues in combining HKS and deep neural networks are that we need a global vertex indexing to guarantee the uniqueness and that the size depends on V . We further process heat kernel signature H into a universal representa- tion independent of V using a histogram conversion. Specifically, 3The diffusion is simulated for a given graph snapshot. The heat kernel computation does not require graph snapshot at other times- tamps. The diffusion step z should not be confused with the net- work timestamp t. 3.3 Deep Graph Descriptor As information abounds in the raw representation extracted by the HKS-based graph descriptor, applying a simple regressor, e.g., linear regression, could fail to fully extract useful information from it. In contrast, deep neural networks (DNN) have achieved tremen- dous success in learning latent representations from raw inputs in a compositional hierarchy. Combining DNN and HKS-based graph descriptor together thus offers an opportunity to address the graph structure representation challenges in predicting network growth. Inspired by the semantics of the graph descriptors, we propose a deep multicolumn, multiresolution convolutional neural networks for the network growth prediction task. Multiresolution convolutions. Our model builds on the multires- olution 1-D convolution (MrConv) which maps an input matrix into a feature map matrix. Specifically, let xi ∈ Rk denote the i-th row of the input matrix. The input is then represented as x1:n = ⊕n i=1xi where ⊕ is the concatenation operator and n is the number of rows. The 1-D convolution with a filter size m apply a filter w ∈ Rmk to each possible window of m rows to produce a new feature vector c = [c1, c2, ..., cn−m+1]. The feature ci is generated from a window of m rows xi:i+m−1 by: (cid:124) ci = g(w (5) where b ∈ R is a bias term and g is a non-linear function such as a hyperbolic tangent function or a rectified non-linearity function. xi:i+m−1 + b) We have described the process by which one feature vector c is extracted from one filter. Our multiresolution convolution (Mr- Conv) layer uses multiple filters with varying filter sizes to obtain multiple resolution features. Specifically, one MrConv layer has l different convolution filter sizes {m1, m2, ..., ml}. The filter of size m generates a corresponding feature vector c(m). Feature vec- tors generated by different filter sizes are then concatenated into one vector c∗ = ⊕l i=1c(mi). Moreover, we extend each filter size to have d different filters. The final output feature map is a ma- trix O where each column is a feature vector c∗ and there are d columns. O = ∗1, c c ∗2, ..., c (6) (cid:16) ∗d(cid:17) An example of our MrConv is shown in Figure 2(a). The exam- ple MrConv layer has two different filter sizes {1, 2}. Each filter size has three different filters, whose feature vectors form different columns in the final feature map. Multiple multiresolution convo- lution layers are stacked to form our model. Multicolumn model. Inspired by the different semantics of rows and columns in the HKS-based graph descriptor, our model de- ploys a two network-column structure, as shown in Figure 2(b). One column uses multiresolution 1-D convolution (MrConv) oper- ations over the graph descriptor bins and the other one uses MrConv over diffusion times. The two columns extract different features from the graph descriptors at multiple resolution scales. Intuitively, the first column extracts statistical features of the density dynamics in diffusion. The second column extracts features on static den- sity pattern for different diffusion steps. Both kinds of features reflect the topology of the underlying graph structure, but explain the structure topology from different perspectives. A single column convolutional neural network can hardly extract such two kinds of features successfully. The feature maps from the two columns are then concatenated and passed through multiple dense (i.e. fully-connected) layers with non-linear activation functions. The output from the multiple (a) (b) (c) (d) Figure 1: Examples of HKS-based graph descriptors. The first row shows our graph descriptors for graphs in the second row. Figure (a) and (b) are subnetworks from Facebook [38]. Figure (c) and (d) are some authors' collaboration networks built from ACL Anthology [10]. we use histograms to estimate the distribution of HKS values in each column4. By denoting NB the number of bins used in the histogram, we obtain a universal descriptor S ∈ RNB×N . Unlike HKS, the new descriptor is independent of vertex ordering and ver- tex number. We call this final matrix graph descriptor, S(G), as it is adapted to describe information networks. Figure 1 shows four examples of our graph descriptors for real world graph structures. Graph descriptor vs. adjacency matrix. We have described the process in converting an adjacency matrix into our graph descrip- tor, which is then passed through a deep neural network for further feature extraction. All computation in this process is to obtain a more effective low-level representation of the topological structure information than the original adjacency matrix. First, isometric graphs could be represented by many different adjacency matrices, while our graph descriptor would provide a unique representation for those isometric graphs. The unique repre- sentation simplifies the neural network structures for network growth prediction. Second, our graph descriptor provides similar representations for graphs with similar structures. The similarity of graphs is less pre- served in adjacency matrix representation. Such information loss could cause great burden for deep neural networks in growth pre- diction tasks. Third, our graph descriptor is a universal graph structure repre- sentation which does not depend on vertex ordering or the number of vertexes, while the adjacency matrix is not. Time complexity. The major overhead of computing graph de- scriptors lies in the calculation of eigenvectors. The time complex- ity of computing eigenvectors is O(KV 2) where K is the num- ber of eigenvectors. Our graph descriptors finish in acceptable time frame for real world network data. The data description and time complexity analysis are in Section 4. Semantics of graph descriptor. The rows and columns in our graph descriptor reflect the network topology from different per- spectives. The rows express the heat density dynamics over diffu- sion steps, and the columns capture the static heat density patterns for a given diffusion step. Successive rows or columns express higher-order properties of the topology structure information. Such representational properties motivate the adoption of row-wise and column-wise convolution networks for feature learning. 4The bin ranges are aligned column-wise on the training data. Figure 2: (a) An example of the multiresolution convolution unit with two kernel sizes. (b) An example of the multicolumn, multires- olution deep neural network model for network growth prediction with two convolution layers. dense layers are then passed through a final linear fully-connected layer with only one output unit. The output unit y is thus the net- work growth prediction of our model. 3.4 End-to-End Training Let McMrConv(., θ) denote the multicolumn multiresolution con- volutional neural network with parameters θ. The final output of our neural network given a graph Gk is represented as: yk = McMrConv(S(Gk), θ) (7) Given a training data set {(Gk, yk)}K is trained to minimize the average squared error. k=1, the deep neural network K(cid:88) (cid:16) k=1 L(θ) = 1 K McMrConv(S(Gk), θ) − yk (8) (cid:17)2 The HKS-based graph descriptor and the deep neural network as- sembles DeepGraph, an end-to-end deep architecture to predict net- work growth based on graph structure. 4. EXPERIMENT SETUP We compare our model with existing approaches, including hand- crated feature based linear or nonlinear regression, graph kernels and alternative deep learning approaches, on the network growth prediction problem. We then evaluate variants of our model to as- sign the credit of the two key components, the HKS-based graph descriptor and the deep neural network. 4.1 Data sets When selecting real-world data sets for evaluation, we consider both popularity and diversity of the application scenarios. The five data sets we choose include social networks, scientific collabora- tion networks, information diffusion networks, and entertainment networks. Note that to train and test the network growth prediction algorithm, it is desirable to obtain a large number of time-variant networks, which is not directly available (e.g., there is one global Facebook network). So following [40], from each large network we extract the ego-networks (subgraph consisting of the neighbors of an "ego" node) of many individual nodes. The statistics of these data sets are presented in Table 1. Please note that due to the di- verse nature of the data sets and the various precision of timestamps available, it is hard to apply an unified time frame for all data sets. Viewed from another perspective, this helps us evaluate the flex- ibility and generality of our methods, verifying whether it can be applied to any length and granularity of time frames. 12990 890 2092 399.9 397.5 436 6800.8 6764.4 7499.2 15258 1283 3273 147.6 167.3 165.8 1439.2 1626.1 1620.9 Table 1: Statistics of the data sets. Dataset Facebook YouTube AAN IMDB Weibo 12500 14614 train 8426 1092 1017 val 713 2555 2407 test 1722 71.1 197.3 train 271.4 76.6 208 val 302.4 test 216 64.9 402.4 55.6 train 2079.8 7801.5 2327.2 7847.7 val 95.8 3321.8 7964.5 100.1 test 15.4 train val 16.7 test 14.1 train val test train val test train val test all 1.3 1.3 1.3 1 1 0.9 2000 2001 2002 2001 2002 2003 1.2 1.2 1.2 0.9 0.9 0.9 2009 2010 2011 2010 2011 2012 2007.6 2007.7 2007.8 2007.10 2007.11 2007.12 2 1.8 1.9 5h 5h 5h 3h 3h 3h - 2007.2 2007.3 2007.4 2007.4 2007.5 2007.6 2 9 10.8 9.3 2.4 2.2 2.1 3.6 3.8 3.4 1.7 1.8 1.6 3 2 2 # graphs Avg. nodes Avg. edges Avg. growth Avg. scaled growth1 Graph time2 Growth time3 k-hop ego-net4 1. Avg. scaled growth scales label y to log2(y + 1) [20, 35]. 2. Graph time of 2007.6 means the graph is built by taking the snapshot of Jun. 1, 2007. For diffusions in Weibo, we use the first 5 hours to build graph, and the next 3 hours to compute growth. 3. Growth time of 2007.10 means the growth is computed between its corresponding graph time to Oct. 1, 2007. Graphs in train/val/test set do not overlap. 4. k-hop ego-net for AAN is set to 3, due to its small size of 2-hop ego-nets. Weibo contains diffusion networks rather than ego-nets. We follow the procedure described in [40] to construct ego-nets. The Facebook data set is collected from the New Orleans networks [38], where nodes are Facebook users and edges are friendships. We de- rive the snapshot of ego-networks for each user according to the timestamps listed in Table 1, which is used to predict the number of new friends this user made in the next four months. As the YouTube [22] data set also describes user friendships, it #1 conv. #2 conv. dense layers bins *mes bins *me #1 conv. #2 conv. #1 conv. #2 conv. #1 conv. #2 conv. convolu*on layers over bins convolu*on layers over *mes output unit input input HKS transpose Graph Structure input feature map output kernel size 1 kernel size 2 kernel size 1 (a) (b) follows the same setting as Facebook. The AAN data set [10] is built upon scientific publications from the ACL Anthology5, where nodes are authors and edges are col- laboration. Each author's ego-nets are extracted to predict her h- index in the next year. IMDB is a movie co-star data set6, where nodes are actors or actresses, and an edge is formed if they appear in the same movie. The ego-nets of each actor/actress is used to predict the number of new movies the actor/actress produced in the next year. The Weibo data set [44] contains a set of Sina Weibo users with their complete following-followee relationships, as well as 300,000 retweeting paths among these users. For an original tweet we con- struct its diffusion network, which is the subgraph (of the following- followee graph) with users who retweeted the tweet within the first 5 hours of the original tweet. We then predict the growth of this diffusion network in the next 3 hours (i.e., the number of new users who retweet this tweet). For simplicity, we ignore the direction of the edges and treat all graphs as undirected. To examine whether we can truly predict future growth, we make sure of two important points: (1) the period to compute growth for test set is always later than that for training set; (2) one graph can only appear in one of the training, validation and test set. For Weibo data set, we sort all diffusion graphs by time of occurrence, and take the earliest 80 percent graphs for training, the next 5 percent for val- idation, and the last 15 percent for testing. For other data sets, for each node in the global network, they are randomly assigned to the training/validation/test set with probability of 0.8/0.05/0.15. Based on which set they are in, their ego-nets and growth are computed according to the time listed in Table 1. If a node has not yet been created for the given time, it is simply removed. We notice that the growth of all the networks in general follows a power-law distribution, where a large number of networks did not grow at all. Therefore we downsampled 50% graphs of each train/val/test set with zero growth (to the numbers shown in Ta- ble 1) and applied a logarithm transformation of the outcome vari- able (network growth), following [20, 35]. The network growth are scaled logarithmically for two reasons. First, baseline methods with linear regression are sensitive to extremely large outcomes. Second, when a network grows to a considerably large scale, we care more about its scale rather than the exact number. Please note that our method is not limited to ego-networks – data set Weibo is a set of diffusion graphs of tweets. 4.2 Evaluation Metric We use mean squared error (MSE) as our evaluation metric, which is a common choice for regression tasks. Specifically, denote y a prediction value, and y the ground truth value, the MSE is: n(cid:88) i=1 MSE = 1 n (yi − yi)2 (9) As noted before, y in above equation is a scaled version of the original value yo, that is y = log2(yo + 1). 4.3 Baseline methods We compare DeepGraph with methods from two categories: feature- based methods used for network prediction tasks, and alternative graph representation methods. Feature based. Many structural features have been designed for various network prediction tasks [1, 27, 35, 8]. We select from them those that could be generalized across data sets, including: 5http://aclweb.org/anthology/ 6http://www.imdb.com/ Frequencies of k-node substructures (k ≤ 4)[37]. This counts the number of nodes (k = 1), edges (k = 2), triads (e.g., the number of closed and open triangles) and quads. Other network properties: average degree, the length of the short- est path, edge density, the number of leaf nodes (nodes with degree 1), the number of leaf edges, the average closeness of all nodes, clustering coefficient, diameter, and the number of communities obtained by a community detection algorithm [4]. Graph kernels. Following [24], we compare with four state-of- the-art graph kernels: the shortest-path kernel (SP) [5], the random walk kernel (RW) [14], the graphlet count kernel (GK) [29], and the Weisfeiler-Lehman subtree kernel (WL) [30]. In our experi- ment, the RW kernel does not finish after 10 days for a single data set, so we exclude it for comparison. This exclusion is also ob- served for the same reason in [24, 41]. -linear and -deep. Feature based methods and graph kernels are usually trained on SVMs. We report linear regression instead, as SVM empirically generates poor results for our regression tasks. We append -linear to each method to indicate usage of linear re- gression. To obtain even stronger baselines, we apply deep learning to both feature vectors and graph kernels, indicated by -deep. Smoothed graph kernels. Yanardag et al. [41] apply smoothing to graph kernels, which extends their method of deep graph ker- nels [40] by considering structural similarity between sub-structures. We report smoothed results only on deep neural networks as it out- performs alternatives empirically. PSCN, which applies convolutional neural networks (CNN) to locally connected regions from graphs [24], achieving better results over graph kernels on some of the classification data sets. Hyper-parameters. All hyper-parameters are tuned to obtain the best results on validation set. For linear regression, we chose the L2-coefficient from {100, 10−1, ..., 10−7}. For neural network re- gression, the initial learning rate is selected from {0.1, 0.05, 0.01, ..., 10−4}, the number of hidden layers from {1, 2, ..., 4}, and the hidden layer size from {32, 64, ..., 1024}. The size of the graphlets for GK is chosen from {3, 4} (higher than 4 is extremely slow), the height parameter of WL from {2, 3, 4}, the discount parameter for smoothed graph kernels from {1, 0.8, ..., 0}. Following [24] for PSCN, the width is set to the average number of nodes, and the receptive field size is chosen between 5 and 10. Notes. Please notice that in our experiments we are not iden- tifying the nodes in the networks or using the information of the nodes outside the network itself. Of course, knowing the presi- dent of United States is in the network provides more confidence on its growth. We choose not to identify nodes because (1) this study focuses on investigating the predictive power of the topolog- ical structure of networks, and (2) in practice information about individual nodes may not be available for privacy reasons. For the same reasons, we do not include any information other than the network structure (e.g., content of tweets, or historical metrics of the network) in the prediction task, even though including more information may improve the prediction accuracy. It is also worth mentioning that even though most networks in our data sets are subgraphs of a much larger network (e.g., the Facebook friendship network), we only use the structure within the subgraphs and do not touch the outside structure of the global net- work. This is because partitioning a large network into subgraphs is just a way to create abundant networks for training and testing the model. In reality we may make predictions of an entire network, or the global structure outside a network may not be observable. 4.4 DeepGraph Model Parameters Hyper-parameters and Preprocessing. For parameters included in HKS, we set them to default values across all data sets without further tuning. In Equation 4, we set t1 = 0.1, tN = 25, and N = 64. Number of bins NB is set to 64. In order to compute his- tograms, HKS values above +1.2 and below −1.2 standard devia- tion are respectively put to the first and last bins. Values in between are assigned to the remaining equally divided 62 bins. We perform standard normalization for the histograms of graphs. Each histogram is preprocessed by pixel-wise normalization. We compute the mean and standard deviation for each pixel over the training data set. Then each pixel is normalized by subtracting the corresponding mean value and being divided by sd7 . We initialize the parameters of the neural networks using a Gaus- sian distribution with zero mean and unit standard deviation. An adaptive optimizer, Adam, is used to optimize the parameters of the neural networks. Default hyper-parameters of Adam are used [18]. Structure related hyper-parameters of DeepGraph is set to be the same across datasets. There are two multiresolution convolution layers for each network column, with number of filters 32 and 16. For each convolution layer, we apply three sizes of filters, which are 2, 4, and 6. TanH is used as the activation function. There are two fully connected layers both of size 256. Dropout is applied to the last two dense layers with probability of 0.5. Other learning parameters are listed in Table 2. Table 2: Setup of hyper-parameters for DeepGraph. Facebook YouTube AAN IMDB Weibo 0.005 1e-5 1e-6 5e-4 0.005 0.001 L2-coefficient Init learning rate 1e-5 0.005 1e-5 0.01 4.5 Variants of DeepGraph To assign the credit of each key component in our DeepGraph model, we also experiment with some of its variants, by feeding our graph descriptor (GD) to a linear regressor (GD-linear), a standard convolutional neural network (GD-CNN), and a multilayer percep- tron (GD-MLP). Hyper-parameters for these models are tuned sim- ilarly as baselines. 5. EXPERIMENT RESULTS 5.1 Overall performance The overall performance of all competing methods across data sets are displayed in 3. We make the following observations. First, integrating graph descriptor with deep learning, our method Deep- Graph outperforms all competing methods significantly. This em- pirically confirms that graph descriptor could preserve more in- formation of the network structure than bag-of-substructures, both globally and locally. In contrast, utilizing manually designed fea- tures could lead to loss of information. GD-MLP and GD-CNN have already gain improvement over the strongest baseline on most of the data sets, while DeepGraph can further improve the performance by utilizing the semantics of HKS-based graph descriptor. This shows that we can indeed ex- tract more useful features by applying column-wise and row-wise convolution over graph descriptors. Comparing with GD-linear, which applies linear regression on top of the HKS-based graph descriptor, DeepGraph, GD-MLP, and GD-CNN performs significantly better. This indicates that the ef- fectiveness of the HKS-based graph descriptor has to be utlized by 7 = 10−8 is added to the denominator to avoid numeric issues. Table 3: Performance measured by MSE (the lower the better), where original label y is scaled to log2(y + 1). Dataset Facebook YouTube Feature-deep 2.623 1.107 2.633 1.116 Feature-linear GK-smooth 1.313∗∗∗ 2.675∗∗∗ 1.315∗∗∗ 2.671∗∗∗ GK-deep 1.335∗∗∗ 2.736∗∗∗ GK-linear WL-smooth 1.158∗∗∗ 2.659 1.165∗∗ WL-deep 2.654 1.331∗∗∗ 2.702∗∗∗ WL-linear 2.615 SP-smooth 1.138 1.155∗∗ 2.607 SP-deep 1.179∗∗∗ SP-linear 2.613 2.534∗∗∗ 1.117 PSCN AAN 0.421 0.439 0.480∗∗∗ 0.492∗∗∗ 0.519∗∗ 0.434 0.437 0.445 0.422 0.428 0.432 0.425 IMDB 0.527 0.525 0.561∗∗ 0.565∗∗ 0.576∗∗∗ 0.536 0.532 0.596∗∗∗ 0.530 0.531 0.535 0.528 Proposed methods 0.583∗∗∗ GD-linear 0.513∗ GD-MLP 0.512∗ GD-CNN DeepGraph 1.068∗∗(cid:79) 2.409∗∗∗(cid:79)(cid:79) 0.379∗∗∗ 0.508∗∗∗(cid:79) 1.174∗∗∗ 2.750∗∗∗ 2.427∗∗∗ 1.082∗ 2.429∗∗∗ 1.087 0.587∗∗∗ 0.394∗∗∗ 0.391∗∗∗ Weibo 2.244 2.346∗∗∗ 3.011∗∗∗ 3.061∗∗ 3.242∗∗∗ 2.397∗∗∗ 2.403∗∗∗ 2.411∗∗∗ 2.315∗∗∗ 2.322∗∗∗ 2.359∗∗∗ 2.441∗∗∗ 2.812∗∗∗ 2.080∗∗∗ 2.114∗∗∗ 1.961∗∗∗(cid:79)(cid:79)(cid:79) "***(**)" means the result is significantly better or worse over Features-dp according to paired t-test test at level 0.01(0.1). "(cid:79)" means DeepGraph-multi is better than the better one between DeepGraph-MLP and DeepGraph-CNN. a "deeper" model which explores the convolutions and non-linear transformations of the low-level representation. Comparing feature based methods with other baselines, the for- mer exhibit strong prediction power. Incorporating both local and global information of the networks, the hand-crafted features are very indicative of the network growth, which is hard for automatic methods to compete. When trained on deep networks, the performance of graph ker- nels could be improved over their linear version. Smoothing ker- nels can further bring in some improvement. By applying convolu- tion over locally connected regions of the graphs, PSCN can beat many graph kernels on most data sets. These results are consistent with previous studies [24, 41]. 5.2 Computational Cost of DeepGraph Training of DeepGraph is very fast. The models are converged in less than 10 minutes on a Titan X GPU. The major overhead of DeepGraph is the computation of the HKS-based graph descrip- tors. We empirically measure the computation time for all data sets on a server with 2.40 GHz CPU and 120G RAM. The graphs in our data sets have size as large as 5,000 nodes and 200,000 edges, which is enough for most network prediction problems [20, 27, 42]. The generation of graph descriptors takes an average of 0.86 hour per data set. In contrast, the strongest baseline, feature based method, takes 7.9 hours on average to generate all features. While the strongest graph kernel, SP, takes nearly 5 days. 5.3 Feature Analysis It has been shown empirically that DeepGraph could well ab- It is intriguing to stract high-level features to represent graphs. know whether these learned features correspond to well-known struc- tural patterns in network literature. To this end, we select some of the network properties manually computed for the feature based method. Note that we work only on test set, as we care more about the prediction performance. These properties characterize either global or local aspects of networks, and are listed in Figure 3. (a) # edges. (b) # closed triangles. (c) # leaf nodes. (d) # open triangles. (e) # communities. (f) Edge density. (g) Growth (Size). (h) Growth (h-index). Figure 3: Feature visualization. One point is a graph in test set. The layout is produced from high-level representa- tions of DeepGraph, colored using structural, hand-crafted network properties, which are presented under each sub- figures. Red (blue) color indicates high (low) property val- ues. The left column displays graphs from Weibo, while the right column shows AAN. The bottom row displays the ground-truth growth of the network properties. The feature vectors output by the last hidden layer of DeepGraph are fed to t-SNE [4], a dimensionality reduction algorithm for visu- alizing high-dimensional data sets. The visualizations of data sets Weibo and AAN are displayed in Figure 3. We obtain similar re- sults on other data sets, which are omitted to conserve space. To connect the hand-crafted structural properties with the learned high-level features, we color individual graphs by the values of these properties (e.g., network density). Patterns on the distribu- tion of colors could suggest a connection between learned features and the network property. As we could observe, properties on left column of Figure 3 ex- hibit some related patterns. For example, in the Figure 5(e), the graphs clustered to the top have the fewest communities, while graphs in the bottom right corner have the most. This is interesting as an ego-net with a larger number of communities implies that the graph center lies in between bigger communities, which are likely to be structural holes in the global network. According to social network literature [6], nodes spanning structural holes are likely to gain social capital, promoting the growth of its ego-net. Indeed, when we compare the color scheme of 5(e) with 5(g), which plots the actual growth of the network sizes, we can see that the number of communities in a diffusion network is indeed positively corre- lated with the growth of the diffusion network. Top three figures on the right column also show some common characteristics: the left cluster forms a band, with lower values on the bottom and higher ones on the top. Graphs with higher values mostly cluster to the right area. These common patterns suggest that the high-level features out- put by deep learning have indeed captured these network proper- ties. As we include both local and global properties, we demon- strate from another perspective that DeepGraph could learn global- to-local structural information from the network topology. Com- paring to 5(h), which plots the actual growth of the h-index of the ego-nodes, we can see the correlation of the features are much weaker than those in the left column (Weibo network). This is not surprising, as h-index is a property that can not be directly derived from the network itself, and thus the prediction task is much harder. Some additional observations can be made from Figure 3. First, as the number of open and closed triangles are actually features of graphlets [29, 36], we can see that DeepGraph has automatically learned these useful features without human input. Second, since edge density is a function of the number of edges and nodes, Deep- Graph not only learns the number of edges and nodes (we do not show the node property in Figure 3, but this is true), but also their none-linear relationship that involves division. 5.4 Error Analysis Graphs in our data sets typically have hundreds of nodes, which is hard for humans to directly generalize useful information from a set of graphs. As a compromise, we characterize graphs by a set of simple network properties, e.g., the number of nodes, edges, and edge density. We first want to investigate graphs for which DeepGraph makes more mistakes than baseline, and also the other way around. Here we use the strongest baseline, feature-based method as our refer- ence. The procedure is as follows: among graphs where Deep- Graph has smaller MSE than the baseline, we select the top 100 with the largest MSE differences between the two methods. For these top graphs, we compute the average of the properties men- tioned above. Similar procedure is also applied to the baseline. The statistics of graphs where either DeepGraph or the base- line significantly outperforms the other are higher than the average statistics of each data set. This could result form the skewed distri- bution of the data set – a large number of graphs are of smaller size, leading to more training instances of small graphs. We also observe that both methods perform reasonably well on denser networks. On the other hand, graphs on which DeepGraph performed better have relatively larger sizes than those where the baseline performed better. This indicates that the HKS representation has an advantage on larger graphs, the structures of which are more difficult to be represented by a bag of local substructures. 6. CONCLUSION We present a novel neural network model that predicts the growth of network properties based on its graph structure. This model, DeepGraph, computes a new representation of the graph structure based on heat kernel signatures. A multi-column, multi-resolution convolution neural network is designed to further learn the high- level representations and predict the network growth in an end-to- end fashion. Experiments on large collections of real-world net- works prove that DeepGraph significantly outperforms methods based on hand-crafted features, graph kernels, and competing deep learn- ing methods. The higher-level representations learned by Deep- Graph well correlate with findings and theories in social network literature, showing that a deep learning model can automatically discover meaningful and predictive structural patterns in networks. Our study reassures the predictive power of network structures and suggests a way to effectively utilize this power. A meaningful future direction is to integrate network structure with other types of information, such as the content of information cascades in the network. A joint representation of multi-modal information may maximize the performance of particular prediction tasks. HighLow 7. REFERENCES [1] L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In Proc. of SIGKDD, 2006. [2] L. Bai, L. Rossi, A. Torsello, and E. R. Hancock. A quantum jensen–shannon graph kernel for unattributed graphs. Pattern Recognition, 2015. [3] X. Bai and E. R. Hancock. Heat kernels, manifolds and graph embedding. In Structural, Syntactic, and Statistical Pattern Recognition. Springer, 2004. [4] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks. JSTAT, 2008. [5] K. M. Borgwardt and H.-P. Kriegel. Shortest-path kernels on graphs. In Proc. of ICDM, 2005. [6] R. S. Burt. The network structure of social capital. Research in organizational behavior, 2000. [7] R. Chen, Y. Chen, Y. Liu, and Q. Mei. Does team competition increase pro-social lending? evidence from online microfinance. Games and Economic Behavior, 2015. [8] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec. Can cascades be predicted? In Proc. of WWW, 2014. [9] F. Chung. Laplacians and the cheeger inequality for directed graphs. Annals of Combinatorics, 2005. [10] B. G. P. M. Dragomir R. Radev, Mark Thomas Joseph. A Bibliometric and Network Analysis of the field of Computational Linguistics. JASIST, 2009. [11] D. Easley and J. Kleinberg. Networks, crowds, and markets: Reasoning about a highly connected world. Cambridge University Press, 2010. [12] Y. Fang, M. Sun, and K. Ramani. Heat-passing framework for robust interpretation of data in networks. PloS one, 2015. [13] Y. Fang, J. Xie, G. Dai, M. Wang, F. Zhu, T. Xu, and E. Wong. 3d deep shape descriptor. In Proc. of CVPR, 2015. [14] T. Gärtner, P. Flach, and S. Wrobel. On graph kernels: Hardness results and efficient alternatives. In Learning Theory and Kernel Machines. 2003. [15] A. Grover and J. Leskovec. node2vec: Scalable feature learning for networks. In Proc. of SIGKDD, 2016. [16] R. Guimera, B. Uzzi, J. Spiro, and L. A. N. Amaral. Team assembly mechanisms determine collaboration network structure and team performance. Science, 2005. [17] H. Kashima, K. Tsuda, and A. Inokuchi. Kernels for graphs. Kernel methods in computational biology, 2004. [18] D. Kingma and J. Ba. Adam: A method for stochastic optimization. Proc. of ICLR, 2015. [19] G. Kossinets and D. J. Watts. Empirical analysis of an evolving social network. science, 2006. [20] A. Kupavskii, L. Ostroumova, A. Umnov, S. Usachev, P. Serdyukov, G. Gusev, and A. Kustarev. Prediction of retweet cascade size over time. In Proc. of CIKM, 2012. [21] H. Ma, H. Yang, M. R. Lyu, and I. King. Mining social networks using heat diffusion processes for marketing candidates selection. In Proc. of CIKM, 2008. [22] A. Mislove. Online Social Networks: Measurement, Analysis, and Applications to Distributed Information Systems. PhD thesis, 2009. [23] A. Narayanan, M. Chandramohan, L. Chen, Y. Liu, and S. Saminathan. subgraph2vec: Learning distributed representations of rooted sub-graphs from large graphs. In Workshop on Mining and Learning with Graphs, 2016. [24] M. Niepert, M. Ahmed, and K. Kutzkov. Learning convolutional neural networks for graphs. 2016. [25] B. Perozzi, R. Al-Rfou, and S. Skiena. Deepwalk: Online learning of social representations. In Proc. of SIGKDD, 2014. [26] S. Ranu and A. K. Singh. Graphsig: A scalable approach to mining significant subgraphs in large graph databases. In Proc. of ICDE, 2009. [27] D. M. Romero, C. Tan, and J. Ugander. On the interplay between social and topical structure. Proc. of ICWSM, 2013. [28] H. Saigo, S. Nowozin, T. Kadowaki, T. Kudo, and K. Tsuda. gboost: a mathematical programming approach to graph classification and regression. Machine Learning, 2009. [29] N. Shervashidze, T. Petri, K. Mehlhorn, K. M. Borgwardt, and S. Vishwanathan. Efficient graphlet kernels for large graph comparison. In International conference on artificial intelligence and statistics, pages 488–495, 2009. [30] N. Shervashidze, P. Schweitzer, E. J. Van Leeuwen, K. Mehlhorn, and K. M. Borgwardt. Weisfeiler-lehman graph kernels. JMLR, 2011. [31] J. Sun, M. Ovsjanikov, and L. Guibas. A concise and provably informative multi-scale signature based on heat diffusion. In Computer graphics forum, 2009. [32] Y. Sun, J. Han, X. Yan, P. S. Yu, and T. Wu. Pathsim: Meta path-based top-k similarity search in heterogeneous information networks. In Proc. of VLDB, 2011. [33] G. Szabo and B. A. Huberman. Predicting the popularity of online content. Communications of the ACM, 2010. [34] J. Tang, M. Qu, and Q. Mei. Pte: Predictive text embedding through large-scale heterogeneous text networks. In Proc. of SIGKDD, 2015. [35] O. Tsur and A. Rappoport. What's in a hashtag?: content based prediction of the spread of ideas in microblogging communities. In Proc. of WSDM, 2012. [36] J. Ugander, L. Backstrom, and J. Kleinberg. Subgraph frequencies: Mapping the empirical and extremal geography of large graph collections. In Proc. of WWW, 2013. [37] J. Ugander, L. Backstrom, C. Marlow, and J. Kleinberg. Structural diversity in social contagion. Proc. of the National Academy of Sciences, 2012. [38] B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In Proc. of WOSN, 2009. [39] J. Xie, Y. Fang, F. Zhu, and E. Wong. Deepshape: Deep learned shape descriptor for 3d shape matching and retrieval. In Proc. of CVPR, 2015. [40] P. Yanardag and S. Vishwanathan. Deep graph kernels. In Proc. of SIGKDD, 2015. [41] P. Yanardag and S. Vishwanathan. A structural smoothing framework for robust graph comparison. In NIPS, 2015. [42] J. Yang and J. Leskovec. Modeling information diffusion in implicit networks. In Proc. of ICDM, 2010. [43] L. Yang, T. Sun, M. Zhang, and Q. Mei. We know what@ you# tag: does the dual role affect hashtag adoption? In Proc. of WWW, 2012. [44] J. Zhang, B. Liu, J. Tang, T. Chen, and J. Li. Social influence locality for modeling retweeting behaviors. In IJCAI, 2013.
1211.4783
3
1211
2013-05-13T16:02:14
Inference of the Russian drug community from one of the largest social networks in the Russian Federation
[ "cs.SI", "physics.soc-ph" ]
The criminal nature of narcotics complicates the direct assessment of a drug community, while having a good understanding of the type of people drawn or currently using drugs is vital for finding effective intervening strategies. Especially for the Russian Federation this is of immediate concern given the dramatic increase it has seen in drug abuse since the fall of the Soviet Union in the early nineties. Using unique data from the Russian social network 'LiveJournal' with over 39 million registered users worldwide, we were able for the first time to identify the on-line drug community by context sensitive text mining of the users' blogs using a dictionary of known drug-related official and 'slang' terminology. By comparing the interests of the users that most actively spread information on narcotics over the network with the interests of the individuals outside the on-line drug community, we found that the 'average' drug user in the Russian Federation is generally mostly interested in topics such as Russian rock, non-traditional medicine, UFOs, Buddhism, yoga and the occult. We identify three distinct scale-free sub-networks of users which can be uniquely classified as being either 'infectious', 'susceptible' or 'immune'.
cs.SI
cs
Inference of the Russian Drug Community from One of the Largest Social Networks in the Russian Federation L.J. Dijkstra · A.V. Yakushev · P.A.C. Duijn · A.V. Boukhanovsky · P.M.A. Sloot 3 1 0 2 y a M 3 1 ] I S . s c [ 3 v 3 8 7 4 . 1 1 2 1 : v i X r a 10 May 2013 Abstract The criminal nature of narcotics complicates the direct assessment of a drug community, while having a good understanding of the type of people drawn or currently us- ing drugs is vital for finding effective intervening strateg ies. Especially for the Russian Federation this is of immediate concern given the dramatic increase it has seen in drug abuse since the fall of the Soviet Union in the early nineties. Using unique data from the Russian social network ‘LiveJournal’ with over 39 million registered users worldwide, we were able for the first time to identify the on-line drug community by context sensitive text mining of the users’ blogs using a dictionary of known drug-related official and ‘slang’ termi - nology. By comparing the interests of the users that most ac- tively spread information on narcotics over the network wit h the interests of the individuals outside the on-line drug com- munity, we found that the ‘average’ drug user in the Russian L.J. Dijkstra and A.V. Yakushev share first authorship of thi s work. L.J. Dijkstra · P.M.A. Sloot Computational Science Department, University of Amsterdam (UvA), The Netherlands. E-mail: [email protected] A.V. Yakushev · L.J. Dijkstra · A.V. Boukhanovsky · P.M.A. Sloot High-Performance Computing Department, National Research Univer- sity of Information Technologies, Mechanics and Optics (NRU ITMO), Saint Petersburg, Russia. E-mail: [email protected] P.A.C. Duijn Criminal Intelligence Analysis, Dutch Police, The Netherlands. E-mail: [email protected] A.V. Boukhanovsky E-mail: avb [email protected] P.M.A. Sloot (corresponding author) School of Computer Engineering (SCE), Nanyang Technological Uni- versity (NTU), Singapore. Tel.: +31 (0) 20 525 7537 Fax: +31 (0) 20 525 7419 E-mail: [email protected] Federation is generally mostly interested in topics such as Russian rock, non-traditional medicine, UFOs, Buddhism, yoga and the occult. We identify three distinct scale-free sub-networks of users which can be uniquely classified as being either ‘infectious’, ‘susceptible’ or ‘immune’. Keywords Illicit drug use · Social network · LiveJournal · Power-law · Russian Federation 1 Introduction Since the fall of the Soviet Union in the early nineties drug abuse has seen a dramatic increase in the Russian Federa- tion. From 1990 to 2001 the number of registered drug ad- dicts and drug-related crimes went up a nine- and fifteen- fold respectively (Sunami, 2007) and continued to rise over the last decade (Mityagin, 2012). The rapid spread and ex- tent of this ‘drug epidemic’ is of immediate concern to the Russian government and finding effective ways to halt this trend is considered to be of outmost importance. Due to the criminal nature and general social disapproval of drug use it is complicated to assess the drug community directly. Official governmental statistics do provide an in - sight into the general trend, but only manage to scratch the surface of the entire drug community in the Russian Feder- ation. The drug users registered in their databases are ofte n among the extreme cases: they have been in one (or more) rehabilitation programs or were arrested for using and/or selling illicit narcotics. The (still) ‘moderate’ user stays out of the picture, making it difficult to obtain reliable inform a- tion on the drug community as a whole. Within crimino- logical research this non-registered crime is often referr ed to as dark number, see Coleman and Moynihan (1996), and Rhodes et al. (2006). Gaining a better understanding of what constitutes the drug community in the Russian Federation and in which 2 L.J. Dijkstra et al. ways its members can in fluence (or even inspire) others to start using might prove valuable for devising more effective intervening strategies that can turn the current situation for the better. In order to handle the drug society’s inherent complex- ity, we will partition the Russian population into (roughly) three groups varying in their involvement in illicit drug us e: 1. The immune: the group of people that because of, for example, social commitments (e.g., marriage, children, job) and/or strongly held (religious) convictions will not be persuaded to start using drugs. 2. The infectious, i.e., the drug community: the group con- sisting of all individuals involved with drug abuse in one way or another (i.e., using, selling or producing). 3. The susceptible containing all individuals that are not a member of one of the previously mentioned groups. They are not involved in any way with illicit drug use at the moment, but might, due to their social position and environment be drawn toward drug use in the future. The idea to divide the population into these three groups was inspired by the division often used in models for virus spread, see for example the SIR-model of Daley and Kendall (1964), since a similar process seems to underlie the spread of drug addiction through society: infectious (drug users/ dealers) can infect susceptible others with the (drug) viru s by means of direct and personal contact (i.e., sharing or sel l- ing drugs). This analogy has been made before, not only between virus spread and drug addition (Agar, 2005; Been- stock and Rahav, 2004; Mityagin, 2012), but also in the field of ‘obesity spreading’ (Gallos et al. 2012) and for modeling the spread of information (Iribarren and Moro, 2009; Onnela et al., 2007; Bernardes et al., 2012). Social network sites (SNSs) have proved over the years that they provide means to uncover social structures and pro - cesses that were difficult to observe before (Scott, 2011). In this paper we investigate the social network site Live- Journal1 . With approximately 2.6 million registered Rus- sian users and over 39 million registered users worldwide, it is one of the largest and most popular SNSs in the Rus- sian Federation. The site offers its users an easy-to-use blog- platform where people can read and share their articles with others. In contrast to micro-blogging SNSs such as Face- book2 (Wilson et al., 2012; Ferri et al., 2012) or Twitter 3 of- ten mentioned in the literature, the site offers a tremendou s amount of large user-written texts, making it extremely sui t- able for text-mining and, consequently, a unique source of data. Maybe because of having the impression to be among ‘friends’, LiveJournal users write sometimes quite openly 1 LiveJournal is available at http://www.livejournal.com (En- glish) and http://www.livejournal.ru (Russian). 2 Facebook is available at http://www.facebook.com . 3 Twitter is available at http://www.twitter.com . about their personal lives in their blogs. Some even com- ment on their use of drugs and their experiences with vari- ous kinds of narcotics. Others (the extreme cases) describe in detail the production process. These openly online ex- pressions can be ascribed to the on-line disinhibition effect (Suler, 2004); the invisible and anonymous qualities of on- line interaction lead to disinhibited, more intensive, self- disclosing and aggressive uses of language. Furthermore, recent studies show that criminal organizations are active ly using on-line communities as a new ‘business’ tool for com- munication, research, logistics, marketing, recruitment , dis- tribution of drugs and monetarization (D ´ecary-H ´etu and Morselli, 2011; EURO POL, 2011; Walsh, 2011; Choo and Smith, 2008; Williams, 2001). Research of on-line commu- nities, therefore, might aid in gaining a better understand ing of the behavior of opaque networks within a society. In order to get a better insight into the drug community in the Russian Federation, we crawl a large randomly se- lected group of Russian LiveJournal users. Every blog en- try of every user is associated with a weight indicating to what extent it refers to illicit forms of drug use by overlayi ng the document word-for-word with a dictionary consisting of known drug-related terminology (both official as well as in- formal/‘slang’). When the sum of ‘indicator’ weights of all the blog entries of a specific user reaches a certain threshol d, the user is considered to be a member of the on-line drug community. The idea behind this approach is that drug users are more likely to use drug-related terminology in their blo g entries than others. We will return to this assumption ex- tensively in Section 5. The way users are classified and the drug-dictionary are discussed in detail in Section 3.2. After identifying the on-line drug community, we might ask ourselves what kind of people are generally to be found in this sub-network? In order to get a better picture of the ‘average’ user in this sub-community, we gather all the in- terests mentioned on each user’s pro file page and compare how often they appear within the on-line drug community with the frequency of appearance in the rest of the network. We limit ourselves here to interests, due to the fact that it is rather unclear how to automatically construct a ‘psycholog - ical pro file’ of a user based solely on his or her texts. That way, we try to isolate those interests that are truly more com - mon in one of these two distinct groups of users. In Section 3.3 we describe the used methodology in more detail. The susceptibility of people to the ‘drug virus’ is thought to depend on their exposure to drug-related information and their own interest in this topic. This social mechanism of transmission is called differential association in which drives, techniques, motives, rationalizations and attitudes toward de- viant behavior are learned and exchanged by social inter- action (Sutherland, 1947; Lanier and Henry, 1998; Haynie, 2002). From this perspective the number of interests a user has in common with the on-line drug community might in- Inference of the Russian Drug Community from the Social Network LiveJournal 3 dicate a higher susceptibility, since 1) this person is more likely to stumble upon blog entries published by member of the on-line drug community (which are more often about drug use), and 2) it might indicate a certain lifestyle more prone to drugs. Following this reasoning, we present a naive Bayesian classifier using the log-likelihood ratio method (Kantardzic, 2011; Hastie et al., 2009) in Section 3.4 that as- sesses the susceptibility of a user to drugs given his/her pe r- sonal interests. When a user’s interests overlap more with the interests in the on-line drug community than the inter- ests of the rest of the population, they are considered to be susceptible. Users that were not identified as being a member of the on-line drug community on the basis of their written texts or as susceptible due to a large similarity with their intere sts and the interests common in the on-line drug community are considered to be immune. They do not write (much) about illicit drug use and their interests do not suggest a lean to- wards the on-line drug community. After having (roughly) identified the three subgroups (i.e. immune, infectious and susceptible) in the social network LiveJournal, we might wonder whether there are structural differences between the corresponding subnetworks. In Sec - tion 4.3 we will describe and compare them. The remainder of this paper is organized as follows. In Section 2 we discuss the social network site LiveJournal, describe the kind of information users put out about them- selves and point to several unique features this SNS has over others often studied in the literature. Section 3 describes the crawled LiveJournal data set and the methods used to parti- tion its users and determine significant interests. The resu lts are presented in Section 4. We will finish with several con- clusions, a rather extensive discussion and a few pointers for future research. In Appendix 1 we explore the frequency with which interests appear in the network and show that this probability distribution follows a power-law. tagged and an extensive comment system provides the read- ers with the possibility to respond and exchange opinions and ideas. Users can unilaterally declare any other registered user as a ‘friend’, i.e., ties are unidirectional. A tie re flects t he de- sire of a user to keep up-to-date with the articles of the othe r. Consequently, every pro file contains two lists of ties: 1) a list of alters that currently follow the articles published by the ego, and 2) a list of alters whose articles the ego follows. (Note the similarity with Twitter). We will refer to these li sts as the list of followers and following friends, respectively. LiveJournal differs from other (large) social network site s in two important aspects: 1) it has a large number of users that actively write in Russian, and 2) the texts are large in contrast to the micro-blogging SNSs often considered in the literature (Wilson et al., 2012). The latter makes LiveJour- nal exceptionally suitable for text-mining and, as such might provide insights into social structures and processes wher e other SNSs cannot. , 3 Methods Section 3.1 describes the data collected from the SNS Live- Journal. In Section 3.2 we discuss the drug-dictionary and procedure used for classifying those users who are most likely to be involved in drug abuse. After colouring the sub- network of the on-line drug community, we proceed in Sec- tion 3.3 with identifying those interests that are more com- mon for this set of users or the rest of the on-line. These indicative interests are used by the nave Bayesian classifie r introduced in Section 3.4 for identifying the ‘susceptible’ and ‘immune’ subnetworks. We will later analyze the struc- ture of these three subnetworks later in Section 4.3. 3.1 The LiveJournal Data Set 2 The SNS LiveJournal The social network site LiveJournal with over 39 million worldwide and approximately 2.6 million registered Russian users is by far the most popular blog-platform in the Rus- sian Federation. With 1.7 million active users and (approx- imately) 130,000 new posts every day the site offers a fast body of data for studying social structures and processes 4 . In addition to publishing their own articles, the users are offered the possibility to enter information on their where - abouts (e.g. hometown), demographics (e.g. birthday), their personal interests (e.g. favourite books, films and music) a nd even their current mood (e.g. happy, sad). Articles can be 4 LiveJournal’s can page statistics own http://www.livejournal.com/stats.bml . be found at On the 9th of September 2012 we crawled 98602 randomly selected Russian user pro files. For each pro file we stored its username, the last 25 posted blog entries, personal interes ts and the lists of followers and following ‘friends’. In addition we stored (when available) the user’s birthday and place of living. In order to collect this data, we developed a distributed crawler that employs the MapReduce Model (L ammel, 2007) and the open source framework Apache Hadoop (White, 2009). The system is similar to the Apache Nutch crawler (Ca- farella and Cutting, 2004) but allows for multiple users to collect and process data at the same time; the fetcher module is moved outside the Hadoop framework making it a sepa- rate application that can run on various machine architec- tures simultaneously. 4 L.J. Dijkstra et al. A total of 22357 users fully specified their birthday on their public pro file (ages higher than 80 were regarded to be reported falsely). In Section 4.1 we explore some charac- teristics of the crawled population and compare it with the Russian population. 3.2 The On-line Drug Community Users are classified as being a member of the on-line drug community by comparing their last 25 blog entries with a dictionary of known drug-related terminology collected by drug experts at the Saint Petersburg Information and An- alytical Center5 . The total of 368 words in this dictionary are split up into two categories: official and informal/‘sla ng’ terminology. Official terminology are words that are unmis- takingly related to illicit drug use (e.g., cocaine and hero in) and are assigned a high weight, i.e., 5. Informal/‘slang’ ex- pressions can often be interpreted in various ways and can- not be directly related to drug use. For example, the Russian word ‘kolesa’ refers normally to wheels while it also can be used (in rather dubious circumstances) as a word for pills. To account for this ambiguity, ‘slang’ expressions are as- signed a lower weight than official terminology, i.e., 1. Tab le 1 shows a few example words from the dictionary alongside their weight and (free) English translation 6 . In addition to this set of words, each blog entry was also checked for the presence of a collection of drug-related phrases. The presence of certain combinations of words in a text, e.g., ‘injecting’ and ‘heroin’, is a strong indication that the author is involved with illicit drug use. In order to ac- count for this valuable information, the dictionary consis ts additionally of 8359 phrases, each assigned with a slightly higher weight than the mere sum of the words it consists of 7 . In order to compare in flected or derived words in the posts with words in the dictionary we first reduce them to their root form using a Russian version of the Porter stem- ming algorithm (Porter, 1980; Porter, 2006). When the summed weights of all the blog entries of a user reaches a certain threshold, he/she is considered to be a member of the on-line drug community. Users who use a small number of the words and phrases from the dictio- nary in a limited number of blog entries are, thus, less likely to be identified as a member than the ones who frequently 5 The homepage of SPb IAC can be found at http://iac.spb.ru (in Russian). 6 The full drug-dictionary is freely available and can be down loaded at http://escience.ifmo.ru/?ws=sub48 . 7 The number of phrases (8359) is rather high in comparison to t he number of words (368) in this dictionary. This is due to the fact that we consider a phrase consisting, for example, of the words ‘injecting’, ‘heroin’ and the phrase with the words ‘injection’, ‘heroin ’ and ‘nee- dle’ as two separate expressions (where the latter is associ ated with a higher weight than the former). use drug-related terminology throughout a large numbers of texts. The threshold was set manually, see Fig. 1. We will refer to the entire set of users who’s summed weights reaches the threshold as the on-line drug community throughout the rest of this paper. To what extent the sub- community corresponds to the Russian drug community will be a point of discussion in Section 5. Table 1 Examples of words in the drug-dictionary Russian English translation Weight Kokain Geroin Mariguana Abstyag Tabletki Kolesa Cocaine Heroin Marijuana Withdrawal syndrome Pills Pills/Wheels 5 5 5 5 1 1 3.3 Identifying Common Interests of the On-line Drug Community In this section we will formulate an approach for determin- ing which interests are most common (or uncommon) for a particular subset of SNS users, in our particular case, the on-line drug community. First, we collect the interests on the pro file pages of all users in the on-line drug community that at least appear more than 10 times. (The reason for disregarding rather un- frequent interests is that they do not add much when one wants to gain a better understanding of an entire commu- nity). Lets denote this set of interests with I = {I1 , I2 , . . . , Im }. Since the members of the on-line drug community are known, we are able to count how often users express their interest in both this sub-community and the rest of the social network. For every interest Ii we can, thus, obtain a 2 × 2 contingency table similar to Table 2 where (a + b + c + d ) = n is the total Table 2 The 2 × 2 contingency table for interest Ii Is interested in Ii Not interested in Ii Total Drug community a c a + c Rest b d b + d Total a + b c + d n number of users in the crawled population that have at least one interest on their pro file page (i.e., n = 62370), a + c is the number of users identified as members of the on-line drug community, a + b is the total number of users who ex- pressed their interest in Ii and c + d are the users not inter- ested in Ii . The question is whether this interest appears sig- nificantly more (or less) in the on-line drug community than Inference of the Russian Drug Community from the Social Network LiveJournal 5 in the rest of the rest of the network, i.e., do the proportion s a/(a + c) and b/(b + d ) differ? We, thus, have m null hypotheses (H 0 i ), one for each in- terest Ii in I. Applying the two-sided version of Fisher’s ex- act test8 (Fisher, 1922; Agresti, 1992) to each contingency table provides us with their corresponding p-values: p1 , p2 , . . . , pm . The total number of null hypotheses is large (3282 to be precise, corresponding to the total number of interests expressed more than 10 times in the on-line drug commu- nity). Simply comparing the obtained p-values with a com- mon fixed significance level (e.g., p ≤ .05) will result in a high number of false discoveries, i.e., falsely rejected nu ll hypotheses. Benjamini and Hochberg (1995) showed that the expected false discovery rate can be upper bounded by q ∈ [0, 1] with the following control procedure9 (Benjamini and Hochberg, 1995; Benjamini and Yekutieli, 2001): 1. Order the p-values in increasing order, i.e., p(1) ≤ p(2) ≤ . . . ≤ p(m) . 2. For a given q, find the largest k for which p(k) ≤ kq. 3. Reject all H 0 (i) for i = 1, 2, . . . , k. We will use a q-value of 5%. The interests associated with all rejected H 0 (i) , I′ = (cid:8)I(1) , I(2) , . . . , I(k)(cid:9), are considered to be the interests that really differ between the on-line drug community and the rest of the social network. Due to the large sample size and the initially large num- ber of interests, the number of significant interests in I′ is expected to be quite high. Partitioning them into a set of themes might help with getting a better overview of the wide variety of significant interests. In order to do so, we cluste r the set of significant interests I′ using a hierarchical agglom- erative clustering algorithm with a complete linkage strategy (Kantardzic, 2011; Everitt, 2001). Complete-linkage is pre- ferred here over single-linkage due to the fact is does not suffer from the chaining phenomena, i.e., clusters may be forced together due to single elements being close to each other, even if a majority of elements is very distant. Averag e- linkage was no option due to its high computational load. The similarity between two clusters of interests, C1 and C2 , is de fined as (1) sim(C1 ,C2 ) = n(S1 ∩ S2 ) pn(S1 ) · n(S2 ) where S1 and S2 are the sets of users that expressed their interest in at least one of the topics in, respectively, C1 and C2 . n(·) returns the number of users. This similarity measure is known as cosine similarity or more commonly known in 8 A c2 test originally designed for 2 × 2 contingency tables by Sir R.A. Fisher (1922). 9 Strictly speaking, the expected false discovery rate is only upper bounded when the m test statistics are independent, which does not hold in this particular case. B. Efron makes the case in his book Large- Scale Inference (2010) that this independency constraint is not strong. biology as the Ochiai coefficient (Ochiai, 1957). We will re- fer to the resulting clusters of significant interests as the mes throughout the rest of this paper. 3.4 Assessing Susceptibility A large number of common interests between a user and the on-line drug community might indicate a higher susceptibil- ity to drugs, since 1) the user is more likely to stumble upon blog entries published by members of this sub-community, and 2) it might indicate a certain lifestyle more prone to drug use. Certain interests might, on the other hand, indicate a low susceptibility. Think of interests that suggest that the user in question has certain social commitments (e.g., mar- riage, children, job) or strong-held (religious) convicti ons. The idea that interests are related to susceptibility under- lies the classification method in this section: an individua l is considered to be a susceptible user when his/her personal interests resemble the interests common for the drug com- munity more than the interests of the rest of the on-line pop- ulation. A naive Bayesian classifier was used (Kantardzic, 2011). Due to the fact that certain combinations of interests are rare, we are forced to assume conditional independence be- tween each pair of interests and use the log-likelihood ratio method. Let us first de fine est in the set I′ : k feature variables, one for each inter- P(D F) = P(Fi D). F = {F1, F2 , ..., Fk } where Fi is true when the user is interested in Ii in I′ and otherwise false. The set of feature variables F is used to de- scribe the personal interests of each user in the network. The chance that a user belongs to the drug community (D) given his/her interests is given by the conditional chance P(D F). Given the assumption that each feature variable Fi is conditionally independent of Fj when i 6= j, i.e., P(Fi D, Fj ) = P(Fi D), this probability can be expressed as k(cid:213) i=1 Similarly, the chance of not being a member of the drug community given the users interests is k(cid:213) P(¬D) P(F) i=1 By applying the log-likelihood ratio method, i.e., dividing eq. (2) by eq. (3) and taking the natural logarithm of both sides, we find that the inequality P(D F) > P(¬D F), i.e., the user is more likely to belong to the drug community given the user’s interests, is equivalent to the inequality : k(cid:229) i=1 P(Fi D) P(Fi ¬D) P(D) P(¬D) P(¬D F) = P(Fi ¬D). log + log (2) (3) P(D) P(F) > 0. (4) 6 L.J. Dijkstra et al. especially popular among 20 to 40 year old individuals. Fig- ure 2b depicts the age distribution of the Russian Federa- tion as determined on the 1st of January 2011. The data was made available by Rosstat10 . The major dip around the ages 62-70 is a re flection of the impact that the Second World War had on the Russian population. Note the difference between the Russian LiveJournal com- munity and the Russian population as a whole. Using Live- Journal to sample the Russian population poses two prob- lems: 1) one only samples those individuals who are regis- tered as a user in this SNS, and 2) we seriously oversam- ple the age group 20-40. Both aspects might not pose a real threat; the Russian drug community is, as mentioned be- fore, difficult (or even impossible) to sample directly, mak - ing sampling a SNS one of the limited options one has, when one wants to gain a better insight into this sub-community. In addition, illicit drug use is known to occur especially in this particular age group (Mityagin, 2012). The strong pres - ence of this group, thus, might help in gathering more infor- mation on the community of interest. Of the total number of 98602 users studied in the Live- Journal data set, 16553 and 3586 were identified as, respec- tively, members of the drug community and susceptible users . Susceptible users are identified using the naive Bayesian classifier as described in Section 3.4 which makes use of the interests the user posted on his/her pro file page. Com- mon interests can be shown to be rare. In fact, the frequency with which an interest is mentioned by users of this SNS can be shown to follow a power-law distribution with coefficient g ≈ 1.54, see Appendix 1. With a low number of common interests, there is often not enough to go on in order to reli- ably classify a user as being susceptible, which explains the relatively small number of susceptible users found. 4.2 Drug Indicators After applying Fisher’s exact test and Benjamini and Hochberg’s false discovery rate control procedure with a q-value of 5% (see Section 3.3), we found 268 of the 3282 initial interests to be significant, i.e., the on-line drug community is, thus, more/less interested in these topics than the rest of the Live- Journal users. In order to assess to what extent an interest I is indicative for being a member of the drug community (D) or the rest of the population, we use the conditional proba- bility P(D I ). Among the interests most indicative for the on-line drug community (i.e., P(D I ) > .5), we found in- terests such as: the White Movement (a loose confederation of anti-communist forces who fought the Bolsheviks in the Russian civil war; now often associated with the Russian Fig. 1 The summed weights of the blog entries of each user in the Live- Journal data set. The higher the summed weight the more the user used the words and phrases present in the drug-dictionary (see Se ction 3.2). Users are considered to be a member of the on-line drug commun ity when their weighted sum crosses the threshold of 8 A user is considered to be susceptible when he/she does not belong to the drug community and this inequality holds. Users that are not a member of the on-line drug community or considered to be susceptible, are immune. 4 Results In order to identify those users in the network involved with illicit drug use, we overlaid their last 25 blog entries with a dictionary of known drug-related terminology (see Section 3.2). Fig. 1 depicts the distribution of the weights assigned to the randomly crawled LiveJournal users. Note that the ma- jority of users appear to make use of a rather small num- ber of drug-related terminology. The fluctuations that can be seen around the weights 5, 10 and (less distinct) 15 and 20 can be explained by the weights assigned to the words present in the drug-dictionary (5 for official, clearly drug - related, terminology and 1 for (ambiguous) ‘slang’ expres- sions). The users with the highest weights are assumed to be the ones most interested and/or involved in illicit drug use . The threshold was set to 8 (see Fig. 1), i.e., when the weight of a user crosses 8, he/she is considered to be a member of the on-line drug community. Other thresholds close to 8 were considered as well. We found that the themes as pre- sented in Section 4.2 did not change tremendously. By set- ting the threshold to 8, approximately 20% of the total set of crawled users were classified as being a member of the on-line drug community. 4.1 Characteristics of the SNS LiveJournal Fig. 2a depicts the age distribution of the LiveJournal data set split out between the on-line drug community and the susceptible and immune user groups. Note that this SNS is 10 The governmental statistics agency of the Russian Federation. They can be found at http://www.gks.ru (in Russian) with links to their rather extensive database. Inference of the Russian Drug Community from the Social Network LiveJournal 7 e g a r e p s l a u d i v i d n i # ) s n o i l l i m n i ( 2.5 2 1.5 1 0.5 0 20 40 60 80 Age (in years) b Russian Federation (2011) a LiveJournal (2012) Fig. 2 a The age distribution of the LiveJournal data set (2012) split out between the on-line drug community, and the susceptible and immune user groups. Note that this SNS is especially popular in Russia among 20 to 40 year olds b The age distribution of the Russian Federation on the 1st of January 2011 (the data was made available by Rosstat). Note the difference between the two age distributions. LiveJournal does, thus, not provide a good sample of the Russian population, although, while investigating illicit drug use it might be useful to sample especially that fraction of the population known to be most involved with narcotics (Mityagin 2012) 20 15 10 5 d e t s e r e t n i s r e s u % 0 s e c n cie s cial o S s e c n cie s ct a x E Drug community Rest of the network nity hristia C s m g otericis hin c a te s stern E a E writers s ctivitie g a n o or er-s o utd g Sin O m alis n atio N ur o m Gla hiatry sic u m c m y s a P stre ain M g s/Clothin orie s s e c c A Literature s olitic P ult c c O n ctio fi e c n cie S history n sia s u R Fig. 3 The percentage of users within the on-line drug community and the rest of the on-line population interested in each theme (see Table 3). Users are considered to be interested in a theme when they men tion at least one of the interests contained in that theme. Note that the last three themes are more likely to be found in the non-drug section of the network. The other themes are relatively more likely to ap pear in the on-line drug community nationalistic movement), humanistic psychology, partisans, Aryan (ancient people that partly inhabited current Russian territory), Stalinism, Dadaism, narcology and Magadan (a city in the far east of the Russian territory, famous for its large jail). Among interests most indicative for not belong - ing to the drug community (i.e., P(D I ) < .5), we found in- terests such as: accessories, beads, jewellery, London, cloth- ing, glamour, handmade, shoes, beach and interior design. In order to get a better view on the wide variety of signif- icant indicative interests, we clustered them using the cluster algorithm described in Section 3.3. We found 42 different themes in total. In this Section we will only discuss the ones most prominent within the on-line drug community and the rest of the LiveJournal population. Fig. 3 shows the various themes and to what extent they appear in the on-line drug community and the rest of the LiveJournal population. We consider users to be interested in a theme, when they mention at least one of the interests contained in that theme on their pro file page. The names assigned to each theme were determined by the writers of this article. In order to overcome some of the inevitable subjectivity inherent to this process, we will describe the themes shortly in Table 3, where the second column denotes the number of significant interests in each theme. When the number of interests in a theme is small, we will sum up all the interests (translated to English); other- wise we will suffice with a short description. In both Fig. 3 and Table 3 the last three themes (Main- stream music, Accessories/Clothing and Glamour) appear 8 L.J. Dijkstra et al. more often in the non-drug section of the network. The oth- ers are more common for the on-line drug community. Recall that significant interests were clustered solely on the basis of their cosine similarity (i.e., the more users th at expressed their interest in both topics, the higher the ‘sim i- larity’). In which of the two distinct communities the interest is more prominent is not taken into account. Each theme is, thus, likely to contain interests that are more common for the on-line drug community and interests that are more of- ten found in the rest of the network. To what extent a theme can be related to one of these two groups can, therefore, be expected to be less clear than for individual interests. 4.3 Network Structure Analysis In this section we will explore the structure of the on-line drug community, susceptible and immune subnetworks. Fig. 4a shows the degree distribution of the total crawled LiveJournal network. Degree is de fined here as the num- ber of followers and following ‘friends’ of a user. Note that the number of users seems to decrease exponentially with degree; an indication that the distribution might follow a power-law: p(x) = Cx−g (5) where x is the degree of a user, g is the power-law coeffi- cient and C is a constant. Power-law distributions appear in a wide variety of natural and man-made processes, e.g., the number of inhabitants in cities, the diameter of moon crates and the intensity of solar flares. The wide-spread appearanc e of the power-law raises the question whether the same pro- cess might underlie these (at first glance) different phenom - ena, causing quite a discussion in the literature. For a more elaborate discussion of power-laws and their appearance, w e refer the reader to a recent paper by Pinto et al. (2012). Fig. 4b shows the rank/frequency log-log plot11 of the degree distribution in 4a. Note the points in this plot lie (ap- proximately) on a straight line, which is a characteristic o f power-law distributions. Very few real-word networks display a power-law dis- tribution over the entire degree range, making it necessary to determine where the degree distribution is most likely to start following a power-law (denoted here with xmin ). The power-law exponent g and xmin were determined using the maximum likelihood method as described in the paper by Clauset et al. (2009) and were found to be equal to 1.54 and 8, respectively. The fit is shown in Fig. 4b as a dashed line. Note that the line seems to fit the data quite well. The standard statistical test for the quality of fit as proposed b y 11 A rank/frequency log-log plot is the plot of the occurrence f re- quency versus the rank on logarithmically scaled axes. For a more elaborate description on how to construct such a plot, see the paper by Mark Newman (2005), Appendix A. A. Clauset, C. Shalizi and M. Newman (2009) shows that the data gives no raise to believe that the degree distribution does not follow a power-law (i.e., p = .57 with 1000 repeti- tions). Fig. 5 shows the rank/frequency log-log plots of the de- gree distributions of the on-line drug community, suscepti- ble and immune network together with their power-law fits. Note that these sub-networks also follows a power-law dis- tribution, only with slightly different g’s. Table 4 shows various characteristics of the LiveJournal network and its three subnetworks. Standard deviations are reported between parentheses. Note that the mean age does not differ much. The large differences between the maxi- mum degrees of these networks are common for heavy right- tailed distributions. The best fits for g, xmin and the p-value of the goodness of fit test are reported as well. 5 Conclusions/Discussion Drug abuse has seen a dramatic increase in the Russian Fed- eration during the last two decades (Sunami, 2007; Mitya- gin, 2012). The rapid spread and extent of this ‘drug epi- demic’ forms a serious cause for alarm and finding effective ways to halt the current trend is of outmost importance. Due to the criminal nature and the general social disap- proval of narcotics, it is difficult (or outright impossible ) to assess the drug community directly. Official governmental statistics do provide some insight, but fail to give the com- plete picture; the ‘moderate’ drug user is hardly noticed. I n- formation retrieved from social networks such as LiveJour- nal can, therefore, contribute in gaining a better understa nd- ing of what constitutes the drug community in the Russian Federation and might prove to be vital for devising more ef- fective intervention strategies. In this paper we present a method to assess this non- directly observable community by mining the popular so- cial network site LiveJournal. By comparing the users’ blog s with a dictionary consisting of known drug-related Russian terminology, we were able to identify those users that write most actively about drug use. By collecting their interests, we were able to create a general picture of the kind of users that can be found within the on-line drug community, see Ta- ble 3 and Fig. 3. In addition, we introduced a naive Bayesian classifier for identifying potentially susceptible users b y com- paring their personal interests with the interests most com - mon within the on-line drug community. The ‘infectious’, ‘susceptible’ and ‘immune’ subnetworks were shown to have a similar structure; their degree distributions follow a power- law, although with slightly varying exponents. It is unclear to what extent we were able to identify the users that are really involved in drug use. Users that tend to write often about narcotics might do so for the follow- ing three reasons: 1) to raise the discussion on the social Inference of the Russian Drug Community from the Social Network LiveJournal 9 Table 3 Description of the most prominent themes Theme # Description Social sciences Exact sciences Literature Politics Occult Science fiction 8 Russian history Christianity Esotericism Eastern teachings Singer-songwriters Outdoor activities Nationalism Psychiatry Mainstream music Accessories/Clothing Glamour 15 3 7 5 7 9 22 Sociology, history, economics, psychology and law. Programming, biology, astronomy, medicine, archeology, ecology and philosophy. Containing rather general interests such as bo oks, journalism, poetry and prose. This theme contains various national (opposition, corruption and Russia), international (Chech- nya, NATO, Poland and Ukraine) and general (socialism, democracy and anti-communism) political topics. Concerns a wide variety of topics, including, for example, the occult, non-traditional medicine, mysticism, clairvoyance, telepathy and the prediction of the future through the reading of cards (tarot). Containing interests like UFOs, futurolog y, nanotechnology, science fiction and the American science fiction writer H. Harrison. Ranging from general sciences (anthropo logy, ethnography, war history) to particular events in the history of Russia (WWII, the Russian civil war) and important historical groups (partizans). God, the Russian orthodox church and religion. Contains various topics related to esoterici sm (esotericism itself, but also the expansion and altering of the human mind) and Castaneda, a rather famous au thor who popularized topics such as ‘stalking’ (technique to control the mind) and lucid dreams. 10 Various eastern teachings/religions (Buddhism, Zen and yoga) and related terms (e.g., mantras, chakras and tantras). Interests related to Russian rock and singer-songwriters (e.g., V. Vysotsky). Diving, fishing, hunting and topics rel ated to Mountain climbing (e.g., alpinism and the Altai mountains) and survival. Covering interests such as the Russian empire, patriotism, the Russian people, the White Move- ment and antiglobalization. Including psychiatry, psychoanalysis, psychotherapy, psychosomatic medicine and transper- sonal and humanitarian psychology. 6 Containing several famous mainstream musicians, such as Madonna, Coldplay and Bj ork. 13 Varying from accessories like beads, jewelry, shoes and bags to clothing and interior design. Includes the interest glamour itself. It further covers fashion (e.g., journals, style, jeans, design 13 and shopping) and the night-life of Moscow. 11 6 8 9 6 100 k n a r x a m / k n a r 10−1 10−2 a 100 102 104 Frequency b Fig. 4 a A fraction of the degree distribution of the crawled LiveJou rnal network. Note that the number of users decreases expone ntially with degree b The rank/frequency log-log plot of the degree distribution and the power-law fit depicted as a dashed line ( g ≈ 1.54 and xmin = 8). The p-value was found to be approximately .57, i.e., there is no reason to believe that the degree distribution does not follow a power-law problems caused by drug abuse or propose possible ways to change the current situation for the better, 2) in an attempt to persuade others to stop or never start using drugs, i.e., ‘an ti- propaganda’, or 3) to share their experiences with drugs or to express their interest in this topic. We are solely inter- ested in the group of users writing about narcotics for the third reason; they are the ones that use drugs or are likely to do so in the future. The appearance of the theme politics in Fig. 3 might be best explained by the presence of users in LiveJournal that do not write about drugs because they are personally in- terested or using them, but rather since they want to bring the social problems related to narcotics under the attention. 10 L.J. Dijkstra et al. 100 10−1 10−2 k n a r x a m / k n a r 100 10−1 100 10−1 10−2 100 101 102 103 100 101 102 103 100 102 104 Frequency a Frequency b Frequency c Fig. 5 The rank/frequency log-log plots of the degree distributions of the three subnetworks in the crawled LiveJournal netwo rk: the drug commu- nity (g ≈ 1.57 and xmin = 19) and the susceptible (g ≈ 1.66 and xmin = 8) and immune subnetwork (g ≈ 1.54 and xmin = 10) . The power-law fit is depicted as a dashed line. The found p-values give no reason to believe these distributions do not follow a power-law Table 4 Structural characteristics of the various subnetworks in L iveJournal Network Size Edges Age Max. degree Drug community Susceptible Immune 16553 3586 78463 61021 16499 496018 32.08 (9.20) 32.14 (8.75) 30.31 (8.03) Total 98602 982197 30.71 (8.32) 160 72 323 524 g 1.57 1.66 1.51 1.54 xmin p-value 19 8 10 8 .97 .84 .76 .57 The same might hold for the themes as the social and ex- act sciences, psychiatry and, potentially, nationalism. The presence of a theme like Christianity (consisting of the in- terests ‘God’, ‘the Russian orthodox church’ and ‘religion ’) is more likely to be explained by the presence of users that spread anti-propaganda, especially when taking the negative stance of the church towards drugs into account. Themes such as the occult, esotericism, science fiction and eastern teachings, however, are hardly explained by sta t- ing that the users interested in these topics are heavily con - cerned with the social impact of drug abuse, or actively spre ad- ing anti-propaganda. Most likely, we caught a glimpse of the actual drug community. The explanations of why certain themes are presented in the on-line drug community are, of course, based solely on the view of the authors and, therefore, subjective. Fur- ther research is required to establish what themes are truly related to the Russian drug community. In order to estab- lish the validity of the approach described in this paper, one might compare the presented results with law enforcement data, e.g., it would be interesting to compare the number of convictions for drug-related crimes between the on-line drug community and the rest of the crawled LiveJournal popula- tion. The susceptibility of an individual to drugs was deter- mined on the basis of the similarity between his/her persona l interests and the interests common in the on-line drug com- munity. We limited ourselves here to their interests, since it was unclear how to relate the susceptibility of a user and his/her texts. The number of susceptible users is relatively small due to the small number of common interests present in the Live- Journal network. In fact, it can be shown that the frequency with which a certain interest occurs follows a power-law with exponent g≈ 1.54, see Appendix 1. With a low number of common interests, there is often not enough to go on to identify a user as being susceptible. It is, thus, very well pos- sible that we overlooked several immune users who should have been noted as being susceptible. Users were considered to be a member of the on-line drug community when the weighted sum of their blog en- tries crossed the threshold of 8, see Fig. 1. We experimented with different thresholds and found that, although the list of significant interests does vary, the resulting clusters/th emes remain stable. The weights assigned to the official and in- formal/‘slang’ terminology in the drug-dictionary were no t varied. Since the final themes did not vary much while vary- ing the threshold, it is unlikely that they would now. As mentioned before, we found that the LiveJournal net- work and the infectious, susceptible and immune subnet- works are most likely scale-free (i.e., their degree distri bu- tions follow a power-law). Although the performed good- ness of fit test (Clauset et al., 2009) does not exclude other possibilities, e.g., Poisson, we can state with certainty that the distributions are heavy-right tailed, which entails that the network has hubs, i.e., users with a far higher degree than the rest of the network. This knowledge might be of Inference of the Russian Drug Community from the Social Network LiveJournal 11 major importance when one wants to disrupt the network to, for example, limit the spread of drug-related information o n the network. Removing the hubs would heavily disrupt the information flow (Bollobas and Riordan, 2004; Albert et al., 2000; Crucitti et al., 2003). This paper has shown the promise of ‘crawling social networks’ in delineating and analyzing social groups that hitherto have eluded such research, because of the funda- mentally opaque nature of membership of such groups. The case in point is the Russian drugs community. We hope that continuing research along the lines we set out in this paper will help to map the dynamics of this group, and will ulti- mately contribute to halting, if not reverting its tragic tr end to grow. Acknowledgements The authors thank Dr. Sergey Mityagin from the Saint Petersburg Information and Analytical Center (SPb IAC) for fruit- ful discussions on the drug addiction profiles in the Russian Federa- tion. In addition, the authors would like to express their gratitude to Prof. dr. T.K. Dijkstra from the University of Groningen (RUG) and the Free University Amsterdam (VU) for introducing us with false discovery rate control and his useful remarks. This work is s upported by the Leading Scientist Program of the Russian Federation, contract 11.G34.31.0019, as well as by the Complexity program of NTU, Singa- pore. Peter Sloot also acknowledges the support from the FET-Proactive grant TOPDRIM, number FP7-ICT-318121. Appendix 1: LiveJournal User Interests In this appendix we take a closer look at the frequency with which interests are expressed by the users of the social net- work LiveJournal. Fig. 6 shows the frequency of occurrence of interests within the crawled population. Note that the dis- tribution is heavy right-tailed; its slope suggests that the dis- tribution might follow a power-law, see eq. (5). Fig. 6b shows the corresponding rank/frequency log-log plot of the his- togram in 6a. The exponent g ≈ 1.54 and the start of the distribution xmin = 3 were approximated using the maximum likelihood method as proposed by Clauset et al. (2009). Note that the fitted line in 6b approximates the distribution quite well. The standard goodness-of- fit test (Clauset et al. 2009 ) indicates there is no reason to believe that the distribution does not follow a power-law, i.e., the p-value was approxi- mately equal to .57. The fact that the distribution of interests within the SNS LiveJournal is heavy-right tailed explains why the number o f susceptible users (see Table 4) is relatively small compared to the other groups. References 1. Agar, M. (2005). Agents in living color: towards emic agent-based models. Journal of Arti ficial Societies and Social Simulati on 8(4). http://jasss.soc.surrey.ac.uk/8/1/4.html . Accessed 19 November 2012. 2. Agresti A (1992) A survey of exact inference for contingency ta- bles. Statistical Science 7(1):131–177 3. Albert R, Jeong H, Barabasi, AL (2000) Error and attack tolerance of complex networks. Nature 406:378–382 4. Beenstock M, Rahav G (2004) Immunity and susceptibility in il- licit drug initiation in Israel. Journal of Quantitative Criminology 20(2):117–142 5. Benjamini Y, Hochberg Y (1995) Controlling the false discovery rate: a practical and powerful approach to multiple testing . Journal of the Royal Statistical Society, Series B (Methodological) 57(1):289– 300 6. Benjamini Y, Yekutieli D (2001) The control of the false discov- ery rate in multiple testing under dependency. Annals of Sta tistics 29(4):1165–1188 7. Bernades DF, Latapy M, Tarissan F (2012) Relevance of SIR model for real-world spreading phenomena: experiments on a large -scale p2p system. Proceedings of the International Conference on Ad- vances in Social Network Analysis and Mining (ASONAM), Istan- bul (Turkey) 8. Bollobas B, Riordan O (2004) Robustness and vulnerability of scale-free random graphs. Internet Mathematics, 1(1): 1–3 5 9. Cafarella M, Cutting D (2004) Building Nutch: open source search. ACM Queue 2(2):54–61. doi: 10.1145/988392.988408 10. Choo KR, Smith RG (2008) Criminal exploitation of online sys- tems by organised crime groups. Asian Journal of Criminolog y 3(1):37–59 11. Clauset A, Shalizi C, Newman M (2009) Power-law dis- tributions in empirical data. SIAM review 51:661–703. doi: 10.1137/070710111 12. Coleman C, Moynihan J (1996) Understanding crime data: haunted by the dark figure. Open University Press. ISBN 0-335 - 19519-9 13. Crucitti P, Latora V, Marchiori M, Rapisarda A (2003) Effi ciency of scale-free networks: error and attack tolerance. Physic a A: Statis- tical Mechanics and it Applications 320:622–642 14. Daley D, Kendall D (1964) Epidemics and rumours. Nature 204:1118. doi: 10.1038/2041118a0 15. D ´ecary-H ´etu D, Morselli C (2011) Gang presence in soci al net- work sites. International journal of cyber criminology 5(2 ):876–890 16. Efron B (2010) Large-scale inference: empirical Bayes methods for estimation, testing and prediction. Cambridge Univers ity Press 17. EU RO PO L (2011) Internet facilitated organized crime. iOCTA (abridged). The Hague: European Police Office 18. Everitt B, Landau S, Leese M (2001) Cluster Analysis. Arnold, London 19. Ferri F, Grifoni P, Guzzo T (2012) New forms of social and p ro- fessional digital relationships: the case of Facebook. Social network analysis and mining 2(2):121–137 20. Fisher R (1922) On the interpretation c2 from contingency ta- bles, and the calculation of p. Journal of the Royal Statistical Society 85(1):87–94 21. Gallos LK, Bartt field P, Havlin S, Sigman M, Makse HA (2012 ) Collective behavior in the spatial spreading of obesity. Scienti fic Re- ports 2(45):1–9 22. Haynie D (2002) Friendship networks and delinquency: The rela- tive nature of peer delinquency. Journal of Quantitative Criminology 18(2):99–134 23. Hastie T, Tibshirani R, Friedman J (2009) The elements of statis- tical learning. Springer, New York 24. Iribarren JB, Moro E (2009) Impact of human activity patterns on the dynamics of information diffusion. Physical Review Letters 103(3):8–11 25. Kantardzic M (2011) Data mining: concepts, models, methods, and algorithms. IEEE Press, Wiley-Interscience 26. L ammel R (2007) Google’s MapReduce programming model — Revisted. Science of Computer Programming 70:1–30 12 L.J. Dijkstra et al. k n a r x a m / k n a r 10−2 10−3 10−4 a 101 103 105 Frequency b Fig. 6 a The histogram of interests expressed by the users in the craw led LiveJournal data set b The rank/frequency log-log plot of the histogram in 6a and the maximum likelihood power-law fit ( g ≈ 1.54 and xmin = 3) 27. Mityagin SA (2012) Modeling the spread of drug-addiction through the population on the basis of complex networks (in Russian - Modelirovanie processov narkotizatsiya nasileniya na osnove kom- pleksnix cetei). Dissertation, National Research University of Infor- mation Technologies, Mechanics and Optics (NRU ITMO) 28. Newman M (2005) Power laws, Pareto distributions and Zipf ’s law. Contemporary Physics 46:323–351 29. Ochiai A (1957) A zoogeographic studies on the solenoid fi shes found in Japan and its neighbouring regions. Bulletin of the Japanese Society of Fish Sciences 22:526–530 30. Onnela J, Saram aki J, Hyv onen J, Szab ´o G, Lazer D, Kaski K, Kert ´esz J, Barab ´asi AL (2007) Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences of the United States of America 104(8):7332–7336 31. Pinto C, Mendes Lopez A, Machado J (2012) A review of power laws in real life phenomena. Communications in Nonlinear Science and Numerical Simulation 17(9):3558–3578 32. Porter MF (1980) An algorithm for suffix stripping. Progr am 14(3):130–137 algo- Stemming (2006) MF 33. Porter rithms languages. European various for http://www.snowball.tartarus.org/texts/stemmersoverview.html . Accessed 19 November 2012. 34. Rhodes W, Kling R, Johnson P (2006) Using booking data to model drug user arrest rates: a preliminary to estimating th e preva- lence of chronic drug use. Journal of Quantitative Criminology 23(1):1–22 35. Scott J (2011) Social network analysis: developments, advances, and prospects. Social network analysis and mining 1(1):21– 26 36. Suler J (2004) The online disinhibition effect. Journal of Cy- berpsychology and Behaviour 7(3):321–326 37. Sunami AN (2007) Drug-conflict management in the context of information warfare (in Russian - Politika upravleniya narkokonflik- tom v kontekste informatsionnoi voiny). Saint Petersburg State Uni- versity. 38. Sutherland EH (1947) Principles of criminology. Philidelphia: JB Lippincott 39. Walsh C (2011) Drugs, the internet and change. Journal of Psy- choactive Drugs 43(1):55–63 40. Williams P (2001) Organized crime and cybercrime: synergies, trends and responses. Arresting Transnational Crime 6(2) 41. Wilson RE, Gosling SD, Graham LT (2012) A review of Face- book research in the social sciences. Perspectives on Psychological Science 7(3):203–220 42. White T (2009) Hadoop: the definitive guide. O’Reilly Med ia, Ya- hoo! Press
1904.05334
2
1904
2019-07-26T08:14:01
Nine Quick Tips for Analyzing Network Data
[ "cs.SI", "physics.soc-ph", "stat.ME" ]
These tips provide a quick and concentrated guide for beginners in the analysis of network data.
cs.SI
cs
Nine Quick Tips for Analyzing Network Data Vincent Miele1,*, Catherine Matias2, St´ephane Robin3, and St´ephane Dray1 1Universit´e de Lyon, F-69000 Lyon; Universit´e Lyon 1; CNRS, UMR5558, Laboratoire de Biom´etrie et Biologie ´Evolutive, F-69622 Villeurbanne, France 2Sorbonne Universit´e, Universit´e Paris Diderot, Centre National de la Recherche Scientifique, Laboratoire de Probabilit´es, Statistique et 3UMR MIA-Paris, AgroParisTech, INRA, Universit´e Paris-Saclay, F-75005, Mod´elisation, F-75005 Paris, France *Corresponding author: [email protected] Paris, France These tips provide a quick and concentrated guide for beginners in the analysis Abstract of network data. Introduction From the molecular to the ecosystem level, a biological system can often be represented as a set of entities that interact with other biological entities. Recent advances in data acquisition technology (e.g., high-throughput sequencing or tracking devices) open up the opportunity to quantify these interactions and call for the development of ambitious methodology to tackle these data. In this context, networks are widely used in Biology, Bioinformatics, Ecology, Neuroscience or Epidemiology to represent interaction data [1]. A network contains a set of entities (the nodes or vertices) that are connected by edges (or links) depicting some interactions or relationships. These relationships may be either directly observed or deduced from raw data. The first case encompasses protein-protein interaction (PPI) networks where interactions between two proteins are experimentally assessed or plant-pollinator interactions that are directly observed in the field. Gene regulatory networks reconstructed from gene expression data, co-occurrence networks inferred from species abundances or animal social contact networks deduced from GPS tracks are some examples of the second case. New kinds of networks are still emerging (for instance, cell-cell similarity networks [2], Hi-C networks and image similarity networks [3]). Networks are very attractive objects and many methods have been developed to analyze their structure. However, biological networks are often analyzed by non-specialists and it may be difficult for them to navigate through the plethora of concepts and available methods. In this paper, we propose nine tips to avoid common pitfalls and enhance the analysis of network data by biologists. 1 Tip 1: Formulate questions first, use networks later Network theory is well established and truly powerful but it cannot be used as a "black-box". Indeed, building a network should not be considered as an end in itself. We recommend to (i) establish a list of scientific questions and hypotheses before manipulating the data and then (ii) evaluate if these questions naturally translate into a series of network analyses, rather than making network analyses first and checking whether they raise questions after (in agreement with rule 1 in [4]). Indeed, it is generally immediate to represent/model the data with a network, but much trickier to translate a question into a network-based analysis. To this end, besides integrating the network formalism, it is important to embrace the network viewpoint. It relies on a cornerstone idea that makes the strength but also the challenge of network modelling: any interaction is considered within its context taking into account the other interactions that occur (or not). In this viewpoint, any interaction between the pair of nodes (A,B) is considered in the context of the other pairs involving A or B. For instance, the importance of a particular edge between two genes will be differently assessed if the target gene is or is not a hub (i.e. regulated by many genes). This viewpoint does not consider interactions as independent objects and is thus the exact opposite of examining the set of interactions one by one. Finally, it is obviously recommended to check whether your questions and data really fit the network viewpoint before performing any analysis. If the number of nodes and/or edges is very low, network analysis can be applied but results can be disappointing as they are not enough observed interactions to identify a structure in the data. On the other hand, although any matrix can be viewed as a network (one edge per cell, see next Tip), it is often more adequate to consider using non-network methods dedicated to complete matrices. For instance a correlation matrix, possibly viewed as a correlation network, can be naturally analysed with a hierarchical clustering or a principal component analysis. In other words, network analysis is not necessarily the answer when analysing a data matrix. Tip 2: Categorize your network data correctly To grab the cutting-edge concepts and methods in the networks field, learning the appropriate vocabulary from graph theory is a prerequisite [5]. In particular, it is important to categorize your network properly to be sure you apply suitable methods. Different network categories for different data lead to different approaches. Links can be directed (from a source to a target), possibly including self-loops (e.g., a protein interacting with itself or cannibalism in food webs). Ignoring this information for the sake of simplicity would actually betray the original data. When dealing with edges embedding a value (a weight), we strongly advise you to avoid transforming the network into a binary one using any ad-hoc threshold value. Indeed it clears a significant part of the available information because some aspects of the network structure might be undetected in the binarized network [6]. This binarization could be used as an exploratory step only (for instance, to facilitate a first visualization step - see Tip 4), but it can bias your analysis (e.g., a nested pattern can be observed in binarized ecological networks but no not in weighted ones [7]). Methods handling weighted networks are usually available and therefore more efficient. Furthermore, the data analyst must be very cautious since, in the literature, weights can be considered as intensity-based (the greater the weight, the stronger the edge is) as well as distance-based (the smaller the weight, the closer the nodes are). Nodes can belong to different categories and edges can be allowed only between nodes of different categories (bi/tri/multi-partite networks; e.g., nodes as hosts/parasites 2 or as plant/fungus/seed dispersers [8]). It is mandatory to select methods that handle this particularity. For instance, many statistical approaches rely on the expected number of edges (e.g., in the computation of modularity, see Tip 5) which is here clearly different compared to the unipartite case. Finally, additional information on the nodes is often available. For instance, nodes can have spatial positions (e.g., nodes as habitat patches or farms in 2D, brain area in 3D) or can be associated to external attributes (e.g., species traits in a food web). This additional information can be explicitly considered in the analysis, either to understand if it contributes to organize the network [9], or to look for some remaining structure once accounted for its effect (e.g., spatial [10] or phylogenetic effect [11]). In the former case, a simpler but suboptimal alternative often consists in using this information a posteriori in the interpretation of results (e.g., explaining the structure of genetic networks with spatial information [12] or comparing network structure with metadata [13]). Tip 3: Use specific network analysis software A range of versatile software is dedicated to network analysis. It is therefore a waste of time trying to use unspecific tools. These software tools belong to two distinct categories that have pros/cons: graphical user interface (mouse-based navigation) and software packages (command line interface or programming). The first category is mainly dedicated to powerful and interactive visualization (see Tip 4). It includes the two major open source software tools Gephi and Cytoscape, both supported by an active community. They also offer the computation of some network metrics (the choice of a relevant metric is discussed in Tip 5). The second category is dominated by the two leading general-purpose network packages NetworkX and igraph, but there exist plenty of more specific packages (for instance bipartite in R). Browser-based visualization [14] recently emerged as an intermediate category, mostly based on a collection of javascript libraries (e.g., Sigma.js). That said, we strongly suggest that you learn programming and scripting your analysis (in agreement with papers in the "10 simple rules" collection about computing skills and reproducibility [15, 16]). Dealing with reproducible code enhances network research: you can re-run with no effort the complete analysis on a modified version of your raw data, on different datasets and share the code with others colleagues interested in the modelling approach. Finally, there exist a limited set of common network file formats (e.g., adjacency list in the format source target) that you should adopt from the very beginning, to easily switch between different software tools. Meanwhile, the data analyst should avoid a hasty use of the different functions implemented in these tools. As underlined in Tips 5 and 6, it is crucial to understand the metrics/methods before running functions, and to select the appropriate ones with respect to the questions and the data at hand. Tip 4: Be aware that network visualization can be useful but possibly misleading One powerful aspect of networks is their ability to depict complex data in a single object. It can be therefore tempting to represent networks graphically in two dimensions: nodes are spread in the plane and edges drawn with the objective to achieve the most aesthetic design (the nodes'positioning is called a layout). This apparently simple task is in fact a very hard combinatorial problem. An active research community proposed a series of heuristics aiming at obtaining a nice network view in a 3 reasonable time, despite the growing size of available networks. The aforementioned tools (see Tip 3) embed a wide range of easy-to-use layouts. Graphics are usually considered as an important tool for exploratory data analysis [17]. However, special care is required to not over-interpret network visualization. A layout does not only provide a nice representation of a network, it makes it optimal for a given set of objectives (e.g., maximizing attractions between connected nodes) that you often ignore. As a consequence, what you see with your eyes can be biased. When visualizing a network, always keep in mind that the position of a node in such a display is not part of the data, but results from an algorithm. Hence, the distance between two nodes should not be interpreted as an intrinsic measure of proximity as another display algorithm would result in a possibly very different distance (see the distances between the two red nodes in Figure 1a-b). On the other hand, network visualization can be useful as a way to illustrate the results of a network analysis (as presented in Tips 5 and 6). In this case, a layout should be chosen for its ability to highlight network properties (Figure 1c) or conclusions drawn by an analysis (Figure 1d). For instance, nodes can be positioned according to the values of some particular metrics of interest [18]. In any case, we encourage biologists to clearly describe the layout used in any graphical representation of a network in scientific publications, especially to make it reproducible. Lastly, we also advise to consider visualizing the adjacency matrix as a heatmap/a colored matrix (see Figure 1 in [19] for an explanation). It allows to represent the presence or weight of edges (colored cells) but it has also the advantage to highlight edges' absence (blank matrix cells). This is particularly relevant when the matrix rows/columns are reordered in an informative manner (e.g., by increasing value of a metric [20] or according to some clustering results; see Tips 5 and 6 and Figure 1 d). a) b) c) d) Fig 1. Four visualizations of the same network modelling interactions between 64 sociable weavers [14, 21]. a) Random layout. b) Fruchterman and Reingold layout. c) Circle layout where nodes'size and position are defined by their degree. The same two nodes are colored in red in panels a-c to show their distance varies depending on the layout. d) Representation of the adjacency matrix with row/columns ordering consistent with the clustering obtained with the Infomap algorithm (see [22] for details). Graphical representations are performed with the package igraph. Tip 5: Avoid blind use of metrics, understand formu- las instead Beside the limitations of network visualization, describing a network can also (and advantageously) consist in computing summary statistics. The beginner will immediately find the path to a series of network metrics: one number per node or edge (local metrics; e.g., degree) or one number for the whole network (global metrics; e.g., connectance/density or modularity). Metrics have proliferated and it is strongly advised to take time to read carefully the mathematical definition of the metrics one has at hand (see also Tip 9): the deeper the mathematical understanding, the easier the 4 lllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllllll interpretation is. For instance, the concept of nodes'centrality goes with a range of centrality metrics that have different meanings. Moreover, it is so easy to compute any metric with the aforementioned software tools that it can sometimes prevent the analyst to check their pros/cons. As an example, reading the definition of the widely-used betweenness centrality, you can understand it is based on shortest paths. If you intend to use this measure, it is therefore necessary to check whether the shortest path is a relevant concept associated to the process under study (such as energy fluxes in food webs) or if it is more questionable (e.g., paths in functional networks may not actually correspond to information flow [19], paths in contact networks may not be relevant when information or disease diffusion is not studied [23]). Another example consists in the analysis of directed and/or weighted networks with extensions of metrics to this case. It is important to note that the formula of the weighted degree accounts for two effects: how many neighbours and how large the weights are, two effects that are impossible to disentangle (a weighted degree of 2 can correspond to a single edge of weight 2 or four edges of weights 0.5). A similar problem can also be raised for the weighted path (potential pitfalls highlighted in [24]). Lastly, global metrics are often used to compare networks (networks measured from different data or conditions, or simulated networks as mentioned in Tip 7). In this case, special care should be taken when comparing values because metrics differences can be a side effect of differences in simple network characteristics such as the number of nodes or edges (see common pitfalls mentioned in [25] for brain networks and a discussion on co-variation of metrics with characteristics of ecological networks in [26]). For instance, modularity, number of modules and network size are known to be intertwined [27]. It is not unusual that authors, instead of choosing a given metric adapted to a particular question, compute a high number of metrics among the available ones. However, many metrics are correlated (see a correlation study in [23]) and it becomes necessary to deal with this redundancy to interpret the results (e.g., with an ordination method [28]). This approach is not hypothesis-driven as recommended in Tip 1 and can undeniably be replaced by an incremental approach where metrics are selected one at a time for their ability to check particular hypothesis associated to the fundamental questions on the data (as for many statistical analysis, see rule 5 in [4]). Tip 6: Avoid blind use of clustering methods, check their difference instead With the data avalanche arising this decade, leading to larger networks, clustering has become one of the most popular tool to get a comprehensive view of the network structure. Its general purpose is to aggregate nodes into clusters in order to identify a meso-scale structure in the network (i.e. zooming out the network). Choosing a network clustering raises similar issues than for choosing a network metric (Tip 5). It is much more than using one of the functions available in a software. Indeed, likewise any clustering methods, the ones dedicated to networks aim at gathering similar objects (i.e. nodes) and thus relies on a specific definition of node similarity. What does the analyst want to be similar in a network? Discussing the pros/cons of the different methods is beyond the scope of this article whereas a massive literature on the topic exists (see Tip 9). However, we illustrate the impact of choosing a specific definition for node similarity with three classical proposals (among others). A first and natural definition for the similarity between nodes is the existence of a connection between them. Based on this definition, network clustering consists in finding a modular structure, i.e. identifying dense clusters of nodes (also called modules or communities) poorly connected with others. Community detection methods [22] 5 implement this approach, which implicitly assumes the existence of modules in the network. They were successfully applied in many studies in Biology (for instance to identify chromatin domains [29]). A second approach considers that two nodes are similar when they tend to be connected (or unconnected) with the same type of nodes. Hence, species in a food web are considered similar if they have similar preys and predators [30]. This definition can accommodate networks with non-modular structure [31] since it assumes that the nodes are involved in a "diversity of meso-scale architectures" [32]. The stochastic block model (SBM) is a popular method based on this definition [31, 33], which has shown to be relevant for the analysis of some biological networks (to highlight the complex architecture of connectomes [32] or functional groups in ecological networks [34]). One important feature is that it allows to model explicitly edge directions and weights by means of different statistical distributions [11]. A third approach consists in associating a vector of characteristics to each node and then to gather nodes with similar characteristics. This includes motifs-based approaches [35] and a wide range of innovative node's embedding techniques [36, 37]. Nodes are described as points in a space with reasonable low dimension, which allows to apply the huge variety of existing clustering methods for multivariate data. It is important to realize that each of these similarity concepts naturally results in different nodes clustering. The choice between these alternatives must be driven by biological questions not by their availability in software tools (Tip 1). Tip 7: Don't choose the easy way when simulating networks To highlight the properties specific to an observed network (for instance a peculiar metric value), a common practice consists in comparing with simulated networks. These properties are detected as significant deviation (or not) from a typical behaviour implemented in simulated networks. However, there is no generic definition of a typical network and, as a consequence, the features that can be detected depends dramatically on the null model used to simulate networks. This null model must be chosen for a given purpose, fitting expected behaviours whereas contrasting those we are interested in. In other words, it must fit the data reasonably well to avoid numerous false discoveries, but not too well so that deviations can emerge. A natural option could consist in selecting a null model among the series of random graph models (e.g., Erdos-R´enyi, small-world, scale-free, SBM, Exponential Random Graph, configuration model). However, we recommend not to use them too hastily because they are often too general. For example, the Erdos-R´enyi model (all edges independent and having the same probability of occurrence) is often a poor null model to detect nodes having an unexpectedly high degree. Indeed, it induces a Poisson degree distribution which is so far from the one observed in most networks that many nodes appear to be unexpectedly connected. On the opposite, no node can display an unexpectedly high degree with respect to the configuration model, as this null model precisely fits to the degree of each node. Moreover, the analyst is usually aware of a series of properties that should be displayed by a simulated network: imbalanced degree distribution, different nodes' roles associated with available side information, forbidden interactions (e.g., depending on body-mass in food webs [38]), etc. Such expected properties must be encoded in the simulation process (for instance a fixed degree sequence [34]), otherwise they will emerge and be detected as significant, or contribute to detect false significant effects as side effects. As an example, when assessing whether the number of feed-forward loops is unexpected in a given transcription network, the simulation procedure must rely on fixed number of nodes and degrees whereas the 6 number of these loops remains free. Lastly, when the network under study is not directly observed but built from raw data interpretation, it can be relevant to simulate the whole construction process. Consider the case of contact networks inferred from movement data [23]: one can either simulate trajectories keeping some properties of the original data and then build a contact network, or directly simulate a "realistic" contact network. The former approach will intrinsically account for the uncertainties and biases induced by the construction steps, which are likely to be overlooked by the later approach. Tip 8: Reconsider the data to build multiple network layers A network object can be the result of data aggregation. Indeed, interactions are often observed at different times, locations or for different conditions. You are therefore strongly urged to keep in mind (and at hand) the different layers of data (time, space, type,...) and consider networks composed by multiple layers, because multilayer networks can provide new insights compared to an aggregated one [39 -- 41]. A network is called dynamic when it gathers a time series of network snapshots corresponding to successive rounds of data collection (the nodes' list possibly varying in time). In this case, the temporal variability of the network structure can be assessed (e.g., rewiring of interactions or changes in network metrics over time) and extensions of the concepts developed in Tip 6 now exist in the dynamic case [42, 43]. For instance, the dynamics of animal social structure can be inferred from dynamic networks to enhance the understanding of disease transmission [44]. On another hand, interactions can be observed at different spatial locations. In ecology, they are often aggregated in a metanetwork (or metaweb [45]) to study how the local networks differ from this metanetwork and explain these variations with environmental factors. In these two cases, multiple layers allows to describe a network as an evolving object and the analysis aim to identify the spatio-temporal variations of interactions and their drivers. Different kind of interactions can also be observed between nodes. Stacking layers representing molecular interactions in different human tissues [46] or mapping extrasynaptic and synaptic connectomes [47] leads to a multiplex network: between any two nodes, there possibly exist more than one edge, one per interaction type at most (often visualized with different colors). Taking jointly into account the different layers enhances the understanding of the nodes' interplay. For instance, using jointly trophic and non-trophic interactions enhances the definition of species ecological roles compared to the use of single layers independently [34]. Finally, it is also possible to integrate different layers of information with different sets of nodes for each layer, such as proteins and chemical compounds [48]. In this case, different kind of interactions are defined inside and between layers. In all these cases, different information layers are integrated into a comprehensive network such that they are treated jointly rather than one after the other. Tip 9: Dive into the network literature, beyond your discipline Network science has emerged "at the dawn of the 21st century" [49]. It now involves a hyper-active community of researchers from different domains such as Physics, Statistics, Computer Science or Social Science. As a result, a massive literature on networks exists and it is challenging for biologists to dive into it. Indeed, we are not 7 used to explore the bibliography outside our research domain. Reference books [5, 41, 49, 50] and reviews [22, 39, 51] are obviously good entry-points for developing your network skills. However, without any doubt you will highly benefit from a round trip in this literature exogenous to your field, provided that you make the effort to learn the appropriate vocabulary of this area. Conclusion The 9 tips presented here should be a way for the data analyst to get a foot in the door of network data analysis. These tips are not exclusive and we are aware of other network-based questions that deserve a special interest, including diffusion on networks for instance. Still, the network non-specialist must be confident in his ability to learn, step by step, the network concepts and methods with a productive effect on his scientific questions. Acknowledgements This work was partially supported by the grant ANR-18-CE02-0010-01 of the French National Research Agency ANR (project EcoNet). References 1. T. Ideker and R. Nussinov, "Network approaches and applications in biology," PLoS computational biology, vol. 13, no. 10, p. e1005771, 2017. 2. M. Zitnik, R. Sosi, and J. Leskovec, "Prioritizing network communities," Nat Commun, vol. 9, no. 1, p. 2544, 2018. 3. B. Wang, A. Pourshafeie, M. Zitnik, J. Zhu, C. D. Bustamante, S. Batzoglou, and J. Leskovec, "Network enhancement as a general method to denoise weighted biological networks," Nat Commun, vol. 9, no. 1, p. 3108, 2018. 4. R. E. Kass, B. S. Caffo, M. Davidian, X.-L. Meng, B. Yu, and N. Reid, "Ten simple rules for effective statistical practice," 2016. 5. R. Diestel, "Graph theory." http://diestel-graph-theory.com, 2016. 6. A. Barrat, M. Barthelemy, R. Pastor-Satorras, and A. Vespignani, "The architecture of complex weighted networks," Proceedings of the national academy of sciences, vol. 101, no. 11, pp. 3747 -- 3752, 2004. 7. P. P. Staniczenko, J. C. Kopp, and S. Allesina, "The ghost of nestedness in ecological networks," Nature communications, vol. 4, p. 1391, 2013. 8. G. A. Pavlopoulos, P. I. Kontou, A. Pavlopoulou, C. Bouyioukos, E. Markou, and P. G. Bagos, "Bipartite graphs in systems biology and medicine: a survey of methods and applications," GigaScience, vol. 7, no. 4, p. giy014, 2018. 9. V. Miele, F. Picard, and S. Dray, "Spatially constrained clustering of ecological networks," Methods in Ecology and Evolution, vol. 5, no. 8, pp. 771 -- 779, 2014. 10. P. Expert, T. S. Evans, V. D. Blondel, and R. Lambiotte, "Uncovering space-independent communities in spatial networks," Proceedings of the National Academy of Sciences, vol. 108, no. 19, pp. 7663 -- 7668, 2011. 8 11. M. Mariadassou, S. Robin, C. Vacher, et al., "Uncovering latent structure in valued graphs: a variational approach," The Annals of Applied Statistics, vol. 4, no. 2, pp. 715 -- 742, 2010. 12. M. A. Fortuna, R. G. Albaladejo, L. Fern´andez, A. Aparicio, and J. Bascompte, "Networks of spatial genetic variation across species," Proceedings of the National Academy of Sciences, vol. 106, no. 45, pp. 19044 -- 19049, 2009. 13. D. Hric, R. K. Darst, and S. Fortunato, "Community detection in networks: Structural communities versus ground truth," Physical Review E, vol. 90, no. 6, p. 062805, 2014. 14. R. Rossi and N. Ahmed, "The network data repository with interactive graph analytics and visualization," in Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015. 15. G. K. Sandve, A. Nekrutenko, J. Taylor, and E. Hovig, "Ten simple rules for reproducible computational research," PLoS Comput. Biol., vol. 9, no. 10, p. e1003285, 2013. 16. M. A. Carey and J. A. Papin, "Ten simple rules for biologists learning to program," PLoS Comput. Biol., vol. 14, no. 1, p. e1005871, 2018. 17. J. W. Tukey, Exploratory data analysis. Reading: Addison-Wesley, 1977. 18. M. Krzywinski, I. Birol, S. J. Jones, and M. A. Marra, "Hive plots -- rational approach to visualizing networks," Briefings in Bioinformatics, vol. 13, no. 5, pp. 627 -- 644, 2011. 19. M. Rubinov and O. Sporns, "Complex network measures of brain connectivity: uses and interpretations," Neuroimage, vol. 52, no. 3, pp. 1059 -- 1069, 2010. 20. J. Bascompte, P. Jordano, C. J. Meli´an, and J. M. Olesen, "The nested assembly of plant -- animal mutualistic networks," Proceedings of the National Academy of Sciences, vol. 100, no. 16, pp. 9383 -- 9387, 2003. 21. R. E. Van Dijk, J. C. Kaden, A. Arguelles-Tic´o, D. A. Dawson, T. Burke, and B. J. Hatchwell, "Cooperative investment in public goods is kin directed in communal nests of social birds," Ecology letters, vol. 17, no. 9, pp. 1141 -- 1148, 2014. 22. S. Fortunato and D. Hric, "Community detection in networks: A user guide," Physics Reports, vol. 659, pp. 1 -- 44, 2016. 23. D. R. Farine and H. Whitehead, "Constructing, conducting and interpreting animal social network analysis," J Anim Ecol, vol. 84, no. 5, pp. 1144 -- 1163, 2015. 24. A. Costa, A. M. M. Gonzalez, K. Guizien, A. M. Doglioli, J. M. Gomez, A. Petrenko, and S. Allesina, "Ecological networks: Pursuing the shortest path, however narrow and crooked," bioRxiv, p. 475715, 2018. 25. B. C. Van Wijk, C. J. Stam, and A. Daffertshofer, "Comparing brain networks of different size and connectivity density using graph theory," PloS one, vol. 5, no. 10, p. e13701, 2010. 26. L. Pellissier, C. Albouy, J. Bascompte, N. Farwig, C. Graham, M. Loreau, M. A. Maglianesi, C. J. Meli´an, C. Pitteloud, T. Roslin, et al., "Comparing species interaction networks along environmental gradients," Biological Reviews, vol. 93, no. 2, pp. 785 -- 800, 2018. 9 27. S. Fortunato and M. Barthelemy, "Resolution limit in community detection," Proceedings of the National Academy of Sciences, vol. 104, no. 1, pp. 36 -- 41, 2007. 28. S. Kortsch, R. Primicerio, M. Aschan, S. Lind, A. V. Dolgov, and B. Planque, "Food-web structure varies along environmental gradients in a high-latitude marine ecosystem," Ecography, vol. 42, no. 2, pp. 295 -- 308, 2019. 29. H. K. Norton, D. J. Emerson, H. Huang, J. Kim, K. R. Titus, S. Gu, D. S. Bassett, and J. E. Phillips-Cremins, "Detecting hierarchical genome folding with network modularity," Nature methods, vol. 15, no. 2, p. 119, 2018. 30. S. Allesina and M. Pascual, "Food web models: a plea for groups," Ecol. Lett., vol. 12, no. 7, pp. 652 -- 662, 2009. 31. M. E. Newman and E. A. Leicht, "Mixture models and exploratory analysis in networks," Proceedings of the National Academy of Sciences, vol. 104, no. 23, pp. 9564 -- 9569, 2007. 32. R. F. Betzel, J. D. Medaglia, and D. S. Bassett, "Diversity of meso-scale architecture in human and non-human connectomes," Nature Communications, vol. 9, no. 1, p. 346, 2018. 33. J.-J. Daudin, F. Picard, and S. Robin, "A mixture model for random graphs," Statistics and computing, vol. 18, no. 2, pp. 173 -- 183, 2008. 34. S. K´efi, V. Miele, E. A. Wieters, S. A. Navarrete, and E. L. Berlow, "How Structured Is the Entangled Bank? The Surprisingly Simple Organization of Multiplex Ecological Networks Leads to Increased Persistence and Resilience," PLoS Biol., vol. 14, no. 8, p. e1002527, 2016. 35. D. B. Stouffer, M. Sales-Pardo, M. I. Sirer, and J. Bascompte, "Evolutionary conservation of species' roles in food webs," Science, vol. 335, no. 6075, pp. 1489 -- 1492, 2012. 36. B. Perozzi, R. Al-Rfou, and S. Skiena, "Deepwalk: Online learning of social representations," in Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD '14, (New York, NY, USA), pp. 701 -- 710, ACM, 2014. 37. A. Grover and J. Leskovec, "node2vec: Scalable feature learning for networks," in Proceedings of the 22nd ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 855 -- 864, ACM, 2016. 38. U. Brose, T. Jonsson, E. L. Berlow, P. Warren, C. Banasek-Richter, L.-F. Bersier, J. L. Blanchard, T. Brey, S. R. Carpenter, M.-F. C. Blandenier, et al., "Consumer -- resource body-size relationships in natural food webs," Ecology, vol. 87, no. 10, pp. 2411 -- 2417, 2006. 39. S. Boccaletti, G. Bianconi, R. Criado, C. I. Del Genio, J. G´omez-Gardenes, M. Romance, I. Sendina-Nadal, Z. Wang, and M. Zanin, "The structure and dynamics of multilayer networks," Physics Reports, vol. 544, no. 1, pp. 1 -- 122, 2014. 40. S. Pilosof, M. A. Porter, M. Pascual, and S. K´efi, "The multilayer nature of ecological networks," Nature Ecology & Evolution, vol. 1, no. 4, p. 0101, 2017. 41. G. Bianconi, Multilayer Networks: Structure and Function. Oxford university press, 2018. 10 42. C. Matias and V. Miele, "Statistical clustering of temporal networks through a dynamic stochastic block model," Journal of the Royal Statistical Society: Series B (Statistical Methodology), vol. 79, no. 4, pp. 1119 -- 1141, 2017. 43. G. Rossetti and R. Cazabet, "Community discovery in dynamic networks: a survey," ACM Computing Surveys (CSUR), vol. 51, no. 2, p. 35, 2018. 44. D. Farine, "The dynamics of transmission and the dynamics of networks," Journal of Animal Ecology, vol. 86, no. 3, pp. 415 -- 418, 2017. 45. M. Ohlmann, V. Miele, S. Dray, L. Chalmandrier, L. O'Connor, and W. Thuiller, "Diversity indices for ecological networks: a unifying framework using Hill numbers," Ecology letters, 2019. 46. M. Zitnik and J. Leskovec, "Predicting multicellular function through multi-layer tissue networks," Bioinformatics, vol. 33, no. 14, pp. i190 -- i198, 2017. 47. B. Bentley, R. Branicky, C. L. Barnes, Y. L. Chew, E. Yemini, E. T. Bullmore, P. E. V´ertes, and W. R. Schafer, "The multilayer connectome of caenorhabditis elegans," PLoS computational biology, vol. 12, no. 12, p. e1005283, 2016. 48. A. J. Berenstein, M. P. Magarinos, A. Chernomoretz, and F. Aguero, "A multilayer network approach for guiding drug repositioning in neglected diseases," PLoS neglected tropical diseases, vol. 10, no. 1, p. e0004300, 2016. 49. A.-L. Barab´asi, "Network science." http://networksciencebook.com, 2019. 50. M. Newman, Networks. Oxford university press, 2018. 51. P. Goyal and E. Ferrara, "Graph embedding techniques, applications, and performance: A survey," Knowledge-Based Systems, vol. 151, pp. 78 -- 94, 2018. 11
1308.1118
1
1308
2013-08-05T21:00:08
Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks
[ "cs.SI", "physics.soc-ph" ]
With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The primary purpose of people in the OffESNs is to acquire and share information via attending prescheduled events. Event Recommendation over this kind of networks can facilitate attendees on selecting the prescheduled events and organizers on making resource planning. However, because of lack of users preference and rating information, as well as explicit social relations, both rating based traditional recommendation methods and social-trust based recommendation methods can no longer work well to recommend events in the OffESNs. To address the challenges such as how to derive users latent preferences and social relations and how to fuse the latent information in a unified model, we first construct two heterogeneous interaction social networks, an event participation network and a physical proximity network. Then, we use them to derive users latent preferences and latent networks on social relations, including like-minded peers, co-attendees and friends. Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise factor graph to infer event attendance probabilities for recommendation. Experiments on an RFID-based real conference dataset have demonstrated the effectiveness of the proposed model compared with typical solutions.
cs.SI
cs
Latent Networks Fusion based Model for Event Recommendation in Offline Ephemeral Social Networks Guoqiong Liao, Yuchen Zhao, Sihong Xie, Philip S. Yu lasting for some short period of time. The networks primarily rely on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices to facilitate people connecting with each other freely[1-5]. Differing from online social networks, where people tend to share recent experiences and make long-standing friends with relationships, the OffESNs are face-to-face interaction and event- driven dynamic networks, where people are apt to share information and make temporary friends via physical proximity[6]. Some fundamental and important questions of the OffESNs still remain unexplored. For example, what are the factors to influence users’ behaviors? Is there any latent social relation in the networks? Can we recommend events effectively by the latent social relations? And so on. Basically, the primary purpose of people in the OffESNs is to acquire and share information via attending some prescheduled events such as keynotes, talks or exhibitions. It is an interesting and important work to make personalized recommendation over this kind of events. On the one hand, it can help attendees identify the potential conflict on multiple scheduling events and facilitate them making attendance decisions easily, since it is a common phenomenon in the networks that there are multiple events to be scheduled simultaneously due to the constraint of short period. On the other hand, it can also help event organizers guide resource planning. For example, if we can predict, based on the recommendation results, that the number of the people who will attend a future event is more than the capacity of its assigned room, the organizers can reassign a larger room for the event in advance. Motivating example. Let’s consider a scenario of an academic conference held in a specific hotel, where many people gather together for a few days, to attend keynotes or parallel sessions, or share personal experiences with their friends freely. This is a typically scenario of the OffESNs where people can make free face-to-face interactions frequently. For example, Bob is attending a conference, where there are 10 talks to be held during 10:00am~11:00am, on the first day. Our task is to recommend a ranked list of the 10 events to Bob by his individual features and the latent social relations. Moreover, we can provide the predicted numbers of people attending the future events to the organizers for resource allocation. In the research domain of recommender systems, numerous studies have focused on item recommendation (e.g., movies, books, commodities). Such systems are widely implemented in e- commerce systems according to users’ historical rating data[7]. Recently, with the popularity of social networks, social-trust based recommendation has recently been proposed to improve recommendation accuracy[8-11]. However, both of the two kinds of methods can no longer work well to recommend the events in the OffESNs due to following reasons. − Lack of users’ preference and rating information. Differing from the item recommendation in the Web, it is difficult to ask people to provide their real preference and give comments or ratings on the occurred events in the offline environment. Although we can retrieve a user’s features such as research ABSTRACT With the growing amount of mobile social media, offline ephemeral social networks (OffESNs) are receiving more and more attentions. Offline ephemeral social networks (OffESNs) are the networks created ad-hoc at a specific location for a specific purpose and lasting for short period of time, relying on mobile social media such as Radio Frequency Identification (RFID) and Bluetooth devices. The primary purpose of people in the OffESNs is to acquire and share information via attending prescheduled events. Event Recommendation over this kind of networks can facilitate attendees on selecting the prescheduled events and organizers on making resource planning. However, because of lack of users’ preference and rating information, as well as explicit social relations, both rating based traditional recommendation methods and social-trust based recommendation methods can no longer work well to recommend events in the OffESNs. To address the challenges such as how to derive users’ latent preferences and social relations and how to fuse the latent information in a unified model, we first construct two heterogeneous interaction social networks, an event participation network and a physical proximity network. Then, we use them to derive users’ latent preferences and latent networks on social relations, including like-minded peers, co-attendees and friends. Finally, we propose an LNF (Latent Networks Fusion) model under a pairwise factor graph infer event attendance to probabilities for recommendation. Experiments on an RFID- based real conference dataset have demonstrated the effectiveness of the proposed model compared with typical solutions. Categories and Subject Descriptors H2.8 [Data Mining]: Database Application – data mining General Terms Algorithms; Performance; Design; Experimentation Keywords Event recommendation; Ephemeral social networks; Offline social networks; Heterogeneous networks; Factor graph model 1. INTRODUCTION W i t h t h e g r ow ing amoun t o f mob i l e so c i a l m ed i a , o f f l in e ephemeral social networks (OffESNs) are receiving more and more attentions. The OffESNs are defined as a kind of offline social networks created ad-hoc at a specific location for a specific purpose, e.g., hosting an academic conference or an expo, and Guoqiong Liao is with the School of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013, China. E-mail: [email protected] . This work was done when he visited UIC. Yuchen Zhao is with Sumo Logic, Redwood 94063, USA. E-mail: zycemail @gmail.com. This work was done when he was a Ph. D. student at UIC. Sihong Xie is with the Department of Computer Sciences, University of Illinois at Chicago(UIC), Chicago 60607, USA.E-mail: [email protected]. Philip S. Yu is with the Department of Computer Sciences, University of Illinois at Chicago(UIC), Chicago 60607, USA.E-mail: [email protected]. 1 interests from the Web, we still don’t know exactly which event is his/her favorite when he/she faces multiple events at the same time. Hence, the rating based traditional recommendation methods become invalid in the OffESNs. − Lack of explicit social relations information. In general, we usually don’t know who old friends are or who will become new friends in the offline networks, so it is also difficult to obtain trusted social relations for recommendation. Zhuang et al.[2] used the online information such as co-authorships to facilitate predicting whether a pair of users will meet together in future time in a conference scenario. But the co-author relationships don’t mean trusted relationships. Moreover, in some offline scenarios such as the expos, there are no co- authorships. Thus, the social-trust based methods cannot be used for event recommendation in the OffESNs effectively too. Therefore, it is necessary to study new methods to recommend the events in the OffESNs. According to our observations, whether people attend the prescheduled events in the OffESNs are mainly determined by the factors in two aspects: individual interests or preferences on event contexts; social relations such as like- minded peers, co-attendees and friends, which are very useful for event recommendation. Unfortunately, we have little explicit information about them. Hence, there are two major challenges to recommend events in the networks: − How to derive users’ latent preferences and the latent social relations interaction the observed historical from information in the networks? − How to fuse multiple latent networks on social relations into a unified model to recommend the events effectively? To address the challenges, we first construct two observed heterogeneous interaction networks, an event participation network from human-event interactions and a physical proximity network from human-human interactions, to derive the latent preferences and the social relation networks. Then, we establish a fusion model to merge the latent networks to infer the probabilities that users will attend the future events. Finally, based on the probabilities, a ranked event list is recommended to each user. To the best of our knowledge, this paper is the first work to define, construct and fuse multiple latent social networks for event recommendation in the offline social networks. Specifically, our contributions can be summarized as follows. − We model the activities in the OffESNs as prescheduled events two observed and spontaneous events, and construct heterogeneous interaction networks: an event participation network and a physical proximity network. − Based on the statistical measures on the two heterogeneous networks, we derive users’ latent context preferences and three latent social relation networks, including a preference similarity network, an attendance relevancy network and an encounter network, to identify the social relations of like- minded peers, co-attendees and friends. − We propose an effective Latent Networks Fusion (LNF) model based on a pairwise factor graph to fuse the three latent networks to infer the probabilities that users will attend the future events based upon their contexts, and provide a ranked event list for each user. 2 − Experiments on a real RFID-based conference dataset have demonstrated the effectiveness of our approach. The rest of the paper is arranged as follows. We introduce the two heterogeneous interaction networks and problem statement in Section 2. In Section 3, we discuss our observations, and derive users’ latent preferences and multiple latent social relation networks. We suggest a Latent Networks Fusion (LNF) model to fuse infer event attendance to latent networks three the probabilities and give an event ranking algorithm in section 4. In Section 5, we verify and evaluate the performance of the proposed model-based recommendation methods under a RFID-based real dataset. Section 6 is the related works, and we conclude the paper in the end. 2. HETEROGENOUS SOURCES AND PROBLEM STATEMENT 2.1 Heterogeneous interaction networks In the OffESNs, people not only attend the prescheduled events, but also like to gather together spontaneously to talk about their common interests. Hence, the networks will generate a great deal of interaction information. In this work, we represent all activities in the networks as events. Definition 1 (prescheduled events). The prescheduled event is a scheduled social activity organized by the sponsors, e.g., an opening ceremony, a keynote or a talk. Such events usually have context information such as topics, time, locations, etc. From the prescheduled events, we can obtain a lot of ephemeral human-event interaction information, e.g., event participation durations. Definition 2 (spontaneous events). The spontaneous event is a social activity initiated spontaneously by two or more people, such as having lunch together, talking about papers, news or else. Such events are unpredictable and are generated occasionally. Differing from the prescheduled events, sometimes we don’t know what people are actually doing in the spontaneous events. But from such events, we can obtain a great amount of sporadic human-human interactions (i.e., physical proximity) information, e.g., encounter durations and frequencies. Physical proximity is a significant metric to quantify users’ offline behaviors[6]. For example, one may have much more physical proximity information with his friends than with other people. Note that the recommendation task discussed in this paper is to recommend the prescheduled events. If there is no specific statement, the events mentioned in the paper indicate the prescheduled events. Definition 3 (physical proximity). If two or more people are involving in a spontaneous event for some period of time detected by the sensor devices, it is said that they are in physical proximity. i.e., they are encountering. Physical proximity indicates the face-to-face interactions only generated from the spontaneous events, while the proximity due to attending the prescheduled events will be represented as another kinds of relations - co-attendees, which will be discussed in Section 3.1. In order to eliminate the noisy proximity information, it is required that the lasting time of each encounter should be longer than a duration threshold, which is determined by the specific scenario. In addition, although physical proximity is related to locations, here we put more attention on the facts that two or more people stay closely together. Therefore, the locations are not relevant information here. Thus, from the above two kinds of events, we can establish two observed heterogeneous interaction networks: an event participation (human-event interaction) network and a physical proximity (human-human interaction) network. Fig. 1(a) is an example of the event participation network to record the 4 users’ participation history on the prescheduled events till t is 2. In each time, 3 events were held simultaneously. The network is a bipartite graph including user nodes (u1~u4) and event nodes (e1.1~e1.3, e2.1~e2.3.). The edge attribute is the participation duration of the specific user on the specific event. The example of the physical proximity network is shown as Fig. 1(b), which is used to record the encounter information between the users. The network only contains one kind of nodes – user nodes (u1~u4). For a pair of users may encounter many times, it is possible for a pair to have multiple edges. The edge attribute in the network is the encounter duration. u1 u2 u3 u4 u1 u2 u4 e1.1 e1.3 e2.3 e2.1 e1.2 e2.2 u3 t=1 t=2 (b) physical proximity network (a) event participation network Figure 1. Observed heterogeneous interaction networks in the OffESNs 2.2 Problem statement In this work, we use a part of data as the training set. Let ts be the begin time of the overall social event, te be the end time, and t∈[ts, te]. We consider the events during [ts, t] as training data and the events during (t, te] as testing data for recommendation. We first define the input heterogeneous interaction networks formally, and then state our problem. Definition 4 (event participation network). The event t=<Ut, Et, Xt>, where participation network is denoted as GE Ut={ui}(i=1, 2, .., N) is the set of user nodes, Et ={ej,k,}(j=1, 2, .., t; k=1, 2, .., M) is the set of prescheduled event nodes occurring till t, and an edge x=(ui, ej,k)∈Xt represents the event time participation relationship between ui and ej,k, where the edge weight is the duration that ui attended ej,k. t is a dynamic and incremental graph, where new edges will be GE added over time, i.e. t=<Ut, Et, Xt> = GE t-1∪ gE t = gE t-1∪ gE t (1) 2∪…∪gE 1∪gE GE t=<ut, et, xt> is an event participation sub-graph at time t. where gE Of which, ut, et and xt are the sets of users, prescheduled events and participation relationships at t respectively. Definition 5 (physical proximity network). The physical t=(Ut, Yt), where Ut is the set proximity network is denoted as GP of user nodes and an edge y=(ui, uj)∈Yt represents the physical proximity relationship between ui and uj, where the edge weight is the encounter duration. t, GP t, and a set of prescheduled events Problem 1. Given GE et+1={et+1,1, et+1,2, …} at time t+1. The goal of the work is to infer the probabilities that each user in ui∈U t will attend each event et+1,j∈et+1, and rank the events based on the probabilities for personalized recommendation. 3 3. BUILDING LATENT NETWORKS ON SOCIAL RELATIONS 3.1 Observations According to our observations, whether a user attends an event is influenced by following factors: − His/her own preferences on the context of the event, i.e., explicit preferences − The actions of the users having similar preferences, i.e., implicit preferences − The actions of his/her friends Thus, we can group the people in the OffESNs into three kinds of social relations as following: − SRA: The users who usually attend the events with the same contexts (they aren’t required to attend the same events), called as like-minded peers. − SRB: The users who usually attend the same events together, called as co-attendees. − SRC: The users who usually encounter in the spontaneous events, called as friends. However, both of the preferences and the social relations are latent the observed to use intend the OffESNs, we in heterogeneous interaction networks to derive them. 3.2 Interaction measures in OffESNs An event refers to a real-world occurrence, which is described using the attributes such as who, where, when and what. The contextual attributes are application dependent[14]. For example, in the applications of location-based services (LBS), locations and time are critical aspects of their contexts. But in the OffESNs, for all prescheduled events are held in a building and last for a short period of time, people are more concerned with event topics than with the locations and time. Therefore, this work only considers the aspect of “what” as the context attributes. Note only the prescheduled events have the context attributes. Definition 6 (event context). We refer event topics as the contexts of the prescheduled events. The set of contexts is denoted as C={ci}, i=1,2, …d, where ci represents the i-th context. Thus we use the topics to represent the features of the prescheduled events. In general, an event can have more than one context, and a context can correspond to multiple events. Whether a user likes an event is determined whether he/she likes the t to get contexts of the event. We first use the observed network GE the measures about context participation. Definition 7 (context participation frequency). The context participation frequency is the count that ui has attended the events with context cj, which is equal to the number of the edges t, denoted as PFij. connecting ui and the events with cj in GE Definition 8 time). The context (context participation participation time is the sum of all durations that ui has attended the events with cj, denoted as PTij, i.e., ijPF PTij= ∑ k 1 = k is the duration of ui’s k-th attendance on cj, which is where PDij t. equal to the weight of the corresponding edge in GE (2) ijPD k We can also obtain the measures about encounter from the t. observed network GP Definition 9 (encounter frequency). The encounter frequency is the count that ui and uj have encountered in the spontaneous events, which is equal to the number of the edges between ui and t, denoted as EFij. uj in GP Definition 10 (encounter time). The encounter time is the sum of all durations that ui and uj have encountered in the spontaneous events, denoted as ETij, i.e. ijEF ETij= ∑ k 1 = k is the duration of the k-th encounter, which is equal to where EDij t. the weight of the corresponding edge in GP (3) ijED k 3.3 Derivation of latent information Based on the measures mentioned above, this section first derives users’ latent context preferences, and then derive and construct three latent networks on social relations including a preference similarity network, an attendance relevancy network and an encounter network, to identify the social relations such as like- minded peers, co-attendees and friends. Derivation of the latent preferences Because a user is usually interested in multiple contexts, we use a d-dimensional attribute vector zi to denote ui’s latent preferences, where the j-th dimension attribute zij represents the preference that ui on cj. Intuitively, the longer the time that a user attends an event is, the more interests he has on the event contexts. Thus, we intend to explore the context participation time to represent user’s latent feedback. Definition 11 (latent context preference). The latent context preference zij is the ratio between ui’s participation time on cj and the total session time of cj, i.e., t / t = / = z ij ST j ST j PT ij PD k ij ∑ Ec ∈ j (4) PF ij ∑ ∑ k 1 Ec = ∈ j where STj is each session time of cj. Derivation of the latent networks on social relations We can drive the latent social relation networks from the context t and GP t. preference, the observed networks GE For the overall context preferences of different users are difference, we use the adjusted cosine similarity[15] to represent users’ preference similarity by subtracting the corresponding average context preferences. Definition 12 (preference similarity). The preference similarity is the measure to describe the similar degree based on context preferences between a pair of users ui and uj, denoted as λij: ∑ d z z z z ( ) )( − − jk k ∑ ∑ n d z z ( ( ) k k 1 1 = = jz are the average preferences of ui and uj, iz and where respectively. For λij∈[-1, 1],we normalize it by Equation (6). (5) ijλ = ik z i − − z j 2 ) jk 1 = ik i 2 j 4 μij = ijλ =1- (7) (6) cos 1 λ ) ( − ij π Definition 13 (preference similarity network). The preference t = (Ut, St), where Ut is the set similarity network is denoted as GS of user nodes, and each node ui∈Ut is associated with a d- dimensional attribute vector zi, to denote ui’s preferences. An edge s=(ui, uj)∈St represents the preference similarity relationship, where the edge weight is equal to λij. t be the K Definition 14 (like-minded peers). Let KNN(i)\GS t. If uj∈KNN(i)\GS t, it is said that ui nearest neighbors of ui in GS and uj are like-minded peers. In this work, we use the K-nearest-neighbor (KNN) method to determine the like-minded peers for the users. That is, for each t user, we regard its K highest preference similarity neighbors in GS as his/her like-minded peers. Therefore, we only need keep the t. connections between each node and its K nearest neighbors in GS t, the more the neighbors (i.e., the common attendance In GE events) that two users have, the more relevant they are. But the durations attending the same events of different users may be different, so we use a weighted Jaccard’s Coefficient to calculate attendance relevancy. Definition 15 (attendance relevancy). The attendance relevancy is the measure to describe the correlations degree that a pair of users ui and uj attend events together, denoted as μij: ∑ eDeD )( )( + j i e u u ( ) ( ) Γ∈ Γ∩ j i ∑ ∑ eD eD )( )( + i j u e u e ( ) ( ) Γ∈ Γ∈ i j where Di(e) and Dj(e) are the durations that ui and uj attended the same event e respectively, and Γ(ui) and Γ(uj) are the sets of events that ui and uj have attended respectively. Definition 16 (attendance relevancy network). The attendance t=(Ut, Rt), where Ut is the set relevancy network is denoted as GR of user nodes and an edge r=(ui, uj)∈Rt represents the attendance correlation between ui and uj, where the edge weight is equal to μij. Definition 17 (co-attendees). Let φ be the threshold of the attendance relevancy. If r=(ui, uj)∈Rt and μij≥φ, it is said that ui and uj are co-attendees. t has recorded the encounter information The observed network GP between each pair, so we can be used to derive the encounter network. Definition 18 (encounter network). The encounter network is t = (Ut, Qt), where Ut is the set of user nodes and an denoted as GQ edge q=(ui, uj)∈Qt represents the encounter relationship, where the edge weight is EFij or ETij. We can obtain two kinds of encounter networks by the weight used: frequency-based encounter networks using EFij and time- based encounter networks using ETij. We will evaluate their influence on recommendation performance in Section 5. By intuitions, the more count or time that a pair of users have encountered, the more closer they are, so that we can derive the friendship relations from the encounter network. Definition 19 (friends). Let δ be the threshold of the encounter frequency, θ be the threshold of the encounter time. If q=(ui, uj)∈Qt and EFij≥δ in frequency-based encounter networks or EDij≥θ in time-based encounter networks, it is said that they are friends. 4. EVENT RECOMMENDATION BASED LATENT NETWORKS FUSION MODEL 4.1 Basic idea By now, we obtain three latent social relation networks, which have extracted all information from the observed heterogeneous interaction networks. Although now we can explore collaborative filtering (CF) methods[15-17] to recommend the events, since we can find the similar users from the preference similarity network. But in the OffESNs, besides users’ individual preferences, users’ actions are also influenced by the social relations, while the CF methods cannot handle such complexity. The graphical models have long been used for modeling conditional dependency relationships between variables. An innovation work in [18] unified both directed and undirected graphical models as factor graphs, which provides a natural way of representing global functions or probability distributions that can be factored into simpler local functions, and is a widely used representation for modeling complex dependencies amongst hidden variables. Therefore, we intend to design a LNF model based on a pairwise factor graph (PGF) to infer the hidden probabilities that users will attend future events given the contexts. The symbols used in this section are listed in Table 1. Table1. Notations Description Symbol t = (Ut, St) GS preference similarity network t = (Ut, Rt) GR attendance relevancy network t = (Ut, Qt) GQ encounter network U t={ui}(i=1, 2, .., N) the set of users t St the set of edges in GS t Rt the set of edges in GR Qt t the set of edges in GQ ui a user node or an observed variable zi ui’s context preference vector the m-th attribute of zi zim Y={yi}(i=1, 2, .., N) the set of hidden variables yi a single hidden variable ~{yi} the set of variables in Y with yi removed the m-th attribute of yi yim t) g(yi,ui,KNN(i)\GS attributes feature function t t ui’s K nearest neighbors in GS KNN(i)\GS f(yi, yj) attendance correlation function between yi and yj local constraint function between yi and yj the set of event contexts the m-th context in C preference similarity between ui and uj attendance relevancy between ui and uj encounter frequency between ui and uj encounter time between ui and uj indicator function of attendance correlations attendance correlation matrix between yi and yj behavior correlation between ui and uj the threshold of attendance relevancy the threshold of encounter frequency the threshold of encounter time the number of the nearest neighbors a normalizing factor h(yi, yj) C={ci}(i=1, 2, .., d) cm λij μij EFij ETij αij CMij CRij φ δ φ K Z 5 4.2 Latent networks fusion (LNF) model The purpose of the latent networks fusion model is to incorporate the three latent networks on social relations into a unified model, to infer users’ overall desires to attend a specific event, i.e., to predict how likely the users will attend a future event. Figure 2 shows the fusion model under a pairwise factor graph implementation, where each factor function only involves two variable nodes. It is shown that all the three latent networks are captured via two types of variable nodes (the circle nodes in Fig. 2) and three types of factor function nodes (the square nodes in Fig. 2), which form the basic components of the model. The corresponding relationships between input the networks and the PFG components can be seen clearly: t corresponds to − The preference similarity network GS observed variable nodes U={ui} and attribute feature t); function nodes g(yi, ui, KNN(i)\GS t corresponds to the − The attendance relevancy network GR attendance correlation function nodes f(yi, yj) and the related edges in the factor graph.; t corresponds to the local − The encounter network GQ constraint function nodes h(yi, yj) and the related edges in the factor graph. latent y1 y3 h(y3, y4 ) t) g(y1, u1, KNN(1)\GS y2 y4 f(y2, y4) u1 u3 u1 u3 u1 u3 u2 u4 t GS u4 u2 GR t u2 u4 t GQ Figure 2. The pairwise factor graph implementation 4.3 Model definition We give the definitions of the variable nodes and the factor function nodes, and design the concrete factor functions in this section. Definition 20 (Observed variable nodes). The observed variable t (the pink nodes are the user nodes U={ui}(i=1, 2, .., N) in GS circle nodes in Fig. 2), and ui has a d-dimension attribute vector zi. Definition 21 (Hidden variable nodes). The hidden variable nodes Y={yi}(i=1, 2, .., N) (the green circle nodes in Fig. 2) correspond to the N observed variables nodes. Each yi is also a d- dimension attribute vector, and each dimension attribute is a binary discrete variables. For the m-th attribute yim, the value as yim=1 represents the probability that ui will attend context cm; the value as yim=0 represents the probability that ui will not attend context cm. Definition 22 (Attribute feature function nodes). The attribute t) (the brown square feature function nodes g(yi, ui, KNN(i)\GS nodes in Fig. 2) define the correlations among the hidden variables {yi}, yi’s corresponding observed variables ui and ui’s K t, to represent the prior probabilities that ui nearest neighbors in GS t) in Fig. 2. will attend each context, e.g., g(y1, u1, KNN(1)\GS Definition 23 (Attendance correlation function nodes). The attendance correlation function nodes f(yi, yj) (the yellow square nodes in Fig. 2) represent the attendance correlations between the hidden variables yi and yj, e.g., f(y2, y4) in Fig. 2. Definition 24 (Local constraint function nodes). The local constraint function nodes h(yi, yj) (the pink square nodes in Fig. 2) reflect the constraint relations between the hidden variables yi and yj, e.g., h(y3, y4) in Fig. 2. Basically, the attribute feature functions such as g(yi, ui, t) describe the attributes of the hidden variable nodes, KNN(i)\GS and the edge feature functions such as f(yi, yj) and h(yi, yj) describe the conditional dependency relations between the hidden variable nodes via edges. Attribute feature functions t) is defined on the input network GS t. It g(yi, ui, KNN(i)\GS incorporates ui’s attribute vector zi and the attribute vectors of ui’s t. K nearest neighbors in GS As the idea of the user-based collaborative filtering methods, the users with similar context preferences have similar ratings on the same things. We use the maximum value between ui’s original preference zim and the weighted average preference of ui’s K nearest neighbors on context cm as the prior probability of ui attending cm, denoted as pim. , ] im jm im z z p = (9) max[ (8) 1 ∑ λ ∑ ∈ ij λ t Gi j KNN \)( ij S t KNN Gi j \)( ∈ S The values of yi’s m-th attribute can be computed as: pim yim =1 yg KNN z Gi t , , ( =) \)( 1-pim yim=0 im im S Attendance correlation functions f(yi, yj) is an edge feature function to describe how likely that ui and uj attend the events together, i.e., f(yi, yj) = αij* CMij (10) where αij is an indicator function to represent whether there is an t and the weight of the edge is more edge between ui and uj in GR than φ, to filter the weak co-attendance relations. 1 μij≥φ, i.e., ui and uj are co-attendees 0 otherwise We represent the attendance correlations of each pair as a discretized correlations matrix CMij as shown in Table 2, where CRij represents the behavior correlation between ui and uj in t. different combinations, which is derived from the weight μij in GR Table 2. Definition of CMij yi CRij yj 0 0 μij 1 0 1-μij 1 0 1-μij 1 1 μij =ijα (11) The semantic of the matrix is: the cases of yi=0, yj=0 and yi=1, 6 =) i yyh , ( yj=1 indicate ui and uj take the same actions: for any event, either they don’t attend, or they attend together; the cases of yi=1, yj=0 and yi=0, yj=1 indicate ui and uj take different actions: for any event, either yi attends, or yj attends. Local constraint functions We define the local constraint function h(yi, yj) as an indicator t as an input, i.e., function, taking friend relations in GQ 1 EFij≥ δ or EDij≥θ, i.e., ui and uj are friends (12) 0 otherwise Note the choice of EFij or EDij in the condition of Equation (12) is determined by the weight that the encounter network uses. 4.4 Probability inference and ranking algorithm Based on the PFG implementation, we can formalize the context attendance probabilities as calculating the marginal probabilities of yi conditioned on the factor graph G(Y) as: ∑= YGyp YGy yyp ( ( ( ( )) ,... , i n 1 iy }{~ YGy yyp is the joint probability of all hidden where )) ( ,... , ( n 2 1 variables in the PFG, which can be computed as Equation(13). YGy yyp = ( , )) ( ,... n 1 [(1 Z yyhyyf ( , () , i j i (13) N d ∏ ∏ i m 1 1 = = N N ∏ ∏ i j 1 1 = = Gi \)( KNN yg ( ])) )) )) • z im ( , im , j j 2 2 t S (14) where Z is a normalizing factor. We use a widely used approximate iterative algorithm - loopy belief propagation (LBP)[19] to infer the joint probability distribution and the marginal probabilities. We omit the details due to the space limitation. After obtaining the marginal probabilities, we can easily rank the parallel events as Algorithm 1. Algorithm 1. Event-ranking ( ). INPUT: ut+1={ut+1, i}, i=1,2, …, n; /* the set of users at time t+1*/ et+1={et+1, j}, j =1, 2, ..., k; /* the set of events at time t+1*/ OUTPUT: t+1}}, i=1,2,…, n; /* the set of ranked event lists */ {{ei BEGIN ① Ct+1:=∅; /*initialization of the set of contexts*/ ② for j=1 to k ③ Ct+1, j:= GetContext(et+1, j); /* get context of each event*/ ④ Ct+1:= Ct+1 ∪ Ct+1, j ⑤ end for ⑥ for i=1 to n ⑦ for j=1 to k ⑧ pij=GetProb(p(yij=1)) /*get marginal probabilities */ ⑨ end for t+1}=RankDescend (pi1, pi2, …, pik) ⑩ {ei ⑪ /* order by the probabilities in the descending order*/ ⑫ end for END 0.1 0 0.25 0.2 0.3 0.25 0.2 0.15 0.1 0.05 0 0.15 0.05 y t i l i b a b o r P Talk p articipat ion coun t 1 Talk part icipat ion du rat ion 1 [1,5] [6,10] [11,15] [16,20] [21,25] [26.30] >30 (0,3) [3,5) [5,10) [10,15) [15,20) [20,25) [25,30) [30,35) [35,40) [40,45) [45,50] Fig.3 Probability analysis of talk participation durations encounter records including for each pair (A, B), the ID numbers of A and B, and their encounter duration. y t i l i b a b o r P Fig. 5 demonstrates the probability distribution of the encounter durations. It shows almost 80% of the encounter durations are less than 3 minutes. After filtering them out, we obtain 36,573 encounter records. We make further statistical analysis on the probability distribution of the encounter frequencies and the encounter time as shown in Fig. 6 and Fig. 7 respectively. The two figures show that about 80% of the encounter frequencies are only 1 and 80% of the encounter time are less than 10 minutes. Hence, the minimal threshold of the encounter frequency is set as 2, that of the encounter time set as 10 minutes. Because the cleansing process may also remove a lot of real encounter information, so the actual encounter frequencies and encounter time of each pair should be larger than the statistical results. Fig.4 Probability analysis of talk participation counts y t i l i b a b o r P 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 [1,3) [3,5) [5,10) ≥10 Encounter duration 1 y t i l i b a b o r P 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 1 2 3 ≥4 1 Encounter frequency 5. EXPERIMENTS AND EVALUATIONS 5.1 Dataset description The data set used for our experiments, “Attendee Meta-Data” (AMD), is downloaded from CRAWDAD (Community Resource for Archiving Wireless Data At Dartmouth)[20]. AMD HOPE was a project that aims to explore potential uses of RFID technology at “The Last HOPE” Conference held in July 18-20, 2008, New York, USA. It attempted to allow attendees to not only get a better conference experience, but also give them a new way to connect with other people. All attendees in the conference received RFID badges that uniquely identified and tracked them across the conference area in the 3 days. RFID readers were deployed at 21 locations containing 3 conference rooms for tracking the attendees. The data set contained the information including attendee id numbers, interests, talks, tracking logs, etc. According to the talk schedule information, there were 39 parallel sessions and 99 talks. Each session contains 1~3 talks, which were held in the 3 conference rooms simultaneously lasting for 50 minutes. However, there are 5 sessions containing 15 talks without tracking logs, and 3 sessions had only 1 talk. We excluded these sessions. We thus left with 31 sessions containing 82 talks for the testing. In the experiments, we regard the talks as the prescheduled events, and incorporate the 21 interests provided by the dataset into 11 event contexts. We divide the tracking logs into a training set and a testing set. The training set includes the tacking logs of the first 16 sessions containing 45 talks from which we obtain the event participation network, and other tracking logs in the same period from which we generate the physical proximity network. The testing set includes the latter 15 sessions containing 37 talks. 5.2 Data analysis and cleansing For there are a lot of noisy data in the logs, we first clean them up based on statistical analysis results. Talk participation data analysis and cleansing There are 1,136,127 logs and 1,227 attendees in the initial tracking logs occurring in the 3 conference rooms in the 3 days. From the logs, we extract all talk participation records including an attendee id number, a talk id number and the attendance duration. It is found that the average participation duration is about 30 minutes. The probability distribution of different duration intervals is shown in Fig. 3. We can see that about 20% of the durations are below 3 minutes. Since 3 minutes seems too short to reflect uses’ real preferences, so we remove the participation records which durations are below 3 minutes. Based on the above data, we analyze the probability distribution of the talk participation counts shown as in Fig. 4. There are over 25% attendees whose participation counts are less than 6. Because we use only half of the sessions for training, we remove the attendees whose participation counts in the training sessions are less than 3. Finally we are left with 915 attendees. Encounter data analysis and cleaning There are 21,374,278 tracking logs involving the 915 attendees occurring at the areas other than the conference rooms during the same period of the training sessions. From which, we extract all y t i l i b a b o r p 7 Fig.5 Probability analysis of encounter durations Fig.6 Probability analysis of encounter frequencies 0.6 0.5 0.4 0.3 0.2 0.1 0 Fig.7 Probability analysis of encounter time [20,30) [10,20) encounter time Fig.7 Probability analysis of encounter time [30,40) [5,10) [3,5) ≥40 The experimental parameters are listed in Table 3. Table 3. Experimental parameters Parameter Description Cleansing condition MIN(PD) minimal talk presence duration MIN(PF) minimal talk presence frequency MIN(ED) minimal encounter duration Network parameters N number of user nodes M number of event nodes t X number of edge in GE t number of edge in GP Y t number of edge in GR R t Q number of edge in GQ Default thresholds K threshold of number of neighbors δ threshold of encounter frequency θ threshold of encounter time φ threshold of attendance relevancy Value 3 min. 3 3 min. 915 45 6,976 51,538 313,138 36,573 6 6 30 min. 0.4 5.3 Comparison methods and evaluation measures The first goal of our evaluation is to examine whether the proposed model-based methods can improve recommendation performance. We also examine the contributions of different factors and the sensitivity of thresholds. For we have three factors and two kinds of encounter networks, we will test following LNF models: t • LNF-g: The LNF model only using the g factor, i.e., the GS network. • LNF-gf: The LNF model using both factors g and f , i.e., the t and GR t networks. GS • LNF-gfh-EF. The LNF model using all three factors based on the frequency-based encounter network, i.e., all three latent networks. • LNF-gfh-ET. The LNF model using all three factors based on the time-based encounter network, i.e., all three latent networks. Two baseline methods are used for comparison: • Naïve method. This method ranks the talks only by context preferences derived from the event participation network. t for Hence, this method only uses the node attributes in GS recommendation. • User-based collaborative filtering (UBCF) method[21]. Because of the widespread usage, we choose the user-based nearest neighbor algorithm as another baseline algorithm. For a user, if its preference value of a specific context is 0, the UBCF method is used. This method uses the node attributes t for recommendation, and 5% and neighbor relations in GS nearest neighbors are determined. In the test, we generate a ranking list of the parallel talks in each session for each user. The results are evaluated against users’ real actions (i.e. ground truths) according to the metrics of precision and normalized discounted cumulative gain (nDCG)[22]. The precision is used to test the correct ratio of only recommending the talks with the maximum probabilities, which is the ratio between the number of correct recommendation and the number of all users’ real participation actions. 8 A normalized discounted cumulative gain is a normalized version of a Discounted Cumulative Gain (DCG) measure that can account for differently output ranked lists, which is computed as[23]: nDCG = p DCG p IDCG (14) p where IDCG is the ideal DCG, p is a particular rank position. In general, a user attends one talk in a session, so the grades of all talks can be regarded as binary: 1 represents presence; 0 represents not-presence. Hence, we use Equation (15)[24] to compute the DCG, where reli∈{0, 1}, and p∈{2, 3} since there are 2 or 3 talks in a session in the data set. rel 2 1 − i i log )1 ( + p ∑ i 1 = 2 For example, there are three talks A, B and C in a session. User ui attended A, but didn’t attend B and C, so the grades of A, B and C for ui should be 1, 0 and 0, respectively. IDCG3 is (1+0+0)=1. If list <B, A, C> for ui, his DCG3 we get a ranked is (0+0.63+0)=0.63, and nDCG3 is 0.63/1=0.63. (15) DCG = p 0 0.7 0.5 0.4 0.3 0.2 0.6 0.1 C G D n Naïve UBCF LNF-g fh -EF LNF-g fh -ET Naïve UBCF LNF-g fh -EF LNF-g fh -ET 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 5.4 Experiment results and discussion Performance comparison We first compare the recommendation performance between our LNF based methods and two baseline methods as shown in Figs. 8 and 9. It can be clearly seen that our methods outperform the baseline methods. n o i s i c e r P Fig.9 nDGC comparison between our Fig.8 Precision comparison between methods and the baselines our methods and the baselines In terms of the metric of precision, the LNF-gfh-EF and LNF-gfh- ET methods achieves improvements of approximately 16~20% compared to the UBCF method, and 24~28% to the naïve method. The two LNF methods also give a rise of 16~28% compared to the the in nDGC. The reason of two baseline methods improvements is that the LNF methods not only consider the preference similarity, but also take the attendance relevancy and friends relationships into account. From the experimental results, we can find that LNF-gfh-ET can improve slightly the performance about 4% in precision and 3% in nDGC respectively compared to LNF-gfh-EF. It indicates the encounter time is more suitable to be used for representing the closeness between users than the encounter frequency. Factor contributions testing We also investigate the contributions of different factors as shown in Figs. 10 and 11. 1 1 n o i s i c e r P 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 1 0.7 0.5 0.4 0.3 0.2 0.1 0.6 C G D n n o i s i c e r P UBCF LNF-g LNF-gf LNF-gfh-EF LNF-gfh-ET UBCF LNF-g LNF-g f LNF-g fh -EF LNF-g fh -ET 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 0 Fig.11 nDGC comparison under Fig.10 Precision comparison different factors under different factors We can see that the performances on both metrics of LNF-g (only uses factor g) are better than those of UBCF about 3%. This is because UBCF only considers neighbors’ context preferences in the case that users’ context preference values are 0, while LNF-g always considers neighbors’ context preferences, sine it gets the maximum value between his own preferences and the weighed average preferences of the K nearest neighbors on the same context. The LNF-gf method (uses factors g and f) can achieve performance improvements of approximately 4% compared to the LNF-g method. But its performances are worse than the LNF-gfh- EF and LNF-gfh-ET methods, since many users who often attend common talks may be irrelevant, which misleads the probability inference. This shows the importance of fusing all three latent networks. C G D n Thresholds sensitivity testing We further conduct experiments to investigate the sensitivity of different thresholds. Note when we test the performance of a specific threshold, the other thresholds are set the default values. From Figs.12 and 13, we can see that the performance change trends both in precision and nDGC is stable when the K is up to 6. 0.7 0.9 0.8 0.6 0.7 0.5 0.6 n o 0.4 0.5 i s i c 0.4 0.3 e r P 0.3 0.2 0.2 0.1 0.1 0 0 6 6 K K Fig.13 nDGC comparison under Fig.12 Precision comparison different K values under different K values Figs. 14 and 15 are the results when we select different thresholds of δ. We can see that 0.4 is the optimal point. Fig. 16 is the test results on the LNF-gfh-EF method when we select different encounter frequencies (from 2 to 8). Similarly, Fig. 17 is the test results on the LNF-gfh-ET method when we select different encounter time (from 10 to 60 minutes). We can see that 6~8 is a better range for the encounter frequency, and 30~40 minutes for the encounter time. LNF-gfh-EF LNF-gfh-ET LNF-gfh-EF LNF-gfh-ET 10 10 2 8 4 8 2 4 9 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 C G D n 1 0.8 0.6 0.4 0.2 0 LNF-gfh-EF LNF-gfh-ET LNF-gfh-EF LNF-gfh-ET 0.6 0.3 0.5 0.2 0.4 δ Fig.14 Precision comparison under different δ values 0.2 0.5 0.6 0.3 0.4 δ Fig.15 nDGC comparison under different δ values 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0 Fig.17 Precision and nDGC comparison under different φ values 4 8 2 60 10 20 50 10 t n e c r e P 40 30 φ(min.) P recision nDGC P recision nDGC t n e c r e P 6 θ Fig.16 Precision and nDGC comparison under different θ values 6. RELATED WORKS Traditional and social network recommendation. Traditional recommendation systems mainly aim to recommend items that are likely to be interested to users. Such systems are widely implemented in e-commerce systems where the goal is to recommend items to the users by mining user rating history data. The methods used to solve this problem can be roughly categorized into content-based, collaborative filtering and hybrid approaches[7]. Recently, with the popularization of social networks, social-trust based recommendation has recently been proposed to improve recommendation accuracy[8-11]. The common rationale behind all of them is that a user’s taste is influenced by her trusted friends in social networks[25]. Meanwhile, advances in location-based services and wireless communication technologies have enabled the creation of location-based online social networking such as Foursquare, Twinkle, and GeoLife[26-27], which make locations, users, activities and social media recommendation feasible[28-29]. However, because of lack of explicit users’ preference, rating and trusted social relations in the OffESNs, both rating based traditional methods and social-trust based methods can no longer work well to recommend events in the OffESNs. Event recommendation. The study on event recommendations is relatively little, especially in the offline social networks. For the Pittsburgh area, a cultural event recommender was build around trust relations[30]. Simon et al.[31] set up an online user-centric based evaluation experiment to find a recommendation algorithm that can improve user satisfaction for a popular Belgian cultural event website. Results show that a hybrid of a user-based collaborative filtering and content-based approach outperforms the other algorithms. Einat et al.[32] demonstrated a method for collaborative ranking of future events, which recommends the events based on individuals’ preferences for past events, combined collaboratively with other peoples’ likes and dislikes. But all these methods don’t consider the characteristics of offline networks. Liu et al.[1] suggested event-based social networks (EBSN) containing both online and offline social interactions. It recommends events only based on the topological structures of the networks. The method can’t be applied in the OffESNs since the networks usually can’t get helps of the online interactions. Ephemeral social networks and prediction. In recent two or three years, the offline ephemeral social networks have attracting the attentions of people. Alvin et al.[5] presented the concept of ephemeral social networks. It investigated how social connections can be established and examined user behaviors in the networks. Anne-Marie et al.[3] described the concept, potential applications, and underlying technologies of the offline social networks, and gave two scenarios of ephemeral social networks: remote meeting and family sharing. Christoph et al.[4] analyzed influence factors for link prediction and the strength of stronger ties in human contact networks, and used several network proximity measures to predict new links and recurring links. Zhuang et al.[2] formalized the problem of predicting geographic coincidences in the ephemeral social networks. It used a factor graph model integrating temporal correlations and social correlations to predict how likely two users will meet in future. However, both prediction methods are not event-driven and don’t consider any context information when doing prediction, so they cannot be used for event recommendation in the OffESNs effectively. 7. CONCLUSIONS In this work, we first construct two observed heterogeneous interaction networks including the event participation (human- event interaction) network and the physical proximity (human- human interaction) network. Based on them, we define some interaction measures in the OffESNs to construct the three latent social relation networks, including a preference similarity network, an attendance relevancy network and an encounter network. We then propose a latent networks fusion (LNF) model to merge the three latent networks into a pairwise factor graph to infer the probabilities that users will attend the future events given the contexts. The experimental results show that the suggested methods outperform the baseline methods. An important contribution of our work is to propose a novel latent networks fusion based model for event recommendation in the offline ephemeral networks. The model uses a pairwise factor graph to factor the global functions into multiple simpler local functions, and capture all the features of the three latent networks via two types of variable nodes and three types of factor function nodes. The experimental results show the contributions of different factors, and verify the fusion model is effective. 8. REFERENCES [1] Xingjie Liu, Qi He, Yuanyuan Tian, Wang-Chien Lee, John McPherson, Jiawei Han. Event-based Social Networks: Linking the Online and Offline Social worlds. In Proc. of KDD’12, pp.1032-1040. [2] Honglei Zhuang, Alvin Chin, Sen Wu, Wei Wang, Xia Wang, Jie Tang. Inferring Geographic Coincidence in Ephemeral Social Networks. In Proc. ECML/PKDD’12, pp. 613-628. [3] Anne-Marie Kermarrec, Erwan Le Merrer. Offline social networks: stepping away from the internet. In Proc. of SNS’12, pp.14-15. [4] Christoph Scholz, Martin Atzmueller, Gerd Stumme. On the Predictability of Human Contacts: Influence Factors and the Strength of Stronger Ties. In Proc. of SocialCom/PASSAT’12, pp. 312-321. 10 [5] Alvin Chin, Hao Wang, Bin Xu, Ke Zhang, Hao Wang, Lijun Zhu. Connecting People in the Workplace through Ephemeral Social Networks. In Proc.of SocialCom/PASSAT’11, pp.527-530. [6] Alvin Chin, Bin Xu, Fangxi Yin, Xia Wang, Wei Wang, Xiaoguang Fan. Using Proximity and Homophily to Connect Conference Attendees in a Mobile Social Network. In Proc. of the Workshops of ICDCS’12, pp.79-87. [7] J. Herlocker, J. Konstan, L. Terveen, J. Riedl. Evaluating Collaborative Filtering Recommender Systems. ACM Trans. on Information Systems (ACM TOIS), 2004, 22(1), pp.5–53. [8] Xiwang Yang, Yang Guo, Yong Liu. Bayesian-inference Based Recommendation in Online Social Networks. IEEE Trans. on Parallel and Distributed Systems, 2013, 24(4), pp 642-651. [9] Vineet Chaoji, Sayan Ranu, Rajeev Rastogi, Rushi Bhatt. Recommendations to Boost Content Spread in Social Networks. In Proc. of WWW’12, pp. 529-538. [10] Ioannis Konstas,Vassilios Stathopoulos, Joemon M. Jose. On Social Networks and Collaborative Recommendation. In Proc. of SIGIR’09, pp. 195-202. [11] Xiwang Yang, Harald Steck, Yong Liu. Circle-based Recommendation in Online Social Networks. In Proc. of KDD’12, pp. 1267-1275. [12] X. Guo, G. Zhang, E. Chew, S. Burdon. A Hybrid Recommendation Approach for One-and-only Items. Advances in Artificial Intelligence, 2005, pp.457~466 [13] Simon Dooms, Toon De Pessemier, Luc Martens. A User-centric Evaluation of Recommender Algorithms for an Event Recommendation System. In Proc. of Workshop of RecSys’11, pp. 67-73. [14] Bageshree Shevade, Hari Sundaram, Lexing Xie. Modeling Personal and Social Network Context for Event Annotation in Images. In Proc. of JCDL’07, pp. 127-134. [15] R. McLauglin, J. Herlocher. A Collaborative Filtering Algorithm and Evaluation Metric that Accurately Model the User Experience. In Proc. of SIGIR’04, pp.329-336. [16] Gediminas Adomavicius, Alexander Tuzhilin. Toward the Next Generation of Recommender Systems: A Survey of the State-of-the-Art and Possible Extensions. IEEE Trans. on Knowledge and Data Engineering (TKDE), 2005, 17(6), pp. 734-749. [17] Kai Yu, Anton Schwaighofer, Volker Tresp, Xiaowei Xu, Hans-Peter Kriegel. Probabilistic Memory-based Collaborative Filtering. IEEE Trans. on Knowledge and Data Engineering (TKDE), 2004, 16(1), pp. 56-69. [18] F. R. Kschischang, B. J. Frey, H. A. Loeliger. Factor Graphs and the Sum- Product Algorithm. IEEE Trans. on Information Theory(TIT), 2001, 47(2), pp. 498-519. [19] Daphne Koller, Nir Friedman. Probabilistic Graphical Models: Principles and Techniques – Adaptive Computation and Machine Learning. The MIT Press, 2009. [20] http://crawdad.cs.dartmouth.edu/meta.php?name=hope/nh_amd, 2008. [21] Jun Wang, Arjen P. de Vries, Marcel J. T. Reinders. Unifying User-based and Item-based Collaborative Filtering Approaches by Similarity Fusion. In Prof. of SIGIR’06, pp.501-508. [22] Kalervo Järvelin, Jaana Kekäläinen. Cumulated Gain-based Evaluation of IR Techniques. ACM Trans. on Information Systems (ACM TOIS), 2002, 20(4), pp.422-446. [23] http://en.wikipedia.org/wiki/Discounted_cumulative_gain [24] Chris Burges, Tal Shaked, Erin Renshaw, Ari Lazier, Matt Deeds, Nicole Hamilton, Greg Hullender. Learning to Rank Using Gradient Descent. In Proc. of ICML '05, pp.89-96. [25]Mohsen Jamali, Martin Ester. Mining Social Networks Recommendation. Tutorial of ICDM ’11. [26] Vincent W. Zheng, Yu Zheng, Xing Xie, Qiang Yang. Collaborative Location and Activity Recommendations with GPS History Data. In Proc. of WWW’09, pp.1029-1038. [27] Ling-Yin Wei, Yu Zheng, Wen-Chih Peng. Constructing Popular Routes rom Uncertain Trajectories. In Proc. of KDD’12, pp.195-203 [28] Jie Bao, Yu Zheng, David Wilkie, and Mohamed F. Mokbel. A Survey on Recommendations in Location-based Social Networks. ACM Transaction on Intelligent Systems and Technology (to be published), 2013 [29] Mao Ye, Peifeng Yin, Wang-Chien Lee. Location Recommendation for Location-based Social Networks In Proc. of GIS’10, pp. 458~461. [30] Danielle Hyunsook Lee. PITTCULT: Trust-based Cultural Event Recommender. In Proc. of RecSys’08, pp.311-314. [31] Simon Dooms, Toon De Pessemier, Luc Martens. A User-centric Evaluation of Recommender Algorithms for an Event Recommendation System. In Proc. of Workshop of RecSys’11: 67-73. [32] Einat Minkov, Ben Charrow, Jonathan Ledlie, Seth Teller, Tommi Jaakkola. Collaborative Future Event Recommendation. In Proc. of CIKM’10, pp., 819-828. for
1903.12579
2
1903
2019-06-10T19:50:01
Predicting complex user behavior from CDR based social networks
[ "cs.SI", "physics.soc-ph" ]
Call Detail Record (CDR) datasets provide enough information about personal interactions to support building and analyzing detailed empirical social networks. We take one such dataset and describe the various ways of using it to create a true social network in spite of the highly noisy data source. We use the resulting network to predict each individual's likelihood to default on payments for the network services, a complex behavior that involves a combination of social, economic, and legal considerations. We use a large number of features extracted from the network to build a model for predicting which users will default. By analyzing the relative contributions of features, we choose their best performing subsets ranging in size from small to medium. Features based on the number of close ties maintained by a user performed better than those derived from user's geographical location. The paper contributions include systematic impact analysis that the number of calls cutoff has on the properties of the network derived from CDR, and a methodology for building complex behavior models by creating very large sets of diverse features and systematically choosing those which perform best for the final model.
cs.SI
cs
Predicting complex user behavior from CDR based social networks Casey Doylea,b, Zala Hergac,d, Stephen Dipplea,b, Boleslaw K. Szymanskia,e,f,∗, Gyorgy Kornissa,b, Dunja Mladenićc,d aNetwork Science and Technology Center, Rensselaer Polytechnic Institute, 110 8th bDepartment of Physics, Applied Physics, and Astronomy, Rensselaer Polytechnic Institute, Street,Troy, NY 12180, USA 110 8th Street,Troy, NY 12180, USA cArtificial Intelligence Laboratory, Jožef Stefan Institute, Jamova 39, Ljubljana, Slovenia dJožef Stefan International Postgraduate School, Jamova 39, Ljubljana, Slovenia eDepartment of Computer Science, Rensselaer Polytechnic Institute, 110 8th Street,Troy, fFaculty of Computer Science and Management, Wrocław University of Science and NY 12180, USA Technology, Wrocław, Poland Abstract Call Detail Record (CDR) datasets provide enough information about personal interactions of cell phone service customers to enable building detailed social networks. We take one such dataset and create a realistic social network to pre- dict which customer will default on payments for the phone services, a complex behavior combining social, economic, and legal considerations. After extracting a large feature set from this network, we find that each feature poorly correlates with the default status. Hence, we develop a sophisticated model to enable reliable predictions. Our main contribution is a methodology for building com- plex behavior models from very large sets of diverse features and using different methods to choose those features that perform best for the final model. This ap- proach enables us to identify the most efficient features for our problem which, unexpectedly, are based on the number of unique users with whom the given user communicates around the Christmas and New Year's Eve holidays. In gen- eral, features based on the number of close ties maintained by a user perform better than others. Our resulting models significantly outperform the methods ∗Corresponding author Email address: [email protected] (Boleslaw K. Szymanski) Preprint submitted to Information Sciences June 12, 2019 currently published in the literature. The paper contributes also a systematic analysis of properties of the network derived from CDR. Keywords: default; feature selection; Call Detail Record dataset social networks; complex behavior prediction; probability of 1. Introduction Call Detail Record (CDR) datasets, created from cell phone logs of large groups of people, have become common in studying human behavior thanks to the large amount of detailed data they provide [7]. These datasets typically in- clude both basic information about the users (age, gender, location) and records of calls and text messages including the time, location, and direction of each communication. Here, we analyze such a dataset and focus on the properties of the underlying social network that can be obtained from the data. First, we discuss various methods for building the network, aiming to mitigate the noise inherent within the cell phone records and address other issues identified in prior work such as the definitions of links, communities, reciprocity, and data types suitable for the study. These considerations are particularly relevant to our application due to the large amounts of noise and potential biases inherent to various network representation schemes [16, 19, 22, 18, 33]. In this paper, we combine techniques based on geographic and usage features along with higher level social network measures such as centrality and community structure to predict the probability of customers defaulting on their accounts. The specific CDR dataset used here includes the detailed call history of 500, 000 clients of a cell phone company over a three month period. The dataset contains also information about the users' basic demographic data (age, home district, gender, and default status at the end of the three month period) as well as usage information (frequency and duration of calls, messages, and movement records based on frequently used cell towers). We perform traditional network analysis on the data to create new complex features. We analyze weighted links 2 based on the number of communications sent between individuals to reveal the paths between individuals, reciprocity imbalances among users, and community structure in the network. The default status (an indicator of whether the client stopped paying the phone bill over the course of data collection) is the predicted variable for this study. It is typically accessible as a part of the user's phone records, yet it still measures a complex user behavior combining many different behavioral factors. To encompass the wide variety of possible correlations between individual attributes, behavioral indicators as well as network metrics and the probability of default, we create an extremely broad feature set, aggregating thousands of features of varying complexity from all the facets of information contained in the CDR dataset. Then, we perform feature contribution analysis and choose the features with the strongest predictive power to balance model performance and its complexity. As discussed in the next section, this general methodology for building complex behavior models is a novel approach and our contribution to the state of the art. 2. Related work on modeling complex human behavior 2.1. Mobile phone data Call detail records (CDR) is a standard dataset collected by telecommunica- tion operators. For each user, it contains information about telecommunication events in which this user was involved. In recent years, it has become a popular source of information for users' behavioral analytics. The closest to our goals is the work on modeling credit defaults [27] by building a model of the user's financial risk which yields a score that can be interpreted as the probability of default. This model outperforms the Credit Bureau scores by using thousands of weak predictors derived from CDR and demographic data. This work uses only 60, 000 users and uses only basic level network features such as degree. 3 2.2. Credit risk management Our paper focuses on credit risk, which refers to the clients who may stop paying back their loans, e.g., mortgage loan, credit card spending or, in our case, cell phone bill. Such events are called defaults. Banks and companies traditionally tackle this problem by calculating credit scores or probability of default for each of the potential clients. For individual customers data sets used to predict a customer's probability of default include demographic data, loan and credit information [4], social media [10, 38] or mobile phone data [6]. Traditionally, the logistic model was often used to predict defaults and today is still useful for benchmarking thanks to its simplicity, interpretability and de- pendability [34, 4, 14]. However, more sophisticated and innovative approaches are also used, like neural networks [34, 38, 15], smart ubiquitous data mining [4], theory of three-way decisions [20], and theory of survival [14]. In our paper, we introduce a novel approach that starts with creating a large number of features (over 6,000 here) and then reducing them to a few well performing subsets. 3. Network creation and analysis In this section, we define the node-level location and communication activity features that indicate how embedded the node is in the network which is likely to determine the social cost of leaving the network. Such social network analysis is common in working with CDR datasets [7], but the highly detailed information contained in the CDR comes with a large amount of noise. Quantifying what level of communication between individuals indicates a connection is challenging. This issue is made worse considering the potential bias introduced by specific patterns of communication, as generational and cultural divides are prominent in phone usage [19]. Therefore use of case-specific methods is common. Some attempts at a more general solution to this problem include reciprocity or ac- tivity requirements for links, but these solutions suffer from losing many fine details of the system [16]. More complete results can be obtained by using sta- tistical methods to detect and remove links that are more likely to be random, 4 but the methods come with increased computation cost [18]. In this study for detailed analysis, we use directed graphs in order to preserve the imbalances that tend to arise even among reciprocal relationships [13]. We also use communication frequency between individuals to define edges. We primarily use a weighted network for network analysis and feature generation as it better represents relationship strength and network location properties, but the unweighted network is very useful for understanding many of other interesting properties of the network unrelated to predicting user defaults. For more information on the construction, behavior, and dynamics of unweighted graphs of this network see Supplementary Material Sec. 1. 3.1. Weighted network based on event frequency Let wi,j denote the number of communications sent from user i to user j is wij. We choose here the most dense representation of the network in which as long as wi,j > 0, a directed link is formed from node i to node j with weight wi,j (some interesting properties of this type of network is discussed in [37, 33, 22]). Figure 1 shows various probability distributions associated with w. These distributions possess a curvature somewhere between an exponential distribution and a power law distribution. It is then appropriate to fit them using a log-normal distribution and a stretched exponential which have the following form. − (ln w−µ)2 P (w)log-normal ∝ 1 P (w)stretched-exp ∝ e−wβ /α 2σ2 e w (1) (2) Table 1 shows the fitting parameters and R-squared values for Figure 1. Both fits yield high R-squared values. We use centrality measures, reciprocity measures, and community detection to define features indicative of how embedded a user is in the network. For all distance-based applications, we use a link's weight to define a normalized distance from the source node i to the target node j, defined as di,j = wavg/wi,j where wavg is the average weight of all connections in the network. To provide 5 Figure 1: a) Distribution of directional link weights wi,j. (b) Distribution of non-directional link weight wi,j + wj,i. (c) Distribution of the sum of outgoing link weights of users in the j wi,j. (d) Distribution of the sum of incoming link weights of users in the system j wj,i. Table 1 shows relevant fit parameters and R-squared values. Both functions in this system (cid:80) (cid:80) case reasonably fit the distributions with neither significantly outperforming the other. a baseline for comparison, we rewire the network by swapping the edge desti- nations to create a pseudo-random weighted graphs that maintain the in and out-degree structure of the original network. (cid:80) We first look at the measure of harmonic closeness centrality (closeness cen- trality adapted to non-connected graphs) [26, 23]. We define this centrality as CH (i) = 1 , where N is the total number of nodes and li,j is N−1 the distance of the shortest path between nodes i and j. For the original net- work, these centrality scores are generally fairly high and evenly distributed, j(cid:54)=i 1 li,j 6 σ β R2 log-normal R2 stretched exp wi,j 2.01 0.127 0.9967 0.9978 wi,j + wj,i 2.37 0.0959 0.9991 0.9994 (cid:80) j wi,j 1.47 0.332 0.9926 0.9984 (cid:80) j wj,i 1.47 0.333 0.9924 0.9980 Table 1: Fitting parameters and R-squared values for Figure 1. σ corresponds to the fitting parameter in equation 1. β corresponds to the fitting parameter in equation 2. avg = 4.61 and a standard deviation with an average harmonic centrality of C cell std = 1.84. Both values are higher than those for the randomly rewired of C cell std = 1.20. Interestingly, the diameter graph which yields C rand and average shortest path length of the giant component in the original network Dcell = 6.24 and (cid:104)lcell(cid:105) = .311 are also slightly higher than the corresponding values Drand = 4.35 and (cid:104)lrand(cid:105) = .30 for the randomly rewired network. avg = 4.11 and C rand These differences reveal the basic shape of the original network, which is characterized by significant populations of both highly connected and highly isolated nodes. This property is shown clearly via the diameters of the two networks. The original network is significantly wider than its randomly rewired counterpart. Despite the existence of close communities and hubs within the original network, there are multiple extremely remote nodes in it with no close ties. We also use this weighted network to measure reciprocity [33], which is used to measure how one sided interactions are. Our first measure is how many pairwise communications are matched with communications in the opposite direction. A surprisingly low number of communications, 62.88%, have com- munications in both directions indicating that over a third of interactions are unreciprocated. Next, we construct a reciprocity metric that measures the average contribu- tion of a nodes' links so that it is independent of the degree of the node. Unlike [33], we apply it to directional links as opposed to [33]. The corresponding definition is Ri = 1 , where ki is the total (both in and out) ki wi,j−wj,i wi,j +wj,i (cid:80) j∈N (i) 7 Figure 2: a) The distribution of reciprocities. (b) The distribution of reciprocities using a randomized network. Peaks are observed at -1, and 1. This is consistent with a large number of nodes have low degree as most links are not reciprocated. The randomized network produces a narrower and rougher distribution indicating some level of order in how individuals interact. degree of node i, wi,j is the number of communications from node i to node j, and N (i) is the set of neighbors that have a link connected to node i. Accord- ing to this definition, links over which a node is sending more than receiving contribute positively to the node's metric, while links with the reverse pattern contribute negatively. The absolute value of the contribution itself increases monotonically with the difference in the level of communication [33]. Finally, every link's contributions are normalized, thus bound within the range [-1,1]. We show in Fig 2(a) that the distribution of reciprocity is fairly smooth with large spikes at the extreme values. These spikes arise because there are nodes with either no incoming communications (Ri = 1) or no outgoing communica- tions (Ri = −1). Since all data comes from a single cell phone provider, it is likely that many of these nodes simply have contacts that use different carriers not included in the set. Removing these outliers, we fit the remaining distribu- tion using a stretched exponential as described in Equation 2. Table 2 shows the fitting parameters for Fig 2. As can be seen, there is an asymmetry in the width of the positive and negative side of the distribution. This can be caused by an increased amount of communication for nodes with reciprocity equal to 1. While each link's contribution wi,j − wj,i is symmetric, the overall contributions 8 Fitting parameter CDR graph Random graph Positive Negative Positive Negative 1.52 0.168 0.994 1.49 0.198 0.991 1.96 0.080 0.687 1.07 0.111 0.961 β α R2 Table 2: The fitting parameters used in Fig 2. Positive and Negative refer to the fit of the distribution where the reciprocity values are positive and negative respectively. Due to the non-integer value of the curvature, we fit the absolute value of the negative side and plot accordingly. For the CDR graph both positive and negative sides have very similar fitting parameters except for the width in the distribution which suggest an asymmetry. are averaged and thus the symmetry can be broken. If an unreciprocated link is the only link for a node, its reciprocity will be Ri = ±1 regardless of what w is. This means if there are overall more communications from nodes with Ri = 1 than nodes with Ri = −1, this difference would show itself in the overall distribution. For the randomized network, Fig 2(b), the concavity of the distribution nar- rows compared to Fig 2(a) from the presence of more frequent values close to zero. Hence, the original network is more diverse than its randomized counter- part is. For other possible representations of reciprocity within the network, see Sup- plementary Material Sec. 2, where we discuss two additional variants. These alternative metrics are not independent from the metric presented in this sec- tion. 3.2. Community detection and geographical districts The CDR based network allows us to analyze the social communities present in the system. We use the GANXiS(SLPA) algorithm for its ability to detect even disjointed and overlapping communities and fully encapsulate the social structure of the network [36, 35]. Using this algorithm, we identify a set of over 6450 social communities, many more than the 231 geographic communities derived from the districts reported. Despite the size differences (the largest 9 district contains 63491 users while the largest social community has just 741 with an average of only 74.65 users), the groups are substantial enough to test the overlap of the lists for greater insight into how the social ties form. Intuitively, it seems reasonable to expect that the social communities are highly influenced by the geographic district of their members. Instead we see in Fig. 3 that on average only 41% of each community comes from the same district, and in fact even the top five districts only account for 78% of each community's makeup. The diversity of the geographic locations within social groups is especially surprising given the generally small size of the social groups compared to the geographic districts. The communities are also included in our feature set for predicting user default's as it is possible that individuals of a certain groups are more likely to default. 4. Feature generation We combine the above described network features with the various raw usage and location features that are inherent to the dataset to create our full feature set. For ease of analysis, we divide them into six groups: 1. High Level Network features - explained in detail above. This subset consists of 5 features. 2. Consumption features - includes information about the total number of communication events, the total and average duration of phone calls, and average time between consecutive communications. This subset consists of 2784 features. 3. Correspondent features - based on the distinct number of individuals that each user communicates with over various time periods. This subset consists of 2561 features. 4. Reciprocated event features - number of events where the observed user returns a call/message within a specified time period of receiving a communication. This subset consists of 672 features. 10 Figure 3: Top: Community and districts sizes, which are sorted in descending order. The average social community size is 75 with a median of 70, whereas geographic districts show an average of 2, 380 and median of 1273. Bottom: average proportion of users from a community that belong to the same geographic district - from most represented geographic district by users (1st) to the 5th most represented. 5. Mobility features - includes the movement patterns of individuals based on the cell tower used for each communication with relation to commonly used towers. This subset consists of 29 features. 6. Location features - includes the two most used cell phone towers for each user. This subset consists of 2 features. In some cases large or very inclusive features can be broken up by analyzing time windows (hours, days, day of the week, weeks, months, business hours, non-business hours, weekend, weekday), direction (ingoing/outgoing event), and communication type (call/message), leading to a large overall set of more than 6000 features. Most of these features are standard, so we do not present them 11 Figure 4: This graph shows point biserial correlation of each individual feature to default status. Values are sorted in descending order by absolute value of their correlation coefficient. Features with highest absolute correlation (originally all negative) are the average number of used cell towers in one week, distance traveled in a day of week and the average daily radius. in detail here, but relegate the full descriptions of each feature set to Supple- mentary Material Sec. 3. 5. Predicting default status 5.1. Correlation analysis We utilize point biserial correlation to define the basic correlation between each feature and user default status due to its suitability for handling both categorical and continuous variables as are present in our feature set. This process indicates that individual features tend to have very little correlation to default status (shown in Fig. 4), with a maximum absolute correlation of only 0.1155 and average correlation of −0.006. This poor individual correlation shows that no single feature reproduces the default status of the individuals reliably, proving the value of building an accurate predictive model through more complex analysis. 12 5.2. Modeling 5.2.1. Logistic regression To create the predictive models, we start by defining the notation for logistic regression. Let β0 denote the intercept and β stand for a vector of regression coefficients of length p. Both are determined by maximum likelihood estimation method which uses a training set with n known outcomes in the vector Y for nodes in the training set. Matrix X of size n × p with rows corresponding to nodes and columns corresponding to features contains values of features for all nodes in training set. For any node u in test set and its corresponding vector of feature values xu of size p, the probability of "success" (in our case the default status of this node being 1) is defined as P (yu = 1xu) = 1 1 + exp−β0−β·xu , (3) where yu denotes the value of the dependent variable for node u. 5.2.2. Principal Component Analysis To build a more complex model that utilizes the other 6048 features, we first normalize the features to mean values of 0 and variance 1. Once normal- ized, to deal with the extremely large number of features we perform Principal Component Analysis [24](PCA) to decompose the feature space and yield a set of "principal components". The results are linearly uncorrelated and ranked in such a way that the first principal component explains the highest possible amount of variability in the data, while each following component explains the highest amount of variance under the condition that it is orthogonal to all pre- ceding components. Once these components are obtained, we select subsets of the components that account for large amounts of variability in the data and use them as explanatory variables for a linear model. We do this for both large and small subsets of the components, as pruning the data in this way represents a careful balance between model simplicity and accuracy. In our dataset, this balance manifests in the rapidly diminishing returns seen from larger component inclusion. The first component explains 20% of variability in the data while the 13 second explains only 7%. In fact, the first thirty components together explain only 42% of the variability, while the first five hundred sum up to just 66%. For this reason, we generate two distinct logistic models: a simple one based on the first 30 PCA components (pca-30 ) and a more complex one, based on the first 500 PCA components (pca-500 ). We use notation p1 for the number of selected principal components. We then map our features into the new space to fit these groupings, such that XP C = X · C, where C ∈ Rp×p1 is the matrix of p1 principal components and XP C ∈ Rn×p1 is the new feature matrix. Finally, we also fit a model (pval-05 ) using only those variables from pca-500 that have a p − value < 0.5 to include the greater detail of the larger model with a lower complexity for calculation. 5.2.3. Other models We further examine the data by utilizing other techniques, and build models for each as a comparison to the above described PCA models. For instance, one large issue with our dataset is that positive samples (defaulted users) account for only 0.25% of the whole dataset, making it extremely unbalanced. Learning from this kind of unbalanced dataset is a well-known challenge in the data mining community that we attempt to account for by performing oversampling (multiplying positive samples to make them a larger portion of the dataset) [8]. In this case, we use multiplication factors ranging from 2−100, but in the model benchmarks presented here, we show only the model with a multiplication factor of 2 (oversampled-2 ) since it performed the best. Oversampling was applied to the reduced dataset (XP C). Further, as an alternative to the PCA reduction presented in the prior sec- tion, we also build a separate model by selecting features via Lasso regres- sion [31]. This method adds a penalty term to the log likelihood function in the prediction that shrinks the coefficients of less important variables to zero. We fine tune this reduction via a free parameter λ, varying it through a range of values to obtain the best lasso fits. The efficacy of this method is demon- 14 strated in two separate models: one based on logistic regression (lasso-logistic) and another using a Support Vector Machine [32] (lasso-svm). Finally, the last model we use for comparison utilizes a simple method for feature space reduction that aggregates some of the more specific features into general descriptions of behavior. For instance, features that were based on a particular day or week of the three month period are grouped and combined, creating instead features for weekdays versus weekend averages or business hours versus off-hours. This aggregation not only simplifies the model, but also makes it generalizable to other datasets with different levels of detail. This method shrinks the overall feature set considerably, leaving only 781 features. As before, these features are then normalized before being further reduced via PCA. 6. Results and discussion 6.1. Experimental setting After each of the above models is fit to a training set comprising 70% of the whole dataset, they are tested on the remaining 30% of the data and evaluated via their recall, fall-out, and precision. Defaulting users are labeled as positive examples and default predictions are defined as those users within the 95th percentile of default probabilities. This threshold is chosen to be relatively low to fit the nature of our study where false positives (non-defaulted users that were predicted as defaulters) are less damaging than false negatives (unidentified defaulters) to companies. The recall (the true positive rate) is the rate of identified defaulting cus- tomers. The fall-out (the false positive rate) is the probability of labeling a good client as a defaulting one. The precision is the fraction of correct default predictions out of all default predictions. These metrics are calculated as recall = T P T P + F N , f all-out = F P F P + T N , precision = T P T P + F P where TP is the number of true positives, FN is the number of false negatives, FP is the number of false positive, and TN is the number of true negatives. 15 6.2. Evaluation The performance of the models tested can be compared using a receiver operating characteristic curve (ROC), which we show in Figure 5. Here, we focus this comparison on the recall and fall-out of the model, where recall (which identifies defaulting customers) is of interest to phone companies, while fallout has greater relevancy in other applications of the models. The exact values of these performance metrics can be seen in Table 3, which also shows the precision of each model for reference. The initial results are in line with what would be expected intuitively: the worst performance comes from the random model, followed by glm-7 (the logis- tic model based on only 7 features). As the models become more complicated, their performance tends to increase. For instance, a significant reduction in false positives can be seen in the lasso-logistic model (which uses 309 variables) over the glm-7, then a further reduction in the lasso-svm model that uses 475 variables. Additionally in both Lasso models, the variable with the highest co- efficient is the user's most commonly utilized cell tower, indicating the presence of geographic regions which are high risk areas for user defaults. Other high performance models include the various PCA models, led by pca-500, pval-05 and oversampled-2 with pval-05 outperforming all other models. From these results, it is clear that for the most part larger feature sets allow for more accurate models (as would be expected), but this is not a strict rule. The best performing model is the one that begins with a large sample of features, but is then stripped of those that aren't considered significant. In other words, there are likely some 'false flags' in the feature list that tend to confuse the model rather than contribute. Feature removal only works to a point, however, as the more aggressive methods in the pca-aggr model lose these benefits and in fact make it one of the worst performing models tested. Thus, there is likely some very meaningful information even within the extremely specific features that would be intuitively too limited to contribute much. Finally, it should be noted that while the highest performing oversampling model, oversampled- 2 yields improvements comparable to filtering insignificant features, applying 16 both techniques worsens the results as the model apparently over-fits. Model random glm-7 lasso-logistic pca-aggr lasso-svm pca-30 pca-500 oversampled-2 pval-05 Recall Fall-out Precision 0.060 0.224 0.484 0.676 0.749 0.810 0.889 0.897 0.900 0.0501 0.0495 0.0490 0.0484 0.0482 0.0480 0.0478 0.0478 0.0477 0.003 0.012 0.023 0.036 0.040 0.043 0.047 0.047 0.048 Table 3: Recall, fall-out and precision for each of the models presented in Figure 5. Precision is low due to the fact that the dataset is majorly unbalanced; however, precision of the best model is about 15 times higher than in the random model. Figure 5: Model performance when predicting defaulting users from worst to best: glm-7, lasso-logistic, pca-aggr, lasso-svm, pca-30, oversampled-2, pca-500 and pval-500. 17 6.3. Stability For a more in depth look into the differences in prediction among the top three models (oversampled-2, pca-500, pval-05 ), we look at the overlap size (the intersection of correctly labeled defaulting customers) and average overlap score (the similarity of two rankings at increasing depth giving higher weights to higher ranked observations; AOS). All analysis is restricted to only those customers with a calculated probability of default (PD) in the 95 − th quantile. As can be seen in Table 4, both the overlap and AOS are extremely high for all model comparisons, indicating that all three models are stable and predict roughly the same nodes for default. Further, the pval-05 and pca-500 models can be seen to be more similar to each other than the oversampled-2 model due to pval-05 being essentially pca-500 with some of the problematic features removed. pval-05 pca-500 oversampled-2 pval-05 pca-500 oversampled-2 overlap AOS overlap AOS overlap AOS 100 100 98.8 96.5 100 100 97.3 94.3 97.9 95.5 100 100 Table 4: Overlap size (in percentage) and average overlap score of correctly labeled defaulting customers for the three best models. 6.4. Contribution of feature sets Finally, we identify the original features that contribute the most to our models to gain a better understanding of what aspects of the mobile phone data are most important for predicting default status. However, as we mentioned before in Sec. 5.1, each feature is generally fairly poorly correlated with defaults. Thus it is no surprise that there is no one outstanding feature that stands out as the strongest contributor. To remedy this, we perform a general analysis using 18 Model Full feature set - consumption features - correspondent features - reciprocated features - mobility features - network features - cell tower PD features Only correspondent features 0.9 0.88 0.58 0.88 0.88 0.88 0.89 0.86 Recall Precision ∆Recall ∆P recision - 0.001 0.017 0.002 0.002 -0.002 -0.002 - 0.048 0.047 0.031 0.046 0.046 0.05 0.050 0.049 - 0.02 0.32 0.02 0.02 0.02 0.01 - Table 5: Results of models based on reduced feature sets. In each row, the underlying dataset is missing one category of features (listed in first column of the table). Two models that proved to be the best were fitted in each case: glm-500 and glm-500-filt. Most features contribute only about 2-3% to the final recall and 0.1-0.2% to the final precision, except for correspondent features which contribute 33% of recall and 1.9% of precision. the feature set groupings described in Sec. 4 to identify which class of features contributes the most. By building a host of modified models, each consisting of all of the feature sets except one, we can compare the performance of the models with the reduced data against the model with all data included. This method allows us to gain a better understanding of how much information is lost when a feature set is removed (i.e. how unique that information is), data that is especially valuable to this study considering the high redundancy in our data set. As shown in Table 5, by far the highest contributors to recall and precision are the correspondent features, which focus on individual's unique frequent cor- respondents in various time frames. To better understand exactly what features within the correspondent feature set are important, we perform 5-fold cross val- idation on a linear model using only these features. On average, this model is able to achieve a 0.86 recall and 0.049 precision, both fairly high for such a small subset of all features. Further, we explore which out of the 2543 corre- spondent features contribute most to the final PD by mapping the maximum 19 likelihood estimation (MLE) coefficients of PCA components back to original features' coefficients, β = C · βP C where β ∈ R2543×1, C ∈ R2543×500 is the matrix of principal components and βP C ∈ R500×1 are the MLE coefficients for a model fitted on 500 PCA compo- nents. We then multiply each regression coefficient by the mean of the correspond- ing feature (separately for paying and defaulting customers). Finally, we define a score for each user based on the values of βXj, j = 1, ...n. This creates a sys- tem where higher scores correspond to customers with higher PD's, and leads to an average score of −0.0453 for paying customers and 16.2758 for defaulting customers. This analysis is not possible using the whole feature set together, as the normalization of the features leads to an average contribution of zero, but the absolute contribution values of each feature are taken into account to maintain a focus on the actual impact of the features on the PD. The results for the four strongest features are presented in Table 6. In the end, the same ten features are identified as the strongest contributors for both the paying and de- faulting customer groups. All ten relate to the number of unique correspondents with whom the user communicates during the holiday period around Christmas and New Year's Eve. This strongly indicates a tie between not only unique correspondents and defaulting, but also unique correspondents around holiday periods (when users are most likely to be contacting close family and friends). From these results we can begin to draw a clear connection of low probability of default with the large number of active unique ties an individual has within the network, and the high strength of those ties. However, it should be noted that this kind of estimation of variable contri- bution is too simple to provide a definitive insight into the relative importance of the variables. There are several other approaches that compare predictors in regression including methods considering variable importance via R2 par- titions [25, 29], dominance analysis [3] and relative weights analysis [11, 17]. 20 Feature unique message correspondents (12/24) unique message correspondents (incoming, 12/24) unique message correspondents (outgoing, 12/24) unique correspondents (outgoing, 12/24) sum Mean relative contribution 0.043 0.041 0.024 0.023 0.131 Table 6: Four features with the highest contribution to the PD calculated on separate sets of paying and defaulting customers. All of the top 10 relate to the number of unique correspon- dents during holiday period around Christmas and New Year's Eve. According to the literature, the dominance analysis provides the most accu- rate results, but it is not practical for our problem since it measures relative importance in a pairwise fashion and is suitable only for small variable sets. In- stead, the relative weights approach is sometimes used for systems with multiple correlated predictors as can be found here [17], but this approach is theoreti- cally flawed and is therefore not recommended for use [30]. We instead utilize a variable importance (VI) extension for logistic regression [29] that is based on Pratt's axiomatic [25] and the geometric approach of Thomas [28]. This method equates VI to variance explained by the variable, which is βjρj, where βj is the standardized regression coefficient and ρj is the simple correlation be- tween variables Y and Xj. For our purposes, we use the geometric approach to this method; an interpretation of Pratt's measure based on the geometry of least squares. Here, the VI indices are defined as dj = βj ρj R2 , j = 1, . . . , p, (4) where hats denote sample estimates, and R2 is as usual the proportion of sample variance explained. Further, we utilize a pseudo-R2 measure based on Weighted Least Squares such that this set of indices sums to one and the importance of a subset of variables is equal to the sum of their individual importance. This results in the four most important features, according to VI metric, shown in Table 7, 21 Feature unique message correspondents (12/24) unique message correspondents (incoming, 12/24) unique message correspondents (outgoing, 12/24) unique correspondents (outgoing, 12/24) sum dj 0.048 0.045 0.029 0.026 0.148 Table 7: Ten features with the highest contribution to the PD. All of them relate to the number of unique correspondents during holiday period around Christmas and New Year's Eve. yielding results very similar to the ones presented in Table 6. The two most important variables are: the number of unique correspondents with whom the user had a call on Dec 24th with relative importance of 0.048, and the number of unique correspondents from which the user received a message on Dec 24th with relative importance of 0.045. This finding reiterates the significance of the number of unique correspondents with whom the user communicates around holiday periods. Finally, to ensure that these features actually carry unique information, we fit another model removing from the dataset the features with the highest identified VI. Doing so reduces the recall by 0.042 and leaves none of the new identified important variables with a relative importance above 0.03. 7. Conclusion In this paper, we investigate many different aspects of user behavior to build a large suite of features for analysis, starting with constructing the underlying social networks based on the cell phone usage data. This produces a complex network rich with information. Applying common network metrics reveals some of the characteristics of the network such as the heterogeneity of the centrality, diameter, and reciprocity measures. The complex nature of the problem addressed by our machine learning method to predict whether users will default in paying their cellphone bill leads us to utilize some 6000 features, which we then pare down to only the most 22 predictive ones. The resulting model achieves a recall of 0.9 with a fall-out of only 0.048, the performance that compares favorably with [27, 1], e.g., recall of 0.674 is reported in this reference. Finally by investigating in depth the various features that contribute to the model, we are able to pinpoint the surprisingly best, contributor: the number of unique contacts with whom the user interacted around the winter holidays (when users are most likely to contact their closest friends and family). The significance of this correspondent information is higher than that of more tra- ditionally used features. These results demonstrate the need for systematic approach to selecting features for complex behavior prediction. Indeed, our re- sults show that the strength of links within the network is better determined by the timing of communications rather than the volume, duration, or distance traditionally used for the similar predictions. While our use of CDR data here focuses on user analytics and predictive modeling, CDR datasets can support many other avenues of research. This work investigates the default status of individuals, but there are many other complex aspects of user behavior that could benefit from similar computational techniques. The modeling we present could be improved by gathering informa- tion over larger time periods in order to get a larger population of defaulting individuals. Finally, with new machine learning algorithms constantly being de- signed and improved, a more specific algorithm that is built for high dimensional data such as ours could improve the resultant predictions and understanding of how the specific features contribute to the overall model which is novel and unexpected. Hence, our novel approach leading to these results is the main contribution of our paper to the state of the art. 8. Acknowledgments Funding: This work was supported in part by the Army Research Laboratory (ARL) under Cooperative Agreement Number W911NF-09-2-0053 (NS-CTA), by the Office of Naval Research (ONR) Grant No. N00014-15-1-2640, by the 23 RENOIR EU H2020 project under the Marie Skłodowska-Curie Grant Agree- ment No. 691152 and by the National Science Centre, Poland, project no. 2016/21/B/ST6/01463. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the of- ficial policies either expressed or implied of the Army Research Laboratory or the U.S. Government. References References [1] Agarwal, R. R., Lin, C.-C., Chen, K.-T., and Singh, V. K. (2018). Predicting financial trouble using call data -- on social capital, phone logs, and financial trouble. PloS one, 13(3):e0191863. [2] Alstott, J., Bullmore, E., and Plenz, D. (2014). powerlaw: A Python Package for Analysis of Heavy-Tailed Distributions. PLoS ONE, 9(1):e85777. [3] Azen, R. and Budescu, D. V. (2003). The dominance analysis approach for comparing predictors in multiple regression. Psychological methods, 8(2):129. [4] Bae, J. K. and Kim, J. (2015). A personal credit rating prediction model using data mining in smart ubiquitous environments. International Journal of Distributed Sensor Networks, 11(9):179060. [5] Barabási, A.-L. and Pósfai, M. (2016). Network science. Cambridge univer- sity press. [6] Björkegren, D. and Grissen, D. (2017). Behavior revealed in mobile phone usage predicts loan repayment. arXiv preprint arXiv:1712.05840. [7] Blondel, V. D., Decuyper, A., and Krings, G. (2015). A survey of results on mobile phone datasets analysis. EPJ Data Science, 4(1):10. [8] Chawla, N. V. (2009). Data mining for imbalanced datasets: An overview. In Data mining and knowledge discovery handbook, pages 875 -- 886. Springer. 24 [9] Clauset, A., Shalizi, C. R., and Newman, M. E. J. (2009). Power-Law Distributions in Empirical Data. SIAM Review, 51(4):661 -- 703. [10] Ge, R., Feng, J., Gu, B., and Zhang, P. (2017). Predicting and deterring default with social media information in peer-to-peer lending. Journal of Management Information Systems, 34(2):401 -- 424. [11] Johnson, J. W. (2000). A heuristic method for estimating the relative weight of predictor variables in multiple regression. Multivariate behavioral research, 35(1):1 -- 19. [12] Klaus, A., Yu, S., and Plenz, D. (2011). Statistical Analyses Support Power Law Distributions Found in Neuronal Avalanches. PLoS ONE, 6(5):e19779. [13] Kovanen, L., Saramaki, J., and Kaski, K. (2011). Reciprocity of mobile phone calls. Dynamics of Socio-Economic Systems, 2(2):138 -- 151. [14] Kuznetsova, N. V. and Bidyuk, P. I. (2017). Modeling of credit risks on the basis of the theory of survival. Journal of Automation and Information Sciences, 49(11). [15] Kvamme, H., Sellereite, N., Aas, K., and Sjursen, S. (2018). Predicting mortgage default using convolutional neural networks. Expert Systems with Applications, 102:207 -- 217. [16] Lambiotte, R., Blondel, V. D., de Kerchove, C., Huens, E., Prieur, C., Smoreda, Z., and Van Dooren, P. (2008). Geographical dispersal of mobile communication networks. Physica A: Statistical Mechanics and its Applica- tions, 387(21):5317 -- 5325. [17] LeBreton, J. M. and Tonidandel, S. (2008). Multivariate relative impor- tance: Extending relative weight analysis to multivariate criterion spaces. Journal of Applied Psychology, 93(2):329. [18] Li, M.-X., Palchykov, V., Jiang, Z.-Q., Kaski, K., Kertész, J., Miccichè, S., Tumminello, M., Zhou, W.-X., and N Mantegna, R. (2014). Statistically val- 25 idated mobile communication networks: the evolution of motifs in European and Chinese data. New Journal of Physics, 16(8):083038. [19] Ling, R., Bertel, T. F., and Sundsøy, P. R. (2012). The socio-demographics of texting: An analysis of traffic data. New Media & Society, 14(2):281 -- 298. [20] Maldonado, S., Peters, G., and Weber, R. (2018). Credit scoring using three-way decisions with probabilistic rough sets. Information Sciences. [21] Newman, M. E. J. (2001). Scientific collaboration networks. II. Shortest paths, weighted networks, and centrality. Physical Review E, 64(1):016132. [22] Onnela, J.-P., Saramäki, J., Hyvönen, J., Szabó, G., Lazer, D., Kaski, K., Kertész, J., and Barabási, A.-L. (2007). Structure and tie strengths in mobile communication networks. Proceedings of the National Academy of Sciences of the United States of America, 104(18):7332 -- 6. [23] Opsahl, T., Agneessens, F., and Skvoretz, J. (2010). Node centrality in weighted networks: Generalizing degree and shortest paths. Social Networks, 32(3):245 -- 251. [24] Pearson, K. (1901). Liii. on lines and planes of closest fit to systems of points in space. The London, Edinburgh, and Dublin Philosophical Magazine and Journal of Science, 2(11):559 -- 572. [25] Pratt, J. (1987). Dividing the indivisible using simple symmetry to partition variance explained. Proceedings of the Second International Conference in Statistics, pages 245 -- 260. [26] Rochat, Y. (2009). Closeness centrality extended to unconnected graphs: The harmonic centrality index. In ASNA, number EPFL-CONF-200525. [27] San Pedro, J., Proserpio, D., and Oliver, N. (2015). Mobiscore: towards universal credit scoring from mobile phone data. In International Conference on User Modeling, Adaptation, and Personalization, pages 195 -- 207. Springer. 26 [28] Thomas, D. R., Hughes, E., and Zumbo, B. D. (1998). On variable impor- tance in linear regression. Social Indicators Research, 45(1-3):253 -- 275. [29] Thomas, D. R., Zhu, P., Zumbo, B. D., and Dutta, S. (2008). On measur- ing the relative importance of explanatory variables in a logistic regression. Journal of Modern Applied Statistical Methods, 7(1):4. [30] Thomas, D. R., Zumbo, B. D., Kwan, E., and Schweitzer, L. (2014). On johnson's (2000) relative weights method for assessing variable importance: A reanalysis. Multivariate behavioral research, 49(4):329 -- 338. [31] Tibshirani, R. (1996). Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. Series B (Methodological), pages 267 -- 288. [32] Vapnik, V. N. (1999). An overview of statistical learning theory. IEEE transactions on neural networks, 10(5):988 -- 999. [33] Wang, C., Lizardo, O., Hachen, D., Strathman, A., Toroczkai, Z., and Chawla, N. V. (2013). A dyadic reciprocity index for repeated interaction networks. Network Science, 1(1):31 -- 48. [34] Wang, Y. and Lee, Y.-C. (2018). Customer credit evaluation using big data of microfinance company in china. The Korean Academic Society of Business Administration, (2):1601 -- 1645. [35] Xie, J. and Szymanski, B. K. (2011). Community detection using a neigh- borhood strength driven label propagation algorithm. In IEEE NSW 2011, pages 188 -- 195. [36] Xie, J., Szymanski, B. K., and Liu, X. (2011). Slpa: Uncovering overlapping communities in social networks via a speaker-listener interaction dynamic process. In ICDM 2011 Workshop on DMCCI. [37] Yan, X., Jeub, L. G., Flammini, A., Radicchi, F., and Fortunato, S. (2018). Weight thresholding on complex networks. Phys. Rev. E 98, 042304. 27 [38] Zhang, X.-j. and Hu, J. (2009). Personal credit rating assessment for the national student loans based on artificial neural network. In Business Intel- ligence and Financial Engineering, 2009. BIFE'09. International Conference on, pages 53 -- 56. IEEE. Appendix A. Constructing an unweighted network representation with frequency cutoffs We define the unweighted network via a cutoff, c, representing the minimum number of communications from node i to node j required for an edge to be drawn [21]. Specifically, if you consider the weight of communications between node i and node j to be the total volume of communications wi,j, then the condition for a directional link being formed from node i to node j is wi,j ≥ c. This link then becomes an unweighted directional edge from node i to node j without restricting the possibility of another link forming from node j to node i to create an unweighted bidirectional edge. One main advantage of constructing the network in this way is that it allows the network to be simplified, removing noise while still retaining information regarding the frequency of communication. Still, the methodology proposed here contains some inherent loss of information partially stemming from the use of the raw number of communications between individuals. To account for possible differences in the amount of information contained in calls versus texts, it is natural to attempt to use different commu- nication weights based on communication type. As such, we experimented with such methods to better account for these information exchange levels and found that any such scheme would cause bias between age groups. In general, since younger individuals used more text messages while older individuals used more calls we treat their contributions to the network flatly to minimize bias. This method yields a strict structural view of the true friendship network, addressing the need for noise reduction by pruning down the network as well as showing how robust the network is to increasingly strict friendship require- ments. [37] In Fig. A.6(a), we show that the giant component of the network 28 Figure A.6: (a) The giant component of the social network decays exponentially (λ = 0.0238) with increased minimum number of communications required for an edge to be drawn. (b) The number edges in the network also decays rapidly with increased cutoff, closely fitting a power law with γ = 0.7536. (c) The percentage of non-giant component nodes that are isolated for a given cutoff. The isolated nodes reach a minimum at a cutoff of 43. decays exponentially with an increased frequency cutoff for edges, and is gener- ally very sensitive to such an increase. Without a cutoff, the giant component of the network contains 99.1% of the nodes, but it drops to only half of the network when the frequency cutoff reaches 30. A similar effect can be seen in Fig.A.6(b), where the total number of edges in the social network shows a power law decay for increasing cutoff values. This power law decay of edges implies that the scheme is useful for removing noisy, low frequency communication while leav- ing intact the dense communications representative of strong social ties. The proper cutoff value for a given situation is difficult to establish, however, since the vast majority of connections in the network are low frequency. In fact, less than half of the original edges remain when a cutoff of c = 4 is implemented. 29 Figure A.7: The out-degree distribution of the mobile phone network for various edge weight cutoffs. The inset shows the estimated power law exponent for the various cutoff values to highlight the different scaling rates. As the cutoff increases further, the network loses much of its connectivity and instead shows a rough sketch of the community structure of the system. This effect is seen in Fig. A.6(c), in which the percentage of nodes outside of the giant component that are isolated decreases with increased cutoff, the result of small communities being separated from the giant component but remaining intra-connected. Of course, these results yield only a crude approximation of the community structure; high cutoffs lower the connectivity within communi- ties as well as separate them from the giant component. This trade-off becomes apparent at cutoffs larger than c = 43, where the number of isolated nodes in- creases and even tightly bound communities unravel. A more direct and robust detection of the network's community structure is discussed in Sec. 3.2. In addition to the effects on the connectivity of the network, the frequency cutoff also has a significant impact on the overall degree distribution (shown in Fig. A.7). As expected [18, 22, 5], for all values of the cutoff the degree distribution shows a power law tail. However, the rate at which the tail decays changes as the edges are removed. As the cutoff increases, many of the highest 30 degree nodes lose the vast majority of their edges. As a result, the higher cutoffs greatly reduce the maximum degree of the network and increase the power scaling exponent of the degree distribution causing faster tail decay [2, 12, 9]. As with the prior results on increased cutoff, however, this is only true to a point. The exponent increase appears to saturate at high values of the cutoff where the impact gets weaker and weaker. These properties allow us to use an unweighted graph with low cutoffs to define basic network features such as node degree, while higher cutoff values are useful for finding the stable number of strong contacts. Appendix B. Reciprocity Measures Here we generalize how reciprocity is defined using Ri =(cid:80) require Ni,j to be normalized, (1 =(cid:80) j Ni,jri,j where ri,j is the reciprocity score between node i and j and Ni,j is the weight of that score. To keep the metric bounds at [−1, 1], we constrain ri,j to [−1, 1] and j Ni,j). Previously, we defined a metric and where all scores are equal. Under normalization this where ki is the total degree of node i. Here we introduce using ri,j = wi,j−wj,i wi,j +wj,i means that Ni,j = 1 ki two variants to produce two alternative metrics for reciprocity. First we remove the dependence on the number of communications by mod- ifying ri,j to take on only three values −1, 0, 1, causing links with small wi,j to become more important. If between node i and node j there exists any number of communications from i to j, but no communications from j to i, then ri,j = 1. If the opposite is true, then ri,j = −1. Finally if both i and j send any number of communications to each other, ri,j = 0. Ni,j in this metric is unchanged. We call this metric binary weighted reciprocity. The second metric modifies Ni,j rather than ri,j. To make high volume links more important, we set Ni,j ∝ wi,j + wj,i. Applying normalization leads to Ni,j = wi,j +wj,i , which we call hyper-weighted reciprocity. . The simplified expression is then Ri =(cid:80) wi,j−wj,i j(cid:48) wi,j(cid:48) +wj(cid:48) ,i j(cid:48) wi,j(cid:48) +wj(cid:48),i (cid:80) (cid:80) j In Fig B.8, we show the distribution for both of these metrics. The hyper- 31 Figure B.8: (a) The distribution of reciprocities using the hyper-weighted metric. (b) The distribution of reciprocities using the binary metric. Both metrics maintain the extreme values. They also maintain a bell shape curve, but the binary metric exhibits multiple discrete peaks. weighted reciprocity is very similar to the weighted reciprocity, but the binary distribution is significantly different. Most of these difference arise from the binary nature of the metric, where for example a node with degree three can only have reciprocity 0,±1/3,±2/3,±1. Because the system is dominated by low degree nodes, this type of scenario is frequent causing a few discrete fractions to be most prevalent. Further, we include a fit following the same methodology as in Fig 2, where Table B.8 shows the fitting parameters. Fitting Parameter A B C R2 Hyper-weighted Binary Weighted Positive Negative Positive Negative 0.218 1.84 0.124 .798 0.707 1,33 0.179 .976 0.136 1.83 0.142 0.785 0.957 1.08 0.157 0.957 Table B.8: The fitting parameters used in Fig B.8. Positive and Negative refer to the fit of the distribution where the reciprocity values are positive and negative respectively. The Binary metric has relatively poor R2 values due to the many peaks present, but the fit captures the general shape. The Hyper-weighted metric preforms better on goodness of fit and clearly shows the asymmetry between the positive and negative side of the distribution. 32 Unfortunately, these features are not sufficiently unique from that shown in the main text of this work, and thus not suitable as separate features. The binary and weighted metrics have a Pearson correlation coefficient of 0.9224, while the hyper-weighted and weighted metrics have a coefficient of 0.727. Because of these high levels of correlation and despite weighting reciprocity differently, we conclude that the alternate methods do not produce any sufficiently unique information. They can, however, be substituted for the metric used based on specific use cases where the intuition behind the calculations fits better, and thus may be useful for future work. Appendix C. Feature Sets Appendix C.1. Consumption features Consumption features include information about the total number of com- munication events, the total and average duration of phone calls, and average time between consecutive communications. These broad categories are then broken up into time windows (specific times of day or days of the week) and separated by communication type and direction to form a large contribution to our overall feature set. These features characterize the normal activity patterns for individuals within the network. On average, per day each user makes 5.3 calls lasting about 40 seconds each, and sends 10.4 messages. Additionally, this feature shows a slightly higher wait time for incoming events (3 hours) than outgoing events (2.5 hours). Appendix C.2. Correspondent features Correspondent features are based on the distinct number of individuals that each user communicates with over specific time periods, separated between calls and text messages. This includes the total number of unique people that ex- change at least five messages with the user on average every week, and the number of regular correspondents that make at least two calls to the user on average in a week. Further, this feature includes the percentage of incoming 33 communications that are messages and the number of unique correspondents over various time periods and scales (such as normal business hours versus rest hours and week days versus weekends). Analysis of this feature set shows that the average number of correspondents (call or message) is 31, while call corre- spondents make on average 21 calls and message correspondents sent on average 17 messages. However for regular correspondents, each user makes only 3.3 calls and sends 1.7 messages. The number of unique correspondents during the week- end drops to about half of the number for weekdays. Appendix C.3. Reciprocated event features We define reciprocated events as events where the observed user returns a call/message within an hour of receiving a communication. We extract this information for each user and every hour of the week, as well as the median time between reciprocated call events and median time to answer messages. Similar to above, we also aggregate these indicators to days of week and time of day. On average, this analysis shows that users reciprocate only 14 calls and 15 messages for the night time (midnight-6am) during the whole 3-month period. Interestingly, the average time to answer a message is only 21 minutes in the morning (6am-10am). This drops even further to a little less than 10 minutes during other times of the day (10am-6am). Further, the average number of reciprocated messages increases as the week goes by, going from 6.5 to 6.9 from Monday to Friday, but then dropping to 5.7 and 4.8 on Saturday and Sunday, respectively. Appendix C.4. Mobility features Mobility features describe daily movement patterns of a person. They use the cell tower location to which the individual connected to for each event. Features include average daily radius of gyration (minimum radius that encompasses all the locations visited by a user), average distance traveled per day of week (calculated as sum of distances between consecutive antennas), popular cell towers (IDs of most popular cell towers that sum up to 90% of records) and 34 average number of unique cell towers per week. A typical user's average daily radius of gyration is 8.5 km. Interestingly, there is an order of magnitude difference when comparing mean and median distance traveled by day of the week, but the trend is the same in both cases. From Monday to Thursday, the median distance traveled is fairly constant around 33 km, but increases to 40 km on Friday and 47km on Saturday before dropping to 23 km on Sunday. Lastly, the average number of utilized cell towers per week is 15. Appendix C.5. Location features From information about the two most commonly used cell towers and the default status of each user, we can develop location features to identify high risk geographic regions. We use two cell towers instead of one to account for users spending a large amount of time at both their residence and workplace/school. For this reason, two new features are added for each user; one for each tower. From this information, we can calculate the empirical probability of default for each cell tower, yielding a mean of 0.0032. Note that when used for prediction purposes, these calculations are based only on the training data set and then applied to the test dataset accordingly (more information on this experimental setting is in 6.1). 35
1510.02700
3
1510
2016-01-26T00:06:36
A short-graph Fourier transform via personalized PageRank vectors
[ "cs.SI" ]
The short-time Fourier transform (STFT) is widely used to analyze the spectra of temporal signals that vary through time. Signals defined over graphs, due to their intrinsic complexity, exhibit large variations in their patterns. In this work we propose a new formulation for an STFT for signals defined over graphs. This formulation draws on recent ideas from spectral graph theory, using personalized PageRank vectors as its fundamental building block. Furthermore, this work establishes and explores the connection between local spectral graph theory and localized spectral analysis of graph signals. We accompany the presentation with synthetic and real-world examples, showing the suitability of the proposed approach.
cs.SI
cs
A SHORT-GRAPH FOURIER TRANSFORM VIA PERSONALIZED PAGERANK VECTORS Mariano Tepper and Guillermo Sapiro Department of Electrical and Computer Engineering, Duke University ABSTRACT The short-time Fourier transform (STFT) is widely used to analyze the spectra of temporal signals that vary through time. Signals defined over graphs, due to their intrinsic complex- ity, exhibit large variations in their patterns. In this work we propose a new formulation for an STFT for signals defined over graphs. This formulation draws on recent ideas from spectral graph theory, using personalized PageRank vectors as its fundamental building block. Furthermore, this work es- tablishes and explores the connection between local spectral graph theory and localized spectral analysis of graph signals. We accompany the presentation with synthetic and real-world examples, showing the suitability of the proposed approach. Index Terms -- Graph, localized Fourier transform, per- sonalized PageRank, local spectral graph theory. 1. INTRODUTION The Fourier transform globally decomposes a temporal signal into its constituting frequencies, identifying their contribution to the signal formation. Often, temporal signals vary their be- havior through time; in these cases, the Fourier transform, be- ing global, falls short as a tool to analyze the characteristics of these signals. The short-time Fourier transform (STFT) [1] is used to analyze the Fourier spectrum of temporally localized sections of the signal. It is well studied that there is a trade-off between resolution (sharpness) in time and its counterpart in frequency. There is no way to get arbitrarily sharp analysis in both domains simultaneously [2, Sec. 2.6.2]. Formally, in the STFT a window function w which is nonzero for only a short period of time is slid along the time axis and multiplied by the input signal f; then the Fourier transform of the resulting signal is taken. Formally, for one dimensional signals, STFTf (u, ξ) . = f (t)w(t − u)e−iξtdt. (1) (cid:90) ∞ −∞ The changing spectra is usually analyzed as a function of the time-shift u and is well suited to analyze time-varying signals. The above formula can be interpreted as the following three- sets algorithm: (1) translate the window w by u, (2) modulate Work partially supported by NSF, ONR, NGA, ARO, and NSSEFF. the result by frequency ξ, and (3) take the convolution of the result with the signal f. This can be written as STFTf = (cid:104)f,MξTuw(cid:105), = g(t − u) and (Mξg)(t) . (2) where (Tug)(t) translation and modulation operators, respectively. . = g(t)eiξt are the Weighted graphs are a natural representational structure in most modern network applications (including, for example, social, energy, transportation, and sensor networks). These graphs are loaded with information, usually in the form of high-dimensional data (i.e., signals) that reside on the vertices (nodes) of graphs. Graph signal processing lies at the inter- section of graph theory and computational harmonic analysis and seeks to process such signals on graphs. See [3, 4] for further details and references on this emerging field. Graph signal processing has been successful at charac- terizing the equivalent of the Fourier transform in graph do- mains. Many different types of localized spectral transforms have been proposed in recent years, see [3, Sec. IV] for a thorough discussion. This list includes a windowed Fourier transform [5], later described in this work. In parallel, One of the main examples are diffusion wavelets [6], which are based on compressed representations of powers of a graph diffusion operator. local spectral techniques, in which personalized PageRank vectors play a prominent role, have become increasingly popular in the field of community detection in graphs [e.g., 7]. As we will see in Section 2, the PageRank equation is defined recursively, and we can consider a single PageRank vector in place of a sequence of random walk vectors, or of powers of a diffusion operator [8]. In this work, we establish and explore for the first time the connection between local spectral graph methods and lo- calized spectral analysis of graph signals. This work is a first step in this exploration, and introduces a short-graph Fourier transform inspired on the ideas of local graph analysis, us- ing personalized PageRank vectors as fundamental building blocks of the method. The remainder of the paper is organized as follows. In Section 2 we introduce our short-graph Fourier transform. Experimental results on synthetic and real graphs are pre- sented in Section 3, showing the interesting characteristics of the proposed formulation. Finally, we provide some conclud- ing remarks in Section 4. 2. FROM LOCAL SPECTRAL GRAPH THEORY TO A SHORT-GRAPH FOURIER TRANSFORM We begin by introducing the notation and fundamental for- mulas used throughout the paper. . + =(cid:80)n Let X be a matrix. In the following, (X)ij, (X):j, (X)i: denote the (i,j)th entry of X, the jth column of X, and the ith row of X, respectively. We consider a graph G = (V, A), where V = n and A ∈ Rn×n is the weighted adjacency matrix. The weighted entry (A)ij represents in most applications a measure of sim- ilarity between vertices i and j. We assume that G is con- nected and undirected, i.e., (A)ij = (A)ji. The degree of a node i ∈ V is di j=1(A)ij. Let D ∈ Rn×n be a diag- onal matrix with entries (D)ii = di. The Laplacian of G is = D − A, and the normalized Laplacian of G is . defined as L defined as L . = D−1/2LD−1/2. We denote the eigendecom- positions of L and L by UΛUT and VΛLVT, respectively. We assume that the eigenvalues, the diagonal entries of Λ and ΛL, are sorted in increasing order. Finally, the volume of a set of vertices S ⊆ V is vol (S) Let f ∈ Rn be a signal over the graph vertices, i.e., (f )i is the signal value at vertex i. The classical Fourier transform can be defined as the transform that diagonalizes the Laplace operator. Similarly, the graph Fourier transform [9] is defined . = VTf, where V diagonalizes the graph Laplacian. The . = inverse graph Fourier transform is then simply defined as f =(cid:80) i∈S di. . as(cid:98)f V(cid:98)f. 2.1. Local spectral graph theory The second eigenvalue of the graph Laplacian L can be viewed as the solution to x min xTLx s.t. xTDx = 1, xTD1 = 0. (3) The optimal solution x∗ is a generalized eigenvector of L with respect to D and provides a map from the graph to the real line. This map encodes a measure of similarity (geodesic dis- tance) between graph vertices. This property is exploited for clustering [10] and hashing [11], for example. In [12] the above problem is modified to incorporate a bias towards a target region (defined by one or more vertices) in the graph. This region is represented as an indicator vector s, normalized such that sTD1 = 0 and sTDs = 1. More precisely, given a set of nodes S ∈ V we define the unit vector s = unit(S) as (unit(S))i b/ vol (S) if i ∈ S; −b/ vol (V (cid:114) S) otherwise, where b = (cid:112)vol (S) vol (V (cid:114) S) / vol (V ). The modified (4) . = (cid:40) The only modification is the addition of the constraint on xTDs. This can be interpreted as imposing to the solution a correlation with s larger than arccos(κ). Intuitively, as the solution to Problem (3) provides a no- tion of geodesic distance between graph nodes, the solution to Problem (5) provides a notion of geodesic distance from the seed set to the rest of the vertices. This link will become clear in the following. Theorem ([12]). Let s ∈ Rn be a seed vector such that sTD1 = 0 and sTDs = 1, and sTDv2 (cid:54)= 0, where v2 is the second generalized eigenvector of L with respect to D. In addition, let x∗ be an optimal solution to Problem (5) with correlation parameter κ ∈ [0, 1]. Then, there exists some γ ∈ (−∞, (Λ)2,2) and some c ∈ [0,∞] such that x∗ = c (L − γD)+ Ds. (6) PageRank [13] assigns a numerical weight to each vertex of a graph, assessing its relative importance within the graph; its personalized variant is frequently used to localize the PageR- ank vector within a subset of the network [8]. The following proposition can be proven using simple algebraic manipula- tions and the definition of L. Proposition. Let c = −γ = 1−α α in Theorem 6. The vector −1 Ds, is the solution to the p, defined as p = c (L − γD) (degree normalized) personalized PageRank (PPR) equation (7) Dp = (1 − α)(Ds) + αAD−1(Dp). Theorem 6 and Equation (7) connect Problem (5) with the personalized PageRank equation [14]. In the field of commu- nity detection, PPR vectors are used to find local communi- ties around seed vertices [e.g., 7, 8, 15], where a small but cohesive "seed set" of vertices is expanded to generate its en- closing community (vertices having a stronger relationship to the seed set than to the rest of the graph). In this context, PPR vectors arise as natural units of observation for localized analysis of graphs. Furthermore, powers of a graph diffusion operator were identified in [6] as natural building blocks to define wavelets on graphs. Notice that the PPR vector is exactly equivalent to the recursive application of the diffusion operator AD−1 [8], which leads naturally to the notion of geodesic distance. Given this evidence, we posit that the PPR vector is a fun- damental tool to perform a localized spectral analysis of graph signals. This connection is the key observation of this work and drives our definition of a short-graph Fourier transform. 2.2. A short-graph Fourier transform problem is given by [12] xTLx s.t. min x xTDx = 1, xTD1 = 0, xTDs ≥ κ. As described in the introduction, we need two elements to define a short-graph Fourier transform: a localization (e.g., classically a translation) and a modulation operators. (5) Definition (Localization). We define the local window at node i as = max (0, x∗ . i ) /(cid:107)max (0, x∗ wi (8) i the solution to Problem (5) with s = unit({i}) and i )(cid:107)1 , where x∗ the maximum is taken entrywise. The window wi is defined in terms of its correlation with unit({i}), yielding to a simple conceptual interpretation. In this work, we solve Problem (5) using Theorem 6. Given the eigendecomposition of the normalized Laplacian, we have L = D1/2UΛUTD1/2. Then, (cid:16) (cid:17) (Λ − γI)+(cid:16) (cid:17)T x∗ = c D−1/2U D−1/2U Ds. (9) Once the eigendecomposition is computed as a preprocess- ing step, this formula delivers an efficient method for obtain- ing x∗, without any iterations nor matrix inversions (albeit the inversion of the diagonal matrix Λ − γI). Interestingly, the spectral localization of x∗ is determined by the product Ds = UTD1/2s, i.e., by the correlation be- Since the eigendecomposition of L is used in Equa- tween s and each element of the graph Fourier basis. (cid:0)D−1/2U(cid:1)T tion (9), we also use it in our graph modulation operator. Definition (Graph modulation). For k ∈ {1, 2, . . . , n}, we define the graph modulation operator Mk : Rn → Rn by =(cid:112)vol (V ) f ◦ (D−1/2U):k, . Mkf (10) where ◦ denotes the entrywise multiplication. M1 is the identity operator, such as T0 is in the classical mod- ulation for temporal signals. Definition. Given the localization and modulation operators, we define the short-graph Fourier transform of a signal f ∈ Rn at vertex i ∈ V and frequency k ∈ {1, 2, . . . , n} as SGFTf (i, k) = (cid:104)f , Mkwi(cid:105). The spectrogram of f is defined as spectrogramf (i, k) = SGFTf (k, i)2. (11) (12) It is not hard to see that Equation (11) reduces to the standard one when the unweighted graph is a Cartesian grid. . = √ lation operator as (cid:102)Mkf Note. Shuman et al. provide a different definition for a short- graph Fourier transform [5]. They define the graph modu- n f ◦ (V):k, where ◦ denotes the entrywise multiplication. They also define a convolution operator as f ∗ g , and a translation operator , where δi as Tif is the impulse function at vertex i. This leads to the (more (cid:16)(cid:98)f ◦(cid:98)g (cid:17) (cid:16)(cid:0)VT(cid:1) (cid:17) :i ◦ (cid:98)f n (f ∗ δi) = . = V n V √ √ . = (a) The linear graph has 200 vertices, where each vertex is connected to its two neighbors (with periodicity in the edges). In the weighted case, the graph weights for all edges are set to one, excepting edges (40, 41) and (159, 160) (marked in red) which have a weight of 10−3. Unweighted Weighted Conv. (τ = 200) PPR (β = 10−4) Conv. (τ = 200) PPR (β = 10−4) (b) We compute localized windows around vertices 45, 50, and 55 (red, blue and green curves, respectively). Note how the convolutional approach [5] fails to properly locate the window in the weighted case, as the window peak does not coincide with the desired vertex. Fig. 1. Window localization comparison. In the unweighted case (in which the graph Fourier and the standard Fourier transforms are equal), con- volutional localization [5] works well; however, when the graph weights present a sharp discontinuity, it fails to provide an accurate result. Contrarily, the proposed PPR approach works well in both cases. classical) definition SGFTf (i, k) = (cid:104)f ,(cid:102)MkTig(cid:105). Defining ((cid:98)g)k = e−τ λk and then invert the graph Fourier transform. an appropriate window (kernel) g is not trivial in the graph space. It is possible to define it in the graph spectral space as In this work we do not aim at producing a better method than the one in [5] (although we will exemplify potential localiza- tion advantages of our definition). The method here proposed is based on radically different principles, which are of interest by themselves for the spectral study of graph signals. 3. EXPERIMENTAL RESULTS We implemented the proposed short-graph Fourier trans- form in Python, using the graph-tool library [16]. We make the code publicly available at https://github. com/marianotepper/sgft. In all examples we set γ = (Λ)1,1 − β, where β takes a particular value in each example. We begin by examining the localization operator (Equa- tion (8)). For this, we use in Fig. 1 a linear graph, where lo- calization can be easily interpreted and visualized. The main observation is that the window is properly localized when us- ing the proposed approach, while this is not always the case with the convolutional approach. In the second example, we present results on a 2D grid graph, see Fig. 2. When this graph is unweighted, the graph Fourier transform amounts to the classical 2D Fourier. In the unweighted and weighted cases, the proposed short-graph Fourier transform is able to clearly identify the two differ- ent signal regions. Naturally, since the weight discontinu- ity matches the boundary between both signal regions, the spectrograms of the weighted graph have better spatial and 0123839404142431571581591601611621971981990501001502000.0000.0050.0100.0150.0200.0250501001502000.0000.0050.0100.0150.0200.0250.0300501001502000.0000.0050.0100.0150.0200.0250.0300.0350.0400.0450501001502000.0000.0050.0100.0150.0200.0250.030 (a) The graph is a 50 × 50 regular grid, where each vertex is connected to its four neighbors (with period- icity in the edges). The input signal is formed by two sinusoidal waveforms, as shown on the side. In the weighted case, the graph weights for the edges con- necting both waveforms are set to 10−5 while for the rest of the edges, they are set to one. Unweighted Weighted Conv. (τ = 5) PPR (β = 10−4) Conv. (τ = 200) PPR (β = 10−4) (a) Graph of weather stations in the US, with color representing the average annual temperature in 2014. The graph was built by connecting each station to its 6 spatial nearest neighbors (the corresponding edge weight is the spatial distance between both stations). (b) Top row: Localized windows at the central vertex of the grid. Cen- ter row: Spectrograms. Bottom row: For each vertex, color represents the index of the frequency with maximum magnitude, from light green (low fre- quencies) to dark green (high frequencies). Fig. 2. All spectrograms coarsely identify the two sections in the input sig- nal with different patterns (in all cases, we use the first 500 eigenvectors only). In the unweighted case, the proposed method works significantly bet- ter than the convolutional approach [5]. In the unweighted and weighted cases, the proposed PPR-based method has better spectral localization, i.e., for each vertex, fewer frequencies are selected. frequency localizations. The proposed PPR-based spectro- gram exhibits better spatial and frequency localizations than the convolutional approach. For our last example, we use a real graph comprised of weather stations distributed throughout the US. The input sig- nal is the average temperature in each station in 2014. The lo- calized PPR windows follow nicely the graph topology, being more isotropic or anisotropic, depending on the local graph topology. The spectrogram obtained with the proposed PPR- based method presents clear patterns, which are coherent with the spatial arrangement of the graph vertices. 4. CONCLUSIONS In this work we presented an extension of the classical short- time Fourier transform (STFT) to signals defined over graphs. We have shown with different examples that this new short- graph Fourier transform can be a valuable tool for extracting information from signals on graphs. (b) Different personalized PageRank windows. (c) Spectrogram obtained with the proposed technique (for better visualization, we only show the first 30 components). (d) For the vertex marked with a red square (and a red arrow), we show the correlation between its spectral signature (its column in the spectrogram) and the signatures of the other vertices. Fig. 3. Clear patterns appear in the spectrogram, where nodes with similar spectral signature are localized in spatially coherent areas (e.g., Florida). We use β = 10−3 and restrict the computations to the first 500 eigenvectors. More broadly, we established the connection between lo- cal spectral graph theory and localized spectral analysis of graph signals. This is the first work that studies the use of per- sonalized PageRank vectors as fundamental building blocks for local spectral analysis of graph signals. The STFT becomes ineffective when the signal includes structures having different time-frequency resolution, some very localized in time and others in frequency. Wavelets ad- dress this issue by changing the time and frequency resolu- tion. Such as diffusion wavelets extended the definition to the graph domain using powers of a graph diffusion operator, we plan on extending the use of personalized PageRank vectors to produce an alternate definition of wavelets on graphs. 010203040010203040050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.0050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.0050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.0050010001500200025000501001502002500.00.10.20.30.40.50.60.70.80.91.015.4928.8242.1555.4868.820500100015002000250005101520250.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0 References [1] J. Allen, "Short term spectral analysis, synthesis, and modification by discrete Fourier transform," EEE Trans. Acoust., vol. 25, no. 3, 1977. [2] M. Vetterli and J. Kovacevi´c, Wavelets and Subband Coding, Prentice Hall, 1995. [3] D. Shuman, S. Narang, P. Frossard, A. Ortega, and P. Vandergheynst, "The emerging field of signal pro- cessing on graphs: Extending high-dimensional data analysis to networks and other irregular domains," IEEE Signal Process. Mag., vol. 30, no. 3, pp. 83 -- 98, 2013. [4] A. Sandryhaila and J. Moura, "Discrete signal process- ing on graphs: Frequency analysis," IEEE Trans. Signal Process., vol. 62, no. 12, pp. 3042 -- 3054, 2014. [5] D. Shuman, B. Ricaud, and P. Vandergheynst, "A win- dowed graph Fourier transform," in SSP, 2012. [6] R. Coifman and M. Maggioni, "Diffusion wavelets," Appl. Comput. Harmon. Anal., vol. 21, no. 1, pp. 53 -- 94, 2006. [7] R. Andersen and K. Lang, "Communities from seed sets," in WWW, 2006. [8] R. Andersen, F. Chung, and K. Lang, "Local graph par- titioning using PageRank vectors," in FOCS, 2006. [9] F. Chung, Spectral Graph Theory, vol. 92, American Mathematical Soc., 1997. [10] J. Shi and J. Malik, "Normalized cuts and image seg- mentation," IEEE Trans. Pattern Anal. Mach. Intell., vol. 22, no. 8, pp. 888 -- 905, 2000. [11] Y. Weiss, A. Torralba, and R. Fergus, "Spectral hash- ing," NIPS, 2008. [12] M. Mahoney, L. Orecchia, and N. Vishnoi, "A local spectral method for graphs: With applications to im- proving graph partitions and exploring data graphs lo- cally," J. Mach. Learn. Res., vol. 13, no. 1, pp. 2339 -- 2365, 2012. [13] L. Page, S. Brin, R. Motwani, and T. Winograd, "The PageRank citation ranking: Bringing order to the web.," Tech. Rep. 1999-66, Stanford InfoLab, 1999. [14] G. Jeh and J. Widom, search," in WWW, 2003. "Scaling personalized web [15] K. Kloster and D. Gleich, "Personalized PageRank so- lution paths," arXiv:1503.00322, 2015. [16] T. Peixoto, "The graph-tool Python library," figshare, 2014.
1912.08931
1
1912
2019-11-10T13:07:46
Impact of Traffic Conditions and Carpool Lane Availability on Peer to Peer Ridesharing Demand
[ "cs.SI" ]
A peer to peer ridesharing system connects drivers who are using their personal vehicles to conduct their daily activities with passengers who are looking for rides. A well-designed and properly implemented ridesharing system can bring about social benefits, such as alleviating congestion and its adverse environmental impacts, as well as personal benefits in terms of shorter travel times and or financial savings for the individuals involved. In this paper, the goal is to study the impact of availability of carpool lanes and traffic conditions on ridesharing demand using an agent based simulation model. Agents will be given the option to use their personal vehicles, or participate in a ridesharing system. An exact many to many ride matching algorithm, where each driver can pick up and drop off multiple passengers and each passenger can complete his or her trip by transferring between multiple vehicle, is used to match drivers with passengers. The proposed approach is implemented in AnyLogic ABS software with a real travel data set of Los Angeles, California. The results of this research will shed light on the types of urban settings that will be more recipient towards ridesharing services.
cs.SI
cs
Proceedings of the 2016 Industrial and Systems Engineering Research Conference H. Yang, Z. Kong, and MD Sarder, eds. Impact of Traffic Conditions and Carpool Lane Availability on Peer-to-Peer Ridesharing Demand Sara Masoud and Young-Jun Son Department of Systems and Industrial Engineering University of Arizona Tucson, AZ, USA Neda Masoud and Jay Jayakrishnan Civil and Environmental Engineering University of California Irvine Irvine, CA, USA Abstract A peer-to-peer ridesharing system connects drivers who are using their personal vehicles to conduct their daily activities with passengers who are looking for rides. A well-designed and properly implemented ridesharing system can bring about social benefits, such as alleviating congestion and its adverse environmental impacts, as well as personal benefits in terms of shorter travel times and/or financial savings for the individuals involved. In this paper, the goal is to study the impact of availability of carpool lanes and traffic conditions on ridesharing demand using an agent-based simulation model. Agents will be given the option to use their personal vehicles, or participate in a ridesharing system. An exact many-to-many ride-matching algorithm, where each driver can pick-up and drop-off multiple passengers and each passenger can complete his/her trip by transferring between multiple vehicle, is used to match drivers with passengers. The proposed approach is implemented in AnyLogic® ABS software with a real travel data set of Los Angeles, California. The results of this research will shed light on the types of urban settings that will be more recipient towards ridesharing services. Keywords Peer-to-peer ridesharing, Ride-matching algorithm, Agent-Based Simulation (ABS) 1. Introduction Traffic congestion is a major problem in urban areas, which may easily lead to major economic loss every year [1]. In the U.S., the increasing population growth of urban areas has led to rise of demands for highway travels, which in return has strained the transportation infrastructure. Travel demands and physical highway features along with traffic influenced events are identified as three major causes of traffic congestion by the Federal Highway Administration [2]. The 2015 Urban Mobility Scorecard report [3] reveals that traffic congestion in 2014 in the U.S. caused a total delay of 6.9 billion hours and a waste of 3.1 billion gallons in fuel, which led to total loss of $160 billion 2014 dollars. In addition to the waste of fuel, the additional green gas emission of congestion contributes to climate change. American Highway User Alliance has identified the top 30 highway bottlenecks in the U.S. [4]. 10 of these bottlenecks which are responsible for about 91 million hours of delay every year are located in the Los Angeles County, and have led to a queue length range of one to seven miles [4]. Various approaches have been implemented in the past to eliminate or to mitigate traffic congestion. One of the common approaches is expanding the infrastructure by adding new lanes to existing highways or even building new roads, which is costly. Texas A&M Transportation Institute showed that adding new lanes to an existing highway may cost about 2 to 10 million dollars per lane-mile, and the construction cost of a new highway is in range of 5 to 20 million dollars per lane-mile [5]. The disadvantage of this approach is that not only is it expensive, but also extension of most major highways will induce higher levels of demand for the improved roads, not alleviating the congestion, and even encouraging people to have additional trips, which eventually lead to a potential growth in Masoud, Masoud, Son, and Jayakrishnan traffic demand [6]. To find the optimal location for the new road segments, network design policy is usually utilized in a discrete form to define the additional road segments with respect to budget restriction to minimize the total travelling cost of the network. Similarly, to find the potential road segments for additional lane, network design is applied in a continuous form to achieve the optimal capacity expansion of the highway network [7]. On the other hand, instead of expanding the existing infrastructure, congestion management can be done by utilizing the unused capacity of the currently existing highway. To this end, one of the popular approaches in this area which has been employed for decades is toll pricing. Due to the improvement of the technology and implementation of the intelligent transportation systems in the transportation network, the emergence of the real-time traffic data has led to appearance of new concepts such as Dynamic toll pricing for a better control over traffic flow [8]. The only drawback of this approach is its limitation to tollways and toll lanes [9]. Public transit (e.g., bus) is another approach that can successfully reduce the vehicle miles travelled by carrying a high number of passengers by one vehicle. The disadvantage of this approach is the lack of flexibility due to fixed schedules and routes. Complementary to public transit, other services such as para-transit (e.g., shuttles) or taxies are defined based on a similar concept to reduce to vehicle miles travelled. However, Para-transit systems are limited due to the fact that they are usually dependent on the federal funding [10]. In addition, taxis usually contributes to traffic congestion in large cities [11]. Although many of the mentioned alternatives have been employed to manage traffic congestion, none of them has been effective enough to eliminate or alleviate the traffic congestion. This motivates the researchers to look for better alternatives such as shared-use mobility [12]. In the past few years, ridesharing has evolved from an idea into a reality. Ridesharing is the sharing of the vehicles by passengers who have similar routes to reduce the vehicle miles travelled and traffic congestion. The trip can be managed by one of the passengers, which is known as informal ridesharing (e.g., the carpooling for school or work by parents or collages) or it can be monitored by an external transportation network company (e.g., Uber or Lyft) to maximize the profit for both the company and the driver. As a result, the latter case can lead to additional traffic congestion like the case of taxis instead of solving the problem. In this paper, we consider alleviating traffic congestion and its adverse impacts, by using a peer-to-peer ridesharing system. In this system, drivers try to share their vehicle by other passengers who have similar routes while doing their daily activities. In addition, we will study the impact of availability of carpool lanes, and traffic conditions on ridesharing demand. To this end, a methodology that consists of agent-based simulation and a matching algorithm is introduced in Section 2. The experiment is discussed in Section 3. And, Section 4 provides the conclusions of the research works. 2. Methodology The core of each ridesharing system is the ride-matching algorithm which can be considered as a general case of dial-a-ride problem [13]. In a practical dial-a-ride problem, several users request a door to door transportation service from a specific agency. Users can specify a time window for them to be picked up at the origin or be dropped off at the destination, or both. Agencies usually provide multiple vehicles to serve their customers. Each vehicle can handle multiple trip request in an each mission. Although an agency can minimize its operational costs by increasing the occupancy of its fleet, such savings come at the cost of low quality of service for users (due to longer trips) and may impact demand in the future. Drivers in a dial-a-ride system are employed by the company. In addition, it is assumed that all vehicles are available throughout the day. These two properties of a dial-a-ride system is what differentiates it from a peer-to-peer ridesharing system. In a ridesharing system, drivers are available only for a short period of time and within a certain time window due to their daily schedules, and each has a specific origin and destination of their own. The limited availability of drivers in a peer-to-peer ridesharing problem make it really hard to achieve high matching rates in such systems [14]. To this end, Masoud and Jayakrishnan [10] have proposed an advanced ride-matching algorithm that can increase the efficiency of a ridesharing system by maximizing the number of successful driver- rider matches. Although the main difference between a dial-a-ride and a peer-to-peer ridesharing system is the fact that in the latter there is no pre-deterministic set of resources (i.e., vehicles), Masoud and Jayakrishnan showed that following and revising a basic dial-a-ride model may not be the most effective way to model a peer-to-peer ridesharing system [10]. They proposed a peer-to-peer ride-matching algorithm that can provide multi-hop routes for Masoud, Masoud, Son, and Jayakrishnan riders by optimally routing drivers in real-time. One of the properties of this algorithm is that it allows for using time-dependent travel times. This property becomes increasingly important in this paper, since the objective of this study is to measure the impact of carpool lanes on the percentage of successful matches, and in this context the attractiveness of carpooling is mainly in lower travel times. In this study, in order to take advantage of this property of the proposed system, we use agent-based simulation to incorporate realistic traffic conditions and travel times. Here, the simulation model maintains the traffic equilibrium under different conditions and will call the matching algorithm whenever a potential rider enters the system. We assume that real-time travel times at both ordinary and carpool lanes are available to all the drivers at all times. Additionally, the model considers the network elements that may affect the interaction of vehicles such as the network topology, and speed limits. More details about the simulation model and algorithms are provided in the following sections. 2.1. Agent-Based Simulation Model The agent-based model in this study provides a realistic environment, which allows for evaluating the efficiency of peer-to-peer ridesharing system. Although a ride-matching algorithm plays an important role in the effectiveness of the system, the successful implementation of a ridesharing system also depends on other elements, such as traffic conditions. The model has been constructed in AnyLogic® by utilizing the car following and lane changing libraries that are provided by the software [15]. In this model, three types of agents are defined. An agent can be a regular driver who is not participating in the peer-to-peer ridesharing experiment, a rider who is looking to employ a driver who can match his requirements, or a driver who volunteers to share his vehicle by other riders as long as he can follow his personal schedule. A rider can turn to a regular driver if he/she is not matched with any other driver in the ridesharing system. In this model, the regular drivers have their own individual behaviour and goal which is minimizing the total travelling cost. Their behaviour is modelled by Dijkstra's algorithm [16]. Each time a regular driver arrives to a decision making point (e.g., a highway junction), the driver will get the up-to-date traffic data of the network and by utilizing the Dijkstra's algorithm updates his/her route plan to his/her final destination. The following equation represents the traveling cost for each driver. 𝑐𝑖𝑗(𝑡) = 𝑤1(𝑇𝑖𝑗(𝑡)) + 𝑤2𝑠(𝑓𝑖𝑗(𝑡)) (1) This equation shows that the travelling cost for each link at any moment in time (𝐶𝑖𝑗(𝑡)) depends on average travelling time of the link (i.e., s(fij(t))) and also the potential toll price of the link (i.e. Tij(t)) if the user decides to utilize a toll road. We denote the average travelling time as s(fij(t)) to emphasize that the traveling time depends on the traffic flow (i.e., fij(t)) of the link. This value is directly obtained from the simulation model. W1 and W2 are the coefficients to normalize the effect of toll price and average travelling time on the travelling cost. Table 1: Validation of the simulation model Link ID Traffic Flow Distribution Real Data Simulation 0 1 2 3 0.056 0.231 0.460 0.253 Average 0.054 0.227 0.464 0.254 Error 0.002 0.004 0.005 0.001 0.003 Table 1 compares the traffic distribution of the real data shown in Table 2 and the distribution provided by the simulation model. The last column, which shows the errors (i.e., absolute difference) between the real and simulated traffic flows, has an average of 0.003. Utilizing the data in Table 1 for a chi-squared test at 0.05 level of significance reveals that the null hypothesis (i.e., H0: The agent-based simulation data follow the real traffic flow distribution) cannot be rejected, and the simulated traffic flows can be considered as a realistic representation of the traffic flows of the area under study. Masoud, Masoud, Son, and Jayakrishnan On the other hand, the main goal for the riders and drivers who participate in the ridesharing system is to minimize the travelling time while utilizing others' vehicles and maximizing the profit by sharing their vehicle by other riders, respectively. To model their behaviours, the matching algorithm would be utilized each time a rider enters the system. The next section provides details about the matching algorithm. 2.2. Matching Algorithm In this work, a simulation model is used to incorporate the dynamic behaviour of traffic flow. As a result, a dynamic algorithm is needed, where users are allowed to register in the system when they are ready to travel. The ride- matching algorithm proposed by [10] is adopted in this work. The ride-matching algorithm not only creates a best set of driver-riders match in real-time, but also guarantees the optimal route plans for the participants. The steps used by the algorithm to find the optimal solution is depicted in Figure 1. Figure 1: Logical steps in the matching algorithm The algorithm consists of three main steps. In the first step, by using Spatio-Temporal Ellipsoid Method (STEM), a time-expanded network for each individual rider is generated, which is used to find the optimal route plan for the mentioned rider. To do so, the links whose starting and/or ending nodes are not reachable by the drivers in the original network are removed. In the remaining network, STEM finds time interval during which nodes are available based on the travel time window of the rider. Then, considering the rider's time intervals, STEM defines the feasible network for the rider. The second step in the algorithm, as it is denoted in Figure 1, is pre-processing. Here, all the nodes that are not descendants of the origin and predecessors of the destination nodes are removed using an iterative process. Then, this revised network is topologically sorted. Finally, a depth fist search is employed to ensure that there exists at least one feasible route plan for the rider. If so, a dynamic programming algorithm is used to search the graph for the optimum route plan. The optimum route for each rider who enters the node j on driver 𝑑's vehicle is the one which satisfies the following Bellman equation: 𝑉(𝑛𝑗, 𝑑) = 𝑚𝑖𝑛 𝑛𝑖: (𝑛𝑖, 𝑑) ∈ 𝐷𝑁𝑗 { 𝑑′ ∈ 𝐷𝑖 𝑚𝑖𝑛 𝑖𝑛\𝐸𝐷(𝑛𝑖, 𝑑′) {𝑉(𝑛𝑗, 𝑑′) + 𝐶(𝑛𝑖, 𝑛𝑗)}} (2) In Equation (2), V(nj ,d) is the optimum cost of the optimal route from node 1 to node j. DNj is the set of all nodes 𝑖 in is the set that contains all the drivers who enter node i. ED(ni , d') engering node 𝑗 with 𝑑 as the driver.. Di contains the list of optimal drivers on the optimal route to ni, excluding the drivers in the last link to ensure the feasibility of the solution. C(ni , nj) is the cost of traveling of the link connecting the two adjacent nodes ni and nj. This cost is given by the simulation model if there is travelling between physically different nodes on the revised feasible time-expanded network, and can be equal to a penalty P, if the movement is only temporal. After running the matching algorithm, each driver knows where to pick up his/her assigned riders and where to drop them off. In addition, each rider will know if he/she can utilize the ridesharing service, and if so, when he will be picked up in a few seconds. 3. Experiments and Results As mentioned in Section 1, the main goal of this study is to understand the effect of carpool lanes and traffic conditions on a dynamic peer-to-peer ridesharing system. To this end, we used a data set of Los Angeles County in Los Angeles, California, to construct a simulation model. The constructed simulation model is then used to conduct experiments to study the impacts of traffic conditions and carpool lanes. As mentioned previously, Los Angeles hosts eleven of the top thirty bottlenecks of the U.S. and out of these eleven bottlenecks, ten of them are in Los Masoud, Masoud, Son, and Jayakrishnan Angeles County [4]. Figure 2 and Table 2 depict the part of the Los Angeles County that was modeled in AnyLogic® software. Table 2: Topology of the testbed (i.e., part of Los Angeles County, California, 2014) ID 0 1 2 3 Link Starting Node Ending Node Length (mile) Free Flow Travel Carpool Traffic Flow Time (hour) Lane (car / 24 hours) 0 0 1 1 Total 3 1 2 3 36.0 14.3 33.1 41.7 125.1 0.55 0.22 0.50 0.64 1.91 No No Yes No NA 12,948 53,319 106,058 58,343 230,668 As shown in Table 2, each link is defined by a unique ID. For each link (i.e., each row of the table), we gathered various data such as the length, the free flow travel time, the existence of a carpool lane, and the traffic flow of each link [17]. These pieces of information were used to validate the simulation model as well. Figure 2: Highway topology of the testbed Figure 2 depicts the topology of the network of our testbed which consist of four links. Out of these four links, only one of them (i.e., link 2 in blue) has a carpool lane and the other three green links do not have any carpool lanes. We considered six different Origin-Destination (O-D) pairs in this study, and all of them are shown in Figure 2. In this work, we conducted four different experiments to study the impact of carpool lanes and traffic flow on ridesharing. Table 3 provides the settings of each experiment as well as the results. Table 3: Experiments and results Experiment Unused Capacity of ID carpool lane Participants Rider Driver Regular driver Successful Match rate 1 2 3 4 100% 75% 50% 25% 10% 10% 10% 10% 40% 40% 40% 40% 50% 50% 50% 50% 60% 60% 50% 45% In the conducted experiments, the behavior and preference of the riders (e.g., the earliest arrival, latest arrival, earliest departure and latest departure), and the percentage of participants were fixed. In each experiment, different amount of the capacity of the carpool lane (i.e., column two) was used. The minimal percentage of unused capacity of carpool lane was 25%, because this percentage leads to an equivalent traffic flow in the carpool lane and other lanes. Table 3 shows that remaining capacity of carpool lane and the success rate in matching of the riders and drivers in a peer-to-peer ridesharing system has a direct relationship. It means that the lower traffic flow in the carpool lane leads to a higher rate in successfully matching the riders and drivers, which will reduce the traffic flow. In addition, it is important to note that other elements such as the time windows that the riders define or the topology Masoud, Masoud, Son, and Jayakrishnan of the system have significant impacts on the results. Smaller time windows make the matching harder. If the time intervals that the rider defines are smaller than a threshold the matching will be infeasible. The mentioned threshold dynamically dependent on the traffic flow of the related routes. The first experiment revealed that even with a practically empty carpool lane, only 60% of the riders could find a matching driver. On the other hand, the last experiment revealed that with a zero capacity carpool lane, still 45% of the riders can find their matching drivers in the system. 4. Conclusion In this study, we proposed a simulation based approach involving a peer-to-peer ridesharing algorithm to study the impact of traffic conditions and carpool lane on the peer-to-peer ridesharing demand. This study was conducted based on a data set of Los Angeles County. An agent-based simulation was employed to present a realistic traffic setting by considering the impacts of the topology of the network and dynamic behavior of vehicles (e.g., car following and lane changing). Using the constructed simulation, four experiments were conducted to study the impacts of carpool lane and traffic conditions. The experimental results revealed a positive relation between carpool lane and a peer-to-peer ridesharing system. Reference 1. Cici B., Markopoulou A., Frías-Martínez E., Laoutaris N., 2013, "Quantifying the Potential of Ride-sharing Using Call Description Records," Proc. of the 14th Workshop on Mobile Computing Systems and Applications, Feb 26 , New York, New York. 2. Federal Highway Administration (FHWA), "Congestion Report", available at http://www.ops.fhwa.dot. gov/ congestion_report/ chapter2.htm, accessed on January 28, 2016. 3. Schrank D., Eisele B., Lomax T., Bak J., 2015, "2015 Urban Mobility Scorecard" 4. American Highway User Alliance, 2015, "Unclogging America's Arteries 2015," available at on http://www.highways.org/wp-content/uploads/2015/11/unclogging-study2015-hi-res.pdf, January 25, 2016. accessed 5. Texas A&M, mobility investment priority, available at http://mobility.tamu.edu/mip/strategies.php, accessed on Jan. 28. 6. Duranton G., and Matthew A. T., 2011, "The Fundamental Law of Road Congestion: Evidence from US Cities," The American Economic Review, 2616-2652. 7. Yang H.H., Bell M.G., 1998, "Models and Algorithms for Road Network Design: A Review and Some New Developments," Transport Reviews,18(3), 257-78. 8. Phan T, Annaswamy A, Yanakiev D, Tseng E, 2016, "A Model-based Dynamic Toll Pricing Strategy for Controlling Highway Traffic," Submitted to the 2016 IEEE American Control Conference, July 6-8, Boston, Massachusetts. 9. Masoud s., Kim S., Son Y., 2015, "Integrated Dual Toll Pricing with Network Design for Hazardous Material Transportation," In Proc. of Industrial and Systems Engineering Research Conference (ISERC), Nashville, Tennessee. 10. Masoud N., Jayakrishnan R., 2015, "A Real-Time Algorithm to Solve the Peer-to-Peer Ride-Matching Problem in a Flexible Ridesharing System," working paper. 11. Yang T., Yang H., Wong S.C., 2014, "Taxi services with search frictions and congestion externalities," Journal of Advanced Transportation, 48(6), 575-587. 12. Shaheen S.A., Chan N.D., 2015, "Evolution of E-Mobility in Carsharing Business Models," InElectric Vehicle Business Models, 169-178. 13. Costa D.L., Cabral L.A., Siebra C.A., 2012, "Metaheuristic iterated local search and variable neighborhood search for the dial-a-ride problem," InGlobal Optim Workshop, 61-64. 14. Masoud N., Jayakrishnan R., 2015, "A decomposition Algorithm to solve the multi-hop peer-to-peer ride- matching problem," In Proc. of Transportation Research Board 94th Annual Meeting, Washington D.C. 15. AnyLogic. AnyLogic help, XJ Technologies Company Ltd., available at http://www.anylogic.com/ anylogic/help. accessed January 24, 2016. 16. Dijkstra, E.W., 1959, "A note on Two Problems in Connexion with Graphs," Numerische Mathematik, 269-271. 17. California Department of Transpiration (DOT), "2014 Traffic Volumes on California State Highways," available at http://traffic-counts.dot.ca.gov/docs/2014_aadt_volumes.pdf, accessed January 24, 2016.
1703.08590
2
1703
2017-08-27T13:26:52
Efficiently Clustering Very Large Attributed Graphs
[ "cs.SI", "cs.DM", "physics.soc-ph" ]
Attributed graphs model real networks by enriching their nodes with attributes accounting for properties. Several techniques have been proposed for partitioning these graphs into clusters that are homogeneous with respect to both semantic attributes and to the structure of the graph. However, time and space complexities of state of the art algorithms limit their scalability to medium-sized graphs. We propose SToC (for Semantic-Topological Clustering), a fast and scalable algorithm for partitioning large attributed graphs. The approach is robust, being compatible both with categorical and with quantitative attributes, and it is tailorable, allowing the user to weight the semantic and topological components. Further, the approach does not require the user to guess in advance the number of clusters. SToC relies on well known approximation techniques such as bottom-k sketches, traditional graph-theoretic concepts, and a new perspective on the composition of heterogeneous distance measures. Experimental results demonstrate its ability to efficiently compute high-quality partitions of large scale attributed graphs.
cs.SI
cs
Efficiently Clustering Very Large Attributed Graphs Alessandro Baroni University of Pisa, Italy [email protected] Alessio Conte University of Pisa, Italy [email protected] 7 1 0 2 g u A 7 2 ] I S . s c [ 2 v 0 9 5 8 0 . 3 0 7 1 : v i X r a Abstract-Attributed graphs model real networks by enriching their nodes with attributes accounting for properties. Several techniques have been proposed for partitioning these graphs into clusters that are homo- geneous with respect to both semantic attributes and to the structure of the graph. However, time and space complexities of state of the art algorithms limit their scalability to medium-sized graphs. We propose SToC (for Semantic-Topological Clustering), a fast and scal- able algorithm for partitioning large attributed graphs. The approach is robust, being compatible both with categorical and with quantitative attributes, and it is tailorable, allowing the user to weight the semantic and topological components. Further, the approach does not require the user to guess in advance the number of clusters. SToC relies on well known approxima- tion techniques such as bottom-k sketches, traditional graph-theoretic concepts, and a new perspective on the composition of heterogeneous distance measures. Experimental results demonstrate its ability to effi- ciently compute high-quality partitions of large scale attributed graphs. I. Introduction Several approaches in the literature aim at partition- ing a graph into communities that share some sets of properties (see [14] for a survey). Most criteria for defin- ing communities in networks are based on topology and focus on specific features of the network structure, such as the presence of dense subgraphs or other edge-driven characteristics. However, real world graphs such as the World Wide Web and Social Networks are more than just their topology. A formal representation that is gaining popularity for describing such networks is the attributed graph [6], [16], [19], [38]. An attributed graph is a graph where each node is assigned values on a specified set of attributes. Attribute domains may be either categorical (e.g., sex) or quan- titative (e.g., age). Clustering attributed graphs consists in partitioning them into disjoint communities of nodes that are both well connected and similar with respect to their attributes. State of the art algorithms for clustering attributed graphs have several limitations [38]: they are too slow to be compatible with big-data scenarios, both in terms of asymptotic time complexity and in terms of running times; they use data-structures that need to be completely rebuilt if the input graph changes; This work has been published in ASONAM 2017 [3]. This version includes an appendix with validation of our attribute model and distance function, omitted in [3] for lack of space. Please refer to the published version. Maurizio Patrignani Roma Tre University, Italy [email protected] Salvatore Ruggieri University of Pisa and ISTI-CNR, Italy [email protected] and they ask the user to specify the number of clusters to be produced. Moreover, they only work with categorical attributes, forcing the user to discretize the domains of quantitative attributes, leading to a loss of information in distance measures. We offer a new perspective on the composition of het- erogeneous distance measures. Based on this, we present a distance-based clustering algorithm for attributed graphs that allows the user to tune the relative importance of the semantic and structural information of the input data and only requires to specify as input qualitative parameters of the desired partition rather than quantitative ones (such as the number of clusters). This approach is so effective that can be used to directly produce a set of similar nodes that form a community with a specified input node without hav- ing to cluster the whole graph first. We rely on state-of-the- art approximation techniques, such as bottom-k sketches for approximating similarity between sets [10] and the Hoeffding bound (see [15]) to maintain high performance while keeping the precision under control. Regarding ef- ficiency, our approach has an expected time complexity of O(m log n), where n and m are the number of nodes and edges in the graph, respectively. This performance is achieved via the adoption of a distance function that can be efficiently computed in sublinear time. Experimental results demonstrate the ability of our algorithm to produce high-quality partitions of large attributed graphs. The paper is structured as follows. Section II describes related work. Section III summarizes our contributions. Section IV formally states the addressed problem. Sec- tion V introduces the notion of distance, essential for clus- ter definition. The algorithm and its data structures are described in Section VI. Section VII describes the tuning phase which selects suitable parameter values for the input graph according to the user's needs. The results of our experimentation are discussed in Section VIII. Finally, Appendix A and B contain a validation of our attribute model and combined distance function. II. Related work Graph clustering, also known as community discovery, is an active research area (see e.g., the survey [14]). While the overwhelming majority of the approaches assign nodes to clusters based on topological information only, recent works address the problem of clustering graphs with semantic information attached to nodes or edges (in this paper, we restrict to node-attributed graphs). In fact, topological-only or semantic-only clustering approaches are not as effective as approaches that exploit both sources of information [17]. A survey of the area [6] categorizes the following classes for node-attributed graphs (here we recall only key references and uncovered recent papers). Reduction-based approaches translate the semantic infor- mation into the structure of the graph (for example adding weights to its edges) or vice versa (for example encoding topological information into new attributes), then perform a traditional clustering on the obtained data. They are efficient, but the quality of the clustering is poor. Walk- based algorithms augment the graph with dummy nodes representing categorical only attribute values and estimate node distance through a neighborhood random walk [38]. The more attributes two nodes shares the more paths connect them the more the nodes are considered close. A traditional clustering algorithm based on these distances produces the output. Model-based approaches statistically infer a model of the clustered attributed graphs, assuming they are generated accordingly to some parametric dis- tribution. The BAGC algorithm [35] adopts a Bayesian approach to infer the parameters that best fit the input graph, but requires the number of clusters to be known in advance and does not handle quantitative attributes. The approach has been recently generalized to weighted attributed graphs in [36]. The resulting GBAGC algo- rithm is the best performing of the state-of-the-art (in Section VIII we will mainly compare to this work). A further model-based algorithm is CESNA [37], which addresses the different problem of discovering overlapping communities. Projection-based approaches focus on the reduction of the attribute set, omitting attributes are irrelevant for some clusters. A recent work along this line is [30]. Finally, there are some approaches devoted to variants of attributed graph clustering, such as: I-Louvain [12], which extends topological clustering to maximize both modularity and a newly introduced measure called 'inertia'; PICS [1], which addresses a form of co-clustering for attributed graphs by using a matrix compression- approach; FocusCO [28] and CGMA [8], which start from user-preferred clusters; M-CRAG [20], which gen- erates multiple non-redundant clustering for exploratory analysis; CAMIR [27], which considers multi-graphs. Overall, state-of-the-art approaches to partition at- tributed graphs are affected by several limitations, the first of which is efficiency. Although, the algorithm in [38] does not provide exact bounds, our analysis assessed an Ω(n2) time and space complexity, which restricts its usability to networks with thousands of nodes. The algorithm in [36] aims at overcoming these performance issues, and does actually run faster in practice. However, as we show in Section VIII, its time and space performances heavily rely on assuming a small number of clusters. Second, similarity between elements is usually defined with exact matches on categorical attributes, so that similarity among quantita- tive attributes is not preserved. Further, data-structures are not maintainable, so that after a change in the input graph they will have to be fully recomputed. Finally, most of the approaches require as input the number of clusters that have to be generated [22], [33], [38], [36]. In many applications it is unclear how to choose this value or how to evaluate the correctness of the choice, so that the user is often forced to repeatedly launching the algorithm with tentative values. III. Contributions We propose an approach to partition attributed graphs that aims at overcoming the limitations of the state of the art discussed in Section II. Namely: (i) We propose a flex- ible concept of distance that can be efficiently computed and that is both tailorable (allowing the user to tune the relative importance of the semantic and structural infor- mation) and robust (accounting for both categorical and quantitative attributes). Further, our structures can be maintained when entities are added or removed without re- indexing the whole dataset. (ii) We present the SToC algo- rithm to compute non-overlapping communities. SToC al- lows for a declarative specification of the desired clustering, i.e., the user has to provide the sensitivity with which two nodes are considered close rather than forecast the number of clusters in the output. (iii) We describe an experimental comparison with state-of-the-art approaches showing that SToC uses less time/space resources and produces better quality partitions. In particular, in addition to good qual- ity metrics for the obtained clusters, we observe that SToC tends to generate clusters of homogeneous size, while most partitioning algorithms tend to produce a giant cluster and some smaller ones. IV. Problem statement Intuitively, attributed graphs are an extension of the structural notion of graphs to include attribute values for every node. Formally, an attributed graph G(V, E, F) consists of a set V = {v1, . . . , vn} of nodes, a set E = {e1, . . . , em} ⊆ V × V of edges, and a set of mappings F = {f1, . . . , fA} such that, for i ∈ [1..A], fi : V → dom(ai) assigns to a node v the value fi(v) of attribute ai, where dom(ai) is the domain of attribute ai. Notice that the definition is stated for directed graphs, but it readily applies to undirected ones as well. A distance function d : V × V → R≥0 quantifies the dissimilarity between two nodes through a non-negative real value, where d(v1, v2) = d(v2, v1), and d(v1, v2) = 0 iff v1 = v2. Given a threshold τ, the ball centered at node v, denoted Bd(v, τ), consists of all nodes at distance at most τ: Bd(v, τ) = {v0 ∈ V d(v, v0) ≤ τ}. We distinguish between topological distances, that are only based on structural properties of the graph G(V, E), semantic distances, that are only based on node attribute values F, and multi- objective distances, that are based on both [25]. Using on distance functions, a cluster can be defined by considering nodes that are within a maximum distance τ from a given node. Namely, for a distance function d() and a threshold τ, a τ-close cluster C is a subset of the nodes in V such that there exists a node v ∈ C such that for all v0 ∈ C, d(v, v0) ≤ τ. The node v is called a centroid. Observe that C ⊆ Bd(v, τ) is required but the inclusion may be strict. In fact, a node v0 ∈ Bd(v, τ) could belong to another τ-close cluster C0 due to a lower distance from the centroid of C0. A τ-close clustering of an attributed graph is a parti- tion of its nodes into τ-close clusters C1, . . . , Ck. Notice that this definition requires that clusters are disjoint, i.e., non-overlapping. 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0 0.0 y v2 v0 v1 v5 v7 v3 v4 v6 x ID sex 0 1 2 3 4 5 6 7 1 1 1 0 0 0 0 1 x 0 0 0.1 0.2 0.4 0.55 0.6 0.7 y 0.1 0 0.1 0 0 0.1 0 0.09 dS(v0, vi) 0 0.00471 0.0066 0.3427 0.3521 0.3596 0.3616 0.3327 dT (v0, vi) 0 0.4 0.25 0.6 0.86 1 1 0.86 Fig. 1. A sample attributed graph. Attributes include: sex (categorical) and spatial coordinate x, y (quantitative). Edges are colored by topological distance between the connected nodes. Topological distance dT () considers 1-neighborhoods. V. A multi-objective distance In this section we introduce a multi-objective distance function that will be computable in sublinear time (Sec- tion VI-A) and that allows for tuning the semantic and topological components (Section VII). Regarding semantic distance, we assume that attributes can be either categor- ical or quantitative. For clarity, we assume that attributes 1, . . . , Q are quantitative, and attributes Q + 1, . . . , A are categorical. Thus, the attribute values (f1(v), . . . , fA(v)) of a node v, boil down to a relational tuple, which we denote by tv. Semantic distance dS() can then be defined as: dS(v1, v2) = f(tv1 , tv2) (1) where f() is any distance function over relational tuples (see e.g., [21]). In our implementation and in experiments, we first normalize quantitative attributes in the [0, 1] interval using min-max normalization [26]. Then, we adopt the following distance: qPQ i=1 ((fi(v1) − fi(v2))2 ·pQ +PA i=Q+1 J(fi(v1), fi(v2)) A ds(v1, v2) = (2) Quantitative attributes are compared using Euclidean distance, and categorical attributes are compared using Jaccard distance (J(X, Y ) = 1 − X∩Y X∪Y ). The scaling factor Q balances the contribution of every quantitative attribute in the range [0, 1]. The overall distance function ranges in [0, 1]. √ Regarding topological distance, we assume it is defined as a distance of the node neighborhoods. Let us recall the notion of l-neighborhood from [19]: the l-neighborhood Nl(v) of v is the set of nodes reachable from v with a path of length at most l. N(v) is a shorthand for N1(v), namely the nodes linked by v. Topological distance dT () can then be defined as: dT (v1, v2) = g(Nl(v1), Nl(v2)) (3) where g() is any distance function over sets of nodes, e.g., Dice, Jaccard, Tanimoto [25]. In particular, we adopt the Jaccard distance. Fig. 1 shows an example on dis- tances. Fix node v0, and consider distances (semantic and topological) between v0 and the other nodes in the graph. For topological distance (with l = 1), e.g., we have dT (v0, v2) = J({v0, v1, v2, v7},{v0, v1, v2}) = 1 − {v0,v1,v2} {v0,v1,v2,v7} = 0.25. Thus, v0 is closer to v2 than to v1, since dT (v0, v1) = 0.4. For semantic distance (Equ. 2), instead, it turns out that v0 is closer to v1 than to v2. In fact, all three of them have the same sex attribute, but v1 is spatially closer to v0 than to v2. dST (v1, v2) = h(dS(v1, v2), dT (v1, v2)) Finally, semantic and topological distance can be com- bined into a multi-objective distance dST () as follows [6]: (4) where h : R≥0 × R≥0 → R≥0 is such that h(x, y) = 0 iff x = y = 0. This and the assumptions that dS() and dT () are distances imply that dST () is a distance. [11], [32], [38] set h(x, y) = x + y as the sum of semantic and topological distances. If x (cid:29) y then h(x, y) ≈ x, so the largest distance if x ≈ y then h(x, y) ≈ 2x, weights more. However, which doubles the contribution of the equal semantic and topological distances. In this paper, we consider instead h(x, y) = max(x, y). If x (cid:29) y then h(x, y) ≈ x ≈ y, as before. However, when x ≈ y then h(x, y) ≈ x, which agrees with the distance of each component. VI. The SToC Algorithm For a given distance threshold τ, SToC iteratively extracts τ-close clusters from the attributed graph starting from random seeds. This is a common approach in many clustering algorithms [6], [14]. Nodes assigned to a cluster are not considered in the subsequent iterations, thus the clusters in output are not overlapping. The algorithm proceeds until all nodes have been assigned to a cluster. This section details the SToC algorithm. We will proceed bottom-up, first describing the STo-Query procedure which computes a τ-close cluster with respect to a given seed s, and the data structures that make its computation efficient. Then, we will present the main SToC procedure. A. The STo-Query Procedure The STo-Query procedure computes a connected τ- close cluster C for a given seed s and threshold τ. With our definition of dST (), it turns out that C ⊆ BdST (s, τ) = BdS(s, τ) ∩ BdT (s, τ). We define C as the set of nodes in BdST (s, τ) that are connected to s. Computing C is then possible through a partial traversal of the graph starting from s. This is the approach of the STo-Query procedure detailed in Algorithm 1. Algorithm 1: STo-Query algorithm. Input : G, τ, s Output: C, a τ-close connected cluster Global : S and T data structures (described in Section VI-A, used to compute dST ) 1 Q ← empty queue 2 C ← {s} 3 enqueue(Q, s) 4 while Q 6= ∅ do 5 6 7 8 9 10 11 12 end 13 return C; v ← dequeue(Q) foreach x ∈ N(v) do C ← C ∪ {x} enqueue(Q, x) end end if x 6∈ C and dST (s, x) ≤ τ then The efficiency of STo-Query relies on two data struc- tures, S and T, that we adopt for computing semantic and topological distances respectively and, a fortiori, for the test dST (s, x) ≤ τ at line 7. Recall that dST (s, x) = max(dS(s, x), dT (s, x)). Semantic distance is computed by directly applying (Equ. 2). We store in a dictionary S the mapping of nodes to attribute values. Thus, computing dS(s, x) requires O(A) time, where A is the number of attributes. For topological distance, instead, a naıve us- age of (Equ. 3) would require to compute online the l- neighborhood of nodes. This takes O(n) time for medium- to-large values of l, e.g., for small-world networks. We overcome this issue by approximating the topological dis- tance with a bounded error, by using bottom-k sketch vectors [10]. A sketch vector is a compressed representation of a set, in our case an l-neighborhood, that allows the estimation of functions, in our case topological distance, with bounded error. The bottom-k sketch S(X) consists in the first k elements of a set X with respect to a given permutation of the domain of elements in X. The Jaccard distance between Nl(v1) and Nl(v2) can be approximated using S(Nl(v1)) and S(Nl(v2)) in their place, with a precision  by choosing k = log n (see [15]). We store in a 2 dictionary T the mappings of nodes v to the sketch vector of Nl(v). T allows for computing dT (s, x) in O(log n) time. B. The SToC Procedure The algorithm consists of repeated calls to the STo- Query function on selected seeds. τ-close clusters returned by STo-Query are added to output and removed from the set of active nodes V 0 in Algorithm 2 (lines 7–9). We denote by G[V 0] the subgraph of G with only the nodes in V 0. Seeds are chosen randomly among the active nodes through the select node function (line 6). This philoso- phy can be effective in real-world networks (see, e.g., [13]), and is inherently different from selecting a set of random seeds in the beginning (as in k-means), since it guarantees that each new seed will be at a significant distance from previously chosen ones. Calls to STo-Query return non- overlapping clusters, and the algorithm terminates when Algorithm 2: SToC algorithm. Input : G(V, E, F) attributed graph, τ distance threshold Output: R, a τ-close clustering of G 1 S ← global dictionary of the semantic vectors 2 T ← global topological similarity table of G 3 R ← ∅ 4 V 0 ← V 5 while V 0 6= ∅ do 6 7 8 9 10 11 end 12 return R s ← select node(G) C ← STo-Query(G, τ, s) V 0 ← V 0 \ C G ← G[V 0] R ← R ∪ {C} all nodes have been assigned to some cluster, i.e., V 0 = ∅. C. Time and space complexity case complexity of SToC is O(P Let us consider time complexity first. For a seed s, STo- Query iterates over nodes in C ⊆ Nl(s) through queue Q. For each node v ∈ C, the distance dST (v, x) is calculated for all neighborhoods x of v. Using the data structures S and T, this takes O(log n + A). SToC iterates over seeds s by removing from the graph nodes that appear in the cluster C returned by STo-Query. This implies that a node is enqued in Q exactly once. In summary, worst- x∈V N(x)(log n+ A)) = O(m(log n + A)). According to related work, we consider A to be constant in real world datasets. This leads to an overall time complexity of O(m log n). The initialization of the data structures S and T has the same cost. In fact, S can be filled in linear time O(n) through a scan of the input attributed graph. Moreover, bottom-k sketches can be computed in O(mk) time [5], hence, for k ∈ O(log n), building T requires O(m log n). Regarding space usage, the dictionary S requires O(nA) = O(n) space, assuming A constant. Moreover, since each sketch vector in T has size O(log n), T requires O(n log n) space. Thus, SToC requires O(n log n) space, in addition to the one for storing the input graph. VII. Auto-tuning of parameters The SToC algorithm assumes two user parameters1 in input: the value l to be used in topological distance (Equ. 3), and the distance threshold τ tested at line 7 of STo-Query. The correct choice of such parameters can be critical and non-trivial. For example, consider the cumulative distributions of dS() and dT () shown in Fig. 2 for the datasets that will be considered in the experiments. Small values of l make most of the pairs very distant, and, conversely, high values of l make most of the pairs close w.r.t. topological distance. Analogously, high values of threshold τ may lead to cluster together all nodes, which 1The error threshold  is more related to implementation perfor- mance issues rather than to user settings. Fig. 2. Cumulative distributions of dT (), for varying l-neighborhoods, and of dS() for datasets DIRECTORS (left) and DBLP (right). have semantic and topological distance both lower than τ. E.g., almost every pair of nodes has a semantic distance lower than 0.4 for the DIRECTORS dataset in Fig. 2. Another issue with parameters l and τ is that they are operational notions, with no clear intuition on how they impact on the results of the clustering problem. In this section, we introduce a declarative notion, with a clear intuitive meaning for the user, and that allows to derive optimal values for l and τ. We define the attraction ratio α as a value between 0 and 1, as a specification of the expected fraction of nodes similar to a given one. Extreme values α = 1 or α = 0 mean that all nodes are similar to each other and all nodes are different from each other respectively. In order to let the user weight separately the semantic and the topological components, we actually assume that a semantic attraction ratio αS and a topological attraction ratio αT are provided by the user. We describe next how the operational parameters l and τ are computed from the declarative ones αS and αT . Computing τ. We approximate the cumulative distri- bution of dS() among all the n2 pairs of nodes by looking at a sample of 2 log n pairs. By the Hoeffding bound [15], this guarantees error  of the approximation. Then, we set τ = τ as the αS-quantile of the approximated distribution. By definition, dS() will be lower or equal than τ for the fraction αS of pairs of nodes. Fig. 2 (second and fourth plots) show the approximated distributions of dS() for the DIRECTORS and DBLP datasets. E.g., an attraction ratio αS = 0.4 can be reached by choosing τ = 0.2 for DIRECTORS and τ = 0.45 for DBLP. 2 Computing l. In the previous step, we fixed τ = τ using the semantic distance distribution. We now fix l using the topological distance distribution. The approach consists in approximating the cumulative distribution of dT (), as done before, for increasing values of l starting from l = 1. For each value of l, we look at the quantile of τ, namely the fraction αl = P r(dT ≤ τ) of pairs of nodes having topological distance at most τ. We choose the value l for which αl − αT is minimal, namely for which αl is the closest one to the attraction ratio αT . Since αl is monotonically decreasing with l, we stop when αl+1 − αT > αl − αT. Fig. 3 shows an example for αT = 0.3 and τ = 0.6. The value l = 6 yields the quantile αl closest to the expected attraction ratio αT = 0.3. We now show that the cost of the auto-tuning phase is bounded by O(m log n), under the assumptions that both −1 and l are O(1). Such assumption are realis- tic. In fact, values for  cannot be too small, otherwise Fig. 3. Computing the l value for αT = 0.3 and τ = 0.6 on the DBLP dataset. the performance improvement of using bottom-k sketches would be lost [10]. Regarding l, it is bounded by the graph diameter, which for real-world networks, can be considered bounded by a constant [2], [31]. Let us consider then the computational cost of auto-tuning. Computing τ requires calculating semantic distance among 2 log n pairs of nodes, which requires O(log2 n), and in sorting the pairs accord- ingly, which requires O((log n)(log log n)). Overall, the cost is O(log2 n). Computing l requires a constant-bounded loop. In each iteration, we need to build an approximate cumulative distribution of the topological distance dT (), which, as shown before, is O(log2 n). In order to compute dT () we also have to construct the data structure T for the value l at each iteration, which requires O(m log n). In summary, computing l has a computational cost that is in the same order of the SToC algorithm. 2 VIII. Experiments We first present the evaluation metrics and the ex- perimental datasets, and then show the results of our experiments, which aim at showing the effectiveness of the approach and at comparing it with the state of the art. A. Evaluation metrics According to existing approaches [18], [38]we adopt both a semantic and a topological metric. The semantic metric is the Within-Cluster Sum of Squares (WCSS) also called Sum of Squared Error (SSE), widely [36], Attributes Edges Categorical Quantitative 774,162 topic prolific Topology DBLP Nodes 60,977 DIRECTORS Nodes 3,609,806 DIRECTORS-gcc 12,651,511 Edges Categorical Quantitative sectors, sex age, birthplace, residence Nodes 1,390,625 Edges Categorical Quantitative 10,524,042 sectors, sex age, birthplace, residence TABLE I. Summary of experimental datasets. used by widespread approaches such as the k-means [23]: W CSS = kv − µik2 (5) kX X i=1 v∈Ci where C1, . . . , Ck is the clustering of the graph, and, for i ∈ [1, k], µi is the centroid of nodes in Ci w.r.t. the se- mantics distance dS() [29]. WCSS ranges over non-negative numbers, with lower values denoting better clusterings. Alternative semantic metrics, such as entropy [36], [38], are suitable for categorical/discretized attributes only. The topological metric is the modularity [9], a de-facto standard for graph clustering evaluation [36], [38]: (cid:21) Avw − kvkw 2m δ(cv, cw) (6) (cid:20) X v,w∈V Q = 1 2m where A is the adjacent matrix of the graph, kv is the degree of node v, cv is the cluster ID of node v, and δ is the identity function (δ(i, j) = 1 if i = j and 0 otherwise). Q is defined in [− 1 2 , 1], with a random clustering expected to have Q = 0, and a good clustering Q > 0 [9]. B. Experimental datasets We will run experiments on two datasets, whose sum- maries are shown in Table I. DIRECTORS: A social network of directors. A director is a person appointed to serve on the board of a company. We had a unique access to a snapshot of all Italian boards of directors stored in the official Italian Business Register. The attributed graph is build as follows: nodes are distinct directors, and there is an (undirected) edge between two directors if they both seat in a same board. In other words, the graph is a bipartite projection of a bipartite graph directors-companies. In the following we distinguish the whole graph (DIRECTORS) from its giant connected component (DIRECTORS-gcc). Node attributes include quantitative characteristics of directors (age, geographic coordinates of birth place and residence place) and cat- egorical characteristics of them (sex, and the set of in- dustry sectors of companies they seats in the boards of – e.g., such as IT, Bank, etc.). Clustering this network means finding communities of people tied by business relationships. A combined semantic-topological approach may reveal patterns of structural aggregation as well as social segregation [4]. For example, clusters may reveal communities of youngster/elderly directors in a specific sub-graph. DBLP: Scientific coauthor network. This dataset con- sists of the DBLP bibliography database restricted to four research areas: databases, data mining, information retrieval, and artificial intelligence. The dataset was kindly provided by the authors of [38], where it is used for eval- uation of their algorithm. Nodes are authors of scientific publications. An edge connect two authors that have co- authored at least one paper. Each node has two attributes: prolific (quantitative), counting the number of papers of the author, and primary topic (categorical), reporting the most frequent keyword in the author's papers. Fig. 2 shows the cumulative distributions of semantic and topological distances for the datasets. In particular, the 1st and 3rd plots show the impact of the l parameter on the topological distance. The smaller (resp. larger) l, the more distant (resp. close) are nodes. This is in line with the small-world phenomenon in networks [34, Fig.2]. C. Experimental results We will compare the following algorithms: • Inc-C: the Inc-Clustering algorithm by Zhou et al. [38]. It requires in input the number k of clusters to produce. Implementation provided by the authors. • GBAGC: the General Bayesian framework for Attributed Graph Clustering algorithm by Xu et al. [36], which is the best performing approach in the literature. It also takes k as an input. Implementation provided by the authors. SToC: our proposed algorithm, which takes in input the attraction ratios αS and αT , and the error threshold . • • ToC: a variant of SToC which only considers topological information (nodes and edges). It takes in input αT and the error threshold  (τ and l are computed as for SToC, with a dummy αS = αT ). SC: a variant of SToC which only considers se- mantic information (attributes). It takes in input αS and the error threshold . • All tests were performed on a machine with two Intel Xeon Processors E5-2695 v3 (35M Cache, 2.30 GHz) and 64 GB of main memory running Ubuntu 14.04.4 LTS. SToC, ToC and SC are implemented in Java 1.8, Inc- C and GBAGC are developed in MatLab. Table V shows the results of SToC for αS = αT = α varying from 0.1 to 0.9, and a fixed  = 0.9. For every dataset and α, we report the number of clusters found (k), the evaluation metrics Q and W CSS, the running time, and the main memory usage. As general comments, we can observe that k and W CSS are inversely proportional to α, Q is always non-negative and in good ranges, memory usage is limited, and running times are negligible for DBLP and moderate for DIRECTORS and DIRECTORS-gcc. For every α, we executed 10 runs of the algorithm, which α k Q DBLP 0.1 0.2 0.4 0.6 0.8 25,598 (1,279) 26,724 (1,160) 6,634 (5,564) 9,041 (7,144) 11,050 (4,331) 15,041 (5,415) 0.2 0.4 0.9 DIRECTORS 2,591,184 0.1 (311,927) 2,345,680 (162,444) 1,891,075 (34,276) 1,212,440 (442,011) 682,800 (485,472) 0.6 0.8 886,427 (123,420) 901,306 (47,486) 811,152 (28,276) 664,882 (63,334) 584,739 (408,725) 0.2 0.4 0.6 0.8 DIRECTORS-gcc 0.1 W CSS Time (s) Space (GB) 5,428 (520) 5,367 (534) 23,477 (3,998) 21,337 (5,839) 20,669 (3,102) 16,688 (4,986) 7,198 (5,382) 9,793 (1,977) 26,093 (1,829) 72,769 (4,129) 49,879 (8,581) 6158 (2886) 4773 (2450) 8,050 (1450) 13,555 (3,786) 49,603 (9,743) 0.627 (0.21) 0.616 (0.214) 0.272 (0.151) 0.281 (0.1) 0.267 (0.11) 0.28 (0.05) 3,698 (485) 3,213 (167.3) 2,629 (178.6) 17,443 (2,093) 8,209 (12,822) 278.4 (44.7) 274 (14.1) 239.1 (11.6) 181.6 (24.4) 5,979 (10,518) 0.65 0.64 0.67 0.7 0.69 0.64 9 8.2 8.6 8.7 9.5 10 10.4 4.3 4.2 8.8 0.269 (0.014) 0.270 (0.015) 0.189 (0.12) 0.153 (0.08) 0.238 (0.1) 0.188 (0.045) 0.1347 (0.0237) 0.1530 (0.0084) 0.22 (0.023) 0.28 (0.068) 0.1769 (0.066) 0.102 (0.016) 0.103 (0.02) 0.1257 (0.0164) 0.248 (0.0578) 0.189 (0.0711) TABLE II. SToC results (mean values over 10 runs, StDev in brackets). k 15 100 1,000 5,000 15,000 Q W CSS Time (s) 870 1,112 1305 1,273 1,450 38,009 37,939 37,051 32,905 13,521 -0.499 -0.496 -0.413 -0.136 0.083 Space (GB) 31.0 31.0 31.1 32.1 32.2 TABLE III. Inc-C results for the DBLP dataset. uses random seeds, and reported mean value and standard deviation. The low values of the standard deviations of Q and W CSS show that the random choice of the seeds does not impact the stability of the results. The results of ToC and SC can be found in in Appendix B: in summary, the exploitation of both semantic and topological information leads to a superior performance of SToC w.r.t. both Q and W CSS. Tables III and IV report the results for Inc-C and GBAGC respectively. Due to the different input param- eters of such algorithms, we can compare the results of SToC only by looking at rows with similar k. Let us consider Inc-C first. Running times are extremely high, k (actual) DBLP 10 (10) 50 (14) 100 (2) 1,000 (3) 5,000 (2) 15,000 (1) DIRECTORS 0.0382 0.0183 1 · 10−7 6 · 10−4 2 · 10−5 0 10 (8) 50 (10) 100 (8) 500 (5) 1000 (–) 0.0305 0.0599 0.1020 0.0921 - DIRECTORS-gcc 0.1095 0.0563 0.0534 0.0502 0.0569 – 10 (8) 50 (14) 100 (15) 500 (5) 1000 (7) 1500 (–) Q W CSS Time (s) Space (GB) 27,041 27,231 27,516 27,465 27,498 27,509 198797 198792 198791 198790 - 75103 75101 75101 75101 75101 – 17 25 13 37 222 663 18 63 120 8,129 - 94 161 234 1,238 3,309 – 0.5 0.6 0.7 3 14.2 50.182 4.3 12.4 22.4 64.3 out of mem 3.02 5.47 9.34 40.3 59 out of mem TABLE IV. GBAGC results. even for the moderate size dataset DBLP. It was unfeasible to obtain results for DIRECTORS. Space usage is also high, since the algorithm is in O(n2). Values of Q are considerably worse than SToC. W CSS tends to generally high. Consider now GBAGC. Quality of the results is considerably lower than SToC both w.r.t. Q and W CSS. The space usage and elapsed time increase dramatically with k, which is non-ideal for large graphs, where a high number of cluster is typically expected. On our experimen- tal machine, GBAGC reaches a limit with k = 500 for the DIRECTORS dataset by requiring 65GB of main memory. Even more critical is the fact that the number of clusters actually returned by GBAGC is only a fraction of the input k, e.g., it is 1 for k = 15, 000 for the DBLP dataset. The user is not actually controlling the algorithm results through the required input. Figure 4 clarifies the main limitation of Inc-C and GBAGC over SToC. It reports for some of the executions the size distributions of clusters found. Inc-C (bottom plot) tends to produce a single giant cluster including most of the nodes. GBAGC (middle plots) produces a small number of clusters regardless of the input parame- ters. Instead, SToC (top plots) produces more balanced results, typically expected in sociology [7], [24], with a size distribution in line with common power-laws found in real- world network and with the input graphs in particular (see [4] for the DIRECTORS graph). IX. Conclusions We proposed SToC, a clustering algorithm for large at- tributed graphs. It extracts non-overlapping clusters using a combined distance that accounts for network topology and semantic features, based on declarative parameters (attraction ratios) rather than on operational ones (num- ber of clusters) typically required by other approaches. Experimental results showed that SToC outperforms the [10] E. Cohen and H. Kaplan. Summarizing data using bottom-k sketches. In PODS, pages 225–234. ACM, 2007. [11] D. Combe, C. Largeron, E. Egyed-Zsigmond, and M. G´ery. Combining relations and text in scientific network clustering. In ASONAM, pages 1248–1253. IEEE, 2012. [12] D. Combe, C. Largeron, M. G´ery, and E. Egyed-Zsigmond. I- louvain: An attributed graph clustering method. In IDA, pages 181–192. Springer, 2015. [13] A. Conte, R. Grossi, and A. Marino. Clique covering of In ACM Symposium on Applied large real-world networks. Computing, SAC '16, pages 1134–1139. ACM, 2016. [14] M. Coscia, F. Giannotti, and D. Pedreschi. A classification for community discovery methods in complex networks. Statistical Analysis and Data Mining, 4(5):512–546, 2011. [15] P. Crescenzi, R. Grossi, L. Lanzi, and A. Marino. A comparison of three algorithms for approximating the distance distribution in real-world graphs. In TAPAS, pages 92–103. Springer, 2011. [16] R. Diestel. Graph theory. 2005. Grad. Texts in Math, 2005. [17] Y. Ding. Community detection: Topological vs. topical. Journal of Informetrics, 5(4):498–514, 2011. [18] K.-C. Duong, C. Vrain, et al. A filtering algorithm for con- strained clustering with within-cluster sum of dissimilarities criterion. In 2013 IEEE 25th International Conference on Tools with Artificial Intelligence, pages 1060–1067. IEEE, 2013. [19] S. Gunnemann, B. Boden, and T. Seidl. Db-csc: a density-based approach for subspace clustering in graphs with feature vectors. In Machine Learning and Knowledge Discovery in Databases, pages 565–580. Springer, 2011. I. Guy, N. Zwerdling, D. Carmel, I. Ronen, E. Uziel, S. Yogev, and S. Ofek-Koifman. Personalized recommendation of social software items based on social relations. In RecSys, pages 53– 60, New York, NY, USA, 2009. ACM. [20] [21] J. Han, M. Kamber, and J. Pei. Data Mining: Concepts and Techniques. Morgan Kaufmann Publ. Inc., 3rd edition, 2011. [22] T. Kanungo, D. M. Mount, N. S. Netanyahu, C. D. Piatko, R. Silverman, and A. Y. Wu. An efficient k-means clustering algorithm: Analysis and implementation. IEEE T Pattern Anal, 24(7):881–892, 2002. [23] S. P. Lloyd. Least squares quantization in pcm. IEEE Trans- actions on Information Theory, 28(2):129–137, 1982. [24] D. W. McMillan and D. M. Chavis. Sense of community: A definition and theory. J Community Psychol, 14(1):6–23, 1986. [25] M.M. and E. Deza. Encyclopedia of distances. Springer, 2009. I. B. Mohamad and D. Usman. Standardization and its effects [26] on k-means clustering algorithm. Res J Appl Sci Eng Technol, 6(17):3299–3303, 2013. [27] A. Papadopoulos, D. Rafailidis, G. Pallis, and M. D. Dikaiakos. Clustering attributed multi-graphs with information ranking. In DEXA, pages 432–446. Springer, 2015. [28] B. Perozzi, L. Akoglu, P. Iglesias S´anchez, and E. Muller. Focused clustering and outlier detection in large attributed graphs. In ACM SIGKDD, pages 1346–1355. ACM, 2014. [29] M. H. Protter and C. B. Morrey. College calculus with analytic geometry. Addison-Wesley, 1977. [30] P. I. S´anchez, E. Muller, K. Bohm, A. Kappes, T. Hartmann, and D. Wagner. Efficient algorithms for a robust modularity- driven clustering of attributed graphs. In SDM. SIAM, 2015. [31] J. Ugander, B. Karrer, L. Backstrom, and C. Marlow. The arXiv preprint anatomy of the facebook social graph. arXiv:1111.4503, 2011. [32] N. Villa-Vialaneix, M. Olteanu, and C. Cierco-Ayrolles. Carte auto-organisatrice pour graphes ´etiquet´es. In Atelier Fouilles de Grands Graphes (FGG)-EGC, pages Article–num´ero, 2013. [33] U. Von Luxburg. A tutorial on spectral clustering. Statistics and computing, 17(4):395–416, 2007. [34] D. J. Watts. Networks, dynamics, and the small-world phe- nomenon 1. Am J Sociol, 105(2):493–527, 1999. Fig. 4. Size distribution of clusters found by SToC, GBAGC and Inc-C for some of the tests in Tables V, III, IV. state of the art algorithms in both time/space usage and in quality of the clustering found. Acknowledgements The authors would like to thank Andrea Marino and Andrea Canciani for useful conversations. References [1] L. Akoglu, H. Tong, B. Meeder, and C. Faloutsos. Pics: Parameter-free identification of cohesive subgroups in large attributed graphs. In SDM, pages 439–450. SIAM, 2012. [2] L. Backstrom, P. Boldi, M. Rosa, J. Ugander, and S. Vigna. Four degrees of separation. In Proceedings of the 4th Annual ACM Web Science Conference, pages 33–42. ACM, 2012. [3] A. Baroni, A. Conte, M. Patrignani, and S. Ruggieri. Efficiently clustering very large attributed graphs. In ASONAM. IEEE, 2017. [4] A. Baroni and S. Ruggieri. Segregation discovery in a social network of companies. In IDA, pages 37–48. Springer, 2015. [5] P. Boldi, M. Rosa, and S. Vigna. Hyperanf: Approximating the neighbourhood function of very large graphs on a budget. In WWW, pages 625–634. ACM, 2011. [6] C. Bothorel, J. D. Cruz, M. Magnani, and B. Micenkov´a. Clustering attributed graphs: models, measures and methods. Network Science, 3(03):408–444, 2015. [7] J. G. Bruhn. The sociology of community connections. Springer Science & Business Media, 2011. [8] J. Cao, S. Wang, F. Qiao, H. Wang, F. Wang, and S. Y. Philip. User-guided large attributed graph clustering with multiple sparse annotations. In PAKDD, pages 127–138. Springer, 2016. [9] A. Clauset, M. E. Newman, and C. Moore. Finding community structure in very large networks. Phys rev E, 70(6):066111, 2004. k 25,358 (900) 26,340 (1,492) 2 (0) 2 (0) 2 (0) 2 (0) Q 0.278 (0.004) 0.279 (0.01) 0.0004 (0) 0.0004 (0) 0.0004 (0) 0.0004 (0) α 0.1 0.2 0.4 0.6 0.8 0.9 W CSS 5,221 (202) 5,941 (572) 60,970 (2.98) 60,973 (1.73) 60,972 (2.95) 60,974 (0.93) A variant of SToC that treats all attributes TABLE VI. as categorical on the DBLP dataset (averages of 10 runs, StDev in brackets). poorly w.r.t. semantic metrics compared to SC and SToC, although semantic-only algorithm SC is competitive with ToC on topology. The clear winner among the three is SToC, which gives a superior performance compared to ToC and SC for most values of α. This shows how SToC can effectively combine semantic and topological information to provide a better clustering. Table VII also shows that the number k of clusters in output is inversely proportional to α when topology plays a role, i.e., for ToC and SToC. While it is not clear why SC does not seem to follow this behaviour, we suspect it may be due to a small amount of possible dS values in the DBLP dataset (see Figure 2 in the paper, right). It is worth noting that the WCSS metric degenerates for high values of α; this might be due to α · n approaching the size of the graph, making any given pair of nodes be considered similar. SC seems more resistant to this degeneration. [35] Z. Xu, Y. Ke, Y. Wang, H. Cheng, and J. Cheng. A model- based approach to attributed graph clustering. In SIGMOD, pages 505–516. ACM, 2012. [36] Z. Xu, Y. Ke, Y. Wang, H. Cheng, and J. Cheng. Gbagc: A general bayesian framework for attributed graph clustering. TKDD, 9(1):5, 2014. [37] J. Yang, J. McAuley, and J. Leskovec. Community detection in networks with node attributes. In ICDM, pages 1151–1156. IEEE, 2013. [38] Y. Zhou, H. Cheng, and J. X. Yu. Clustering large attributed In ICDM, pages graphs: An efficient incremental approach. 689–698. IEEE, 2010. Appendix Appendix A Validation of the Attribute Model One of the main differences of the proposed approach with respect to the state-of-the-art is that quantitative attributes do not need to be discretized. We validate the effectiveness of this choice by showing the loss of quality induced by the discretization. Namely, we run the SToC algorithm on the DBLP dataset, where the quantitative attribute represent how prolific an author is, treating the attribute as a categorical one. Table VI shows the results of this process, which can be compared to the results obtained when the quantitative attribute is addressed properly, shown in Table V. We can see not only how both metrics (Q and WCSS) are significantly better when categorical attributes are considered as such, but that ignoring the similarity between similar attributes may lead to an insignificant result, likely due to the flattening of the distances between nodes. This suggests that approaches that handle quantitative attributes may have an inherent advantage with respect to those that need to discretize them. α k Q W CSS Time 25,598 (1,279) 26,724 (1,160) 6,634 (5,564) 9,041 (7,144) 11,050 (4,331) 15,041 (5,415) 0.1 0.2 0.4 0.6 0.8 0.9 TABLE V. 0.269 (0.014) 0.270 (0.015) 0.189 (0.12) 0.153 (0.08) 0.238 (0.1) 0.188 (0.045) (s) 0.627 (0.21) 0.616 (0.214) 0.272 (0.151) 0.281 (0.1) 0.267 (0.11) 0.28 (0.05) 5,428 (520) 5,367 (534) 23,477 (3,998) 21,337 (5,839) 20,669 (3,102) 16,688 (4,986) Space (GB) 0.65 0.64 0.67 0.7 0.69 0.64 SToC on the DBLP dataset (average of 10 runs, StDev in brackets). Appendix B SC and ToC compared to SToC Table VII shows, for varying α, the number of clusters k produced, and the modularity and WCSS of the clustering found by the three variations of our algorithm. The best values for modularity and WCSS are marked in bold. As one could expect, topological-only algorithm ToC performs k Q SToC SC ToC SToC SC 25,598 26,724 6,634 9.041 11,050 15,041 15 1430 18 7574 15 1420 17 1174 16 314 16 1 TABLE VII. 0.269 0.270 0.189 0.153 0.238 0.188 0.0116 0.01554 -0.00256 0.01248 -0.00356 0.00378 α 0.1 0.2 0.4 0.6 0.8 0.9 ToC 0.0457 -0.03373 0.04555 -0.1582 -0.3733 -0.4831 SToC 5,428 5,367 23,477 21,337 20,669 16,688 W CSS SC 14,699 14,891 14,453 14,944 15,077 15,073 ToC 19,723 16,634 19,377 20,713 26,342 27,505 SToC, SC and ToC on the DBLP dataset
1803.04742
1
1803
2018-03-13T12:05:58
VERSE: Versatile Graph Embeddings from Similarity Measures
[ "cs.SI", "cs.LG" ]
Embedding a web-scale information network into a low-dimensional vector space facilitates tasks such as link prediction, classification, and visualization. Past research has addressed the problem of extracting such embeddings by adopting methods from words to graphs, without defining a clearly comprehensible graph-related objective. Yet, as we show, the objectives used in past works implicitly utilize similarity measures among graph nodes. In this paper, we carry the similarity orientation of previous works to its logical conclusion; we propose VERtex Similarity Embeddings (VERSE), a simple, versatile, and memory-efficient method that derives graph embeddings explicitly calibrated to preserve the distributions of a selected vertex-to-vertex similarity measure. VERSE learns such embeddings by training a single-layer neural network. While its default, scalable version does so via sampling similarity information, we also develop a variant using the full information per vertex. Our experimental study on standard benchmarks and real-world datasets demonstrates that VERSE, instantiated with diverse similarity measures, outperforms state-of-the-art methods in terms of precision and recall in major data mining tasks and supersedes them in time and space efficiency, while the scalable sampling-based variant achieves equally good results as the non-scalable full variant.
cs.SI
cs
VERSE: Versatile Graph Embeddings from Similarity Measures Anton Tsitsulin Hasso Plattner Institute [email protected] Panagiotis Karras Aarhus University [email protected] Davide Mottin Hasso Plattner Institute [email protected] Emmanuel Müller Hasso Plattner Institute [email protected] 8 1 0 2 r a M 3 1 ] I S . s c [ 1 v 2 4 7 4 0 . 3 0 8 1 : v i X r a ABSTRACT Embedding a web-scale information network into a low-dimensional vector space facilitates tasks such as link prediction, classification, and visualization. Past research has addressed the problem of ex- tracting such embeddings by adopting methods from words to graphs, without defining a clearly comprehensible graph-related objective. Yet, as we show, the objectives used in past works implic- itly utilize similarity measures among graph nodes. In this paper, we carry the similarity orientation of previous works to its logical conclusion; we propose VERtex Similarity Em- beddings (VERSE), a simple, versatile, and memory-efficient method that derives graph embeddings explicitly calibrated to preserve the distributions of a selected vertex-to-vertex similarity measure. VERSE learns such embeddings by training a single-layer neural network. While its default, scalable version does so via sampling similarity information, we also develop a variant using the full infor- mation per vertex. Our experimental study on standard benchmarks and real-world datasets demonstrates that VERSE, instantiated with diverse similarity measures, outperforms state-of-the-art methods in terms of precision and recall in major data mining tasks and supersedes them in time and space efficiency, while the scalable sampling-based variant achieves equally good results as the non- scalable full variant. ACM Reference Format: Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller. 2018. VERSE: Versatile Graph Embeddings from Similarity Measures. In WWW 2018: The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3178876.3186120 1 INTRODUCTION Graph data naturally arises in many domains, including social networks, protein networks, and the web. Over the past years, numerous graph mining techniques have been proposed to analyze and explore such real-world networks. Commonly, such techniques apply machine learning to address tasks such as node classification, link prediction, anomaly detection, and node clustering. Machine learning algorithms require a set of expressive discrim- inant features to characterize graph nodes and edges. To this end, one can use features representing similarities among nodes [18]. This paper is published under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. Authors reserve their rights to disseminate the work on their personal and corporate Web sites with the appropriate attribution. WWW 2018, April 23–27, 2018, Lyon, France © 2018 IW3C2 (International World Wide Web Conference Committee), published under Creative Commons CC BY 4.0 License. ACM ISBN 978-1-4503-5639-8/18/04. https://doi.org/10.1145/3178876.3186120 (a) Community structure (b) Roles (c) Structural equivalence Figure 1: Three node properties are highlighted on the same graph. Can a single model capture these properties? However, feature engineering is tedious work, and the results do not translate well across tasks [15]. An alternative to feature design is to learn feature vectors, or embeddings by solving an optimization problem in unsupervised fashion. Yet devising and solving a universal and tractable optimiza- tion problem for learning representations has withstood research efforts [7]. One line of research [11, 42] applies classical dimension- ality reduction methods, such as SVD, to similarity matrices over the graph; yet these methods are burdened with constructing the matrix. While a recent approach [33] overcomes this impediment, it results in poor quality in prediction tasks due to its linear nature. Another line of research aims to generate features capturing neighborhood locality, usually through an objective that can be opti- mized by Stochastic Gradient Descent (SGD) [37, 41]. Such methods rely on an implicit, albeit rigid, notion of node neighborhood; yet this one-size-fits-all approach cannot grapple with the diversity of real-world networks and applications. Grover et al. [15] discerned this inflexibility in the notion of the local neighborhood; to ame- liorate it, they proposed Node2vec, which biases the exploration strategy of [37] using two hyperparameters. Yet this hyperparame- ter-tuned approach raises a cubic worst-case space complexity and compels the user to traverse several feature sets and gauge the one that attains the best performance in the downstream task. Besides, a local neighborhood, even when found by hyperparameter tun- ing, still represents only one locality-based class of features; hence, Node2vec does not adequately escape the rigidity it tries to mend. WWW 2018, April 23–27, 2018, Lyon, France Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller We argue that features extracted by a more versatile similarity notion than that of a local neighborhood would achieve the flexibil- ity to solve diverse data mining tasks in a large variety of graphs. Figure 1 makes a case for such a versatile similarity notion by ex- posing three distinct kinds of similarity on a graph: community structure guides community detection tasks, roles are typically used in classification, while structural equivalence defines peer corre- spondences in knowledge graphs. As real-world tasks rely on a mix of such properties, a versatile feature learning algorithm should be capable of capturing all such similarities. In this paper, we propose VERSE, the first, to our knowledge, ver- satile graph embedding method that explicitly learns any similarity measures among nodes. In its learning core, VERSE stands between deep learning approaches [12, 48] on the one hand and the direct decomposition of the similarity matrix [11, 42] on the other hand. Instead, VERSE trains a simple, yet expressive, single-layer neu- ral network to reconstruct similarity distributions between nodes. Thereby, it outperforms previous methods in terms of both runtime and quality on a variety of large real networks and tasks. Thanks to its ability to choose any appropriate similarity measure for the task at hand, VERSE adjusts to that task without needing to change its core. Thereby, it fully ameliorates the rigidity ob- served in [15], and integrates representation learning with feature engineering: any similarity measure, including those developed in feature engineering, can be used as input to VERSE. For the sake of illustration, we instantiate our generic methodology using three popular similarity measures, namely Personalized PageRank (PPR) [34], SimRank [21], and adjacency similarity. We also show that versatility does not imply a new burden to the user, merely substituting hyperparameter tuning with similarity measure tuning: using PPR as a default choice for the similarity measure leads to good performance in nearly all tasks and networks we examined. We summarize our contributions as follows. • We propose a versatile framework for graph embeddings that explicitly learns the distribution of any vertex similarity measure for each graph vertex. • We interpret previous graph embeddings through the lens of our similarity framework, and instantiate VERSE with Personalized PageRank, SimRank, and Adjacency similarity. • We devise an efficient algorithm, linear in graph size, based on a single-layer neural network minimizing the divergence from real to reconstructed similarity distributions. • In a thorough experimental evaluation, we show that VERSE outperforms the state-of-the-art approaches in various graph mining tasks in quality while being even more efficient. 2 RELATED WORK In the absence of a general-purpose representation for graphs, graph analysis tasks require domain experts to craft features [4, 18] or to use specialized feature selection algorithms [36, 40]. Recently, specialized methods were introduced to learn representations of dif- ferent graph parts [2, 31] and graphs with annotations on nodes [20, 55], or edges [19, 49]. We focus on learning representations of nodes in graphs without any prior or additional information other than graph structure. Traditional feature learning learns features by compressing rep- resentations such as the Laplacian or adjacency matrix to a low- dimensional space. Early works in this area include spectral tech- niques [6] and nonlinear dimensionality reduction [39, 44]. In an- other vein, Marginal Fisher Analysis [51] analyzes the dimension- ality reduction of a point data set as the embedding of a graph capturing its statistic and geometric properties. Such methods can- not be applied to large graphs, as they operate on dense matrices. Some efforts have been made to overcome this limitation using enhanced linear algebra tools. Ahmed et al. [3] adopt stochastic gradient optimization for fast adjacency matrix eigendecomposi- tion; Ou et al. [33] utilize sparse generalized SVD to generate a graph embedding, HOPE, from a similarity matrix amenable to de- composition into two sparse proximity matrices. HOPE is the first to support diverse similarity measures; however, it still requires the entire graph matrix as input and views the problem as one of linear dimensionality reduction rather than as one of nonlinear learning. This way, it deviates not only from current research on graph embeddings but also from older works [51]. Neural methods for representation learning. Advances in ma- chine learning have led to the adoption of neural methods for learn- ing representations [7]. Building on the success of deep learning in domains such as image processing [24] and Natural Language Pro- cessing (NLP) [8, 29, 35], word2vec [29] builds word embeddings by training a single-layer neural network to guess the contextual words of a given word in a text. Likewise, GloVe [35] learns a word space through a stochastic version of SVD in a transformed cooccurrence matrix. While such text-based methods inherently take neighbor relationships into account, they require conceptual adaptations to model graphs [37]. Neural Graph Embeddings. The success of neural word embed- dings inspired natural extensions towards learning graph repre- sentations [11, 12, 15, 37, 46, 48]. DeepWalk [37] first proposed to learn latent representations in a low-dimensional vector space exploiting local node neighborhoods. It runs a series of random walks of fixed length from each vertex and creates a matrix of d- dimensional vertex representations using the SkipGram algorithm of [29]. These representations maximize the posterior probability of observing a neighboring vertex in a random walk. DeepWalk embeddings can inform classification tasks using a simple linear classifier such as logistic regression. GraRep [11] suggests using Singular Value Decomposition (SVD) on a log-transformed DeepWalk transition probability matrix of different orders, and then concatenate the resulting representations. Struc2vec [38] rewires the graph to reflect isomorphism among nodes and capture structural similarities, and then derives an em- bedding relying on the DeepWalk core. Works such as [12, 48] investigate deep learning approaches for graph embeddings. Their results amount to complex models that require elaborate parameter tuning and computationally expensive optimization, leading to time and space complexities unsuitable for large graphs. Nevertheless, all DeepWalk-based approaches use objective functions that are not tailored to graph structures. Some works [15, 38, 41] try to infuse graph-native principles into the learning pro- cess. LINE [41] proposed graph embeddings that capture more VERSE: Versatile Graph Embeddings from Similarity Measures WWW 2018, April 23–27, 2018, Lyon, France Algorithm Similarity ✔ ✔ ✔ Versatile Local Scalable Nonlinear Global method DeepWalk [37] ✔ Node2vec [15] LINE [41] ✔ GraRep [11] ✘ SDNE [48] ✔ DNGR [12] ✘ HOPE [33] ✘ VERSE Table 1: Outline of related work in terms of fulfilled (✔) and missing (✘) properties of algorithm and similarity measure. ✔ ✔ ✔ ✔ ✘ ✔ ✘ ✘ ✘ ✔ ✘ ✔ ✘ ✔ ✔ ✘ ✘ ✘ ✘ ✘ ✔ ✔ ✔ ✔ ✔ ✔ elaborate proximity notions. However, even LINE's notion of prox- imity is restricted to the immediate neighborhoods of each node; that is insufficient to capture the complete palette of node rela- tionships [15, 33, 38]. Furthermore, Node2vec [15] introduces two hyperparameters to regulate the generation of random walks and thereby tailor the learning process to the graph at hand in semi- supervised fashion. However, Node2vec remains attached to the goal of preserving local neighborhoods and requires laborious tun- ing for each dataset and each task. Overview. Table 1 outlines five desirable properties for a graph embedding, and the extent to which previous methods possess them. We distinguish between properties of algorithms, on the one hand, and those of any implicit or explicit similarity measure among nodes a method may express, on the other hand. • local: not requiring the entire graph matrix as input; GraRep, DNGR, and HOPE fail in this respect. • scalable: capable to process graphs with more than 106 nodes in less than a day; some methods fail in this criterion due to the dense matrix (GraRep), deep learning computations (SDNE), or both (DNGR). • nonlinear: employing nonlinear transformations; HOPE relies on a linear dimensionality reduction method, SVD; that is detri- mental to its performance on building graph representations, just like linear dimensionality reduction methods fail to confer the advantages of their nonlinear counterparts in general [26]. • global: capable to model relationships between any pair of nodes; LINE and SDNE do not share this property as they fail to look beyond a node's immediate neighborhood. • versatile: supporting diverse similarity functions; HOPE does so, yet is compromised by its linear character. 3 VERSATILE GRAPH EMBEDDING VERSE possesses all properties mentioned in our taxonomy; it employs nonlinear transformation, desirable for dimensionality reduction [26]; it is local in terms of the input it requires per node, but global in terms of the potential provenance of that input; it is scalable as it is based on sampling, and versatile by virtue of its generality. (a) Similarity (b) VERSE (c) SVD Figure 2: An example similarity matrix and its reconstruc- tions by VERSE and SVD. Karate club graph [53], dimension- ality d = 4 for both methods. 3.1 VERSE Objective Given a graph G = (V , E), where V = (v1, . . . , vn), n = V , is the set of vertices and E ⊆ (V × V ) the set of edges, we aim to learn a nonlinear representation of vertices v ∈ V to d-dimensional embeddings, where d ≪ n. Such representation is encoded into a n × d matrix W ; the embedding of a node v is the row Wv,· in the matrix; we denote it as Wv for compactness. Our embeddings reflect distributions of a given graph similarity simG : V × V → R for every node v ∈ V . As such, we require that the similarities from any vertex v to all other vertices simG(v, ·) are 1 for all v ∈ V . We aim to devise W by a scalable method that requires neither the V ×V stochastic similarity matrix nor its explicit materialization. The corresponding node-to-node similarity in the embedded space is simE : V × V → R. As an optimization objective, we aim to minimize the Kullback-Leibler (KL) divergence from the given similarity distribution simG to that of simE in the embedded space: amenable to be interpreted as a distribution with(cid:80)u∈V simG(v, u) = (cid:88) L = −(cid:88) v ∈V v ∈V KL(simG(v, ·) simE(v, ·)) (1) We illustrate the usefulness of this objective using a small simi- larity matrix. Figure 2 shows (a) the Personalized PageRank matrix, (b) the reconstruction of the same matrix by VERSE, and (c) the reconstruction of the same matrix using SVD. It is visible that the nonlinear minimization of KL divergence between distributions preserves most of the information in the original matrix, while the linear SVD-based reconstruction fails to differentiate some nodes. 3.2 VERSE Embedding Model We define the unnormalized distance between two nodes u, v in the embedding space as the dot product of their embeddings Wu · W ⊤ v . The similarity distribution in the embedded space is then normalized with softmax: simE(v, ·) = (2) By Equation 1, we should minimize the KL-divergence from simG to simE; omitting parts dependent on simG only, this objective is equivalent to minimizing the cross-entropy loss function [14]: exp(WvW ⊤) i=1 exp(Wv · Wi) (cid:80)n simG(v, ·) log(simE (v, ·)) (3) WWW 2018, April 23–27, 2018, Lyon, France Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller We can accommodate this objective by stochastic gradient de- scent, which allows updating the model on each node singularly. However, a naïve version of gradient descent would require the full materialization of simE and simG. Even in case simG is easy to compute on the fly, such as the adjacency matrix, the softmax in Equation 2 still has to be normalized over all nodes in the graph. We use Noise Contrastive Estimation (NCE) [16, 30], which al- lows us to learn a model that provably converges to its objective (see [17], Theorem 2). NCE trains a binary classifier to distinguish between node samples coming from the empirical similarity dis- tribution simG and those generated by a noise distribution Q over the nodes. Consider an auxiliary random variable D for node clas- sification, such that D = 1 for a node drawn from the empirical distribution and D = 0 for a sample drawn from the noise distribu- tion. Given a node u drawn from some distribution P and a node v drawn from the distribution of simG (u, ·), we draw s ≪ n nodes log-likelihood: (cid:101)v from Q(u) and use logistic regression to minimize the negative (cid:104) LN CE =(cid:88) sE(cid:101)v∼Q(u) log PrW (D = 0simE(u,(cid:101)v)) log PrW (D = 1simE(u, v))+ v∼simG(u,·) u∼P (cid:105) where PrW is computed from W as a sigmoid σ(x) = (1 + e−x )−1 of the dot product between vectors Wu and Wv, while we compute simE (u, ·) without the normalization of Equation 2. As the number of noise samples s increases, the NCE derivative provably converges to the gradient of cross-entropy [30]; thus, by virtue of NCE's asymptotic convergence guarantees, we are in effect minimizing the KL-divergence from simG. NCE's theoretical guarantees depend on s, yet small values work well in practice [30]. In our experiments, we use s = 3. These convergence guarantees of NCE are not affected by choice of distributions P and Q (see [17], Corollary 5); however, its performance is empirically dependent on Q [25]. 3.3 Instantiations of VERSE While VERSE can be used with any similarity function, we choose to instantiate our model to widely used similarities simG, namely Personalized PageRank (PPR), Adjacency Similarity, and SimRank. Personalized PageRank. Personalized PageRank [34] is a com- mon similarity measure among nodes, practically used for many graph mining tasks [15, 28]. (4) Definition 3.1. Given a starting node distribution s, damping factor α, and the normalized adjacency matrix A, the Personalized PageRank vector πs is defined by the recursive equation: πs = αs + (1 − α)πs A The stationary distribution of a random walk with restart with probability α converges to PPR [34]. Thus, a sample from simG(v, ·) is the last node in a single random walk from node v. The damping factor α controls the average size of the explored neighborhood. In Section 3.6 we show that α is tightly coupled with the window size parameter w of DeepWalk and Node2vec. Adjacency similarity. A straightforward similarity measure is the normalized adjacency matrix; this similarity corresponds to the (cid:40)1/Out(u) I(u)(cid:88) I(v)(cid:88) i=1 j=1 LINE-1 model and takes into account only the immediate neighbors of each node. More formally, given the out degree Out(u) of node u sim ADJ G (u, v) = 0 if (u, v) ∈ E otherwise (5) We experimentally demonstrate that VERSE model is effective even in preserving the adjacency matrix of the graph. SimRank. SimRank [21] is a measure of structural relatedness between two nodes, based on the assumption that two nodes are similar if they are connected to other similar nodes; SimRank is defined recursively as follows: simSR G (u, v) = C I(u) I(v) simSR G (Ii(u), Ij(v)) (6) where I(v) denotes the set of in-neighbors of node v, and C is a number between 0 and 1 that geometrically discounts the im- portance of farther nodes. SimRank is a recursive procedure that involves computationally expensive operations: the straightforward method has the complexity of O(n4). W ← N(cid:0)0, d−1(cid:1) SimRank values can be approximated up to a multiplicative factor dependent on C through SimRank-Aware Random Walks (SARW) [22]. SARW computes a SimRank approximation through two reversed random walks with restart where the damping factor √ C. A reversed random walk traverses any edge α is set to α = (u, v) in the opposite direction (v, u). Since we are only interested in G (v, ·), we can ignore the multiplicative the distribution of each simSR factor in the approximation [22] that has little impact on our task. Algorithm 1 VERSE 1: function VERSE(G, simG, d) 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: 12: function Update(u, v, D) 13: 14: 15: until converged return W д ← (D − σ(Wu · Wv)) ∗ λ Wu ← д ∗ Wv Wv ← д ∗ Wu u ∼ P v ∼ simG(u) Wu ,Wv ← Update(u, v, 1) for i ← 1 . . . s do (cid:101)v ∼ Q(u) Wu ,W(cid:101)v ← Update(u,(cid:101)v, 0) ▷ Sample a node ▷ Sample positive example ▷ Sample negative example ▷ With W ∈ RV ×d ▷ Logistic gradient update repeat 3.4 VERSE Algorithm Algorithm 1 presents the overall flow of VERSE. Given a graph, a similarity function simG, and the embedding space dimension- ality d, we initialize the output embedding matrix W to N(0, 1 d ). Then, we optimize our objective (Equation 4) by gradient descent using the NCE algorithm discussed in the previous section. To do so, we repeatedly sample a node from the positive distribution P, sample the simG (e.g. pick a neighboring node), and draw s nega- tive examples. The σ in Line 13 represents the sigmoid function σ = (1 + e−x )−1, and λ the learning rate. We choose P and Q to be distributed uniformly by U(1, n). VERSE: Versatile Graph Embeddings from Similarity Measures WWW 2018, April 23–27, 2018, Lyon, France As a strong baseline for applications handling smaller graphs, we also consider an elaborate, exhaustive variant of VERSE, which computes full similarity distribution vectors per node instead of performing NCE-based sampling. We name this variant fVERSE and include it in our experimental study. Figure 3 presents our measures on the ability to reconstruct a similarity matrix for (i) VERSE using NCE; (ii) VERSE using Nega- tive Sampling (NS) (also used in Node2vec); and (ii) the exhaustive fVERSE variant. We observe that, while NCE approaches the ex- haustive method in terms of matching the ground truth top-100 most similar nodes, NS fails to deliver the same quality. 1 0.8 0.6 0.4 k @ G C D N full VERSE NS, s = 3 NCE, s = 3 NCE, s = 100 20 40 60 80 100 Figure 3: Ranking preformance in terms of NDCG for recon- structing PPR similarity, averaged across nodes in a graph. k 3.5 Complexity Comparison Table 2 presents the average (Θ) and worst-case (O) time and space complexity of VERSE, along with those of methods in previous works; d is the embedding dimensionality, n the number of nodes, m the number of edges, and s the number of samples used, and t the number of iterations in GraRep. Methods that rely on fast sampling (VERSE and LINE) require time linear in n and space quadratic in n in the worst case. DeepWalk requires O(n log n) time due to its use of hierarchical softmax. Node2vec stores the neighbors-of-a- neighbor, incurring a quadratic cost in sparse graphs, but cubic in dense graphs. Thus, VERSE comes at the low end of complexities compared to previous work on graph embeddings. Remarkably, even the computationally expensive fVERSE affords complexity comparable to some previous works. Time O Space dn log n dn log n Θ method DeepWalk GraRep LINE Node2vec HOPE fVERSE VERSE Table 2: Comparison of neural embedding methods in terms of average (Θ) and worst-case (O) time and space complexity. tn3 dsn dsn d2n2 dn2 dsn tn3 dsn dsn d2m dn2 dsn Θ m n2 m m2 n m n2 m O n2 n2 n2 n3 n2 n2 n2 3.6 Similarity Notions in Previous Approaches Here, we provide additional theoretical considerations of VERSE compared to LINE [41], DeepWalk [37] and Node2vec [15] and demonstrate how our general model subsumes and extends previous research in versatility and scalability. Comparison with DeepWalk and Node2vec. DeepWalk and Node2vec generate samples from random walks of fixed window size w by the word2vec sampling strategy [29]. We derive a re- lationship between the window size w of that strategy and the damping factor α of Personalized PageRank. Lemma 3.2. Let Xr be the random variable that represents the length of a random walk r sampled with parameter w by the word2vec sampling strategy. Then for any 0 < j ≤ w Pr(Xr = j) = 2 w(w + 1)(w − j + 1) (7) 2 2 i=1 i = w(w+1) each random walk amount to(cid:80)w Proof. For each node v ∈ V , word2vec strategy samples two random walks of length w starting from v ∈ V . These two random walks represents the context of v, where v is the central node of a walk of length 2w + 1. The model is then trained on increasing context size up to w. Therefore, the number of nodes sampled for . A node at distance 0 < j ≤ w is sampled (w − j + 1) times; thus, the final probability is w(w+1)(w − j + 1). □ Personalized PageRank provides the maximum likelihood esti- mation for the distribution in Equation 7 for α = w−1 w+1 . Then, w = 10 corresponds to α = 0.82, which is close to the standard α = 0.85, proved effective in practice [10]. On the other hand, α = 0.95, which, for example, achieves the best performance on a task in Section 4.2, corresponds to w = 39. Such large w prohibitively increases the computation time for DeepWalk and Node2vec. Comparison with LINE. LINE introduces the concept of first- and second-order proximities to model complex node relationships. As we discussed, in VERSE, first-order proximity corresponds to the dot-product among the similarity vectors in the embedding space: simE(u, v) = Wu · Wv On the other hand, second-order proximity corresponds to let- ting VERSE learn one more matrix W ′, so as to model asymmetric similarities of nodes in the embedding space. We do that by defining simE asymmetrically, using both W and W ′: ′ simE(u, v) = Wu · W v The intuition behind second-order proximity is the same as that of SimRank: similar nodes have similar neighborhoods. Every pre- vious method, except for LINE-1, used second-order proximities, due to the word2vec interpretation of embeddings borrowed by DeepWalk and Node2vec. In our model, second-order proximities can be encoded by adding an additional matrix; we empirically evaluate their effectiveness in Section 4. WWW 2018, April 23–27, 2018, Lyon, France Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller 4 EXPERIMENTS We evaluate VERSE against several state-of-the-art graph embed- ding algorithms. For repeatability purposes, we provide all data sets and the C++ source code for VERSE1, DeepWalk2 and Node2vec3. We run the experiments on an Amazon AWS c4.8 instance with 60Gb RAM. Each method is assessed on the best possible parame- ters, with early termination of the computation in case no result is returned within one day. We provide the following state-of-the-art graph embedding methods for comparison: • DeepWalk [37]: This approach learns an embedding by sam- pling random walks from each node, applying word2vec-based learning on those walks. We use the default parameters described in the paper, i.e., walk length t = 80, number of walks per node γ = 80, and window size w = 10. • LINE [41]: This approach learns a d-dimensional embedding in two steps , both using adjacency similarity. First, it learns d/2 dimensions using first-order proximity; then, it learns another d/2 features using second-order proximity. Last, the two halves are normalized and concatenated. We obtained a copy of the code4 and run experiments with total T = 1010 samples and s = 5 negative samples, as described in the paper. • GraRep [11]: This method factorizes the full adjacency similarity matrix using SVD, multiplies the matrix by itself, and repeats the process t times. The final embedding is obtained by concatenating the factorized vectors. We use t = 4 and 32 dimensions for each SVD factorization; thus, the final embedding has d = 128. • HOPE [33]: This method is a revised Singular Value Decomposi- tion restricted to sparse similarity matrices. We report the results obtained running HOPE with the default parameters, i.e, Katz simi- larity (an extension of Katz centrality [23]) as the similarity measure and β inversely proportional to the spectral radius. Since Katz simi- larity does not converge on directed graphs with sink nodes, we used Personalized PageRank with α = 0.85 for the CoCit dataset. • Node2vec [15]: This is a hyperparameter-supervised approach that extends DeepWalk by adding two parameters, p and q, so as to control DeepWalk's random walk sampling. The special case with parameters p = 1, q = 1 corresponds to DeepWalk; yet, sometimes Node2vec shows worse performance than DeepWalk in our evalu- ation, due to the fact it uses negative sampling, while DeepWalk uses hierarchical softmax. We fine-tuned the hyperparameters p and q on each dataset and task. Moreover, we used a large train- ing data to fairly compare to DeepWalk, i.e., walk length l = 80, number of walks per node r = 80, and window size w = 10. Baselines. In addition to graph embeddings methods, we imple- mented the following baselines. • Logistic regression: We use the well-known logistic regression method as a baseline for link prediction. We train the model on a set of common node-specific features, namely node degree, number of common neighbors, Adamic-Adar, Jaccard coefficient, preferential attachment, and resource allocation index [27, 28]. 1https://github.com/xgfs/verse 2https://github.com/xgfs/deepwalk-c 3https://github.com/xgfs/node2vec-c 4https://github.com/tangjianpku/LINE dataset BlogCatalog CoCit CoAuthor VK YouTube Orkut Statistics Size L Avg. degree Mod. E V 0.24 39 334k 10k 0.72 195k 15 44k 178k - 0.84 52k 0.47 2.7M 2 79k 0.71 1.1M 3M 47 3.1M 234M 50 0.68 64.8 8.86 6.94 34.1 5.25 70 Density 6.3 × 10−3 2.0 × 10−4 1.3 × 10−4 8.7 × 10−4 9.2 × 10−6 2.4 × 10−5 2 Table 3: Dataset characteristics: number of vertices V , num- ber of edges E; number of node labels L; average node de- gree; modularity [32]; density defined as E/(cid:0)V (cid:1). • Louvain community detection [9]: We employ a standard par- tition method for community detection as a baseline for graph clustering, reporting the best partition in terms of modularity [32]. Parameter settings. In line with previous research [15, 37, 41] we set the embedding dimensionality d to 128. The learning procedure (Algorithm 1, Line 3) is run 105 times for VERSE and 250 times for fVERSE; the difference in setting is motivated by the number of model updates which is O(n) in VERSE and O(n2) in fVERSE. We use LIBLINEAR [13] to perform logistic regression with default parameter settings. Unlike previous work [15, 37, 41] we employ a stricter assumption for multi-label node classification: the number of correct classes is not known apriori, but found through the Label Powerset multi-label classification approach [45]. For link prediction and multi-label classification, we evaluated each individual embedding 10 times in order to reduce the noise introduced by the classifier. Unless otherwise stated, we run each experiment 10 times, and report the average value among the runs. Throughout our experimental study, we use the above parameters as default, unless indicated otherwise. Datasets. We test our methods on six real datasets; we report the main data characteristics in Table 3. • BlogCatalog [54] is a network of social interactions among blog- gers in the BlogCatalog website. Node-labels represent topic cate- gories provided by authors. • Microsoft Academic Graph [1] is a network of academic papers, citations, authors, and affiliations from Microsoft Academic website released for the KDD-2016 cup. It contains 150 million papers up to February 2016 spanning various disciplines from math to biology. We extracted two separate subgraphs from the original network, using 15 conferences in data mining, databases, and machine learn- ing. The first, CoAuthor, is a co-authorship network among authors. The second, CoCit, is a network of papers citing other papers; labels represent conferences in which papers were published. • VK is a Russian all-encompassing social network. We extracted two snapshots of the network in November 2016 and May 2017 to obtain information about link appearance. We use the gender of the user for classification and country for clustering. • YouTube [43] is a network of social interactions among users of the YouTube video platform. The labels represent groups of viewers by video genres. • Orkut [52] is a network of social interactions among users of the Orkut social network platform. The labels represent communities of users. We extracted the 50 biggest communities and use them as labels for classification. VERSE: Versatile Graph Embeddings from Similarity Measures WWW 2018, April 23–27, 2018, Lyon, France Evaluation methodology. The default form of VERSE runs Per- sonalized PageRank with α = 0.85. For the sake of fairness, we design a hyperparameter-supervised variant of VERSE, by analogy to the hyperparameter-tuned variant of DeepWalk introduced by Node2vec [15]. This variant, hsVERSE, selects the best simi- larity with cross-validation across two proximity orders (as dis- cussed in Section 3.6) and three similarities (Section 3.3) with α∈{0.45, 0.55, 0.65, 0.75, 0.85, 0.95} for simPPR G and C ∈ {0.15, 0.25, 0.35, 0.45, 0.55, 0.65} for simSR G . Operator Result (a + b)/2 Average [a1, . . . , ad , b1, . . . , bd] Concat [a1 ∗ b1, . . . , ad ∗ bd] Hadamard [a1 − b1, . . . , ad − bd ] Weighted L1 [(a1 − b1)2, . . . , (ad − bd)2] Weighted L2 Table 4: Vector operators used for link-prediction task for each u, v ∈ V and corresponding embeddings a, b ∈ Rd . Average Concat Hadamard 80.06 79.16 68.43 74.87 77.49 74.90 79.52 77.07 method fVERSE VERSE DeepWalk GraRep LINE HOPE hsVERSE Node2vec Feature Eng. Table 5: Link prediction results on the CoAuthor coauthor- ship graph. Best results per method are underlined. 86.71 85.69 66.54 82.24 77.73 74.81 86.15 79.42 77.53 L1 84.49 71.93 79.06 80.03 70.55 74.34 76.45 81.25 L2 84.97 72.11 78.11 80.05 71.83 74.81 76.72 80.85 79.69 78.79 68.06 74.91 77.39 74.83 79.10 76.67 74.81 73.66 69.92 75.13 71.90 74.02 71.22 L1 78.49 74.11 78.38 63.77 71.22 73.04 78.38 Average Concat Hadamard 74.94 73.78 70.05 75.17 71.89 74.14 71.29 method fVERSE VERSE DeepWalk LINE HOPE hsVERSE Node2vec Feature Eng. Table 6: Link prediction results on the VK social graph. Best results per method are underlined. 80.77 79.71 69.79 72.54 70.22 80.26 72.43 78.84 L2 79.13 74.56 77.37 64.47 70.63 73.53 78.66 4.1 Link Prediction Link prediction is the task of anticipating the appearance of a link between two nodes in a network. Conventional measures for link prediction include Adamic-Adar, Preferential attachment, Katz, and Jaccard coefficient. We train a Logistic regression classifier on edge- wise features obtained with the methods shown in Table 4. For instance, for a pair of nodes u, v, the Concat operator returns a vector as the sequential concatenation of the embeddings f (u) and labelled nodes, % method 9% fVERSE 32.24 VERSE 31.83 31.43 DeepWalk 30.79 GraRep 28.80 LINE 28.58 HOPE hsVERSE 31.92 32.04 Node2vec Table 7: Multi-class classification results in CoCit dataset. 5% 31.01 30.67 30.37 30.24 27.89 27.59 30.67 30.82 3% 29.83 29.42 29.27 29.21 26.90 26.63 29.45 29.66 7% 31.68 31.32 31.04 30.23 28.49 28.19 31.38 31.54 1% 27.52 27.32 26.81 27.68 23.68 22.81 27.46 27.45 f (v). On the CoAuthor data, we predict new links for 2015 and 2016 co-authorships, using the network until 2014 for training; on VK, we predict whether a new friendship link appears between November 2016 and May 2017, using 50% of the new links for training and 50% for testing. We train the binary classifier by sampling non-existing edges as negative examples. Tables 5 and 6 report the attained accuracy. As a baseline, we use a logistic regression classifier trained on the respective data sets' features. VERSE with Hadamard product of vectors is consistently the best edge representation. We attribute this quality to the explicit re- construction we achieve using noise contrastive estimation. VERSE consistently outperforms the baseline in the tested datasets. Be- sides, the hyperparameter-supervised hsVERSE variant outruns Node2vec on all datasets. 4.2 Node Classification We now conduct an extensive evaluation on classification and report results for all the methods, where possible, with the CoCit, VK, YouTube, and Orkut graphs. Node classification aims to predict of the correct node labels in a graph, as described previously in this section. We evaluate accuracy by the Micro-F1 and Macro-F1 percentage measures. We report only Macro-F1, since we experience similar behaviors with Micro-F1. For each dataset we conduct multiple experiments, selecting a random sample of nodes for training and leaving the remaining nodes for testing. The results for four datasets, shown in Tables 7-10, exhibit similar trends: VERSE yields predic- tions comparable or superior to those of the other contestants, while it scales to large networks such as Orkut. LINE outperforms VERSE only in VK, where the gender of users is better captured using the direct neighborhood. The hyperparameter-supervised variant, hs- VERSE, is on a par with Node2vec in terms of quality on CoCit and VK; on the largest datasets YouTube and Orkut, hsVERSE keeps outperforming unsupervised alternatives, while Node2vec depletes the memory. 4.3 Node Clustering Graph clustering detects groups of nodes with similar characteris- tics [9, 32]. We assess the embedding methods, using the k-means algorithm with k-means++ initialization [5] to cluster the embedded points in a d-dimensional space. Table 11 reports the Normalized Mutual Information (NMI) with respect to the original label distri- bution. On CoAuthor, VERSE has comparable performance with DeepWalk; yet on VK, VERSE outperforms all other methods. WWW 2018, April 23–27, 2018, Lyon, France Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller labelled nodes, % method fVERSE VERSE DeepWalk LINE HOPE hsVERSE Node2vec 9% 62.50 62.13 62.49 64.23 57.68 63.16 63.30 Table 8: Multi-class classification results in VK dataset. 5% 61.74 61.43 61.79 63.58 57.04 62.50 62.62 3% 61.01 60.53 60.93 62.83 56.65 61.67 61.79 7% 62.26 61.86 62.17 64.01 57.40 62.97 63.04 1% 58.32 57.89 58.22 60.39 54.88 58.87 58.85 labelled nodes, % method VERSE DeepWalk LINE HOPE hsVERSE Table 9: Multi-label classification results in YouTube dataset. 5% 24.07 22.89 18.69 15.09 25.40 7% 25.07 23.64 19.84 16.18 27.38 9% 25.99 24.54 20.64 16.78 29.09 3% 22.26 21.55 17.36 13.80 22.84 1% 17.92 18.16 13.71 9.22 18.16 labelled nodes, % method VERSE DeepWalk LINE hsVERSE Table 10: Multi-class classification results in Orkut dataset. 5% 29.60 29.63 32.34 32.73 7% 31.46 30.60 32.92 34.00 9% 32.63 31.27 33.65 35.20 3% 28.22 27.99 30.89 30.70 1% 25.16 24.21 26.79 27.73 We also assess graph embeddings on their ability to capture the graph community structure. We apply k-means with different k values between 2 and 50 and select the best modularity [32] score. Table 12 presents our results, along with the modularity obtained by the Louvain method, the state-of-the-art modularity maximization algorithm [9]. VERSE variants produce result almost equal that those of Louvain, outperforming previous methods, while the three methods that could manage the Orkut data perform similarly. method fVERSE VERSE DeepWalk LINE GraRep HOPE hsVERSE Node2vec Louvain CoCit 33.22 32.93 34.33 18.79 27.43 19.05 33.24 32.84 30.73 VK 9.24 7.62 7.59 7.49 - 6.47 8.77 8.05 4.54 Table 11: Node clustering results in terms of NMI. 4.4 Graph Reconstruction Good graph embeddings should preserve the graph structure in the embedding space. We evaluate the performance of our method on reconstructing the graph's adjacency matrix. Since each adjacent YouTube Orkut method fVERSE VERSE DeepWalk LINE GraRep HOPE hsVERSE Node2vec Louvain Table 12: Node clustering results in terms of modularity. CoCit CoAuthor 70.12 69.43 70.04 60.02 67.61 42.45 69.81 70.06 72.05 VK 44.59 45.78 43.30 39.65 - 21.70 45.84 44.27 46.60 - 67.63 58.08 63.40 - 37.94 69.13 - 71.06 80.95 79.25 73.83 71.58 77.40 69.57 79.31 75.78 84.29 - 42.64 44.66 42.59 - - - - - node should be close in the embedding space, we first sort any node other than the one considered by decreasing cosine distance among the vectors. Afterwards, we take a number of nodes equal to the actual degree of the node in the graph and connect to the considered node to create the graph structure. Table 13 reports the relative accuracy measured as the number of correct nodes in the neighborhood of a node in the embedding space. Again, VERSE performs comparably well; its exhaustive variant, fVERSE, which harnesses the full similarity does even better; however, the top performer is hsVERSE, which achieves the obtained result when instantiated to the Adjacency Similarity. This result is unsurprising, given that the adjacency similarity measure tailors hsVERSE for the task of graph reconstruction. YouTube Orkut method fVERSE VERSE DeepWalk LINE GraRep HOPE hsVERSE Node2vec CoCit CoAuthor 88.96 58.73 51.54 23.32 67.61 25.88 97.53 66.35 - 18.39 19.75 10.82 - - 28.81 - Table 13: Graph reconstruction % for all datasets. VK 66.45 50.18 43.04 42.80 - 12.01 78.38 53.70 98.20 74.30 68.44 62.01 77.40 49.70 98.91 72.70 - 28.64 32.21 17.76 - 33.42 38.34 - 4.5 Parameter Sensitivity We also evaluate the sensitivity of VERSE to parameter choice. Figures 4(a),4(b) depict node classification performance in terms of Micro-F1 on the BlogCatalog dataset, with 10% of nodes labeled. The dimensionality d determines the size of the embedding, and hence the possibility to compute more fine-grained representa- tions. The performance grows linearly as the number of dimensions approaches 128, while with larger d we observe no further improve- ment. Sampled VERSE instead, performs comparably better than fVERSE in low dimensional spaces, but degrades as d becomes larger than 128; this behavior reflects a characteristic of node sam- pling that tends to preserve similarities of close neighborhoods in low-dimensional embeddings, while the VERSE leverages the entire graph structure for larger dimensionality The last parameter we study is the damping factor α which amounts to the inverse of the probability of restarting random walks from the initial node. As shown in Figure 4(b), the quality VERSE: Versatile Graph Embeddings from Similarity Measures WWW 2018, April 23–27, 2018, Lyon, France 1 F - o r c i M 0.4 0.3 0.2 0.1 0 2 fVERSE VERSE 4 8 16 32 64 128 256 512 1024 d (a) Dimensionality d 1 F - o r c i M 0.4 0.3 0.2 0.1 0 fVERSE VERSE DeepWalk Node2vec LINE-2 104 s d n o c e s 103 fVERSE VERSE 0.2 0.4 0.6 0.8 1 α (b) PPR damping factor α 102 104 105 nodes (c) Time, log scale 106 Figure 4: Classification performance of various parameters in Fig. 4(a), 4(b) and scalability of different methods in Fig. 4(c). ). LINE, and Node2vec. For each method, we report the total wall- clock time, with graph loading and necessary preprocessing steps included. We used LINE-2 time for fair comparison. As Figure 4 shows, VERSE is comfortably the most efficient and scalable method, processing 106 nodes in about 3 hours, while DeepWalk and LINE take from 6 to 15 hours. 4.7 Visualization Last, we show how different embeddings are visualized on a plane. We apply t-SNE [47] with default parameters to each embedding for a subset of 1500 nodes from the CoCit dataset, equally distributed in 5 classes (i.e., conferences); we set the density areas for each class by Kernel Density Estimation. Figure 5 depicts the result. VERSE produces well separated clusters with low noise, even finding dis- tinctions among papers of the same community, namely ICDE ( ) and VLDB ( 5 CONCLUSIONS We introduced a new perspective on graph embeddings: to be ex- pressive, a graph embedding should capture some similarity mea- sure among nodes. Armed with this perspective, we developed a scalable embedding algorithm, VERSE. In a departure from previous works in the area, VERSE aims to reconstruct the distribution of any chosen similarity measure for each graph node. Thereby, VERSE brings in its scope a global view of the graph, while substantially reducing the number of parameters required for training. VERSE attains linear time complexity, hence it scales to large real graphs, while it only requires space to store the graph. Besides, we have shed light on some previous works on graph embeddings, looking at them and interpreting them through the prism of vertex similarity. Our thorough experimental study shows that, even instantiated with PPR as a default similarity notion, VERSE consistently out- performs state-of-the-art approaches for graph embeddings in a plethora of graph tasks, while a hyperparameter-supervised vari- ant does even better. Thus, we have provided strong evidence that embeddings genuinely based on vertex similarity address graph mining challenges better than others. Figure 5: Visualizations of a subset of nodes from CoCit graph with selected conferences: VLDB, ICDE, KDD, WWW, and NIPS. Note that the number of nodes per class is the same for all conferences. of classification accurary is quite robust with respect to α for both VERSE and fVERSE, only compromised by extreme values. An α value close to 0 reduces PPR to an exploration of the immediate neighborhood of the node. On the other hand, a value close to 1 amounts to regular PageRank, deeming all nodes as equally im- portant. This result vindicates our work and distinguishes it from previous methods based on local neighborhood expansion. 4.6 Scalability We now present runtime results on synthetic graphs of growing size, generated by the Watts Strogatz model [50], setting VERSE against scalable methods with C++ implementations, namely DeepWalk, WWW 2018, April 23–27, 2018, Lyon, France Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller REFERENCES [1] 2016. Microsoft Academic Graph - KDD cup 2016. azurewebsites.net/Data. (2016). Accessed: 2016-04-30. https://kddcup2016. [2] Sami Abu-El-Haija, Bryan Perozzi, and Rami Al-Rfou. 2017. Learning Edge Representations via Low-Rank Asymmetric Projections. CIKM (2017). [3] Amr Ahmed, Nino Shervashidze, Shravan Narayanamurthy, Vanja Josifovski, and Alexander J Smola. 2013. Distributed large-scale natural graph factorization. In WWW. ACM, 37–48. [4] Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball: Spotting anomalies in weighted graphs. In PAKDD. 410–421. [5] David Arthur and Sergei Vassilvitskii. 2007. k-means++: The advantages of careful seeding. In SIAM. 1027–1035. [6] Mikhail Belkin and Partha Niyogi. 2001. Laplacian eigenmaps and spectral techniques for embedding and clustering. In NIPS. 585–591. [7] Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. TPAMI (2013), 1798–1828. [8] Yoshua Bengio, Réjean Ducharme, Pascal Vincent, and Christian Jauvin. 2003. A neural probabilistic language model. JMLR (2003), 1137–1155. [9] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefeb- vre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 10 (2008). [10] Sergey Brin and Lawrence Page. 1998. The anatomy of a large-scale hypertextual Web search engine. Computer Networks and ISDN Systems (1998), 107 – 117. [11] Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2015. GraRep: Learning Graph Repre- sentations with Global Structural Information. In CIKM. 891–900. [12] Shaosheng Cao, Wei Lu, and Qiongkai Xu. 2016. Deep Neural Networks for Learning Graph Representations. In AAAI. 1145–1152. [13] Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin. 2008. LIBLINEAR: A library for large linear classification. JMLR 9, Aug (2008), 1871–1874. [14] Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT [28] Linyuan Lü and Tao Zhou. 2011. Link prediction in complex networks: A survey. Physica A: Statistical Mechanics and its Applications 390, 6 (2011), 1150–1170. [29] Tomas Mikolov, Ilya Sutskever, Kai Chen, Gregory S. Corrado, and Jeffrey Dean. 2013. Distributed Representations of Words and Phrases and their Composition- ality. In NIPS. 3111–3119. [30] Andriy Mnih and Yee Whye Teh. 2012. A fast and simple algorithm for training neural probabilistic language models. In ICML. 1751–1758. [31] Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu, and Santhoshkumar Saminathan. 2016. subgraph2vec: Learning distributed represen- tations of rooted sub-graphs from large graphs. arXiv preprint arXiv:1606.08928 (2016). [32] Mark EJ Newman. 2006. Modularity and community structure in networks. PNAS (2006), 8577–8582. [33] Mingdong Ou, Peng Cui, Jian Pei, Ziwei Zhang, and Wenwu Zhu. 2016. Asym- [34] Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The metric transitivity preserving graph embedding. In KDD. 1105–1114. PageRank citation ranking: bringing order to the web. (1999). [35] Jeffrey Pennington, Richard Socher, and Christopher D Manning. 2014. Glove: Global Vectors for Word Representation.. In EMNLP. 1532–1543. [36] Bryan Perozzi, Leman Akoglu, Patricia Iglesias Sánchez, and Emmanuel Müller. 2014. Focused clustering and outlier detection in large attributed graphs. In KDD. 1346–1355. [37] Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. 2014. DeepWalk: online learning of social representations. In KDD. 701–710. [38] Leonardo FR Ribeiro, Pedro HP Saverese, and Daniel R Figueiredo. 2017. struc2vec: Learning node representations from structural identity. In KDD. ACM, 385–394. [39] Sam T Roweis and Lawrence K Saul. 2000. Nonlinear dimensionality reduction by locally linear embedding. science 290, 5500 (2000), 2323–2326. [40] Jiliang Tang and Huan Liu. 2012. Unsupervised Feature Selection for Linked Social Media Data. In KDD. 904–912. [41] Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. 2015. LINE: Large-scale Information Network Embedding. In WWW. 1067–1077. [42] Lei Tang and Huan Liu. 2009. Relational learning via latent social dimensions. In [43] Lei Tang and Huan Liu. 2009. Scalable learning of collective behavior based on sparse social dimensions. In CIKM. 1107–1116. [44] Joshua B Tenenbaum, Vin De Silva, and John C Langford. 2000. A global geometric framework for nonlinear dimensionality reduction. science 290, 5500 (2000), 2319– 2323. [45] Grigorios Tsoumakas and Ioannis Katakis. 2006. Multi-label classification: An overview. IJDWM 3, 3 (2006). [46] Cunchao Tu, Weicheng Zhang, Zhiyuan Liu, and Maosong Sun. 2016. Max- Margin DeepWalk: Discriminative Learning of Network Representation. In IJCAI. 3889–3895. [47] L.J.P. van der Maaten and G.E. Hinton. 2008. Visualizing High-Dimensional Data Using t-SNE. Journal of Machine Learning Research 9 (2008), 2579–2605. [48] Daixin Wang, Peng Cui, and Wenwu Zhu. 2016. Structural Deep Network Em- bedding. In KDD. 1225–1234. [49] Suhang Wang, Charu Aggarwal, Jiliang Tang, and Huan Liu. 2017. Attributed Signed Network Embedding. CIKM (2017). [50] Duncan J Watts and Steven H Strogatz. 1998. Collective dynamics of 'small-world' networks. Nature 393 (1998), 440–442. [51] Shuicheng Yan, Dong Xu, Benyu Zhang, Hong-Jiang Zhang, Qiang Yang, and Stephen Lin. 2007. Graph embedding and extensions: A general framework for dimensionality reduction. TPAMI 29, 1 (2007). [52] Jaewon Yang and Jure Leskovec. 2015. Defining and evaluating network com- munities based on ground-truth. Knowledge and Information Systems 42 (2015), 181–213. [53] Wayne W Zachary. 1977. An information flow model for conflict and fission in small groups. Journal of anthropological research 33, 4 (1977), 452–473. [54] R. Zafarani and H. Liu. 2009. Social Computing Data Repository at ASU. (2009). http://socialcomputing.asu.edu [55] Daokun Zhanga, Jie Yinb, Xingquan Zhuc, and Chengqi Zhanga. 2017. User profile preserving social network embedding. In IJCAI. [15] Aditya Grover and Jure Leskovec. 2016. node2vec: Scalable Feature Learning for KDD. 817–826. Press. Networks. In KDD. 855–864. [16] Michael Gutmann and Aapo Hyvärinen. 2010. Noise-contrastive estimation: A new estimation principle for unnormalized statistical models.. In AISTATS. 297–304. [17] Michael U Gutmann and Aapo Hyvärinen. 2012. Noise-contrastive estimation of unnormalized statistical models, with applications to natural image statistics. JMLR 13 (2012), 307–361. [18] Keith Henderson, Brian Gallagher, Lei Li, Leman Akoglu, Tina Eliassi-Rad, Hang- hang Tong, and Christos Faloutsos. 2011. It's who you know: graph mining using recursive structural features. In KDD. 663–671. [19] Jiafeng Hu, CK Cheng, Zhipeng Huang, Yixiang Fang, and Siqiang Luo. 2017. On Embedding Uncertain Graphs. In CIKM. ACM. [20] Xiao Huang, Jundong Li, and Xia Hu. 2017. Label informed attributed network embedding. In WSDM. ACM, 731–739. [21] Glen Jeh and Jennifer Widom. 2002. SimRank: a measure of structural-context similarity. In KDD. 538–543. [22] Minhao Jiang, Ada Wai-Chee Fu, and Raymond Chi-Wing Wong. 2017. READS: a random walk approach for efficient and accurate dynamic SimRank. VLDB 10, 9 (2017), 937–948. [23] Leo Katz. 1953. A new status index derived from sociometric analysis. Psychome- trika 18, 1 (1953), 39–43. [24] Alex Krizhevsky, Ilya Sutskever, and Geoffrey E Hinton. 2012. Imagenet classifi- cation with deep convolutional neural networks. 1097–1105. [25] Matthieu Labeau and Alexandre Allauzen. 2017. An experimental analysis of Noise-Contrastive Estimation: the noise distribution matters. EACL (2017). [26] John A. Lee and Michel Verleysen. 2007. Nonlinear Dimensionality Reduction (1st ed.). Springer Publishing Company, Incorporated. [27] Ryan N Lichtenwalter, Jake T Lussier, and Nitesh V Chawla. 2010. New perspec- tives and methods in link prediction. In KDD. 243–252.
1505.07478
1
1505
2015-05-27T20:05:21
Generalized communities in networks
[ "cs.SI", "cond-mat.stat-mech", "physics.soc-ph" ]
A substantial volume of research has been devoted to studies of community structure in networks, but communities are not the only possible form of large-scale network structure. Here we describe a broad extension of community structure that encompasses traditional communities but includes a wide range of generalized structural patterns as well. We describe a principled method for detecting this generalized structure in empirical network data and demonstrate with real-world examples how it can be used to learn new things about the shape and meaning of networks.
cs.SI
cs
Generalized communities in networks M. E. J. Newman1, 2 and Tiago P. Peixoto3 1Department of Physics and Center for the Study of Complex Systems, University of Michigan, Ann Arbor, MI 48109, U.S.A. 2Santa Fe Institute, 1399 Hyde Park Road, Santa Fe, NM 87501, U.S.A. 3Institut fur Theoretische Physik, Universitat Bremen, Hochschulring 18, D-28359 Bremen, Germany A substantial volume of research has been devoted to studies of community structure in networks, but communities are not the only possible form of large-scale network structure. Here we describe a broad extension of community structure that encompasses traditional communities but includes a wide range of generalized structural patterns as well. We describe a principled method for detecting this generalized structure in empirical network data and demonstrate with real-world examples how it can be used to learn new things about the shape and meaning of networks. The detection and analysis of large-scale structure in networks has been the subject of a vigorous research effort in recent years, in part because of the highly successful application of ideas drawn from statistical physics [1, 2]. Particular energy has been devoted to the study of community structure, meaning the division of networks into densely connected subgroups, a common and revealing feature, especially in social and biological networks [3]. Community structure is, however, only one of many possibilities where real-world networks are con- cerned. In this paper, we describe a broad generaliza- tion of community structure that encompasses not only traditional communities but also overlapping or fuzzy communities, ranking or stratified structure, geometric networks, and a range of other structural types, yet is easily and flexibly detected using a fast, mathematically principled procedure which we describe. We give demon- strative applications of our approach to both computer- generated test networks and real-world examples. Community structure can be thought of as a division of the nodes of a network into disjoint groups such that the probability of an edge is higher between nodes in the same group than between nodes in different groups. For instance, one can generate artificial networks with community structure using the stochastic block model, a mathematical model that follows exactly this principle. In the stochastic block model the nodes of a network are divided into k groups, with a node being assigned to group r with some probability γr for r = 1 . . . k, and then edges are placed between node pairs independently with probabilities prs where r and s are the groups the nodes fall in. If the diagonal probabilities prr are larger than the off-diagonal ones, we get traditional community structure. Alternatively, however, one can also look at the stochastic block model another way: imagine that we as- sign each node a random node parameter x between zero and one and edges are placed between node pairs with a probability ω(x, y) that is a function of the node param- eters x and y of the pair. If ω(x, y) is piecewise constant with k2 rectangular regions of size γrγs and value prs, then this model is precisely equivalent to the traditional block model. But this prompts us to ask what is so spe- cial about piecewise constant functions? It is certainly possible that some networks might contain structure that is better captured by functions ω(x, y) of other forms. Why not let ω(x, y) take a more general functional form, thereby creating a generalized type of community struc- ture that includes the traditional type as a subset but can also capture other structures as well? This is the fun- damental idea behind the generalized structures of this paper: edge probabilities are arbitrary functions of con- tinuous node parameters. The idea is related to two threads of work in the previ- ous literature. One, in sociology and statistics, concerns “latent space” models, in which nodes in a network are lo- cated somewhere in a Euclidean space and are more likely to be connected if they are spatially close than if they are far apart [4]. A specific functional form is typically as- sumed for the connection probability and the model is fitted to data using Monte Carlo methods. The other thread, in the mathematics literature, concerns so-called “graphon” models and does not deal with the analysis of empirical data but with the mathematical properties of models, showing in particular that models of a kind simi- lar to that described here are powerful enough to capture the properties of any theoretical ensemble of networks in the limit of large size, at least in the case where the net- works are dense [5, 6]. In this paper, we define a specific model of general- ized community structure and a method for fitting it to empirical data using Bayesian inference. The fit places each node of the network in the “latent space” of the node parameters x and, simultaneously, gives us an esti- mate of the probability function ω(x, y). Between them, these two outputs tell us a great deal about the struc- ture a network possesses and the role each node plays within that structure. The method is computationally efficient, allowing for its application to large networks, and provides significantly more insight than the tradi- tional community division into discrete groups, or even recent generalizations to overlapping groups [7, 8]. We begin by defining a model that generates networks with the generalized community structure we are inter- ested in. The model follows the lines sketched above, but with some crucial differences. We take n nodes and for each node u we generate a node parameter xu uniformly at random in the interval [0, 1]. Then between each pair of nodes u, v we place an undirected edge with probabil- ity puv = dudv 2m ω(xu, xv), (1) where du, dv are the degrees of the nodes, m = 1 is the total number of edges in the network, and ω(x, y) is a function of our choosing, which we will call the edge function. Note that ω(x, y) must be symmetric with re- spect to its arguments for an undirected network such as this. 2 Pu du The inclusion of the degrees is necessary to accom- modate the fitting of networks with broad degree dis- tributions (which includes essentially all real-world net- works [9, 10]). Without it, the model effectively assumes a Poisson degree distribution, which is a poor fit to most networks and can cause the calculation to fail [11]. The factor dudv/2m is the probability of an edge between nodes with degrees du, dv if edges are placed at ran- dom [2]. Hence ω(xu, xv) parametrizes the variation of the probability relative to this baseline level and is typ- ically of order 1, making puv small in the limit where m becomes large. Given the model, we fit it to empirical network data us- ing the method of maximum likelihood. The probability or likelihood P (A, xω) that we generate a particular set of node parameters x = {xu} and a particular network structure described by the adjacency matrix A = {auv} is P (A, xω) = Yu<v uv (1 − puv)1−auv . pauv (2) To find the value of the edge function ω(x, y) that best fits an observed network we want to maximize the marginal likelihood P (Aω) = Z P (A, xω) dnx, (3) or equivalently its logarithm, whose maximum falls in the same place. Direct maximization leads to a set of implicit equations that are hard to solve, even numerically, so instead we employ the following trick. For any positive-definite function f (x), Jensen’s in- equality says that logZ f (x) dx ≥ Z q(x) log f (x) q(x) dx, (4) where q(x) is any probability distribution over x such marginal likelihood, Eq. (3), we get that R q(x) dx = 1. Applying (4) to the log of the logZ P (A, xω) dnx ≥ Z q(x) log dnx, (5) P (A, xω) q(x) where q(x) is any probability distribution over x. It is straightforward to verify that the exact equality is recov- ered, and hence the right-hand side maximized, when 2 q(x) = . (6) P (A, xω) R P (A, xω) dnx Further maximization with respect to ω then gives us the maximum of the marginal likelihood, which is the result we are looking for. Put another way, a double maximization of the right-hand side of (5) with respect to both q(x) and ω will achieve the desired result. And this double maximization can be conveniently achieved by alternately maximizing with respect to q(x) using (6) and with respect to ω by differentiating. This method, which is a standard one in statistics and machine learning, is called an expectation–maximization or EM algorithm [12]. It involves simply iterating these two operations from (for instance) a random initial con- dition until convergence. The converged value of the probability density q(x) has a nice physical interpre- tation. Combining Eqs. (3) and (6), we have q(x) = P (A, xω)/P (Aω) = P (xA, ω). In other words, q(x) is the posterior probability distribution on the node param- eters x given the observed network and the edge func- tion ω(x, y). It tells us the probability of any given as- signment x of parameters to nodes. It is this quantity that will in fact be our primary object of interest here. Substituting from Eqs. (1) and (2) into (5), keeping terms to leading order in small quantities and dropping overall constants, we can write the quantity to be maxi- mized as ZZ 1 0 Xuv quv(x, y)(cid:20)auv log ω(x, y) − dudvω(x, y) 2m (cid:21) dx dy, (7) where quv(x, y) = R q(x)δ(xu − x)δ(xv − y) dnx is the posterior marginal probability that nodes u, v have node parameters x, y respectively. The obvious next step is to maximize (7) by functional differentiation with respect to ω(x, y), but there is a problem. If we allow ω to take any form at all then it has an infinite number of degrees of freedom, which guarantees overfitting of the data. Put another way, physical intuition suggests that ω(x, y) should be smooth in some sense, and we need a way to impose that smoothness as a constraint on the op- timization. There are a number of ways we could achieve this, but a common one is to express the function in terms of a finite set of basis functions. For nonnegative functions such as ω a convenient basis is the Bernstein polynomials of degree N : Bk(x) = (cid:18)N k(cid:19)xk(1 − x)N −k, k = 0 . . . N. (8) The Bernstein polynomials form a complete basis for polynomials of degree N and are nonnegative in [0, 1], 3 in the common case of a sparse network with m ∝ n. The integrals in Eq. (13) we perform numerically, using standard Gauss–Legendre quadrature. This, in principle, describes a complete algorithm for fitting the model to observed network data, but in prac- tice the procedure is cumbersome because of the denom- inator of Eq. (6), which involves an n-dimensional in- tegral, where n is the number of nodes in the network, which is typically large. The traditional solution to this problem is to subsample the distribution q(x) approxi- mately using Monte Carlo importance sampling. Here, however, we use a different approach proposed recently by Decelle et al. [13], which employs belief propagation and returns good results while being markedly faster than Monte Carlo. The method focuses on a function ηu→v(x), called the belief, which represents the probability that node u has node parameter x if node v is removed from the network. The removal of node v allows us to write a self-consistent set of equations whose solution gives us the beliefs. The equations are a straightforward generaliza- tion to the present model of those given by Decelle et al.: ηu→v(x) = 1 Zu→v exp(cid:18)−Xw dudw Z 1 0 qw(y)ω(x, y) dy(cid:19) Z 1 0 × Yw(6=v) auw=1 ηw→u(y)ω(x, y) dy, (14) where qw(y) is again the marginal posterior probability for node w to have node parameter y and as before we have dropped terms beyond leading order in small quanti- ties. The quantity Zu→v is a normalizing constant which ensures that the beliefs integrate to unity: Zu→v = Z 1 0 dudw Z 1 0 qw(y)ω(x, y) dy(cid:19) ηw→u(y)ω(x, y) dy dx. (15) exp(cid:18)−Xw Z 1 × Yw(6=v) 0 The belief propagation method consists of the iteration of these equations to convergence starting from a suitable initial condition (normally the current best estimate of the beliefs). The equations are exact on networks that take the form of trees, or on locally tree-like networks in the limit of large network size (where local neighborhoods of arbitrary size are trees). On other networks, they are approximate only, but in practice give excellent results. Once we have the values of the beliefs, the crucial two- node marginal probability quv(x, y) is given by quv(x, y) = RR 1 ηu→v(x)ηv→u(y)ω(x, y) 0 ηu→v(x)ηv→u(y)ω(x, y) dx dy . (16) Armed with these quantities for every node pair con- nected by an edge, we can evaluate µ(x, y) and ν(x) from Qjk(x, y) = , (12) auw=1 cjkBj(x)Bk(y) Pjk cjkBj(x)Bk(y) so a linear combination PN k=0 ckBk(x) is also nonnega- tive provided ck ≥ 0 for all k. Our edge function ω(x, y) is a function of two variables, so we will write it as a double expansion in Bernstein polynomials ω(x, y) = N Xj,k=0 cjkBj(x)Bk(y), (9) which again is nonnegative for cjk ≥ 0. Bernstein poly- nomials have excellent stability properties under fluctu- ations of the values of the expansion coefficients, which makes them ideal for statistical applications such as ours. Note that since ω(x, y) is symmetric with respect to its arguments we must have cjk = ckj . If ω(x, y) is constrained to take this form, then in- stead of the unconstrained maximization of (7) we now want to maximize with respect to the coefficients cjk. To do this, we substitute from (9) into (7) and apply Jensen’s inequality again, this time in its summation form logPi fi ≥ Pi Qi log fi/Qi. Then, by the same argument as previously, we find that the optimal coeffi- cient values are given by the double maximization with respect to cjk and Qjk(x, y) of ZZ 1 0 µ(x, y)Xjk −ZZ 1 0 ν(x)ν(y)Xjk Qjk(x, y) log cjkBj(x)Bk(y) Qjk(x, y) dx dy cjkBj(x)Bk(y) dx dy, (10) where µ(x, y) = 1 2m Xuv auvquv(x, y), ν(x) = 1 2m Xu duqu(x), (11) and qu(x) = n−1PvR quv(x, y)dy is the marginal proba- bility that node u has node parameter x. The maximiza- tion with respect to Qjk(x, y) is achieved by setting and the maximization with respect to cjk is achieved by differentiating, which gives cjk = RR µ(x, y)Qjk(x, y) dx dy R ν(x)Bj (x) dxR ν(y)Bk(y) dy . (13) Since all quantities on the right of this equation are non- negative, cjk ≥ 0 for all j, k and hence ω(x, y) ≥ 0, as required. The calculation of the optimal values of the cjk is a matter of iterating Eqs. (12) and (13) to convergence, starting from the best current estimate of the coefficients. Note that the quantities µ and ν need be calculated only once each time around the EM algorithm, and both can be calculated in time linear in the size of the network (a) Group 1 Group 2 Group 3 ω(x, y) (b) Head (c) Tail FIG. 1: (a) Left: density plot of the posterior marginal prob- ability densities qu(x) that node u has node parameter x for an application of our algorithm to a 600-node stochastic block model with three groups. Colors indicate the probabilities and there are 600 columns, one for each node. Right: density plot of the edge function ω(x, y). (b) The neural network of the worm C. elegans, drawn in real space, as it falls within the body of the worm. Colors represent the average values of the node parameters xu inferred for each neuron by our algo- rithm. (c) Network representation of the interstate highways of the contiguous United States. Again, node colors represent the average node parameters xu. Eq. (11) then iterate Eqs. (12) and (13) to compute new values of the parameters cjk, and repeat. We give three example applications of our methods, one to a computer-generated benchmark network and the others to real-world networks displaying nontrivial latent-space structure that is readily uncovered by our algorithm. For our first example, we use a computer-generated test network created using the standard stochastic block model, with n = 600 nodes divided into three equally sized groups of 200 nodes each, with probabilities pin = cin/n and pout = cout/n for edges between nodes in the same and different groups respectively and cin = 15, cout = 3. Figure 1a shows a density plot of the marginal probability distributions qu(x) on the node parameters 4 calculated by our algorithm using a degree-4 (quartic) polynomial representation of the edge function ω. (We also used quartic representations for the other examples below.) The plot consists of 600 columns, one for each node, color coded to show the value of qu(x) for the cor- responding node. As the plot shows, the algorithm has found the three known groups in the network, placing them at three widely spaced points in the latent space of the node parameters. (In this case, the first group is placed in the middle, the second at the top, and the third at the bottom, but all orders are equivalent.) We also show a plot of the inferred edge function ω(x, y), which in this case has a heavy band along the diagonal, indicat- ing “assortative” structure, in which nodes are primarily connected to others in the same group. Our second example is a real-world network, the neu- ral network of the nematode (roundworm) C. elegans, which has been mapped in its entirety using electron mi- croscopy [14, 15] and contains a total of 299 neurons. The worm has a long tubular body, with neurons ar- ranged not just in its head but along its entire length. Neurons tend to be connected to others near to them, so we expect spatial position to play the role of a latent variable and our algorithm should be able to infer the po- sitions of neurons by examining the structure of network. Figure 1b shows that indeed this is the case. The figure shows the network as it appears within the body of the worm, with nodes colored according to the mean values of the node parameters found by the algorithm, and we can see a strong correlation between node color and posi- tion. The largest number of nodes is concentrated in the head, mostly colored red in the figure; others along the body appear in blue and green. If we did not know the physical positions of the nodes in this case, or if we did not know the correlation between position and network structure, we could discover it using this analysis. Our third example, shown in Fig. 1c, is an analysis of the network of interstate highways in the contiguous United States. This network is embedded in geometric space, the surface of the Earth. Again we would expect our algorithm to find this embedding and indeed it does. The colors of the nodes represent the mean values of their node parameters and there is a clear correspondence be- tween node color and position, with the inferred node parameters being lowest in the north-east of the country and increasing in all directions from there. (Note that even though the portion of the network colored in red and orange appears much larger than the rest, it is in fact about the same size in terms of number of nodes be- cause of the higher density of nodes in the north-east.) The true underlying space in this case has two dimen- sions, where our model has only one, and this suggests a potential generalization to latent spaces with two (or more) dimensions. It turns out that such a generalization is possible and straightforward, but we leave the devel- opments for future work. To summarize, we have in this paper described a gener- alized form of community structure in networks in which, instead of placing network nodes in discrete groups, we place them at positions in a continuous space and edge probabilities depend in a general manner on those po- sitions. We have given a computationally efficient algo- rithm for inferring such structure from empirical network data, based on a combination of an EM algorithm and belief propagation, and find that it successfully uncov- ers nontrivial structural information about both artificial and real networks in example applications. The authors thank Cris Moore for useful discussions. This research was funded in part by the US National Sci- ence Foundation under grants DMS–1107796 and DMS– 1407207 and by the University of Bremen under funding program ZF04. [1] S. Boccaletti, V. Latora, Y. Moreno, M. Chavez, and D.- U. Hwang, Complex networks: Structure and dynamics. Physics Reports 424, 175–308 (2006). [2] M. E. J. Newman, Networks: An Introduction. Oxford University Press, Oxford (2010). [3] S. Fortunato, Community detection in graphs. Phys. Rep. 486, 75–174 (2010). [4] P. D. Hoff, A. E. Raferty, and M. S. Handcock, Latent space approaches to social network analysis. J. Amer. Stat. Assoc. 97, 1090–1098 (2002). [5] L. Lov´asz, Large Networks and Graph Limits, volume 60 of American Mathematical Society Colloquium Publica- tions. American Mathematical Society, Providence, RI 5 (2012). [6] C. Borgs, H. C. Jennifer T. Chayes and, and Y. Zhao, An Lp theory of sparse graph convergence I: Limits, sparse random graph models, and power law distribu- tions. Preprint arXiv:1401.2906 (2014). [7] G. Palla, I. Der´enyi, I. Farkas, and T. Vicsek, Uncover- ing the overlapping community structure of complex net- works in nature and society. Nature 435, 814–818 (2005). [8] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing, Mixed membership stochastic blockmodels. Jour- nal of Machine Learning Research 9, 1981–2014 (2008). [9] A.-L. Barab´asi and R. Albert, Emergence of scaling in random networks. Science 286, 509–512 (1999). [10] L. A. N. Amaral, A. Scala, M. Barth´elemy, and H. E. Stanley, Classes of small-world networks. Proc. Natl. Acad. Sci. USA 97, 11149–11152 (2000). [11] B. Karrer and M. E. J. Newman, Stochastic blockmodels and community structure in networks. Phys. Rev. E 83, 016107 (2011). [12] G. J. McLachlan and T. Krishnan, The EM Algorithm and Extensions. Wiley-Interscience, New York, 2nd edi- tion (2008). [13] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, In- ference and phase transitions in the detection of modules in sparse networks. Phys. Rev. Lett. 107, 065701 (2011). [14] J. G. White, E. Southgate, J. N. Thompson, and S. Bren- ner, The structure of the nervous system of the nema- tode Caenorhabditis Elegans. Phil. Trans. R. Soc. Lon- don 314, 1–340 (1986). [15] B. Szigeti, P. Gleeson, M. Vella, S. Khayrulin, A. Palyanov, J. Hokanson, M. Currie, M. Cantarelli, G. Idili, and S. Larson, Openworm: An open-science ap- proach to modeling Caenorhabditis elegans. Frontiers in Computational Neuroscience 8, 137 (2014).
1802.07116
1
1802
2018-02-20T14:05:30
A Social Network Analysis Framework for Modeling Health Insurance Claims Data
[ "cs.SI" ]
Health insurance companies in Brazil have their data about claims organized having the view only for providers. In this way, they loose the physician view and how they share patients. Partnership between physicians can view as a fruitful work in most of the cases but sometimes this could be a problem for health insurance companies and patients, for example a recommendation to visit another physician only because they work in same clinic. The focus of the work is to better understand physicians activities and how these activities are represented in the data. Our approach considers three aspects: the relationships among physicians, the relationships between physicians and patients, and the relationships between physicians and health providers. We present the results of an analysis of a claims database (detailing 18 months of activity) from a large health insurance company in Brazil. The main contribution presented in this paper is a set of models to represent: mutual referral between physicians, patient retention, and physician centrality in the health insurance network. Our results show the proposed models based on social network frameworks, extracted surprising insights about physicians from real health insurance claims data.
cs.SI
cs
A Social Network Analysis Framework for Modeling Health Insurance Claims Data Ana Paula Appel IBM Research [email protected] Vagner F. de Santana IBM Research [email protected] Luis G. Moyano FCEN/CONICET, Mendoza, Argentina [email protected] 8 1 0 2 b e F 0 2 ] I S . s c [ 1 v 6 1 1 7 0 . 2 0 8 1 : v i X r a Marcia Ito IBM Research [email protected] ABSTRACT Health insurance companies in Brazil have their data about claims organized having the view only for providers. In this way, they loose the physician view and how they share patients. Partner- ship between physicians can view as a fruitful work in most of the cases but sometimes this could be a problem for health insurance companies and patients, for example a recommendation to visit another physician only because they work in same clinic. (cid:140)e focus of the work is to be(cid:138)er understand physicians activities and how these activities are represented in the data. Our approach considers three aspects: the relationships among physicians, the relationships between physicians and patients, and the relationships between physicians and health providers. We present the results of an anal- ysis of a claims database (detailing 18 months of activity) from a large health insurance company in Brazil. (cid:140)e main contribution presented in this paper is a set of models to represent: mutual refer- ral between physicians, patient retention, and physician centrality in the health insurance network. Our results show the proposed models based on social network frameworks, extracted surprising insights about physicians from real health insurance claims data. CCS CONCEPTS •Human-centered computing →Social network analysis; •Applied computing →Health care information systems; •(cid:135)eory of computation →Social networks; KEYWORDS Social Network Analysis, Graph Mining, Healthcare, Claims ACM Reference format: Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez. 2018. A Social Network Analysis Frame- work for Modeling Health Insurance Claims Data. In Proceedings of , , , 8 pages. DOI: 10.1145/nnnnnnn.nnnnnnn Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for pro(cid:128)t or commercial advantage and that copies bear this notice and the full citation on the (cid:128)rst page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permi(cid:138)ed. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior speci(cid:128)c permission and/or a fee. Request permissions from [email protected]. , © 2018 ACM. 978-x-xxxx-xxxx-x/YY/MM...$15.00 DOI: 10.1145/nnnnnnn.nnnnnnn Claudio Santos Pinhanez IBM Research [email protected] 1 INTRODUCTION Health insurance companies have an important piece of transac- tional data in their ecosystem that are the claims. A claim repre- sents a report from a physician or a healthcare service provider to a health insurance company, requesting some form of fee related to a patient's consultation with a physician, a clinical exam, or a medical procedure. Even though claims data may vary, it generally contains at least the ID of the healthcare professional involved in the procedure (it may also be a group of professionals), the ID of the patient, the type of procedure, and time information related to the event. It may include other types of information such as location of the service, CID, cost, cost payed, pre-authorization codes, etc. Traditionally the analysis of claims data is based on applying sta- tistics to the individual elements of the system (physicians, service providers, patients) or to the set of claims in order to produce re- ports of cost or quantity of procedures. With the system organized only to pay providers that could be physicians, hospitals or clinics the health insurance company looses almost for complete the view of physician in this system. However, for a health insurance com- pany is very important to know how physicians relationship among themselves, how patiences (cid:131)ow from one physician to another and how the patients are coming back to the physician and if all this are compliance with health insurance company. In practice, get the relation among physicians using claims is di(cid:129)cult because claims are paid to a wide variety of providers, hospitals, clinics, or even physicians registered as small companies. A single physician may contact a patient through all those channels. Also, there is a large variety of services that a health insurance company o(cid:130)er combined with the problem that in Brazil a patient can go direct to an specialist. She/He does not need to go in a general physician before reach a cardiologist or a immunologist. In spite of all those di(cid:129)culties, we show in this paper that meaningful and reliable models, based on social network frameworks, about the relationships about physicians and patients can be computed from claim data. (cid:140)is project was a short term project develop with a large health insurance company in Brazil. (cid:140)e main contribution of this work is a set of models to identify relationship-based pa(cid:138)erns related to physicians excellence or, on the other hand, possible abusive practices. (cid:140)ese models can therefore be used by health insurance companies to be(cid:138)er manage the physicians they have businesses with. It can also be used to support patients to receive more inte- grated care from a group of physicians and service providers. (cid:140)e proposed framework is composed of the following models: , , Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez tients to each other. over time, physician pairs. • Mutual Referral: a proxy for physicians that refer pa- • Retention: summarizes how physicians retain patients including returning behavior in patient- • Physician Centrality: summarizes that relative impor- tance of physicians in the physicians-physicians network. (cid:140)e context of this paper is the analysis of a large claims data- base from a major Brazilian health insurance company. We use this database to identify pa(cid:138)erns in physicians behaviors and then model their relationships by means of social network frameworks. (cid:140)e work on this database both inspired the development of the proposed models and also provide empirical validation for them. (cid:140)is paper is organized as follows: section 2 describes the related work, section 3 details the database analyzed, section 4 presents the proposed models, and section 5 concludes. 2 RELATED WORK Healthcare data is heralded as the key element in the quest to improve e(cid:129)ciency and reduce costs in healthcare systems[21]. (cid:140)is trend is becoming more pronounced as multiscale data generated from individuals is continuously increasing, particularly due to new high-throughput sequencing platforms, real-time imaging, and point-of-care devices, as well as wearable computing and mobile health technologies [2]. In healthcare, data heterogeneity and variety arise as a result of linking the diverse range of biomedical data sources available. Sources of quantitative data (e.g., sensor data, images, gene arrays, laboratory tests) and qualitative data (e.g., diagnostics, free text, de- mographics) usually include both structured and unstructured data, normally under the name of Electronic Health Records. Addition- ally, the possibility to process large volumes of both structured and unstructured medical data allows for large-scale longitudinal stud- ies, useful to capture trends and to propose predictive models[10]. One of the most useful and commonly used datasets are claims databases. Claims data is o(cid:137)en rich in details, as it describes im- portant elements of the events taking place around the healthcare professional and the patient, e.g., timestamps, geographical location, diagnosis codes, associated expenses, among others. (cid:140)e use of claims data in healthcare studies has been scrutinized in [6] and [7], providing a set of good practices and outlining the shortcomings of claims-based research. Social network framework has proven to be a useful analysis tool in this context, allowing for insights di(cid:129)cult to reach by tradi- tional descriptive statistics as presented in [7]. For instance, social network analyses has been used to study comorbidity, the simulta- neous presence of two chronic diseases or conditions in a patient. By structuring diseases as a network, it is possible to quantify some of the aspects of the complex interactions between conditions in the di(cid:130)erent patient populations. A number of studies have focused on extensive claims datasets to examine and understand comor- bidity networks. In [8], the authors study a di(cid:130)usion process on a comorbidity network to model the progressive spreading of dis- eases on a population depending on demographic data. In [12], the authors study how a given chronic disease (diabetes) correlates with age and gender, spanning almost 2 million patients from an entire European country. Such comorbidity networks have also been proposed as models to understand the connection between genetic and environmental risk factors for individual diseases [11]. Beyond clinical purposes, claims data have also been studied to understand the complex interactions of di(cid:130)erent organizational structures and management relationships involved in patient care processes. For instance, in [14], temporal pa(cid:138)erns in Electronic Health Records were modeled in order to present useful information for decision-making. (cid:140)e authors developed a data representation for knowledge discovery so as to extract useful insights on latent factors of the di(cid:130)erent processes involving a patient with the aim to improve work(cid:131)ows. Another important trend is the capturing the relationship be- tween healthcare professionals, in particular the physicians. In [13], the authors apply social network analyses to mine networks of physicians which might be used to improve the designation of middle-sized administrative units (accountable care organizations). Sauter et al. [20] use social network to understand networks of healthcare providers which share patients, giving insight in the interplay between general practitioners, internal specialists, and pediatricians. Also, the network structure of the di(cid:130)erent health- care providers who care for a given individual can show important variability of the healthcare system [15]. Social networks have also been used to understand the state of coordination of healthcare actors. In [24] the authors describe a complex network approach applied to health insurance claims to understand the nature of collaboration among physicians treating hospital in-patients and to explore the impact of collaboration on cost and quality of care. Also, in [23], the authors study the social network structure in hospitals among healthcare professionals to understand which variables a(cid:130)ect patient care e(cid:129)ciency measures. (cid:140)e idea is further developed in [22] from a statistical point of view in a medium-sized number of hospitals, through the analysis of temporal pa(cid:138)erns and costs. (cid:140)e medical referral system in the Canadian healthcare system is studied in [1], where the authors map and analyze the network between general practitioners and specialists . In [9] the authors describe the condition of the basic medical insurance for urban and rural residents in China, then they demonstrate that social network analysis can be used in the health insurance claims data to support be(cid:138)er understanding of patients transfers among hospitals. Finally, social network visualization methods can also be power- ful to explore and analyze healthcare information, in particular to depict the relationship among healthcare professionals [16]. 3 THE INSURANCE CLAIMS DATABASE (cid:140)e data used in this study was provided by a large Brazilian health insurance company. (cid:140)e database contains information about ser- vices and materials of 108,982,593 instances of claims paid by the health insurance company to service providers covering 18 months of activity, about 200,000 claims per day. (cid:140)e databased names 279,085 physicians, of which 81% are considered valid, that is, the physician register ID is well formed. Moreover, we have informa- tion about 2,243,198 patients and 26,033 providers. (cid:140)e claims data contain only claims related to medical consultations performed by A Social Network Analysis Framework for Modeling Health Insurance Claims Data physicians, and did not include claims related to clinical analysis, image-based exams, or hospitalizations. Two important aspects related to the quality of the data regarding state information and physician specialties need to be mentioned. First, approximately 25% of the data do not contain information about state in which the service was performed. (cid:140)is proportion increases when the data is modeled as a graph, since that missing state value in one or both nodes (representing physicians) may invalidate an important piece of the analysis. Another important aspect of the data is related to the distribution of physicians' spe- cialties. (cid:140)is a(cid:138)ribute is important to correlate with physicians' relationships and crucial to the proper understanding of the results. However, because of the large amount of missing values, the use of this information in the data analysis had limited scope. 3.1 Mapping Claims Data as a Graph As mentioned before, the dataset used contains only claims related to procedures performed by physicians. In this work we focus on the relationships between physicians within the health insurance company network only for consulta- tions. (cid:140)us, two physicians are considered related if they have a common patient, that is, a patient that had a consultation with both physicians. (cid:140)is does not indicate a direct relationship, but, for large number of common patients (represented as an outlier), there is a high likelihood that these physicians have some kind of professional relationship, be it a similar pro(cid:128)le, same provider, similar location, similar education background, etc. (cid:140)is signals the possibility that they know each other and have referred their patients to one another. In order to model a physician-physician network, we build a network model as a graph G = (V , E), where the V = N denotes E = M denotes the the set of nodes that represent physicians. edges that connect physicians that have in common consultations claim of a certain patient, ek ∈ E and eij =(cid:8)(vi , vj)vi , vj ∈ V(cid:9). (cid:140)e advantage in using a social network to model the relation- ships among physicians involves the several ways to quantify the relative importance of the physicians. For example, social network analysis allows for individualization of physicians that are in a prominent position in the network be it due to the relationship with her peers, due to her connections with in(cid:131)uential physicians, or because without the physician the topology of the network would change substantially (e.g., by increasing the number of connected components). Figure 1 shows the degree distribution of the physician-physician network. As we can see, the tail of the distribution follows approxi- mately a power-law, pointing to the fact that the relationship be- tween physicians has a structure also commonly found in other real networks, such as social networks [17]. Here, most physicians are connected with only a few other physicians while a small number of physicians are very well connected in the network. In the next sections we describe in detail the models proposed to be(cid:138)er understand the physicians' behavior in this type of network. 4 MODELING CLAIMS DATA (cid:140)is section details the proposed framework for modeling health insurance claims data. It considers healthcare service relationships , , Figure 1: Physician-physician network degree distribution. from three di(cid:130)erent perspectives: (1) how physicians refer each other, (2) how physicians retain patients over time, and (3) how important physicians are in the physician-physician network. 4.1 Mutual Referral Identifying physicians that work together, especially for consul- tations, is of great business value for health insurance companies. Physicians working together may be due to several reasons. On the one hand, it could be positive for medical care professionals to treat patients together and be able to work as a team, building trust. On the other hand, this behavior could also point to a misuse of health insurance resources. For instance, it could be the case that every time a patient visits a given clinic or physician, she is redirected to another physician, even if there is no need to do so. Other situations could involve physicians bene(cid:128)ting certain colleagues by issuing unnecessary referrals, possibly under terms of reciprocity. Accordingly, we set to de(cid:128)ne a model with the goal of identifying physicians that refer each other. (cid:140)e physician-physician network used to compute this metric is a slightly modi(cid:128)ed version of the network proposed in Section 3.1. Here we consider the consulta- tions timestamps, i.e., two physicians P1 and P2 are connected if the same patient has a claim about consultation both with P1 and with P2 but edges retain their chronological order so as to indicate the direction of the link. As a result, we obtain a directed network, i.e., a patient consulting (cid:128)rst P1 and then P2 generates and edge e12 and a patient consulting P2 in the (cid:128)rst place and only a(cid:137)erwards P2 generates an edge e21. (cid:140)us, we consider the physician-physician network G(V , E, w) with node vi ∈ V and edges eij (cid:44) eji ∈ E. Each edge E has an associated weight w : E → R+ equal to the number of patients that consulted with physician P1 and subsequently with P2, denoted as wij. Definition 1 (Mutual Referral). (cid:138)e Mutual Referral metric focuses on identifying pairs of nodes vi and vj (where i, j ∈ [1, N] being N the total number of nodes in the network G) connected by edges eij and eji , where the weights wij and wji are high (the metric increases proportionally to the weights) and, at the same time, as similar as possible to each other (the metric decreases as weights , , di(cid:130)er): mr(vi , vj) = wij + wji − wij − wji, where mr(vi , vj) = mr(vj , vi). Our metric is symmetric to i, j, as expected for a variable describing a property of a given pair of nodes. Note that the second term in the metric mr represents a penalty for those pairs of edges not similar to each other, thus the metric scores higher in case of symmetrical relationships. To allow for the possibility of a global comparison between pairs of nodes, we de(cid:128)ned a mutual referral score (mrs), by normalizing by the maximum value of mr across the complete graph G. Definition 2 (Mutual Referral Score). (cid:138)e Mutual Referral Score measures, in the unit range [0, 1], the relationship between each pair of nodes vi and vj , relative to the maximum mutual referral identi(cid:128)ed in the directed graph G, represented by max(mr(vs , vt)), ∀s, t ∈ [1, N]. (cid:138)us, for any pair of nodes vi and vj in G, the mutual referral score is de(cid:128)ned as: mrs(vi , vj) = mr(vi , vj) max(mr(vs , vt)) , ∀s, t ∈ [1, N], where again mrs(vi , vj) = mrs(vi , vj). Aiming at identifying connections among physicians when the studied se(cid:138)ings change (e.g., population, availability of health ser- vices, socioeconomic levels), analyses were performed considering the top 20 and top 50 physician IDs with strongest mutual referral scores from (cid:128)ve Brazilian states containing the most claims. Figure 2 presents a visualization of (cid:128)ve Brazilian states that have di(cid:130)erent characteristics not only in terms of population, but also in per capita income and healthcare services availability. Sao Paulo and Rio de Janeiro have the larger population numbers, per capita income, and healthcare services o(cid:130)erings. Dots represent physi- cians, dot size and color are related to node degree, larger/darker dots represent degrees of higher value. (cid:140)e health insurance com- pany has an important presence in Sao Paulo and Rio de Janeiro, which can be observed looking at the top 20 physicians in these states. Because of the number of physicians is larger in these states, patients have more options to choose, but they usually choose physicians considering which are the best ones (i.e., by reputation) and these physicians usually work with a very particular group of other physicians (mainly associated with regions and providers). On the other hand, in other states such as Bahia, Pernambuco and Distrito Federal, the presence of the health insurance company is sparser; there are less physicians that work with this company, meaning less options for patients and in consequence more evenly distributed degrees, which can also be identi(cid:128)ed in the density values of the network (see Figure 2). We observe an unusual case in Distrito Federal, where two pairs of heavily connected physicians have the median of days between two consultations equal to zero days, meaning that half or more patients consulted both physicians in the same day. (cid:140)is could represent physicians that work in the same healthcare provider, for example a cardiologist that executes an electrocardiogram and another cardiologist that analyzes the result, working together in same clinic. However, in both cases we did not have the physicians specialty information. Actually, most of the physicians that are strongly connected with others do not specify their specialty, which Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez hinders any detailed inference regarding the context in which the connection occurred. Table 1 shows the strongest pairs of physicians in the studied database. Except the top pairs from Mato Grosso do Sul, PMS 028 and PMS 027, all the other physicians are from the 5 states repre- sented in Figure 2. Physicians PMS 028 and PMS 027 have 205 same- patient consultations ((cid:128)rst with PMS 028 and then with PMS 027) and 196 consultations ((cid:128)rst PMS 027 and then PMS 028). None in- formed their specialty, but with this information, subject ma(cid:138)er experts can analyze in detail the highlighted relationships, iden- tifying groups of physicians that work together, misuse health insurance resources by forcing unnecessary referrals, or cases of referral/counter-referral. Considering the whole network, analysis of those pairs of physicians with highest mutual referral score and with informed specialties revealed the following common specialties referrals: Ophthalmologist ↔ ophthalmologist; Cardiologists ↔ cardiolo- gists/vascular surgery; Acupuncture/pediatric ↔ allergist; Cardiol- ogy ↔ hematology/clinical pathology; Dermatology ↔ cardiology. In Figure 3 we show the network for the top 100 mutual refer- ral scores by the following specialties: allergist, cardiologist and ophthalmologist. We can see that the behavior is di(cid:130)erent for each specialty. For allergists (Figure 3 (a)) there are two main physicians connected with several other physicians from di(cid:130)erent specialties, most of them pediatricians. (cid:140)us, it is possible to infer that these two allergists are recommended by most of their colleagues. For cardiologists (Figure 3 (b)) there are two physicians that are strongly connected with several other physicians and nine other cardiolo- gists that have a small number of other physicians connected to them. Finally, the network is di(cid:130)erent for ophthalmologists, we have almost no other physician strongly connected to multiple physicians. (cid:140)ey work mostly in pairs (usually the other ophthal- mologist is a surgeon, or a peer responsible of running certain types of exams). In the case of ophthalmologists, they tend to be very specialized (e.g., surgeon, retina, cornea, etc.) and so they usually work with a peer. Lastly, this model suggests that some physicians consider their own connections to indicate patients. Hence, in situations where the health insurance company wants to improve the relationship with physicians in their network, it could consider an approach involving groups of doctors that already act together, increasing P1 PMS 028 PD F 010 PS P 022 PS P 139 PD F 057 PS P 141 PS P 139 PS P 024 PS P 143 PS P 145 P2 PMS 027 PD F 009 PS P 021 PS P 138 PD F 056 PS P 140 PS P 140 PS P 023 PS P 142 PS P 144 Consultations P1 → P2 205 267 103 92 73 72 73 92 73 70 P2 → P1 mrs(P1, P2) 1.000 0.551 0.520 0.367 0.362 0.357 0.337 0.321 0.321 0.316 196 108 102 72 71 70 66 63 63 62 Table 1: (cid:135)e top 10 mutual referral scores in the database; physicians IDs are anonymized and state codes are used to allow interpretation considering di(cid:130)erent Brazilian states. A Social Network Analysis Framework for Modeling Health Insurance Claims Data , , Figure 2: Top 50 and 20 physicians with highest mutual referral score from the following Brazilian states: Bahia (BA), Pernam- buco (PE), Distrito Federal (DF), Sao Paulo (SP) and Rio de Janeiro (RJ). (a) Allergist (b) Cardiologist (c) Ophthalmologist Figure 3: Top 100 mutual referral scores by the following specialties: cardiologist and ophthalmologist. the involvement of the group as a whole with the health insurance company and its services. More generally, this metric could support decision making processes involving increasing or reducing the network of accredited physicians/service providers. 4.2 Retention (cid:140)e main goal of the retention model is to identify physicians according of their patients' loyalty. To do this, we analyze the physician-patient relationship. Generally speaking, for each patient i there is a number of claims si related to a number of physicians Ki that the patient has visited. We focused exclusively on consultations, each claim corresponding to only one consultation. (cid:140)e si claims are thus distributed among Pi physicians in such a way that physician j has sij claims related to a patient i. (cid:140)us, the total number of claims for patient i is equal to the sum of all the claims sij across Ki physicians, that is: Pi j=1 si = sij Definition 3 (Relative Relationship). To capture the relative di(cid:130)erence between patient-physician relationships, we de(cid:128)ne a model called Relative Relationship rij = sij/si , as a measure to gauge the strength of the relationship between patient i and physician j. If the patient has a large number of claims with a given physician, i.e., sij (cid:29) 1, there is a strong relationship between them. But if there is not only a large number of claims with physician j, but also most of those claims are with this speci(cid:128)c physician, i.e., rij = sij/si ≈ 1, then this is an even stronger indication that there is a tight relative relationship , , Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez between patient i and physician j. A consistently high value of rij for a given physician j across patients could be an indicator that this professional provides high quality service, motivating patients to return over time. ij Definition 4 (Maximum Relative Relationship). We consider Maximum Relative Relationship rmax as the highest value of the relative relationship rij of patient i with physician j. Maximum Relative Relationship singles out the most prominent physician for patient i, the rationale being to identify physicians that can be in the category of high quality service. (cid:138)is metric is associated to patient- physician pairs and it is particularly signi(cid:128)cant as it approaches 1 and, simultaneously, the patient is connected to a large number of physicians (i.e., Pi (cid:29) 1). ij To capture a physician's retention capacity in a single metric, we consider a function proportional to the Maximum Relative Relation- ship rmax as well as proportional to the number of physicians that the patient consulted with. If the patient consulted with multiple physicians, a higher number of rmax for one of them is signi(cid:128)cant. A physician showing patients that have consistently higher val- ues of rmax is indicative of the physician's capacity of retaining patients. We average all patients for a given physician and nor- malize by the maximum value to keep the metric in the unit range, allowing for straightforward comparison. ij ij Figure 4: Relationship between number of physicians and total number of claims of a patient (each dot represents a patient). (cid:135)e data correspond to consultations in the state of Sao Paulo. Figure 4 shows how the Maximum Relative Relationship metric is distributed across all patients in the state of Sao Paulo. In the (cid:128)gure, each dot is a patient, the x-axis represents the number of physicians connected to the patient, which we denote as K, and the (logarithmic) y-axis represents the total number of claims of the patient, denoted as s. Color intensity is proportional to the value of , so the darker the intensity, the closer to one, which means rmax ij that the patient has most claims mainly with the corresponding physician. Solid lines represent proportional values of s vs. P, i.e. s = cP, with c equal to 1, 5, 10, 50. (cid:140)is means that dots above the upper solid line have more than 50 times claims than the corresponding number of visited physicians. Our model allows for the de(cid:128)nition of parameters to select physi- cians that have, at the same time, higher values of Maximum Rel- ative Relationship rmax , total number of physicians P and total number of claims s, meaning that the physician has patients that have several claims and also physicians built a strong relationship with the patient. In Figure 4, this correspond to the darker points above the black upper line. (cid:140)is type of information represents a summary of the relation- ship patient-physician, where is possible to quantify which physi- cian has in general a more loyal relationship from patients, inferred by their returning behavior. ij 2013 2014 Physician Q2 Q3 Q4 Q1 Q2 PBA262 PBA051 PS P 263 PS P 264 PS P 265 PBA266 PS P 142 PS P 267 PMG 268 PD F 234 PS P 269 PD F 219 PS P 270 PD F 233 PMS 271 PBA272 PS P 273 PS P 274 PS P 275 PS P 276 PS P 277 PD F 278 PS P 279 PMG 238 PS P 280 PD F 281 PS P 282 2 4 - 1 - - - - - - 7 - - - - 8 - - - - 3 - - 6 9 5 10 1 2 3 4 5 6 7 8 9 10 - - - - - - - - - - - - - - - - - 1 5 - 2 10 - - 9 - - 3 4 6 7 8 - - - - - - - - - - - - 1 - - 2 4 - - - 7 - - 3 - 5 - 6 8 9 10 - - - - - - - - 2 - - 1 - - - 7 - - - - - - - 4 - - - 3 5 6 8 9 10 - - Table 2: Top 10 physicians with higher values for retention for 5 consecutive quarters. We observe that Sao Paulo is not the dominant state as opposed to the centrality metrics (See Section 4.3). (cid:135)ere is some stability in the sense that many physicians appear in the top 10 in more than one quarter. Table 2 shows a comparison of the top 10 physicians from the whole database through (cid:128)ve consecutive quarters. We can see that the retention is stable in time since several physicians appear in consecutive quarters systematically. A Social Network Analysis Framework for Modeling Health Insurance Claims Data 4.3 Physician Centrality In this part of the analysis we focus on analyzing the in(cid:131)uence of the physician relative to other physicians in the network. (cid:140)e goal is to understand the physicians activity regarding other physicians, specially from the point of view of the activity that is seen by the health insurance company, i.e., the data present in the claims database. (cid:140)e rationale tested here is that in(cid:131)uential (more central) physicians will have a larger e(cid:130)ect in the topology of the network than physicians that are in the network's periphery, for instance, an in(cid:131)uential physician leaving the network may induce close peers to leave as well [4, 5]. To capture the importance of each physician, the following four centrality measures were considered: Degree: (cid:140)e importance of the physician is proportional to the number of patients shared with other physicians. (cid:140)e higher the number of patients shared with other physicians, the more central the physician is regarded. Eigenvalue: (cid:140)e higher the number of shared patients with other important physicians, the more important the physician is consid- ered in the network. If the physician shares a large number of patients with physicians not considered as important, the physician is not necessarily considered in(cid:131)uential [19]. Betweenness: Takes into account that physicians can be in(cid:131)uential to other physicians when they are central in the network. It is possible to de(cid:128)ne a metric that captures this proximity e(cid:130)ect by means of the betweenness co- e(cid:129)cient [3], which considers the shortest path a patient would take from a given physician to another one, if they make direct referrals. (cid:140)rough this metric, the higher the potential to connect with other doctors, the more central the physician. Closeness: Physicians can also be ranked by the amount of other physicians close to each other, where proximity in this case refers to the number of links between physicians. (cid:140)is can me modeled by means of the closeness coe(cid:129)cient [18]. (cid:140)us, it is possible to compute a distance between physicians by considering the (smallest) number of physicians that are needed to connect any two physicians in the network. (cid:140)ese four metrics were computed for the same network, includ- ing all Brazilian states, considering also how they change over time by dividing the complete time period in quarters. One important characteristic is the possibility of following the physicians evolution related to these metrics. In table 3 we show the top 10 physicians us- ing the eigenvalue centrality measure, considering all states. As we can see, some physicians have a stable behavior over time, meaning that they are occupying closer positions, for example, physician PSP 153 holds the top position during most quarters except in Q4 of 2013 when he/she moved to the second position. In other cases, a physician has an ascendant or descendant ranking, which can indicate a change in the physician's area or patients' behavior that might be of interest for the health insurance company. (cid:140)e resulting ranking depends on the used metric, but there is still a high degree of correlation among the metrics, as expected. For instance, for Q2 of 2014, 14 physicians from top 20 using eigen- value as a metric are in the same position given by the other metrics, showing that the four centrality measures are quite consistent and indicate the importance of the physicians for the network in a similar way. In general, we have a metric concordance between 10% and 20% of top 100 physicians, which is remarkable consid- ering that there are more than 8,000 physicians. (cid:140)e analysis of , , highest ranking physicians by eigenvalues revealed that the group is almost exclusively composed of the same group physicians. In addition, four of these physicians are associated geographically, being PSP 140 (Otolaryngologist), PSP 164 (Dermatologist), PSP 154 (Endocrinologist), PSP 142 (Hematologist), suggesting that location is a highly relevant factor for such analysis. (cid:140)e (cid:128)(cid:137)h physician, PSP 153, is a well known cardiologist from Sao Paulo, SP. In order to analyze the connectivity among physicians, the net- work density was computed, i.e. that ratio of the number of existing links to the total number of possible links. For the whole network the density was 0.001, for the top 100 physicians the density was 0.6 and for the top 40 physicians the density was 0.9. Figure 5 shows a representation of the network of physicians with highest eigen- value for Q2 in 2014 considering all Brazilian states. (cid:140)e subset is composed of 21 physicians with density 0.933, which means that they are almost all connected to each other. 5 CONCLUSION In this work we have shown how social networking techniques can be applied to the analysis of health insurance claims data, mainly by mapping physicians using shared patients as a proxy for a relation- ship between them. (cid:140)e resulting models provided useful insights to the health insurance company we partnered with. (cid:140)e framework improved the understanding of important characteristics both from physicians and from patients involved in consultations pa(cid:138)erns. (cid:140)ose insights can have multiple business applications such as to detect frauds or to improve the relationship between the health insurance company and important physicians for the company (e.g., physicians connected with the core of the network, with high mu- tual referral with well-known physicians, and with high retention). We demonstrated that we can obtain useful insights from claim data if we model as a social network supporting a structural analy- sis as opposed to traditional transactional approaches. Moreover, our results point out that the complex physician-physician network 2013 2014 Physician Q2 Q3 Q4 Q1 Q2 1 PS P 153 PS P 154 2 5 PS P 164 3 PS P 142 12 PS P 242 8 PS P 243 PS P 140 4 11 PS P 148 16 PS P 149 10 PS P 244 15 PS P 246 PS P 139 7 9 PS P 247 18 PS P 248 13 PS P 143 PS P 252 6 2 1 7 3 10 8 4 5 14 12 11 17 19 6 - 9 1 2 3 4 5 6 7 8 9 10 12 13 14 15 19 - 1 3 4 5 10 8 2 7 12 13 6 - 20 9 - 14 1 2 4 3 14 6 5 13 12 15 7 18 - 9 10 8 Table 3: Temporal evolution by quarters of the top 10 physi- cians with highest centrality measures in the physician- physician network, considering all Brazilian states. , , Ana Paula Appel, Vagner F. de Santana, Luis G. Moyano, Marcia Ito, and Claudio Santos Pinhanez [8] Anna Chmiel, Peter Klimek, and Stefan (cid:140)urner. 2014. Spreading of diseases through comorbidity networks across life and gender. New Journal of Physics 16, 11 (2014), 115013. [9] Hao Guo, Feng Wei, Shaoyin Cheng, and Fan Jiang. 2015. Find Referral Social Networks. In Security and Privacy in Social Networks and Big Data (SocialSec), 2015 International Symposium on. IEEE, 58–63. [10] Peter B Jensen, Lars J Jensen, and Søren Brunak. 2012. Mining electronic health records: towards be(cid:138)er research applications and clinical care. Nature Reviews Genetics 13, 6 (2012), 395–405. [11] Peter Klimek, Silke Aichberger, and Stefan (cid:140)urner. 2016. Disentangling genetic and environmental risk factors for individual diseases from multiplex comorbidity networks. arXiv preprint arXiv:1605.09535 (2016). [12] Peter Klimek, Alexandra Kautzky-Willer, Anna Chmiel, Irmgard Schiller- Fruhwirth, and Stefan (cid:140)urner. 2015. (cid:139)anti(cid:128)cation of diabetes comorbidity risks across life using nation-wide big claims data. PLoS Comput Biol 11, 4 (2015), e1004125. [13] Bruce E Landon, Jukka-Pekka Onnela, Nancy L Keating, Michael L Barne(cid:138), Sudeshna Paul, A James O(cid:128)Malley, (cid:140)omas Keegan, and Nicholas A Christakis. 2013. Using administrative data to identify naturally occurring networks of physicians. Medical care 51, 8 (2013), 715. [14] Noah Lee, Andrew F Laine, Jianying Hu, Fei Wang, Jimeng Sun, and Shahram Ebadollahi. 2011. Mining electronic medical records to explore the linkage between healthcare resource utilization and disease severity in diabetic patients. In Healthcare Informatics, Imaging and Systems Biology (HISB), 2011 First IEEE International Conference on. IEEE, 250–257. [15] Kenneth D Mandl, Karen L Olson, Daniel Mines, Chunfu Liu, and Fang Tian. 2014. Provider collaboration: cohesion, constellations, and shared patients. Journal of general internal medicine 29, 11 (2014), 1499–1505. [16] Luis G Moyano, Ana Paula Appel, Vagner F de Santana, Marcia Ito, and (cid:140)iago D dos Santo. 2016. GraPhys: Understanding Health Care Insurance Data through Graph Analytics.. In Proceedings of the 25th International Conference Compan- ion on World Wide Web. International World Wide Web Conferences Steering Commi(cid:138)ee, 227–230. [17] Mark Newman. 2010. Networks: an introduction. OUP Oxford. [18] Yannick Rochat. 2009. Closeness centrality extended to unconnected graphs: (cid:140)e harmonic centrality index. In ASNA. 22, 4 (2000), 357–365. [19] Bri(cid:138)a Ruhnau. 2000. Eigenvector centrality a node centrality? Social networks [20] Simone Katja Sauter, Lisa Maria Neuhofer, Go(cid:138)fried Endel, Petr Klimek, and Georg Du(cid:137)schmid. 2014. Analyzing healthcare provider centric networks through secondary use of health claims data. In Biomedical and Health Informatics (BHI), 2014 IEEE-EMBS International Conference on. IEEE, 522–525. [21] Uma Srinivasan and Bavani Arunasalam. 2013. Leveraging big data analytics to reduce healthcare costs. IT Professional 15, 6 (2013), 21–28. [22] Shahadat Uddin. 2016. Exploring the impact of di(cid:130)erent multi-level measures of physician communities in patient-centric care networks on healthcare outcomes: A multi-level regression approach. Scienti(cid:128)c reports 6 (2016). coordination. Asia Paci(cid:128)c Journal of Health Management 9, 3 (2014), 53. [24] Fei Wang, Uma Srinivasan, Shahadat Uddin, and Sanjay Chawla. 2014. Ap- plication of network analysis on healthcare. In Advances in Social Networks Analysis and Mining (ASONAM), 2014 IEEE/ACM International Conference on. IEEE, 596–603. [23] S Uddin, L Hossain, and others. 2014. Social networks in exploring healthcare Figure 5: Subset of 21 physicians with highest network im- portance for Q2 2014. (cid:135)e label inside the node represents the physicians' eigenvalue. (cid:135)e width of the edges is propor- tional to the number of shared patients. derived from the health insurance claims database has character- istics similar to a social network, what opens up multiple paths for this research to follow, in particular, considering theories and techniques from Social Network Analysis. (cid:140)e data analysis and the value of the models for the business of the health insurance company we partnered with were validated by multiple meetings with specialists from our lab and from the company, including physicians, process analysts, and information technology specialists. (cid:140)ose interactions with subject ma(cid:138)er ex- perts were fundamental for the identi(cid:128)cation of the most important cases and scenarios to be considered (e.g., cases where multiple physicians used the same physician ID when submi(cid:138)ing a claim to the company) and for the creation of models to support decision making processes and with real business value. [2] REFERENCES [1] Wadhah Almansoori, Omar Zarour, Tamer N Jarada, Panagiotis Karampales, Jon Rokne, and Reda Alhajj. 2011. Applications of social network construction and analysis in the medical referral process. In Dependable, Autonomic and Secure Computing (DASC), 2011 IEEE Ninth International Conference on. IEEE, 816–823. Javier Andreu-Perez, Carmen CY Poon, Robert D Merri(cid:128)eld, Stephen TC Wong, and Guang-Zhong Yang. 2015. Big data for health. IEEE journal of biomedical and health informatics 19, 4 (2015), 1193–1208. [3] M. Barth´elemy. 2004. Betweenness centrality in large complex networks. (cid:138)e European Physical Journal B - Condensed Ma(cid:136)er and Complex Systems 38, 2 (2004), 163–168. DOI:h(cid:138)p://dx.doi.org/10.1140/epjb/e2004-00111-4 [4] S. Borga(cid:138)i. 2005. Centrality and network (cid:131)ow. Social Networks 27, 1 (Jan. 2005), 55–71. DOI:h(cid:138)p://dx.doi.org/10.1016/j.socnet.2004.11.008 [5] Stephen P Borga(cid:138)i. 2005. Centrality and network (cid:131)ow. Social networks 27, 1 (2005), 55–71. [6] Bryan Burton and Paul Jesilow. 2011. How healthcare studies use claims data. Open Health Services and Policy Journal 4 (2011), 26–29. [7] Varun Chandola, Sreenivas R. Sukumar, and Jack C. Schryver. 2013. Knowledge Discovery from Massive Healthcare Claims Data. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '13). ACM, New York, NY, USA, 1312–1320. DOI:h(cid:138)p://dx.doi.org/10.1145/ 2487575.2488205
1806.02954
3
1806
2019-04-29T13:55:28
Using Social Network Information in Bayesian Truth Discovery
[ "cs.SI", "cs.LG", "cs.MA", "stat.ML" ]
We investigate the problem of truth discovery based on opinions from multiple agents who may be unreliable or biased. We consider the case where agents' reliabilities or biases are correlated if they belong to the same community, which defines a group of agents with similar opinions regarding a particular event. An agent can belong to different communities for different events, and these communities are unknown a priori. We incorporate knowledge of the agents' social network in our truth discovery framework and develop Laplace variational inference methods to estimate agents' reliabilities, communities, and the event states. We also develop a stochastic variational inference method to scale our model to large social networks. Simulations and experiments on real data suggest that when observations are sparse, our proposed methods perform better than several other inference methods, including majority voting, TruthFinder, AccuSim, the Confidence-Aware Truth Discovery method, the Bayesian Classifier Combination (BCC) method, and the Community BCC method.
cs.SI
cs
Using Social Network Information in Community-based Bayesian Truth Discovery Jielong Yang, Student Member, IEEE, Junshan Wang, Member, IEEE, and Wee Peng Tay, Senior Member, IEEE 1 9 1 0 2 r p A 9 2 ] I S . s c [ 3 v 4 5 9 2 0 . 6 0 8 1 : v i X r a Abstract -- We investigate the problem of truth discovery based on opinions from multiple agents (who may be unreliable or biased) that form a social network. We consider the case where agents' reliabilities or biases are correlated if they belong to the same community, which defines a group of agents with similar opinions regarding a particular event. An agent can belong to different communities for different events, and these communities are unknown a priori. We incorporate knowledge of the agents' social network in our truth discovery framework and develop Laplace variational inference methods to estimate agents' reliabilities, communities, and the event states. We also develop a stochastic variational inference method to scale our model to large social networks. Simulations and experiments on real data suggest that when observations are sparse, our proposed methods perform better than several other inference methods, including majority voting, TruthFinder, AccuSim, the Confidence-Aware Truth Discovery method, the Bayesian Classifier Combination (BCC) method, and the Community BCC method. Index Terms -- Truth discovery, social network clustering, Laplace variational inference, stochastic variational inference I. INTRODUCTION In crowdsourcing and social sensing [1] -- [8], information the same event often comes from different agents. about Agents may have their own biases and produce unreliable opinions. A commonly used approach to fuse the agents' opin- ions together is the majority voting method, which assumes that all agents have the same reliability [9]. However, due to different backgrounds and access to prior information, agents' reliabilities or biases may vary widely. Truth discovery methods have been proposed to jointly es- timate event truths and agent reliabilities by aggregating noisy information from multiple agents. For example, companies may gather product ratings from social media to estimate the popularity of their products [10] and regulatory agencies may use participatory social sensing to determine if certain events like traffic congestion have occurred by allowing the public to report such events to them [11]. In this paper, we consider the truth discovery problem when social network information of the contributing agents is available. A. Related Work In [7], [12] -- [14], probabilistic models are proposed for truth discovery from binary (true or false) observations. For binary observations, the reliability of each agent is the probability an This research is supported by the Singapore Ministry of Education Aca- demic Research Fund Tier 1 grant 2017-T1-001-059 (RG20/17). J. Yang, J. Wang, and W. P. Tay are with the School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore. Emails: [email protected], [email protected], [email protected]. event is true given that the agent reports it to be true. In [12], maximum likelihood estimation (MLE) is used to estimate event truths and agent reliabilities. The Cramer-Rao lower bound (CRLB) on source reliability estimation is computed in [15]. In these papers, agents are assumed to be independent of each other. trees. In [7], [14], A model proposed in [13] assumes the dependency graphs of agents are disjoint the dependency relationship is extended to general graphs and represented by a known dependency matrix. In [16], an agent can be influenced by another agent to change its observation to match that of the influencer. An iterative expectation maximization algorithm is developed to infer each agent's reliability and dependency on other agents. Scalar reliabilities of agents are also used in truth discovery from multi-ary observations in [17] -- [20]. In [17], the reliabil- ity of an agent is the probability that its opinion is correct. In this work, a Bayesian method named TruthFinder is proposed to iteratively estimate agent reliabilities and event truths. In [18], the authors use the same definition of reliabilities as [17] and develop a Bayesian method named AccuSim to detect copying relationship among agents and jointly infer agent dependencies, agent reliabilities, and event truths. In [19], the reliability of an agent is regarded as the variance of the difference between the ground truth and the agent opinion and a Confidence-Aware Truth Discovery (CATD) method is proposed to deal with the phenomenon where most sources only provide a few claims. In the paper, the confidence interval of the reliability estimation is considered. In [20], the reliability of an agent is the proportion of its opinions that are consistent with the ground truth of the events and the authors adopt a new constraint-aware Hidden Markov Model to effectively infer the evolving truths of events and the evolving reliabilities of agents. In [21], the reliability of each agent is represented with two parameters representing the false positive error and the false negative error respectively. In [22], the authors further use a confusion matrix to represent the reliability of each agent, and proposes a method called Bayesian Classifier Combination (BCC) for truth discovery. In [23], the authors perform an evaluation on 17 algorithms using five datasets and draw the conclusion that the confusion matrix formulation generally performs better than scalar reliabilities, and BCC is among the best methods in decision making and single-label tasks. However, if each agent only observes a small subset of events, it is difficult to infer its reliability. In practice, agents having similar background, culture, socio-economic standings, and other factors, may form communities and share similar confusion matrices. The reference [24] proposed an extension of the BCC model, called the Community BCC (CBCC) model. In this model, the confusion matrix of an agent is a perturbation of the confusion matrix of its community. However, both [22] and [24] estimate the confusion matrices of agents based only on the agents' observations. The papers [6] and [25] show that agents in a crowd are not independent, but are instead connected through social ties, which can provide us with important information about which community an agent belongs to. In [26], the authors consider the fact that the expertise (and thus the reliability) of each agent varies across events and use MLE to jointly estimate user expertise and event truths. B. Main Contributions In this paper, we consider the use of social network in- formation and community detection to aid in truth discovery based on agents' observations. Similar to [24], we assume agents are clustered into communities for each observed event (an agent can belong to different communities for different events), and agents in the same community have similar confusion matrices. We use both the agents' observations and the social network connections among agents to jointly infer the communities and the event truths. Truth discovery on social networks often requires analyzing massive data. However, the traditional Gibbs sampling method used in [22] and variational inference method in [24] can not scale to a large dataset. The reason is that the entire dataset is used at each iteration of Gibbs sampling and variational inference, thus each iteration can be computationally expensive when the dataset is large. In our paper, we develop a three- level stochastic variational inference method for our Bayesian network model (see Chapter 3 of [27]) that can scale to large networks. The truths and communities are estimated iteratively. In each iteration, instead of re-analyzing the entire dataset (which includes information about the social network and agents' observations), we use randomly sampled sub- datasets to update the target variables. Our main contributions are as follows: • We propose a model that uses both social network in- formation and agents' observations to jointly infer agent communities and event truths. To model the relationship between event states and the agents' observations, we use a mixed membership stochastic blockmodel [28] for the community structure and confusion matrices. Our model allows agents to switch communities when observing different events. • For small and medium sized networks, we develop a Laplace variational inference method to iteratively esti- mate the agent communities and event truths. • We develop a three-level stochastic variational inference method for our model that can scale to large networks. • We perform simulations and experiments on real data, which demonstrate that our method performs better than majority voting, TruthFinder, AccuSim, CATD, BCC, and CBCC. 2 The rest of this paper is organized as follows. In Section II, we present our model and assumptions. In Section III, we de- velop a Laplace variational inference method for our Bayesian network model. In Section IV, we develop a three-level stochastic variational inference method that can scale to large networks. Simulation and experiment results are presented in Section V, and we conclude in Section VI. (cid:17) , . . . , α Ks Ks (cid:16) α i=1 or (xi)i if the index set Notations: We use boldfaced characters to represent vectors then A(m,·), and matrices. Suppose that A is a matrix, A(·, m), and A(m, n) denote its m-th row, m-th column, and (m, n)-th element, respectively. The vector (x1, . . . , xN ) is abbreviated as (xi)N that i runs over is clear from the context. We use Cat (p1, . . . , pK), , Unif (a, b), Unif (1, . . . , R), Be (g0, h0) Dir and N (M, V) to represent the categorical distribution with category probabilities p1, . . . , pK, the Dirichlet distribution , the uniform dis- with concentration parameters α Ks tribution over the interval (a, b), the uniform distribution over the discrete set {1, . . . , R}, the beta distribution with shape parameters (g0, h0), and the normal distribution with mean M and covariance V, respectively. We use Γ(·) and Ψ(·) to denote the gamma function and digamma function, respectively. The notation ∼ means equality in distribution. The notation y x denotes a random variable y conditioned on x, and p(y x) denotes its conditional probability density function. E is the expectation operator and Eq is expectation with respect to the probability distribution q. We use I(a, b) to denote the indicator function, which equals 1 if a = b and 0 otherwise. We use S to represent the cardinality of the set S. , . . . , α Ks II. SYSTEM MODEL In this section, we present our model and assumptions. Suppose that N agents observe L events and each event can be in R possible states. Each agent observes only a subset of events, and provides its opinions of the events' states to a fusion center. The fusion center's goal is to infer the true state of each event from all the agents' opinions, and estimate the confusion matrix of each agent. The (i, j)-th element of the confusion matrix of agent n is the probability that agent n's opinion of an event with state i is j. We adopt the Bayesian network model shown in Fig. 1, with notations used in the model summarized in Table I. We explain the model in details below. We assume that a social network connecting the N agents is known. Agents in a social network tend to form communities [29] whose members have similar interests or backgrounds. Agents in the same community may be more interested in certain events, and may share the same biases. An agent can subscribe to the beliefs of multiple communities. Consider an agent n who observes an event l. Suppose that it decides to adopt the belief of community k when observing event l. Let (cid:101)ωk be the R × R confusion matrix of the community k whose r-th row (cid:101)ωk(r,·) is assumed to follow a log-normal (cid:101)ωk(r,·) ∼ LogNormal (M, V), (1) where M and V are known hyper-parameters. The community confusion matrices ((cid:101)ωk)k are independent and identically distribution modeled as: 3 community confusion matrix (cid:101)ωk. Let sl n denote the index of community whose belief agent n subscribes to when it observes event l. We model it as n πn ∼ Cat (πn) , sl (3) where πn ∼ GEM(α) is i.i.d. over n, and α is a concentration hyperparameter and GEM stands for the Griffiths, Engen and McCloskey stick breaking process [30]. Following [31], [32], we approximate the GEM process with its degree Ks weak limit given by k=1. πn ∼ Dir (α/Ks, . . . , α/Ks) , Let θl be the hidden true state of event (4) where Ks is the maximum number of communities. Let πn = (πn,k)Ks l with prior distribution θl ∼ Unif (1, . . . , R) and let yl n denote the opinion of agent n with respect to event l. We model the distribution of agent n's opinion as: n θl,{ωn,k}Ks yl n ∼ Cat(cid:0)ωn,sl (θl,·)(cid:1) . k=1, sl (5) n l=1 and (ωn,k)N ;Ks n=1;k=1 from Our target is to estimate (θl)L (yl n)N ;L n=1;l=1. To model the available social network information, we suppose that the social network graph adjacency matrix D is known, where D(n, m) = 1 if agent n and agent m are connected, and D(n, m) = 0 otherwise. We adopt the mixed membership stochastic blockmodel (MMSB) [28] to model D(n, m). In this model, we use zn→m to denote the community whose belief agent n subscribes to due to the social influence from agent m. Under the influence of different agents, agent n may subscribe to the beliefs of multiple communities. If both agents n and m subscribe to the belief of the same community, they are more likely to be connected in the social network. We assume the following: zn→m πn ∼ Cat (πn) , zm→n πm ∼ Cat (πm) , βk ∼ Be (g0, h0), (6) (7) where g0, h0 > 0 are hyperparameters and k = 1, . . . , Ks. We assume (cid:40) P (D(n, m) = 1 zn→m, zm→n, βzn→m) βzn→m, , if zn→m = zm→n, if zn→m (cid:54)= zm→n, = (8) where  is a small known constant. We also assume that {zn→m}n,m and {βk}k are independent. Furthermore, con- ditioned on (zn−>m, zm−>n), D(m, n) is independent of πn. Combining (6) and (8), we have p(zn→m = k πn, zm→n, D(n, m) = 1, βk) ∝ βI(zm→n,k) (1−I(zm→n,k))πn,k, k (9) and p(zn→m = k πn, zm→n, D(n, m) = 0, βk) ∝ (1 − βk)I(zm→n,k)(1 − )(1−I(zm→n,k))πn,k. (10) Fig. 1: Our proposed Bayesian network model. Equation numbers are indicated on the corresponding edges. TABLE I: Summary of commonly-used notations. Notation in Fig. 1 D(n, m) = 1 (or 0) z = (zn→m)n,m β = (βk)k π = (πn)n = (πn,k)n,k s = (sl n)n,l y = (yl n)n,l θ = (θl)l (cid:101)ω = ((cid:101)ωk)k ω = (ωn,k)n,k (M, V), α, (g0, h0) Description There is a (or no) social connection between agents n and m. zn→m is the index of the community agent n subscribes to under the social influence of agent m. βk is the social network parameter defined in (8). πn is the distribution of sl n and zn→m, which are defined in (3) and (6). n is the index of the community sl whose belief agent n subscribes to when it observes event l. n is the observation of agent n yl of event l. θl is the hidden true state of event l. (cid:101)ωk is the confusion matrix of community k. ωn,k is the confusion matrix of agent n when it subscribes to the belief of community k. This is a perturbed version of (cid:101)ωk. Known hyper-parameters defined in (1), (4), and (6), respectively. Variational Parameter in Section III N.A. φ = ((φn→m,k)k)n,m λ = (λk)k; λk = (Gk, Hk) γ = (γn,k)n,k ψ = n,k)k)n,l ((ψl N.A. ν = (νl)l µ = (µk)k ξ = (ξn,sl n )n,l N.A. distribution assumption, (cid:101)ωk(r, r(cid:48)) is positive. We suppose that distributed (i.i.d.) for all k. Note that with the log-normal the R × R confusion matrix ωn,k of agent n is then given by drawing ωn,k(r,·) ∼ Dir ((cid:101)ωk(r,·)) (2) independently for each row r. The model (2) allows us to correlate the individual confusion matrix ωn,k for every agent n who subscribes to the belief of community k through the III. LAPLACE VARIATIONAL INFERENCE METHOD In this section, we present an approach to infer the states of events and the confusion matrices of agents, based on π = (πn,k)n,k, θ = (θl)l, ω = (ωn,k)n,k, (cid:101)ω = ((cid:101)ωk)k, our model. Let β = (βk)k, z = (zn→m)n,m, s = (sl n)n,l, n)n,l, where n, m ∈ {1, . . . , N}, m (cid:54)= n, and y = (yl Ω = {β, z, s, π, θ, ω,(cid:101)ω}. As the closed-form of the posterior k ∈ {1, . . . , Ks}, and l ∈ {1, . . . , L}. For simplicity, let distribution p(Ω y, D) is not available, we use a variational inference method [33] to approximate the posterior distribu- tion. The variational inference method first posits a family of densities, and then iteratively updates variational parameters to select a member in the family that has minimum Kullback Leibler (KL) divergence with the posterior distribution. Com- pared with Markov chain Monte Carlo (MCMC) sampling, variational inference methods solve an optimization problem and thus tends to be computationally faster. However, unlike MCMC, it does not guarantee that the global optimal [34] inference is achieved. Variational inference methods are more suitable for large datasets, while MCMC is more appropriate for smaller ones. We describe our proposed variational method in detail below. We use F to denote a family of probability distributions over Ω. Our target is to find the member in F that is closest to p(Ω y, D) in KL divergence. We choose F to be a mean- field variational family, so that the latent variables β, z, s, π, θ, ω, (cid:101)ω are mutually independent and each is governed by (cid:101)ω as λ = (λk)k, φ = ((φn→m,k)k)n,m, ψ = ((ψl a variational parameter. We further denote the variational pa- rameters of the variational distribution of β, z, s, π, θ, ω and n,k)k)n,l, γ = (γn,k)n,k, ν = (νl)l, ξ = (ξn,k)n,k, and µ = (µk)k, respectively. Each set of parameters {λ, φ, ψ, γ, ν, ξ} corre- sponds to a member in the mean-field variational family F. It is noteworthy that using the mean-field family is suboptimal. The mean-field family is expressive because it can capture any marginal density of the latent variables. However, it cannot capture correlations between them and thus will reduce the fidelity of the approximation and introduce a loss of optimal- ity. Structured variational inference method can be used to introduce dependencies between the variables. However, the complexity of the family determines the complexity of the optimization. It is important to choose a family of distributions that contains a density close to the posterior distribution of the hidden variable, but simple enough for efficient optimization. A distribution in F is represented as q(Ω) = q(β; λ)q(z; φ)q(s; ψ)q(π; γ)q(θ; ν)q(ω; ξ)q((cid:101)ω; µ) (cid:89) ·(cid:89) q((cid:101)ωk; µk). (cid:89) (cid:89) (cid:89) (cid:89) q(zn→m; φn→m) q(ωn,k; ξn,k) = q(βk; λk) q(sl n; ψl n) q(πn; γn) q(θl; νl) (n,m):m(cid:54)=n (cid:89) n,l k n l n,k k (11) To avoid cluttered notations, we omit the variational parame- ters for simplicity, e.g., we write q(β) instead of q(β; λ). Note that the variational density q(Ω) is used to approximate the conditional density function p(Ω y, D), i.e., all derivations 4 and discussions throughout this section are conditioned on the observed (y, D). In the variational inference method, we aim to find q∗(Ω) = arg min q(Ω)∈F D(q(Ω) p(Ω y, D)), (12) where D(· ·) is the KL divergence. From [34], finding (12) is equivalent to maximizing the evidence lower bound (13) L(q) (cid:44) Eq(Ω)[log p(Ω, y, D)] − Eq(Ω)[log q(Ω)]. Since the prior distribution of (cid:101)ω and its likelihood in [36] to approximate the variational distribution of (cid:101)ω with a our model are not conjugate, we cannot use standard mean- field variational inference to update its variational parameter. Instead, we consider the Laplace variational inference ap- proach proposed in [35], which uses Laplace approximations normal distribution. For the other variables {β, z, s, π, θ, ω}, the posterior distribution of each variable is in the same exponential family as its prior distribution and we choose the variational distribution of each variable from the same exponential family as its posterior distribution. Our target is to solve (13) by updating these variational parameters iteratively. We call this the Variational Inference using Social network Information for Truth discovery (VISIT) algorithm, which is shown in Algorithm 1. In the following, we explain VISIT in detail by presenting our assumptions on the variational distribution of each variable in Ω, and deriving the procedure to iteratively update each variational parameter in our model. Algorithm 1 VISIT (i-th iteration) Input: Variational parameters in (i− 1)-th iteration, opinions y, social network data D. for each agent n in {1, . . . , N} do Output: Variational parameters in i-th iteration. for each agent pair (n, m) in {(n, m)}N m=1 do Update φn→m and φm→n using (19) and (20). end for Update ψn using (21). Update γn using (22). Update ξn using (28). end for Update λ using (14) and (15). Update ν using (26). Update µ using (32). return φ, ψ, γ, ξ, λ, ν, and µ. A. Social network parameter β From our Bayesian network model in Fig. 1, we have the following: (i) For (n, m) (cid:54)= (n(cid:48), m(cid:48)), conditioned on zn→m, zm→n, zn(cid:48)→m(cid:48), zm(cid:48)→n(cid:48), βk, D(n, m) and D(n(cid:48), m(cid:48)) (cid:89) are independent. (ii) βk and z are independent. Thus, for k = 1, . . . , Ks, the posterior distribution of βk is given by p(βk D, z) ∝ p(D(n, m) zn→m, zm→n, βk)p(βk) (n,m) (n,m):zn→m=zm→n=k βD(n,m)I(zn→m,k)I(zm→n,k) k ∝ (cid:89) · (1 − βk)(1−D(n,m))I(zn→m,k)I(zm→n,k)Be (g0, h0) (cid:80) (n,m) D(n,m)I(zn→m,k)I(zm→n,k)+g0−1 · (1 − βk) (cid:80) (n,m)(1−D(n,m))I(zn→m,k)I(zm→n,k)+h0−1 ∝ β k ∝ Be (ηk(D, z)) , where (cid:88) (cid:88) (n,m) ηk(D, z) = D(n, m)I(zn→m, k)I(zm→n, k) + g0, (1 − D(n, m))I(zn→m, k)I(zm→n, k) + h0 (n,m) We choose the variational distribution of βk to be in the same exponential family as its posterior distribution. Let λk = (Gk, Hk) and the variational distribution of βk be q(βk) = Be (Gk, Hk). From [34], we obtain λk = Eq(z) [ηk(D, z)] , B. Community membership indicators z 5 Consider two agents n and m with D(n, m) = 1. From our Bayesian network model in Fig. 1, for each k = 1, . . . , Ks, we have p(zn→m = k πn, zm→n, D(n, m) = 1, βk) ∝ p(D(n, m) = 1 zn→m = k, πn, zm→n, βk) · p(zn→m = k πn, zm→n, βk) k (1−I(zm→n,k))πn,k . = p(D(n, m) = 1 zn→m = k, zm→n, βk)p(zn→m = k πn) = βI(zm→n,k) Therefore, p(zn→m πn, zm→n, D(n, m) = 1, βk) is a categorical distribution, which is an exponential family with natural parameter log βI(zm→n,k) k (1−I(zm→n,k))πn,k (cid:17) (cid:32) (cid:16) (cid:32) Ks(cid:88) k=1 (cid:33)(cid:33)Ks . k=1 − log (βI(zm→n,k) k (1−I(zm→n,k))πn,k)  . We let the variational distribution of zn−>m to be in the same exponential family as its posterior distribution, namely a categorical distribution. Assume its categorical probabilities are (φn→m,k)Ks k=1. From [34], we obtain log βI(zm→n,k) k (1−I(zm→n,k))πn,k k(cid:48)=1 q(βk(cid:48) ,πn,zm→n) log (βI(zm→n,k(cid:48)) k(cid:48) (cid:104) (cid:16) (cid:34) (cid:32) Ks(cid:88) k(cid:48)=1 (cid:33)(cid:35) (cid:17)(cid:105) log φn →m,k = Eq(βk,πn,zm→n) − E(cid:81)Ks · (1−I(zm→n,k(cid:48)))πn,k(cid:48)) . (18)  (14)  with Gk = Eq(z) (cid:88) (cid:88) (n,m) (n,m) (cid:88) (cid:88) D(n, m)I(zn→m, k)I(zm→n, k) + g0 = D(n, m)φn→m,kφm→n,k + g0, Hk = Eq(z) (1 − D(n, m))I(zn→m, k)I(zm→n, k) + h0 (n,m) (1 − D(n, m))φn→m,kφm→n,k + h0, (15) = (n,m) where φn→m,k = q(zn→m = k) is defined in Section III-B. A Beta distribution is a Dirichlet distribution with two parameters. Thus from equation (10) in [37], we also have Eq(βk)[log(βk)] = Ψ(Gk) − Ψ(Gk + Hk), and Eq(βk)[log(1 − βk)] = Ψ(Hk) − Ψ(Gk + Hk), (16) (17) which are used in computing the variational distributions of other parameters in our model. Recall that Ψ(·) is the digamma function. (cid:105)(cid:111) , The second term on the right-hand side of (18) is constant k=1. Define for every {φn→m,k}Ks ∆n→m,k (cid:44) exp (cid:110)Eq(βk,πn,zm→n) (cid:104) k log(βI(zm→n,k) (1−I(zm→n,k))πn,k) which is the exponential function of the first term on the right- hand side of (18). Then φn→m,k = ∆n→m,k · c, where c is constant for every {φn→m,k}Ks k=1 φn→m,k = 1, when computing φn→m,k, we only need to compute ∆n→m,k to obtain φn→m,k = k=1. Since (cid:80)Ks ∆n →m,k = exp(cid:8)φm→n,kEq(βk)[log(βk)] (cid:80)Ks + (1 − φm→n,k) log() + Eq(πn) [log(πn,k)](cid:9) ∝ exp(cid:8)φm→n,k + Eq(πn)[log(πn,k)](cid:9) , (cid:0)Eq(βk) [log(βk)] − log()(cid:1) ∆n→m,k k=1 ∆n→m,k . We have (19) where Eq(βk)[log(βk)] and Eq(πn)[log(πn,k)] are computed using (16) and (23) in the sequel, respectively. Similarly, if D(n, m) = 0, we have D. Community weights π 6 p(zn→m = k πn, zm→n, D(n, m) = 0, βk) ∝ (1 − βk)I(zm→n,k)(1 − )(1−I(zm→n,k))πn,k, and ∆n →m,k (cid:44) exp{Eq(βk,πn,zm→n)[log((1 − βk)I(zm→n,k) · (1 − )(1−I(zm→n,k))πn,k)]} = exp{φm→n,kEq(βk)[log(1 − βk)] + (1 − φm→n,k) log(1 − ) + Eq(πn)[log(πn,k)]} (cid:0)Eq(βk)[log(1 − βk)] − log(1 − )(cid:1) ∝ exp{φm→n,k + Eq(πn)[log(πn,k)]}, (20) where Eq(βk)[log(1 − βk)] is computed in (17) in the sequel. C. Event community indices s From our Bayesian network model 1, . . . , Ks, the posterior distribution of sl in Fig. 1, for k = n is n = k πn, yl p(sl ∝ p(yl n sl = ωn,k(θl, yl n)πn,k. n, θl, ωn,k) n = k, πn, θl, ωn,k)p(sl n = k πn) Similar to Section III-B, we let the variational distribution of n to be a categorical distribution with categorical probabilities sl n,k)Ks (ψl n,k ∝ exp{Eq(ωn,k(θl,·),θl,πn)[log(ωn,k(θl, yl ψl k=1. We then have n)πn,k)]} = exp(cid:8)Eq(θl) (cid:40) = exp Eq(θl) (cid:40) R(cid:88) r=1 = exp νl(r) Ψ(ξn,k(θl, yl n)) − Ψ( (cid:2)Eq(ωn,k(θl,·))[log(ωn,k(θl, yl n))](cid:3) + Eq(πn)[log(πn,k)](cid:9) (cid:35) (cid:34) R(cid:88) (cid:41) (cid:35) (cid:41) + Eq(πn)[log(πn,k)] ξn,k(θl, r(cid:48))) ξn,k(r, r(cid:48))) n))−Ψ( Ψ(ξn,k(r, yl R(cid:88) (cid:34) r(cid:48)=1 r(cid:48)=1 + Eq(πn)[log(πn,k)] , k=1, {sl n}L l=1 and Since conditioned on πn = (πn,k)Ks m=1,m(cid:54)=n are independent, we have n}L n πn) m=1,m(cid:54)=n p(zn→m πn)p(πn) p(sl (cid:1) {zn→m}N p(cid:0)πn {sl ∝ L(cid:89)   α ∝ Dir l=1 N(cid:89) l=1,{zn→m}N N(cid:88) m=1,m(cid:54)=n + Ks m=1,m(cid:54)=n L(cid:88) I(zn→m, k) + I(sl n, k) l=1 k=1 Ks  . We let the variational distribution of πn to be in the same exponential family as its posterior distribution by letting q(πn) (cid:44) Dir (γn), where γn is a vector of Ks elements with k-th element being γn,k = E q({sl n}L l=1,{zn→m}N m=1,m(cid:54)=n) N(cid:88) + m=1,m(cid:54)=n N(cid:88) = α Ks + m=1,m(cid:54)=n I(zn→m, k) + I(sl n, k) φn→m,k + ψl n,k.  (22) Ks  α L(cid:88) L(cid:88) l=1 l=1 From (10) in [37], we also have Eq(πn)[log(πn,k)] = Ψ(γn,k) − Ψ( Ks(cid:88) γn,k), (23) which is used in Sections III-B and III-C. k=1 E. Event states θ For r = 1, . . . , R, the posterior distribution of θl is p(cid:0)θl = r {yl (cid:16) ∝ N(cid:89) p n=1 n=1, ω,{sl n}N n}N n θl = r,{ωn,k}Ks yl n=1 (cid:1) (cid:17) n θl = r,{ωn,k}Ks where p(yl θl ∼ Unif (1, . . . , R). Thus, k=1, sl p(θl = r {yl n}N n=1, ω,{sl n}N (24) (r,·)(cid:1) and p(θl = r). k=1, sl n n) = Cat(cid:0)ωn,sl n=1) ∝ N(cid:89) ωn,sl n n (r, yl n). where Eq(ωn,k(θl,·))[log(ωn,k(θl, yl n))] and Eq(πn)[log(πn,k)] are computed in (29) and (23), respectively, and νl(r) is defined in (25). (21) n=1 the variational distribution of θl be a categorical We let distribution, and denote q(θl = r) (cid:44) νl(r), (25) where νl(r) ∝ exp = exp = exp = exp n=1 (cid:40) N(cid:88) (cid:40) N(cid:88) (cid:40) N(cid:88) (cid:40) N(cid:88) n=1 n=1 n=1 (26) (cid:35)(cid:41) (cid:35)(cid:41) n n n (r,·) (r, yl n)(cid:1)(cid:3)(cid:41) (cid:2)log(cid:0)ωn,sl n)(cid:1)(cid:3)(cid:105)(cid:41) (cid:2)log(cid:0)ωn,k(r, yl R(cid:88) R(cid:88) ξn,sl (r, yl Ψ(ξn,sl Eq(sl n) Eq(sl n) (r,·),sl n) n))−Ψ( Eq(ωn,sl (cid:104)Eq(ωn,sl (cid:34) (cid:34) (cid:2)log(cid:0)ωn,k(r, yl n)(cid:1)(cid:3) R(cid:88) Ψ(ξn,k(r, yl Ks(cid:88) n))−Ψ( r(cid:48)=1 r(cid:48)=1 (r,·) ψl k=1 n,k n n ξn,k(r, r(cid:48))), n)) − Ψ( = Ψ(ξn,k(r, yl (r, r(cid:48))) n ξn,k(r, r(cid:48))) Eq(ωn,sl The penultimate equation holds because r(cid:48)=1 the n)-th element of the confusion matrix of agent n when which is the expectation of logarithm of ωn,k(r, yl (r, yl it is in community k (see (29)). n), F. Agent confusion matrices ω n}L (cid:89) l∈{1,...,L}:sl p(ωn,k(r,·) {yl ∝ The posterior distribution of ωn,k(r,·) is l=1, θ,(cid:101)ωk(r,·)) l=1,{sl n}L n ωn,k(r,·), sl p(yl · p(ωn,k(r,·) (cid:101)ωk(r,·)) L(cid:89) n,k)I(θl,r)Dir ((cid:101)ωk(r,·)) = Dir(cid:0)ζ(r, r(cid:48))R (cid:1) , where ζ(r, r(cid:48)) = (cid:101)ωk(r, r(cid:48)) +(cid:80)L n, r(cid:48))I(sl ωn,k(r, yl l=1 I(yl n)I(sl n=k,θl=r r(cid:48)=1 l=1 = n, θl) n, k)I(θl, r). Letting the variational distribution of ω be the same as its posterior distribution, we have 7 ∂L(q) ∝ exp we take the functional derivative of the objective function model are not conjugate, thus we cannot use standard mean- field variational inference to update its variational distribution G. Community confusion matrices (cid:101)ω The prior distribution of (cid:101)ωk(r,·) and its likelihood in our q((cid:101)ωk(r,·)). In order to find q((cid:101)ωk(r,·)) that maximizes (13), (13) with respect to q((cid:101)ωk(r,·)) and set it to zero, namely ∂q((cid:101)ωk(r,·)) = 0 to obtain the maximizer as q((cid:101)ωk(r,·)) (cid:110)E(cid:81)N (cid:2)log p({ωn,k(r,·)}N n=1 (cid:101)ωk(r,·)) + log p((cid:101)ωk(r,·))(cid:3)(cid:111) (cid:40) N(cid:88) (cid:40) (cid:101)ωk(r, r(cid:48))) − R(cid:88) log Γ((cid:101)ωk(r, r(cid:48))) (cid:41) R(cid:88) ((cid:101)ωk(r, r(cid:48))−1)[Ψ(ξn,k(r, r(cid:48)))− r(cid:88) log(det(V)) − R(cid:88) log((cid:101)ωk(r, r(cid:48))) (cid:41) (log((cid:101)ωk(r,·)) − M)T V−1(log((cid:101)ωk(r,·)) − M) log(2π) − 1 2 Ψ(ξn,k(r, r(cid:48)))] n=1 q(ωn,k(r,·)) R(cid:88) − R 2 = exp log Γ( r(cid:48)=1 r(cid:48)=1 r(cid:48)=1 r(cid:48)=1 r(cid:48)=1 n=1 + . − 1 2 . (30) Equation (30) is difficult to analyze directly. Thus we use Laplace approximation method introduced in [35], [38] to find a Gaussian approximation to it, namely (cid:18) q((cid:101)ωk(r,·)) ≈ N µk(r,·),− (cid:19) 1 ∇2 log (q(µk(r,·))) log (q((cid:101)ωk(r,·))) , , (31) (32) where µk(r,·) is given by µk(r,·) = arg max (cid:101)ωk(r,·) which can be solved using the gradient descent algorithm. (27) (28) (cid:35) IV. THREE-LEVEL STOCHASTIC VARIATIONAL INFERENCE METHOD The traditional variational inference method uses the whole dataset in each iteration and thus it does not scale well to large datasets. To mitigate this, we propose the use of stochastic optimization and a three-level Stochastic VISIT (S-VISIT) algorithm to update parameters using randomly sampled subsets. The pseudo code of our top-level algorithm is shown in Algorithm 2. The variational parameters corresponding to the variables in our model in Fig. 1 can be divided into three levels as follows: (i) Agent pair level: The variational parameters (φn→m)n(cid:54)=m corresponding to the community membership indicators (zn→m)n(cid:54)=m provide information about the social rela- tionships between agents. (ii) Agent level: The variational parameters ψn, γn, and (ξn,k)k correspond to agent n's event community indices {sl n}l, community weights πn, and confusion matrices (ωn,k)k. q(ωn,k(r,·)) = Dir (ξn,k(r,·)) , where ξn,k(r,·) = (ξn,k(r, r(cid:48)))R ξn,k(r, r(cid:48)) = Eq((cid:101)ωk(r,·),sl L(cid:88) n,θl) r(cid:48)=1 and (cid:34)(cid:101)ωk(r, r(cid:48)) + I(yl l=1 n, r(cid:48))I(sl L(cid:88) I(yl l=1 n, k)I(θl, r) n, r(cid:48))ψl n,kνl(r), = µk(r, r(cid:48)) + and µk(r, r(cid:48)) is defined in (31). Furthermore, we have R(cid:88) Eq(ωn,k)[log(ωn,k(r, r(cid:48)))] = Ψ(ξn,k(r, r(cid:48))) − Ψ( (cid:48)(cid:48) r =1 ξn,k(r, r (cid:48)(cid:48) )), (29) which is used in Section III-C and Section III-E. (iii) Social network and event level: The variational parame- ters {λk}k and {νl}l corresponding to the social network parameters {βk}k and event states θ. Algorithm 2 S-VISIT (i-th iteration) Input: Variational parameters in (i− 1)-th iteration, opinions Output: Variational parameters in i-th iteration. y, social network data D. Sample a subset Sn from agent set {1, . . . , N}. Social network and event level start: for each agent n in Sn do Agent level start: Sample a subset Sp from pair set {(n, m)N for each agent pair (n,m) in Sp do m=1,m(cid:54)=n}. Agent pair level start: Update φn→m and φm→n using (19) and (20). Agent pair level end. end for Update ψn using (21). Update γn using (34). Update ξn = (ξn,k)k using (28). Agent level end. end for Update λ using (37). Updata ν using (38). Update µ using (40). Social network and event level end. return φ, ψ, γ, ξ, λ, ν, and µ. Consider γn,k, the variational parameter of πn,k, as an example. We fix the rest of variational parameters and calculate the natural gradient [39] of (13) with respect to γn,k: ∇γn,kL(q) = L(cid:88) N(cid:88) φn→m,k + + α Ks m=1,m(cid:54)=n n,k − γn,k. ψl (33) l=1 Let γ(i) n,k be the update of γn,k at the i-th iteration. If we let ∇γn,kL(q) = 0 and update γn,k, we need to use the whole set of {φn→m,k}N m=1,m(cid:54)=n. Instead of using (33) to update γn,k, we can use stochastic approximation to randomly sample a subset Sp from the set {(n, m)N m=1,m(cid:54)=n}, and update γn,k by using n,k + ρ(i)((cid:98)γ(i) n,k = γ(i−1) γ(i) n,k n,k − γ(i−1) L(cid:88) φ(i) n→m,k + ), (34) ψl,(i) n,k (35) where(cid:98)γ(i) n,k = α Ks + N Sp (cid:88) (n,m)∈Sp and ρ(i) is the step size at i-th iteration. In use only the instead sampled (35) we {φn→m,k}(n,m)∈Sp set m=1,m(cid:54)=n to perform the update. If the sequence ∞(cid:88) subset {φn→m,k}N of step sizes (ρ(i))i of all the iterations satisfies (ρ(i))2 < ∞, randomly of ρ(i) = ∞ and the whole ∞(cid:88) (36) i=1 i=1 l=1 then we update 8 then from [40], γ(i) n,k converges to a local optimum. Similarly, we can update the other two variational param- eters λk and νl(r), which correspond to the global param- eters βk and θl respectively. At each iteration, Sn agents are randomly selected from the agent set {1, . . . , N}. For r = 1, . . . , R, we have the following equations: + ρ(i)((cid:98)G(i) + ρ(i)((cid:98)H (i) k − G(i−1) k − H (i−1) k k ), ), k k = G(i−1) G(i) k = H (i−1) H (i) λ(i) k = [G(i) k where k ]T , k , H (i) νl,(i)(r) = νl,(i−1)(r) + ρ(i)((cid:98)νl,(i)(r) − νl,(i−1)(r)), (cid:98)G(i) (cid:98)H (i) n∈Sn,(n,m)∈Sp D(n, m)φ(i) n→m,kφ(i) (cid:88) N Sn N Sp k = k m→n,k +g0, (37) (38) (1−D(n, m))φ(i) n→m,kφ(i) m→n,k +h0, (cid:88) = N Sn N Sp (cid:98)νl,(i)(r) ∝ exp (cid:40) n∈Sn,(n,m)∈Sp N Sn Ks(cid:88) k=1 (cid:88) (cid:33)(cid:41) n∈Sn . − Ψ( n,k(r, r(cid:48))) ξ(i) R(cid:88) r(cid:48)=1 (cid:32) ψl,(i) n,k Ψ(ξ(i) n,k(r, yl n)) r(cid:48)=1 log Γ( n∈Sn (cid:40) N Sn When updating µ(i) the variational parameter of k (r,·), (cid:40) estimator, which is given by (cid:88) (cid:101)ωk(r,·), instead of using (30), we use its noisy but unbiased (cid:98)q(i)((cid:101)ωk(r,·)) = exp R(cid:88) − R(cid:88) n,k(r, r(cid:48)))− r(cid:88) log(det(V)) − R(cid:88) (cid:101)ωk(r, r(cid:48))) log Γ((cid:101)ωk(r, r(cid:48))) (cid:41) n,k(r, r(cid:48)))] log((cid:101)ωk(r, r(cid:48))) (cid:41) (log((cid:101)ωk(r,·)) − M)T V−1(log((cid:101)ωk(r,·)) − M) ((cid:101)ωk(r, r(cid:48))−1)[Ψ(ξ(i) R(cid:88) r(cid:48)=1 + log(2π) − 1 2 − R 2 Ψ(ξ(i) r(cid:48)=1 r(cid:48)=1 r(cid:48)=1 − 1 2 log[(cid:98)q(i)((cid:101)ωk(r,·))], (39) (40) k (r,·) = arg max (cid:101)ωk(r,·) µ(i) k (r,·) in (40). We use the gradient descent algorithm to find µ(i) At each iteration, multiple gradient descent steps are conducted k (r,·), which is then set as using the sub-dataset to update µ(i) the initial value in the next iteration. V. SIMULATION AND EXPERIMENT RESULTS In this section, we present simulations and real data ex- periments to evaluate VISIT and S-VISIT methods. For com- parison, we adopt three state-of-the-art methods as the base- line methods, namely majority voting, TruthFinder, AccuSim, CATD, BCC, and CBCC. We demonstrate that our methods outperform the baseline methods for inferring event states as well as confusion matrices when agents either remain in the same community or switch communities when observing different events. A. Agents remain in the same community when observing different events As both BCC and CBCC require each agent have a unique confusion matrix when observing different events, we first con- sider the scenario where agents remain in the same community for all the events. 9 Fig. 2: Accuracy scores when agents remain in the same community. 10 , 1 30 , 1 30 , 1 30 , 1 30 , 1 30 , 9 30 , 9 10 , 1 1) Synthetic Data Generation: The event states are selected from a set of R = 6 states. We use both opinions from agents and the social network to infer the event states. We set the number of agents, events, and communities to N = 80, L = 200, and K = 4, respectively. We set βk = 0.9 for k = 1, . . . , K. Note that K is used here to generate the synthetic dataset and is smaller than the maximum number of communities Ks we set in our inference method. For agents 1 : 20, 21 : 40, 41 : 60 and 61 : 80, we set πn 30 ), and to be ( 9 10 , 1 10 , 0), respectively. We sample zn→m, sn, D(n, m), (0, 3 10 , 7 n from (6), (3), (8), and (5), respectively. and yl 30 ), ( 1 30 ), ( 1 n = . . . = sL It is worth emphasizing that we keep agents in the same community for all the events as required by both BCC and n and sample their common CBCC. Thus, we let s1 value from a categorical distribution with parameter πn, which means the confusion matrix of each agent remains the same across different events. Let the confusion matrix ωk have the same value dk on its diagonal and every non-diagonal element be 1 − dk , where dk equals 0.05, 0.1, 0.5, 0.2 for R − 1 k = 1, . . . , 4. Let A be an N × L observation matrix, whose (i, j)-th element A(i, j) is equal to 1 if agent i observes event j, and A(i, j) is equal to 0 otherwise. Let ℵ be the proportion of zero elements in A. We call ℵ the sparsity of A. We generate synthetic datasets for 5 sparsity values, which are 0.7, 0.75, 0.8, 0.85, and 0.9, respectively. methods model the reliabilities or the confusion matrices of agents and can better explain the quality of observations. VISIT, S-VISIT and CBCC have better performance than BCC because they take into account the community of the agents and can thus better estimate the confusion matrix when the observation matrix is sparse. VISIT outperforms CBCC by almost 20% because VISIT uses information about the social network, which improves the clustering performance. The accuracy score of S-VISIT is lower than VISIT, as expected. It is noteworthy that when the observation matrix is very sparse, the performance of all the methods can be worse than majority voting. 3) Estimation of the confusion matrices: Let ω∗ n be the true confusion matrix of agent n. The mean square error (MSE) in estimating ω∗ n is defined as: (cid:80)N (cid:80)L (cid:80)R n=1 l=1 r=1 (cid:80)R r(cid:48)=1ωn,sl N · L · R · R n MSE = (r, r(cid:48)) − ω∗ n(r, r(cid:48))2 . (41) For CBCC and BCC, as the community indices remain the same when observing different events, we denote the estimated confusion matrix as ω(cid:48) n and calculate the MSE as (cid:80)N (cid:80)R (cid:80)R r(cid:48)=1ω(cid:48) N · R · R MSE = n=1 r=1 n(r, r(cid:48)) − ω∗ n(r, r(cid:48))2 . (42) 2) Truth discovery accuracy: In the simulation, we set the maximum number of communities Ks to be 10. We set hyper- parameters g0, h0, M, V and α to be 1, 1, (2, 2, 2, 2, 2, 2), 0.7I and 0.1 respectively, where I is a 6 × 6 identity matrix. For different sparsity values, we generate different data sets and conducted 50 Monte Carlo experiments for each method and each sparsity value of the observation matrices. We define the accuracy score as the number of correct estimated events, divided by the total number of events and then averaged over all Monte Carlo experiments. The result is shown in Fig. 2. We observe that BCC, CBCC, TruthFinder, AccuSim, CATD, VISIT and S-VISIT have better performance than the majority voting method because these We then take the average of the MSEs over 50 Monte Carlo experiments. As TruthFinder, AccuSim and CATD do not use confusion matrices, we do not consider them in this comparison. The result is shown in Fig. 3. Our methods have better performance than BCC and CBCC. When the observation matrix is sparse, our methods and CBCC collect the observations in the same community to estimate the community confusion matrix, which is then used to estimate confusion matrices for the agents belonging to that community. This yields better results than BCC, which does not assume any community structure. Compared with CBCC, our methods are better able to estimate the communities because we use social network information to aid in the procedure. performance of our S-VISIT method is also better than the three baseline methods. 10 Fig. 5: Confusion matrix MSEs when agents switch commu- nities. C. Real data We next compare the performance of our proposed methods on two real datasets against the three baseline methods. 1) Movie ranking dataset: The real dataset consists of movie evaluations from IMDB,1 which provides a platform where individuals can evaluate movies on a scale of 1 to 10. If a user rates a movie and clicks the share button, a Twitter message is generated. We then extract the rating from the Twitter message. In our first experiment, we divide the movie evaluations into 4 levels: bad (0-4), moderate (5,6), good (7,8), and excellent (9,10). In our second experiment, we divide the movie evaluations into 2 levels: bad (0-5), good (6-10). We treat the ratings on the IMDB website as the event truths, which are based on the aggregated evaluations from all users, whereas our observations come from only a subset of users who share their ratings on Twitter. Using the Twitter API, we collect information about the follower and following relationships between individuals that generate movie evalua- tion Twitter messages. To better show the influence of social network information on event truth discovery, we delete small subnetworks that consist of less than 5 agents. The final dataset [41] we use consists of 2266 evaluations from 209 individuals on 245 movies (events) and also the social network between these 209 individuals. Similar to [42], [43], we regard the social network to be undirected as both follower or following relationships indicate that the two users have similar taste. The social network is shown in Fig. 6. The performance of different methods are shown in Table II. We observe that our proposed methods perform better than the other benchmark methods in both experiments. 2) Russian president rumor dataset: The dataset from [14] contains rumors regarding the Russian president Vladimir V. Putin, who had not appeared in public for more than one week up to 14 March 2015. Various speculations including false reports were posted on Twitter. The Twitter following 1http://www.imdb.com/ Fig. 3: Confusion matrix MSEs when agents remain in the same community. B. Agents switch communities when observing different events In some applications, agents may subscribe to the beliefs of different communities when observing different events. In this subsection, we evaluate the performance of our proposed methods when agents switch communities when observing different events. 1) Synthetic Data Generation: We use the same settings as Section V-A1 except when sampling the community indices. In Section V-A1, we let s1 n and sample their common value from a categorical distribution with parameter n independently from πn. In this subsection, we sample each sl πn. Therefore, the confusion matrices of an agent may vary across different events. n = . . . = sL 2) Truth discovery accuracy: From Fig. 4, we observe that the performance of S-VISIT and VISIT are better than the six baseline methods. This is because our methods account for the agents switching community beliefs over different events, while CBCC assume that agents do not switch communities. The other baseline methods do not consider agent communi- ties. Fig. 4: Accuracy scores when agents switch communities. 3) Estimation of the confusion matrices: From Fig. 5, we observe that VISIT method performs the best, and the 11 network into the truth discovery framework to improve the truth discovery performance and accuracy of estimating the agents' confusion matrices. We have developed a Laplace vari- ational method and a three-level stochastic variational infer- ence method to infer our non-conjugate model, with simulation and experimental results suggesting that the performance of our proposed approaches are better than several other inference methods, including majority voting, TruthFinder, AccuSim, CATD, BCC and CBCC methods. Unlike the other methods, in our model, each agent can subscribe to the beliefs of different communities when observing different events. REFERENCES [1] D. R. Karger, S. Oh, and D. Shah, "Efficient crowdsourcing for multi- class labeling," ACM SIGMETRICS Performance Evaluation Review, vol. 41, no. 1, pp. 81 -- 92, 2013. [2] Q. Kang and W. P. Tay, "Sequential multi-class labeling in crowdsourc- ing: A Ulam-Renyi game approach," in IEEE/WIC/ACM Int. Conf. on Web Intelligence, Leipzig, Germany, Aug. 2017. [3] D. Acemoglu, M. A. Dahleh, I. Lobel, and A. Ozdaglar, "Bayesian learning in social networks," Review of Economic Studies, vol. 78, no. 4, pp. 1201 -- 1236, Mar. 2011. [4] J. Ho, W. P. Tay, T. Q. S. Quek, and E. K. P. Chong, "Robust decentralized detection and social learning in tandem networks," IEEE Trans. Signal Process., vol. 63, no. 19, pp. 5019 -- 5032, Oct. 2015. [5] W. P. Tay, "Whose opinion to follow in multihypothesis social learning? A large deviations perspective," IEEE J. Sel. Topics Signal Process., vol. 9, no. 2, pp. 344 -- 359, Mar. 2015. [6] M. L. Gray, S. Suri, S. S. Ali, and D. Kulkarni, "The crowd is a collaborative network," in ACM Conf. Computer-Supported Cooperative Work & Social Computing, 2016, pp. 134 -- 147. [7] C. Huang and D. Wang, "Topic-aware social sensing with arbitrary source dependency graphs," in ACM/IEEE Int. Conf. Inform. Process. Sensor Networks, 2016, pp. 1 -- 12. [8] Q. Kang and W. P. Tay, "Sequential Multi-Class labeling in crowdsourc- ing," IEEE Trans. Knowl. Data Eng., 2018. [9] Y. Li, J. Gao, C. Meng, Q. Li, L. Su, B. Zhao, W. Fan, and J. Han, "A survey on truth discovery," arXiv:1505.02463, 2015. [10] J. Marshall and D. Wang, "Mood-sensitive truth discovery for reliable recommendation systems in social sensing," in Proc. ACM Conf. Rec- ommender Syst., 2016, pp. 167 -- 174. [11] D. A. Garcia-Ulloa, L. Xiong, and V. Sunderam, "Truth discovery for spatio-temporal events from crowdsourced data," Proceedings of the VLDB Endowment, vol. 10, no. 11, pp. 1562 -- 1573, 2017. [12] D. Wang, L. Kaplan, H. Le, and T. Abdelzaher, "On truth discovery in social sensing: A maximum likelihood estimation approach," in ACM/IEEE Int. Conf. Inform. Process. Sensor Networks, 2012, pp. 233 -- 244. [13] D. Wang, M. T. Amin, S. Li, T. Abdelzaher, L. Kaplan, S. Gu, C. Pan, H. Liu, C. C. Aggarwal, and R. Ganti, "Using humans as sensors: an estimation-theoretic perspective," in ACM/IEEE Int. Conf. Inform. Process. Sensor Networks, 2014, pp. 35 -- 46. [14] S. Yao, S. Hu, S. Li, Y. Zhao, L. Su, L. Kaplan, A. Yener, and T. Abdelzaher, "On source dependency models for reliable social sens- ing: Algorithms and fundamental error bounds," in IEEE Int. Conf. Distributed Computing Syst., 2016, pp. 467 -- 476. [15] D. Wang, L. Kaplan, T. Abdelzaher, and C. C. Aggarwal, "On credibility estimation tradeoffs in assured social sensing," IEEE J. Sel. Areas Commun., vol. 31, no. 6, pp. 1026 -- 1037, 2013. [16] L. Ma, W. P. Tay, and G. Xiao, "Iterative expectation maximization for reliable social sensing with information flows," Information Sciences, 2018. [17] X. Yin, J. Han, and S. Y. Philip, "Truth discovery with multiple conflicting information providers on the web," IEEE Trans. Knowl. Data Eng., vol. 20, no. 6, pp. 796 -- 808, 2008. [18] X. L. Dong, L. Berti-Equille, and D. Srivastava, "Integrating conflicting data: the role of source dependence," Proc. VLDB Endowment, vol. 2, no. 1, pp. 550 -- 561, 2009. [19] Q. Li, Y. Li, J. Gao, L. Su, B. Zhao, M. Demirbas, W. Fan, and J. Han, "A confidence-aware approach for truth discovery on long-tail data," Proc. VLDB Endowment, vol. 8, no. 4, pp. 425 -- 436, 2015. Fig. 6: The social network of users in IMDB movie ranking . TABLE II: Truth discovery accuracy on movie ranking dataset. Method 4 Levels 2 Levels Majority Voting TruthFinder AccuSim CATD BCC CBCC S-VISIT VISIT 0.50 0.52 0.53 0.49 0.51 0.53 0.55 0.55 0.71 0.71 0.70 0.70 0.69 0.71 0.73 0.75 relationships are provided in the dataset. We select the Twitter users with more than two followers to form the social network. As a Twitter user only reports an event to be true if he believes that it has occurred, to enhance the complexity of the dataset, for each event we randomly choose 20% of users in the social network who did not post any report about that event, and set their observations about the event to be opposite of the ground truth. The performance of the different methods are shown in Table III. We observe that VISIT has the best performance, followed by CBCC. TABLE III: Truth discovery accuracy on Russian president rumor dataset. Method Majority Voting TruthFinder AccuSim CATD BCC CBCC S-VISIT VISIT Accuracy 0.985 0.985 0.985 0.985 0.985 0.991 0.985 0.992 VI. CONCLUSION In this paper, we have proposed a truth discovery method based on social network communities. Similar to other com- munity based methods, our method performs better than meth- ods without considering communities when the observation matrix is sparse. We incorporate information about the social [20] D. Y. Zhang, D. Wang, and Y. Zhang, "Constraint-aware dynamic truth discovery in big data social media sensing," in IEEE Int. Conf. Big Data, 2017, pp. 57 -- 66. [21] B. Zhao, B. I. P. Rubinstein, J. Gemmell, and J. Han, "A Bayesian ap- proach to discovering truth from conflicting sources for data integration," Proc. VLDB Endowment, vol. 5, no. 6, pp. 550 -- 561, 2012. [22] H. C. Kim and Z. Ghahramani, "Bayesian classifier combination," in Artificial Intell. and Stat., 2012, pp. 619 -- 627. [23] Y. Zheng, G. Li, Y. Li, C. Shan, and R. Cheng, "Truth inference in crowdsourcing: is the problem solved?" Proc. VLDB Endowment, vol. 10, no. 5, pp. 541 -- 552, 2017. [24] M. Venanzi, J. Guiver, G. Kazai, P. Kohli, and M. Shokouhi, "Community-based Bayesian aggregation models for crowdsourcing," in Int. Conf. World Wide Web, 2014, pp. 155 -- 164. [25] M. Yin, M. L. Gray, S. Suri, and J. W. Vaughan, "The communication network within the crowd," in Int. Conf. World Wide Web, 2016, pp. 1293 -- 1303. [26] X. Zhang, Y. Wu, L. Huang, H. Ji, and G. Cao, "Expertise-aware truth analysis and task allocation in mobile crowdsourcing," in IEEE Int. Conf. Distributed Computing Syst., 2017, pp. 922 -- 932. [27] D. Koller and N. Friedman, Probabilistic Graphical Models: Principles and Techniques (Adaptive Computation and Machine Learning series). The MIT Press, 2009. [28] E. M. Airoldi, D. M. Blei, S. E. Fienberg, and E. P. Xing, "Mixed membership stochastic blockmodels," J. Mach. Learning Research, vol. 9, no. Sep, pp. 1981 -- 2014, 2008. [29] S. Fortunato and D. Hric, "Community detection in networks: A user guide," Physics Rep., vol. 659, pp. 1 -- 44, 2016. [30] Y. W. Teh, M. I. Jordan, M. J. Beal, and D. M. Blei, "Hierarchical Dirichlet processes," J. Am. Stat. Assoc., 2012. [31] H. Ishwaran and M. Zarepour, "Exact and approximate sum represen- tations for the Dirichlet process," Canadian J. Stat., vol. 30, no. 2, pp. 269 -- 283, 2002. [32] E. B. Fox, E. B. Sudderth, M. I. Jordan, and A. S. Willsky, "A sticky HDP-HMM with application to speaker diarization," Ann. Appl. Stat., pp. 1020 -- 1056, 2011. [33] M. D. Hoffman, D. M. Blei, C. Wang, and J. Paisley, "Stochastic variational inference," J. Mach. Learning Research, vol. 14, no. 1, pp. 1303 -- 1347, 2013. [34] D. M. Blei, A. Kucukelbir, and J. D. McAuliffe, "Variational inference: A review for statisticians," J. Amer. Stat. Assoc., 2017. [35] C. Wang and D. M. Blei, "Variational inference in nonconjugate mod- els," J. Mach. Learning Research, vol. 14, no. Apr, pp. 1005 -- 1031, 2013. [36] L. Tierney, R. E. Kass, and J. B. Kadane, "Fully exponential Laplace approximations to expectations and variances of nonpositive functions," J. Amer. Stat. Assoc., vol. 84, no. 407, pp. 710 -- 716, 1989. [37] T. Minka, Bayesian the multinomial distribution, 2003. [Online]. Available: https://tminka.github.io/papers/ minka-multinomial.pdf inference, entropy, [38] C. M. Bishop, Pattern Recognition and Machine Learning. Springer, and no. 3, pp. 75 -- 174, 2010. [43] P. K. Gopalan and D. M. Blei, "Efficient discovery of overlapping communities in massive networks," Proc. Nat. Academy Sci., vol. 110, no. 36, pp. 14 534 -- 14 539, 2013. 2006. [39] S. I. Amari, "Natural gradient works efficiently in learning," Neural Computation, vol. 10, no. 2, pp. 251 -- 276, 1998. [40] H. Robbins and S. Monro, "A stochastic approximation method," Ann. Math. Stat., pp. 400 -- 407, 1951. [41] J. Yang and W. P. Tay. (2018) Using social network information [Online]. Available: https: truth of movie ranking. to discover //doi.org/10.21979/N9/L5TTRW [42] S. Fortunato, "Community detection in graphs," Physics Rep., vol. 486, 12 Jielong Yang received the B.Eng. and M.Sc. de- gree in Mechanical Engineering from Xi'an Jiaotong University in 2012 and 2014, respectively. He is cur- rently a Ph.D. candidate at the School of Electrical and Electronic Engineering, Nanyang Technological University. His research interests include Bayesian network and Deep Neural Network. Junshan Wang received the B.S. and Ph.D. degrees in Statistics from Wuhan University and National University of Singapre (NUS), CN and SG, in 2011 and 2015, respectively. She spent two years in NUS as an instructor and worked as a research fellow in 2017 at Nanyang Technological University, Sin- gapore. Currently she is a data scientist at Grab. Her recent interests are real world applications of Machine Learning and Deep Learning algorithms and techniques, in detecting fraud activity and risk control. Wee Peng Tay (S'06 M'08 SM'14) received the B.S. degree in Electrical Engineering and Mathematics, and the M.S. degree in Electrical Engineering from Stanford University, Stanford, CA, USA, in 2002. He received the Ph.D. degree in Electrical Engineering and Computer Science from the Massachusetts Insti- tute of Technology, Cambridge, MA, USA, in 2008. He is currently an Associate Professor in the School of Electrical and Electronic Engineering at Nanyang Technological University, Singapore. His research interests include information and signal processing information privacy, over networks, distributed inference and estimation, machine learning, information theory, and applied probability. Dr. Tay received the Tan Chin Tuan Exchange Fellowship in 2015. He is a coauthor of the best student paper award at the Asilomar conference on Signals, Systems, and Computers in 2012, and the IEEE Signal Processing Society Young Author Best Paper Award in 2016. He is currently an Associate Editor for the IEEE Transactions on Signal Processing, an Editor for the IEEE Transactions on Wireless Communications, and serves on the MLSP TC of the IEEE Signal Processing Society. He has also served as a technical program committee member for various international conferences.
1905.13649
6
1905
2019-07-27T11:54:07
Spotting Collective Behaviour of Online Frauds in Customer Reviews
[ "cs.SI", "cs.CL" ]
Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortunately, spammers often take advantage of online review forums by writing fraud reviews to promote/demote certain products. It may turn out to be more detrimental when such spammers collude and collectively inject spam reviews as they can take complete control of users' sentiment due to the volume of fraud reviews they inject. Group spam detection is thus more challenging than individual-level fraud detection due to unclear definition of a group, variation of inter-group dynamics, scarcity of labeled group-level spam data, etc. Here, we propose DeFrauder, an unsupervised method to detect online fraud reviewer groups. It first detects candidate fraud groups by leveraging the underlying product review graph and incorporating several behavioral signals which model multi-faceted collaboration among reviewers. It then maps reviewers into an embedding space and assigns a spam score to each group such that groups comprising spammers with highly similar behavioral traits achieve high spam score. While comparing with five baselines on four real-world datasets (two of them were curated by us), DeFrauder shows superior performance by outperforming the best baseline with 17.11% higher NDCG@50 (on average) across datasets.
cs.SI
cs
Spotting Collective Behaviour of Online Frauds in Customer Reviews Sarthika Dhawan1 , Siva Charan Reddy Gangireddy1 , Shiv Kumar2 and Tanmoy Chakraborty1 1Indraprastha Institute of Information Technology Delhi (IIITD), India 2Netaji Subhas University of Technology (NSUT), Delhi, India {sarthika15170, sivag}@iiitd.ac.in, [email protected], [email protected] Abstract Online reviews play a crucial role in deciding the quality before purchasing any product. Unfortu- nately, spammers often take advantage of online review forums by writing fraud reviews to pro- mote/demote certain products. It may turn out to be more detrimental when such spammers collude and collectively inject spam reviews as they can take complete control of users' sentiment due to the volume of fraud reviews they inject. Group spam detection is thus more challenging than individual- level fraud detection due to unclear definition of a group, variation of inter-group dynamics, scarcity of labeled group-level spam data, etc. Here, we propose DeFrauder, an unsupervised method to de- tect online fraud reviewer groups. It first detects candidate fraud groups by leveraging the underly- ing product review graph and incorporating sev- eral behavioral signals which model multi-faceted collaboration among reviewers. It then maps re- viewers into an embedding space and assigns a spam score to each group such that groups compris- ing spammers with highly similar behavioral traits achieve high spam score. While comparing with five baselines on four real-world datasets (two of them were curated by us), DeFrauder shows supe- rior performance by outperforming the best base- line with 17.11% higher NDCG@50 (on average) across datasets. 9 1 0 2 l u J 7 2 ] I S . s c [ 6 v 9 4 6 3 1 . 5 0 9 1 : v i X r a 1 Introduction Nowadays, online reviews are becoming highly important for customers to take any purchase-related decisions. Driven by the immense financial profits from product reviews, several blackmarket syndicates facilitate to post deceptive reviews to promote/demote certain products. Groups of such fraud re- viewers are hired to take complete control of the sentiment about products. Collective behaviour is therefore more sub- tle than individual behaviour. At individual level, activities might be normal; however, at the group level they might be substantively different from the normal behavior. Moreover, it is not possible to understand the actual dynamics of a group by aggregating the behaviour of its members due to the com- plicated, multi-faceted, and evolving nature of inter-personal dynamics. Spammers in such collusive groups also adopt intelligent strategies (such as paraphrasing reviews of each other, employing a subset of their resources to one product, etc.) to evade detection. Previous studies mostly focused on individual-level fraud detection [Lim et al., 2010; Fei et al., 2013; Akoglu et al., 2013]. Few other studies which realized the detrimental effect of such collective activities detected groups simply based on Frequent Itemset Mining (FIM) [Mukherjee et al., 2012; Xu et al., 2013; Allahbakhsh et al., 2013]. They thus focused more on ranking fraud groups, paying less attention to judge the quality of the detected groups. [Wang et al., 2016] pointed out several limitations of FIM for group detection -- high computational complexity at low minimum support, absence of temporal information, unable to capture overlapping groups, prone to detect small and tighter groups, etc. In this paper, we propose DeFrauder1, a novel architecture for fraud reviewer group detection. DeFrauder contributes equally to (i) the detection of potential fraud groups by incor- porating several coherent behavioral signals of reviewers, and (ii) the ranking of groups based on their degree of spamicity by proposing a novel ranking strategy. Experiments on four real-world labeled datasets (two of them were prepared by us) show that DeFrauder significantly outperforms five baselines -- it beats the best baseline by 11.35% higher accuracy for detecting groups, and 17.11% higher NDCG@50 for ranking groups (averaged over all datasets). In short, our contributions are fourfold: (i) two novel datasets, (ii) novel method for reviewer group detection, (iii) novel method for ranking groups, and (iv) a comprehensive evaluation to show the superiority of DeFrauder. 2 Related Work Due to the abundance of literature [Kou et al., 2004] on on- line fraud detection, we restrict our discussion to fraud user detection on product review sites, which we deem as pertinent to this paper. 1DeFrauder: Detecting Fraud Reviewer Groups, Code is avail- able in [Dhawan et al.]. Figure 1: (a) Workflow of DeFrauder. (b) Coherent review patterns of a fraud reviewer group on two products. To evade detection, four reviewers in a group paraphrase reviews of each other keeping the underlying sentiment same. In user-level fraud detection, notable studies include [Lim et al., 2010] which proposed scoring methods to measure the degree of spamicity of a reviewer based on rating be- haviors; [Wang et al., 2011] which developed a graph-based fraud reviewer detection model; [Fei et al., 2013] which ex- ploited burstiness in reviews to detect fake reviewers. SpEa- gle [Akoglu et al., 2013] utilizes clues from all metadata as well as relational data and harnesses them collectively under a unified framework. ASM [Mukherjee et al., 2013a] facilitates modeling spamicity as latent factor and allows to exploit var- ious behavioral footprints of reviewers. [Wang et al., 2012] argued that the dynamic behavioral signals can be captured through a heterogeneous reviewer graph by considering re- viewers, reviews and products together. FraudEagle [Akoglu et al., 2013] spots fraudsters and fake reviews simultaneously. [Dutta et al., 2018; Chetan et al., 2019] discussed about col- lusion in social media. Few studies attempted to detect group-level fraud reviewer groups. GSRank [Mukherjee et al., 2012] was the first method of this kind, which identifies spam reviewer groups using FIM, and ranks groups based on the relationship among groups, products, and individual reviewers. [Mukherjee et al., 2012] argued that due to the scarcity of data, unsupervised method should be used to tackle this problem. Other studies largely focused on improving the ranking algorithm, ignor- ing the performance of the group detection method (they also used FIM for detecting groups) [Xu et al., 2013; Allahbakhsh et al., 2013; Mukherjee et al., 2013b; Ott et al., 2011]. [Xu and Zhang, 2015] proposed an Expectation Maximization al- gorithm to compute the collusive score of each group detected using FIM. [Wang et al., 2016] argued that FIM tends to de- tect small-size and tighter groups. They proposed GSBP, a divide-and-conquer algorithm which emphasizes on the topo- logical structure of the reviewer graph. GGSpam [Wang et al., 2018b] directly generates spammer groups consisting of group members, target products, and spam reviews. We propose DeFrauder that leverages temporal pattern, content similarity and underlying graph structure to detect collusive fraud groups in review forums (see Table 1 for a comparison). Unlike others, DeFrauder contributes equally to both the components -- group detection and ranking. GSBP GGSpam GSRank DeFrauder Temporal Content Graph (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) Table 1: DeFrauder captures all three signals obtained from users attributes and underlying graph structure. 3 Proposed DeFrauder Framework In this section, we explain DeFrauder which is a three- stage algorithm -- detecting candidate fraud groups, measur- ing different fraud indicators of candidate groups, and rank- ing groups based on the group spam score. 3.1 Group Fraud Indicators Here we present six fraud indicators which measure the spam- icity of a group [Mukherjee et al., 2012; Wang et al., 2018b, 2016] by taking into account linguistic, behavioral, structural and temporal signals. All indicators are normalized to [0, 1] -- larger value indicates more spamming activity. Let R and P be the entire set of reviewers and products. Let R(g) be the set of reviewers in a group g, and P (g) be the set of target products reviewed by the reviewers in R(g). Each reviewer i reviewed a set of products Pi. To reduce the contingency of small groups, we use a penalty function L(g) which is a logistic function Wang et al. [2016]: L(g) = 1/(1 + e-(R(g)+P (g)-3)). We subtract 3 from the sum since we consider minimum number of review- ers and products within a group to be 2 and 1, respectively; therefore L(g) ∈ [0.5, 1) Wang et al. [2018a]. Review tightness(RT). It is the ratio of the number of re- views in g (assuming each reviewer is allowed to write one review to each product) to the product of the size of reviewer set and product set in g. RT (g) = (1) If significant proportion of people co-reviewed several prod- ucts, then it may imply a spam group activity. (cid:80) i∈R(g) Pi R(g)P (g) · L(g) Neighbor tightness(NT). It is defined as the average value of the Jaccard similarity (JS) of the product sets of each re- viewer pair. N T (g) = i,j∈R(g) JS(Pi, Pj) · L(g) (2) (cid:80) (cid:0)R(g) (cid:1) 2 If the product sets are highly similar, both the reviewers are then highly likely to be together in a collusive group. Product tightness(PT). It is the ratio of the number of common products to the number of products reviewed by all the members in g Wang et al. [2016]. i∈R(g) Pi i∈R(g) Pi L(g) (cid:84) (cid:83) P T (g) = (3) Group members reviewing certain number of products and not reviewing any other products are more likely to indulge in fraud activities. Rating variance(RV). Group spammers tend to give sim- ilar ratings while reviewing any product. Let S2(p, g) be the variance of the rating scores of product p by reviewers in g. We take the average variance for all target products. The variance degree [0.5, 1) is converted into spam score between (0, 1]. (cid:32) (cid:33) RV (g) = 2L(g) 1 − (cid:80) 1 p∈P (g) S2(p,g) P (g) − 1 + e Product reviewer ratio(RR). It is defined as the maximum value of the ratio of the number of reviewers in R(g) who reviewed product p ∈ P (g) to the number of all the reviewers of p, denoted by Rev(p): (cid:80) i∈R(g){1 : p ∈ Pi} Rev(p) RR(g) = max p∈P (g) If a product is mainly reviewed by the reviewers in g, then the group is highly likely to be a spammer group. Time window(TW). Fraudsters in a group are likely to post fake reviews during a short-time interval. Given a group g, and a product p ∈ Pg, we define the time-window based spamicity as (cid:40) (cid:80) T W (g, p) = T W (g) = 1 − SDp T , 0, if SDp <= T SDp > T pP g T W (g, p) P (g) · L(g), (6) where SDp is the standard deviation of review time for a product p reviewed by reviewers in group g. T is a time threshold (set to 30 days in our experiments as suggested in Wang et al. [2018b]). (4) (5) (cid:46) Set of candidate groups (cid:46) Potential merged groups Algorithm 1 ExtractGroups 1: Initialize: 2: CCgroups ← set() 3: G(V, E) ← Edge attributed graph 4: CSet ← {} 5: G, CCgroups ← GroupDetector(G, CCgroups) 6: Iterate: 7: G(cid:48)(V (cid:48), E(cid:48)) ← Attributed line graph of G 8: G(cid:48), CCgroups = GroupDetector(G(cid:48), CCgroups) 9: G ← G(cid:48) 10: until E > 1 11: return CCgroups 12: function GR O U PDE T E C T O R(G, CCgroups) 13: 14: 15: 16: for each isolated node vi in G do for each pair (ei, ej) ∈ E × E do CCgroups.add(vi) and remove vi from G (cid:84) i ⊂ ae if ae (cid:83) if j then Pm m∈ae j Pm m∈ae j CSet(ae (cid:84) (cid:83) else if > 0.5 then i ) = CSet(ae i ) ∪ ae j \ae i \ae i } Pm } Pm m∈{ae j m∈{ae j CCgroups.add(ae > 0.5 then j \ ae i ) for each ei ∈ E do k=CSet(ae i ) CCgroups.add(k) and remove k from G for each connected component c with c > 2 do for each group g ∈ CCgroups do CCgroups.add(c) and remove c from G if CollectiveScore(g) <= τspam then CCgroups.remove(g) return G, CCgroups 17: 18: 19: 20: 21: 22: 23: 24: 25: 26: 27: 28: 29: 30: 3.2 Detection of Candidate Fraud Groups We propose a novel graph-based candidate group detection method based on the "coherence principle". Hypothesis 1 (Coherence Principle) Fraudsters in a group are coherent in terms of -- (a) the products they review, (b) ratings they give to the products, and (c) the time of reviewing the products. We show that each component of this hypothesis is statis- tically significant (see Sec. 5). We incorporate these three factors into a novel attributed product-product graph con- struction -- G(V, E) such that each vij ∈ V indicates a product-rating pair (pi, rj) and its attribute av ij consists of the set of reviewers who rated pi with rj. An edge e(ij,mn) = (cid:104)uij, vmn(cid:105) ∈ E indicates the co-reviewing and co-rating pat- terns of two products pi and pm with rating rj and rn, re- spectively. The edge attribute ae (ij,mn) indicates the set of co- reviewers R(ij,mn) who reviewed both pi and pm and gave same ratings rj and rn respectively within the same time τt (defined in Sec. 3.3). Note that edge e(ij,in) connecting same product with different ratings wont exist in G as we assume that a reviewer is not allowed to give multiple reviews/ratings to a single product. We then propose ExtractGroups (pseudecode in Algo 1, a toy example in Supplementary [Dhawan et al.]), a novel group detection algorithm that takes G as an input and executes a series of operations through GroupDetector() (Line 12) -- isolated nodes are first removed (Lines 13-14), edge attributes are then merged and removed if Jaccard sim- ilarity (JS) of product sets that the corresponding reviewers reviewed is greater than a threshold (set as 0.5). Any group of reviewers eliminated due to the consideration of only com- mon reviewers during the creation of edges is also checked through JS in order to avoid loosing any potential candidate groups (Lines 15-24). Before proceeding to the next iteration, connected components containing more than two nodes are removed (Lines 25-26). We define CollectiveScore as the average of six group level indicators defined in Sec. 3.1, and consider those as potential groups whose CollectiveScore exceeds τspam (Lines 27-29, defined in Sec. 5.2). (ij,mn) ∩ ae It then converts the remaining structure of G into an at- tributed line graph (edges converted into vertices and vice (ij,mn) ∈ V (cid:48) corresponds to versa) G(cid:48)(V (cid:48), E(cid:48)) as follows: v(cid:48) (ij,mn); an edge e(cid:48) e(ij,mn) in G and av(cid:48) (ij,mn) = ae (ij,mn,ab) = (ij,ab)(cid:105) represents co-reviewing and co-rating pat- (cid:104)v(cid:48) (ij,mn), v(cid:48) terns of products pi, pm and pa; the corresponding edge at- (ij,ab). G(cid:48) is again fed tribute is a(ij,mn,ab) = ae into GroupDetector in the next iteration. Essentially, in each iteration, we keep clubbing reviewers together, who ex- hibit coherent reviewing patterns. The iteration continues un- til none of the edges remain in the resultant graph, and a set of candidate fraud groups are returned. The worst case time complexity of ExtractGroups is O(kE2), where k is the number of iterations, and E is the number of edges in G (see Supplementary [Dhawan et al.] for more details). Theorem 3.1 (Theorem of convergence) ExtractGroups will converge within a finite number of iterations. See Supplementary [Dhawan et al.] for the proof. 3.3 Ranking of Candidate Fraud Groups Once candidate fraud groups are detected, DeFrauder ranks these groups based on their spamicity. It involves two steps -- mapping reviewers into an embedding space based on their co-reviewing patterns, and ranking groups based on how close the constituent reviewers are in the embedding space. Reviewer2Vec: Embedding Reviewers Our proposed embedding method, Reviewer2Vec is moti- vated by [Wang et al., 2018b]. Given two reviewers i and j co-reviewing a product p ∈ P by writing reviews ci p and cj p with the rating ri p respectively, we define the collusive spamicity of i, j w.r.t. p as: j > τt ∨ rp p at time ti j ≥ τr p and rj p and tj i − rp (cid:40) 0, ζ(i, j, p), tp i − tp otherwise Coll(i, j, p) = (7) where, (cid:34) (cid:32) ζ(i, j, p) =sp α 1 − ti p − tj p τt (cid:33) (cid:35) (cid:32) 1 − ri p − rj p τr (cid:33) + β + γ.Cosine(ci p, cj p) 2 1+e −(max q∈P Where sp = Rev(q)−Rev(p))θ +2θ −1. Coefficients α, β and γ control the importance of time, rating and the similarity of review content, respectively (0 ≤ α, β, γ ≤ 1 and α + β + γ = 1). We set γ > α, β as same review content signifies more collusion as compared to the coherence in ratings and time [Wang et al., 2018b]. sp is the degree of suspicion of product p. τt, τr and θ are the parameters of the model. If the posting time difference among reviewers i and j on p is beyond τt or their rating on p deviates beyond τr (where τr = (max− min)x%, where max and min are the maximum and minimum ratings that a product can achieve respectively), we do not consider this co- reviewing pattern. ExtractGroups achieves best results with τt = 20 and τr = (max− min)20% (see Sec. 5.3). ζ(i, j, p) is the collusiveness between two reviewers w.r.t. product p they co-reviewed; however there might be other reviewers who reviewed p as well. Lesser the number of re- viewers of p, more is the probability that i and j colluded. This factor is handled by sp after passing it through a sigmoid function. θ is a normalizing factor which ranges between [0, 1] (set as 0.4 [Wang et al., 2018b]). We take the cosine similarly of two reviews ci p after mapping them into embedding space using Word2Vec [Mikolov et al., 2013]. p and cj Combining the collusive spamicity of a pair of reviewers across all the products they co-reviewed, we obtain the overall collusive spamicity between two reviewers: Φ(i, j) = where σ(i, j) = 2 (cid:34) (cid:88) 1 + e−σ(i,j) − 1 p∈{Pi∩Pj} Coll(i, j, p) (cid:35)Pi ∩ Pj Pi ∪ Pj We then create a reviewer-reviewer spammer graph [Wang et al., 2018b] which is a bi-connected and weighted graph Gs = (Vs, Es), where Vs corresponds to the set of reviewers ij ∈ R, and two reviewers i and j are connected by an edge es Es with the weight W s ij = Φ(i, j). Once Gs is created, we use state-of-the-art node embedding method to generate node (reviewer) embeddings (see Sec. 5.3). Ranking Groups For each detected group, we calculate the density of the group based on (Euclidean) distance of each reviewer in the group with the group's centroid in the embedding space. An aver- age of all distances is taken as a measure of spamicity of the group. Let (cid:126)i be the vector representation of reviewer i in the embedding space. The group spam score Spam(g) of group g is measured as: Spam(g) = 1 R(g) 1 R(g) (8) (cid:34) (cid:126)i −(cid:2) (cid:88) i∈R(g) (cid:126)i(cid:3)(cid:35)2 (cid:88) i∈R(g) Dataset YelpNYC YelpZIP Amazon Playstore # Reviews 359052 608598 10261 325424 # Reviewers 160225 260227 1429 321436 # Products 923 5044 900 192 Table 2: Statistics of four datasets. aggregation of 4 Datasets We collected four real-world datasets -- YelpNYC: ho- tel/restaurant reviews of New York city Rayana and Akoglu [2015]; YelpZip: reviews on restau- rants/hotels from a number of areas with continuous zip codes starting from New York city Rayana and Akoglu [2015]; Amazon: reviews on musical instruments He and McAuley [2016], and Playstore: reviews of different applications available on Google Playstore. Fake reviews and spammers are already marked in both the Yelp datasets Rayana and Akoglu [2015]. For the remaining datasets, we employed three human experts2 to label spammers based on the in- structions mentioned in Shojaee et al. [2015]; Mukherjee et al. [2013a]3. The inter-rater agreement was 0.81 and 0.79 (Fleiss' multi-rater kappa) for Amazon and Playstore, respec- tively. Table 2 shows the statistics of the datasets. 5 Experimental Results Statistical validation. To measure the statistical signifi- cance of each component (say, products reviewed by the group members) of Hypothesis 1 (Sec. 3.2), we randomly generate pairs of reviewers (irrespective of the groups they belong to) and measure how their co-reviewing patterns (cu- mulative distribution) are different from the case if a pair of reviewers co-occur together in the same group. We hypoth- esize that both these patterns are different (whereas null hy- pothesis rejects our hypothesis). We observe that the differ- ence is statistically significant as p < 0.01 (Kolmogorov- Smirnov test). See Supplementary Dhawan et al. for more discussion. We then perform evaluation in two stages -- qual- ity of the detected groups, and quality of the ranking algo- rithms. 5.1 Baseline Methods We consider three existing methods (see Sec. 2 for their details) as baselines for both the evaluations -- (i) GSBP Wang et al. [2016],(ii) GGSpam Wang et al. [2018b],and (iii) GSRank Mukherjee et al. [2012]. 5.2 Evaluating Candidate Groups Along with the three baselines mentioned above, we also consider two variations of DeFrauder as baselines for group detection: DeFrauderR constructs the attributed product- product graph G based only on co-rating without consider- ing the time of reviewing; and DeFrauderT constructs G 2They were social media experts, and their age ranged between 25-35. 3https://www.marketwatch.com/story/ Figure 2: CDF of (a) GS and (b) RCS for YelpNYC. The more the distance of a CDF (corresponding to a method) from y-axis, the bet- ter the performance of the method. 1 p, cj 1 R(g)2 based only on same co-reviewing time without considering co-rating. This also helps in justifying why both time and rating are important in constructing G for group detection. Mukherjee et al. [2012] suggested to use cumulative distribu- tion (CDF) of group size (GS) and review content similarity (RCS) to evaluate the quality of the spam groups. Here we discard groups with size less than 2. Group Size (GS) favors large fraud groups as large groups are more damaging than 1+e-(R(g)−2) . Review Content Sim- smaller ones: GS(g) = ilarity (RCS) captures inter-reviewer review content similar- ity (as spammers copy reviews of each other): RCS(g) = maxp∈P (g){ (i,j)∈R(g)×R(g) cosine(ci (cid:80) p)}. The larger the deviation of each distribution from the vertical axis (measured in terms of Earth Mover's Dis- tance (EMD)), the better the quality of the detected method Mukherjee et al. [2012]. Comparison. We choose the following parameter values as default based on our parameter selection strategy (Fig. 4): τt: 20 days, τspam = 0.4. The number of groups we obtain from different datasets is reported in Table 3. Fig. 2 shows the CDF of GS and RCS for all the competing methods on Yelp- NYC4, which is further summarized quantitatively (in terms of EMD) in Table 3. DeFrauder outperforms the best baseline by 11.35% and 4.67% higher relative EMD (averaged over four datasets) for GS and RCS, respectively. We also notice that DeFrauderT performs better than DeFrauderR, indicating that temporal coherence is more important than rating coher- ence in detecting potential groups. 5.3 Evaluating Ranking Algorithm We use NDCG@k, a standard graded evaluation met- ric. Since each reviewer was labeled as fraud/genuine, we consider the graded relevance value (ground-truth rele- vance score used in Normalized Discounted Cumulative Gain (NDCG) Manning et al. [2010]) for each group as the fraction of reviewers in a group, who are marked as fraud. The candi- date groups are then ranked by each competing method, and top k groups are judged based on NDCG. Comparison. We choose the following parameter values as default based on our parameter selection strategy (Fig. 4): 10-secrets-to-uncovering-which-online-reviews-are-fake-2018-09-21 4Results are similar on the other datasets, and thus omitted. Method GGSpam GSBP GSRank DeFrauderR DeFrauderT DeFrauder G 1218 809 998 4399 152 1118 ND 0.567 0.521 0.569 YelpNYC G GS RCS 1167 0.218 807 0.173 0.313 1223 0.021 -- 6815 0.069 -- 3666 0.348 4574 0.574 0.562 0.102 0.124 0.237 0.731 0.603 YelpZIP ND GS RCS 0.563 0.219 0.520 0.265 0.706 0.054 0.031 -- 0.271 -- 0.287 0.629 0.478 0.132 0.139 0.648 0.667 0.602 G 144 115 2922 197 807 713 ND 0.230 0.689 0.144 Amazon GS RCS 0.250 0.260 0.309 0.290 -- 0.207 -- 0.314 0.768 0.131 0.416 0.293 0.234 0.698 0.718 G 1213 250 994 385 200 940 ND 0.464 0.474 0.476 Playstore GS RCS 0.010 0.016 0.018 0.005 -- 0.007 -- 0.018 0.789 0.749 0.744 0.577 0.372 0.458 0.841 Table 3: Performance of the competing methods: GGSpam Wang et al. [2018b], GSBP Wang et al. [2016], GSRank Mukherjee et al. [2012], DeFrauderR, DeFrauderT, and DeFrauder. Number of groups detected (G) are mentioned after removing groups of size less than 2 (cyan regions). Accuracy for the group detection (white regions) and ranking (gray regions) is reported in terms of EMD (the higher, the better), and NDCG@50 (ND) respectively. DeFrauderR and DeFrauderT are used only for group detection. The ranking methods of all baselines are run on the groups detection by DeFrauder. Figure 3: Performance on YelpNYC. Baselines are run with their de- tected groups as well as with the groups (+D) detected by DeFrauder (same naming convention as in Table 3). α = β = 0.3, γ = 0.4, τt = 20 days, τr = (max− min)20% τspam = 0.4. We use Node2Vec Grover and Leskovec [2016] for embedding5. Fig. 3 shows the performance of the compet- ing methods for different values of k (top k groups returned by each method). Since DeFrauder produces better groups (Sec. 5.2), we also check how the ranking method of each baseline performs on the groups detected of DeFrauder. Fig. 3 shows that with DeFrauder's group structure, GGSpam and GSBP show better performance than DeFrauder till k = 40; after that DeFrauder dominates others. However, all the base- lines perform poor with their own detected groups. This result also indicates the efficiency of our group detection method. Table 3 reports that DeFrauder beats other methods across all the datasets except YelpZIP on which GSRank performs bet- ter with DeFrauder's detected groups. Interestingly, no single baseline turns out to be the best baseline across datasets. Nev- ertheless, DeFrauder outperforms the best baseline (varies across datasets) by 17.11% higher relative NDCG@50 (av- eraged over all the datasets). 5We tried with DeepWalk Perozzi et al. [2014] and LINE Tang et al. [2015] and obtained worse results compared to Node2Vec. Figure 4: Parameter selection on YelpNYC. We vary each parameter keeping others as default. Since τt = 20 produces best results for group detection, we kept this value for ranking as well. 6 Conclusion In this paper, we studied the problem of fraud reviewer group detection in customer reviews. We established the principle of coherence among fraud reviewers in a group in terms of their co-reviewing patterns. This paper contributed in four directions: Datasets: We collected and annotated two new datasets which would be useful to the cybersecurity commu- nity; Characterization: We explored several group-level be- havioral traits to model inter-personal collusive dynamics in a group; Method: We proposed DeFrauder, a novel method to detect and rank fraud reviewer groups; Evaluation: Exhaus- tive experiments were performed on four datasets to show the superiority of DeFrauder compared to five baselines. Acknowledgements The work was partially funded by Google Pvt. Ltd., DST (ECR/2017/00l691) and Ramanujan Fellowship. The authors also acknowledge the support of the Infosys Centre of AI, IIIT-Delhi, India. Arjun Mukherjee, Vivek Venkataraman, Bing Liu, and Na- talie Glance. What yelp fake review filter might be doing? In ICWSM, pages 1 -- 12, 2013. Myle Ott, Yejin Choi, Claire Cardie, and Jeffrey T Hancock. Finding deceptive opinion spam by any stretch of the imag- ination. In ACL-HLT, pages 309 -- 319, 2011. Bryan Perozzi, Rami Al-Rfou, and Steven Skiena. Deepwalk: In SIGKDD, Online learning of social representations. pages 701 -- 710, 2014. Shebuti Rayana and Leman Akoglu. Collective opinion spam detection: Bridging review networks and metadata. In SIGKDD, pages 985 -- -994, Sydney, NSW, Australia, Au- gust 2015. Somayeh Shojaee, Azreen Azman, Masrah Murad, Nur- fadhlina Sharef, and Nasir Sulaiman. A framework for fake review annotation. In UKSIM-AMSS, pages 153 -- 158, 2015. Jian Tang, Meng Qu, Mingzhe Wang, Ming Zhang, Jun Yan, and Qiaozhu Mei. Line: Large-scale information network embedding. In WWW, pages 1067 -- 1077, 2015. Guan Wang, Sihong Xie, Bing Liu, and S Yu Philip. Re- view graph based online store review spammer detection. In ICDM, pages 1242 -- 1247. IEEE, 2011. Guan Wang, Sihong Xie, Bing Liu, and Philip S Yu. Iden- tify online store review spammers via social review graph. ACM TIST, 3(4):61:1 -- 61:21, 2012. Zhuo Wang, Tingting Hou, Dawei Song, Zhun Li, and Tianqi Kong. Detecting review spammer groups via bipartite graph projection. The Computer Journal, 59(6):861 -- 874, 2016. Zhuo Wang, Songmin Gu, and Xiaowei Xu. Gslda: Lda- based group spamming detection in product reviews. Ap- plied Intelligence, 48(9):3094 -- 3107, 2018. Zhuo Wang, Songmin Gu, Xiangnan Zhao, and Xiaowei Xu. Graph-based review spammer group detection. KIAS, 55(3):571 -- 597, Jun 2018. Chang Xu and Jie Zhang. Towards collusive fraud detection in online reviews. In ICDM, pages 1051 -- 1056, 2015. Chang Xu, Jie Zhang, Kuiyu Chang, and Chong Long. Un- covering collusive spammers in chinese review websites. In CIKM, pages 979 -- 988, 2013. References Leman Akoglu, Rishi Chandy, and Christos Faloutsos. Opin- ion fraud detection in online reviews by network effects. In ICWSM, pages 985 -- -994, 2013. Mohammad Allahbakhsh, Aleksandar Ignjatovic, Boualem Benatallah, Elisa Bertino, Norman Foo, et al. Collusion In Asia-Pacific Web detection in online rating systems. Conference, pages 196 -- 207. Springer, 2013. Aditya Chetan, Brihi Joshi, Hridoy Sankar Dutta, and Tan- moy Chakraborty. Corerank: Ranking to detect users in- volved in blackmarket-based collusive retweeting activi- ties. In WSDM, pages 330 -- 338, 2019. Sarthika Dhawan, Siva Charan Reddy Gangireddy, Shiv Ku- mar, and Tanmoy Chakraborty. Defrauder: Supplementary. https://github.com/LCS2-IIITD/DeFrauder, 2019. Hridoy Sankar Dutta, Aditya Chetan, Brihi Joshi, and Tan- moy Chakraborty. Retweet us, we will retweet you: Spot- ting collusive retweeters involved in blackmarket services. In ASONAM, pages 242 -- 249, 2018. Geli Fei, Arjun Mukherjee, Bing Liu, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. Exploiting burstiness in reviews for review spammer detection. In ICWSM, 2013. Aditya Grover and Jure Leskovec. Node2vec: Scalable fea- ture learning for networks. In SIGKDD, pages 855 -- 864, 2016. Ruining He and Julian McAuley. Ups and downs: Modeling the visual evolution of fashion trends with one-class col- laborative filtering. In WWW, pages 507 -- 517, 2016. Catey Hill. 10 secrets to uncovering which online reviews are https://www.marketwatch.com/story/10-secrets-to- fake. uncovering-which-online-reviews-are-fake-2018-09-21, 2018. Yufeng Kou, Chang-Tien Lu, Sirirat Sirwongwattana, and Yo-Ping Huang. Survey of fraud detection techniques. In ICNSC, pages 749 -- 754, 2004. Ee-Peng Lim, Viet-An Nguyen, Nitin Jindal, Bing Liu, and Hady Wirawan Lauw. Detecting product review spammers using rating behaviors. In CIKM, pages 939 -- 948. ACM, 2010. Christopher Manning, Prabhakar Raghavan, and Hinrich Introduction to information retrieval. Natural Schutze. Language Engineering, 16(1):100 -- 103, 2010. Tomas Mikolov, Ilya Sutskever, Kai Chen, Greg Corrado, and Jeffrey Dean. Distributed representations of words and phrases and their compositionality. In NIPS, pages 3111 -- 3119, 2013. Arjun Mukherjee, Bing Liu, and Natalie Glance. Spotting fake reviewer groups in consumer reviews. In WWW, pages 191 -- -200, New York, April 2012. Arjun Mukherjee, Abhinav Kumar, Junhui Liu, Bing Wang, Meichun Hsu, Malu Castellanos, and Riddhiman Ghosh. Spotting opinion spammers using behavioral footprints. In SIGKDD, Chicago,USA, August 2013.
1712.04823
2
1712
2019-05-16T08:14:17
Krylov Subspace Approximation for Local Community Detection in Large Networks
[ "cs.SI" ]
Community detection is an important information mining task to uncover modular structures in large networks. For increasingly common large network data sets, global community detection is prohibitively expensive, and attention has shifted to methods that mine local communities, i.e. identifying all latent members of a particular community from a few labeled seed members. To address such semi-supervised mining task, we systematically develop a local spectral subspace-based community detection method, called LOSP. We define a family of local spectral subspaces based on Krylov subspaces, and seek a sparse indicator for the target community via an $\ell_1$ norm minimization over the Krylov subspace. Variants of LOSP depend on type of random walks with different diffusion speeds, type of random walks, dimension of the local spectral subspace and step of diffusions. The effectiveness of the proposed LOSP approach is theoretically analyzed based on Rayleigh quotients, and it is experimentally verified on a wide variety of real-world networks across social, production and biological domains, as well as on an extensive set of synthetic LFR benchmark datasets.
cs.SI
cs
Krylov Subspace Approximation for Local Community Detection in Large Networks KUN HE, Huazhong University of Science and Technology, China PAN SHI, Huazhong University of Science and Technology, China DAVID BINDEL, Cornell University, USA JOHN E. HOPCROFT, Cornell University, USA Community detection is an important information mining task to uncover modular structures in large networks. For increasingly common large network data sets, global community detection is prohibitively expensive, and attention has shifted to methods that mine local communities, i.e. identifying all latent members of a particular community from a few labeled seed members. To address such semi-supervised mining task, we systematically develop a local spectral subspace-based community detection method, called LOSP. We define a family of local spectral subspaces based on Krylov subspaces, and seek a sparse indicator for the target community via an ℓ1 norm minimization over the Krylov subspace. Variants of LOSP depend on type of random walks with different diffusion speeds, type of random walks, dimension of the local spectral subspace and step of diffusions. The effectiveness of the proposed LOSP approach is theoretically analyzed based on Rayleigh quotients, and it is experimentally verified on a wide variety of real-world networks across social, production and biological domains, as well as on an extensive set of synthetic LFR benchmark datasets. CCS Concepts: • Computing methodologies → Spectral methods; • Information systems → Cluster- ing and classification; Social networks; Web searching and information discovery; Additional Key Words and Phrases: Local community detection, spectral clustering, Krylov subspace, Rayleigh quotient, sparse linear coding ACM Reference Format: Kun He, Pan Shi, David Bindel, and John E. Hopcroft. 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks. 1, 1 (May 2019), 30 pages. https://doi.org/10.1145/nnnnnnn.nnnnnnn 1 INTRODUCTION Community detection has arisen as one of the significant topics in network analysis and graph mining. Many problems in information science, social science, biology and physics can be formulated as problems of community detection. With the rapid growth of the network scale, however, exploring the global community structure [3, 39] becomes prohibitively expensive in such networks with millions or billions of nodes. While most of the time people are just interested in the local structure of the graph neighborhood. Hence, attention has shifted to methods that mine local community structure without processing the whole large network [23, 25, 28, 42, 50, 52]. Authors' addresses: Kun He, Huazhong University of Science and Technology, Wuhan, China, 430074, brooklet60@hust. edu.cn,[email protected]; Pan Shi, Huazhong University of Science and Technology, Wuhan, China, 430074, panshi@ hust.edu.cn; David Bindel, Cornell University, Ithaca, NY, USA, 14853, [email protected]; John E. Hopcroft, Cornell University, Ithaca, NY, USA, 14853, [email protected]. Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. © 2019 Copyright held by the owner/author(s). Publication rights licensed to ACM. XXXX-XXXX/2019/5-ART $15.00 https://doi.org/10.1145/nnnnnnn.nnnnnnn , Vol. 1, No. 1, Article . Publication date: May 2019. :2 K. He et al. In many situations, instead of finding all communities in a large network in an unsupervised manner, we just want to quickly find communities from a small set of members labeled by a domain expert. For example, in political participation networks, one might discover the membership of a political group from a few representative politicians [47]; sales websites might use clusters in co-purchase networks to generate product recommendations for a customer based on previous purchases; and starting from a few well-studied genes, biologists may seek functionally similar genes via genetic interaction networks. Communities in real-world networks are often small, comprising dozens or hundreds of mem- bers [20, 32]. Intuitively, the latent members in these small communities should be very close to any seed members chosen from the target communities. The seed set expansion approach to community detection [31, 39, 48] starts from "seed" nodes, or labeled members of a target community [27, 28, 52], and incrementally grows the set by locally optimizing a community scoring function. A common theme in seed set expansion methods is to diffuse probability from the seeds. PageR- ank [5, 28], heat kernel [16, 27] and local spectral approximation [24, 33, 34] are three main techniques for the probability diffusion. Among these, the local spectral method is a newly pro- posed technique that exhibits high performance for the local community detection task. Motivated by standard spectral clustering methods that find disjoint global communities from the leading eigenvectors of the graph Laplacian, local spectral algorithms can handle local communities by seeking a sparse indicator vector that contains the seeds and lies in a local spectral subspace rather than in the global eigenspace. Moreover, starting from different seed sets, local spectral algorithms can uncover overlapping communities. In this paper, we propose a local spectral (LOSP) algorithm to identify the members of small communities [24], and systematically build the LOSP family based on various Krylov subspace approximation. Theoretical analysis and empirical analysis are provided to show the soundness and effectiveness of the proposed approach. LOSP differs from standard spectral clustering in two ways: • Handling overlapping communities. Standard spectral methods partition a graph into disjoint communities by k-means clustering in a coordinate system defined by eigenvectors or by recursive spectral bisection. We instead use ℓ1-norm optimization to search an (ap- proximate) invariant subspace for an indicator vector for a sparse set containing the seeds. Overlapping communities correspond to different seed sets. • Defining a local spectral subspace. To determine the local structure around the seeds of interest, we calculate a local approximate invariant subspace via a Krylov subspace associated with short random walks. Starting from a few random seeds, we sample locally in the graph to get a comparatively small subgraph containing most of the latent members, so that the follow-up membership identification can focus on a local subgraph instead of the whole network. The LOSP methods are then used to extract the local community from the sampled subgraph via a Krylov subspace formed by short-random-walk diffusion vectors. Our main contributions include: • Sampling to reduce the complexity. We sample locally in the graph as a pre-processing to get a much smaller subgraph containing most of the latent members around the seeds. The follow-up calculation has a low complexity while maintaining an accurate covering on the target community. In this way, the proposed method is applicable to large-scale networks. • Building a rich LOSP family. We systematically develop a family of local spectral methods based on random walk diffusion. We thoroughly investigate a rich set of diffusion methods; and we find that light lazy random walk, lazy random walk and personalized PageRank are , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :3 robust for different parameters, and outperform the standard random walk diffusions. In general, light lazy random walk performs slightly better. We also study the regular random walk diffusions spreading out from the seeds and the inverse random walk diffusions ending around the seeds. • Extensive demonstration of LOSP. We provide a diverse set of computational experiments on 28 synthetic benchmark graphs and eight real-world social and biological networks to show that the proposed methods are much more accurate than previous local spectral approach LEMON [34], projected gradient descent algorithm PGDc-d [45], the well-known personalized PageRank diffusion algorithm pprpush [5] and heat kernel algorithm hk-relax [27]. This work is a significant extension and improvement based on our initial LOSP method [24]. By removing some costly seed-strengthen preprocessing and iterative post-processing of the initial LOSP [24], the current LOSP costs only one third of the running time of the initial LOSP after the sampling. We also improve the key component of LOSP based on the Krylov subspace, and extend it to an integrated LOSP family. 2 RELATED WORK Communities are densely intra-linked components with sparser inter-connections, typically defined by means of metrics like modularity [37] or conductance [41]. There are many different research directions as well as approaches for the community detection [7, 18, 22, 40, 51]. Early works focused on global structure mining [3, 17, 39] while an increasing body of recent work focuses on local structure mining [28, 35, 45]. We will focus on seed set expansion methods that uncover a local community from a few seed members; these were initially designed for global community detection, but have since been extensively used in local community mining. We could regard global community detection as an unsupervised method for finding global community structure, and regard local community detection as a semi-supervised approach for mining local community structure supervised by the seed set in the target community we want to find. 2.1 Global Community Detection Global community detection is an important topic in data mining. Global community detection methods include modularity optimization [9, 11, 36], stochastic block models [1], nonnegative matrix factorization [53, 55], spectral methods [38, 46], global seed set expansion [39, 43, 49], and many other techniques [12, 21]. In this subsection, we highlight a few lines of works in the literature that are related to our method. Spectral-based method. Spectral method is a main technique for global community detection. Von Luxburg [46] introduces the most common spectral clustering algorithms based on different graph Laplacians, and discusses the advantages and disadvantages of different spectral clustering algorithms in details. Using spectral algorithms, Newman studies the three related problems of detection by modularity maximization, statistical inference or normalized-cut graph partitioning, and finds that with certain choices of the free parameters in the spectral algorithms the three problems are identical [38]. As the classic spectral clustering method could only find disjoint communities, Zhang et al. [54] propose a new algorithm to identify overlapping communities in small networks by combining a generalized modularity function, an approximated spectral mapping of network nodes into Euclidean space and fuzzy c−means clustering. Ali and Couillet [4] propose a spectral algorithm based on the family of "α-normalized" adjacency matrices A, which is in the type of D−α AD−α with D the degree matrix, to find community structure in large heterogeneous networks. , Vol. 1, No. 1, Article . Publication date: May 2019. :4 K. He et al. Global seed set expansion. Many global community detection algorithms are based on seed set expansion. Clique Percolation [39], the most classic method, starts from maximal k−cliques and merges cliques sharing k − 1 nodes to form a percolation chain. OSLOM [31], starts with each node as the initial seed and optimizes a fitness function, defined as the probability of finding the cluster in a random null model, to join together small clusters into statistically significant larger clusters. Seed Set Expansion (SSE) [48, 49] identifies overlapping communities by expanding different types of seeds by a personalized PageRank diffusion. DEMON [17] and another independent work in [43] identify very small, tightly connected sub-communities, create a new network in which each node represents such a sub-community, and then identify communities in this meta-network. Belfin et al. [8] propose a strategy for locating suitable superior seed set by applying various centrality measures in order to find overlapping communities. 2.2 Local Community Detection Local seed set expansion. Random walks have been extensively adopted as a subroutine for locally expanding the seed set [6], and this approach is observed to produce communities correlated highly to the ground-truth communities in real-world networks [2]. PageRank, heat kernel and local spectral diffusions are three main techniques for probability diffusion. Spielman and Teng use the degree-normalized personalized [44] PageRank (DN PageRank) with truncation of small values to expand a starting seed. DN PageRank has been used in several subsequent PageRank-based clustering algorithms [6, 52], including the popular PageRank Nibble method [5]. However, a study evaluating different variations of PageRank finds that standard PageRank yields better performance than DN PageRank [28]. The heat kernel method provides another local graph diffusion. Based on a continuous-time Markov chain, the heat kernel diffusion involves the exponential of a generator matrix, which may be approximated via a series of expansion. Chung et al. have proposed a local graph partitioning based on the heat kernel diffusion [14, 15], and a Monte Carlo algorithm to estimate the heat kernel process [16]. Another approach is described in [27], where the authors estimate the heat kernel diffusion via coordinate relaxation on an implicit linear system; their approach uncovers smaller communities with substantially higher F1 measures than those found through the personalized PageRank diffusion. Spectral methods are often used to extract disjoint communities from a few leading eigenvectors of a graph Laplacian [26, 46]. Recently, there has been a growing interest in adapting the spectral approach to mine the local structure around the seed set. Mahoney, Orecchia, and Vishnoi [35] introduce a locally-biased analogue of the second eigenvector for extracting local properties of data graphs near an input seed set by finding a sparse cut, and apply the method to semi-supervised image segmentation and local community extraction. In [24, 33, 34], the authors introduce an algorithm to extract the local community by seeking a sparse vector from the local spectral subspaces using ℓ1 norm optimization. They apply a power method for the subspace iteration using a standard random walk on a modified graph with a self loop on each node, which we call the light lazy random walk. They also apply a reseeding iteration to improve the detection accuracy. Bounding the local community. All seed set expansion methods need a stopping criterion, unless the size of the target community is known in advance. Conductance is commonly recognized as the best stopping criterion [27, 48, 49, 52]. Yang and Leskovec [52] provide widely-used real- world datasets with labeled ground truth, and find that conductance and triad-partition-ratio (TPR) are the two stopping rules yielding the highest detection accuracy. He et al. [24] propose two new metrics, TPN and nMod, and compare them with conductance, modularity and TPR; and they show that conductance and TPN consistently outperform other metrics. Laarhoven and Marchiori [45] , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :5 study a continuous relaxation of conductance by investigating the relation of conductance with weighted kernel k-means. Local seeding strategies. The seeding strategy is a key part of seed set expansion algorithms. Kloumann and Kleinberg [28] argue that random seeds are superior to high degree seeds, and suggest domain experts provide seeds with a diverse degree distribution. Our initial LOSP paper [24] compares low degree, random, high triangle participation (number of triangles inside the community containing the seed) and low escape seeds (judged by probability retained on the seeds after short random walks), and find all four types of seeds yield almost the same accuracy. Our initial LOSP work shows that low degree seeds spread out the probabilities slowly and better preserve the local information, and random seeds are similar to low degree seeds due to the power law degree distribution. High triangle participation seeds and low escape seeds follow another philosophy: they choose seeds more cohesive to the target community. 3 PRELIMINARIES 3.1 Problem Formulation The local community detection problem can be formalized as follows. We are given a connected, undirected graph G = (V , E) with n nodes and m edges. Let A ∈ {0, 1}n×n be the associated adjacency matrix, and D the diagonal matrix of node degrees. Let S be the seed set of a few exemplary members in the target ground-truth community, denoted by a set of nodes T (S ⊂ T , T ≪ V ). And let s ∈ {0, 1}n×1 be a binary indicator vector representing the exemplary members in S. We are asked to identify the remaining latent members in the target community T . 3.2 Datasets We consider four groups with a total of 28 synthetic datasets, five SNAP datasets in social, product, and collaboration domains, and three biology networks for a comprehensive evaluation on the proposed LOSP algorithms. 3.2.1 LFR Benchmark. For synthetic datasets, we use the LFR standard benchmark networks proposed by Lancichinetti et al. [29, 30]. The LFR benchmark graphs have a built-in community structure that simulates properties of real-world networks accounting for heterogeneity of node degrees and community sizes that follow power law distribution. We adopt the same set of parameter settings used in [51] and generate four groups with a total of 28 LFR benchmark graphs. Table 1 summarizes the parameter settings we used, among which the mixing parameter µ has a big impact on the network topology. Parameter µ controls the average fraction of neighboring nodes that do not belong to any community for each node, two ranges of typical community size, big and small, are provided by b and s. Each node belongs to either one community or om overlapping communities, and the number of nodes in overlapping communities is specified by on. A larger om or on indicates more overlaps that are harder for the community detection task. For four groups of configurations based on the community size and on, we vary om from 2 to 8 to get seven networks in each group, denoted as: LFR_s_0.1 for {s : [10, 50], on = 500}, LFR_s_0.5 for {s : [10, 50], on = 2500}, LFR_b_0.1 for {b : [20, 100], on = 500}, and LFR_b_0.5 for {b : [20, 100], on = 2500}. The average conductance for four groups of datasets are 0.522, 0.746, 0.497 and 0.733, respectively. We see more overlapping on the communities (a bigger on) leads to a higher conductance. , Vol. 1, No. 1, Article . Publication date: May 2019. :6 K. He et al. Table 1. Parameters for the LFR benchmarks. Parameter n = 5000 µ = 0.3 ¯d = 10 dmax = 50 s : [10, 50], b : [20, 100] τ1 = 2 τ2 = 1 om ∈ {2, 3..., 8} on ∈ {500, 2500} Description number of nodes in the graph mixing parameter average degree of the nodes maximum degree of the nodes range of the community size node degree distribution exponent community size distribution exponent overlapping membership number of overlapping nodes 3.2.2 Real-world Networks. We consider five real-world network datasets with labeled ground truth from the Stanford Network Analysis Project (SNAP)1 and three genetic networks with labeled ground truth from the Isobase website2. • SNAP: The five SNAP networks, Amazon, DBLP, LiveJ, YouTube, Orkut, are in the do- mains of social, product, and collaboration [52]. For each network, we adopt the top 5000 annotated communities with the highest quality evaluated with 6 metrics [52]: Conductance, Flake-ODF, FOMD, TPR, Modularity and CutRatio. Our algorithm adopts the popular metric of conductance to automatically determine the community boundary. To make a fair compar- ison, we choose four state-of-the-art baselines that also adopt conductance to determine the community boundary. • Biology: The three genetic networks from the Isobase website describe protein interactions. HS describes these interactions in humans, SC in S. cerevisiae, a type of yeast, and DM in D. melanogaster, a type of fruit fly. Such networks are interesting as communities may correspond to different genetic functions. Table 2 summarizes the networks and their ground truth communities. We calculate the average and standard deviation of the community sizes, and the average conductance, where low conduc- tance gives priority to communities with dense internal links and sparse external links. We also define and calculate the roundness of communities. Definition 3.1. Roundness of a subgraph. The roundness of a subgraph G′ = (V ′, E′) is the average shortest path among all pair-wise nodes divided by the longest shortest path in the subgraph. 3(V ′−1) ≈ 1 The roundness value R is 1 for a clique, and R = V ′+1 3 if the subgraph is a straight line. Because large roundness value indicates a "round" subgraph and small roundness value indicates a "long and narrow" subgraph, the roundness reveals some information on the topology structure of the subgraph. Table 2 shows that communities in the above real-world networks have an average roundness of about 0.67. If we normalize the roundness value from [1/3, 1] to [0,1], then we get Rnorm = R−1/3 1−1/3 . 3.3 Evaluation Metric For the evaluation metric, we adopt F1 score to quantify the similarity between the detected local community C and the target ground truth community T . The F1 score for each pair of (C,T) is 1http://snap.stanford.edu 2http://groups.csail.mit.edu/cb/mna/isobase/ , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :7 Table 2. Statistics for real-world networks and their ground truth communities. Name Amazon Domain Product Collaboration DBLP LiveJ Social YouTube Social Orkut Social DM Biology HS Biology Biology SC Network # Nodes 334,863 317,080 3,997,962 1,134,890 3,072,441 15,294 10,153 5,523 defined by: # Edges Avg. ± Std. Size Avg. Cond. Roundness R 925,872 1,049,866 34,681,189 2,987,624 117,185,083 485,408 54,570 82,656 13 ± 18 22 ± 201 28 ± 58 21 ± 73 216 ± 321 440 ± 2096 113 ± 412 67 ± 110 0.07 0.41 0.39 0.84 0.73 0.88 0.88 0.90 Ground truth communities 0.69 0.74 0.65 0.69 0.50 0.68 0.58 0.63 Rnorm 0.54 0.61 0.48 0.54 0.25 0.52 0.37 0.45 F1(C,T) = 2C ∩ T C + T . 4 KRYLOV SUBSPACE CLUSTERING It is well known that there is a close relationship between the combinatorial characteristics of a graph and the algebraic properties of its associated matrices [13]. In this section, we present a local community detection method of finding a linear sparse coding on the Krylov subspace, which is a local approximation of the spectral subspace. We first present the local sampling method starting from the seeds to reach a comparatively small subgraph Gs, and provide the theoretical base that finding a local community containing the seeds corresponds to finding a sparse linear coding in the invariant subspace spanned by the dominant eigenvectors of the transition matrix. Then we propose a family of local spectral subspace definitions based on various short random walk diffusions, and do local community detection by finding a sparse relaxed indicator vector that lies in a local spectral subspace representing the subordinative probability of the corresponding nodes. 4.1 Local Sampling We first do a local sampling from the seeds for large networks to reduce the computational complexity. According to the small world phenomenon and "six degrees of separation", most members should be at most two or three steps far away from the seed members if we want to identify a small community of size hundreds. Thus, we mainly use a few steps of Breadth-First Search (BFS) to expand nodes for the sampling method. To avoid BFS to expand too fast, we adopt a strategy to filter some very popular nodes during the BFS expansion. The detailed description for the sampling method is as follows. Starting from each seed, we do a one-round BFS. The BFS(·) operation achieves a set of nodes containing the source node and its neighbor nodes by breadth-first search. For the current subgraph expanded by the BFS, we define the inward ratio of a node as the fraction of inward edges to the out-degree. If the sampled subgraph is no greater than the lower bound N1, then we do one more round of BFS to contain more neighbor nodes. To avoid the next round of BFS to expand too fast, we first filter low inward ratio frontier nodes which may contain some inactive nodes or very popular nodes. The Filter(·) operation chooses high inward ratio nodes until the total out-degree is no less than 3000. In the end, we union all BFS subgraphs obtained from each seed. If the amalgamated subgraph scale is larger than the upper bound N2, we then conduct a k-step short random walk from the seeds to remove some low probability nodes. Details of the sampling are as shown in Algorithm 1. , Vol. 1, No. 1, Article . Publication date: May 2019. :8 K. He et al. subgraph size N2, upper bound of BFS rounds t, and steps of random walks k for postprocessing ALGORITHM 1: Sampling Input: Graph G = (V , E), seed set S ⊆ V , lower bound of sampled size from each seed N1, upper bound of the Output: Sampled subgraph Gs = (Vs , Es) Vs ← S for each si ∈ S do Vi ← BFS(si) V ′ i ← Vi while (Vi < N1 and BFS rounds ≤ t) do i ← Filter(V ′ V ′ i ) V ′ i ← BFS(V ′ i ) Vi = Vi ∪ V ′ i end Vs = Vs ∪ Vi end Gs = (Vs , Es) is the induced subgraph from Vs if Vs > N2 then Conduct a k-steps of random walk from S in Gs Vs ← N2 nodes with higher probability Gs = (Vs , Es) is the induced subgraph from Vs end Denote the sampled subgraph as Gs = (Vs , Es) with ns nodes and ms edges in the following discussion. We then identify the local community from this comparatively small subgraph instead of the original large network. The complexity is only related to the degrees of the nodes and it is very quick in seconds for the datasets we considered. The sampling quality, evaluated by the coverage ratio of the labeled nodes, plays a key role for the follow-up membership identification. This pre-processing procedure significantly reduces the membership identification cost. 4.2 Spectra and Local Community In this subsection, we provide the necessary theoretical base that finding a low-conductance community corresponds to finding a sparse indicator vector in the span of dominant eigenvectors of the transition matrix with larger eigenvalues. Let L = Ds − As be the Laplacian matrix of Gs where As and Ds denote the adjacency matrix and the diagonal degree matrix of Gs. We define two normalized graph Laplacian matrices: Lrw = D−1 − 1 s L = I − Nrw, Lsym = D s LD 2 − 1 s = I − Nsym, 2 − 1 − 1 −1As is the transition matrix, and Nsym = D s AsD 2 2 s is the where I is the identity matrix, Nrw = Ds normalized adjacency matrix. For a community C, the conductance [41] of C is defined as min{vol(C), vol(C)} , cut(C, C) Φ(C) = where C consists of all nodes outside C, cut(C, C) denotes the number of edges between C and C, and vol(·) calculates the "edge volume", i.e. for the subset nodes, we count their total node degrees in graph Gs. Low conductance gives priority to a community with dense internal links and sparse external links. Let y ∈ {0, 1}ns×1 be a binary indicator vector representing a small community C in the sampled 2vol(Vs). As yTDsy equals graph Gs = (Vs , Es). Here for "small community", we mean vol(C) ≤ 1 , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :9 the total node degrees of C, and yTAsy equals two times the number of internal edges of C, the conductance Φ(C) could be written as a generalized Rayleigh quotient Φ(C) = yTLy yTDsy = (D 1 2 1 2 s y)TLsym(D s y) s y) (D s y)T(D 1 2 1 2 . Theorem 4.1. Let λ2 be the second smallest eigenvalue of Lsym, then conductance Φ(C) of a small community C in graph Gs = (Vs , Es) ("small" means vol(C) ≤ 0.5vol(Vs)) is bounded by λ2 2 ≤ Φ(C) ≤ 1, where vol(C) denotes for all nodes inside C ⊆ Vs, we count the total degree in graph Gs. Let Lsym = QΛQT be the eigendecomposition, where Q = (cid:2)q1 · · · qns The proof omits here, and we attach the details in Appendix A. (cid:3) is an orthonormal matrix and Λ = diag(λ1, λ2, ..., λns), λ1 ≤ λ2 ≤ ... ≤ λns Φ(C) = Let xi = qT i D 1 2 s y be the projection of D 1 2 . Then s y)TΛ(QTD s y) s y) . s y)T(QTD (QTD (QTD s y on the ith eigenvector qi of Lsym, we have 1 2 1 2 1 2 1 2 ns ns ns 2 i ins where wi = x 2 i =1 x 2 eigenvalue λ1, then most of the weight on average must be on the eigenvalues close to λ1. (1) is the weighting coefficient of the eigenvalues. If Φ(C) is close to the smallest wi λi , i =1 = i =1 λix 2 i =1 x i Φ(C) = i Theorem 4.2. Let ϵ be a small positive real number, if Φ(C) < λ1 + ϵ, then for any positive real number t, □ Note that λ1 = 0 for the Laplacian matrix Lsym [46], however, Theorem 4.2 holds for any real number λ1. Theorem 4.2 indicates for a low conductance Φ(C) close to the smallest value λ1, the ins smaller eigenvalues of Lsym contribute most of the weights. As wi = x 2 , if we want to find a low i =1 x 2 i , Vol. 1, No. 1, Article . Publication date: May 2019. i:λi <λ1+tϵ Φ(C) =   i:λi <λ1+tϵ ≥ λ1 i:λi <λ1+tϵ = λ1 + tϵ . t wi > 1 − 1  wi λi +  wi + (λ1 + tϵ)    j:λj ≥λ1+tϵ j:λj ≥λ1+tϵ wj λj wj . wj < λ1 + ϵ . j:λj ≥λ1+tϵ λ1 + tϵ  wj < 1 t ,  j:λj ≥λ1+tϵ i:λi <λ1+tϵ wi > 1 − 1 t . wj j:λj ≥λ1+tϵ Proof. By Eq. (1) we have As Φ(C) < λ1 + ϵ, we get Therefore, 1 2 1 2 i D :10 K. He et al. conductance Φ(C), wi and hence xi should be larger on smaller eigenvalues λi (1 ≤ i ≤ k ≪ ns). As s y and eigenvector qi. When we relax xi = qT y from {0, 1}ns×1 to [0, 1]ns×1, the relaxed scaled indicator vector D s y should be well approximated by a linear combination of the dominant eigenvectors with smaller eigenvalues. As s v), s v) = λ(D s y, a larger xi indicates a smaller angle between D Lrwv = λv ⇔ Lsym(D Lrwv = (I − Nrw)v = λv ⇔ Nrwv = (1 − λ)v, where v is a nonzero vector. It shows that the relaxed indicator vector y should be well approximated by a linear combination of the dominant eigenvectors of Lrw with smaller eigenvalues. Also, (2) it follows that Lrw and Nrw share the same set of eigenvectors and the corresponding eigenvalue of Nrw is 1 − λ where λ is the eigenvalue of Lrw. Equivalently, the relaxed indicator vector y should be well approximated by a linear combination of the eigenvectors of Nrw with larger eigenvalues. This leads to our idea of finding a relaxed sparse indicator vector y containing the seeds in the span of the dominant eigenvectors with larger eigenvalues of Nrw. 1 2 1 2 1 2 min ∥y∥1 = eTy s.t. (1) y = Vu, (2) yi ∈ [0, 1], (3) yi ≥ 1 S , i ∈ S, (3) (6) where the column vectors of V are formed by the dominant eigenvectors of Nrw with larger values and e is the vector of all ones. u is the coefficient vector, and yi denotes the ith element of the relaxed indicator vector y. The constraint y = Vu indicates that y lies in the eigenspace spanned by the column vectors of V. Vector y indicates the local community with low conductance containing the labeled seeds. 4.3 Krylov Subspace Approximation 4.3.1 Variants of Random Walk Diffusion. Instead of using the eigenvalue decomposition on Nrw, we consider short random walks for the probability diffusion starting from the seed set to get the "local spectral subspace". We define several variants of the spectral diffusion based on different transition matrices for the random walks. 1) Standard Random Walk (SRW) uses the transition matrix Nrw for the probability diffusion. (4) 2) Light Lazy Random Walk (LLRW) retains some probability at the current node for the random (5) 0+. α = 0 degenerates to the standard random walk and α = 1, 2, 3, ... corresponds to a walks. where α ∈ N random walk in the modified graph with 1, 2, 3, ... loops at each node. Nrw = (Ds + αI)−1(αI + As), Nrw = Ds −1As. 3) Lazy Random Walk (LRW) is defined by Nrw = (Ds + αDs)−1(αDs + As) −1As, I + Ds = α 1 + α 1 1 + α where α ∈ [0, 1]. E.g. α = 0.1 corresponds to a random walk that always retains 0.1 1+0.1 probability on the current node during the diffusion process. α = 0 degenerates to the standard random walk. (7) 4) Personalized PageRank (PPR) is defined by Nrw = αS + (1 − α)Ds −1As, , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :11 where α ∈ [0, 1] and S the diagonal matrix with binary indicators for the seed set S. E.g. α = 0.1 corresponds to a random walk that always retains 10% of the probability on the seed set. α = 0 is the standard random walk. one step of random walk is defined as NT density for a random walk of length k is given by a Markov chain: 4.3.2 Regular and Inverse Random Walks. Based on the above random walk diffusion definition, rwp for a probability column vector p, and the probability (8) pk = NT rwpk−1 = (NT rw)k p0, where p0 is the initial probability density evenly assigned on the seeds. We can also define an "inverse random walk": pk = Nrwpk−1 = (Nrw)k p0. (9) Here pk indicates a probabilty density such that the probability concentrates to the seed set as p0 after k steps of short random walks. The value of pk also shows a snapshot of the probability distri- bution for the local community around the seed set, and follow-up experiments also demonstrates the effectiveness of the "inverse random walk", which has a slightly lower accuracy as compared with the "regular random walk". 4.3.3 Local Spectral Subspace. Then we define a local spectral subspace as a proxy of the invariant subspace spanned by the leading eigenvectors of Nrw. The local spectral subspace is defined on an order-d Krylov matrix and k is the number of diffusion steps: (10) Here k and d are both some modest numbers. Then the Krylov subspace spanned by the column (k) vectors of V d to the local spectral subspace V(k) In the following discussion, we provide some theoretical analysis to relate the spectral property is called the local spectral subspace, denoted by V(k) = [pk , pk +1, ..., pk +d−1]. (k) V d d . . d Lemma 4.3. Let Gs = (Vs , Es) be a connected and non-bipartite graph with ns nodes and ms edges, Nrw (defined by Eq. (4)) the transition matrix of Gs with eigenvalues σ1 ≥ σ2 ≥ ... ≥ σns , and the corresponding normalized eigenvectors are u1, u2, . . . , uns . Then u1, u2, . . . , uns are linearly independent, and 1 = σ1 > σ2 ≥ ... ≥ σns > −1, u1 = e ∥e∥2 , where e is a vector of all ones. the corresponding eigenvalues of Lrw are λ1 ≤ λ2 ≤ ... ≤ λns λ2 ≤ ... ≤ λns Proof. By Eq. (2), we know that Lrw and Nrw share the same eigenvectors u1, u2, . . . , uns and where λi = 1 − σi (1 ≤ i ≤ ns). According to Proposition 3 of [46], Lsym and Lrw share the ns non-negative eigenvalues 0 ≤ λ1 ≤ From Theorem 8.1.1 of [19], there exists an orthogonal matrix Q = [q1, q2, ..., qns] such that and the corresponding eigenvectors of Lsym are D QTLsymQ = diaд(λ1, λ2, ..., λns). s u2, . . . , D s u1, D s uns 1 2 1 2 1 2 . It shows that q1, q2, ..., qns 1 are linearly independent. As Gs is a connected graph, D 2 s u1, u2, . . . , uns are linearly independent. are linearly independent eigenvectors of Lsym, so D s uns is invertible, and it is obvious that s u2, . . . , D s u1, D Additionally, as Lrw As Gs is a connected and non-bipartite graph, by Lemma 1.7 of [13], we have 1 − σ2 = λ2 > 0 □ = 0, we have 1 − σ1 = λ1 = 0 and u1 = e∥e∥2 = λns < 2. Therefore, σ2 < 1 and σns > −1. , so σ1 = 1. and 1 − σns e∥e∥2 1 2 1 2 1 2 , Vol. 1, No. 1, Article . Publication date: May 2019. :12 K. He et al. Theorem 4.4. Let Gs = (Vs , Es) be a connected and non-bipartite graph with ns nodes and ms edges, when k → ∞, pk defined by Eq. (9) converges to α1u1 where α1 is the nonzero weighting portion of p0 on the eigenvector u1. Proof. By Lemma 4.3, u1, u2, . . . , uns As u1 = e∥e∥2 are linearly independent normalized eigenvectors of Nrw, so there exist α1, α2, ..., αns and p0 is the initial probability density evenly assigned on the seeds, u1 and p0 are not orthogonal. It shows that α1 is the nonzero weighting portion of p0 on the eigenvector u1. Then i =1 αiui. such that p0 =ns ns pk = (Nrw)k p0 = αiσ k i ui = σ k1 i =1 αi( σi σ1 )k ui . Since 1 = σ1 > σ2 ≥ ... ≥ σns > −1 and α1 (cid:44) 0, for all i = 2, 3, ..., ns, we have ns i =1 and ( σi σ1 )k = 0, lim k→∞ lim k→∞ pk = lim k→∞ α1σ k1 u1 = α1u1. transition matrix of modified graph with a weighting loop at each node. □ Obviously, Lemma 4.3 and Theorem 4.4 also hold for Nrw based on Eq. (5) or Eq. (6), which is the By Theorem 4.4, we have the following corollary. Corollary 4.5. Suppose matrix Nrw defined by Eq. (7) has ns eigenvalues µ1, µ2, ..., µns with an associated collection of linearly independent eigenvectors {v1, v2, ..., vns }. Moreover, we assume that µ1 > µ2 ≥ ... ≥ µns . Then we have k→∞ pk = lim lim k→∞ β1µk1 v1, where pk defined by Eq. (9) and β1 is the weighting portion of p0 on the eigenvector v1. Corollary 4.5 indicates that pk converges to β1v1 if µ1 = 1 and β1 (cid:44) 0. Below, we provide some discussion on the convergence of pk defined by Eq. (8). Firstly, we give the following theorem. Theorem 4.6. Every real square matrix X is a product of two real symmetric matrices, X = YZ where Y is invertible. We will not include the proof of Theorem 4.6 here. The interested reader is referred to [10]. By Theorem 4.6, we have Nrw = PU where P and U are symmetric matrices, and P is invertible. (11) Then, Nrw = PU = P(UP)P−1 = P(PU)TP−1 = PNT rw(P−1v) = λ(P−1v), Nrwv = λv ⇔ NT rwP−1. (12) rw share the same set of eigenvalues and the By Lemma 4.3, we know that Nrw defined by Eq. (4) has ns linearly independent normal- rw has ns linearly independent eigenvectors where v is a nonzero vector. It shows that Nrw and NT corresponding eigenvector of NT ized eigenvectors u1, u2, . . . , uns P−1u1, P−1u2, . . . , P−1uns rw is P−1v where v is the eigenvector of Nrw. . Then by Eq. (12), NT . By Theorem 4.4, we have the following theorem. Theorem 4.7. Let Gs = (Vs , Es) be a connected and non-bipartite graph with ns nodes and ms edges, when k → ∞, pk defined by Eq. (8) converges to γ1P−1u1 where γ1 is the nonzero weighting portion of p0 on the eigenvector P−1u1. According to Eq. (11), we have The proof of Theorem 4.7 is similar to Theorem 4.4, hence we omit the details here. , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :13 matrix of modified graph with a weighting loop at each node. Obviously, Theorem 4.7 also holds for Nrw based on Eq. (5) or Eq. (6), which is the transition By Eq. (12) and Theorem 4.7, we have the following corollary. Corollary 4.8. Suppose matrix Nrw defined by Eq. (7) has ns eigenvalues µ1, µ2, ..., µns with an associated collection of linearly independent eigenvectors {v1, v2, ..., vns }. Moreover, we assume that µ1 > µ2 ≥ ... ≥ µns . Then we have lim k→∞ pk = lim where pk defined by Eq. (8) and δ1 is the weighting portion of p0 on the eigenvector P−1v1 of NT rw. k→∞ δ1µk1 P−1v1, Corollary 4.8 indicates that pk converges to δ1P−1v1 if µ1 = 1 and δ1 (cid:44) 0. When k → ∞, Theorem 4.4 and Corollary 4.5 state that the local spectral subspace V(k) built on "inverse random walk" approaches the eigenspace associated with eigenvector of Nrw with the largest eigenvalue, and Theorem 4.7 and Corollary 4.8 indicate that the local spectral subspace V(k) d built on "regular random walk" approaches the eigenspace associated with eigenvector of NT rw with the largest eigenvalue. Our interest now, though, is not in the limiting case when k is large, but for a much more modest number of diffusion steps to reveal the local property around the seeds. Based on different local spectral diffusions in Eq. (4) - Eq. (7), we have a set of local spectral subspace definitions. Based on Eq. (8) and Eq. (9), we have two sets of local spectral subspace definitions. rw, which is on the regular random walk, is considerably better than that on Nrw for the detection accuracy. However, the definitions on Nrw corresponding to the inverse random walk also show high accuracy as compared with the baselines. Our results show that the local approximation built on "regular random walk" shows higher accuracy than that built on "inverse random walk". Experiments in Section 5 show that the definitions on NT d 4.4 Local Community Detection We modify the optimization problem shown in Eq. (3) by relaxing each element in the indicator vector y to be nonnegative, and approximating the global spectral subspace by the local spectral subspace. Thus, we seek a relaxed sparse vector in the local spectral subspace by solving a linear programming problem. min ∥y∥1 = eTy (k) s.t. (1) y = V d u, (2) y ≥ 0, (3) yi ≥ 1 S , i ∈ S. (13) This is an ℓ1 norm approximation for finding a sparse linear coding that indicates a small community containing the seeds with y in the local spectral subspace spanned by the column (k) vectors of V . The ith entry yi indicates the likelihood of node i belonging to the target community. 1) If T is known, we then sort the values in y in non-ascending order and select the corresponding d T nodes with the higher belonging likelihood as the output community. 2) If T is unknown, we use a heuristic to determine the community boundary. We sort the nodes based on the element values of y in the decreasing order, and find a set Sk∗ with the first k∗ nodes having a comparatively low conductance. Specifically, we start from an index k0 where set Sk0 contains all the seeds. We then generate a sweep curve Φ(Sk) by increasing index k. Let k∗ be , Vol. 1, No. 1, Article . Publication date: May 2019. :14 K. He et al. the value of k where Φ(Sk) achieves a first local minimum. The set Sk∗ is regarded as the detected community. We determine a local minima as follows. If at some point k∗ when we are increasing k, Φ(Sk) stops decreasing, then this k∗ is a candidate point for the local minimum. If Φ(Sk) keeps increasing after k∗ and it eventually becomes higher than βΦ(Sk∗), then we take k∗ as a valid local minimum. We experimented with several values of β on a small trial of data and found that β = 1.02 gives good performance across all the datasets. Denote the corresponding local community detection methods based on Eq. (4) - Eq. (7) as: LRw (LOSP based on Standard Random Walk), LLi (LOSP based on Light Lazy Random Walk), LLa (LOSP based on Lazy Random Walk) and LPr (LOSP based on PPR). 5 EXPERIMENTS AND RESULTS We implement the family of local spectral methods (LOSPs) in Matlab3, 4 and thoroughly compare them with state-of-the-art localized community detection algorithms on the 28 LFR datasets as well as the 8 real-world networks across multiple domains. For the 5 SNAP datasets, we randomly locate 500 labeled ground truth communities on each dataset, and randomly pick three exemplary seeds from each target community. For the 28 LFR datasets and the 3 Biology datasets, we deal with every ground truth community and randomly pick three exemplary seeds from each ground truth community. We pre-process all real-world datasets by sampling, and apply the local spectral methods for each network. 5.1 Statistics on Sampling In order to evaluate the effectiveness of the sampling method in Algorithm 1, we empirically set (N1, N2, k) = (300, 5000, 3) to control the subgraph size and experiment with the upper bound of BFS rounds t from 1 to 5 to extract different sampling rate on Amazon, as shown in Table 3. For notations, the coverage indicates the average fraction of ground truth covered by the sampled subgraph, and ns/n indicates the sampling rate which is the average fraction of subgraph size as compared with the original network scale. Table 3 shows that there is a 7.2% significant improvement on coverage when we increase the upper bound of BFS rounds t from 1 to 2, but there is only 0.4% improvement when t continue increases from 2 to 5. On the other hand, the sampling rate is only 0.1% and the sampling procedure is very fast in 0.730 seconds for t = 2. For these reasons, we set (N1, N2, t, k) = (300, 5000, 2, 3) to trade off among the coverage, sampling rate and running time for the sampling method in our experiments. Table 4 provides statistics on real-world networks for the sampling method in Algorithm 1. For SNAP datasets, our sampling method has a high coverage with reasonable sample size, covering about 96% ground truth with a small average sampling rate of 0.1%, and the sampling procedure is within 14 seconds. For the Biology networks, which are comparatively denser, the sampled subgraph covers about 91% ground truth with a relatively high sampling rate, and the sampling procedure is very fast in less than 0.2 seconds. 5.2 Parameter Setup To remove the impact of different local spectral methods in finding a local minimum for the community boundary, we use the ground truth size as a budget for parameter testing on the family rw Krylov of LOSP methods. When we say LOSP, we mean the family of LOSP defined on the NT 3https://github.com/PanShi2016/LOSP_Plus 4https://github.com/JHL-HUST/LOSP_Plus , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :15 Table 3. Test parameter t (upper bound of BFS rounds) for the sampling on Amazon. 1 0.918 13 Statistics Coverage ns ns/n Time (s) Upper bound of BFS rounds 2 3 0.990 34 0.991 70 0.993 184 4 5 0.994 312 0.00004 0.374 0.00010 0.730 0.00021 2.208 0.00055 4.361 0.00093 7.028 Table 4. Statistics on average values for the sampling on real-world networks. SNAP ns/n Time (s) Networks Coverage ns 0.730 0.0001 34 0.990 Amazon 0.720 0.0006 198 0.980 DBLP 19.050 0.0002 629 1.000 LiveJ 0.0028 3.760 3237 0.950 YouTube 44.430 0.0013 0.870 4035 Orkut 13.738 0.001 0.958 1627 Average 0.1880 0.256 0.910 2875 0.125 0.2692 2733 0.876 0.076 0.947 0.6049 3341 0.911 2983 0.3540 0.152 Biology DM HS SC Average subspace, which is the normal case for random walk diffusion. A comparison in subsection 5.3 will show that in general, LOSP defined on NT rw Krylov subspace outperforms that on Nrw Krylov subspace with respect to the accurate detection. Dimension of the subspace and diffusion steps. For local spectral subspace, we need to choose some modest numbers for the step k of random walks and the subspace dimension d such that the probability diffusion does not reach the global stationary. We did a small trial parameter study on all datasets, and found that d = 2 and k = 2 perform the best in general. Parameters for the random walk diffusion. We thoroughly evaluate different spectral dif- fusion methods on all datasets, as shown in Fig. 1 and Fig. 2. The three columns correspond to light lazy random walk, lazy random walk and personalized pagerank with different α parameters. All three variants degenerate to the standard random walk when α = 0. The results show that light lazy random walk, lazy random walk and personalized pagerank are robust for different α parameters. The personalized pagerank declines significantly when α = 1 as all probability returns to the original seed set. During the probability diffusion, light lazy random walk and lazy random walk always retain a ratio of probability on the current set of nodes to keep the detected structure to be "local". The personalized pagerank always returns a ratio of probability from the current set of nodes to the seed set. Instead of retaining some probability distribution on the current set of nodes, the personalized , Vol. 1, No. 1, Article . Publication date: May 2019. :16 K. He et al. Fig. 1. Evaluation of different diffusion parameters α on real-world datasets (Defined on NT rw Krylov subspace, community size truncated by truth size). The three diffusions are robust for different α parameters, except for α = 1 on personalized pagerank, in which case all probability returns to the original seed set. pagerank "shrinks" some probability to the original seed set. Such process also wants to keep the probability distribution "local" but it is not continuous as compared with the previous two methods. In the following discussion, we set α = 1 for light lazy random walk and lazy random walk, and set α = 0.1 for personalized pagerank. 5.3 Evaluation on Local Spectral Methods To remove the impact of different methods in finding a local minimum for the community boundary, we use the ground truth size as a budget for the proposed four LOSP variants: LRw (standard), LLi (light lazy), LLa (lazy) and LPr (pagerank). We first compare the four LOSP variants defined on the standard NT rw Krylov subspace, then compare the general performance on subspaces defined on either NT rw Krylov subspace. Fig. 3 illustrates the average detection accu- racy on the eight real-world datasets. LLi, LPr, LLa and LRw achieve almost the same performance on almost all datasets. One exception is on YouTube that LLi, LLa and LPr considerably outperform LRw. LLi achieves slightly better performance on four out of eight real-world networks. Evaluation on variants of NT rw or Nrw. Fig. 4 illustrates the average detection accuracy on the four sets with a total of 28 LFR networks. For on = 500, Fig. 4 (a) and Fig. 4 (c) show that LLi, LPr and LRw achieve almost the same performance and outperform LLa on average. For on = 2500, Fig. 4 (b) and Fig. 4 (d) show that LLi, LPr and LLa achieve almost the same performance and outperform LRw on average. On both cases, LLi, LOSP with light lazy, demonstrates slightly higher accuracy on LFR datasets. For the running time on the sampled subgraphs of all datasets, LLi, LPr, LLa and LRw take almost the same time, and run within 1.1 seconds, as shown in Fig. 5 and Fig. 6. Comparison on NT rw and Nrw Krylov subspace. We compare the average F1 score on each group of networks: SNAP, Biology and the four groups of LFR. Table 5 shows the comparison of detection accuracy where the community is truncated on truth size for subspace definitions on NT rw and Nrw respectively (The best three values on each row appear in bold). In general, NT rw outperforms Nrw, especially on real-world datasets. When comparing with the LOSP variant defined on Nrw, the four variants defined on NT rw have about 15% or 5% higher F1 scores on SNAP and rw performs slightly better Biology respectively. As for the synthetic LFR datasets, in general, NT than Nrw on the small ground truth communities, while Nrw performs slightly better than NT rw on rw is always on top the big ground truth communities. Among all the variants of LOSP, LLi on NT three for all datasets. In summary, LLi on NT rw performs better than other variants of LOSP. , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :17 Fig. 2. Evaluation of different diffusion parameters α on LFR datasets (Defined on NT rw Krylov subspace, community size truncated by truth size). The three diffusions are robust for different α parameters, except for α = 1 on personalized pagerank, in which case all probability returns to the original seed set. , Vol. 1, No. 1, Article . Publication date: May 2019. :18 K. He et al. Fig. 3. Accuracy evaluation of LOSP on real-world networks (Defined on NT rw Krylov subspace, community size truncated by truth size). LOSPs based on the four diffusions show similar accuracy over all datasets. LLi, LOSP with light lazy, demonstrates slightly higher accuracy on half of the datasets. (a) LFR_s_0.1 (b) LFR_s_0.5 (c) LFR_b_0.1 (d) LFR_b_0.5 Fig. 4. Accuracy evaluation of LOSP on LFR networks (Defined on NT rw Krylov subspace, community size truncated by truth size). The accuracy decays when the overlapping membership, om, increases from 2 to 8. LOSPs based on the four diffusions show similar accuracy over all datasets. LLi, LOSP with light lazy, demonstrates slightly higher accuracy. , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :19 Fig. 5. Running time evaluation of LOSP on real-world networks (Defined on NT rw Krylov subspace, community size truncated by truth size). LOSPs based on the four diffusions show similar running time over all datasets, which are within 1.1 seconds. (a) LFR_s_0.1 (b) LFR_s_0.5 (c) LFR_b_0.1 (d) LFR_b_0.5 Fig. 6. Running time evaluation of LOSP on LFR networks (Defined on NT rw Krylov subspace, community size truncated by truth size). LOSPs based on the four diffusions show similar running time over all datasets, which are around 0.4 seconds. , Vol. 1, No. 1, Article . Publication date: May 2019. :20 K. He et al. Table 5. Comparison of average F1 score for subspaces on NT the variants of LOSP, LLi on NT rw is always on top three for all datasets. rw and Nrw (Truncated on truth size). Among all Subspace on Nrw Datasets Subspace on NT rw LLa LPr SNAP Biology LFR_s_0.1 LFR_s_0.5 LFR_b_0.1 0.536 LFR_b_0.5 0.273 LLi 0.757 0.757 0.749 0.729 0.328 0.335 0.331 0.315 0.675 0.677 0.381 0.371 0.526 0.260 LPr LRw LLi 0.601 0.578 0.284 0.287 0.660 0.660 0.673 0.351 0.341 0.373 0.515 0.568 0.550 0.238 0.272 0.254 0.570 0.356 0.488 0.265 LRw LLa 0.556 0.594 0.266 0.246 0.628 0.600 0.317 0.364 0.516 0.523 0.272 0.230 Table 6. Comparison of average F1 score for subspaces on NT tance). Among all the variants of LOSP, LLi on NT rw and Nrw (Truncated on local minimal conduc- rw is always on top three for all datasets. Subspace on Nrw Datasets Subspace on NT rw LLa LPr LRw LLi 0.518 0.146 LLi 0.620 0.604 0.599 0.593 SNAP 0.182 0.171 0.206 0.150 Biology 0.574 0.561 LFR_s_0.1 0.291 LFR_s_0.5 0.334 0.365 LFR_b_0.1 0.387 0.169 LFR_b_0.5 0.198 LLa LPr 0.526 0.514 0.166 0.160 0.554 0.576 0.546 0.518 0.232 0.332 0.311 0.337 0.358 0.406 0.348 0.353 0.134 0.217 0.186 0.214 0.443 0.265 0.296 0.168 LRw 0.503 0.135 0.539 0.217 0.393 0.131 It is interesting that the results on Nrw is reasonably good. Even if we use the first local conduc- tance to do the truncation, as shown in Table 6 (The best three values on each row appear in bold), the accuracy decays by about 5% to 15% as compared with that of the truncation on truth size (in Table 5). Nevertheless, the results of Table 6 are still much better than that of state-of-the-art local community detection algorithms, heat kernel (HK) and pagerank (PR), whose results are listed in Table 7 and Table 9. Comparison on Krylov subspace and eigenspace for Nrw. In order to evaluate the effective- ness of Krylov subspace approximation, we compare Krylov subspace with the actual eigenspace. To make a fair comparison, we choose LRw defined on Nrw Krylov subspace and adopt our method on the actual eigenspace associated with two leading eigenvectors of standard transition matrix Nrw with larger eigenvalues, denoted as GLOSP (GLObal SPectral). Fig. 7 illustrates the average detection accuracy on real-world networks and LFR datasets. For real-world networks, Fig. 7 (a) shows that LRw considerably outperforms GLOSP. For LFR datasets, Fig. 7 (b) illustrates that LRw is much better than GLOSP on each dataset. These experiments show that it is not good if we use the actual eigenspace that embodies the global structure, even on the comparatively small subgraph. , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :21 (a) (b) Fig. 7. Accuracy comparison with GLOSP based on actual eigenspace on real-world networks and LFR datasets (Community size truncated by truth size). In (b), the overlapping membership (om) starts from 2 to 8 for each group of LFR datasets. Note that the bars for GLOSP and LRw both start from zero to the height. 5.4 Final Comparison For the final comparison, we find a local minimum of conductance to automatically determine the community boundary. Subsection 5.3 shows that LLi, LOSP with light lazy, is on average the best LOSP method defined on NT rw Krylov subspace on all datasets. In this subsection, we just compare LLi defined on the NT rw Krylov subspace with four state-of-the-art local community detection algorithms, LEMON [34], PGDc-d [45], HK for hk-relax [27] and PR for pprpush [5], which also use conductance as the metric to determine the community boundary. LEMON is a local spectral approach based on normalized adjacency matrix iteration, PGDc-d is a projected gradient descent algorithm for optimizing σ-conductance, and HK is based on heat kernel diffusion while PR is based on the pagerank diffusion. To make a fair comparison, we use the default parameter settings for baselines as they also test on SNAP datasets, and run the five algorithms on the same three seeds randomly chosen from the ground truth communities. 5.4.1 Comparison on Real-world Datasets. For each of the real-world networks, Table 7 shows the average detection accuracy (The best value appears in bold in each row) and the average running time, Table 8 shows the average community size and the average conductance of the detected communities. For the SNAP datasets in product, collaboration and social domains, LLi yields considerably higher accuracy on the first three datasets (Amazon, DBLP, and LiveJ), and yields slightly lower accuracy on YouTube and Orkut. To have a better understanding on the results, we compare the property of the detection with the property of the ground truth communities, as shown in Table 2. • For the first three datasets, the average size of the ground truth is small between 10 to 30, and the conductance is diverse (very low in Amazon and with reasonable value around 0.4 in DBLP and LiveJ). In general, the size and conductance of our detected communities are closest to the ground truth. This may explain why our detection accuracy is considerably higher than the baselines. • For the last two datasets YouTube and Orkut, the average conductance of ground truth is very high with 0.84 and 0.73, respectively, and the size is diverse (very small of 21 on average in YouTube and large of 216 on average in Orkut). We found much larger communities with close conductance on YouTube (0.736) and Orkut (0.791). PGDc-d found much smaller communities , Vol. 1, No. 1, Article . Publication date: May 2019. :22 K. He et al. with close conductance on YouTube, and HK found reasonable-size communities with lower conductance on Orkut. This may explain why our detection accuracy on YouTube and Orkut is slightly lower than PGDc-d and HK, respectively. For the three Biology datasets, LLi outperforms HK and PR, and yields slightly lower accuracy compared with LEMON and PGDc-d. Also, the conductance of the communities detected by LEMON (around 0.88) and PGDc-d (around 0.98) are very close to that of the ground truth (around 0.88, as shown in Table 2), compared with LLi (around 0.74), HK (around 0.37) and PR (around 0.20). As for the community size, we detected larger communities as compared to the ground truth, LEMON and PGDc-d detect much smaller communities, while HK and PR detect even larger communities. For the running time, as shown in Table 7, LLi is fast in 4 seconds on SNAP and in 16 seconds on Biology datasets. The four baselines, LEMON, PGDc-d, HK and PR, are faster in less than 1.2 seconds. This may due to that LLi is implemented in Matlab while the most baselines are implemented in C++. Table 7. Comparison on detection accuracy and running time with baselines on real-world networks. SNAP Datasets Amazon DBLP LiveJ YouTube Orkut Average Biology DM HS SC Average LLi 0.800 0.779 0.797 0.445 0.279 0.620 0.221 0.206 0.120 0.182 F1 score Time (s) PR LEMON PGDc-d HK 0.531 0.751 0.388 0.413 0.525 0.573 0.091 0.143 0.357 0.303 0.378 0.437 0.035 0.219 0.020 0.025 0.036 0.034 0.030 0.093 0.576 0.523 0.388 0.447 0.117 0.410 0.274 0.213 0.238 0.242 0.723 0.590 0.519 0.351 0.096 0.456 0.322 0.200 0.239 0.254 LLi 0.011 0.099 0.756 9.268 12.235 4.474 33.535 3.823 11.119 16.159 LEMON PGDc-d HK 0.008 0.025 0.029 0.038 0.027 0.025 0.015 0.071 0.034 0.040 0.039 0.271 0.553 1.458 1.328 0.730 1.151 0.462 0.950 0.854 0.058 0.063 1.759 0.329 3.212 1.084 0.007 0.003 0.002 0.004 PR 0.015 0.075 0.264 0.955 1.392 0.540 1.394 1.048 0.979 1.140 Table 8. Comparison on community size and conductance with baselines on real-world networks. SNAP Datasets Amazon DBLP LiveJ YouTube Orkut Average Biology DM HS SC Average LLi 8 10 35 588 1733 475 992 465 1623 1027 Size Conductance LEMON PGDc-d HK 48 87 119 122 341 143 606 4360 2604 2523 13 20 26 18 9 17 19 13 14 15 3 4 3 12 3 5 3 5 3 4 PR LLi 0.300 4485 0.396 9077 0.305 512 13840 0.736 0.791 1648 0.506 5912 0.772 15120 10144 0.758 0.696 2673 9312 0.742 LEMON PGDc-d HK 0.042 0.110 0.083 0.175 0.513 0.185 0.571 0.229 0.322 0.374 0.605 0.751 0.817 0.723 0.976 0.774 0.980 0.966 0.990 0.979 0.850 0.559 0.637 0.748 0.934 0.746 0.909 0.836 0.903 0.883 PR 0.030 0.114 0.086 0.302 0.546 0.216 0.181 0.080 0.343 0.201 , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :23 Table 9. Comparison on detection accuracy and running time with baselines on LFR networks. Datasets LFR s_0.1_2 s_0.1_3 s_0.1_4 s_0.1_5 s_0.1_6 s_0.1_7 s_0.1_8 Average s_0.5_2 s_0.5_3 s_0.5_4 s_0.5_5 s_0.5_6 s_0.5_7 s_0.5_8 Average b_0.1_2 b_0.1_3 b_0.1_4 b_0.1_5 b_0.1_6 b_0.1_7 b_0.1_8 Average b_0.5_2 b_0.5_3 b_0.5_4 b_0.5_5 b_0.5_6 b_0.5_7 b_0.5_8 Average LLi 0.673 0.621 0.583 0.555 0.548 0.536 0.503 0.574 0.496 0.388 0.336 0.313 0.284 0.260 0.260 0.334 0.461 0.417 0.392 0.361 0.374 0.353 0.349 0.387 0.309 0.236 0.198 0.177 0.170 0.150 0.149 0.198 F1 score Time (s) LEMON PGDc-d HK 0.051 0.028 0.027 0.044 0.026 0.041 0.029 0.035 0.019 0.020 0.019 0.018 0.017 0.017 0.016 0.018 0.094 0.064 0.092 0.073 0.060 0.047 0.051 0.069 0.040 0.039 0.035 0.033 0.031 0.031 0.030 0.034 0.261 0.261 0.263 0.258 0.255 0.260 0.252 0.259 0.266 0.253 0.257 0.261 0.257 0.257 0.261 0.259 0.140 0.135 0.141 0.134 0.144 0.143 0.143 0.140 0.135 0.135 0.138 0.135 0.141 0.134 0.137 0.136 0.458 0.452 0.445 0.436 0.435 0.441 0.429 0.442 0.389 0.310 0.295 0.281 0.268 0.249 0.247 0.291 0.279 0.260 0.268 0.255 0.272 0.267 0.269 0.267 0.207 0.197 0.176 0.154 0.151 0.144 0.149 0.168 PR LLi 0.918 0.969 1.022 1.123 1.269 1.342 1.371 1.145 1.232 1.626 1.708 1.949 1.899 1.914 2.037 1.766 1.089 1.253 1.424 1.595 1.640 1.608 1.597 1.458 1.579 1.858 2.026 1.818 2.079 2.123 2.116 1.943 0.025 0.025 0.024 0.024 0.024 0.026 0.024 0.025 0.020 0.022 0.020 0.019 0.018 0.018 0.017 0.019 0.040 0.043 0.039 0.042 0.038 0.039 0.038 0.040 0.042 0.041 0.037 0.036 0.033 0.033 0.032 0.036 LEMON PGDc-d HK 0.025 0.025 0.025 0.026 0.025 0.025 0.025 0.025 0.028 0.026 0.028 0.028 0.027 0.027 0.025 0.027 0.026 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 0.025 1.282 1.031 1.470 1.814 1.666 1.703 1.502 1.495 1.222 1.160 1.032 1.052 0.896 0.928 0.939 1.033 0.924 0.779 0.931 0.963 0.923 1.019 0.902 0.920 0.793 0.896 0.883 0.949 1.029 1.142 0.968 0.951 0.207 0.201 0.201 0.202 0.207 0.197 0.205 0.203 0.209 0.212 0.232 0.217 0.214 0.216 0.216 0.217 0.189 0.189 0.195 0.194 0.194 0.207 0.209 0.197 0.210 0.205 0.200 0.205 0.216 0.200 0.203 0.206 PR 0.692 0.693 0.690 0.675 0.682 0.677 0.678 0.684 0.680 0.686 0.683 0.687 0.690 0.694 0.696 0.688 0.737 0.720 0.717 0.713 0.718 0.714 0.721 0.720 0.718 0.706 0.701 0.689 0.705 0.704 0.703 0.704 5.4.2 Comparison on LFR Datasets. For each of the synthetic LFR datasets (Properties described in subsection 3.2.1. Recall that the ground truth communities are in size [10,50] for s and [20,100] for b), Table 9 shows the average detection accuracy (The best value appears in bold in each row) and the average running time, Table 10 further shows the average community size and the average conductance of the detected communities. For the four groups with a total of 28 LFR datasets, LLi clearly outperforms the state-of-the-art baselines, LEMON, PGDc-d, HK and PR, as evaluated by F1 score in Table 9. On further analysis of each group, shown in Table 10, we see that: , Vol. 1, No. 1, Article . Publication date: May 2019. :24 K. He et al. Table 10. Comparison on community size and conductance with baselines on LFR networks. Datasets Size: [10, 50] Cond.: 0.746 Cond.: 0.522 LFR Size: [10, 50] s_0.1_2 s_0.1_3 s_0.1_4 s_0.1_5 s_0.1_6 s_0.1_7 s_0.1_8 Average s_0.5_2 s_0.5_3 s_0.5_4 s_0.5_5 s_0.5_6 s_0.5_7 s_0.5_8 Average b_0.1_2 Size: b_0.1_3 [20, 100] b_0.1_4 b_0.1_5 b_0.1_6 b_0.1_7 b_0.1_8 Average b_0.5_2 Size: b_0.5_3 [20, 100] b_0.5_4 b_0.5_5 b_0.5_6 b_0.5_7 b_0.5_8 Average Cond.: 0.497 Cond.: 0.733 Size Conductance LLi LEMON PGDc-d HK 2279 13 2356 12 11 2354 2363 11 2387 34 2349 22 39 2371 2351 20 2420 49 2456 76 121 2459 2463 129 2384 210 2374 213 220 2304 2409 145 2258 16 2368 15 22 2267 2354 25 2374 50 2417 29 40 2374 2344 28 2465 33 2430 106 237 2440 2473 184 2425 196 2415 247 268 2406 2436 182 20 17 20 19 20 20 19 19 14 15 15 16 16 17 17 16 16 14 16 18 17 17 16 16 14 16 16 18 15 19 17 16 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 3 PR LLi 0.557 2327 0.598 2317 2318 0.619 0.636 2328 0.627 2302 0.644 2272 2278 0.666 0.621 2306 0.741 2313 0.789 2281 2258 0.801 0.814 2246 0.813 2242 0.817 2231 2230 0.812 0.798 2257 0.666 2344 0.688 2340 2343 0.702 0.716 2334 0.698 2323 0.710 2326 2330 0.714 0.699 2334 0.792 2299 0.808 2280 2252 0.813 0.815 2242 0.817 2240 0.810 2224 2221 0.804 0.808 2251 LEMON PGDc-d HK 0.276 0.289 0.294 0.300 0.295 0.300 0.305 0.294 0.333 0.348 0.359 0.362 0.355 0.358 0.368 0.355 0.303 0.307 0.308 0.301 0.296 0.296 0.312 0.303 0.343 0.340 0.353 0.373 0.359 0.363 0.363 0.356 0.938 0.945 0.954 0.957 0.954 0.959 0.968 0.954 0.956 0.966 0.972 0.978 0.981 0.986 0.985 0.975 0.977 0.975 0.981 0.976 0.974 0.980 0.980 0.978 0.982 0.986 0.990 0.989 0.991 0.994 0.994 0.989 0.537 0.563 0.534 0.556 0.548 0.555 0.568 0.552 0.643 0.675 0.695 0.699 0.714 0.715 0.721 0.695 0.660 0.686 0.656 0.659 0.647 0.638 0.664 0.659 0.711 0.695 0.711 0.692 0.733 0.696 0.720 0.708 PR 0.269 0.281 0.286 0.290 0.294 0.297 0.302 0.288 0.324 0.346 0.357 0.363 0.368 0.371 0.374 0.358 0.286 0.295 0.295 0.300 0.301 0.301 0.304 0.297 0.336 0.355 0.362 0.365 0.368 0.369 0.370 0.361 • LFR_s_0.1. The size of the ground truth is in [10, 50], and the average conductance of the ground truth is 0.522. The average community size of LLi over the seven LFR_s_0.1 datasets is 20, while the baselines detect either much smaller communities in size 3 (PGDc-d) or much larger communities in size 2300 (HK and PR). Due to the difference on the detected community size, LLi has a stable conductance of around 0.62 while the baselines have a high conductance of around 0.95 (PGDc-d) or a low conductance of around 0.29 (HK and PR). • LFR_s_0.5. The size of the ground truth is in [10, 50], and the average conductance of the ground truth is 0.746. The average community size of LLi is considerably larger in 145, and the average conductance of 0.798 is close to that of the ground truth. LEMON and PGDc-d achieve , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :25 Fig. 8. Accuracy comparison with HKL and PRL on real-world networks (Community size truncated by local minimal conductance). (a) LFR_s_0.1 (b) LFR_s_0.5 (c) LFR_b_0.1 (d) LFR_b_0.5 Fig. 9. Accuracy comparison with HKL and PRL on LFR datasets (Community size truncated by local minimal conductance). smaller communities with higher conductance. HK and PR find much larger communities, leading to apparently smaller conductance. , Vol. 1, No. 1, Article . Publication date: May 2019. :26 K. He et al. • LFR_b_0.1. The size of the ground truth is in [20, 100], and the average conductance of the ground truth is 0.497. The average community size of LLi is suitable in 28. The baselines detect much smaller communities of size around 3 (PGDc-d) or much larger communities of size around 2300 (HK and PR). Due to the difference on the detected community size, LLi has a stable conductance of around 0.70, while the baselines have either much higher conductance of around 0.98 (PGDc-d) or much lower conductance of around 0.30 (HK and PR). • LFR_b_0.5. The size of the ground truth is in [20, 100], and the average conductance of the ground truth is 0.733. The average community size of LLi is considerably larger in 182, and the average conductance of 0.808 is close to that of the ground truth. LEMON and PGDc-d achieve smaller communities with higher conductance. HK and PR find much larger communities, leading to apparently smaller conductance. It is reasonable that the detection accuracy decays on graphs where there exist more overlapings indicated by higher om and on. LLi is adaptive to find suitable size of communities for different configurations, and substantially outperforms the baselines. LEMON and PGDc-d tend to find much- smaller-size communities with higher-conductance, while HK and PR tend to find much-larger-size communities with lower-conductance and their detection accuracy is very low in less than 0.1 on average on each of the four groups of datasets. For the running time, as shown in Table 9, LLi is fast in 1 to 2 seconds while the four baselines, LEMON, PGDc-d, HK and PR, are slightly faster in less than 1.5 seconds. This may due to the implementation difference on programming language. 5.4.4 5.4.3 More Comparison on the variants of HK and PR. In order to evaluate the effectiveness of using the local minimal conductance for determining the community boundary, we compare LLi with the modification versions of HK and PR, based on local minimal conductance rather than global minimal conductance, denoted by HKL and PRL. Fig. 8 and Fig. 9 illustrate the average detection accuracy on real-world networks and LFR datasets, respectively. For real-world networks, Fig. 8 shows that HKL yields higher accuracy on each dataset compared with HK, while PRL achieves lower accuracy compared with PR on Amazon, DBLP, LiveJ and Orkut. On average, LLi still outperforms HKL and PRL. For LFR datasets, Fig. 9 shows that LLi outperforms HKL and PRL on each LFR network. HKL and PRL yield considerably higher accuracy on each LFR dataset compared with HK and PR, respectively. These experiments show that it is useful for improving performance based on local minimal conductance truncation. Summary on the Proposed Algorithm. For all comparisons of LLi, LOSP with light lazy, with four baselines, we see that LLi is adaptive for different configurations of the synthetic LFR datasets. LLi could find small communities with dozens of members for s: [10,50] and medium communities with hundreds of members for b: [20,100]. For well-defined community structure (low conductance, less overlapping, reasonably small), LLi has a high detection accuracy (LFR_s_0.1, LFR_b_0.1). When the overlapping membership (om) or the number of overlapping nodes (on) increases, the community structure becomes more mixed, and the detection accuracy decays. Nevertheless, LLi always yields the best accuracy for different parameter settings. By comparison, LEMON always finds communities of size around 20, PGDc-d always finds communities of size less than 10, and HK as well as PR always find large communities of size around 2300. Thus, they are not very scalable to networks with diverse community structure. Comparisons on real-world datasets also show that LLi is very good for finding small communities with reasonably low conductance (Amazon, DBLP and LiveJ). If the community structure is not very clear, for example, with high conductance of around 0.90 on the Biology datasets, LLi tends to , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :27 find larger communities using longer time due to the sweep search, and it does not yield the best accuracy. Therefore, our method can be used for large-scale real-world complex networks, especially when the communities are in reasonable size of no greater than 500, and the network has a reasonable clear community structure. 6 CONCLUSION This paper systematically explores a family of local spectral methods (LOSP) for finding members of a local community from a few randomly selected seed members. Based on a Krylov subspace approximation, we define "approximate eigenvectors" for a subgraph including a neighborhood around the seeds, and describe how to extract a community from these approximate eigenvectors. By using different seed sets that generate different subspaces, our method is capable of finding overlapping communities. Variants of LOSP are introduced and evaluated. Four types of random walks with different diffusion speeds are studied, regular random walk and inverse random walk are compared, and analysis on the link between Krylov subspace and eigenspace is provided. For this semi-supervised learning task, LOSP outperforms prior state-of-the-art local community detection methods in social and biological networks as well as synthetic LFR datasets. A THE PROOF OF THEOREM 4.1 Before given the proof of Theorem 4.1, we first give the following theorem. Theorem A.1. (Courant-Fischer Formula) Let H be an n × n symmetric matrix with eigenvalues (H) 1 ≤ λ (H) n and corresponding eigenvectors v1, v2, . . . , vn. Then (H) 2 ≤ . . . ≤ λ λ (H) 1 = min ∥x∥2=1 (H) 2 = min ∥x∥2 =1 x⊥v1 (H) n = max ∥x∥2=1 λ λ λ xTHx = min x(cid:44)0 xTHx = min x(cid:44)0 x⊥v1 xTHx = max x(cid:44)0 xTHx xTx xTHx xTx xTHx xTx , , .   (zi − zj)2 2 referred to [19]. We will not include the proof of the Courant-Fischer Formula here. The interested reader is Let Lsym be the normalized graph Laplacian matrix of Gs with eigenvalues λ1 ≤ λ2 ≤ ... ≤ λns . According to Proposition 3 of [46], Lsym has ns s e) = 0 where e is the vector of all ones, we have λ1 = 0, and corresponding eigenvectors q1, q2, . . . , qns non-negative eigenvalues. As Lsym(D q1 = D ∥D 1 2 . 1 2 s e 1 s e∥2 2 By Theorem A.1, we have xTLsymx s x, di is the degree of the ith node and λ2 = min x(cid:44)0 x⊥q1 = min z(cid:44)0 z⊥Dse zTLz zTDsz xTx − 1 2 i∼j where z = D {i, j} for which i and j are adjacent. i∼j = min z(cid:44)0 z⊥Dse denotes the sum over all unordered pairs i dizi (14) , Proof of Theorem 4.1. Let z = y − σe, where y ∈ {0, 1}ns×1 is a binary indicator vector representing community C in graph Gs, e the vector of all ones, and σ = vol(C) vol(Vs). , Vol. 1, No. 1, Article . Publication date: May 2019. :28 K. He et al. We can check that z ⊥ Dse: We also know It remains to compute vol(Vs)vol(Vs) = 0. zTDse = yTDse − σeTDse = vol(C) − vol(C) zTLz = (y − σe)TL(y − σe) = yTLy. zTDsz = (y − σe)TDs(y − σe) = yTDsy − 2σyTDse + σ = vol(C) − 2σvol(C) + σ 2eTDse 2vol(Vs) vol(C)vol(Vs − C) vol(Vs) . By Eq. (14), we have = λ2 ≤ zTLz zTDsz = yTLy · vol(Vs) vol(C)vol(Vs − C) . As the larger value of vol(C) and vol(Vs − C) is at least half of vol(Vs), vol(C) = 2 yTLy min(vol(C), vol(Vs − C)) = 2 yTLy λ2 ≤ 2 yTLy yTDsy Therefore, = 2Φ(C). (15) (16) □ And it is obvious that λ2 2 ≤ Φ(C). yTLy yTDsy Φ(C) = ≤ 1. ACKNOWLEDGMENTS This work was supported by National Natural Science Foundation of China (61772219, 61702473, 61572221). arXiv:1703.10146 (2017). REFERENCES [1] Emmanuel Abbe. 2017. Community detection and stochastic block models: recent developments. arXiv preprint [2] Bruno Abrahao, Sucheta Soundarajan, John E. Hopcroft, and Robert Kleinberg. 2014. A separability framework for analyzing community structure. ACM Transactions on Knowledge Discovery from Data (TKDD) 8, 1 (2014), 5. [3] Yong-Yeol Ahn, James P. Bagrow, and Sune Lehmann. 2010. Link communities reveal multiscale complexity in networks. Nature 466, 7307 (2010), 761 -- 764. [4] Hafiz Tiomoko Ali and Romain Couillet. 2017. Improved spectral community detection in large heterogeneous networks. The Journal of Machine Learning Research 18, 1 (2017), 8344 -- 8392. [5] Reid Andersen, Fan Chung, and Kevin Lang. 2006. Local graph partitioning using PageRank vectors. In FOCS. 475 -- 486. [6] Reid Andersen and Kevin J Lang. 2006. Communities from seed sets. In WWW. ACM, 223 -- 232. [7] Seung-Hee Bae, Daniel Halperin, Jevin D. West, Martin Rosvall, and Bill Howe. 2017. Scalable and Efficient Flow-Based Community Detection for Large-Scale Graph Analysis. TKDD 11, 3 (2017), 32:1 -- 32:30. [8] RV Belfin, Piotr Bródka, et al. 2018. Overlapping community detection using superior seed set selection in social networks. Computers & Electrical Engineering (2018). [9] Vincent D Blondel, Jean-Loup Guillaume, Renaud Lambiotte, and Etienne Lefebvre. 2008. Fast unfolding of communities in large networks. Journal of statistical mechanics: theory and experiment 2008, 10 (2008), P10008. [10] A. J. Bosch. 1986. The factorization of a square matrix into two symmetric matrices. The American Mathematical Monthly 93, 6 (1986), 462 -- 464. [11] Jie Cao, Zhan Bu, Guangliang Gao, and Haicheng Tao. 2016. Weighted modularity optimization for crisp and fuzzy community detection in large-scale networks. Physica A: Statistical Mechanics and its Applications 462 (2016), 386 -- 395. , Vol. 1, No. 1, Article . Publication date: May 2019. Krylov Subspace Approximation for Local Community Detection in Large Networks :29 [12] Jinxin Cao, Di Jin, Liang Yang, and Jianwu Dang. 2018. Incorporating network structure with node contents for community detection on large networks using deep learning. Neurocomputing 297 (2018), 71 -- 81. [13] Fun Chung. 1997. Spectral graph theory. American Mathematical Soc. [14] Fan Chung. 2007. The heat kernel as the PageRank of a graph. PNAS 104, 50 (2007), 19735 -- 19740. [15] Fun Chung. 2009. A local graph partitioning algorithm using heat kernel PageRank. Internet Mathematics 6, 3 (2009), 315 -- 330. 490 -- 512. [16] Fan Chung and Olivia Simpson. 2013. Solving linear systems with boundary conditions using heat kernel PageRank. In Algorithms and Models for the Web Graph (WAW). 203 -- 219. [17] Michele Coscia, Giulio Rossetti, Fosca Giannotti, and Dino Pedreschi. 2012. Demon: a local-first discovery method for overlapping communities. In KDD. ACM, 615 -- 623. [18] Santo Fortunato and Claudio Castellano. 2012. Community Structure in Graphs. Computational Complexity (2012), [19] Gene H. Golub and Charles F. Van Loan. 1996. Matrix computations (3. ed.). Johns Hopkins University Press. [20] Yu Han and Jie Tang. 2015. Probabilistic community and role model for social networks. In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 407 -- 416. [21] Dongxiao He, Xinxin You, Zhiyong Feng, Di Jin, Xue Yang, and Weixiong Zhang. 2018. A Network-Specific Markov Random Field Approach to Community Detection. In Thirty-Second AAAI Conference on Artificial Intelligence. [22] Kun He, Yingru Li, Sucheta Soundarajan, and John E. Hopcroft. 2018. Hidden community detection in social networks. Inf. Sci. 425 (2018), 92 -- 106. [23] Kun He, Pan Shi, John E Hopcroft, and David Bindel. 2016. Local spectral diffusion for robust community detection. In Twelfth Workshop on Mining and Learning with Graphs. [24] Kun He, Yiwei Sun, David Bindel, John E. Hopcroft, and Yixuan Li. 2015. Detecting overlapping communities from local spectral subspaces. In ICDM. 769 -- 774. [25] Lucas G. S. Jeub, Prakash Balachandran, Mason A. Porter, Peter J. Mucha, and Michael W. Mahoney. 2015. Think locally, act locally: Detection of small, medium-sized, and large communities in large networks. Physical Review E 91, 1 (2015), 012821. [26] Ravi Kannan, Santosh Vempala, and Adrian Vetta. 2000. On clusterings - good, bad and spectral. In FOCS. 367 -- 377. [27] Kyle Kloster and David F. Gleich. 2014. Heat kernel based community detection. In KDD. ACM, 1386 -- 1395. [28] Isabel M. Kloumann and Jon M. Kleinberg. 2014. Community membership identification from small seed sets. In KDD. ACM, 1366 -- 1375. [29] Andrea Lancichinetti and Santo Fortunato. 2009. Benchmarks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Physical Review E 80, 1 (2009), 016118. [30] Andrea Lancichinetti, Santo Fortunato, and Filippo Radicchi. 2008. Benchmark graphs for testing community detection [31] Andrea Lancichinetti, Filippo Radicchi, Jose J. Ramasco, and Santo Fortunato. 2011. Finding statistically significant algorithms. Physical Review E 78, 4 (2008), 046110. communities in networks. PLoS ONE 6, 4 (2011), e18961. [32] Jure Leskovec, Kevin J. Lang, Anirban Dasgupta, and Michael W. Mahoney. 2008. Statistical properties of community structure in large social and information networks. In WWW. 695 -- 704. [33] Yixuan Li, Kun He, David Bindel, and John E. Hopcroft. 2015. Uncovering the small community structure in large networks. In WWW. 658 -- 668. [34] Yixuan Li, Kun He, Kyle Kloster, David Bindel, and John E. Hopcroft. 2018. Local Spectral Clustering for Overlapping Community Detection. TKDD 12, 2 (2018), 17:1 -- 17:27. [35] Michael W. Mahoney, Lorenzo Orecchia, and Nisheeth K. Vishnoi. 2012. A local spectral method for graphs: with applications to improving graph partitions and exploring data graphs locally. The Journal of Machine Learning Research 13, 1 (2012), 2339 -- 2365. [36] Mark EJ Newman. 2004. Fast algorithm for detecting community structure in networks. Physical review E 69, 6 (2004), [37] M. E. J. Newman. 2006. Modularity and community structure in networks. Proceedings of the National Academy of [38] M. E. J. Newman. 2013. Spectral methods for network community detection and graph partitioning. Physical Review E 066133. Sciences 103, 23 (2006), 8577 -- 8582. 88, 4 (2013), 042822. [39] Gergely Palla, Imre Derényi, Illés Farkas, and Tamás Vicsek. 2005. Uncovering the overlapping community structure of complex networks in nature and society. Nature 435, 7043 (2005), 814 -- 818. [40] Symeon Papadopoulos, Yiannis Kompatsiaris, Athena Vakali, and Ploutarchos Spyridonos. 2012. Community detection in social media. Data Mining and Knowledge Discovery 24, 3 (2012), 515 -- 554. [41] Jianbo Shi and Jitendra Malik. 2000. Normalized cuts and image segmentation. IEEE Trans. Pattern Analysis and Machine Intelligence 22, 8 (2000), 888 -- 905. , Vol. 1, No. 1, Article . Publication date: May 2019. :30 K. He et al. [42] Pan Shi, Kun He, David Bindel, and John E Hopcroft. 2017. Local lanczos spectral approximation for community detection. In Joint European Conference on Machine Learning and Knowledge Discovery in Databases. Springer, 651 -- 667. [43] Sucheta Soundarajan and John E. Hopcroft. 2015. Use of Local Group Information to Identify Communities in Networks. [44] Danial A. Spielman and Shanghua Teng. 2004. Nearly-linear time algorithms for graph partitioning, graph sparsification, TKDD 9, 3 (2015), 21:1 -- 21:27. and solving linear systems. In STOC. 81 -- 90. [45] Twan van Laarhoven and Elena Marchiori. 2016. Local network community detection with continuous optimization of conductance and weighted kernel K-means. The Journal of Machine Learning Research 17 (2016), 5148 -- 5175. [46] Ulrike von Luxburg. 2007. A tutorial on spectral clustering. Statistics and Computing 17, 4 (2007), 395 -- 416. [47] Ingmar Weber, Venkata R. Kiran Garimella, and Alaa Batayneh. 2013. Secular vs. Islamist polarization in Egypt on [48] Joyce J. Whang, David F. Gleich, and Inderjit S. Dhillon. 2013. Overlapping Community Detection Using Seed Set Twitter. In ASONAM. 290 -- 297. Expansion. In CIKM. 2099 -- 2108. [49] Joyce Jiyoung Whang, David F. Gleich, and Inderjit S. Dhillon. 2016. Overlapping Community Detection Using Neighborhood-Inflated Seed Expansion. IEEE Trans. Knowl. Data Eng. 28, 5 (2016), 1272 -- 1284. [50] Yubao Wu, Ruoming Jin, Jing Li, and Xiang Zhang. 2015. Robust local community detection: on free rider effect and its elimination. In VLDB. 798 -- 809. [51] Jierui Xie, Stephen Kelley, and Boleslaw K Szymanski. 2013. Overlapping community detection in networks: The state-of-the-art and comparative study. ACM Computing Surveys (CSUR) 45, 4 (2013), 43. [52] Jaewon Yang and Jure Leskovec. 2012. Defining and Evaluating Network Communities based on Ground-truth. In ICDM. 745 -- 754. [53] Jaewon Yang and Jure Leskovec. 2013. Overlapping community detection at scale: a nonnegative matrix factorization approach. In Proceedings of the sixth ACM international conference on Web search and data mining. ACM, 587 -- 596. [54] Shihua Zhang, Rui-Sheng Wang, and Xiang-Sun Zhang. 2007. Identification of overlapping community structure in complex networks using fuzzy c-means clustering. Physica A: Statistical Mechanics and its Applications 374, 1 (2007), 483 -- 490. [55] Yu Zhang and Dit-Yan Yeung. 2012. Overlapping community detection via bounded nonnegative matrix tri-factorization. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 606 -- 614. , Vol. 1, No. 1, Article . Publication date: May 2019.
1903.06827
1
1903
2019-03-15T22:37:13
Does Homophily Make Socialbots More Influential? Exploring Infiltration Strategies
[ "cs.SI", "physics.soc-ph" ]
Socialbots are intelligent software controlling all the behavior of fake accounts in an online social network. They use artificial intelligence techniques to pass themselves off as human social media users. Socialbots exploit user trust to achieve their malicious goals, such as astroturfing, performing Sybil attacks, spamming, and harvesting private data. The first phase to countermeasure the malicious activities of the socialbots is studying their characteristics and revealing strategies they can employ to successfully infiltrate stealthily into target online social network. In this paper,we investigate the success of using different infiltration strategies in terms of infiltration performance and being stealthy. Every strategy is characterized by socialbots profile and behavioral characteristics. The findings from this study illustrate that assuming a specific taste for the tweets a socialbot retweets and/or likes make it more influential. Furthermore, the experimental results indicate that considering the presence of common characteristics and similarity increase the probability of being followed by other users. This is in complete agreement with homophily concept which is the tendency of individuals to associate and bond with similar others in social networks.
cs.SI
cs
ORIGINAL ARTICLE Journal Section DoesHomophilyMakeSocialbotsMore Influential? ExploringInfiltrationStrategies SamanehHosseiniMoghaddam1 MaghsoudAbbaspour1* 1Facultyofcomputerscienceand engineering,ShahidBeheshtiUnivercityGC, Evin,Tehran,Iran. 1983969411 *CorespondingAuthor,Email: [email protected] MandanaKhademi1 Socialbotsareintelligentsoftwarecontrollingallthebehav- ior of fake accounts in an online social network. They use artificial intelligencetechniques to pass themselves offas humansocialmediausers. Socialbotsexploitusertrustto achievetheirmaliciousgoals,suchasastroturfing,perform- ing Sybil attacks, spamming, and harvesting private data. Thefirstphasetocountermeasurethemaliciousactivities of the socialbots is studying their characteristics and re- vealingstrategiestheycanemploytosuccessfullyinfiltrate stealthilyintotargetonlinesocialnetwork. Inthispaper,we investigatethesuccessofusingdifferentinfiltrationstrate- giesintermsofinfiltrationperformanceandbeingstealthy. Everystrategyischaracterizedbysocialbotsprofileandbe- havioralcharacteristics. Thefindingsfromthisstudyillus- tratethatassumingaspecifictasteforthetweetsasocial- botretweetsand/orlikesmakeitmoreinfluential. Further- more,theexperimentalresultsindicatethatconsideringthe presenceofcommoncharacteristicsandsimilarityincrease theprobabilityofbeingfollowedbyotherusers. Thisisin completeagreementwithhomophilyconceptwhichisthe tendencyofindividualstoassociateandbondwithsimilar othersinsocialnetworks. 1 2 KEYWORDS Socialbot,Stealthy,Infiltrationstrategy,Socialinfluence, Homophily,Socialsecurity INTRODUCTION 1 Twitterisoneofthetopfivemostpopularsocialnetworks[1]. Itfacilitatesuserstoconnectwitheachotherirrespective oftheirgeographicallocations,sharetheirthoughtexpressions,propagatenews,promoteacelebrityorbusinessbrand, andsoon. Userscanfollowotherusersinordertoreceivetheirtweets. Itleadstoafollower-followee 1 relationship. The popularity and the importance role in the world of business and policy, made Twitter an interesting target for attackers. Twitterestimates23millionofitsactiveusersareactuallysocialbots[2]. Socialbotsareautomatedsoftwareswhicharecontrollingfakeaccountstoexploituserstrusttoachievetheirgoals. They imitate actual users to pass themselves off as human accounts. Socialbots have verity applications with good or malicious objectives. Some significant malicious applications are astroturfing [3], performing Sybil attacks [4], spamming[5,6,7],andharvestingprivatedata[8]. Thefirstphasetodetectorcountermeasuremalicioussocialbots is studying them and revealing strategies they can employ to allure actual users to be successful in terms of social influenceandbeingstealthy. Studyingthepotentialpowerofcharacteristicsofinfiltrationstrategiesisalsousefulfor developinggoodsocialbots. Several researches have been conducted that performed the experiment of socialbot creation to demonstrate the possibilityofsocialbotnetworkestablishment[9,10,11]. Nevertheless,alimitednumberofresearchesanalyzethe characteristicsofsocialbotstorevealthemostinfiltrativecharacteristics[12,13]. Thesestudiesmainlyfocusedon investigatingtheimpactofbasicprofileandbehavioralrelatedcharacteristicssuchasgender,age,following,andso on. Accordingly,thereisstillconsiderableambiguityandunexploredarrangementofcharacteristics. Thispaperaims to explore more advanced characteristics to find out the most effective infiltration strategies. To this goal, we use factorialdesignexperiment[14]toevaluatetheinfiltrationperformanceandstealthyofdifferentsocialbotstrategies, andexaminetheeffectivenessofindividualprofileandbehavioralrelatedcharacteristicsofthesocialbots. Consistently usingtheterminologyofthefactorialdesignexperiment,allprofileandbehavioralrelatedcharacteristicsunderstudy assumedtobeindependentvariableswhicharecalledfactorsandthevaluesofthecharacteristicsarecalledfactor levels. Sincethefactorialdesignexperimentprovidesmoreinformationatasimilarorlowercost,itismoreefficient thantraditionalone-factor-at-a-time(OFAT)experiments. Furthermore,thefactorialdesignexperimentprovidesa facilityforstudyingtherelationshipbetweendifferentfactors. Ourexperimentsarerootedinthehypothesisthatthere aresomerelationshipsbetweenthesuccessininfiltratingintoasocialnetworkandtheprofileandbehavioralrelated characteristicsofasocialbot. Sincethereisanexponentialrelationshipbetweenthenumberofcharacteristicsandthenumberofstrategiescomeout fromthedifferenceofthearrangementofthesecharacteristics,performingablindstudyofallcharacteristicsisnot feasible. Accordingly,employingsomeheuristicsinchoosingthesetofcharacteristicstobestudiedisadvantageous. Thus,inordertocopewiththeexplodinggrowthinthenumberofstrategies,weemploytwoheuristicstodecideon factors. Additionally, we divide all factors into two groups and do our study in two phases. In the first phase some basicfactorsincludingtwobehavioralcharacteristicswhichdeterminethestatusofconsideringornotconsidering theusers'interest,arestudied. Theinterestofasocilabotisdeterminedbythegeneralcategoryofwhatitretweets and/orlikesbelongsto. Basedontheexperimentalresults,itcanbeconcludedthatconsideringaspecifictastefora 1Duringthispaper,inlinewiththeAPIsofTwitter,followeeisalsocalledfriend. 3 userisaneffectivestrategyforsocialinfiltration. Aprimaryandrawresultsofthefirstphasearereportedin[15]. A muchmoredetailedanalysisisprovidedinthispaper. Inthesecondphase,thefocusisontheinspectionoftheimpactof characteristicsregardedthehomophilyalongtopicofinterestwhichiscalledthetopicalhomophily [16]. Itisspeculated thatamongallprofilesandbehavioralcharacteristicsstudied,theoneswhichareboundupwithtopicalhomophilyhave amoretellingimpactoninfiltrationperformance. Therestofthepaperisorganizedasfollows. Section2brieflysurveysrelatedworks. Section3isdedicatedtodescribing the methodology used to create the socialbots, and the various metrics to quantify the success of them in terms of infiltrationperformanceandbeingstealthy. Insection4and5,acomprehensiveanalysisoftheimpactofthevarious characteristicoftwophasesofourstudyinthesocialbots'infiltrationperformanceispresented. Finally,inthesection6, conlusionsanddirectionsoffutureworksareprovided. 2 RELATED WORKS ManyresearchesarededicatedtocreateandinjectasocialbotintoanOSNs. Thisworkscanbecategorizedintotwo main domains: (1) proving the vulnerability of social networks against socialbot infiltration and its implications, (2) investigatingtheinfiltrationperformanceofdifferentsocialbotinfiltrationstrategies. The majority of works are aimed at demonstrating the feasibility and implication of socialbots. Boshmaf et al [9, 8] studied the use, impact, and implication of socialbots on Facebook. They created a socialbot net consisting of 102 socialbotonFacebookandindicatedthevulnerabilityofOSNstoalargescaleinfiltrationbysocialbots. Inaddition, thefeasibilityofprivacybreachbyexploitingsocialbotsisproved. Elyasharetal[10]leveragedsocialbotstoinfiltrate specificusersfromtargetedorganizationtobreachtechnicalinformation. Theyshowthatevensecurityawareusers canbedupedbysocialbots. Zhangetal[11]constructedasocialbotnetworkconsistingof1000socialbotsonTwitter. They validated the effectiveness and advantage of employing a socialbot network for spamming. Moreover, they demonstratedthatsocialbotseasilycanmanipulateOSN'srepudiationsmetricssuchasKloutscoreandTwitalyzer. Messiasetal[17]developedtwofakeaccountscontrolledbysocialbotsonTwittertoverifythepossibilityofgaining considerableinfluentialscoresusingverysimplestrategies. Oneofthesocialbotsreachedaninfluencescorecloseto somecelebrities. Someotherworkscreatedandinjectedsocialbotstoidentifysusceptibleaccounts 2 andstudytheir distinguishedcharacteristicscomparedtoothers[18,19]. Someotherresearcherstookaphasefurtherandexploredifferentinfiltrationstrategiestorevealthemostsignificant attributes. Freitasetal[12,20]performedveryfirstexperimentsinstudyingtheimpactofdifferentsocialbotstrategies onthesuccessofsocialbotsintermsofinfiltrationperformance. Theycreated120socialbotaccountswithdifferent characteristicsandbehaviors. Investigatedstrategieswereformedbyusingfourcharacteristics: (1)gender,(2)activity levelindicatingthevolumeofpostingtweetsandfollowingotherusers,(3)tweetgeneratingstrategyincludingeither retweetingoremployingautomatedsentencegenerators,and(4)thepolicyofchoosingtargetusers. Although31%of socialbotsweremissedduringtheexperimenttimeperiod,theyshowedthatactivitylevelandthepolicyofchoosing targetusersplayasignificantrole. Incontrast,genderandgenerationstrategydon'thavemuchinfluenceonthesuccess ofasocialbot. Fazilandhiscoworker[13]created98Twittersocialbotsassociatedtosixdifferentcountriesandstudied theinfluenceofsomeprofilecharacteristicsandactivitiesoninfiltrationperformanceofasocialbots. Theyfoundthat socialbotsbelongingtoIndiaaremoresuccessfulindupingusers. Genderhasnosignificantimpactandfollowingisthe mostinfiltrativebehavioramongtheactivitieswhichisstudied. 2Userswhicharealuredtofollowasocialbotarecalledsusceptible. 4 3 METHODOLOGY Weaimtofindoutaneffectivedesignforsocialbotsbyexploringandevaluatingdifferentsocialbotinfiltrationstrategies. Each infiltration strategy indicates a set of profile and behavioral related characteristics. The intuition behind our methodologyisthatcreatingasocialbotwithdifferentcharacteristicsresultsindifferentqualityintermsofinfiltration performanceandstealth. Designingasocialbotinfiltrationstrategyinvolvesdecisiononapileofprofileandbehavioralattributes. Therefore, studyingallplausiblestrategiesneedstoinvestigateallfeasiblearrangementsofallprofileandbehavioralcharacteristics ofasocialbot. Thereisanexponentialrelationbetweenthenumberofinvestigatingcharacteristicsandthenumber ofpossiblestrategiesmadeupofthem. Hence,studyingallattributesiscostlyandinfeasible. Thenumberofpossible strategiesiscalculatedusingequation1,where Ai isthesetofdistinguishedvalidvaluesofI-thecharacteristicandnis thenumberofinvestigatingcharacteristics. Πn i =1Ai (1) To manage the exponentially increasing number of feasible strategies, we focus on some unstudied characteristics whicharemainlydesignedexploitingsocialtheories. Furthermore,wepartitionallcharacteristicsintotwogroupsand investigatetheeffectofthecharacteristicsofeachgroupseparately. Inthefirstphase,basicprofileandbehavioral characteristicsarestudied. Duringthesecondphase,somecharacteristicswhicharemainlydesignedontheshadeof homophilytheory,areinvestigatedwhilethevaluesofthebasiccharacteristicsofthemostinfluentialstrategyofthe firstphaseareemployed. Duringthefirstphase,fivecharacteristicswhichthreeofthemarebinaryandthetworest havefourvalidvalues,arestudied. Accordingtoequation refeq:1,thenumberofstrategieswouldbe128. Andinsecondphase,theimpactoffivebinaryandonequadraticfactors areexplored. Thus,thenumberofstrategieswouldalsobe128. Therefore,totally256strategiesareconsidered. Ifall elevenfactorsofbothtwophasesarestudiedinonephase,thenumberofstrategieswouldbe16384,whichis64times greaterthan256. Infollowingsubsectionsomedetailsaboutcreatingsocialbotsandcommoncharacteristicsandalso evaluatingstrategies,whichareidenticalinbothphasesaredescribed. 3.1 SocialbotCreation Thesocialbotcreationconsistsoftwomainphases: (1)creatingafakeaccountand(2)developinganautomatedsoftware which controls all activities of that account. All social accounts are created manually. This phase involves deciding on some basic profile characteristics. In addition, developing a software controller includes deciding on behavioral characteristics. Someoftheseprofileandbehavioralcharacteristicsarecommonbetweenallinvestigatedstrategies andsomearedifferent. Weintroducecommoncharacteristicsinthissubsection. Foreachstrategytwosocialbotsarecreatedwhicharesimilarincharacteristicswhichareunderstudiedanddifferent ingender. Twitteruserprofileshavenoattributeindicatingthegenderoftheuser. Usersusuallyinferthegenderof anotheruserbasedontheprofilepictureorthefirstnameattributeoftheprofile. Inourexperiment, thenamesof socialbotsareselectedformalistofpopularPersiannames. Theprofilepicturesarechosenfrompopularphotoson thehttp://hotornot.com/websiteoreye-catchingpicturesofGooglesearchresultaccordingtotheassignedgenderof correspondingsocialbot. Inourexperiment,allsocialbotshavethesametimezone,whichis+3:30GMT.Inaddition,thelanguageofallcreated 3.2 STRATEGYEVALUATION 5 profiles are set to English and also the language of all reposted tweets are English. As proved in [12] algorithmic sentencescanbeeasilyidentified. Thus,wedon'texploitanyautomatedsentencegenerationmethodslikeMarkov chaintosyntheticallygeneratetweets. ToinjecteverynewbornsocialbotintoTwitter'snetworkofusersbyestablishingsomeprimaryconnections,wemade everysocialbottweetaquoteandfollowtenuserswhicharesuggestedbyTwitterjustaftercreatingthefakeaccount. ThisisaneffectivestrategytopreventTwitter'sTrustandSafetyteamfromsuspendingoursocialbots. Allactivitiesareperformedfrom9AMtill12PMaccordingtoindicatedtimezoneandanysynchronizedbehaviors areavoided. Furthermore,wemanageperiodicbehaviorasaclueforfakeaccountidentificationbyusingrandomtime andrandomnumberinafixedrangeasthenumberoftimesthatanactivitycarryoutinaday. Activitiesarelimitedto follow,retweet,andlike. Asitisconcludedin[12],themoreactivityasocialbotdo,themoreinfiltrationitachieved. The socialbotswiththemosthighactivitylevel,theyintroduced,perform14actionsdailyonaverage. Ontheotherhand,it isconceivablethatincreasingthevolumeofactivityleadstoabnormalbehaviorandsuspendingbyTwitterdefense mechanism. So,wechoosethenumberofactivitiesthateverysocialbotperformsineverydayinarangethatcentered by14. Wecreatefakeaccountsmanuallyratherthanpurchasingthemfromblackmarketsorusingautomatedprofilecreation tools,tobeabletosetprofileattributesaccordingtothecharacteristicsinlinewithstrategyassignedtothatsocialbot andalsocommonattributesmentionedabove. 3.2 StrategyEvaluation The success of each strategy is evaluated in terms of infiltration performance and being stealthy at the end of the durationoftheexperiment. Wewillgivescoretothestrategiesbymetricswhicharemeasuringinfiltrationperformance quantitatively. However,thestealthyofstrategiesisevaluated,asasecondarycriterion,todeterminetowhatextent theyareundetectable. Infiltrationperformanceevaluateshowmuchasocialbotcouldbeeffectivewhenemployedtosharesomething. As reportedin[21],thenumberoffollowersrepresentstheinfiltrationscaleanduser'spopularity,butisnotrelatedtoother importantnotionsofinfluencesuchasengagingtheaudience. Therefore,weuseKloutscoreaswell. TherearetwowaystofollowauseronTwitter. Oneisfollowingauserdirectly,andtheotherisfollowingauserindirectly byaddingshe/hetoalist. Whenauserisfolloweddirectly,itstweetsappearinthe"homefeed". But,ifauserisadded intoalist,itstweetswillappearjustinthatlist. Whenwetalkaboutthenumberoffollowers,wemeanthetotalnumber ofdirectandindirectfollowers. Ifjustthenumberofdirectfollowersisintended,wewillmentionitexplicitly. Asitwill describelaterinfollowingsection,somesocialbotsarefollowedbysomeofourothersocialbots. Thiskindoffollowers isnotcountedintoaccountwhenmeasuringthenumberoffollowersmetric. Kloutscoreisapopularandstandardmetriccalculatedbyaprivatecompany,Klout.com,whichcollectsinformationof anaccountinasocialnetworktoevaluatetheiroverallsocialinfluence[22]. Itisanumberbetween1and100. The moreinfluentialasocialaccountis,thehigheritsKloutScorewillbe. TheexactalgorithmusedtocomputeKloutscore isnotpubliclyknown,butwhatisadmittedisthatfollowingmeasureshelptoincreaseKloutscore: Followers,retweets, mentions,listmemberships. Aprimaryandsimplewaytoevaluatestealthyofastrategy,whichisusedbysomerelatedworks[12,13],iswhetherthe socialbotaccountdevelopedbasedonthestrategyisdetectedandsuspendedbyTwitterdefensemechanismornot. Wealsousethesamecriteriatobeabletocompareourexperimentalresultswiththeirs. 3.3 ETHICAL CONSIDERATIONS 6 3.3 Ethicalconsiderations Intheprocedureofbothtwophasesofthisstudy,256socialbotaccountswerecreated. Thetotalnumberofinnerand outerlinkswhichareestablished,isaboutthirtythousandthatisignorablecomparingtothesizeoftheTwittersocial network. Sinceallofthetweetsrepostedbythesocialbotsareselectedfrompopulartweetswhicharesharedalarge numberoftimes,webelievethatthenearlyfortythousandpopulartweetstotallysharedbythesocialbotsduring60 daysoftheexperiment,havenegligibleimpactontheecosystemofTwitterthatabout500milliontweetsposteddaily onit[23]. However,allsocialbotaccountsweredeletedaftergatheringalldataneededtostudythem. 4 PHASE1: BASIC CHARACTERISTICS Therearedifferentpotentiallyinfluentialcharacteristicswhendifferentinfiltrationstrategiesareexplored. Someof themareempiricallystudiedinpreviousresearchesandweleveragedtheresultsonforminggeneralcharacteristicsof oursocialbots. Inthefirstphasesomebasicprofileandbehavioralcharacteristicsareinspected. Profilecharacteristics include"gender"and"profilepicture"whichhaveimpactontworemarkablymoreeye-catchingprofileattributes: name and profile picture. Aside from two profile characteristics, three behavioral characteristics are leveraged to make differentstrategies. Detaileddescriptionofthesecharacteristicsisprovidedinfollowingsubsection. Afterwards,the resultsofourexperimentarepresentedinseparatesubsection. 4.1 SocialbotCreation Thecharacteristicsourstudyisfocusedon,duringthefirstphase,areintroducedinthissubsection. Thedefinitionand thedifferentvarietiesofeachcharacteristicarestated. 1) Gender: Although earlier researches proved that gender has not significant impact on the success of infiltration strategies,weusethischaracteristicfollowingtwogoals: (1)toapplygenderonfirstnameandprofilepicturetoreacha consistentprofileattributesand(2)tocircumventgenderbiasbygeneratingtwodifferentversionsofeverystrategy. 2)Profilepicture:Weexploittwocategoriesofattractiveprofilepictures. First,thepopularportraitphotosofhttp://hotornot.com/ areused. Second,somestunninggirlish/boyishphotosareselectedbygoogling. 3) First target set: Having some primary follower is essential for the success of subsequent follower acquisition [8]. Thus, some earlier researchers made collusion between socialbots and they follow each other at first. Establishing relationbetweensocialbotsmakethemvulnerabletonetworkbasedfakeaccountdetectionmethods[24,25,26,27]. Tocopewiththisproblem,wedividetheactivitytimeperiodofeverysocialbotintotwoconsecutivephases. Duringthe firstphase,apredefinedtargetuserswithspecificattributesarefollowedandinthesecondphaserandomlyselected usersarefollowed. "Firsttargetset"characteristicindicatesthespecificattributesofusers,whicharefollowedinfirst phase. Itcouldbeanyofthesecategories: (1)butterflyaccounts,(2)promoteraccounts,(3)followbackeraccounts, and(4)othersocialbots. Thebutterflyaccountshaveanextraordinarylargenumberoffollowersandfollowings. In addition,thenumberoftheirfollowingaccountsisgreaterthan5000[28]. Thepromoteraccountshavealargenumber offollowingscomparedtothenumberoffollowersandalsohaverelativelyhighURLratio[28]. ThereareTwitter's accountswhichareregisteredthemselvesintheknownwebsitesandpromisetofollowbackusersthatfollowthem. We callthiskindofTwitteraccountsfollowbackeraccounts. Weleveragetwowebsitestoaccessthelistoffollowbackers: (1)http://www.letsallfollowback.com/,and(2)http://twitterautofollowlist.com/. 4)Userinterest: Theintuitionbehinddesigning"userinterest"isaspecificinterestassignmenttothesocialbotstoliken themmoretothemankind. Weconsiderthreedifferentmaintopicsasthetypesofinterestandonelevelfornospecific 4.2 EXPERIMENTALRESULTS 7 interests. So four different values for this characteristic are devised: (1) art, (2) sport, (3) politic, and (4) no specific topic. Thesocialbotsexhibittheirinterestsbyselectingtweetstorepost. Forthispurpose,socialbotsbelongingtothe firstthreecategoriesgetandrepostthemostpopulartweetsbymosthothashtagsrelatedtotheirtypeofinterest. Thesocialbotsofthelastcategoryrepostmostpopulartweetsregardlessoftheirtopic. Tochoosethemostpopular hashtags,weusehttp://hashtagify.me/webpage. Thispageallowstheiruserstosearchamongmorethan70million Twitter hashtags and find the best ones for their needs based on different criteria such as popularity, relationships, languages,influencesandothermetrics. 5)Likinginterestingtweets: Itisabinarycharacteristicwhichindicatesthatwhetherthesocialbotperformslikeactivity ornot. Thesocialbotsliketweetsunderthetopicoftheirinterest. Accordingtothenumberofvarietiesforeachcharacteristicandtheequation1,thetotalnumberofstrategiesachieved by these characteristics is 128. We create all socialbots on Twitter. They are implemented in Python using Tweepy package. TweepyisaPythonlibraryforaccessingTwitterAPIs. Allsocialbotsexecuteusingonemachinefor40days that 10 days are dedicated to primary infiltration. We evaluate socialbots in terms of infiltration performance and stealthyjustaftertheendofthistimeperiod. Resultsareprovidedinnextsubsection. 4.2 ExperimentalResults Asitisstatedinsubsection3.2,thesuccessofsocialbotsisevaluatedusinginfiltrationperformanceandbeingstealth. While note of the socialbots created in the first phase is suspended or blocked by Twitter during the 40 days of experiments,weconcludethatthesocialbotsarestealthyenoughnottodetectbythesecuritymechanismsofTwitter. Table1comparesthedurationofexperiments,thenumberofcreatedsocialbots,andthenumberofthemwhichwere suspendedduringtheexperimentsfromthepreliminarystudiesandours. Althoughthedurationofourexperimentis longerthanothers,nooneofthesocialbotsaredetectedbyTwitterdefensemechanism. Inordertodecideonhowmucheverycharacteristicaffectsocialinfluenceofsocialbots,infiltrationperformanceof differentvaluesofeveryconsideredattributesareinvestigatedintermsofthenumberoffollowersandtheKloutscore. To indicatethedensityofthevariationsclearlyandtoprovidethepossibilityofeasyvisualcomparisonbox-plotdiagrams areused[29]. Figure1presentsbox-plotsforthenumberoffollowersandKloutscoreofoursocialbotsofdifferentgender. Itshows thatmaleandfemalesocialbotsachievealmostthesamenumberoffollowersinaverageandtherangesofKloutscore areidentical. Femalesocialbotshavelittleadvantageovermalesocialbotsinthemaximumnumberoffollowersacquired and the median value of Klout score. However, this little advantage is not noticeable as speculated in the previous studies. In figure 2, two categories of profile pictures, includingportrait andeye-catchinggirlish/boyishpicture, are compared. TABLE 1 Comparisonofthestealthinesswithrelatedworks Experiment Durationofexperiment Numberofsocialbots Freitasetal[20] Fazilandhiscoworker[13] Phase1ofourstudy Phase2ofourstudy 30 30 40 40 120 98 128 128 Number of suspended socialbots 38 0 0 0 8 4.2 EXPERIMENTALRESULTS (a)numberoffollowers FIGURE 1 Theimpactofgenderon(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore Althoughthemediannumberoffollowersofsocialbotswithgirlish/boyishprofilepictureislowerthansocialbotswith portraitprofilepicture,girlish/boyishpictureoutdoportraitinKloutscorediagram. Sothegirlish/boyishpictureshave slightlymoresocialinfluencethantheportraitpictures. (b)Kloutscore (a)numberoffollowers FIGURE 2 Theimpactofprofilepictureon(a)thenumberoffollowersand(b)Kloutscore TheinfiltrationperformanceoffirsttargetsetcharacteristicintermsofnumberoffollowersandKloutscoreisillustrated in figure 3. It shows that the range of the number of followers is about the same in allfirsttargetset categories and littleadvantageofotherbotsasfirsttargetsetinthemedian. However,Kloutscoreisamoretellingmeasureforsocial influenceanditshowssomewhatsuperiorityofbutterfliesoverotherbotsregardingboththeaverageandthemedian oftheKloutscoredistribution. Therefore,targetingbutterflyaccountstogainveryfirstsocialinfiltrationseemstobea wisechoice. Fromthefigure4wecanseeaclearcorrelationbetweentheuserinterestandbothoftheinfiltrationperformance measures. Hence,beinginterestedintweetsrelatedtoartboostssocialinfluence. Itisnoteworthythatconsideringa specifictopicasuserinterestagainstrandomtweetincreasetheprobabilityofsuccess. Likingtweetsunderthetopic ofuserinterestputemphasisontheuser'staste. Asshowninfigure5,exhibitinguserinterestbylikingtweetshavea positiveeffectoninfiltrationperformance. Furthermore,thevariabilityofboththenumberoffollowersandKloutscore islessinsocialbotslikinginterestingtweetsandthusitmeansthatitismorereliableandthereismoreprobabilityfor 4.2 EXPERIMENTALRESULTS 9 (a)numberoffollowers FIGURE 3 Theimpactoffirsttargetseton(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore socialbottopromoteitssocialinfluence. (a)numberoffollowers FIGURE 4 Theimpactofuserintereston(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore (a)numberoffollowers FIGURE 5 Theimpactoflikinginterestingtweetson(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore 10 4.2 EXPERIMENTALRESULTS Asitispredictablebasedontheaboveanalysis,themoresuccessfulsocialbotofourexperimentistheonewhichismale, hasgirlish/boyishpicture,followersbutterflyaccountsasfirsttargetset,isinterestedinart,andlikestweetsrelatedto itsinterest. Theonlycharacteristicwhichthemostsuccessfulsocialbothasanditisnotthedominantone,isitsgender. Asitisconsideredformer,genderdoesn'thaveanoticeableimpactontheinfiltrationperformance. Inordertostudythecontributionofeachcharacteristicingainingsocialinfluence,weconductasensitivityanalysis. Weemploysensitivityindexmeasuretoassesstheparametersensitivity. Sensitivityindexcalculatesthenormalized differenceofoutputwhileoneinputparameterchangingfromitsminimumvaluetoitsmaximumvalue, inorderto quantifytheinfluenceofthatinputparameterontheoutput[30]. SensitivityindexisformulatedinEquation2,where Dmi n and Dmax representtheminimumandmaximumoutputvalues,respectively,whilevaryingtheinputparameter fromitsminimumvaluetoitsmaximumvalue. S I = Dmax − Dmi n Dmax (2) Incasetheinputparametersarenominal,theminimumandmaximumvaluesofoutputareconsideredwhiletheinput parameterchangesinnominalvalues. Figure6demonstratesthesensitivityindexofbasiccharacteristics. Theuser interest and liking interesting tweets have the most impact on infiltration scale and Klout score, respectively. As speculated,Userinterestandlikinginterestingtweetswhichboundupwithuser'staste,havemoreconsiderableimpacton infiltrationperformancethanothercharacteristics. FIGURE 6 Thesensitivityindexofeachbasicparametertakesvaluesbetween0and1. Thehigheristhesensitivity indexthemoreinfluentistheparameterontheKloutscore. Inordertostudytheinteractionamongthreemosteffectiveparameters,theaveragevalueofKloutscoreofsocialbots withthespecifiedvaluesoftheseeffectiveparametersaredisplayedasaheatmapdiagraminfigure7. Asitcanbe perceivedthattheeffectofoneofthoseparametersontheKloutscoreisnotconstantandtheeffectdiffersatdifferent values of the others. For example, the differences between the average of the Klout score of socialbots which are interestedinarttweetsandlikearttweetsandtheaverageoftheKloutscoreofsocialbotswhichareinterestedinsport tweetsandlikesporttweetsvariesfordifferentfirsttargetset. Precisely,whenthefirsttargetsetissettobutterfly,the effectofbeinginterestedinartonthevalueofKloutscoreincomparisontosport,isgreaterthanwhenthefirsttarget setissettopromiserorpromoter. Inlikemanner,theeffectofthevalueofeverythreemosteffectiveparametersvaries, dependingonthevalueofothers. 11 FIGURE 7 TheaveragevalueofKloutscorefordifferentvalueofthemostinfluentialparameters: Interest,liking, andfirsttargetset. 5 PHASE2: ADVANCED CHARACTERISTICS Homophilyisasocialtheorywhichexplainsfriendshipcreationprocess. Thetheoryexplainthattheindividualsina socialnetworktendtobecomefriendswithsomeonewhoissimilartothem. Themoresimilarity,themorelikelihoodto becomefriends. Manyresearcheshavestudiedhomophilyalongdemographicdimensionssuchasgender,age,location, andlanguage[31,32,33]. Besidesdemographicsimilarity,sharedinterests,followees,andfollowersarealsoinfluential factorsthatarehelpfulinfindingsimilarfriendsaswell[34]. Differentkindsofsimilarityarrangedifferentformsof homophily. Thesimilarityininformation,tasteandattitudesistheoriginofhiddenvaluehomophily[31]. Inaddition, triadicclosuretheorystatesthatiftwoindividualsinasocialnetworkhavemutualfriends,thentheprobabilitythat theybecomefriendsinthefuturewillincrease. Ifhavingcommonfriendsisconsideredasadimensionofhomophily, triadicclosureisaspecialcaseofhomophilytheorywhichiscalledstructuralhomophily[35]. Inspiringfromhomophilytheory,inthisphase,wedesignsomenewcharacteristicsandvalidatetheimpactofthem ontheinfiltrationperformance. Noticethatcommonstrategiesbetweenallsocialbotsexplainedformer,including(1) follow only English users and (2) retweet and like just English tweets, are aligned with the increasing demographic homophily. 5.1 SocialbotCreation Inthe secondphaseof ourempiricalstudy, allofthe socialbotsresemblethe characteristicsof themostinfiltrative socialbotofthefirstphasewhichistheonewhichhasgirlish/boyishpicture,followbutterflyaccountsasfirsttarget set,isinterestedinart,andlikestweetsrelatedtoitsinterest. Asitisstatedformer,genderdoesn'thaveanoticeable impactontheinfiltrationperformance. However,toavoidgenderbias,foreverystrategyproducedbydifferentlevelsof thefollowingfactors,twosocialbotswithdifferentgenderarecreated. Thefactorsourstudyisfocusedon,duringthe secondphase,arepresentedasfollows: 1)Targetusers: Fourlevelsareconsideredfortheselectionoftargetuserstobefollowedbythesocialbots,regarding 12 5.2 EXPERIMENTALRESULTS structuralhomophilyandtriadicclosure,includingthefollowersofitsfollowers,thefollowersofitsfriends,thefollowers ofitsneighbors,andrandomlyselectedusers. Whereasthetermneighborreferstoanytypeoffollowerorfollowee relationship. 2)Retweetbyhashtag: Itisabinarycharacteristicwhichdeterminesifthesocialbotincreasethehomophilybetweenthe userwhichitfollowsanditself,ornot. Ifthevalueofthischaracteristicisyes,itmeansthatthesocialbotwillsearchfor apopulartweetwhichhasatleastonecommonhashtagwiththelatesthashtagedtweetoffolloweduser,ifexists. A tweetiscountedasapopulartweetifithasatleastonehashtagwhichisincludedinthe14mostpopularhashtagin http://hashtagify.me/webpage. 3)Retweet: Inthesimilarmannerasretweetbyhashtag,itisabinaryfactorwhichifitissettoyes,whenthesocialbot followanaccountitretweetoneofitsrecenttweetsshortlyafterwards. Ifthisfactorissettono,thesocialbotdonot retweetthetweetsofitsfriends. Thischaracteristiccontrolsanaspectofhomophilyininterestandtaste. 4) Like: Likewise, as explained above about previous characteristic, this characteristic is also binary and indicates whetherthesocialbotlikeatweetsharedbyanaccount,subsequenttofollowingit. Inthesameway,itfocusesonan aspectofhiddenvaluehomophily. 5)Consideringrecentactivities: Inordertostudytheimpactofconsideringthepresenceofrecentactivityofuserswhich arechosentobefollowed,insuccessofasocialbot,twodifferentpoliciesaretakenintoaccount: (1)followsolelyactive users,(2)followrandomlyregardlessofitsactivitystate. According to the equation 1, the total number of strategies achieved by the characteristics of phase 2 is 128. We createallthesocialbotaccountsmanuallyonTwitter. ThesocialbotsareimplementedinPythonusingTweepypackage. Allsocialbotsexecuteusingonemachinefor40daysthat10daysarededicatedtoprimaryinfiltration. Weevaluate socialbots in terms of infiltration performance and stealthy just after this time period. Results are provided in next subsection. 5.2 ExperimentalResults Overthedurationofthesecondphaseofourexperiment,thesocialbotsreceivedintotal27537followsfrom24845 distinctuserswhichisabouttriplethetotalnumberoffollowersofthesocialbotsofthefirstphase. Themainconcen- trationofthisphaseistheevaluationoftheimpactofemployinghomophilybasedcharacteristicsonthesuccessofa socialbot. Table2displaystheaverageofKloutscoreandthefollowernumberforsocialbotsinfourfollowingcategories: (1)socialbotswhichemploynohomophilybasedcharacteristic,(2)socialbotsexploithiddenvaluehomophilybased characteristics,includingRetweetbyhashtag,Retweet,andLike,(3)socialbotswhichmakeuseofstructuralhomophily basedcharacteristic,namelyTargetusers,and(4)socialbotswhichapplybothhiddenvalueandstructuralhomophily basedcharacteristics. Itcanbeseenfromthesummarystatisticsprovidedintable2thatalthoughemployinganyof hiddenvalueandstructuralhomophilyresultsinabetteroutcomethanusingnohomophilybasedstrategy,usingboth ofthemsimultaneouslysignificantlyimprovethesocialinfluenceandthepopularityofsocialbotscorrespondingto Kloutandthenumberoffollowers,respectively. Theseresultsprovidesupportforthehypothesisthathomophilybased characteristicsmakesocialbotsmoreinfluential. Asitisreportedintable1,noneofthesocialbotscreatedinphase2issuspended. Thus,thestealthinessofthestrategies employedduringthisphaseisacceptable. Inordertoconsidertheimpactofeachindividualcharacteristicongaining popularityandinfluenceintheTwitter,thenumberoffollowersandKloutscoreareinvestigatedrespectively. These twocriteriaaremeasuredattheendofthedurationoftheexperimenttoquantifyhowsuccessfulasocialbotis. Althoughgenderisnotoneofthecharacteristicsstudiedinthisphase,toreconfirmourresultsinphaseone,westartby investigatingtheimpactofthegender. Figure8illustratesboxplotsthatsummarizethedistributionsforthenumber 5.2 EXPERIMENTALRESULTS 13 TABLE 2 Comparisonoftheinfiltrationperformanceofhomophilypolicies Category NoHomophily HiddenValueHomophily StructuralHomophily Both KloutScore 27 30 31 35 FollowerNo. 80 80 136 209 of followers and the Klout score of socialbots by gender. Although gender has no noticeable impact on the median followernumber,theaverageofthenumberoffollowersforfemalesocialbotsisslightlymorethanmaleones. Klout scoreindicatesakindofmoresuccessforfemales. However,ourResultsconfirmwithpreviousfindings[12,20,13] statingthatgenderhasnosignificantimpactoninfiltrationperformance. (b)Kloutscore (a)numberoffollowers FIGURE 8 Theimpactofgenderon(a)thenumberoffollowersand(b)Kloutscore Asdescribedformer,targetusersisacharacteristicwhichindicatesthepolicyoffollowingotherusers. Fourdifferent levelsaredefinedforthischaracteristic,includingthefollowerofitsfollowers,thefollowersofitsfriends,thefollowers ofitsneighbors,andrandomlyselecteduser. Figure9aandbshowsthequartilesofthedistributionofthenumberof followers and Klout score, respectively, for each target user. From the figure, it is evident that there is a significant differenceinthepopularityofrandomlyfollowingusersorfollowingthefollowersofusersintheneighborhood. Thereis asimilarpatterninthecaseofKloutscore. Overall,theseresultsrevealthatinfiltrationstrategiesemployingstructural homophily based characteristics are better choices. The plot boxes in the figure 9 suggest that among structural homophilybasedpoliciesstudiedfollowingthefollowersofthefollowersofthesocialbotresultsinmoderatelymore successfulinfiltrationstrategyintermsofeitherthenumberoffollowersorKloutscore. Hence,itcouldconceivablybe hypothesizedthattheusersaremoreconfidentintheirfriendsthantheirfollowers. Thus,theprobabilityoffollowing backanewfollowerwhichisafriendoffriendismorethantheprobabilityoffollowingbackanewfollowerwhichisa friendoffollowers. Asstatedearlier,halfofoursocialbotsinphase2afterfollowingauser,selectahashtagofoneofitsrecentlyposted tweets,ifexists,andsearchforapopulartweethavingthesamehashtag,whereastheotherhalfdonotrepostsucha populartweetwithcommonhashtag. Thisbinaryfactorwhichiscalledretweetbyhashtaginspiredbythehiddenvalue homophily. Figure10showsthemaindescriptivestatisticsofthedistributionofthenumberoffollowersandKlout 14 5.2 EXPERIMENTALRESULTS (a)numberoffollowers FIGURE 9 Theimpactoftargetuserson(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore score,respectively,fortwolevelsofthisbinaryfactorintheformofboxplot. Ascanbeseenfromthisfigure,repostinga populartweetbycommonhashtagbringsslightlybetterresults. Twodiscretereasonsemergedfromthis. First,asitis assumed,usinghomophilybasedcharacteristicsinthedesignoftheinfiltrationstrategyimprovestheprobabilityof followerachievementandasaresult,boostssocialinfluence. Second,embeddingthischaracteristicleadstohigher activitylevelwhichisconfirmedthatitresultsinbetterinfiltrationperformance[20]. (a)numberoffollowers FIGURE 10 Theimpactofretweetbyhashtagon(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore Recallfromprevioussubsectionhalfofoursocialbotsrepostoneoftherecentlypostedtweetsofauserafterfollowing it, while the other half does not do that. This characteristic denoted as retweet. Figure 11 compares the summary statisticsofthenumberoffollowersandKloutscorefortwolevelsofthisbinarycharacteristicintheformofboxplot. It showsthatthemedianfollowernumberandKloutscoreofthesocialbotswhichretweetafterfollowingarehigher. In thesamewayasretweetbyhashtag,itisthereforeprobablethatthesuperiorityofretweetafterfollowingisbecauseof eitherhomophilyenhancementoractivityincrease. Anotherfactorsuggestedtostudythebeneficenceofhomophilyislikeafterfollowing. Respectingtothischaracteristic, halfofoursocialbotslikeoneoftherecentlypostedtweetsofauserafterfollowingit,whiletheotherhalfdonnotlike. Asitisillustratedinfigure12,althoughthereisnosignificantdifferenceinmedianpopularityacquiredbysocialbotsof differentlevelsofthisfactor,sincetheupperwhiskerislongerincaseoflikeafterfollowing,theaverageofthefollower 5.2 EXPERIMENTALRESULTS 15 (a)numberoffollowers FIGURE 11 Theimpactofretweeton(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore numberismorethantheother. Themedianandinter-quartilerangeofbothtwogroupsareroughlythesameforKlout score. However,theaverageofexploitingthisstrategyisslightlymore,becauseofhavinglongerupperwhiskerand shorterlowerwhiskerthantheother. (a)numberoffollowers FIGURE 12 Theimpactoflikeon(a)thenumberoffollowersand(b)Kloutscore (b)Kloutscore Thelastcharacteristicistheonedecidingwhetherconsiderthepresenceofrecentactivityofwhoisfollowedornot. Theresultsaredemonstratedinfigure13. Surprisingly,themedianandtheaverageofKloutscoreissimilarforboth oftwostateofthischaracteristic. Althoughthemedianandtheaverageofthenumberoffollowersshowabitbetter resultsforconsideringrecentactivity,thedifferenceisnotsignificant. Themoresuccessfulsocialbotofthesecondphaseistheonewhichisfemale,hertargetusersetconsistsofthefollowers of her followers, retweet similar tweets by hashtag, retweet a randomly selected tweet of who followed, and like a randomlyselectedtweetofwhofollowed. Asitisconsideredformer,genderdoesn'thaveanoticeableimpactonthe infiltration performance. In order to study the contribution of other characteristics in gaining social influence, we conductasensitivityanalysis. Figure14demonstratesthesensitivityindexofadvancedcharacteristics. Thepolicyof selectingthetargetusershasthemostimpactoninfiltrationscaleandKloutscore. Sincethecharacteristicsstudiedin thesecondphasemainlydesignedinspiringhomophilytheorywhichfocusedonthemechanismoftheformationof relations,theyhavemoreimpactontheinfiltrationscalethanKloutscore. 16 (a)numberoffollowers FIGURE 13 Theimpactofconsideringthepresenceofrecentactivityon(a)thenumberoffollowersand(b)Klout score (b)Kloutscore FIGURE 14 Thesensitivityindexofeachadvancedparametertakesvaluesbetween0and1. Thehigheristhe sensitivityindexthemoreinfluentistheparameterontheKloutscore. 6 CONCLUSION Thisstudysetouttodeterminetheinfluenceofdifferentcharacteristicsonthesuccessoftheinfiltrationstrategyof socialbots. Forthispurposetencharacteristicsarearrangedtobeinvestigatedduringtwophases. Thefirstphaseis managedtoinvestigatesomebasicprofileandbehavioralcharacteristics. Ithasshownthatassigningaspecifictastetoa socialbotmakeitmorepopularandalsofurtherinfluential. Fiveothercharacteristics,mainlyinspiredbythehomophily principle,arestudiedduringphasetwo. Amongallprofilesandbehavioralcharacteristicsstudied,characteristicswhich areboundupwithhomophilyprinciplehaveamoretellingimpactoninfiltrationperformance. Asthecharacteristics studied in the second phase mainly designed inspiring homophily theory which focused on the mechanism of the formationofrelations,theyhavemoreimpactontheinfiltrationscalethanKloutscore. REFERENCES 17 Further experimental investigations are needed to find out more influential characteristics on infiltration strategy design. Since there is an exponential relation between the number of exploring factors and the number of possible strategiesemployingthesefactors,itisrecommendedtocandidateinfluentialcharacteristicstoexploreusingsocial principles. Anotherpossibleareaoffutureresearchwouldbetoinvestigatethecorrelationbetweencharacteristics. REFERENCES [1] Kallas P, Top 15 Most Popular Social Networking Sites and Apps [August 2017] @DreamGrow; 2017. 08/12/2017). https://www.dreamgrow.com/top-15-most-popular-social-networking-sites/. [2] SewardZM,TwitterAdmitsthatasManyas23MillionofitsActiveUsersareAutomated. Quartz;2014. [3] WoolleySC. Automatingpower: Socialbotinterferenceinglobalpolitics. FirstMonday2016;21(4). [4] WeiW,XuF,TanCC,LiQ. SybilDefender: Adefensemechanismforsybilattacksinlargesocialnetworks. IEEEtransac- (Accessed on tionsonparallelanddistributedsystems2013;24(12):2492 -- 2502. [5] Fire M, Katz G, Elovici Y. Strangers intrusion detection-detecting spammers and fake profiles in social networks based ontopologyanomalies. HumanJournal2012;1(1):26 -- 39. [6] BenevenutoF,MagnoG,RodriguesT,AlmeidaV.Detectingspammersontwitter.In: Collaboration,electronicmessaging, anti-abuseandspamconference(CEAS),vol.6;2010.p.12. [7] LeeK,CaverleeJ,WebbS.Uncoveringsocialspammers:socialhoneypots+machinelearning.In:Proceedingsofthe33rd internationalACMSIGIRconferenceonResearchanddevelopmentininformationretrievalACM;2010.p.435 -- 442. [8] Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M. The socialbot network: when bots socialize for fame and money. In: Proceedingsofthe27thannualcomputersecurityapplicationsconferenceACM;2011.p.93 -- 102. [9] Boshmaf Y, Muslukhov I, Beznosov K, Ripeanu M. Design and analysis of a social botnet. Computer Networks 2013;57(2):556 -- 578. [10] Elyashar A, Fire M, Kagan D, Elovici Y. Homing socialbots: intrusion on a specific organization's employee using Social- bots. In: Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and MiningACM;2013.p.1358 -- 1365. [11] ZhangJ,ZhangR,ZhangY,YanG. Ontheimpactofsocialbotnetsforspamdistributionanddigital-influencemanipula- tion. In: CommunicationsandNetworkSecurity(CNS),2013IEEEConferenceonIEEE;2013.p.46 -- 54. [12] FreitasC,BenevenutoF,GhoshS,VelosoA. Reverseengineeringsocialbotinfiltrationstrategiesintwitter. In: Proceed- ings of the 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2015 ACM; 2015.p.25 -- 32. [13] FazilM,AbulaishM. WhyasocialbotiseffectiveinTwitter? Astatisticalinsight. In: 20179thInternationalConference onCommunicationSystemsandNetworks(COMSNETS);2017.p.564 -- 569. [14] Jain R. The art of computer systems performance analysis: techniques for experimental design, measurement, simula- tion,andmodeling. JohnWiley&Sons;1990. [15] Khademi M, Moghaddam SH, Abbaspour M. An empirical study of the effect of profile and behavioral characteristics ontheinfiltrationrateofsocialbots. In: ElectricalEngineering(ICEE),2017IranianConferenceonIEEE;2017.p.2200 -- 2205. [16] Kang JH, Lerman K. Using lists to measure homophily on twitter. In: AAAI workshop on Intelligent techniques for web personalizationandrecommendation;2012.. 18 REFERENCES [17] MessiasJ,SchmidtL,OliveiraR,BenevenutoF.Youfollowedmybot! TransformingrobotsintoinfluentialusersinTwitter. FirstMonday2013;18(7). [18] BoshmafY,LogothetisD,SiganosG,LeríaJ,LorenzoJ,RipeanuM,etal. Integro: LeveragingVictimPredictionforRobust FakeAccountDetectioninOSNs. In: NDSS,vol.15;2015.p.8 -- 11. [19] AielloLM,DeplanoM,SchifanellaR,RuffoG. PeopleareStrangewhenyou'reaStranger: ImpactandInfluenceofBots onSocialNetworks. Links2012;697(483,151):1 -- 566. [20] Freitas C, Benevenuto F, Veloso A, Ghosh S. An empirical study of socialbot infiltration strategies in the Twitter social network. SocialNetworkAnalysisandMining2016;6(1):23. [21] ChaM,HaddadiH,BenevenutoF,GummadiPK. Measuringuserinfluenceintwitter: Themillionfollowerfallacy. Icwsm 2010;10(10-17):30. [22] RaoA,SpasojevicN,LiZ,DSouzaT. Kloutscore: Measuringinfluenceacrossmultiplesocialnetworks. In: BigData(Big Data),2015IEEEInternationalConferenceonIEEE;2015.p.2282 -- 2289. [23] AslamS,TwitterbytheNumbers(2018): Stats,Demographics&FunFacts;. (Accessedon08/11/2018). https://www. omnicoreagency.com/twitter-statistics/. [24] Yu H, Kaminsky M, Gibbons PB, Flaxman A. Sybilguard: defending against sybil attacks via social networks. In: ACM SIGCOMMComputerCommunicationReview,vol.36ACM;2006.p.267 -- 278. [25] Viswanath B, Post A, Gummadi KP, Mislove A. An analysis of social network-based sybil defenses. ACM SIGCOMM ComputerCommunicationReview2010;40(4):363 -- 374. [26] Cao Q, Sirivianos M, Yang X, Pregueiro T. Aiding the detection of fake accounts in large scale social online services. In: Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation USENIX Association; 2012.p.15 -- 15. [27] YuH,GibbonsPB,KaminskyM,XiaoF. Sybillimit: Anear-optimalsocialnetworkdefenseagainstsybilattacks. In: Secu- rityandPrivacy,2008.SP2008.IEEESymposiumonIEEE;2008.p.3 -- 17. [28] Yang C, Harkreader R, Zhang J, Shin S, Gu G. Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter. In: Proceedings of the 21st international conference on World Wide Web ACM; 2012.p.71 -- 80. [29] Walpole RE, Myers RH, Myers SL, Ye K. Probability and statistics for engineers and scientists, vol. 5. Macmillan New York;1993. [30] HambyD. Areviewoftechniquesforparametersensitivityanalysisofenvironmentalmodels. Environmentalmonitoring andassessment1994;32(2):135 -- 154. [31] McPherson M, Smith-Lovin L, Cook JM. Birds of a feather: Homophily in social networks. Annual review of sociology 2001;27(1):415 -- 444. [32] Reagans R, Zuckerman E, McEvily B. How to make the team: Social networks vs. demography as criteria for designing effectiveteams. Administrativesciencequarterly2004;49(1):101 -- 133. [33] Yuan YC, Gay G. Homophily of network ties and bonding and bridging social capital in computer-mediated distributed teams. JournalofComputer-MediatedCommunication2006;11(4):1062 -- 1084. [34] Carullo G, Castiglione A, De Santis A, Palmieri F. A triadic closure and homophily-based recommendation system for onlinesocialnetworks. WorldWideWeb2015;18(6):1579 -- 1601. [35] RobinsG,PattisonP,WangP. Closure,connectivityanddegreedistributions: Exponentialrandomgraph(p*)modelsfor directedsocialnetworks. SocialNetworks2009;31(2):105 -- 117.
1710.07606
1
1710
2017-10-20T16:59:49
Complex Contagions: A Decade in Review
[ "cs.SI", "cs.MA", "physics.soc-ph" ]
Since the publication of 'Complex Contagions and the Weakness of Long Ties' in 2007, complex contagions have been studied across an enormous variety of social domains. In reviewing this decade of research, we discuss recent advancements in applied studies of complex contagions, particularly in the domains of health, innovation diffusion, social media, and politics. We also discuss how these empirical studies have spurred complementary advancements in the theoretical modeling of contagions, which concern the effects of network topology on diffusion, as well as the effects of individual-level attributes and thresholds. In synthesizing these developments, we suggest three main directions for future research. The first concerns the study of how multiple contagions interact within the same network and across networks, in what may be called an ecology of contagions. The second concerns the study of how the structure of thresholds and their behavioral consequences can vary by individual and social context. The third area concerns the roles of diversity and homophily in the dynamics of complex contagion, including both diversity of demographic profiles among local peers, and the broader notion of structural diversity within a network. Throughout this discussion, we make an effort to highlight the theoretical and empirical opportunities that lie ahead.
cs.SI
cs
Complex Contagions: A Decade in Review Douglas Guilbeault, Joshua Becker and Damon Centola* Annenberg School for Communication Send correspondence to: [email protected] Citation: Guilbeault, Douglas, Becker, Joshua, & Centola, Damon. 2018. Complex Contagions: A Decade in Review. In S. Lehmann & Y. Ahn (Eds.), Spreading Dynamics in Social Systems. Springer Nature. (Forthcoming). 2 Abstract Since the publication of "Complex Contagions and the Weakness of Long Ties" in 2007, complex contagions have been studied across an enormous variety of social domains. In reviewing this decade of re- search, we discuss recent advancements in applied studies of complex contagions, particularly in the domains of health, innovation diffu- sion, social media, and politics. We also discuss how these empirical studies have spurred complementary advancements in the theoretical modeling of contagions, which concern the effects of network topol- ogy on diffusion, as well as the effects of individual-level attributes and thresholds. In synthesizing these developments, we suggest three main directions for future research. The first concerns the study of how multiple contagions interact within the same network and across networks, in what may be called an ecology of contagions. The second concerns the study of how the structure of thresholds and their behav- ioral consequences can vary by individual and social context. The third area concerns the roles of diversity and homophily in the dynam- ics of complex contagion, including both diversity of demographic profiles among local peers, and the broader notion of structural diver- sity within a network. Throughout this discussion, we make an effort to highlight the theoretical and empirical opportunities that lie ahead. Keywords: Complex Contagion, Computational Social Science, So- cial Diffusion, Experimental Methods, Network Dynamics 3 1. Introduction Most collective behaviors spread through social contact. From the emergence of social norms, to the adoption of technological innova- tions, to the growth of social movements, social networks are the path- ways along which these "social contagions" propagate. Studies of dif- fusion dynamics have demonstrated that the structure (or topology) of a social network can have significant consequences for the patterns of collective behavior that will emerge. Over the last forty-five years, questions about how the struc- ture of social networks affects the dynamics of diffusion have been of increasing interest to social scientists. Granovetter's (1973) "Strength of Weak Ties" study ushered in an era of unprecedented interest in how network dynamics, and in particular diffusion on networks, affect every aspect of social life, from the organization of social movements to school segregation to immigration. Granovetter's study showed that "weak ties" between casual acquaintances can be much more ef- fective at promoting diffusion and social integration than "strong ties" between close friends. This is because although casual friendships are relationally weak, they are more likely to be formed between socially distant actors with few network "neighbors" in common. These "long ties" between otherwise distant nodes provide access to new infor- mation and greatly increase the rate at which information propagates, despite the relational weakness of the tie as a conduit. In the last two decades, the explosion of network science across disciplines such as physics, biology, and computer science has produced many important advances for understanding how the struc- ture of social networks affect the dynamics of diffusion. The full im- pact of Granovetter's original insight was not realized until Watts and Strogatz's (1998) "small world" model demonstrated that bridge ties connecting otherwise distant nodes can dramatically increase the rate of propagation across a network by creating "shortcuts" between re- mote clusters. Introducing "long ties" into a network can give even highly clustered networks the "degrees of separation" characteristic of a small world. This model of network dynamics has had a tremen- dous impact on fields as diverse as computer science, physics, epide- miology, sociology, and political science. Building on the idea of pathogenic contagions, this research 4 combines the diverse domains of ideas, information, behaviors and diseases into the generic concept of a universal contagion. The attrac- tive implication is that the mathematical tools developed by epidemi- ologists for studying the spread of disease can be generically used to study the dynamics of social, cultural and political change. In partic- ular, the properties of social networks that have been shown to accel- erate the spreading dynamics of disease diffusion–such as small world topologies, weak ties, and scale-free degree distributions –can also be used to make inferences about the role of networks in the domains of social and political behavior. Regardless of whether a given contagion is a prophylactic measure to prevent HIV infection or the HIV infec- tion itself, Granovetter's groundbreaking claim was that "whatever is to be diffused can reach a larger number of people, and traverse a greater social distance, when passed through weak ties rather than strong" (Granovetter 1973: 1366). However, while this theory is useful for understanding the rapid spread of HIV infections through networks of weak ties, it has not shed light on the remarkable failure of these same networks to spread prophylactic measures for preventing HIV (Coates et al. 2008). The reason for this disturbing asymmetry between the spread of in- fectious diseases and the diffusion of preventative measures is that infectious diseases are typically simple contagions –i.e., contagions for which a single activated source can be sufficient for transmission –while preventive measures are typically complex contagions –i.e., behaviors, beliefs, or attitudes for which transmission requires contact with multiple sources of activation. While repeated contact with the same person can increase the likelihood of transmitting a simple con- tagion, the transmission of complex contagions requires reinforce- ment from several contacts. Any social contagion that is costly, dif- ficult, or unfamiliar is likely to be a complex contagion, requiring social reinforcement to spread. The primary consequence of the distinction between simple and complex contagions for diffusion through social networks is that as "worlds" become very small, the speed of simple contagions in- creases, while complex contagions become harder to spread. As Cen- tola and Macy write, For simple contagions, too much clustering means too few 5 long ties, which slows down cascades. For complex conta- gions, too little clustering means too few wide bridges, which not only slows down cascades but can prevent them entirely. (2007: 723) Centola and Macy (2007) identify several reasons why contagions may be complex, including the need for social legitimation, the need for credibility, or the complementarity of a behavior. For instance, a contagion might be complex due to externalities, in which the value of the contagion increases with the number of adopters. The value of a communication technology such as a fax machine rests heavily on the number of people who use it. When only one person has a fax machine, it holds no value. A single contact with someone who has a fax machine provides little reason for someone else to adopt it. Even if the adopter provides repeated signals, a single person alone cannot do much to increase the complementary value of the fax machine. However, if a potential adopter comes into contact with several inde- pendent sources who have all adopted fax machines, the complemen- tary value of the technology increases. After exposure to a sufficient number of reinforcing contacts, a person with no inherent interest in fax machines can be convinced that it is a necessary investment. A different kind of reason why a contagion might be complex is due to uncertainty. For instance, physicians are often resistant to adopting new medical technologies for fear of placing themselves at risk of acting outside of accepted protocols. Early studies on adoption patterns among physicians found that physicians were unlikely to adopt a new medical technology, even though it had been formally approved and was expected to be very effective, until they observed several of their colleagues using it (Coleman et al., 1966). For similar reasons, complexity in diffusion can also be a result of normative pressures. This is often the case with the diffusion of managerial prac- tices among elite firms. Because the choice of corporate governance strategy can impact the reputation of a firm, the adoption of new prac- tices is often dependent upon social reinforcement from competing firms within the same industry. Corporate boards concerned about the risk of social sanction are often unwilling to adopt new managerial practices until they have already seen them adopted by several peer institutions (Davis and Greve 1997). 6 In the last decade, the literature on complex contagions has rapidly evolved both empirically and theoretically. In this review, we discuss recent developments across four empirical domains: health, innovation, social media, and politics. Each domain adds new com- plexities to our understanding of how contagions emerge, spread, and evolve, as well as how they undergird fundamental social processes. We also discuss how these empirical studies have spurred comple- mentary advancements in the theoretical modeling of contagions, which concern the effects of network topology on diffusion, as well as the effects of variation in threshold dynamics. Importantly, while the empirical studies reviewed in this paper complement existing the- oretical work, they also present many opportunities for new theoreti- cal extensions. We suggest three main directions for future develop- ment of research on complex contagions. The first concerns the study of how multiple contagions interact within the same network and across networks, in what may be called an ecology of complex conta- gions. The second concerns the study of how the structure of thresh- olds and their behavioral consequences can vary by individual and social context. The third area concerns the recent discovery of diver- sity as a causal variable in diffusion, where diversity can refer either to the diversity of demographic profiles among local peers, or to the broader structural diversity that local peers are situated within. Throughout, we take effort to anticipate the theoretical and empirical challenges that may lie ahead. 2. Empirical Advances 2.1. Applications to Health For the past few decades, the study of public health has concerned not only biological contagions, but also social contagions concerning health behaviors: e.g. medication, vaccines, exercise, and the ideolo- gies related to each (Christakis and Fowler 2012). It has been found that simple contagions do not adequately capture the network dynam- ics that govern the diffusion of health behaviors (Centola and Macy 2007; Centola et al. 2007; Centola 2010, 2011). Social health behav- iors often require reinforcement from peers, and they are strongly in- fluenced by cultural practices and group norms. The Framingham Heart Study suggested that obesity spread 7 socially through a densely interconnected network of 12, 067 people, assessed from 1971 to 2003 (Christakis and Fowler 2007). However, this study posited that either biological or normative mechanisms might play a role in the diffusion process, where each mechanism would be expected to yield very different diffusion dynamics. A clearer hypothesis came from a follow-up study examining the spread of smoking behavior (Christakis and Fowler 2008). This study found evidence that the likelihood a smoker will quit depends on their exposure to multiple contacts, in part because smoking is of- ten explicitly social and thus shaped by the dynamics of social norms. The role of complexity in smoking behavior (and cessation) has been supported by a more recent study using data from the National Lon- gitudinal Study of Adolescent Health, which simulated the complex contagion dynamics of smoking under conditions where smokers can revert to smoking after quitting (Kuhlman et al. 2011). By examining peer interactions over QuitNet – a social media platform for smokers attempting to quit – it was found that smokers were more likely to abstain if exposed to reinforcing contact from several abstinent users (Myneni et al. 2015). Kuhlman et al. (2011b) discuss how the diffu- sion of smoking behavior is filtered by both pro- and anti-smoking norms. This insight into the complexity of the quitting process helps to refine earlier models of smoking diffusion, in which threshold out- comes are represented by the binary decision to adopt without consid- eration of countervailing influences from non-adopters. Norms em- power people to exert different kinds of influence – eg. for and against behavior – which amplifies the role of complexity in situations where non-adopters exhibit countervailing influences. Exercise has similarly been found to exhibit the dynamics of complexity when peers influence each other to adopt new exercise behaviors. The characteristics of peers play an important role in influ- ence dynamics, as both homophily and diversity have been shown to amplify the impact of reinforcing signals on the likelihood of behavior change. Centola (2011) demonstrated a direct causal relationship be- tween homophily and the diffusion of complex contagions, indicating that the effects of social reinforcement were much stronger when in- dividuals shared a few key health characteristics in common. Further, Centola and van de Rijt (2014) showed that social selection among "health buddy" peers in a fitness program lead to connections among 8 peers who were homophilous on the same key health characteristics: gender, age, and BMI. Aral and Nicolaides (2017) elaborate in show- ing that social reinforcement from similar peers is strengthened when those peers come from different social groups, highlighting the value of structural diversity in the dynamics of complexity. Another recent study of exercise behavior used an online intervention to demonstrate that exposure to social influence from a reinforcing group of anony- mous online "health buddies" could directly increase participants' levels of offline exercise activity (Zhang et al. 2016). An interesting twist in the relationship between complexity and health came from a series of studies which showed how clustered networks that facilitate the spread of social norms (e.g., anti-vaccina- tion behavior) can thereby make populations susceptible to epidemic outbreaks of simple contagions (e.g., such as the measles) (Salathe and Bonhoeffer 2008; Campbell and Salathe 2013). These studies model the diffusion of anti-vaccine attitudes as a complex contagion that pulls people into echo chambers that amplify the likelihood of disease outbreak in the overall population. This work points to a vital direction for future research into how health behaviors and attitudes toward health interact in a broader, multi-layered network of both complex contagions and disease diffusion. Moreover, there are even some surprising instances where bi- ological pathogens may also be complex. Infectious diseases are com- plex in situations where patients suffer simultaneous "co-infections" from multiple pathogens. In these cases, each disease increases a pa- tient's susceptibility to the other one, making it more likely that both infections will take in hold in a patient. For instance, infection with the influenza virus can increase the likelihood of coinfection with other respiratory diseases, such as the Streptoccocus penumoniae bac- terium (a leading cause of pneumonia). Each one creates susceptibil- ity to the other, increasing the likelihood that joint exposure will lead a patient to become infected with both. While a single virus can efficiently use weak ties to spread across a network, several viruses from different sources cannot be so easily transmitted the same way. For these kinds of illnesses, clustered social networks significantly increase the likelihood that individuals who are exposed to complementary infections, such as pneumonia and flu, or syphilis and HIV, will spread reinforcing co-infections. 9 Contrary to most epidemiological intuitions, in random networks in- cidence rates of "complex synergistic co-infections" typically drop to zero, while clustered social networks are surprisingly vulnerable to epidemic outbreaks (Hébert-Dufresne and Althouse 2015). 2.2. Diffusion of Innovations Economists, marketers, and organizational theorists have long been interested in how technological innovations diffuse through a popula- tion. Bass (1969) developed one of the first influential models of in- novation diffusion, where technological adoption was understood as a simple contagion. As the uptake of innovations came to be viewed as inseparable from social networks, Schelling (1973) started to for- mulate a threshold-based model of innovation adoption based on the influence of multiple peers. It has since been found that complex con- tagions characterize the diffusion of technologies in multiple areas of social life. A number of controlled experiments illustrate that innovations diffuse through populations as complex contagions. Bandiera and Rasul (2006) showed how farmers in Mozambique were more likely to adopt a new kind of crop if they had a higher number of network neighbours who had adopted. Oster and Thorton (2012) show that the adoption of menstrual cups in women depends on influence from mul- tiple peers, because of the transference of technology-relevant knowledge. Based on these findings, Beaman et al. (2015) used com- plex contagion models to design seeding strategies for the distribution of pit planting in Malawi. Pit planting is a traditional West African technology which is largely unknown in Malawi, and it has the poten- tial to significantly improve maize yields in arid areas of rural Africa. Beaman et al. compared the seeding strategies recommended by com- plex contagion models to a benchmark treatment where village lead- ers used local knowledge to select seeds. Seeding, in this experiment, involved training specific people in each village on how to use pit planting, given evidence that trained adopters of a technology are most effective at distributing new technologies (Banerjee et al. 2013). 200 different villages were randomly treated with seeding strategies from either complex contagion models or traditional approaches based on local expertise. They found that seeding strategies informed by complex contagion models increased adoption more than relying 10 on extension workers to choose seeds. Further, Beaman et al. observe no diffusion of pit planting in 45% of the benchmark villages after 3 years. In villages where seeds were selected using the complex con- tagion model, there was a 56% greater likelihood of uptake in that village. Complex contagions have also been shown to characterize the diffusion of software innovations. Karsai et al. (2014) examined the uptake of Skype – the world's largest Voice over internet protocol service – from September 2003 to March 2011. They find that the probability of adoption via social influence is proportional to the frac- tion of adopting neighbours. Interestingly, they find that while adop- tion behaves like a complex contagion process, termination of the ser- vice occurs spontaneously, without any observable cascade effects. These results suggest that there may be an asymmetry in the dynamics of adoption (which are socially driven) versus the dynamics of termi- nation (which may depend on non-social factors). Ugander et al. (2012) also observe complex contagion dynam- ics in the initial growth of Facebook, which now has over a billion users worldwide. Facebook initially grew through peer recruitment over email. The results showed a complex diffusion process, in which people were more likely to adopt Facebook if they received requests from multiple friends, especially if these friends belonged to separate network components. This finding on the value of structural diversity for amplifying reinforcing signals for adoption suggests interesting new theoretical directions for research on the connections between homophily, diversity, and complexity (see Sect. 4.3). A parallel stream of research has focused on the role of mass- media marketing in spreading the complex diffusion of innovations. Toole et al. (2012) show that while mass media served to measurably increase the adoption of Twitter, peer to peer social influence mecha- nisms still account for the lion's share of the adoption patterns that were observed, where local reinforcement played a major role in in- dividuals' decisions to adopt Twitter. So much so, that the online mi- croblogging platform exhibited strong spatial diffusion patterns in its initial growth, as it spread through densely clustered networks of peer reinforcement. Similar findings are echoed by Banerjee et al. (2013). These studies suggest that the local peer influence dynamics of com- plexity can initiate global cascades in the adoption of innovations. For 11 marketing to propel the diffusion of new technologies, mass-media strategies need to account for how messages are dynamically filtered by social networks (Berger 2013). Evidence suggests that advertising campaigns initially diffuse like simple contagions with the first media broadcast, but diffuse more like complex contagion once they begin spread through social networks (Bakshy et al. 2012a). The interaction between mass-media diffusion and social influence in the adoption of technology (particularly complementary technologies) suggests that the complexity of a diffusion process is determined in part by interac- tions across several scales of a population. The study of innovation diffusion is expanding in response to a novel kind of complexity introduced by technologies themselves. A new direction for future research concerns the role that social media technologies play in shaping the evolution of other contagions, once the social media technologies themselves are adopted. Due to their explicitly complementary design, social media technologies, includ- ing Facebook, Twitter, and Skype, all exhibited the dynamics of com- plexity in their diffusion, spreading most effectively through networks of peer reinforcement. Once these technologies diffuse, they allow in- dividuals to grow larger networks that communicate at much faster rates than were previously possible in word-of-mouth exchanges. Thus, in addition to the spread of social media technologies, the do- main of social media itself has become its own space for studying the complex dynamics of the diffusion of collective behavior. 2.3. Social Media Social media has significantly shaped and, in some cases, augmented the diversity of complex contagions that can spread, the speed at which they can spread, and the overall size of the populations they are able to reach via global cascades (Borge-Holthoefer et al. 2013). Kooti et al. (2012) show that one of the first methods for retweeting was established as the successor of various competing complex con- tagions, in an ecology of possible conventions. Barash (2011) and Weng et al. (2013) find that most tweets spread via complex conta- gions in retweet networks. This finding reappears with Harrigan et al. (2012) who show that tweets are more likely to diffuse through re- tweeting within clustered communities, where twitter users are able 12 to observe their friends retweeting the same message. Complex con- tagions are observed across other platforms as well. Photo-tagging in Flickr exhibits the hallmarks of diffusion via influence from multiple peers (Barash 2011). A recent massive-scale randomized experiment over Facebook showed that user-generated stories diffused like com- plex contagions (Bakshy et al. 2012b). Meanwhile, social media web- sites gather an unprecedented amount of data on communication flows, permitting novel insights into how complex contagions emerge and operate. One of the most interesting findings of social media research is that the content of a contagion matters for whether it behaves in a complex manner. Wu et al. (2011) show that the modality of infor- mation that structures a contagion influences its lifespan: viral videos long outlive their textual counterparts. Romero et al. (2011) find that there are distinct contagion dynamics for different kinds of hashtag. Political hashtags are found to behave like complex contagions, where exposure to multiple people using the hashtag is strongly correlated with use. But hashtags based on idioms or memes, by contrast, behave like simple contagions. Barash and Kelly (2012) and Fink et al. (2016) replicate this finding by showing that political hashtags behave like complex contagions, whereas news-based hashtags, broadcast by mass media, spread like simple contagions. Using the massively multiplayer virtual world of Second Life, Bakshy et al. (2009) uncover complex contagions in the exchange of user-created content. Specifically, they focus on the spread of con- ventionalized avatar gestures constructed by players, which can only spread through peer to peer sharing mechanisms. Bakshy et al. unveil subtle interactions between user degree and diffusion: users who are most effective at initiating cascades of gestures do not have the high- est degree; rather, they collect rare gestures that other users are more likely to adopt. This result points to uncharted territory in complex contagions research, relating to how the quality or style of a contagion influences its likelihood of spreading via social influence. Undoubtedly, the source of complexity in these online dynam- ics of spreading behavior lies partly in the sociological significance that the content of an online contagion holds. For instance, Romero et al. suggest that political hashtags, such as #TCOT (which stands for "Top Conservatives on Twitter") and #HCR (which stands for 13 "Health Care Reform") were "riskier to use than conversational idi- oms…since they involve publicly aligning yourself with a position that might alienate you from others in your social circle." (2011: 3). Thus, the authors found "that hashtags on politically controversial topics are particularly persistent, with repeated exposures continuing to have unusually large marginal effects on adoption" (3). It is also likely that the level of complexity in diffusion de- pends, in part, on the design of interfaces and the kinds of sociological processes that platforms facilitate. Readymade communication but- tons – such as the 'share' button on Facebook or the 'retweet' button on Twitter – automatically enable the spread of information as a sim- ple contagion. However, State and Adamic (2015) show how simple contagions do not account for the spread of digital artifacts that re- quire more effort to construct. Using a dataset of over 3 million users, they show that the adoption of new conventions for profile pictures are best described as complex contagions. They argue that the differ- ence pertains to the amount of effort it takes to adopt the behavior: certain informational contagions behave in a simple manner because it takes no time to click and share after one exposure. But when a contagion requires more effort, such as manually changing a profile picture, users require evidence that several of their peers have ex- pended the energy for the contagion, thereby justifying its weight in terms of social capital. Conversely, platform design can also prevent complex conta- gions from emerging and spreading by constraining the ability for people to perceive and share potential contagions (Bakshy et. al. 2012a, 2012b; Hodas and Lerman 2012; Gomez-Rodriguez et al. 2014). Doerr et al. (2012) find that, over the social news aggregator Digg, users do not seem to preferentially share the content of their peers. This result is likely to be specific to the Digg environment, be- cause the culture of the platform is based on sharing news that your friends do not already know. Studies of social media thus reveal how environmental design alters the capacity for diffusion by shaping the salience of peer behaviors and the culture of interaction altogether. Going forward, social media environments are likely to serve as a powerful tool for studying complex contagions experimentally. Centola (2010, 2011, 2013a) developed a method for designing social 14 media platforms that embed participants into engineered social net- works, which allow researchers to test the effects of network topology and other variables on the dynamics of social diffusion. In a less con- trolled study, Kramer et al. (2014) modified the newsfeeds of Face- book users to examine emotional contagion. For some users, they re- duced the amount of positive content, whereas for other users, they reduced the amount of negative content. As a result, they were able to systematically alter the emotional content of users' posts. While this study could not eliminate endogeneity within user networks, the ran- domization of messages allowed for suggestive experimental results on the ways that social exposure to messages influence user behavior.1 Another related approach to experimentation on social media comes from the advent of experimental methods that use algorithmi- cally controlled social media accounts called bots to manipulate users' experiences (Krafft et al. 2016). Mønsted et al. (2017) released a net- work of bots into twitter and tested whether they could prompt the uptake of specific hashtags. They show that bots can initiate the up- take of new hashtags and that these hashtags spread as complex con- tagions, whereby the probability of using the new hashtag drastically increased if multiple bots and users were seen using it. 2.4. Politics Political processes have been a longstanding topic of interest for threshold-based contagion models. Granovetter's (1973, 1978) origi- nal threshold model of collective action gave special attention to the start-up problem for political protests and riots. He observed that in- dividuals have different degrees of willingness (i.e. thresholds) to par- ticipate in a riot, where their willingness is dependent on how many of their neighbours they observe participating in the riot. Granovetter 1 Kramer et al.'s study also raised the important point about the ethics of experi- mentation on social media. While previous social media studies using experimen- tally designed social platforms (Salganik et al. 2006, Centola 2010, 2011, Centola and Baronchelli 2015) enrolled subjects into their online platform with an explicit process of informed consent, Kramer et al.'s study on Facebook used existing net- works of peers without their explicit consent. It is an important topic of ongoing discussion how to properly use existing peer networks, such as Facebook and Twitter, to conduct experiments that manipulate user behavior. 15 observed that riots can emerge as a result of cascades, where a subset of instigator individuals with low thresholds trigger the spread of ri- oting. The first efforts to describe the emergence of social movements with agent-based modeling maintained that population diversity was essential for getting a movement off the ground. Without long ties connecting communities, it was thought that social movements would not be able to diffuse through a population and reach critical mass. More recent models extend the study of diversity in political processes by emphasizing the supporting role of homophily during the growth phase of social movements. Centola (2013b) argues that because social movements involve risky and costly forms of deviant behavior, people require reinforcement from multiple peers to partic- ipate, where homophily is useful for establishing a critical mass of likeminded peers. Again, this raises an interesting connection between diversity and homophily. For organizing a critical mass, dense, homophilous communities are necessary for getting social movements off the ground because like-mindedness facilitates group solidarity, which may be necessary to withstand the normative backlash that comes from deviant behavior. On these grounds, Centola designed an agent- based model to show that weak ties hinder the spread of social move- ments by increasing exposure to counter-norm pressures, while also reducing the group transitivity needed to reinforce group interests. Homophily and clustering thus reinforce one another. However, once homophilous networks gain enough local reinforcement, they can cre- ate a critical mass that allows the movement to achieve sufficient sa- lience in the whole population and to expand to diverse communities through the aid of mass media. In an empirical study of the effects of communication net- works on mobilization, Hassanpour (2017) explored the spread of armed conflict as a complex contagion in Damascus, Syria. On No- vember 29th, 2012, Internet and cellular communications were shut down all across Syria for over a day. The shutdown, according to Has- sanpour, resulted in the loss of communication with long ties to indi- viduals across the city. At the same time, the shutdown immediately preceded an unprecedented increase in the diffusion of armed conflict throughout the city. Using a geolocated dataset of daily conflict loca- tions in Damascus, Hassanpour uncovers signs that the likelihood of 16 conflict in a region was influenced by whether there had been conflict in multiple neighboring regions. Hassanpour suggests that this indi- cates the spread of conflict as a complex contagion, which was al- lowed to emerge when long ties were broken and interaction within local clusters became the strongest determiners of armed conflict. In other results, González-Bailón et al. (2011) shows that pro- test recruitment in Spain, 2011, diffused over Twitter as a complex contagion via peer influence. González-Bailón et al. (2011) use k-core decomposition to show that the users who are in the core of the net- work were most effective at initiating cascades of recruitment. In a complementary study, Steinhert-Threlkeld (2017) offered evidence that users in the periphery of social media networks can also trigger global cascades. These studies suggest that social media can influence the rise and spread of political complex contagions that inspire on- the-ground political action. Other recent empirical work has uncovered complex conta- gions within a wide range of political processes, including campaign donations (Traag 2016), grassroots mobilization (Parkinson 2013; Parigi and Gong 2014), petition signing (Yasseri et al. 2014), social control (Siegel 2009, 2011), institutional change (Dellaposta et al. 2017), and administrative management in both rural (Catlaw and Stout 2016) and urban settings (Pan et al. 2013). Barash (2011) developed a unique set of measures for charac- terizing the lifespan of political contagions over social media. A com- plex contagion begins by saturating a locally clustered community. Once saturation is reached, the rate of propagation for the contagion decelerates, as the number of potential adopters decreases. If the sat- urated community has sufficiently wide bridges to other communities, Barash (2011) argues that it is possible for a contagion to travel from one community to the next. Diffusion between communities can cre- ate a detectable temporal signature, because as a contagion enters a new community, its rate of propagation rapidly increases with the availability of new adopters. Barash explains how changes in the rate of complex propagation can provide a measure for whether a conta- gion is ramping up for a global cascade, hinting toward the possibility of detecting global cascades, prior to their emergence. Based on the work of Barash et al. (2012), Fink et al. (2016) 17 developed a number of measures for characterizing the spread of po- litical hashtags as complex contagions. These measures include: peakedness, commitment, concentration, and cohesion. Peakedness concerns the duration of global activity associated with a contagion, where a peak refers to a day-long period of usage when the average mentions per day is more than two standard deviations away from the average mentions in the preceding days. Peakedness is closely related to burstiness, which has been shown to play an important role in threshold-based cascade dynamics (Takaguchi et al. 2013). Commit- ment refers to the number of people who sustain the life of a complex contagion, even though they endure social costs by not conforming to surrounding norms. Concentration simply refers to the proportion of people using a hashtag during a given time period. And cohesion re- fers to the network density over the subgraph of all users engaged in a particular contagious phenomena. The authors make use of the idea that complex contagions are incubated in locally dense communities before they colonize other communities via sparse connections. Using these measures, researchers have made a number of val- uable observations. Fink et al. (2016) apply these measures to the study of political hashtags in Nigeria. In their sample, they find polit- ical hashtags consistently arise with a small proportion of instigators (roughly 20%) who are densely connected, and that almost 60% of late adopters for political hashtags had 2 or more previous adopter friends. News hashtags, by contrast, are first propagated by largely unconnected instigators who constitute between 50% and 90% of the network, where less than 10% of adopters had 2 or more previous adopter friends. Consistent with Romero et al. (2011), the authors sug- gest that political hashtags require influence from multiple peers be- cause they have higher social costs, especially in countries like Nige- ria where surveillance by governments and extremists groups looms over users. Compared to other hashtags, the researchers also find that hashtags related to social movements have a higher density of ties among early adopters, consistent with the argument that political movements require a coalition of homophilous, densely connected us- ers (Centola 2013b). Fink et. al further illustrate that it is possible to map the virality of political hashtags using Barash's measures for the temporal signatures of diffusion. They show how the #bring- 18 backourgirls hashtag went viral shortly after a period of decreased us- age among early adopters, which indicated saturation in a local com- munity prior to the spread of the contagion to other communities. In a related paper, Barash and Kelly (2012) use the same measures to model the spread of complex contagions over Russian Twitter, a significantly different cultural setting. Yet again, these re- searchers find that politically-salient hashtags diffuse like complex contagions where news hashtags from mass media do not. Im- portantly, this analysis shows how the heterogeneous distribution of adoption thresholds is critical for understanding political contagions. They find that engagement in political issues is non-uniform across the population, and different communities have distinct patterns of engagement and adoption, based on how the community relates to the content captured by the hashtag. Users belonging to groups that op- pose the political regime engage with controversial topics over a long period, as a committed minority. Contrary to expectations, they find that when hot button issues relevant to the opposition make it into the mainstream, they are much more likely to sustain global saturation, even amongst pro-government users. These results suggest that rein- forcement dynamics can drive the spread of politically-salient content over social media. The diffusion of political contagions online interacts with both the structure of the sub-communities that they reach and the group identities that they activate. In March of 2013, 3 million Facebook users changed their profile picture to an 'equals sign' to express sup- port of same-sex marriage. Consistent with earlier work, State and Adamic (2015) found that the equals sign profile picture spread as a complex contagion. Their data suggests that mass media created only about 58,000 spontaneous adopters, while roughly 106 million users adopted based on peer exposures. They find that it took, on average, exposures to 8 different peer adopters for a person to adopt. When examining this threshold, the authors uncover intricate dependencies between the identity of a user and their willingness to adopt. Users were more likely to be exposed and thereby more likely to adopt if they were female, liberal, non-heterosexual, and between the ages of 25-34. These findings suggest that thresholds for adopting contagions are modulated by online identity signaling regarding political values and beliefs. Similar, smaller scale studies of behavior on Facebook 19 find that a user's demographic characteristics do not determine their influence in generating cascades, but instead most cascades rely on multiple users to trigger spreading (Sun et al. 2009). The study of political contagions – offline and online – reveals a number of subtleties in how thresholds operate in sociological con- texts. Political identity is a driving motivation for behavior change, suggesting that homophily and clustering in social networks can be essential for incubating the early growth of a political behavior over social media. Furthermore, gender, race, and religion are also strong predictors of whether someone will be exposed and receptive to a po- litical contagion. A recent study by Traag (2016) shows that campaign donations diffuse as complex contagions, but the findings here em- phasize the value of diversity. The growth of support for a candidate increases when people are exposed to donors from separate commu- nities, particularly if those donors supported the opposite party. Di- versity can thus complement homophily when it signals wider support for a candidate, and thereby increases the likelihood that the candidate will be more effective for achieving bi-partisan goals. The details are subtle, however, since there are also situations where diverse support for a candidate might signal mixed allegiances and comprise the can- didate's party loyalty. The complementary roles of homophily and di- versity in supporting complexity depend upon the content of the po- litical messages that are used and the identities that they activate. 3. Theoretical Advances Recent research into the formal model of complex contagions has ex- plored two general directions. The first direction investigates how complex contagions spread within large networks of varying topolo- gies. To date, researchers have examined threshold-based contagion models within power-law (Barash et al. 2012), locally tree-like (Gleeson and Cahalane 2007), degree-correlated (Gleeson 2008; Dodds and Payne 2009), directed (Gai and Kapadia 2010), weighted (Hurd and Gleeson 2013), small-world (Centola et al. 2007), modular (Galstyan and Cohen 2007), clustered (Ikeda et al. 2010; Hackett et al. 2011), temporal (Karimi et al. 2013; Backlund et al. 2014), multi- plex (Brummitt et al. 2012; Yağan et al. 2012, Lee et al. 2014), and interdependent lattice networks (Shu et al. 2017). Researchers have 20 used different topologies to simulate how external factors like mass media influence cascade dynamics (Bassett et al. 2012), and how to- pologies influence percolation processes (Zhao et al. 2013). A pivotal theoretical finding is that complex contagions require a critical mass of infected nodes to initiate global cascades, and it has been shown that critical mass dynamics depend in sensitive ways on network to- pology and the distribution of node degree and adoption thresholds (Barash 2011). There has also been efforts to provide analytic proofs for the global dynamics of complex contagions (Barash 2011; O'Sul- livan 2015). At the cutting-edge is research into how complex conta- gions spread in coevolving, coupled, time-varying, and multi-layered networks (Takaguchi et al. 2013; Pastor-Satorras et al. 2015). The second major direction in theoretical complex contagion research concerns mechanisms of diffusion at the node-level, con- cerning individual attributes and thresholds. Wang et al. (2015a, 2015b) propose a contagion model which shows that the final adop- tion size of the network is constrained by the memory capacities of agents and the distribution of adoption thresholds. Perez-Reche et al. (2011) simulate complex contagion dynamics with synergistic effects among neighbors, and McCullen et al. (2013) structure the motivation for an agent to adopt a behavior as a combination of personal prefer- ence, the average of the states of one's neighbours, and the global av- erage. Dodds et al. (2013) attempt to explicitly encode sociological processes into their models by building agents with a preference for imitation but an aversion for complete conformity. Melnik et al. (2013) model multi-stage complex contagions, in which agents can assume different levels of personal involvement in propagating the contagion, at different times in their lifecycle. They find that multi- stage contagions can create multiple parallel cascades that drive each other, and that both high-stage and low-stage influencers can trigger global cascades. Huang et al. (2016) build agents with a persuasive- ness threshold which determines their ability to initiate adoption. This new parameter can cause networks to become more vulnerable to global cascades, especially heterogeneous networks. Further incorpo- rating sociological considerations, Ruan et al. (2015) simulated how conservativeness among nodes - i.e. the reluctance to adopt new norms - interacts with cascades caused by spontaneous adopters. The latest theoretical developments have informed research on 21 how to design network interventions and seeding strategies to stop the spread of harmful complex contagions (Kuhlman et al. 2015). Such interventions are based on the use of oppositional nodes that are per- manently unwilling to adopt a behavior, regardless of peer influence. Kuhlman et al. (2015) offers two heuristics for using seeding methods to determine critical nodes for inhibiting the spread of complex con- tagions. The first heuristic is to select the nodes with the highest de- gree, and the second heuristic is to select nodes from the 20 core, de- termined by k-core decomposition. They show how the second heuristic is more effective for initiating and preventing global cas- cades, because selecting from the 20 core increases the likelihood that nodes are adjacent and thereby capable of reinforcing each other's in- fluence. Centola (2009) shows that similar ideas can be used to eval- uate the tolerance of networks against error and attack. Albert et al. (2000) showed that scale-free networks are robust against network failures, defined in terms of the inability to diffuse simple contagions. When it comes to diffusing complex contagions, Centola shows that scale-free networks are much less robust than exponential networks. Thus, moving from simple to complex contagions changes the robust- ness properties of scale-free networks. Building on this work, Blume et al. (2011) investigate which topologies are more susceptible to what they call cascading failures, which refers to the outbreak of negative complex contagions that are harmful for social networks. Siegel (2009, 2011) shows how these developments can inform models for repressing social movements and performing crowd control on the be- half of governments. While early models of diffusion consider individual conta- gions as independent and spreading in isolation, a number of studies have begun to investigate evolutionary dynamics among multiple complex contagions. Myers and Leskovec (2013) develop a statistical model wherein competing contagions decrease one another's proba- bility of spreading, while cooperating contagions help each other in being adopted throughout the network. They evaluate their model with 18,000 contagions simultaneously spreading through the Twit- tersphere, and they find that interactions between contagions can shape spreading probability by 71% on average. Jie et al. (2016) con- struct a similar model to simulate competing rumor contagions in a 22 homogenous network. Empirical evidence is accumulating that mul- tiple contagions frequently interact in real-world social systems. For instance, the study of social contagions in the health domain has shown competitive dynamics among positive and negative health practices, e.g. smoking vs. jogging (Kuhlman et al. 2011a, 2011b). Most interestingly, health research has uncovered ecological interac- tions among contagions at different scales, such as the interaction be- tween complex contagions (e.g. health-related attitudes and lifestyle choices), and the spread of simple contagions (e.g. biological patho- gens) (Campbell and Salathe 2013). 4. New Directions Recent work on complex contagions points to three main directions for future development. The first concerns the study of how multiple contagions interact within the same network and across networks, in what may be called an ecology of complex contagions. The second concerns the study of how the structure of thresholds and their behav- ioral consequences can vary by social context. The third area concerns the interaction of diversity and homophily in the spread of complex contagions, where diversity can refer to either the diversity of demo- graphic profiles among one's local peers, or to the broader structural diversity that local peers may be situated within. 4.1. Ecologies of Complex Contagions. Past theoretical research has made significant progress in mapping the behavior of complex contagions within a range of network topologies. Newer work has begun to explore the complexities that arise when multiple kinds of contagions interact in the same network (Su et al. 2016). Moreover, while the content of a contagion undoubtedly influ- ences the spread and interaction of competing behaviors, it may have an impact on network structure as well. An important area of future research concerns how complex contagions shape network structure and how network structure shapes complex contagions, as part of a co-evolutionary process of network formation (Teng et al. 2012). The process of modeling ecologies of contagions goes hand in hand with a growing effort to model complex contagions in in several 23 new domains of collective behavior. Among the most recent applica- tions is the examination of complex contagions in swarm behaviors. One study showed that complex contagions provided the most robust model of escape reflexes in schools of golden shriner fish, where frightened individuals trigger cascades of escape responses on the ba- sis of a fractional threshold among multiple peers (Rosenthal et al. 2015). Another direction for application concerns the role of complex contagions in cognitive science. Simulation results suggest that com- plex contagions may be able to account for the emergence and spread of new categories, at the level of both perception and language, con- sistent with the longstanding view that cultural artifacts depend on principles of emergence and diffusion (Dimaggio 1997; Puglisi et al. 2008; Centola and Baronchelli 2015). Related extensions concern the role of contagion in the structuring of collective memory (Coman et al. 2016). Situating complex contagions at this level will extend ex- isting perspectives on how processes of social diffusion are woven into the foundations of culture and cognition. 4.2. Mapping Heterogeneous Thresholds in Context. Extant models represent threshold heterogeneity in terms of distribu- tions of values along a numerically defined scale, from 0 to 1 (Morris 2000). Applied studies of contagion dynamics show how thresholds vary by individual differences and contextual dependencies relating to the content of the contagion and its sociological significance. For instance, there appear to be a different set of thresholds that govern the adoption of a contagion (e.g. a technology) and the termination of the contagion (Karsai et al. 2014). Similarly, the study of health con- tagions suggests that people are susceptible to influence by those sup- porting a positive health behavior and to those resisting it, where in- dividuals may vary in their responses to processes of support and resistance (Kuhlmann et al. 2011a; Myneni et al. 2015). In the context of social media, readymade sharing buttons alter the cost structure for certain contagions, allowing memes to be adopted simply with a click. Interface design can also make certain contagions more costly, thereby impacting the thresholds of individ- uals and their willingness to adopt. Certain complex contagions, such as political hashtags, appear to require exposure from 2-5 peers (Ba- rash and Kelly 2012), whereas changes in profile pictures appear to 24 require exposure of up to 8 or more peers (State and Adamic 2015). One conjecture is that thresholds are fractional, and therefore depend sensitively on the number of connections that a person has. The more connections there are, the higher the thresholds are likely to be. Finally, identity appears to play a structural role in defining thresholds. Identity has been used in two ways: group identity and personal identity. A few recent studies have excluded group identity and focused narrowly on personal identity, such as demographic char- acteristics (Aral et al. 2009; Aral and Nicolaides 2017). However, the role of demographic characteristics such as gender and race on adop- tion thresholds is hard to understand independently of social context. Depending on the social context and the identities that are activated, people will react differently to a political contagion than to a health contagion. By contrast, other work has suggested that demographic traits play an important role in defining group identity, which in turn interacts with people's thresholds for adoption (Centola 2011). Political studies further show how identity-based responses to contagions can take a variety of forms, where thresholds do not simply represent the binary outcome of adoption – they also represent whether an individual will join a committed minority, or whether they will actively attempt to punish deviant behavior (Centola 2013b). Par- kinson (2013) uses ethnographic methods to suggest that part of the reason why identity influences contagion thresholds is because iden- tities correspond to different functional roles in a social system, which entail different kinds of behavioral responses that mediate diffusion. These studies help to expose how group membership and normative pressures give rise to individual variation in threshold dynamics. It is likely that individuals differ in the kinds of thresholds they adopt to- ward a potential contagion based on how they categorize the conta- gion, relative to their political identity (State and Adamic 2015; Traag 2016). It may therefore be useful to consider different types of thresh- olds that vary along sociological and psychological dimensions, where key differences are marked by how contagions interface with the identity-based responses of individuals and groups. 4.3. The Roles of Homophily and Diversity in Diffusion. There are two forms of diversity in the literature on diffusion. Re- 25 searchers use the term to refer to cases where one's local neighbor- hood in the network consists of people with different demographic profiles and personality traits. We may call this identity-based diver- sity. At other times, researchers use the term to refer to structural di- versity where one's local neighborhood consists of people who belong to separate components of the network, identified by removing the ego node from the ego network. The first kind of diversity tends to limit diffusion of complex contagions, while the second kind tends to amplify it. Looking at identity-based diversity, Centola (2011) compared complex contagion dynamics on homophilous networks to the dy- namics on non-homophilous networks, keeping network topology constant. The results showed that homophily (i.e., reduced identity- diversity) significantly improved the spread of complex contagions. The reason for this is that greater similarity among contacts in a health context made peers more relevant. Women were more likely to adopt from women, and obese people were likely to adopt from obese peo- ple. Reinforcing signals from irrelevant (i.e., diverse) peers were largely ignored, while reinforcing signals from relevant (i.e., similar) peers were influential in getting individuals to adopt a new health be- havior. This result was most striking for the obese individuals. Expo- sure among obese individuals was the same across conditions, yet there was not a single obese adopter in any of the diverse networks, while the number of obese adopters in homophilous networks was equivalent to the total number of overall adopters in the diverse net- works –resulting in a 200% increase in overall adoption as a result of similarity among peers. The effects of homophily can be complemented by structural diversity. In studying the complexity of campaign donations, Traag (2016) suggests that structural diversity can increase the credibility of a complex contagion. If one belongs to an echo chamber, where one's peers are highly similar and densely connected, then peer agreement may undermine credibility, since their agreement may be the result of induced homophily and pressures for conformity. By contrast, if one's peers are from different components of the network, their opinions may reasonably be viewed as independent and mutually confirming. What unites these arguments is the supposition that people use the identity composition of their local network neighbors to infer the 26 broader structural diversity of their network. However, structural di- versity does not imply reduced homophily. Individuals may be similar to their friends in different ways. They may be the same gender as some, have the same professional role as others, and participate in the same volunteer organizations as yet others. While identity diversity can correlate with structural diversity, it does not always provide a reliable way for inferring it. Receiving reinforcing encouragement from individuals who belong to different parts of a person's social network strengthens the independence of their signals, and may there- fore be more likely to trigger adoption. Similarly, Ugander et al. (2012) identify how the mechanism of structural diversity can boost the influence of social reinforcement. Their study of Facebook shows that people are more likely to adopt a social media technology when they receive invites from people be- longing to separate components of their ego network. Structural di- versity does not, however, entail identity-based diversity. Ugander et al.'s study leaves open the possibility that structural diversity alone – without identity-based diversity – can modulate adoption thresholds. This observation is especially interesting in light of State and Adamic's (2015) finding that while the number of friends a user had scaled linearly with their chances of adoption, adoption probabilities plummeted as soon as a user possessed 400 friends or more. The au- thors propose that having too many friends on social media can stifle the spread of complex contagions by exposing users to a variety of content so vast that they fail to receive repeated exposure by different peers to any given phenomenon. Consistent with earlier results on po- litical hashtags and social movement mobilization, these findings sug- gest that more contentious complex contagions tend to benefit from clustered, homophilous networks that can foster social change with- out being overwhelmed by countervailing influences. 5. Conclusion Complex contagions are found in every domain of social behavior, online and off. Early theoretical developments in complex contagions showed that topology and the distribution of adoption thresholds can be decisive for determining whether global saturation is possible. More recent theoretical modeling concerns the interaction of multiple 27 different contagions in the same network, where individuals are at- tributed different motivations and behavioral responses to each con- tagion. One of the critical challenges ahead involves mapping hetero- geneous thresholds in context, where political identity, group membership, and even the content of contagions can affect individual thresholds and, by consequence, diffusion. Another valuable area for future research concerns the ways in which individuals use infor- mation about global network structure to inform their adoption pat- terns, as is demonstrated by the effects of structural diversity on dif- fusion. Investigations in this direction will benefit from studying how individuals infer global structure from local interactions, and how new social media environments are augmenting these inferences by supplying information about one's broader ego network. As shown by the literature accumulated over the last decade, examining complex contagions in various applied domains has been enormously fruitful. Each new domain has revealed new elements of diffusion dynamics that require new theoretical explanations and elaborated modelling techniques, revealing new areas of cumulative progress in understand- ing the collective dynamics of social diffusion. 28 References Albert, R., Jeong, H., & Barabási, A. (2000). Error and Attack Toler- ance of Complex Networks. Nature, 406, 378-382. Alvarez-Galvarez, J. (2015). Network Models of Minority Opinion Spreading: Using Agent-Based Modeling to Study Possible Scenarios of Social Contagion. Social Science Computer Re- view, 34(5). Aral, S., Muchnik, L. & Sundararajan, A. (2009). Distinguishing in- fluence-based contagion from homophily-driven diffusion in dynamic networks. PNAS, 106(51), 21544-21549. Aral, S. & Nicolaides, C. (2017). Exercise contagion in a global social network. Nat Commun 8, 14753. Backlund, V. P., Saramaki, J., & Pan, R. K. (2014). Effects of tem- poral correlations on cascades: threshold models on temporal networks. Phys Rev E Stat Nonlin Soft Matter Phys, 89(6). Bakshy, E., Karrer, B. & Adamic, L. (2009). Social Influence and the Diffusion of User-Created Content. Proceedings of the 10th ACM conference on Electronic commerce, 325-334. Bakshy, E., Eckles, D., Yan, R., & Rosenn, I. (2012a). Social Influ- ence in Social Advertising: Evidence from Field Experiments. arXiv. Bakshy, E., Rosenn, I., Marlow, C., & Adamic, L. (2012b). The Role of Social Networks in Information Diffusion. Proceedings of ACM WWW 2012. Bandiera, O. & Rasul, I. (2006). Social Networks and Technology Adoption in Northern Mozambique. The Economic Journal, 116(514), 869–902. Banerjee, A., Chandrasekhar, A. G. , Duflo, E., & Jackson, M. O. (2013). The diffusion of microfinance. Science, 341(6144). Barash, V. (2011). The dynamics of social contagion. PhD Disserta- tion, Cornell University. Barash, V. & Kelly, J. (2012). Salience vs Committment: Dynamics of Political Hashtags in Russian Twitter. Berkman Center for Internet and Society, Research Publication No. 2012-9. Barash, V., Cameron, C. & Macy, M. (2012). Critical Phenomena in Complex Contagions. Social Networks, 34, 451-461. Bass, F. (1969). A new product growth for model consumer durables. 29 Management Science, 15(5), 215–227. Bassett, D., Alderson, D., & Carlson, J. (2012). Collective Decision Dynamics in the Presence of External Drivers. arXiv. https://arxiv.org/abs/1206.1120 Beaman, L., Yishay, A., Magruder, J., & Mobarak, M. (2015). Can Network Theory-based Targeting Increase Technology Adop- tion? Working Paper. Berger, J. (2013). Contagious: why things catch on. London, Simon and Schuster. Blume, L., Easley, D., Kleinberg, J., Kleinberg, R., & Tardos, E. (2011). Which Networks are Least Susceptible to Cascading Failures? IEEE 52nd Annual Symposium on Foundations of Computer Science (FOCS). Borge-Holthoefer, J., Baños, R. A., González-Bailón, S., and Moreno, Y. (2013). Cascading Behaviour in Complex Soci-Technical Networks. Journal of Complex Networks, 1, 3-24. https://doi.org/10.1093/comnet/cnt006 Brummitt, C. D., Lee, K. M., & Goh, K. I. (2012). Multiplexity-facil- itated cascades in networks. Phys Rev E Stat Nonlin Soft Mat- ter Phys, 85(4 Pt 2). Campbell, E. & Salathe, M. (2013). Complex social contagion makes networks more vulnerable to disease outbreaks. Sci Rep, 3(1905). Catlaw, T., and Stout, M. (2016). Governing Small-Town America Today: The Promise and Dilemma of Dense Networks. The American Association for Public Administration, 76(2), 225- 229. Centola, D. (2009). Failure in complex networks. Journal of Mathe- matical Sociology, 33, 64-68. Centola, D. (2010). The spread of behavior in an online social net- work experiment. Science, 329(5996), 1194-1197. Centola, D. (2011). An experimental study of homophily in the adop- tion of health behavior. Science, 334(6060), 1269-1272. Centola, D. (2013a). Social media and the science of health behavior. Circulation, 127(21), 2135-2144. Centola, D. (2013b). Homophily, Networks, and Critical Mass: Solv- ing the start-up problem in large group collective action. Ra- tionality and Society, 25(1), 3-40. 30 Centola, D. & Baronchelli, A. (2015). The spontaneous emergence of conventions: an experimental study of cultural evolution. PNAS, 112(7), 1989-1994. Centola, D. & Macy, M. (2007). Complex contagions and the weak- ness of long ties. American Journal of Sociology, 113(3), 702- 734. Centola, D, Eguiluz, V., & Macy, M. (2007). Cascade dynamics of complex propagation. Physica A, 374, 449–456 Centola, D. & van de Rijt, A. (2014). Choosing your network: Social Preferences in an Online Health Community. Social Science and Medicine. http://dx.doi.org/10.1016/j.socscimed.2014.05.019 Christakis, N. A. & Fowler, J. H. (2007). The spread of obesity in a large social network over 32 years. N Engl J Med, 357(4), 370- 379. Christakis, N. A. & Fowler, J. H. (2008). The collective dynamics of smoking in a large social network. N Engl J Med, 358(21), 2249-2258. Coleman, J. S., Katz, E., & Menzel, H. (1966). Medical innovation; a diffusion study. Indianapolis, Bobbs-Merrill Co. Coates, Thomas J., Richter, L., & Caceres, C. (2008). Behavioural Strategies to Reduce HIV Transmission: How to Make Them Work Better. The Lancet, 372(9639), 669–84. Coman, A., Momennejad, I., Drach, R. D., & Geana, A. (2016). Mne- monic convergence in social networks: The emergent proper- ties of cognition at a collective level. PNAS, 113(29), 8171- 8176. Davis, G. & Greve, H. (1997). Corporate Elites and Governance Changes in the 1980s. The American Journal of Sociology, 103(1), 1-37. DellaPosta, D., Nee, V., & Opper, S. (2017). Endogenous dynamics of institutional change. Rationality and Society, 29(1), 5-48. Dimaggio, P. (1997). Culture and Cognition. Annual Review of Soci- ology, 23, 263-287. Dodds, P. S. & Payne, J. L. (2009). Analysis of a threshold model of social contagion on degree-correlated networks. Phys Rev E Stat Nonlin Soft Matter Phys, 79(6 Pt 2), 066115. 31 Dodds, P. S., Harris, K. D., & Danforth, C. M. (2013). Limited imita- tion contagion on random networks: chaos, universality, and unpredictability. Phys Rev Lett, 110(15), 158701. Doerr, C., Blenn, N., Tang, S., & Miegham, P. (2012). Are friends overrated? A study for the social news aggregator Digg.com. Computer Communications, 35(7), 796–809. Fink, C., Schmidt, A., Barash, V., Cameron, C., & Macy, M. (2016). Complex contagions and the diffusion of popular Twitter hashtags in Nigeria. Social Networks 6(1). Gai, P. & Kapadia, S. (2010). Contagion in financial networks. Pro- ceedings of the Royal Society A, 466, 2401–2423 Galstyan, A. & Cohen, P. (2007). Cascading dynamics in modular networks. Phys Rev E Stat Nonlin Soft Matter Phys, 75(3 Pt 2), 036109. Gleeson, J. P. (2008). Cascades on correlated and modular random networks. Phys Rev E Stat Nonlin Soft Matter Phys, 77(4 Pt 2), 046117. Gleeson, J. P. & Cahalane, D. J. (2007). Seed size strongly affects cascades on random networks. Phys Rev E Stat Nonlin Soft Matter Phys, 75. Gomez-Rodriguez, M., Gummadi, K. & Schölkopf, B. (2014). Quan- tifying Information Overload in Social Media and its Impact on Social Contagions. Proceedings of the Eighth International Conference on Weblogs and Social Media, 170-179. González-Bailón, S., Borge-Holthoefer, J., Rivero, A., & Moreno, Y. (2011). The Dynamics of Protest Recruitment through an Online Network. Scientific Reports, 1(197). https://www.na- ture.com/articles/srep00197 Granovetter, M. (1973). The Strength of Weak Ties. American Jour- nal of Sociology, 78, 1360–1380. Granovetter, M. (1978). Threshold Models of Collective Behavior. American Journal of Sociology, 83(1420–1443). Hackett, A., Melnik, S. & Gleeson, J. P. (2011). Cascades on a class of clustered random networks. Phys Rev E Stat Nonlin Soft Matter Phys, 83(5 Pt 2), 056107. Harrigan, N., Achananuparp, P., Lim, E. (2012). Influentials, novelty, and social contagion: The viral power of average friends, close communities, and old news. Social Networks, 34(4), 470-480. 32 Hassanpour, N. (2017). A Quasi-Experimental Study of Contagion and Coordination in Urban Conflict: Evidence from the Syrian Civil War in Damascus. Unpublished Manuscript. Hébert-Dufresne, L. & Althouse, B. M. (2015). Complex Dynamics of Synergistic Coinfections on Realistically Clustered Net- works. Proceedings of the National Academy of Sciences, 112(33), 10551–56. Hodas, N. O. & Lerman, K. (2012). How Visibility and Divided At- tention Constrain Social Contagion. Privacy, Security, Risk and Trust (PASSAT), 2012 International Conference on and 2012 International Conference on Social Computing (Social- Com). Huang, W., Zhang, I., Xu, X., & Fu, X. (2016). Contagion on com- plex networks with persuasion. Scientific Reports 6 (23766). doi:10.1038/srep23766 Hurd, T. R. & Gleeson, J. P. (2013). On Watts cascade model with random link weights. J. Complex Networks, 1, 25–43 Ikeda, Y., Hasegawa, T. & Nemoto, K. (2010). Cascade dynamics on clustered network. J. Phys.: Conference Series, 221. Jie, R., Qiaoa, J., Xub, G., & Menga, Y. (2016). A study on the inter- action between two rumors in homogeneous complex net- works under symmetric conditions. Physica A: Statistical Me- chanics and its Applications, 454, 129–142. Karimi, K. & Holme, P. (2013). Threshold model of cascades in em- pirical temporal networks. Physica A, 392, 3476–3483 Karsai, M., Iniguez, G., Kaski, K. & Kertesz, J. (2014). Complex con- tagion process in spreading of online innovation. J R Soc In- terface, 11(101), 20140694. Kooti, F., Yang, H., Cha, M., Gummadi, P.K., and Mason, W.A. (2012). The emergence of conventions in online social net- works. ICWSM. Krafft, P., Macy, M., & Pentland, A. (2016). Bots as Virtual Confed- erates: Design and Ethics. The 20th ACM Conference on Com- puter-Supported Cooperative Work and Social Computing (CSCW). Kramer, A., Guillory, J., & Hancock, J. (2014). Experimental Evi- dence of Massive-scale Emotional Contagion through Social Networks. PNAS, 111(24), 8788-8790. 33 Kuhlman, C., Kumar,A., & Tuli, G. (2011a). A bi-threshold model of complex contagion and its application to the spread of smok- ing behavior. AAAI Fall Symposium: Complex Adaptive Sys- tems. Kuhlman C.J., Kumar, V.S.A., Marathe M.V., Ravi S.S., & Rosenkrantz D.J. (2011b) Effects of Opposition on the Diffu- sion of Complex Contagions in Social Networks: An Empiri- cal Study. In Salerno J., Yang S.J., Nau D., Chai SK. (Eds), Social Computing, Behavioral-Cultural Modeling and Predic- tion. SBP 2011. Lecture Notes in Computer Science, 6589. Springer, Berlin, Heidelberg Kuhlman C.J., Kumar, V.S.A., Marathe M.V., et al. (2015). Inhibiting diffusion of complex contagions in social networks: theoreti- cal and experimental results. Data Min Knowl Disc, 29, 423. doi:10.1007/s10618-014-0351-4 Lee, K. M., Brummitt, C. D., & Goh, K. I. (2014). Threshold cascades with response heterogeneity in multiplex networks. Phys Rev E Stat Nonlin Soft Matter Phys, 90(6), 062816. McCullen, N., Rucklidge, A., Bale, C., Foxon, T., & Gale, W. (2013). Multiparameter models of innovation diffusion on complex networks. J. Appl. Dyn. Syst., 12, 515–532. Melnik, S., Ward, J. A., Gleeson, J. P., & Porter, M. A. (2013). Multi- stage complex contagions. Chaos, 23. Mønsted, B., Sapieżyński, P., Ferrara, E., & Lehmann, S. (2017). Ev- idence of Complex Contagion of Information in Social Media: An Experiment Using Twitter Bots. arXiv. Morris, S. (2000). Contagion. Review of Economic Studies, 67, 57-78. Myers, S. & Leskovec, J. (2013). Clash of the Contagions: Coopera- tion and Competition in Information Diffusion. IEEE 12th In- ternational Conference on Data Mining (ICDM). Myneni, S., Fujimoto, K., Cobb, N., & Cohen, T. (2015). Content- driven analysis of an online community for smoking cessa- tion: integration of qualitative techniques, automated text J Public analysis, Health,105(6),1206-1212. networks. Am and affiliation O'Sullivan, D., Keefe, G., Fennell, P., & Gleeson, J. (2015). Mathe- matical modeling of complex contagion on clustered net- works. Frontiers in Physics, 8(71). 34 Oster, E. & Thornton, R. (2012). Determinants of Technology Adop- tion: Peer Effects in Menstrual Cup Take-up. The Journal of European Economic Association, 10(6), 1263–1293. Pan, W., Ghoshal, G., Krumme, C., Cebrian, M., & Pentland, A. (2013). Urban characteristics attributable to density-driven tie formation. Nat Commun, 4(1961). Parigi, P. & Gong, R. (2014) From grassroots to digital ties: A case study of a political consumerism movement. Journal of Con- sumer Culture, 14(2). Parkinson, S. (2013). Organizing Rebellion: Rethinking High-Risk Mobilization and Social Networks in War. The American Po- litical Science Review, 107(3), 418-432. Pastor-Satorras, R., Castellano, C., Mieghem, P. V., & Vespignani, A. (2015). Epidemic processes in complex networks. arXiv. Perez-Reche, F. J., Ludlam, J. J., Taraskin, S. N., & Gilligan, C. A. (2011). Synergy in spreading processes: from exploitative to explorative foraging strategies. Phys Rev Lett, 106(21), 218701. Puglisi, A., Baronchelli, A., & Loreto, V. (2008). Cultural route to the emergence of linguistic categories. PNAS, 105(23), 7936- 7940. Romero, D.M., Meeder, B., & Kleinberg, J. (2011). Differences in the mechanics of information diffusion across topics: idioms, po- litical hashtags, and complex contagion on twitter. In Pro- ceedings of the 20th international conference on world wide web. 695–704. ACM. Rosenthal, S. B., Twomey, C. R., Hartnett, A. T., Wu, H. S., & Couzin, I. D. (2015). Revealing the hidden networks of inter- action in mobile animal groups allows prediction of complex behavioral contagion. PNAS, 112(15), 4690-4695. Ruan, Z., Iniguez, G., Karsai, M. & Kertesz, J. (2015). Kinetics of Social Contagion. Phys Rev Lett, 115(21), 218702. Salathe, M. & Bonhoeffer, S. (2008). The effect of opinion clustering on disease outbreaks. J R Soc Interface, 5(29), 1505-1508. Salganik, M. J., Dodds, P. S., & Watts, D. J. (2006). Experimental study of inequality and unpredictability in an artificial cultural market. Science, 311(5762), 854-856. 35 Schelling, T. (1973). Hockey Helmets, Concealed Weapons, and Day- light Saving: A Study of Binary Choices with Externalities. The Journal of Conflict Resolution, 17(3), 381-428. Shu, P., Gao, L., Zhao, P., Wang, W., & Stanley, H. (2017). Social Contagions on Interdependent Lattice Networks. Scientific Reports, 7(44669). Siegel, D. (2009). Social Networks and Collective Action. American Journal of Political Science, 53(1), 122-138. Siegel, D. (2011). When does Repression Work? Collective Action in Social Networks. The Journal of Politics, 73(4), 993-1010. State, B. & Adamic, L. (2015). The Diffusion of Support in an Online Social Movement: Evidence from the Adoption of Equal-Sign Profile Pictures. CSCW '15 Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work and Social Computing, 1741-1750 Steinhert-Threlkeld, Z. (2017). Spontaneous Collective Action: Pe- ripheral Mobilization During the Arab Spring. American Po- litical Science Review, 111(2), 379-403. Su, Y., Zhang, X., Liu, L. et al. (2016). Understanding information interactions in diffusion: an evolutionary game-theoretic per- spective. Frontiers in Computer Science, 10, 518. doi:10.1007/s11704-015-5008-y Sun, E., Rosenn, I., Marlow, C., & Lento. T. (2009). Gesundheit! Modeling Contagion through Facebook News Feed. Third In- ternational AAAI Conference on Weblogs and Social Media. Takaguchi, T., Masuda, N., & Holme, P. Bursty Communication Pat- terns Facilitate Spreading in a Threshold-Based Epidemic Dy- namics. PLoS One, 8(7). Teng, C., Gong, L., Eecs, A., Brunetti, C., & Adamic, L. (2012). Co- evolution of network structure and content. Proceedings of WebSci '12 Proceedings of the 4th Annual ACM Web Science Conference, 288-297 Toole, J., Meeyoung, C., & Gonzalez, M. (2012). Modeling the Adop- tion of Innovations in the Presence of Geographic and Media Influences. PLoS One, 7(1), 1-9. Traag, V. (2016). Complex Contagion of Campaign Donations. PLoS One, 11(4). Ugander, J., Backstrom, L., Marlow, C., & Kleinberg, J. (2012). 36 Structural diversity in social contagion. PNAS, 109(16), 5962- 5966. Wang, W., Shu, P., Zhu, Y. X., Tang, M., & Zhang, Y. C. (2015a). Dynamics of social contagions with limited contact capacity. Chaos, 25(10), 103102. Wang, W., Tang, M., Zhang, H. F., & Lai, Y. C. (2015b). Dynamics of social contagions with memory of nonredundant infor- mation. Phys Rev E Stat Nonlin Soft Matter Phys, 92(1), 012820. Watts, D. J., & Strogatz, S.H. (1998). Collective dynamics of 'small- world' networks. Nature, 393(6684), 440-442. Weng, L., Menczer, F., & Ahn, Y. Y. (2013). Virality prediction and community structure in social networks. Scientific Reports, 3, 2522. Wu, S., Tan, C., Kleinberg, J., & Macy, M. (2011). Does bad news go away faster? Fifth international AAAI conference on web- logs and social media, ICWSM. AAAI. Yağan, O. & Gligor, V. (2012) Analysis of complex contagions in ran- dom multiplex networks. Phys. Rev. E, 86, 036103. Yasseri, T., Hale, S., & Margetts, H. (2014). Modeling the rise in In- ternet-based petitions. arXiv. https://arxiv.org/abs/1308.0239 Zhang, J., Brackbill, D., Yang, S., Becker, J., Herbert, N., & Centola, D. (2016). Support or competition? How online social net- works increase physical activity: A randomized controlled trial. Prev Med Rep, 4, 453-458. Zhao, J. H., Zhou, H. J., & Liu, Y. Y. (2013). Inducing effect on the percolation transition in complex networks. Nat Commun, 4, 2412.
1204.3682
1
1204
2012-04-17T01:33:13
Leading the Collective: Social Capital and the Development of Leaders in Core-Periphery Organizations
[ "cs.SI", "physics.soc-ph" ]
Wikipedia and open source software projects have been cited as canonical examples of collectively intelligent organizations. Both organizations rely on large crowds of contributors to create knowledge goods. The crowds that emerge in both cases are not flat, but form a core-periphery network in which a few leaders contribute a large portion of the production and coordination work. This paper explores the social network processes by which leaders emerge from crowd-based organizations.
cs.SI
cs
PROCEEDINGS, CI2012 LEADING THE COLLECTIVE: SOCIAL CAPITAL AND THE DEVELOPMENT OF LEADERS IN CORE-PERIPHERY ORGANIZATIONS Benjamin Collier Tepper School of Business Carnegie Mellon University 5000 Forbes Avenue Pittsburgh PA, 15206 e-mail: [email protected] ABSTRACT Wikipedia and open source software projects have been cited as canonical examples of collectively intelligent organizations. Both organizations rely on large crowds of contributors to create knowledge goods. The crowds that emerge in both cases are not flat, but form a core-periphery network in which a few leaders contribute a large portion of the production and coordination work. This paper explores the social network processes by which leaders emerge from crowd-based organizations. INTRODUCTION Wikipedia has often been cited as one of the canonical examples of a collectively intelligent organization. Much like open source software development, anyone may contribute to the project and the end product is a valuable resource created by a crowd of volunteers who are not paid directly by the organization. While it is true that "Wikipedia has been developed with almost no centralized control" (Malone & Raubacher, 2010, p. 21) in terms of formal hierarchical control mechanisms, a small core group of contributors to Wikipedia contribute a significant portion of the production and coordination work while a majority of contributors remain as peripheral participants (Kittur et al., 2007). Collectively intelligent crowd-based organizations such as open source software projects and Wikipedia may be thought to be flat, egalitarian, and self- organizing. However, research has examined a core group of leaders that emerge through formal election processes from the "crowd". Elected leaders in crowd-based organizations often provide centralized coordination of long-term objectives, mediate conflict within the organization, and develop formal organizational policy (O’Mahony and Ferraro, 2007; Dahlandar & O’Mahony, 2010). Robert Kraut Human-Computer Interaction Institute Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15206 [email protected] Without a formal hierarchical path or clear organizational roles, it is unclear how leaders emerge from the crowd of participants in core-periphery organizations. In Malone & Raubacher's (2010) work on the collective intelligence genome, the "crowd" gene and the "hierarchy or management" gene provide a framework to understand who should be performing organizational tasks. In the case of both Wikipedia and open source software projects, the hierarchy of leaders emerges from the crowd. In this study we examine the social processes by which leaders emerge from the crowd. We begin by briefly defining and discussing core- periphery organizations. We then move to develop insight into the impact social network connections have on developing leaders, and the role of weak, Implications simmelian strong, and for ties. understanding the emergence of leadership and hierarchy from crowds in collectively intelligent organizations are then discussed. CORE-PERIPHERY ORGANIZATIONS Drawing from Borgatti’s work on core-periphery networks, we propose a modified definition of a core- periphery organization as follows: a core-periphery organization entails a dense, cohesive core and a sparse, unconnected periphery (Borgatti, 2000). The definition is intuitive and broad enough to encompass a volunteer from core-periphery of range organizations, virtual organizations, and online production communities. Core-periphery network organizations commonly emerge from “crowd” based contribution systems, in which there are (1) low barriers to entry, (2) high variability in skill and time commitments, and (3) lack of predefined roles. SOCIAL CAPITAL AND LEADERSHIP The study of leadership has focused on a few key approaches: the behavioral approach, the power- influence approach, the situational approach, and the integrative approach (see Yukl 1989, 2002 for review). Recently there has been a call in the literature for a social capital approach to leadership (Brass and Krackhardt, 1999). Other approaches largely focus on what leaders do in isolation from their context, or how leaders interact with their individual followers. The social capital approach to leadership examines social network ties and explores the impact ties have on leadership development and leadership effectiveness. In contrast to human capital (traits, characteristics, behaviors, styles), social capital refers to relationships with other people, and the access to information, resources, and opportunities that come with those relationships (Burt, 1992; Coleman, 1988). DEVELOPING SOCIAL CAPITAL In core-periphery organizations, as in volunteer there are broadly organizations, levels of two membership: leaders and non-leaders (Heidrich, 1990; Catano et al., 2001). Given that there are two broad roles within core-periphery organizations, there are two major transitions that must occur: transition to the role of contributor and transition to the role of leader. The socialization and training processes for these two role transitions play a large part in how newcomers adjust to the role of volunteer, and veterans adjust to becoming a leader (Nicholson, 1984). Early ties to periphery In studies of both unions and volunteer organizations, early experiences in core-periphery organizations are shown to be especially important for socializing newcomers into the norms and values of the organization continued encouraging for and commitment to organizational activities (Fullagar et al., 1992, 1994, 1995). Lave and Wenger’s seminal work on legitimate peripheral participation (1991), provides evidence that socialization and situated learning in core-periphery organizations (communities of practice) primarily occurs not between peripheral members (apprentices) and core members (masters) but largely between peripheral members. That is, a newcomer’s relationships to others in the periphery provide a better experience to learn production work and the norms of the organization. [Even] where the relationship of the apprentice to master is specific and explicit, it is not this relationship, but rather the apprentice’s relations to other apprentices...that organize opportunities to learn; an apprentice’s own master is too distant, an object of too much respect to engage with in awkward attempts at new activity. -Lave and Wenger, 1991, p.92 In addition to motivational reasons for newcomers to learn about the organization and entry level tasks from other peers in the periphery, a significant body of educational research suggests experts may not be the most suitable teachers for novices. The “expert blind spot” problem in education refers to the problem that experts have in teaching and relating to novices (Nathan and Petrosino, 2003; Koedinger & Nathan, 1997; Koedinger et al., 2008). As individuals learn they move through the four stages: (1) unconscious incompetence, (2) conscious incompetence, (3) conscious competence, and (4) unconscious competence (Sprague and Stuart, 2003). Initially a novice is unaware and incompetent at a certain task or position. Then they slowly become aware of their incompetence, and move to a stage of competence in which they are aware of what they know and how they learned it. In the last stage an expert often becomes unaware of how they learned the intricate details of the knowledge of their craft despite their high level of competent (Ambrose et al., 2010). As an example, the best teacher for a ninth grade student in algebra may not be a research scientist in advanced mathematics. As an expert, a research scientist may not know a student’s developmental background and the appropriate pace for the student to learn. Often a better approach may be to have peers who have recently gone through algebra tutor the student since they still remember the principles that gave them difficulty and have a novice language appropriate for the student’s developmental stage. H1a: Ties developed early to the periphery will have a greater influence than early leadership ties on advancement to a leadership role Late ties to leaders As periphery members develop commitment and have entered more advanced stages in the organization, they confront a role transition into a leadership position (Heidrich, 1990). Current leaders in any organization have a very limited amount of time and resources available to make connections with others and developing one-on-one relationships within the organization (Cross and Thomas, 2011). Leaders must be strategic about who they are investing time in and mentoring. Core-periphery organizations are bottom heavy in the sense that a vast majority of the members are only moderately involved in contributing, so leaders must be particular and time mentoring and their invest coaching with those who have paid their dues to the organization. In previous research on core-periphery organizations, studies have found that early on members focus on production level tasks and later develop communication and organizational building activities (O’Mahony and Ferraro, 2007; Dahlander and O’Mahony, 2010). In communities of practice, before a peripheral member can become a legitimate tradesperson a “master” must sponsor an “apprentice”. Similarly sponsorship from current organizational leaders plays a large role not only in mentoring and providing support but also in legitimizing a candidate for promotion to the rest of their colleagues (Brass and Krackhardt, 1999; Ng et al., 2005). This sponsorship and legitimizing process works most effectively when the newcomer has paid their dues to the organization and is ready to be considered for a leadership position. Additionally, ties to leaders later on in organizational tenure can signal promise and provide mentoring and access to one's network (Kilduff & Krackhardt, 1994; Brass & Krackhardt, 1999). H1b: Ties developed to leaders later will have a greater influence than later periphery ties on advancement to a leadership role. WEAK, STRONG, AND SIMMELIAN TIES All social ties between people are not equal. Strong ties are most often thought of as friendships or close professional relationships, while weak ties are a more loose connection such as an acquaintance. Simmelian ties go beyond strength and are defined as a triad (or more) of strong ties in a group (Krackhardt, 1999; Krackhardt, 2002). For example, if Irene has a strong tie to Jerry, and both Irene and Jerry have a strong tie to Kyle, the tie would be considered a simmelian tie. Weak ties provide diverse access to information and organizational awareness (Granovetter, 1973). The cost of creating a weak tie is much lower than creating a strong tie in terms of time and resources, and thus people generally have many more weak ties than strong ties. People are more likely to find out information about job openings from weak ties, and information flow in weak ties is more novel, divergent, and non-redundant than strong ties. Strong ties have been found to induce commitment, provide mentoring, and elicit trust (Kilduff and Krackhardt, 1994). One’s attitudes, opinions, and beliefs are more likely to be affected through strong ties than through weak ties (Krackhardt, 1999). In terms of transferring knowledge and organizational culture between individuals, strong ties have been shown to be more effective at transferring knowledge that is difficult to codify and explain in a short period of time (Hanson, 1999). Simmel importance of the (1950) emphasized moving beyond dyadic ties to examine ties embedded within triads. Research has confirmed Simmel’s work and found that social ties embedded within triads are more stable over time, stronger, more durable, and exert more pressure to conform (Krackhardt, 1998). Weak ties to periphery Leaders in the context of core-periphery organizations coordinate and manage a large body of peripheral contributors who have a high turnover and may only occasionally show up to contribute (Crowston & Howison, 2006; Pearce 1980; Pearce 1993). Learning to manage and interact with peripheral members of the organization is a key component of leadership in this context. Weak ties to peripheral members of the organization as one progresses towards a leadership positions both enable potential leaders to learn to coordinate with and manage other peripheral members and provides potential leaders with access to a diverse pool of organizational knowledge. Short, infrequent interactions with peripheral members costs relatively little time and provides access to novel information (Granovetter, 1973; Burt, 1992). Weak ties to leaders by contrast are not as likely to give as wide of a view of the organization as weak ties to the periphery. Leaders are often well connected with each other in the core and interactions with leaders may not have as much to offer in terms of interactions with to manage short learning members of the periphery. H2a: Weak ties to the periphery will have a greater influence on advancement to leadership than weak ties to leaders. Strong and simmelian ties to leaders As leaders develop in core-periphery organizations once they have adjusted to the organization and developed a threshold level of commitment the next role transition into a leadership position greatly benefits from public sponsorship and mentoring from current leaders (Lave and Wenger, 1991). The most effective ties for mentoring, coaching, and sponsorship are strong, stable, and embedded within a community of current leaders (Krackhardt, 1992; Krackhardt, 1999). The social and political skills for leadership are not easily transferred and written down, and research has shown this type of tacit knowledge is best transferred through strong ties ties and Moreover, strong (Hanson, 1999). interaction with veteran leaders is the principal means by which potential leaders absorb the subtleties of organizational culture and climate of leadership (Schein, 1979; Buchanan, 1974). Since simmelian ties provide even stronger relationships than strong ties, we hypothesize simmelian ties with current leaders will be the most beneficial for developing potential leaders in core-periphery organizations. H2b: Strong ties to leaders will have a greater influence on advancement to leadership than strong ties to the periphery. H2c: Simmelian ties to leaders will have a greater influence on advancement to leadership than simmelian ties to the periphery. RESEARCH CONTEXT Wikipedia source, online large, open a is encyclopedia written and edited by volunteers. As of March 2011 over 90,000 regular editors have contributed over 8 million articles to the English version alone. Wikipedia has been in the top ten most visited sites on the internet for over six years, and a recent Pew Research study (2011) showed 53% of internet users go to it for information. Wikipedia is written and edited by volunteers and is not supervised by a professional staff. Wikipedia is structured as a model core-periphery organization in two ways. First, research on the distribution of work in Wikipedia has shown that a core of 2.5% of the contributors to Wikipedia produce over half of the edits to the content (Kittur et al, 2007). Second, Wikipedia has an official “Administrator” role that designates officially elected leaders while all other editors are in a flat organizational position. A small group of users titled “Administrators” hold a special place in the organization as leaders with a very public status and additional power in terms of technical abilities to edit the front page of Wikipedia and other sensitive content (Bryant et al, 2005; Burke and Kraut, 2008; Collier et al., 2008). Administrators are elected the position after accepting a to nomination from someone within the Wikipedia community, and undergo a seven-day vetting period in which their record is reviewed, they are asked interview-style questions, and voters publicly discuss the merits of the candidate for promotion. After the seven-day period, if the community has reached a consensus, the candidate is promoted to be an Administrator. The process for becoming an Administrator for is challenging in Wikipedia candidates, and only 56% of people nominated for the leadership position are promoted. METHODS Data for this study were collected for 2,442 candidates for Administrator positions in Wikipedia. Each candidate was nominated and accepted the nomination, but only 56% of candidates were promoted to leadership. The data range from 2004 to 2010, and include a complete contribution history for all candidates including all of the contributions they has made to improving articles, all of the discussion of articles they have contributed, policy development and administrative behaviors, and history of direct communications with other contributors. Social ties were measured as ties via user talk (direct communication) with other contributors within Wikipedia to either periphery members (non- Administrators) or leaders (Administrators). To get a measure of the change in social ties over time, candidates have their history broken up into three periods: early, middle, and late. Periods correspond to the number of months between the time they began contributing and the date they were considered for promotion. Within the analysis we control for both the number of months they have been active as well as the year they were considered for promotion. Ties are only considered if they are reciprocal. For communication to count as a tie, it must be a two- way conversation on user talk pages. We consider weak ties to be ties with less than six bidirectional communications within the given period which corresponds to 84% of the sample ties. The results and findings from this study are robust across using cutoff points at both four ties and eight ties. Strong ties by extension are any tie that has more than six bidirectional communications within the same time period. Ties are counted as a simmelian tie if the tie between the candidate for leadership and the target of the tie is a strong tie, and there is at least one other person who has a strong tie to both the candidate for leadership and the target of the tie. The outcome in our model is whether the candidate for leadership was successfully promoted to a leadership position. Since the outcome is binary (1=successful promotion, 0=unsuccessful promotion), the data will be analyzed using a Probit model (Wooldridge, 2002). RESULTS Our first hypothesis about the importance of early ties to the periphery shows moderate support. Early ties to leaders are not a significant predictor of becoming a leader, while early ties to the periphery develop a candidate for leadership. While the effect size is somewhat small (B=0.05, p=.003), it is a Table 1: Social Network Ties Predicting Promotion to Leadership Figure 1: H1a - Early Network Ties Figure 3: H1b - Late Network Ties Figure 5: H2b - Strong Network Ties Figure 2: Mid-Tenure Network Ties Figure 4: H2a - Weak Network Ties Figure 6: H2c - Simmelian Network Ties significant effect and with a high variance in number of weak ties it becomes quite noticeable in Figure 1. During the late period, shortly before candidates are considered for promotion, the target of the social ties clearly makes a large difference (Figure 3). In the late period, network ties to peripheral members is not a significant predictor of becoming a leader while ties to current leaders has a relatively large significant effect (B=0.178, p<.001). When examining weak, strong, and simmelian tie differences between leaders and peripheral members, we see a very clear difference. Weak ties to leaders and to peripheral members are both significant predictors of becoming a leader; however, we find that weak ties to the periphery have a larger impact on promotion (B=0.278, p<.001) than weak ties to leaders (B=0.212, p<.001). Weak ties provide a diversity of knowledge from peripheral members; in addition, they clearly provide a benefit perhaps in terms of being aware of the candidate or helping them in small ways to develop as a leader (Figure 4). Surprisingly we find that strong ties to either leaders or peripheral members do not improve a candidate’s probability of becoming a leader (Figure 5). We hypothesized that mentoring and tacit knowledge would be transferred through strong ties, but in this context that does not seem to be the case. However, we see a very large positive effect for simmelian ties to leaders helping candidates become a leader (Figure 6). In this case despite prior research showing that strong ties are key in mentoring and leadership development, we find that strong ties may not always be enough. Simmelian ties are indeed strong ties, but they are strong ties embedded within a group of three or more. One of the most important factors we find is that simmelian ties to leaders (B=0.223, p=.018) are not only more important than simmelian ties to the periphery (B=0.054, p=.241), but are significantly more important that strong ties to leaders. DISCUSSION Clearly the in leaders do not simply “arrive” collectively intelligent crowds, they are made and developed over time. Commitment, socialization, and mentoring processes that are key to developing potential leaders happen in a social context. By examining the social network of contributors over time, we find clear differences in the impact of social networks have on leadership. Early in a member’s life we showed that ties to periphery members are important and help develop a broader picture of the organization and develop the skill sets necessary for a leadership position. Leaders in core-periphery organizations spend a significant amount of time peripheral interacting with and coordinating members, and these experiences early on help contributors develop into leaders. Similarly, we find leaders and periphery ties that weak to both encourage leadership development. Leadership development programs, such as the one at General Electric, emphasize six-month rotations in various areas of the business in an array of geographic locations. This type of program is likely to expose potential leaders to a wide variety of social contacts for brief periods of time to developer their weak tie network (H1b) early in their career (H1a). This strategy seems to be effective in developing leaders in core-periphery organizations as well. To develop leaders in traditional organizations it may seem intuitive to pair new entrants with current leaders. However, this study suggests that in collectively intelligent crowds, new entrants to the organization are best socialized by other entry level or non-leadership members. When considering work done on situated learning and legitimate peripheral participation, this finding lines up with Lave and Wenger’s (1991) observations in trade organizations. Early on apprentices largely learn from other apprentices. As organizational members spend more time in the organization and develop the rudimentary skills and begin to adapt to the culture, current leaders can play a large role in helping them transition into a more central leadership position. However, our findings suggest that when considering a mentoring or relational program to pair leaders with non-leaders, one should consider using small groups of strong ties to best develop leaders. Strong ties, in our context and perhaps in the context of other core- periphery organizations, did not play a role in developing leaders; rather, simmelian ties to leaders embedded in groups showed significant potential for impacting the development of future leaders. More broadly, while a significant portion of leadership development research focuses on developing leadership skills and selecting people with certain personality traits (Day, 2001), more attention should be given to the social capital of emerging social networks of The leaders. organizational members over time ultimately play a large role in helping newcomers develop into organizational leaders. Social network connections play a different role over time depending on the tenure of the individual in the organizations (Brass and Krackhardt, 1999). This study provides theory and evidence to suggest that both individuals seeking to be leaders and organizations seeking to develop leaders from within may benefit from understanding the underlying social networks in the organization. ACKNOWLEDGEMENTS We would like to thank Denise Rousseau, Anita Woolley, and Brandy Aven for feedback and assistance. This project was supported by NSF IIS- 0963451 and NSF OC10943148. REFERENCES Borgatti, S. (2000). Models of core/periphery structures. Social Networks, 21(4), 375-395. Brass, D., & Krackhardt, D. (1999). The social capital of twenty-first century leaders. In J. G. Hunt & R. L. Phillips (Eds.), Out-of-the Box Leadership Challenges for the 21st Century Army (pp. 179-194). Bryant, S. L., Forte, A., & Bruckman, A. (2005). Becoming Wikipedian!: Transformation of Participation a Collaborative Online in Encyclopedia. GROUP. Sanibel Island, Florida. Buchanan, B. (1974). Building organizational commitment: The socialization of managers in work organizations. Administrative Science Quarterly, 19, 533-546. Burke, M., & Kraut, R. (2008). Mopping Up: Modeling Wikipedia Promotion Decisions. Computer Supported Cooperative Work. San Diego, California: ACM. Burt, R. (1992). Structural Holes: The Social Science of Competition. Cambridge, MA: Harvard University Press. Catano, V. M., Pond, M., & Kelloway, E. K. (2001). Exploring commitment and leadership in volunteer organizations. Leadership & Organization Development Journal, 22(6), 256-263. Coleman, J. S. (1988). Social capital in the creation of human capital. American journal of sociology, 94(S1), 95. Collier, B., Burke, M., Kittur, N., & Kraut, R. (2008). Retrospective versus Prospective Evidence for Promotion: The Case of Wikipedia. Academy of Management Annual Meeting. Anaheim, CA. Cross, R., & Thomas, R. (2011). A smarter way to network. Harvard Business Review, 89(7-8), 149-53, 167. Crowston, K., & Howison, J. (2006). Core and Periphery in Free/Libre and Open Source Software Team Communications. Proceedings of the 39th Annual Hawaii International Conference on System Sciences. Kaua'i, Hawai. Dahlander, L., & O’Mahony, S. (2010). Progressing to the Center: Coordinating Project Work. Organization Science, (Arthur 1994), 1-19. Day, D. V. (2001). Leadership Development: A Review in Context. Leadership Quarterly, 11(4), 581-613. Fullagar, C., Clark, P., Gallagher, D., & Gordon, M. E. (1994). A model of the antecedents of early union commitment: the role of socialization experiences and steward characteristics. Journal of Organizational Behavior, 15, 517- 533. Fullagar, C., Gallagher, D., Gordon, M. E., & Clark, P. F. (1995). Impact of early socialization on union commitment and participation: a longitudinal study. Journal of Applied Psychology1, 80, 147-157. Fullagar, C., McCoy, D., & Shull, C. (1992). The socialization of union loyalty. Journal of Organizational Behavior1, 13, 13-26. Granovetter, M. S. (1973). The strength of weak ties. American Journal of Sociology, 78(6), 1360. UChicago Press. Hansen, M. (1999). The search-transfer problem: The role of weak ties in sharing knowledge across organizational subunits. Administrative Science Quarterly, 44(1), 82-112. Heidrich, K. W. (1990). Volunteers’ life-styles: market segmentation based on volunteers' role choices. Non-profit and Voluntary Sector Quarterly, 19, 21-31. Kilduff, M., & Krackhardt, D. (1994). Bringing the individual back in: A structural analysis of the internal labor market for reputation in organizations. Academy of Management Journal, 37, 87-108. Kittur, A., Chi, E., Pendleton, B. A., Suh, B., & Mytkowicz, T. (2007). Power of the Few vs. Wisdom of the Crowd: Wikipedia and the Rise of the Bourgeoisie. Alt. CHI. San Jose. Koedinger, K.R., & Nathan, M. J. (1997). Teachers’ notions of students' algebra problem-solving difficulties. Annual Meeting of the James S. McDonnel Foundation Program for Cognitive Studies for Educational Practice. Koedinger, K. R, Alibali, M. W., & Nathan, M. J. (2008). Trade-offs between grounded and abstract representations: evidence from algebra problem solving. Cognitive Science, 32(2), 366-97. Krackhardt, D. (1999). The ties that torture: Simmelian tie analysis in organizations. Research in the Sociology of Organizations, (16), 183-210. Krackhardt, D. (2002). Structure, culture and Simmelian ties in entrepreneurial firms. Social Networks, 24(3), 279-290. Krackhardt, D, & Hanson, J. R. (1993). Informal networks: the company behind the chart. Harvard Business Review, 71(4), 104-11. Lave, J., & Wenger, E. (1991). Situated Learning: Legitimate Peripheral Participation. New York, NY: Cambridge University Press. Malone, T. W., & Laubacher, R. (2010). The Collective Intelligence Genome. MIT Sloan Management Review, 51(3), 21-31. Nathan, M.J., & Petrosino, A. (2003). Expert blind spot among preservice teachers. American Educational Research Journal, 40(4), 905. Sage Publications. Ng, T. W. H., Eby, L. T., Sorenson, K. L., & Feldman, D. (2005). Predictors of Objective and Subjective Career Success: A Meta- Analysis. Personnel Psychology, 58(2), 367- 408. O’Mahony, S., & Ferraro, F. (2007). The Emergence of Governance in an Open Source Community. Academy of Management Journal, 50(5), 1079- 1106. Pearce, J. L. (1980). Apathy or Self Interest? The Volunteer’s Avoidance of Leadership Roles. Journal of Voluntary Action Research, 9, 85- 94. Pearce, J. L. (1993). Volunteers: The Organizational Behavior of Unpaid Workers. New York, NY: Routledge. Schein, E. H., Schneier, I., & Baruer, C. H. (1971). Occupational socialization in the professions: The case of the role innovator. Journal of Psychiatric Research, 8(521-530). Simmel, G. (1950). Individual and society. In K. . Wolff (Ed.), The Sociology of Georg Simmel. New York: Free Press. Sprague, J., & Stuart, D. (2003). The Speaker’s Handbook (6th ed.). Belmont, Ca: Wadsworth/Thompson Learning. Yukl, G. (1989). Managerial Leadership: A Review of Theory and Research. Journal of Management, 15(2), 251-289. Yukl, Gary. (2002). Leadership in organizations. Englewood Cliffs, NJ: Prentice-Hall.
1604.06260
1
1604
2016-04-21T11:23:00
The Dynamics of Initiative in Communication Networks
[ "cs.SI", "physics.soc-ph" ]
Human social interaction is often intermittent. Two acquainted persons can have extended periods without social interaction punctuated by periods of repeated interaction. In this case, the repeated interaction can be characterized by a seed initiative by either of the persons and a number of follow-up interactions. The tendency to initiate social interaction plays an important role in the formation of social networks and is in general not symmetric between persons. In this paper, we study the dynamics of initiative by analysing and modeling a detailed call and text message network sampled from a group of 700 individuals. We show that in an average relationship between two individuals, one part is almost twice as likely to initiate communication compared to the other part. The asymmetry has social consequences and ultimately might lead to the discontinuation of a relationship. We explain the observed asymmetry by a positive feedback mechanism where individuals already taking initiative are more likely to take initiative in the future. In general, people with many initiatives receive attention from a broader spectrum of friends than people with few initiatives. Lastly, we compare the likelihood of taking initiative with the basic personality traits of the five factor model.
cs.SI
cs
The Dynamics of Initiative in Communication Networks Anders Mollgaard, Joachim Mathiesen* University of Copenhagen, Niels Bohr Institute , 2100 Copenhagen, Denmark * [email protected] Abstract Human social interaction is often intermittent. Two acquainted persons can have extended periods without social interaction punctuated by periods of repeated interaction. In this case, the repeated interaction can be characterized by a seed initiative by either of the persons and a number of follow-up interactions. The tendency to initiate social interaction plays an important role in the formation of social networks and is in general not symmetric between persons. In this paper, we study the dynamics of initiative by analysing and modeling a detailed call and text message network sampled from a group of 700 individuals. We show that in an average relationship between two individuals, one part is almost twice as likely to initiate communication compared to the other part. The asymmetry has social consequences and ultimately might lead to the discontinuation of a relationship. We explain the observed asymmetry by a positive feedback mechanism where individuals already taking initiative are more likely to take initiative in the future. In general, people with many initiatives receive attention from a broader spectrum of friends than people with few initiatives. Lastly, we compare the likelihood of taking initiative with the basic personality traits of the five factor model. Introduction The digital recording of our social life including telecommunication and activity on the internet allows us to answer previously unanswered questions about human behavior. It is now possible to study the complex dynamics of social networks [1, 2] as well as their formation and stability [3 -- 7]. Here, we are particularly interested in the dynamics of initiative in social relations and how it might influence the formation of social networks. A high degree of asymmetry in relations is observed in phone call networks [8] simply by counting the number of calls going in each direction for all links over a period of time. In particular, it has been found that for 25% of the links, 80% or more of the calls in a relationship come from one part alone. Also, it has been shown that this asymmetry cannot be explained by personal differences in call frequency. In general, it is possible to take initiative through various modes of interaction, e.g. by face-to-face meetings, which might result in a later call by phone or a text message. The fact that communication happens in different ways might lead to spurious estimates of the asymmetry in relations, when computed from a single mode of communication. Here we consider communication in two channels, phone calls and text messages, in a detailed data set sampled from 700 individuals. The data is collected from smartphones distributed to students at the Technical University of Denmark and includes information about communication both inside and outside the group of students. The data is recorded over a period of 83 weeks and consists of 32412 links based on 972592 1/9 calls and 3949710 text messages. Smartphones have previously been used to infer 95% of self-reported friendships based on communication and proximity [9]. In addition to this, mobile phones have been used in several studies on human behavior [10, 11] including communication dynamics [12], mobility [13], and personality [14, 15]. In the following, we introduce a parameter describing asymmetry in social relations. From a statistical model that takes into account the sampling error on individual links, we will compute the most probable distribution of the asymmetry parameter. We further consider the dynamics of initiative by analysing the implications and causation of asymmetry in relations. Results Definition of initiative. Not all phone calls and text messages represent an initiative, since many of them are responses to previous communication. For example, a call may not be picked up, but will anyway result in a later answer by the called part. Likewise, most text messages will be part of an on-going communication. In order to distinguish initiative from follow-up communication, we need to define a time scale that separates the two. In Fig. 1, we show the distribution of times between communication events over all relations in the data set. The time axis spans from one minute to one week and the distribution follows a power law with an exponent of α = −1.26. The oscillations at large time scales are due to the circadian rhythm and there is a local peak at precisely 3 hours, which is possibly due to the electronic response of an app installed on a number of the smartphones in the study. The observed power law is in line with previous results for inter-event times of human communication [16 -- 20] and other human activity [19, 21]. Unfortunately this also means that there is no natural time scale to separate initiative from follow-up communication. Nonetheless, in this analysis, we have chosen to make a cut between follow-up interaction and initiative at 24 hours. Most on-going telephone communication has inter-event times below this scale (88 % of all inter-event times), such that the expected rate of false positives for initiatives will be rather low. We therefore define an initiative to be a communication event that is separated from a prior communication on the same link by more than 24 hours. Communication separated by a shorter time is considered to be follow-up. Model. In the following, we compute the maximum-likelihood estimate of the asymmetry distribution for relationships based on a statistical model. The relationship between two persons, A and B, consists of a series of initiatives. For simplicity, we shall assume that the probability for an initiative to be taken by person A, γA, is constant over time. The corresponding probability for B is then γB = 1 − γA. We introduce µ ≡ min (γA, γB) ≤ 0.5, as a measure of the asymmetry in a relationship. µ = 0.5 represents a fully symmetric relation with respect to initiatives, while µ = 0 represents a fully asymmetric one. In the following, we will estimate the distribution of µ across relationships in the full social network, which we shall denote F (µ). While we cannot compute the true distribution, we shall compute the maximum-likelihood distribution, FML (µ), based on the above assumptions. Our data consists of a call and text message network of participants in the study and external people that the participants have communicated with. The M observed links in the network form a set, D = {Xii = 1, ..., M}, where i enumerates each link. The links Xi ≡ (nA,i, nB,i) are characterized by the number of initiatives from person A (nA,i) and B (nB,i), respectively, and we define NAB,i = nA,i + nB,i. Invoking Bayes' theorem we get 2/9 Figure 1. Interevent distribution. Log-log plot of the distribution of waiting times between communication events including both calls and text messages. Also shown is a power law with an exponent of α = −1.26, which fits the distribution all the way from one minute to one week. The power law nature of the distribution suggests that there is no natural time scale to separate initiatives from follow-up communication. The local peak at 3 hours is possibly the electronic response of an app and the oscillations at large inter event times correspond to circadian cycles. P (FD) = P (DF ) P (F ) , (cid:89) P (D) ∝ P (DF ) , = P (XiF ) . i For simplicity, we have here assumed a constant prior over F along with statistical independence of the relationships. The normalization P (D) is ignored, since it is a constant with respect to variation in F . The least initiative taking person could be person A or person B, we must therefore integrate over both possibilities. Let us denote the least initiative taking person by Y . The likelihood factor associated with a link (nA,i, nB,i) given µ and Y may then be calculated using the binomial distribution (cid:90) (cid:88) (cid:88) Y ∈{A,B} P (XiF ) = = P (XiY, µ) P (Y ) F (µ) dµ, (cid:90) 1 2 (cid:18)Ni (cid:19) i (1 − µ)Ni−ni · 1 µn 2 · F (µ) dµ. ni∈{nA,i,nB,i} 0 ni Here we sum over Y (or equivalently n) giving each of the two possibilities a prior of a 1/2 and likewise integrate over µ giving each value a prior of F (µ). We shall now find the distribution FML (µ) that maximizes the likelihood function P (DF ), or equivalently, the log-likelihood log P (DF ). We do this numerically using sequential least squares programming [22], which handles both constraints and bounds. In our statistical model, we discretize the initiative parameter µ → µj and thereby we also discretize the distribution F (µ) → Fj. 3/9 j Fj = 1 and the bounds 0 ≤ Fj ≤ 1 are introduced. We initialize Fj according to the distribution of nA,i/Ni restricted to Ni > 20 and let the sequential least squares estimation run until convergence. The analytic expression for the gradient is calculated and used in the optimization, and for N > 100, we approximate the binomial distribution by the normal distribution in order to handle the product between (cid:1) and the very small µn i (1 − µ)Ni−ni . The constraint(cid:80) the very large(cid:0)Ni ni In order to test the robustness and convergence of our estimates, we have created 100 synthetic data sets in the following way. We keep the number of links identical to the original data set. Similarly, we keep the total number of initiatives, NAB,i, on each link, Xi, the same, but we disregard the direction of the initiatives. For each link, we then draw a µ from the distribution FML(µ), which is then used in a stochastic simulation of the direction of the NAB,i initiatives. From the synthetics data set, we then make a maximum likelihood estimate estimate, FML(µ) of the underlying distribution FML(µ). In Fig. 2, we show the max likelihood distribution of µ obtained for the real data set (full), along with the average distribution obtained for the synthetic data sets (dashed). Also shown is the spread in the results of the synthetic data sets. Note that our estimate of the underlying distribution is unbiased (the synthetic and real data overlap). We observe that the distribution is bimodal with 23 percent of the links being fully asymmetric, i.e. µ being very small. We suspect that many of these relations are of a less social character, e.g. automatic text-message updates from service providers. For this reason, we restrict our analysis to reciprocal relations only in the following sections, i.e. relations with at least one initiative in both directions. For the full distribution, the average µ is 0.282 ± 0.001, but if we exclude the potentially non-social links at µ = 0, then we get an average of 0.359 ± 0.001. The errors correspond to those associated with the error of the mean in the simulated data sets. We conclude that in an average relation, one of the persons will be almost twice as likely as the other to initiate communication. Dynamics of relationships. In the above we considered relationships from a static point of view and assumed that the probability parameter was constant in time. Here we acknowledge that the history of a relationship may have an impact on future communication. In particular, we study the effects of "initiative length". To explain this term, we consider the following initiative history between person A and person B: [. . . , B, A, A, A]. The current initiative length is 3, because person A has taken 3 consecutive initiatives, since the last initiative taken by person B. In other words, the initiative length denotes the number of consecutive initiatives taken, since the last change of "direction" in initiative. As the initiative length grows, i.e. as either person A or person B keeps approaching the other without a turn of initiative, we expect that the relationship becomes more fragile and possibly comes to an end . Discontinued relationships are difficult to identify in the data, since they might be resumed subsequent to the data recording. Instead, we look for relationships that have been inactive for a very long time. In particular, we consider the relationship between person A and person B to be discontinued, if the following is true: person A has taken a total number of initiatives with other individuals, not including B, which is 10 times larger, than the average number of initiatives previously separating interaction between A and B. In Fig. 3A we show the probability of a relationship ending as a function of the initiative length. We find that the probability generally increases as the initiative length grows towards 10. This is in line with previous research [12], which has shown that reciprocity is important to link persistence. For initiative lengths greater than 12, the probability drops back again; possibly because this involves only the most dedicated relations, e.g. close relatives. In general, we find among all relations that the average initiative length prior to the discontinuation of a relation is 3.2 (which in a jargon could 4/9 be named the "ghosting factor"). Note that, for better statistics, we have restricted the analysis to relations with at least 15 initiatives. In Fig. 3B, we show that the probability for the initiative in a relationship to change from one part to the other as function of the initiative length. The plot is based on the statistics of all relationships. When person A has taken a single initiative in a relationship between A and B there is a 50% chance that the next initiative is taken by B. However, as the number of consecutive initiatives taken by A increases, the probability for B to take the next initiative drops exponentially. A least square exponential fit yields the relation y = 0.51 · 0.92x, which says that the chance of the initiative changing direction drops by 8% each time you make an initiative. In other words, the direction of an initiative seems to have a self-amplifying effect, which promotes the role of an initiator. This mechanism provides a possible explanation for the persistent asymmetry observed in the data. Figure 2. Asymmetry in relations. We show the max likelihood distribution of the initiative parameter across relationships. Here µ = 0.5 corresponding to a fully symmetric relationship, while µ = 0 is a fully asymmetric one. The full line corresponds to the max likelihood distribution as it is derived from the data. We also test the method for bias and uncertainty by applying it to synthetic data sets. The dashed line correspond to the average estimate among the synthetic data sets, and the error bars correspond to the spread in these estimates. We suspect that many of the highly asymmetric relations at µ = 0 are of non-social character. Dynamics of individuals. Here we turn to the initiative statistics of a person rather than a relationship. We suspect that people, likely to take many initiatives, are more likely to make friends, and, as the above results suggest, they are also more likely to keep them. Again we start by deriving the population statistics of the initiative parameter µp, only this time it characterizes a person instead of a link and it runs from 0 to 1. The parameter measures the probability that an initiative involving person i is taken by i rather than one of her/his friends. Each person is characterized by the number of in- and outgoing initiatives across all her/his relations. The analysis follows the same steps as above, but without the sum over Y and with the integral over µp running from 0 to 1. The obtained maximum-likelihood distribution for the µp parameter is shown in Fig. 4A. The distribution is a little biased towards low initiative with a mean of 0.469 ± 0.003, possibly because students are more likely to be called by their parents than the other way around. The spread of the distribution is 0.082 ± 0.002, but this estimate is probably slightly biased towards 0, due to the fully asymmetric links being neglected. This is obvious from the spread of the reference distributions (again computed from synthetic data), which is 4% lower than the spread of the 5/9 Figure 3. Initiative dynamics. In (A) we show the probability of a relationship ending after a given initiative length. Here "initiative length" denotes the number of consecutive one sided initiatives. Note that relationships are more likely to end after several one-sided initiatives, although the probability drops back again for very large (13+) initiative lengths. In (B) we show the probability of the initiative changing direction as a function of the initiative length. We see that the probability drops exponentially as the number of one sided initiatives in a row is increased. This suggests that initiatives promotes the role of an initiator through a positive feedback. distribution from which it was simulated. In general, the few percent with the very lowest µ only take the initiative 25% of the time, whereas in the other end, we find individuals which take initiative in 70% of the cases. Next we look at the social consequences of µp; specifically we wish to quantify the impact of a person's initiative on his abundance of friends. Since communication has been recorded for varying lengths of periods, we cannot simply count the number of contacts. Instead we count the average number of unique friends among all groups of 20 consecutive incoming initiatives. In principle, all 20 initiatives could be attributed to a single person in which case we count just 1 unique friend among the 20 initiatives. The other end of the scale corresponds to the 20 initiatives being attributed to 20 different people, i.e. 20 unique friends. If one counts many unique individuals among person A's incoming initiatives, it is an indication that many different people take an interest in her/him. The µp parameter of a person is estimated from the number of outgoing initiatives relative to the total number of initiatives. A scatter plot of the two quantities is shown in Fig. 4B and we find a correlation between the two numbers of 0.35 ± 0.04. The mean value of a binning along the horizontal axis is also shown in the plot. The mean shows a clear trend: more personal initiative implies more interest from friends. In particular, the number of unique friends among 20 incoming initiatives jumps from 8 to 12 as we move from low to high personal initiative. Note that, for better statistics, this analysis has been restricted to individuals involved in at least 200 initiatives. Finally we compare the likelihood of taking initiative with basic personality traits. The participants in the study have filled questionnaires providing information about the Big Five personality traits [23]. We have then performed a linear correlation between the initiative parameter and the personality scores for each individual. We find the following correlation coefficients for the traits with errors given as one standard deviation, agreeableness (0.02 ± 0.12 ), conscientiousness (0.13 ± 0.10), extraversion (0.26±0.06), neuroticism (0.11±0.07) and openness (0.07±0.08). The trait with the highest correlation coefficient is perhaps not surprisingly extraversion. In general, people with high extraversion scores are described to be outgoing and have a high degree of sociability. 6/9 Figure 4. Initiative statistics of individuals. In (A) we show the maximum-likelihood distribution of the personal initiative parameter µp, where µp is the probability that an initiative involving person A is attributed to him rather than to his friends. We note that µp varies a lot over the population; some people making only 25% of the initiatives themselves against 70% at the other end of the spectrum. This has social consequences. In (B) we have estimated µp and plotted it against the "friend abundance" for the full population. Friend abundance is estimated as the average number of unique friends among all consecutive combinations of 20 incoming initiatives. We find that people with large µp are rewarded by increased attention from their network. Discussion The individual initiative for social interaction is an important factor in the formation and stability of social networks. Here we have applied a statistical model to derive the distribution of an initiative parameter in the social network of 700 individuals. In an average relationship, we find that one part will take initiative only 36% of the time whereas the other part will take initiative the remaining 64%, i.e. one part is in general twice as likely to take initiative as the other. These numbers represent a considerable asymmetry among the bulk of all relationships. We find that relationships are more likely to end after large initiative lengths, although it drops back again around 13 consecutive initiatives by one part. Despite the possible implications for the stability of a relationship, we observe no change in behavior to reduce the asymmetry. On the contrary, we find that the initiative bias is self-amplifying; i.e. the probability of an initiative changing side drops exponentially as a function of initiative length. The self-amplification provides a possible mechanism behind the observed asymmetry by promoting the role of an initiator over the history of a relationship. We also derive the distribution of the initiative probability for individuals against all of their friends. Our population is found to be a little biased towards low initiative, with a mean value of 0.47 and a spread of 0.08. We show that persons with great personal initiative are rewarded by a greater abundance of incoming initiatives. This suggests that the gain of taking initiative, e.g. making more friends and keeping them, is greater than the cost of being initiator. We also find that people taking many initiatives score higher on extraversion in personality tests. People interact socially in many ways and since our data is restricted to telephone communication, we neglect initiatives made face-to-face and through online platforms. This might bias our results somewhat toward asymmetric relations. It would be interesting to explore further the effects of initiative in temporal networks. Our results indicate that nodes have different probabilities of activating their links. This has an effect on information spreading, since information will be quickly 7/9 shared by some nodes, while others partly work as dead ends. Finally, initiatives are important in making new contacts and in keeping them, thereby being an important factor in network formation. Acknowledgements The study received funding through the UCPH 2016 Excellence Programme for Interdisciplinary Research. Methods This study was reviewed and approved by the appropriate Danish authority, the Danish Data Protection Agency (Reference number: 2012-41-0664). The Data Protection Agency guarantees that the project abides by Danish law and also considers potential ethical implications. All subjects in the study gave written informed consent. Supporting Information S1 Text Description of data. Short description of data used in the manuscript. S2 Text Data file. Data on initiatives of individuals included in the study. References 1. Holme P, Saramaki J. Temporal networks. Physics reports. 2012;519(3):97 -- 125. 2. Karsai M, Kivela M, Pan RK, Kaski K, Kert´esz J, Barab´asi AL, et al. Small but slow world: How network topology and burstiness slow down spreading. Physical Review E. 2011;83(2):025102. 3. Albert R, Barab´asi AL. Statistical mechanics of complex networks. Reviews of modern physics. 2002;74(1):47. 4. Newman ME. The structure and function of complex networks. SIAM review. 2003;45(2):167 -- 256. 5. Kossinets G, Watts DJ. Empirical analysis of an evolving social network. Science. 2006;311(5757):88 -- 90. 6. Oh W, Jeon S. Membership herding and network stability in the open source community: The Ising perspective. Management science. 2007;53(7):1086 -- 1101. 7. Barab´asi AL, Albert R. Emergence of scaling in random networks. science. 1999;286(5439):509 -- 512. 8. Kovanen L, Saramaki J, Kaski K. Reciprocity of mobile phone calls. Dynamics of Socio-Economic Systems. 2011;2(2):138 -- 151. 8/9 9. Eagle N, Pentland AS, Lazer D. Inferring friendship network structure by using mobile phone data. Proceedings of the National Academy of Sciences. 2009;106(36):15274 -- 15278. 10. Lane ND, Miluzzo E, Lu H, Peebles D, Choudhury T, Campbell AT. A survey of mobile phone sensing. Communications Magazine, IEEE. 2010;48(9):140 -- 150. 11. Stopczynski A, Sekara V, Sapiezynski P, Cuttone A, Madsen MM, Larsen JE, et al. Measuring large-scale social networks with high resolution. PloS one. 2014;9(4):e95978. 12. Hidalgo CA, Rodriguez-Sickert C. The dynamics of a mobile phone network. Physica A: Statistical Mechanics and its Applications. 2008;387(12):3017 -- 3024. 13. Song C, Qu Z, Blumm N, Barab´asi AL. Limits of predictability in human mobility. Science. 2010;327(5968):1018 -- 1021. 14. de Montjoye YA, Quoidbach J, Robic F, Pentland AS. Predicting personality using novel mobile phone-based metrics. In: Social computing, behavioral-cultural modeling and prediction. Springer; 2013. p. 48 -- 55. 15. Mollgaard A, Zettler I, Dammeyer J, Jensen MH, Lehmann S, Mathiesen J. Extended Similarity Metric for Weighted Heterogeneous Networks. submitted. 2016;. 16. Barabasi AL. The origin of bursts and heavy tails in human dynamics. Nature. 2005;435(7039):207 -- 211. 17. Malmgren RD, Stouffer DB, Motter AE, Amaral LA. A Poissonian explanation for heavy tails in e-mail communication. Proceedings of the National Academy of Sciences. 2008;105(47):18153 -- 18158. 18. Vazquez A. Impact of memory on human dynamics. Physica A: Statistical Mechanics and its Applications. 2007;373:747 -- 752. 19. Stouffer DB, Malmgren RD, Amaral LA. Log-normal statistics in e-mail communication patterns. arXiv preprint physics/0605027. 2006;. 20. Nakamura T, Kiyono K, Yoshiuchi K, Nakahara R, Struzik ZR, Yamamoto Y. Universal scaling law in human behavioral organization. Physical review letters. 2007;99(13):138103. 21. Johansen A, Sornette D. Download relaxation dynamics on the WWW following newspaper publication of URL. Physica A: Statistical Mechanics and its Applications. 2000;276(1):338 -- 345. 22. Kraft D, et al. A software package for sequential quadratic programming. DFVLR Obersfaffeuhofen, Germany; 1988. 23. Digman J. Personality structure: Emergence of the five-factor model. Annual review of psychology. 1990;Available from: http://www.annualreviews.org/ doi/pdf/10.1146/annurev.ps.41.020190.002221. 9/9
1811.12162
1
1811
2018-10-31T13:32:22
Effective Resistance-based Germination of Seed Sets for Community Detection
[ "cs.SI", "cs.LG", "stat.ML" ]
Community detection is, at its core, an attempt to attach an interpretable function to an otherwise indecipherable form. The importance of labeling communities has obvious implications for identifying clusters in social networks, but it has a number of equally relevant applications in product recommendations, biological systems, and many forms of classification. The local variety of community detection starts with a small set of labeled seed nodes, and aims to estimate the community containing these nodes. One of the most ubiquitous methods - due to its simplicity and efficiency - is personalized PageRank. The most obvious bottleneck for deploying this form of PageRank successfully is the quality of the seeds. We introduce a "germination" stage for these seeds, where an effective resistance-based approach is used to increase the quality and number of seeds from which a community is detected. By breaking seed set expansion into a two-step process, we aim to utilize two distinct random walk-based approaches in the regimes in which they excel. In synthetic and real network data, a simple, greedy algorithm which minimizes the effective resistance diameter combined with PageRank achieves clear improvements in precision and recall over a standalone PageRank procedure.
cs.SI
cs
Effective Resistance-based Germination of Seed Sets for Community Detection Jonathan Eskreis-Winkler University of Chicago Risi Kondor University of Chicago Abstract Community detection is, at its core, an at- tempt to attach an interpretable function to an otherwise indecipherable form. The im- portance of labeling communities has obvi- ous implications for identifying clusters in so- cial networks, but it has a number of equally relevant applications in product recommen- dations, biological systems, and many forms of classification. The local variety of com- munity detection starts with a small set of labeled "seed nodes," and aims to estimate the community containing these nodes. One of the most ubiquitous methods - based on its simplicity and efficiency - is personalized PageRank. The most obvious bottleneck for deploying this form of PageRank successfully is the quality of the seeds. We introduce a "germination" stage for these seeds, where an effective resistance-based approach is used to increase the quality and number of seeds from which a community is detected. By breaking seed set expansion into a two-step process, we aim to utilize two distinct random walk- based approaches in the regimes in which they excel. In synthetic and real network data, a simple, greedy algorithm which min- imizes the effective resistance diameter com- bined with PageRank achieves clear improve- ments in precision and recall over a stan- dalone PageRank procedure. 1 INTRODUCTION Nascent abilities to collect progressively more massive amounts of data continually motivate new approaches Review pending to large-scale data analysis. Recognizing that many data collection pursuits involve unstructured data, and that the data collected is of a scale so large that it is infeasible for a human being to label training data with their associated classes, the fields of unsupervised learning and semi-supervised learning gain new im- portance (Zhou et al., 2017; Banerjee et al., 2017). We focus on a contemporary challenge in the class of community detection (CD) problems. The aim of CD is to leverage the known features of a complex sys- tem - namely its nodes and edges - to estimate unob- served functions, such as class labelings, on the net- work. The foundation of network analysis in general and CD in particular is that the nodes and edges of a graph convey valuable information, information that can be deployed for practical applications. In the last decade, the CD problem has motivated solutions in a constantly growing set of fields ripe for application (Gargi et al., 2011; Shai et al., 2017; Garcia et al., 2018). A proliferation of work in CD has given rise to the formulation of several distinct problems involving the detection of communities that have different starting assumptions and objectives. Namely, given a graph G = (V, E), one type of community detection aims to develop a full partition of the nodes V into non- overlapping groups (Andersen et al., 2006; Fortunato, 2010). Another type acknowledges that networks will not always admit partitions into disjoint subgraphs and so its objective is to detect possibly overlapping communities, maximizing graph coverage (Palla et al., 2005; Xie et al., 2013). A less ambitious type is the detection of a single community. This problem be- gins with a predefined set of seeds which are known to be members of the sought-after community (Mehler and Skiena, 2009; Yang and Leskovec, 2015; Hollocou et al., 2018; van Laarhoven, 2018). The term "seed set expansion" can refer to two scenar- ios. The first scenario is an unsupervised problem that demands a graph partition and might be addressed with a two-step algorithm: it would first identify ap- propriate seeds and then use them to extrapolate to- Effective Resistance-based Germination of Seed Sets for Community Detection wards a partition of the graph into possibly overlap- ping communities (Whang et al., 2013; Moradi et al., 2014). The second scenario is the detection of a com- munity around a predefined seed set and is equivalent to the "less ambitious" problem described above. In both scenarios a seed set is being expanded, but while the former is an unsupervised problem, the latter is semi-supervised. Our approach is addressing this last form of CD. In addition to the many forms of CD, the number of scoring functions by which these methods are evalu- ated has also grown rapidly. Central to any approach to CD is the specification of a scoring function to assess the degree to which community structure is present. The most popular and effective scoring functions are based either on maximizing triadic closures, i.e. the local clustering coefficient, or on minimizing conduc- tance (Yang and Leskovec, 2015). Our work focuses on improving the state of the art in CD for seed set expansion around a single node, or a small set of nodes. A dominant force in this problem setting is a CD-oriented version of PageRank deemed "personalized PageRank" (PPR). Whereas the original PageRank algorithm is a ranking of nodes' importance (using PageRank contributions) in a gen- eral graph, PPR focuses on ranking nodes with scores based on their proximity to a pre-defined seed set (Bahmani et al., 2010; Whang et al., 2013; Kloumann et al., 2017). Our contribution builds upon existing applications of PageRank by introducing an effective resistance-based germination stage before the propa- gation of PPR weights begins. Specifically, we propose a two-step approach using PPR on a vector which dis- tributes weight over a new, revised seed set. This set includes the original seed nodes, but it also adds a se- lection of nodes that are chosen to minimize the effec- tive resistance (ER) diameter of the revised seed set. The stopping rule for identifying the respective points at which the germination stage and PPR are stopped is based on community scoring functions. The remainder of the paper is organized as follows: in Section 2 we review the role that random walks play in the theoretical underpinnings of PageRank and ER. The manner in which these two measures of node sim- ilarity differ is illustrated and the rationale for valu- ing ER in CD is presented. In Section 3, we present the germination stage algorithm along with its time complexity. We also make explicit the connection be- tween our algorithm and minimizing the ER diame- ter. In Section 4, we provide synthetic and empirical data experiments to show the efficacy of our two-step approach in practice. We conclude in Section 5 by outlining the new ideas that this work motivates and anticipating developments in the near future for CD. 2 BACKGROUND 2.1 Conventions of Notation For simplicity, this paper considers undirected, un- weighted graphs G = (V, E). The number of nodes is V = n and the number of edges is E = m. If for an edge e ∈ E, it is the case that e = (u, v) for u, v ∈ V , then u, v, may be denoted as e+ and e− for efficiency. When indices of a vector v are denoted, the first through kth indices are v[1 : k] or the kth index is v[k]. 2.2 Problem Statement Given a seed set S ⊂ V and assuming some ground truth community C ⊂ V exists such that S ⊂ C, we are interested in estimating a community C ⊂ V , such that S ⊂ C and C minimizes a loss function measur- ing community structure. S may be a set of a single vertex in V or a collection of vertices. Whereas some CD scenarios, such as the "overlapping communities" problem, aim to achieve a high proportion of coverage on the entire network, the aim of this seed set expan- sion problem is to find a single high quality community subject only to the constraint that it cover the seeds. In this sense we are addressing a one-class classifica- tion problem. There are two components to addressing this prob- lem. The first is to define the objective function to be minimized which quantifies the quality of community structure. The second component is to achieve this minimum, or to approximately achieve it. Take for instance the scoring function fc : S ⊂ V → R which measures the conductance of a subgraph. The global objective function based on conductance is: C∗ = argminC⊂V fc(C) This problem is NP hard, and so we must find some other recourse towards identifying a viable solution. Thus begins the second component of CD, devising a procedure for actually finding a subgraph with strong community structure. 2.3 Random Walks and Community Detection Random walks on graphs are a fundamental key to un- derstanding the relatedness between vertices. In a net- work analysis setting, it is frequently assumed that be- sides the edge set there are no known vertex-associated features. So, we are left to assume that any nodes' in- terrelatedness is determined by whether they are edge- connected, if their shortest path distance is small, or if it is "easy" to travel from one node to another. This Jonathan Eskreis-Winkler, Risi Kondor underlies the popularity of random walk-based kernels in graph-based learning problems. It is natural to consider the wealth of information that random walks can provide for any problem in CD. In the absence of a single, agreed-upon definition for com- munity structure, the basic idea of "more relatedness inwards than outwards" aligns well with the fact that a random walk after k steps is more likely to be at any individual node in its community than it is to be at any node in any other community. There are sev- eral manners in which the role of random walks may be formalized. One popular example is based on the PageRank vector. It produces an estimate of the sta- tionary distribution of a random walk which starts at a set of chosen nodes. If there is truth to the idea that there is significantly more interrelatedness inside a community than at its boundary, then this PageR- ank vector should assign nodes inside the community higher scores than those which are outside of it. A dif- ferent formulation is the commute time Cvivj between two nodes. The random walk interpretation of this quantity is the expected amount of time for a random walk beginning at vi to arrive at vj and then return to vi. If at any stage of a random walk it is more likely for the walk to stay inside a community than move to a different one, then commute times within a commu- nity will typically be shorter than those which must cross the community boundary. 2.4 Personalized PageRank The PageRank algorithm was originally introduced as a means of providing rankings for the pages of the World Wide Web (Page et al., 1999). In the two decades since its introduction, it has evolved as a tech- nique for a wide set of problems in a number of ap- plied fields. The specific development we focus on here is personalized PageRank (PPR), a variant of the PageRank algorithm where the initial mass is fixed at a single node or subset of the nodes Vo ⊂ V (with zero mass elsewhere) (Fogaras et al., 2005; Kloumann et al., 2017). This translates to an initial zero vector x ∈ Rn, except that ∀k ∈ Vo, xk = 1Vo . The PPR vector is then calculated based on this initial state; the degree to which two nodes vi, vj (cid:54)∈ Vo are more or less similar to the seed set Vo is governed by means of their re- spective indices in the PageRank vector xvi , xvj . This method is equivalent to finding the steady state of a random walk with restarts whose mass is initially dis- tributed evenly at the set of nodes which comprise the seed set. Node v's score thus quantifies how likely it is that a random walk which starts at the seed set will end at node v. This procedure translates into a CD scheme when the indices of the PageRank contributions are listed in a vector xPageRank (after having listed the indices of the vertices in Vo) in the order of their score rank- ing (Andersen and Lang, 2006). The next step in relating this vector to a community is minimizing a scoring function f : W ⊂ V → R which mea- sures the strength of community structure. The cho- sen community is then xPageRank[1 : ko] where ko = argmin1≤k≤nf (xPageRank[1 : ko]). 2.5 Effective Resistance By interpreting a general graph as an electric network, one can study graph properties by considering how electricity flows throughout the network. All edges in the graph are considered resistors (in the case of an unweighted graph, they have equal resistance) and the relationship between the resistance of an edge re, the electric current over the edge fe, and the electric potential difference between the nodes connected by said edge ve+ − ve− are governed by Ohm's Law: fe = ve+ − ve− re That is, for a unit of current to flow across an edge, the potential difference at the edge's endpoints must be equal to the resistance. Summarized in matrix form, where p ∈ Rn is a vector of potential differences across edges and B ∈ {−1, 0, 1}m×n is an incidence matrix of G, the flow over every edge is f = Bp. A second property of an electric network is the flow conservation property. If a unit of electric current is sent from node a to b, then at any vertex v (cid:54)= a, b in the graph, the sum of the flow of all edges connected to v is 0. Summarized in matrix form, where δi is the Dirac delta function, BT f = δa − δb. Noting that BBT = LG, the graph Laplacian of G, and using Ohm's Law with the flow conservation property, we find that † BT Bp = LGp = δa − δb ⇐⇒ p = L G(δa − δb) This last formula provides a means of deducing the potential differences across all nodes for a given electric flow across the network. For a single unit of current to flow across an edge, the resistance of the edge must be matched by the potential difference of its endpoints. When the flow of δa − δb is realized on the edge set of G, both the potential difference between a and b and the associated effective resistance (ER) between a and b will be p[a] − p[b]; the ER of edge e is † G(δa − δb) ab = (δa − δb)T L reff Said in a different way, seeing a graph's edge set as a collection of resistors, if the resistors were replaced by a single resistor that acted indistinguishably from Effective Resistance-based Germination of Seed Sets for Community Detection the collection subject to any flow vector - in terms of the amount of current and potential difference between edge endpoints - the amount of resistance of said single resistor is reff ab . Although the ER does not only summa- rize the relationship between nodes that are connected by an edge, for the purposes of this investigation, it is only the ERs between nodes connected by an edge that will be used directly. Another useful property of ER in an unweighted graph is that the ER between any two nodes that are edge connected is exactly equal to the probability of those two nodes being edge connected in a random sample from the uniform spanning tree distribution of G. Un- fortunately, to reproduce the elegant demonstration of why this is the case would require prohibitively many lines of formulae. This fact in particular provides some useful intuition as to why the ER would be a helpful tool in CD. Suppose a graph has two distinct sub- graphs which are complete, but do not connect to each other except through a single edge. The ER of the edge which connects the two clusters will be very high (it will in fact be equal to one) because it is not possi- ble for a spanning tree of the graph to exist without including this edge. The ER of an edge between two nodes in the same cluster will be comparatively small, because there are a number of spanning trees of the graph that do not make use of this edge. The ER of edges is thus a reasonable means of detecting a graph cluster's boundary because the edges which traverse that boundary have higher ERs. One last popular per- spective of ER is that the expected number of steps of a random walk beginning at vi, reaching vj, and then ending at vi (commute distance Cvivj ) is proportional to the ER (with constant 2m). 2.6 Limitations of Effective Resistance dvi + 1 dvj While these facets of ER provide a solid grounding for using it as a tool to understand nodes' interrelat- edness, the behavior of ER described above does not necessary scale to large graphs. Specifically, it has been shown for classes of random geometric graphs - specifically kNN-graphs, -graphs, and Gaussian sim- ilarity graphs - that as the size of the graph n → ∞, Cvivj ≈ 1 , the sum of the inverse of their de- grees (Luxburg et al., 2010). Luxburg et al. (2010) describe in their paper "Getting Lost in Space" that as the graph size grows, the number of paths between any two nodes increases and a random walk will tend to "forget" where it began, ultimately depending only on the degrees of the points at which it starts and ends. This limitation has in fact motivated a num- ber of modified resistance-based graph distances that circumvent the scalability issue (Luxburg et al., 2010; Nguyen and Mamitsuka, 2016). ER's inability to scale + 1 dvj to large datasets carries two significant caveats involv- ing graph types and which scenarios the convergence to 1 is weakest. Regarding the first point, the dvi convergence results are proven only for graphs with a minimal degree that grows with the graph size. This is not an unreasonable assumption in kNN- or -graphs generated from data, but it is not an assumption that matches the properties of empirical networks. Sec- ondly, the limitations of ER as a graph distance met- ric are only shown to be problematic for summarizing global structure, such as for nodes that are not close in the shortest path distance. CD is primarily con- cerned with local properties of real-world graphs with strong power law distributions. Furthermore, the ERs that will be used in this study will concern only the ER between nodes that are edge connected, i.e. very local. 3 A TWO-STEP COMMUNITY DETECTION ALGORITHM FOR SEED SET EXPANSION While many algorithms will address an unsupervised CD problem by first establishing seeds and then prop- agating from those seeds, in the semi-supervised con- text, the seeds are provided a priori, and propagation from those seeds is what the community detector must accomplish. The algorithm we present here takes an alternative route. We introduce what we term a ger- mination stage. Just as the germination of a seed is its first step departing from seed form towards becom- ing a full-fledged plant, the germination of seed sets in CD converts the seed set into a more larger, more reliable set of nodes, from which a community may be cultivated. In this stage, the information contained in the initial seed set is culled and expanded - not to the expected community estimate, but to a richer seed set for the second stage of propagation. Our approach can be compared in spirit to optimization methods which provide a minimization algorithm with a "warm start." After this first stage we take the traditional route of propagation using personalized PageRank. Our moti- vation for splitting the CD procedure into these stages is based on the observation that the better the quality of the seeds used for propagation, the better the out- put. Basing the first stage of seed germination on ER is a deliberate choice based on the theoretical proper- ties of ER. Additionally, empirical evidence suggests that a greedy method using a resistance-based metric will initially choose community candidates at a lower false positive rate than those that would be chosen based on the PPR score vector. Jonathan Eskreis-Winkler, Risi Kondor 3.1 Finding the Set with Small Effective Resistance Diameter While the basic procedure of germinating a seed set and then propagating its information is quite gen- eral, we outline one specific implementation of this approach using the tools of ER and PageRank. The first step is to calculate pairwise ERs for every ele- ment of E. This can be done in two ways. The first is the inversion of the graph Laplacian. ER for any pair of nodes u, v ∈ V can be computed from the inverse Laplacian as uv = L† reff uu + L† vv − 2L† uv The second approach is to sample uniform spanning trees from the graph at hand. The ER of an edge can be estimated as the proportion of the finite sam- ple of spanning trees wherein said edge occurs. De- pending on the situation, one of these two approaches might be preferable. For sparse, diagonally domi- nant matrices, fast solvers exist which can find reff uv in O(cid:0)nlog(n)log(−1)(cid:1) where n is the number of nonzero entries and  is an accuracy level (Schaub et al., 2017). Spanning trees may be sampled (without any restric- tion on the type of graph) in O(n 5 3 m13) (Durfee et al., 2017). The practitioner should thus decide which ap- proach to use based upon the degree of sparsity, the re- quired accuracy, and the ease of implementation. Fur- thermore, we are intrigued by the possibility of sam- pling spanning trees in a more efficient manner that guarantees an approximate estimate of the ER with high probability. The outcome of these procedures will lead to an estimate of the ER for every edge that ap- pears in the graph (in the case of spanning trees) or for every pairwise relationship between nodes (in the case of graph Laplacian inversion). For the purposes of our algorithm, though, it is sufficient, even in the sec- ond approach, to store and use only the ERs between nodes that are connected by an edge in G. A greedy algorithm is then implemented to progres- sively grow the seed set with the objective of minimiz- ing the ER diameter at every stage. The specifics are found in Algorithm 1, where R denotes a sparse ma- trix containing ERs between nodes that are connected by an edge, seeds are the initial seeds provided, and f is a community structure scoring function, namely conductance. Two points in the algorithm must be clarified: the stopping condition, and the complexity of line 6. Re- garding the stopping function, we employ a proce- dure introduced by Yang et al. (2015) who conduct a "sweep" of the PageRank vector and calculate the successive conductances of larger and larger subgraphs around the seed nodes; they consider the points where local minima occur to be community candidates. Since Algorithm 1 Greedy Minimizer of ER Diameter 1: procedure GreedyMinimizer(R, seeds, f ) (cid:46) Produce a useful ordering of the elements of V w.r.t. seed nodes 2: 3: 4: 5: 6: 7: 8: 9: 10: 11: cur comm ← seeds unused ← V − seeds s = {} while len(unused) > 0 ∧ checkStop(s) do i = argmink∈unused (min(R[k, cur comm])) v = unused[i] cur comm = cur comm ∪ {v} s = s ∪ f (cur comm) unused = unused \ {v} return cur comm our objective in this stage of the algorithm is to pre- serve the purity of the germinated seed set as well as possible, we avoid false positives by always taking the first local minimum as a stopping point in the algo- rithm. Another convention of Yang et al. (2015) was to disregard any local minima for which the scoring function does not subsequently increase 20% before arriving at another local minimum. Since our proce- dure for identifying a local minimum must control the false positive rate in the germination stage, we use a stricter criteria of 5%. In any case, this means that the cur comm returned by Algorithm 1 must be trimmed back to the point at which the local minimum actually occurred and cannot be used as is. Though it has not been observed to occur in practice, if it were the case that no local minimum meets this criteria, then the entire set of nodes would be returned. Next, regarding the time complexity for an algorithm involving a search for the argument of the minimum of a set of values each of which is the minimum of another list, we show in Theorem 1 that the time complexity is O(1). We assume at the onset that the graph at hand has a maximum node degree of d, which grows at a slower rate than graph size. Similarly, we as- sume that the maximum community size nc is not a graph property that grows at the same rate as graph size. These are basic features of the Lancichinetti- Fortunato-Radicchi (LFR) graph model (Lancichinetti and Fortunato, 2009). Theorem 1. The time complexity of Algorithm 1 is O(1). Proof. In general, finding the minimum of a list of length n is of complexity O(n). In the worst case scenario of line 6 (when the graph is complete) the number of required operations would be: n−len(seeds)(cid:88) n−len(seeds)(cid:88) a(n − a) = an − a2 a=1 a=1 i=1 id = d nc(nc+1) 2 c) = O(1). a=1 a −(cid:80)n munity, this term may be approximated as(cid:80)n a2 = n(cid:80)n Since len(seeds) is a small fraction of the entire com- a=1 an− a=1 a2. In this formulation, both sums are on the order of n3. In practice, we observe a local minimum to occur very early, after only consider- ing ≈ nc 10 (though the actual proportion would depend on the parameter which describes the power law dis- tribution of the vertices' degrees). But even if we are to consider the algorithm to run for nc steps, the total . So, under our assumptions that we are in a sparse graph setting, where community sizes do not grow at the same rate as the number of nodes in the graph, the complexity of Algorithm 1 is O(n2 operations remain: (cid:80)nc 3.2 Theoretical Properties of the Germinated Seed Set The objective of finding a subgraph which contains the seeds and also has the smallest ER diameter is the problem we wish to solve. There is even some recent work in graph clustering which attempts to find these subgraphs efficiently. One recent paper introduced a polynomial time algorithm to partition a graph into sets of nodes which have a bounded ER diameter (Alev et al., 2017). This approach suggests an important inroad into graph clustering based on ER, but is not directly applicable to identifying a single community. It is also worth considering that the solution to the relaxed minimization problem is extremely fast and does not add much computational overhead to the use of PPR. That is, even with the computation of ERs, the germination of a seed set, and subsequent PPR, the overall complexity is still sub-quadratic. Furthermore, by demonstrating the efficacy of even an incredibly greedy algorithm for minimizing ER diameter, we aim to motivate more advanced methods for finding low ER diameter subgraphs which could be coupled with a subsequent stage of PPR. That being said, we demonstrate that a bound ex- ists at every step of the while loop of our algorithm. Specifically, the increase of ER diameter at each step is bounded above by the minimum of the ERs between all vertices already included and the newest addition. Theorem 2. At each stage of the while loop in Algo- rithm 1, the increase of the ER diameter of cur comm is bounded above by the minimum of the ERs between the newest node and the nodes in the current state of cur comm. Proof. It must be noted first that reffRes : V × V → R is a distance metric and that (V, reffRes) is a metric space. Suppose that at step i the newest can- didate for community membership to cur comm is w ∈ V . This could be the case only if Effective Resistance-based Germination of Seed Sets for Community Detection ∀u ∈ V, min(cid:0){reffRes(u, v) v ∈ cur comm}(cid:1) = min(cid:0){reffRes(w, v) w ∈ unused, v ∈ cur comm}(cid:1). min(cid:0){reffRes(u, v) v ∈ cur comm}(cid:1). diameffRes(cur comm∪{w}) ≤ diameffRes(cur comm)+ 4 EXPERIMENTS 4.1 Data Description and Approach Three different forms of network data are consid- ered below. The first type is a network sam- pled from a hierarchically-structured stochastic block model (HSBM). The matrix of probabilities along with a sample realization are depicted for ease of visualiza- tion in Figure 1. This is not a network structure com- monly found empirically, but we use this model as a demonstration for the way an ER method works and how we expect it to work in a general network. Figure 1: A hierarchical SBM and its realization Next we present synthetic network data generated from the LFR graph model, a more realistic network model than the HSBM (Lancichinetti and Fortunato, 2009). This graph model assumes all the graph's ver- tices' degrees are distributed according to an exponen- tial distribution. Depending on the parameter of this distribution, graphs may vary from a sparse "hub and spokes" structure to a single cluster with a nearly uni- form degree distribution. Using this data we show that the ER component of our method behaves differently depending on what proportion of the community is a high degree node. We also demonstrate that as long as the size of the community grows at a slower rate than the graph as a whole, the performance of our method does not degrade as a function of graph size. This is a specific concern of ours considering the limitations of using ER as a global similarity metric in large net- works, as described in Section 2.6. Lastly, we consider several large data benchmarks for CD. We selected some of the most commonly Jonathan Eskreis-Winkler, Risi Kondor used networks with labeled ground-truth communities. Though these labelings are not perfect, these bench- marks elicit the closest match to real-world applica- tions available. The specific datasets we consider are the blogs hyperlink network, Amazon co-purchasing network, the DBLP computer science co-authorship network, the Youtube social network, the Orkut social network, and web-linkages between Wikipedia pages (Leskovec and Krevl, 2014). While many CD methods are validated by juxtapos- ing an estimated partition with the ground-truth com- munity partition, in the one-community example con- sidered in this paper, the objective is to maximize a combination of precision and recall for the single esti- mated community. We quantify our method next to traditional PPR using F1 scores. While the compar- ison of a community estimate to the ground truth is ultimately based on the F1 score or other scores cal- culated from precision and recall, we also provide a complete precision-recall curve for the entire sequence of the cur comm vector in order to profile whether a higher precision method is simply more conservative, or if it is uniformly outperforming a competitor. After all, the objective of our study is not specifically to pro- duce an out-of-the-box cutting edge CD scheme, but to demonstrate how much the seed germination stage contributes before PPR begins. For this reason, our benchmark in these experiments is a vanilla PPR al- gorithm whose only parameter is α, which determines how much weight is redistributed at the initial seed nodes in each iteration. To conduct each experiment we select a community from to the ground truth labeling, and select a fixed number of seeds from that community. Then, we pro- vide the network's edge set and its chosen seeds to the CD algorithm. When results are averaged, this re- flects our having run the experiment independently on several randomly sampled synthetic networks, or our having queried a community estimate around different seeds or a different community label in each iteration. 4.2 Hierarchical Stochastic Block Models The basic intuition that a network node will have lower resistance towards a high degree node than a low de- gree node is put to the test by this graph model. We show that in the extreme scenario where node de- grees are distributed uniformly and there is sufficient within-community interconnectedness, ER will iden- tify all community nodes reliably before making false positives. In contrast to this, we attribute ER's inabil- ity to be a standalone CD method in general to the relatively high ER between the hub of a community and its spokes relative to the resistance between the hub of one community and the hub of another. In this general case, only a few paths exist for a low degree node to the core of its community (corresponding to a high resistance path), though there may be more paths from one high degree node to another, even if they are found in distinct communities. In the HSBM setting, all the nodes' degrees are distributed uniformly in a small interval, avoiding this limitation. The ability of ER to perform and scale well in this setting (compet- itively with PPR), and not even be greatly improved on by a germination stage, is evident in Figure 2. Figure 2: F1 scores for networks based on the HSBM model as a function of graph size 4.3 Synthetic Network Data The next network type used is the LFR model of benchmark graphs (Lancichinetti and Fortunato, 2009). In this model, the heterogeneity of the distri- bution of node degrees and community sizes are con- trolled by a power law distribution, along with a pa- rameter governing how high a proportion of a node's edges are inward-facing versus outward-facing. In this more realistic setting, with parameters to tune gov- erning what proportion of a network is "popular" in its community, the contribution of ER to PPR can be assessed. We show in this more realistic setting that pairing an ER-based germination stage with PPR outperforms PPR alone. In the top portion of Figure 3 we show that this result is not dependent on the size of the graph and in the bottom portion we show that this result is not dependent on the parameter of the power law distribution of the model. Though it is appar- ent that graphs with fewer degrees overall pose more challenging CD tasks, the relative performance of our method is consistently superior. Effective Resistance-based Germination of Seed Sets for Community Detection For purposes of illustration, we take one instance of the CD task in the Amazon dataset and show the ROC curves for each CD method based on ground truth co-purchasing data. Each ROC curve depicts the precision-recall tradeoff for a progressively larger community estimate. A scoring function would deter- mine which community estimate is selected. In Figure 4 we see the primary trend in basing a PPR proce- dure on top of a germination stage. Specifically, we observe that the high precision of using ER alone is short lived. After attaining ≈ 25% recall, the ER at- tains a local minimum, at which point the germination stage stops. This triggers PPR to be initiated on the "germinated" seed set, leading to consistently better precision and recall, without regard for the point at which the stopping function is activated. Figure 3: F1 scores for networks based on the LFR model as a function of graph size (top) and power law parameter (bottom) 4.4 Empirical Network Data Lastly, we implement our CD approach on publicly available, large-scale, naturally occurring networks wherein seed set expansion is particularly relevant. To assess the general performance of these methods, we consider the mean F1 score over 10 experiments of sampling seeds from a fixed ground truth community. A summary of the (approximate) network sizes, and average F1 scores are presented in Table 1. "Germ." in the table denotes using a germination stage pre-PPR. It is worth noting that the results are averaged over ex- periments of varying difficulty, which is addressed in the supplementary material. When the difference in F1 score across all experiments is considered between PPR and germination, PPR was improved upon 85% of the time. Table 1: Mean of F1 scores on empirical networks NAME Blogs Amazon DBLP Youtube Orkut Wikipedia n 103 105 105 106 106 106 PPR (sd) Germination (sd) 0.95 (0.015) 0.69 (0.07) 0.58 (0.12) 0.42 (0.04) 0.49 (0.21) 0.57 (0.25) 0.96 (0.003) 0.74 (0.02) 0.67 (0.13) 0.49 (0.05) 0.60 (0.23) 0.68 (0.21) Figure 4: ROC curve for a single run of CD 5 CONCLUSIONS We have shown that a simple modification to PPR can lead to a significant boost in accuracy for CD. While our algorithm's specific contribution to single community seed set expansion is promising, we are even more motivated by degree to which a two-step procedure is beneficial in a single community seed set expansion problem. In the future, we plan to demonstrate further the power of this two-step approach. Possible directions include considering a larger class of community scoring functions, algorithms for locally minimizing ER diam- eter, and thoroughly investigating the accuracy-time tradeoffs of these decisions. Jonathan Eskreis-Winkler, Risi Kondor References Alev, V. L., Anari, N., Lau, L. C., and Gharan, S. O. (2017). Graph Clustering using Effective Resis- tance. arXiv:1711.06530 [cs]. arXiv: 1711.06530. Andersen, R., Chung, F., and Lang, K. (2006). Lo- cal Graph Partitioning using PageRank Vectors. In 2006 47th Annual IEEE Symposium on Foun- dations of Computer Science (FOCS'06), pages 475 -- 486, Berkeley, CA, USA. IEEE. Andersen, R. and Lang, K. J. (2006). Communities from seed sets. In Proceedings of the 15th inter- national conference on World Wide Web, pages 223 -- 232. ACM. Bahmani, B., Chowdhury, A., and Goel, A. (2010). Fast Incremental and Personalized PageRank. Proc. VLDB Endow., 4(3):173 -- 184. Banerjee, P., Culp, M. V., Ryan, K. J., and Michai- lidis, G. (2017). Graph-Based Semi-Supervised Learning With Big Data. Handbook of Re- search on Applied Cybernetics and Systems Sci- ence, pages 154 -- 185. Durfee, D., Kyng, R., Peebles, J., Rao, A. B., and Sachdeva, S. (2017). Sampling random spanning trees faster than matrix multiplication. In Pro- ceedings of the 49th Annual ACM SIGACT Sym- posium on Theory of Computing - STOC 2017, pages 730 -- 742, Montreal, Canada. ACM Press. Fogaras, D., Rcz, B., Csalogny, K., and Sarls, T. (2005). Towards Scaling Fully Personalized PageRank: Algorithms, Lower Bounds, and Ex- periments. Internet Mathematics, 2(3):333 -- 358. Fortunato, S. (2010). Community detection in graphs. Physics Reports, 486(3-5):75 -- 174. arXiv: 0906.0612. Garcia, J. O., Ashourvan, A., Muldoon, S., Vet- tel, J. M., and Bassett, D. S. (2018). Appli- cations of Community Detection Techniques to Brain Graphs: Algorithmic Considerations and Implications for Neural Function. Proceedings of the IEEE, 106(5):846 -- 867. Hollocou, A., Bonald, T., and Lelarge, M. (2018). Mul- tiple Local Community Detection. SIGMETRICS Perform. Eval. Rev., 45(3):76 -- 83. Kloumann, I., Ugander, J., and Kleinberg, J. (2017). Block Models and Personalized PageRank. Pro- ceedings of the National Academy of Sciences, 114(1):33 -- 38. arXiv: 1607.03483. Lancichinetti, A. and Fortunato, S. (2009). Bench- marks for testing community detection algorithms on directed and weighted graphs with overlapping communities. Physical Review E, 80(1):016118. Leskovec, J. and Krevl, A. (2014). SNAP Datasets: Stanford large network dataset collection. http: //snap.stanford.edu/data. Luxburg, U. V., Radl, A., and Hein, M. (2010). Get- ting lost in space: Large sample analysis of the resistance distance. In Lafferty, J. D., Williams, C. K. I., Shawe-Taylor, J., Zemel, R. S., and Cu- lotta, A., editors, Advances in Neural Information Processing Systems 23, pages 2622 -- 2630. Curran Associates, Inc. Mehler, A. and Skiena, S. (2009). Expanding Net- work Communities from Representative Exam- ples. ACM Trans. Knowl. Discov. Data, 3(2):7:1 -- 7:27. Moradi, F., Olovsson, T., and Tsigas, P. (2014). A lo- cal seed selection algorithm for overlapping com- munity detection. In 2014 IEEE/ACM Interna- tional Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014), pages 1 -- 8. Nguyen, C. H. and Mamitsuka, H. (2016). New resis- tance distances with global information on large graphs. In Artificial Intelligence and Statistics, pages 639 -- 647. Page, L., Brin, S., Motwani, R., and Winograd, T. (1999). The PageRank Citation Ranking: Bring- ing Order to the Web. Palla, G., Dernyi, I., Farkas, I., and Vicsek, T. (2005). Uncovering the overlapping community structure of complex networks in nature and society. Na- ture, 435(7043):814 -- 818. Gargi, U., Lu, W., S. Mirrokni, V., and Yoon, S. (2011). Large-Scale Community Detection on YouTube for Topic Discovery and Exploration. In Proceedings of 5th International AAAI Con- ference on Weblogs and Social Media. Schaub, M. T., Trefois, M., van Dooren, P., and Del- venne, J.-C. (2017). Sparse Matrix Factorizations for Fast Linear Solvers with Application to Lapla- cian Systems. SIAM Journal on Matrix Analysis and Applications, 38(2):505 -- 529. Effective Resistance-based Germination of Seed Sets for Community Detection Shai, S., Stanley, N., Granell, C., Taylor, D., and Mucha, P. J. (2017). Case studies in network com- munity detection. van Laarhoven, T. (2018). Generative models for local network community detection. Physical Review E, 97(4). arXiv: 1804.04469. Whang, J. J., Gleich, D. F., and Dhillon, I. S. (2013). Overlapping Community Detection Using Seed Set Expansion. In Proceedings of the 22Nd ACM International Conference on Information & Knowledge Management, CIKM '13, pages 2099 -- 2108, New York, NY, USA. ACM. Xie, J., Kelley, S., and Szymanski, B. K. (2013). Over- lapping Community Detection in Networks: The State-of-the-art and Comparative Study. ACM Comput. Surv., 45(4):43:1 -- 43:35. Yang, J. and Leskovec, J. (2015). Defining and evaluat- ing network communities based on ground-truth. Knowledge and Information Systems, 42(1):181 -- 213. Zhou, L., Pan, S., Wang, J., and Vasilakos, A. V. (2017). Machine learning on big data: Opportu- nities and challenges. Neurocomputing, 237:350 -- 361.
1911.11970
1
1911
2019-11-27T06:02:05
Graph Representation for Face Analysis in Image Collections
[ "cs.SI", "cs.CV" ]
Given an image collection of a social event with a huge number of pictures, it is very useful to have tools that can be used to analyze how the individuals --that are present in the collection-- interact with each other. In this paper, we propose an optimal graph representation that is based on the `connectivity' of them. The connectivity of a pair of subjects gives a score that represents how `connected' they are. It is estimated based on co-occurrence, closeness, facial expressions, and the orientation of the head when they are looking to each other. In our proposed graph, the nodes represent the subjects of the collection, and the edges correspond to their connectivities. The location of the nodes is estimated according to their connectivity (the closer the nodes, the more connected are the subjects). Finally, we developed a graphical user interface in which we can click onto the nodes (or the edges) to display the corresponding images of the collection in which the subject of the nodes (or the connected subjects) are present. We present relevant results by analyzing a wedding celebration, a sitcom video, a volleyball game and images extracted from Twitter given a hashtag. We believe that this tool can be very helpful to detect the existing social relations in an image collection.
cs.SI
cs
Graph Representation for Face Analysis in Image Collections Domingo Mery and Florencia Valdes Abstract -- Given an image collection of a social event with a huge number of pictures, it is very useful to have tools that can be used to analyze how the individuals -- that are present in the collection -- interact with each other. In this paper, we propose an optimal graph representation that is based on the 'connectivity' of them. The connectivity of a pair of subjects gives a score that represents how 'connected' they are. It is estimated based on co-occurrence, closeness, facial expressions, and the orientation of the head when they are looking to each other. In our proposed graph, the nodes represent the subjects of the collection, and the edges correspond to their connectivities. The location of the nodes is estimated according to their connectivity (the closer the nodes, the more connected are the subjects). Finally, we developed a graphical user interface in which we can click onto the nodes (or the edges) to display the corresponding images of the collection in which the subject of the nodes (or the connected subjects) are present. We present relevant results by analyzing a wedding celebration, a sitcom video, a volleyball game and images extracted from Twitter given a hashtag. We believe that this tool can be very helpful to detect the existing social relations in an image collection. Index Terms -- Face recognition, gender recognition, expression recognition, facial analysis, graph representation, image collection, deep learning. ! 9 1 0 2 v o N 7 2 ] I S . s c [ 1 v 0 7 9 1 1 . 1 1 9 1 : v i X r a 1 INTRODUCTION In the last decades, it has been a common practice to have collections of a huge number of images [1]. For example, a social event -- like a wedding celebration -- can have thousands of pictures. Moreover, we can download thousands of images from social networks given a hashtag. In practice, it is not so simple to browse all images, and it can be very helpful to analyze the faces and build a graph representation with information extracted from all faces that are present in the images as illustrated in Fig. 1, where the nodes represent the subjects and the edges are the connections between them. In recent years, we have witnessed tremendous improvements in face recognition by using complex deep neural network architectures trained with mil- lions of face images (see for example advances in face recognition [2] [3] [4] and in face detection [5] [6]). In addition, there are very impressive advances in applications [7], face clustering [8] [9], and in the recognition of age [10], gender [11], facial expressions [12], eye gaze [13], head pose [14] and facial land- marks [15]. In this field, many works deal with applications that can be developed using the face analysis tools. Here some examples: In [16], social networks are built by detecting and tracking faces in news videos, the idea is to establish how much and with whom a politician • D.Mery and F.Valdes are with the Department of Computer Science, Pontificia Universidad Cat´olica, Santiago of Chile. URL: http://domingomery.ing.uc.cl appears on TV news. In [17], a facial behavior analysis is presented. The method can extract expressions and action units (facial movements such as 'inner portion of the brows is raised' or 'lips are relaxed and closed'), that could be used to build interactive applications. In [18], 'social relations' (defined as the association like warm, friendliness and dominance, between two or more persons) are detected in face images in the wild. In [19], face-based group-level emotion recog- nition is proposed to study the behavior of people participating in social events. Similar advances have been made in video analysis using the information of the location and actions of people in videos. See for example [20], where a 'context aware' configuration model is proposed for detecting groups of persons and their interactions (e.g., handshake, hug, etc.) in TV material. It is evident that the state of the art in this field is far from perfect, and any contribution that can help to detect and measure the interaction of individuals in an image collection will play a relevant role when analyzing social relations. Our contributions are threefold. Given an image collection and a set of subjects that are present in the collection: i) We define a 'connectivity' measure- ment between every pair of subjects of the set that gives a score that represent how connected they are. The connectivity is based on co-occurrence, closeness, facial expressions, and the orientation of the head when they are looking to each other. ii) We estimate an optimal graph in which the nodes represent the subjects of the set, and the length of the edges that connect the nodes depends on the connectivity of the 2 looking to, for this end we use the projection of the roll vector obtained in [14], and v) the face descriptor of d elements (xk), in this case we use descriptor with uni- norm. In our experiments, we use ArcFace [3], that computes an embedding of d = 512 elements with outstanding results. The descriptors of m detected faces are stored in matrix X of m × 512 elements. In addition, we have a list of ne enrolled subjects that we want to analyze. It can be defined manually or using a face clustering algorithm. The descriptors of the enrolled faces have uni-norm and they are stored in a matrix Xe of ne×512 elements. It is very simple to detect if the enrolled subjects are present in the image collection: we compute the m × ne-element matrix e > θ, where θ is a threshold that we set Y = XXT to 0.4. If Y (k, i) = 1, that means that subject Si was detected in image zk. 2.2 Analysis: Connectivity Matrices The following matrices have ne × ne elements. The in- dices of the elements of the matrices are (i, j). Element (i, j) gives a 'connectivity measure' between subjects Si and Sj. The matrices are symmetric, that means for matrix X, Xij = Xji. In addition, Xii = 0. In all connectivity matrices of our approach, a high/low value of Xij means that the connectivity between Si and Sj is high/low. 1. Co-occurrence Matrix (C): Element Cij is defined as the number of images in the collection in which subjects Si and Sj are present. This matrix is easily computed by defining a 'presence matrix' P of ne × n elements in which element Pit is 1/0 if subject Si is present/absent in image It. 2. Closeness Matrix (D): Element Dij is defined as the sum of the 'closeness factors' of subjects Si and Sj in those images of the collection in which Si and Sj are present. The factor is computed as follows: For subjects Si and Sj, we measure the size in pixels of the bounding box of the faces as ai = wihi the average (ai + aj)/2, and the distance d in pixels between the centers of the bounding boxes in the image. The 'closeness factor' is computed for those images that have similar face and aj = (cid:112)wjhj, √ Fig. 1. Block diagram of our proposed method. subjects (the closer the nodes, the more connected are the subjects). iii) We developed a graphical user interface in which by clicking onto the nodes (or the edges), the user can display the corresponding images of the collection in which the subject of the nodes (or the connected subjects) are present. 2 PROPOSED METHOD In this section, we present our method that can be used for a facial graph representation in an image col- lection. The method follows Fig. 1. Before we perform the analysis, it is necessary to do some preliminary computations. After that, we define some matrices that can be used to measure the 'connectivity' between the subjects that are present in the collection, and fi- nally we estimate and define the graph representation. 2.1 Preliminary Computations: Feature Extrac- tion The idea of our approach is to analyze a set I of n images {It}, for t = 1··· n. We detect all faces of I using Multi-task Cascaded Convolutional Networks (MTCNN) [5] that has been demonstrated to be very robust in unconstrained environments. All detected faces are stored as set F of m face images {Fk}, for k = 1··· m. In addition, we store in vector z of m elements the image index of the detected face image, i.e., zk = t, if face image Fk was detected in image It. Furthermore, the m bounding boxes of the detected faces are stored in matrix B of m × 4 elements with coordinates bk = (x1, y1, x2, y2)k for face image k. After face detection is performed, for each face image k, we compute the width and height (wk, hk) of the bounding box. Afterwards, we compute: i) the age (ak), the gender (gk) using the library py-agender [21] that offers very good results. ii) The facial expressions (ek) are defined as a vector of seven probabilities [12] for: angry, disgust, scared, happy, sad, surprised, and neutral. iii) The 68 facial landmarks (lk) give the coordinates (x, y) of the eyebrows (left and right), eyes (left and right), nose, mouth and jawline. For this end, we use the library Dlib [22], iv) the pose vector (vk) defines the direction where the face is sizes (min(ai/aj, aj/ai) < 0.7) and for the faces that are close enough (d/a < nf ). In our experiments, we set nf to 4. With the first criterium, we can avoid faces that are close in the image but because of the perspective they are far away in 3D space. With the second criterium, we consider only those pairs of images that are close enough. In our case, the faces must be closer than 4a (4 'faces'). Thus, the 'closeness factor' is defined as (nf − d/a)/nf . In this case, the factor is close to one, if the faces are very close; it is for example 0.25, if the distance of the faces is 3a, and it is zero if the distance is greater than 4a. 3. Connection Matrix (Z): Element Zij is defined as the sum of the 'connection factors' of subjects Si and Sj in those images of the collection in which Si and Sj are present. The factor is computed as follows: For subject Si and Sj, we compute the intersection of vectors vi and vj defined as the projected roll vectors (computed from the head pose) that start at the point that is in the middle of both eyes (computed as the center of the landmarks corresponding to the eyes of the face). If the intersection of the vectors are in front of the faces, we compute both distances from intersection point to the middle of both eyes, and select the minimum (d). If d is very small, it means that one subject is seeing close to the other one. The 'connection factor' is defined (like the 'closeness factor') as (nf − d/a)/nf for d/a < nf . 4. Empathy Matrix (E): Element Eij is defined as the sum of the 'empathy factors' of subjects Si and Sj in those images of the collection in which Si and Sj are present. The factor is computed as follows: For subject Si and Sj, we measure the first six elements of the expression vector (we avoid the neutral expression) as vectors e(cid:48) j. The idea of the 'empathy factor' is to be close to one (or zero), if the expressions of subjects Si and Sj are similar (or different). For this end, we use the cosine similarity, that means, we normalize j and define the the vectors as e(cid:48) 'empathy factor' as the dot product of them. 5. Happiness Matrix (H): Element Hij is defined as the sum of the 'happiness factors' of subjects Si and Sj in those images of the collection in which Si and Sj are present. The factor is computed as follows: For subjects Si and Sj, we extract the fourth element of the expression vector (that corresponds to the happiness) hi = ei(4) and hj = ej(4), and define the 'happiness factor' as the average (hi + hj)/2. i and e(cid:48) i and e(cid:48) i/e(cid:48) j/e(cid:48) Finally, the total connectivity matrix T is defined as the average: T = (C + D + Z + E + H)/5. We tested different weighted sums with similar results. 2.3 Graph Construction In order to build a graph that represent the connectiv- ity of the subjects to be analyzed, we define a graph of ne nodes (one for each subject) and locate them in a 2D space in position (xi, yi) for i = 1··· ne. 3 The key idea of the graph, is that the closer are the nodes i and j, the higher the connectivity between them. That means, the distance of both nodes ∆ij = (xi, yi) − (xj, yj) should be a value that represents the 'no-connectivity' between subjects Si and Sj. In our approach, we use the 'connectivity' defined in previous section (see matrix T). We tested several definitions for 'no-connectivity' and the best one -- in terms of the visualization of the graph -- was given by Wij = 1/(cid:112)Qij + 1, where Qij = 99 × Tij/ max (T), that means the 'no-connectivity' Wij for subjects Si and Sj gives values between 0.1 (when the connectiv- ity is maximal) and 1.0 (when there is no connectiv- ity). In addition, we set W (i, i) = 0. The idea of our method is to find the coordinates of the nodes (xi, yi), so that the distance of the nodes ∆ij, should be similar to the 'no-connectivity' Wij. This is an optimization problem that can be represented by minimizing the F → min. We Frobenius norm: error = ∆ − W2 solve this problem using the simplex search method [23] with a starting point given by the solution of a graph drawing by force-directed placement [24], in which the length of each edge in the graph is proportional to its weight Wij. In our experiments, we report the Mean Absolute Error (MAE), as a metric of the performance of the graph, defined as the mean difference ∆ij − Wij in all pairs of nodes. Obviously, MAE cannot be zero in many cases where (e.g., A is friend of B and C, but B and C are enemies). 2.4 Graph Representation For the node representation: a node is typically rep- resented as a point or a circle. Alternatives in this case can be the size of the circle, color of the circle and color of the boundary of the circle. In our case for node i, we put the face of subject Si in a circle (the radius is related to the number of images in which Si is present), and the color of the boundary is related to the predominant facial expression of Si. We use the colors based on [25]: scare (dark gray), angry (red), disgusted (green), sad (blue), surprised (white), happy (yellow), neutral (gray). For the edge representation: an edge is typically represented as a line, or (bi)directional arrow. Alternatives in this case can be the color and the width of the line. In our case for edge (i, j), we decided to use lines (and not arrows) to make the graph simpler. In addition, our connectivity matrix is symmetric and it has no sense to use arrows1. The color of the lines, in our case, is set to the most common expression between subjects Si and Sj, and the width of the line corresponds to the number of images in which both subjects are present. If Si and Sj do not have pictures together (Cij = 0), there will be no edge between them. 1. Nevertheless, the definition of connection given by matrix Z can be changed, if we consider the case when subject Si is looking to subject Sj but not vice-versa. In this case, directional arrows can be used. 4 Fig. 2. Graph Representations. A) Wedding -- A1: proposed graph representation. A2: Nodes of proposed graph with edges given manually (blue lines: couples, green arrows: parents to sons and daughters, orange lines: siblings, magenta lines: friends. B) Friends (ellipse is plotted manually), C) Volleyball: two teams (red and white stars drawn manually). D) Trump - The Squad. In addition, some examples of the GUI (see text). Since the information of the co-occurrence matrix and presence matrix is stored, we propose to display the graph in a Graphical User Interface (GUI) in which the user can interact with the nodes and edges. By clicking onto a node, the user can obtain information related to the subject of the node: e.g., gender, age and facial expressions. In addition, the images of the collection in which the subject is present can be dis- played according to the facial expression (the images can be sorted using the expression 'happiness' for example). On the other hand, by clicking onto an edge (that connect two nodes, in our case two subjects), the user can display the corresponding images of the connected subjects (images of the collection in which both subjects are present). 3 EXPERIMENTAL RESULTS In this section, we report the results obtained in four experiments that we used to validate the proposed ap- proach. The implementation was done in Python 3.6.4 (for face detection and feature extraction) and Matlab R2019b (for connectivity matrices, graph construction and representation and Graphical User Interface). 3.1 Private Wedding We took a private family album of a wedding celebra- tion in which we participated. That means, we know exactly the subjects that are present and the relations that they have. In order to protect the privacy of the participants, we public only the attributes and de- scriptors of the faces, and for the graph representation we use synthetic faces generated by a GAN model [26]. This dataset has 639 images and 2280 faces. The obtained graph is illustrated in Fig. 2-A1. In Fig. 2-A2, we provide an additional graph with the same nodes, in which the edges are drawn manually according to the existing relation between the participants (couples, parents, sons, daughters, siblings and friends). → Discussion: (MAE = 0.1944) In the graph, we ob- serve that main participants are the bride and the groom. In the GUI, we show the histogram of the expressions of the bride (she was happy in 78% of the pictures). The main facial expression of the wedding is 'happiness' (yellow), however, there are some people that is angry (the parents of the bride). It is very impressive, how close are the nodes in the graph for many of the strongest relationships of the participants. 3.2 Friends We downloaded videos of the sitcom 'Friends' with a compilation of the six main characters (Rachel, Phoebe, Monica, Joey Chandler and Ross) and guest stars (like Julia Roberts, Brad Pitt, Robin Williams, etc.)2. This dataset has 16429 images and 27647 faces. For the enrollment, we select the six main characters and 18 guest stars. The obtained graph is illustrated in Fig. 2-B. → Discussion: (MAE = 0.2313) From the graph, we ob- serve that the main participants coincide with the six main characters of Friends. The main facial expression in the graph for this comedy is 'happiness' (yellow). There is for example a connection with Brad Bitt (he was present in 363 images, and from them, Ross was present in 67 as well). In the GUI, we can display the images with co-occurrences. 3.3 Volleyball Game On July 2nd, 2019, we downloaded from Flickr the album "VBVBA RVC 2 2010" of pictures taken by Bruce A Stockwell 3. In these pictures, we observe pictures of different volleyball games played on April 2010 by teenage players. This dataset has 1131 images and 4550 faces. The obtained graph is illustrated in Fig. 2-C. In this set, there are two teams of players (see red and white stars included manually in the graph). For the enrollment, we select the players of both teams. 3.4 Discussion: (MAE = 0.0679). 16% and 6% of the detected faces belong to the red and white teams respectively. We observe in the graph, that both teams are clustered, and the main participants (size of the faces) are from the red team. The facial expressions are 'scared' (gray) and 'happiness' (yellow). This is very typical in a game that stress and happiness co-exist. The GUI shows images of some of the main participants. In addition, we show the images of player 14 sorted according to her 'happiness'. 2. See both videos on https://youtu.be/7GbOUIFa87g and https: //youtu.be/8mP5xOg7ijs. the 3. See album https://www.flickr.com/photos/bas68/ albums/72157624234584197. The pictures are licensed under a Creative Commons "Attribution-NonCommercial-NoDerivs 2.0 Generic" 5 3.5 Donald Trump -- The Squad On July 19th, 2019, we downloaded images from Twit- ter given the hashtags #Trump and #DonaldTrump. In those days, there was a problem between Trump and four Democratic congresswomen (known as The Squad). This dataset has 494 images (126 were au- tomatically removed because they were duplicated), and 677 faces. The obtained graph is illustrated in Fig. 2-D. For the enrollment we select Trump and some rel- atives, some politicians and the four congresswomen. → Discussion: (MAE = 0.1251). In the graph, we ob- serve that main participant is Trump, he has a 'happy' relation to his wife and daughter, and a 'sad' and 'angry' relation to Putin and Merkel respectively. An independent cluster is given by The Squad with only one connection to Trump (given by a photo montage). For this connection we use dark gray to show that there is no common facial expression. 4 CONCLUSIONS In this paper, we presented a graphical tool that can be used to detect and analyze social relations in an image collection. We proposed an optimal graph representa- tion that is based on the 'connectivity' of the subjects. We based our measurement on co-occurrence, close- ness, facial expressions, the orientation of the head. The nodes represent the subjects of the collection, and the edges are their connectivities. In our solution, the closer the nodes, the more connected are the subjects. We propose a representation for the nodes and edges (colors are related to facial expressions and size are related to presence). The graph can be used in a graphical user interface (GUI) in which we can display the original images that shows the connection of the people. Finally, we present relevant results by analyzing a wedding celebration, a sitcom video, a volleyball game and images extracted from twitter given a hashtag. We believe that this tool can be very helpful to detect the existing social relations in an image collection. For future work, we would like to expand to three or more people by analyzing the connectivity matrix. ACKNOWLEDGMENTS The authors want to thanks to Grant Fondecyt -- Chile # 1191131. REFERENCES [1] D. Mery, "Face analysis: State of the art and ethical chal- lenges," in Proceedings of the Pacific Rim Symposium on Image and Video Technology (PSIVT 2019): Workshop Vision-Tech, 2019. [2] O. M. Parkhi, A. Vedaldi, and A. Zisserman, "Deep face recognition," in British Machine Vision Conference (BMVC2015), vol. 1, 2015, p. 6. J. Deng, J. Guo, N. Xue, and S. Zafeiriou, "Arcface: Additive angular margin loss for deep face recognition," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recogni- tion, 2019, pp. 4690 -- 4699. [3] 6 [24] T. M. Fruchterman and E. M. Reingold, "Graph drawing by force-directed placement," Software: Practice and experience, vol. 21, no. 11, pp. 1129 -- 1164, 1991. [25] T. M. Sutton and J. Altarriba, "Color associations to emotion and emotion-laden words: A collection of norms for stimulus construction and selection," Behavior research methods, vol. 48, no. 2, pp. 686 -- 728, 2016. [26] T. Karras, S. Laine, and T. Aila, "A style-based generator archi- tecture for generative adversarial networks," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 4401 -- 4410. [4] P. Li, L. Prieto, D. Mery, and P. J. Flynn, "On low-resolution face recognition in the wild: Comparisons and new tech- niques," IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2000 -- 2012, 2019. [5] K. Zhang, Z. Zhang, Z. Li, and Y. Qiao, "Joint face detec- tion and alignment using multitask cascaded convolutional networks," IEEE Signal Processing Letters, vol. 23, no. 10, pp. 1499 -- 1503, 2016. [6] X. Sun, P. Wu, and S. C. Hoi, "Face detection using deep learning: An improved faster rcnn approach," Neurocomputing, vol. 299, pp. 42 -- 50, 2018. [7] D. Mery, I. Mackenney, and E. Villalobos, "Student attendance system in crowded classrooms using a smartphone camera," in 2019 IEEE Winter Conference on Applications of Computer Vision (WACV). IEEE, 2019, pp. 857 -- 866. [8] C. Otto, D. Wang, and A. K. Jain, "Clustering millions of faces by identity," IEEE transactions on pattern analysis and machine intelligence, vol. 40, no. 2, pp. 289 -- 303, 2017. [9] Y. Shi, C. Otto, and A. K. Jain, "Face clustering: representation and pairwise constraints," IEEE Transactions on Information Forensics and Security, vol. 13, no. 7, pp. 1626 -- 1640, 2018. [10] R. Rothe, R. Timofte, and L. Van Gool, "Deep expectation of real and apparent age from a single image without facial landmarks," International Journal of Computer Vision, vol. 126, no. 2-4, pp. 144 -- 157, 2018. [11] F. H. d. B. Zavan, O. R. Bellon, L. Silva, and G. G. Medioni, "Benchmarking parts based face processing in-the-wild for gender recognition and head pose estimation," Pattern Recog- nition Letters, vol. 123, pp. 104 -- 110, 2019. [12] O. Arriaga, M. Valdenegro-Toro, and P. Ploger, "Real-time convolutional neural networks for emotion and gender classi- fication," arXiv preprint arXiv:1710.07557, 2017. [13] O. Lorenz and U. Thomas, "Real time eye gaze tracking system using cnn-based facial features for human attention measure- ment," in Proceedings of the 14th International Joint Conference on Computer Vision, Imaging and Computer Graphics Theory and Applications - Volume 5: VISAPP,, INSTICC. SciTePress, 2019, pp. 598 -- 606. [14] N. Ruiz, E. Chong, and J. M. Rehg, "Fine-grained head pose estimation without keypoints," in The IEEE Conference on Computer Vision and Pattern Recognition (CVPR) Workshops, June 2018. [15] M. Zhu, D. Shi, M. Zheng, and M. Sadiq, "Robust facial landmark detection via occlusion-adaptive deep networks," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2019, pp. 3486 -- 3496. [16] B. Renoust, T. Kobayashi, T. D. Ngo, D.-D. Le, and S. Satoh, "When face-tracking meets social networks: a story of politics in news videos," Applied network science, vol. 1, no. 1, p. 4, 2016. [17] T. Baltrusaitis, A. Zadeh, Y. C. Lim, and L.-P. Morency, "Open- face 2.0: Facial behavior analysis toolkit," in 2018 13th IEEE International Conference on Automatic Face & Gesture Recognition (FG 2018). IEEE, 2018, pp. 59 -- 66. [18] Z. Zhang, P. Luo, C.-C. Loy, and X. Tang, "Learning social relation traits from face images," in Proceedings of the IEEE International Conference on Computer Vision, 2015, pp. 3631 -- 3639. [19] X. Huang, A. Dhall, R. Goecke, M. Pietikainen, and G. Zhao, "Multimodal framework for analyzing the affect of a group of people," IEEE Transactions on Multimedia, vol. 20, no. 10, pp. 2706 -- 2721, 2018. [20] M. Hoai and A. Zisserman, "Talking heads: Detecting humans and recognizing their interactions," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2014, pp. 875 -- 882. implementation a gender (https://pypi.org/project/py-agender/)," 2019. "Py-Agender: Keras and network of estimation for age [21] Y. Uchida, cnn [22] D. E. King, "Dlib-ml: A machine learning toolkit," Journal of Machine Learning Research, vol. 10, no. Jul, pp. 1755 -- 1758, 2009. [23] J. C. Lagarias, J. A. Reeds, M. H. Wright, and P. E. Wright, "Convergence properties of the nelder -- mead simplex method in low dimensions," SIAM Journal on optimization, vol. 9, no. 1, pp. 112 -- 147, 1998.
1704.05393
1
1704
2017-04-18T15:20:25
Mining Worse and Better Opinions. Unsupervised and Agnostic Aggregation of Online Reviews
[ "cs.SI", "cs.CL", "cs.IR" ]
In this paper, we propose a novel approach for aggregating online reviews, according to the opinions they express. Our methodology is unsupervised - due to the fact that it does not rely on pre-labeled reviews - and it is agnostic - since it does not make any assumption about the domain or the language of the review content. We measure the adherence of a review content to the domain terminology extracted from a review set. First, we demonstrate the informativeness of the adherence metric with respect to the score associated with a review. Then, we exploit the metric values to group reviews, according to the opinions they express. Our experimental campaign has been carried out on two large datasets collected from Booking and Amazon, respectively.
cs.SI
cs
Mining Worse and Better Opinions Unsupervised and Agnostic Aggregation of Online Reviews(cid:63) Michela Fazzolari1, Marinella Petrocchi1, Alessandro Tommasi2, and Cesare Zavattari2 1 Institute of Informatics and Telematics (IIT-CNR), Pisa, Italy 2 LUCENSE SCaRL, Lucca, Italy {m.fazzolari,m.petrocchi}@iit.cnr.it, {alessandro.tommasi,cesare.zavattari}@lucense.it Abstract. In this paper, we propose a novel approach for aggregating online reviews, according to the opinions they express. Our methodology is unsupervised - due to the fact that it does not rely on pre-labeled reviews - and it is agnostic - since it does not make any assumption about the domain or the language of the review content. We measure the adherence of a review content to the domain terminology extracted from a review set. First, we demonstrate the informativeness of the adherence metric with respect to the score associated with a review. Then, we exploit the metric values to group reviews, according to the opinions they express. Our experimental campaign has been carried out on two large datasets collected from Booking and Amazon, respectively. Keywords: Social Web mining, Online reviews aggregation, Adherence metric, Domain terminology, Contrastive approach 1 Introduction Online reviews represent an important resource for people to choose among mul- tiple products and services. They also induce a powerful effect on customers' behaviour and, therefore, they undertake an influential role on the performance of business companies. Since the information available on reviews sites is often overwhelming, both consumers and companies benefit from effective techniques to automatically analysing the good disposition of the reviewers towards the tar- get product. To this aim, opinion mining [11,19] deals with the computational treatment of polarity, sentiment, and subjectivity in texts. However, opinion mining is usually context-sensitive [24], meaning that the accuracy of the senti- ment classification can be influenced by the domain of the products to which it is applied [22]. Furthermore, sentiment analysis may rely on annotated textual (cid:63) Extended version of "Mining Worse and Better Opinions. Unsupervised and Agnostic Aggregation of Online Reviews", to appear in Proc. of 17th International Web Engineering Conference (ICWE 2017). corpora, to appropriately train the sentiment classifier, see, e.g., [8]. Also, most of the existing techniques are specialised for the English language: a cross-lingual adaptation is required in order to apply them to a different target language, [10]. In this paper, we propose an original approach to aggregate reviews with sim- ilar opinions. The approach is unsupervised, since it does not rely on labelled reviews and training phases. Moreover, it is agnostic, needing no previous knowl- edge on either the reviews domain or language. Grouping reviews is obtained by relying on a novel introduced metric, called adherence, which measures how much a review text inherits from a reference terminology, automatically extracted from an unannotated reviews corpus. Leveraging an extensive experimental campaign over two large reviews datasets, in different languages, from Booking and Amazon we first demonstrate that the value of the adherence metric is informative, since it is correlated with the review score. Then, we exploit adherence to aggregate reviews according to the reviews positiveness. A further analysis on such groups highlights the most characteristic terms therein. This leads to the additional result of learning the best and worst features of a product. In Section 2, we define the adherence metric. Section 3 presents the datasets. Section 4 describes the experiments and their results. In Section 5, we report on related work in the area. Section 6 concludes the paper. 2 Review Adherence to Typical Terminology We aim at proving that positive reviews - in contrast with negative ones - are generally more adherent to the emergent terminology of the whole review col- lection. This will provide us a form of alternative polarity detection: indeed, we might estimate the relative polarity of a review by measuring how adherent it is to the domain terminology. Because a meaningful comparison against terminol- ogy requires a sizeable chunk of text, the proposed approach best applies to a set of reviews. Here, we describe how the domain terminology is extracted and we define a measure of adherence of a piece of text against such terminology. 2.1 Extracting the Terminology Every domain is characterized by key concepts, expressed by a domain termi- nology: a set of terms that are either specific to the domain (e.g., part of its jargon, such as the term "bluetooth" in the mobile domain) or that feature a specific meaning in the domain, uncommon outside of it (e.g., "monotonous" in the math domain). Identifying this terminology is important for two main reasons: i) avoiding that irrelevant terms (such as "the", "in", "of" ...) have a weight in the computation of adherence; ii) knowing which key concepts are more relevant in a set of texts provides significant insight over their content. The terminology is extracted in a domain and language agnostic way, with the benefit of not relying on domain and linguistic resources. Contrastive approaches [2] to terminology extraction only rely on sets of raw texts in the desired language: i) a set belonging to the domain of interest and ii) a few others on generic topics (e.g., a collection of books, newspaper articles, tweets -- easily obtainable, nowadays, from the Web). The contrastive approach work by comparing the characteristic frequency of the terms in the domain documents and in generic ones. The rationale is that generic, non-content words like "the", as well as non specific words, will be almost equally frequent in all the available sets, whereas words with a relevance to the domain will feature there much more prominently than they do in generic texts. There are many sophisticated ways to deal with multi-words, but any statistics- based approach needs to consider that, for n-grams3 to be dealt with appropri- ately, the data needed scales up by orders of magnitude. For our purposes, we stick to the simpler form of single-term (or 1-gram) terminology extraction. Let D be a set of documents belonging to the domain of interest D, and let G1 . . .GM be M sets of other documents (the domain of each Gi is not necessarily known, but it is assumed not to be limited to D). All terms occurring in docu- ments of D (TD) as candidate members of TD, the terminology extracted from D. For each term t, we define the term frequency (tf) of a term t in a generic set of documents S as: {d ∈ St occurs in d} tfS (t) = S (1) (probability that, picking a document d at random from S, it contains t). The tf alone is not adequate to represent the meaningfulness of a term in a set of documents, since the most frequent words are non-content words4. Because of this, inverse document frequency (idf) [23] is often used to compare the frequency of a term in a document with respect to its frequency in the whole collection. In our setting, we can however simplify things, and just compare frequencies of a term inside and outside of the domain. We do this by computing the term specificity (ts) of a term t over domain set D against all Gi's, which we define as: tsD G (t) = tfD(t) min i=1..M tfGi(t) (2) tsD G (t) is effective at identifying very common words and words that are not specific to the domain (whose ts will be close to 1), as well as words particularly frequent in the domain, with a ts considerably higher than 1. Extremely rare words may cause issues: if D and Gi's are too small to effectively represent a term, such term will be discarded by default. We chose an empirical threshold θfreq = 0.005, skipping all terms for which tfD(t) < θfreq. This value is justified by the necessity to have enough documents per term, and 0.5% is a reasonable figure given the size of our datasets. We compute ts for all t ∈ TD. We define: (3) TD = {ttsD G (t) ≥ θcutoff} To set the value of θcutoff, we might i) choose the number of words to keep (e.g., set the threshold so as to pick the highest relevant portion of TD) or ii) use 3 Constructions of n words: "president of the USA" is a 4-gram. 4 The ten most frequent words of the English language, as per Wikipedia (https:// en.wikipedia.org/wiki/Most_common_words_in_English), are "the", "be", "to", "of", "and", "a", "in", "that", "have", and "I". an empirical value (higher than 1), indicating how much more frequent we ask a term to be, being a reliably part of the terminology. For our experiments, we have used this simpler alternative, empirically setting θcutoff = 16. Higher values include fewer terms in the terminology, improving precision vs. recall, whereas lower values include more terms, negatively affecting precision. This value was the one used in the experiments conducted in [7]. 2.2 Adherence Definition The adherence (adh) of a document d to a terminology T is defined as: adhT(d) = {tt occurs in d} ∩ {t ∈ T} {tt occurs in d} (4) It represents the fraction of terms in document d that belongs to terminology T. This value will typically be much smaller than 1, since a document is likely to contain plenty of non-content words, not part of the domain terminology. The specific value of adherence is however of little interest to us: we show how more adherent reviews tend to be more positive than those with lower values of adherence, only using the value for comparison, and not on an absolute scale. 3 Datasets The first dataset consists of a collection of reviews from the Booking website, dur- ing the period between June 2016 and August 2016. The second dataset includes reviews taken from the Amazon website and it is a subset of the dataset avail- able at http://jmcauley.ucsd.edu/data/amazon, previously used in [14,15]. We also used a contrastive dataset to extract the domain terminology. Booking Dataset. For the Booking dataset, we had 1,135,493 reviews, related to 1,056 hotels in 6 cities. We only considered hotels with more than 1,000 reviews, in any language. For each review, we focused on: -- score: a real value given by the reviewer to the hotel, in the interval [2.5,10]; -- posContent: a text describing the hotel pros; -- negContent: a text describing the hotel cons; -- hotelName: the name of the hotel which the review refers to. As review text, we took the concatenation of posContent and negContent. Amazon Dataset. Reviews in the Amazon dataset are already divided accord- ing to the individual product categories. We chose two macro-categories, namely Cell Phones & Accessories and Health & Personal Care and we further selected reviews according to 6 product categories. For each review, we focused on: -- score: an integer assigned by the reviewer to the product (range [0,5]); -- reviewText: the textual content of the review; -- asin: the Amazon Standard Identification Number, that is a unique code of 10 letters and/or numbers that identifies a product. Table 1 shows statistics extracted from the Booking and the Amazon dataset. Table 1. Outline of the datasets used in this study. (a) Booking (b) Amazon City #Hotels #Rev. Product Category #Prod. #Rev. London LosAngeles NewYork Paris Rome Sydney 358 57 167 211 146 86 521852 51911 208917 111103 92321 129676 Bluetooth Headsets Bluetooth Speakers Screen Protectors Unlocked Cell Phones Magnifiers Oral Irrigators 937 93 2227 1367 210 50 124694 14941 223007 118889 12872 10768 Contrastive Terminology Dataset. In addition to the domain documents, originating from the above datasets, we used various datasets, collected for other purposes and projects, as generic examples of texts in the desired language, in order to extract the terminology as in Section 2.1. Table 2 resumes the data used to construct the contrastive dataset. 4 Experiments and Results Each dataset D is organized in categories Ci. Each category contains items that we represent by the set of their reviews Ij. When performing experiments over D, we extract the terminology of each category Ci (TCi). We then compute adhTCi (r) for each r ∈ Ij ∈ Ci (r is the single review). For the Amazon dataset, Ci are the product categories, whereas Ij's are the products (represented by their sets of reviews). For the Booking dataset, Ci are the hotel categories, whereas Ij's are the hotels (represented by their sets of reviews). We carried on experiments with and without review balancing. The latter has been considered to avoid bias: reviews with the highest scores are over-represented in the dataset, therefore the computation of the terminology can be biased towards positive terms. Thus, for each Ci and for each score, we randomly selected the same number of reviews. 4.1 Adherence Informativeness A first analysis investigates if there exists a relation between the adherence metric - introduced in Section 2 - and the score assigned to each review. Table 2. Outline of the contrastive dataset. English Italian French 220k online newspaper articles 1.28M forum posts 198k tweets 15.98M tweets 7.37M tweets Amazon Dataset. For each product category, we extract the reference ter- minology, by considering all the reviews belonging to that category against the contrastive dataset, for the appropriate language. Then, we compute the adher- ence value for each review. To show the results in a meaningful way, we grouped reviews in 5 bins, according to their score, and compute the average of the ad- herence values on each bin. The results are reported in Figure 1. The graph shows a line for each product category. Overall, it highlights that reviews with higher scores have higher adherence, implying a better correspon- dence with the reference terminology in comparison to reviews with lower scores. This result could be biased by the fact that reviews with higher scores are more represented in the dataset than the others. Therefore, we balanced the reviews in bins: we set B as the number of reviews of the less populated bin and we randomly selected the same number of reviews from the other bins. Then, we recomputed the average adherence values and we obtained the results shown in Figure 2, which confirm the trend of the previous graph. Even if the Bluetooth Speakers and Oral Irrigators categories feature a slight decreasing trend in the adherence value, when passing from reviews with score 4 to reviews with score 5, the general trend shows that the adherence metric is informative of the review score. Fig. 1. Score vs adherence - Amazon dataset - unbalanced. Fig. 2. Score vs adherence - Amazon dataset - balanced. Booking Dataset. In the second experiment, we group the hotel reviews accordingly to the city they refer to. For each city, we extract the reference terminology and we compute the adherence value for each review. To make the results comparable with the ones obtained for Amazon we re-arrange the Booking scoring system to generate a score evaluation over 5 bins. To this aim, we apply the score distribution suggested by Booking itself, since Booking scores are inflated to the top of the possible range of scores [16]. Therefore, we consider the following bin distribution: -- very poor: reviews with a score ≤ 3; -- poor: score ∈ (3, 5]; -- okay: score ∈ (5, 7]; -- good: score ∈ (7, 9]; -- excellent: score > 9. The results of the average adherence values on each bin are reported in Figure 3. A line is drawn for each city, by connecting the points in correspondence to the adherence values. The graph suggests that the average adherence is higher for reviews with higher scores. Thus, the higher the score of the hotel reviews, the more adherent the review to the reference terminology. To avoid the bias caused by the over-representation of the positive reviews in the dataset, we compute the average adherence values by using a balanced number of reviews for each bin. The results, reported in Figure 4, confirm the trend of the previous graph, even if the slope is smaller. Fig. 3. Score vs adherence - Booking - un- balanced. Fig. 4. Score vs adherence - Booking - bal- anced. Working on balanced bins, the typical terminology of the reviews corpus has been recalculated, with respect to what computed for the original, unbalanced dataset. Thus, even considering the less populated bin, the average adherence value for the balanced dataset is not the same as the one in the unbalanced dataset for the same bin (this holds both for Booking and Amazon datasets). The under-sampling applied to the majority classes to balance the reviews number leads to a deterioration of the results (both for Amazon and Booking - Figures 2 and 4. 4.2 Good Opinions, Higher Adherence Interestingly, in the Booking dataset, the text of each review is conveniently divided into positive and negative content. Thus, we perform an additional ex- periment, by only considering positive and negative chunks of reviews. For each city, we group positive and negative contents of reviews and we compute the adherence value for each positive and negative chunk, with respect to the ref- erence terminology. Finally, we average the adherence values according to the score bins. The results are reported in Figure 5, for the unbalanced dataset. In the graph, we report two lines for each city: the solid (dashed) lines are obtained by considering the positive (negative) contents of reviews. The same colour for solid and dashed line corresponds to the same city. We also perform the same calculation by considering a balanced dataset (Figure 6). Fig. 5. Score vs adherence - Booking un- balanced dataset - considering positive and negative contents separately. Fig. 6. Score vs adherence - Booking bal- anced dataset - considering positive and negative contents separately. Both the graphs highlight that there is a clear division between the solid and dashed lines. In particular, the average adherence obtained considering pos- itive contents is, for most of the bins, above the average adherence computed considering negative contents. This separation is more evident when the review score increases (it does not hold for very poor scores). Overall, positive aspects of a hotel are described with a less varied language with respect to its negative aspects. Probably, this phenomenon occurs because unsatisfied reviewers tend to explain what happened in details. In addition to the average value, we also computed the standard deviation within each bin, that resulted to be quite high, as reported in Table 3, Table 4, Table 5 and Table 6. This suggests that, even correlated with the score, the adherence is not a good measure when considering a single review, but its infor- mativeness should be rather exploited by considering an ensemble of reviews, as detailed in Section 4.4. 4.3 Extension to Different Languages The experiments described so far were realised by considering a subset of reviews in English, taken from the original Booking dataset, which features other lan- guages too. To further evaluate the informativness of the adherence metric, we selected two additional review subsets, in Italian and in French. For each subset, Table 3. Average adherence and the average standard deviation for six Amazon cat- egories - unbalanced dataset. Bluetooth Bluetooth Magnifiers Headsets Speakers Oral Unlocked Irrigators Protectors CellPhones Screen Bin Avg Std Avg Std Avg Std Avg Std Avg Std Avg 1 2 3 4 5 0.17 0.18 0.19 0.21 0.21 0.07 0.07 0.07 0.08 0.09 0.16 0.19 0.20 0.24 0.26 0.08 0.07 0.08 0.09 0.11 0.15 0.15 0.16 0.17 0.18 0.08 0.07 0.08 0.08 0.09 0.17 0.07 0.18 0.07 0.19 0.07 0.21 0.08 0.22 0.08 0.16 0.16 0.16 0.18 0.20 0.07 0.07 0.07 0.08 0.09 0.15 0.15 0.16 0.18 0.19 Std 0.06 0.06 0.07 0.08 0.10 Table 4. Average adherence and the average standard deviation for six Amazon cat- egories - balanced dataset. Bluetooth Bluetooth Magnifiers Headsets Speakers Oral Unlocked Irrigators Protectors CellPhones Screen Bin Avg Std Avg Std Avg Std Avg Std Avg Std Avg 1 2 3 4 5 0.17 0.19 0.19 0.21 0.21 0.07 0.07 0.07 0.08 0.09 0.18 0.2 0.21 0.23 0.23 0.08 0.07 0.08 0.08 0.09 0.16 0.16 0.16 0.17 0.18 0.08 0.08 0.08 0.08 0.09 0.18 0.07 0.19 0.06 0.2 0.07 0.22 0.08 0.21 0.08 0.17 0.17 0.16 0.18 0.19 0.07 0.07 0.07 0.08 0.09 0.15 0.16 0.16 0.18 0.18 Std 0.06 0.06 0.07 0.08 0.09 Table 5. Average adherence and the average standard deviation for six Booking cities - unbalanced dataset. London LosAngeles NewYork Paris Rome Sydney Bin Avg Std Avg Std Avg Std Avg Std Avg Std Avg Std 1 2 3 4 5 0.18 0.15 0.23 0.16 0.27 0.17 0.29 0.19 0.30 0.19 0.17 0.21 0.24 0.27 0.27 0.13 0.15 0.16 0.17 0.18 0.17 0.15 0.23 0.16 0.26 0.17 0.28 0.18 0.28 0.18 0.18 0.14 0.24 0.17 0.28 0.18 0.32 0.19 0.32 0.19 0.18 0.14 0.22 0.15 0.26 0.17 0.30 0.18 0.32 0.18 0.20 0.16 0.21 0.15 0.22 0.15 0.26 0.18 0.29 0.19 Table 6. Average adherence and the average standard deviation for six Booking cities - balanced dataset. London LosAngeles NewYork Paris Rome Sydney Bin Avg Std Avg Std Avg Std Avg Std Avg Std Avg Std 1 2 3 4 5 0.24 0.18 0.25 0.16 0.27 0.17 0.30 0.19 0.30 0.20 0.22 0.23 0.25 0.27 0.28 0.15 0.16 0.16 0.17 0.19 0.25 0.22 0.25 0.17 0.27 0.17 0.29 0.19 0.29 0.19 0.24 0.18 0.26 0.18 0.29 0.18 0.32 0.20 0.31 0.18 0.24 0.17 0.26 0.17 0.29 0.16 0.31 0.18 0.32 0.19 0.27 0.23 0.25 0.16 0.23 0.14 0.28 0.18 0.30 0.21 we drawn two graphs, the first considering all the reviews content, the second the separation between positive and negative contents. For these experiments, we considered imbalanced bins, due to the limited number of reviews available in each language. The results are reported in Figure 7. (a) All content, Italian (b) Positive/negative content, Italian (c) All content, French (d) Positive/negative content, French Fig. 7. Score vs adherence - Booking unbalanced dataset - reviews in Italian and French. Essentially, in both cases, it is confirmed that the higher the score, the higher the adherence when considering the overall text (Figure 7-a and Figure 7-c). Similarily, the graphs in Figure 7-b and Figure 7-d show a clear division between positive and negative adherence values, when the score increases. 4.4 Language and Domain-Agnostic Reviews Aggregation In this section, we present an application of the outcome found in previous ones. Given a set of texts, we propose to aggregate texts with positive polarity and texts with negative polarity, without a priori knowing the text language and do- main, and without using any technique of Natural Language Processing (NLP), while exploiting only the adherence metric. We apply the following methodology: 1. For each review r ∈ Ij ∈ Ci we compute the adherence adhTCi 2. Reviews r ∈ Ij are sorted in ascending order w.r.t. their adherence value. 3. Ordered reviews are split in bins with the same cardinality. We defined Kbins bins, each holding {r ∈ Ij}/Kbins reviews in ascending order of adherence. 4. For each bin Bi, we compute the average of the adherence value of the reviews (r), as well as, for the purposes of valida- it contains: Avgadh,i = 1 R tion, the average score provided by those reviews, Avgscore,i = 1 R (cid:80) score(r). (cid:80) adhTCi (r). 5. Finally, we aim at proving that, when the average adherence value of each bin increases, the average score value also increases. Thus, we compute the percentage of Ij ∈ Ci for which we observe: Avgscore,Kbins ≥ Avgscore,1 Avgscore,i ≥ Avgscore,i−1 (5) (6) is the average score for the last bin, Avgscore,1 is the where Avgscore,Kbins average score for the first bin, and i = 1, . . . , Kbins. Table 7 reports the results for the Amazon dataset. For each category Ci, we apply the methodology three times, modifying the minimum number of reviews (minRev ) for each item Ij, in order to discard items with few reviews. We set Kbins=3 and we report the number of items (#I) and the total number of reviews (#Rev) considered, plus the percentage of Ij ∈ Ci for which (5) is true (%). Table 7. Amazon dataset - parameters: equation (5), bins = 3. Category Ci minRev=20 minRev=50 minRev=100 BluetoothHeadsets BluetoothSpeakers ScreenProtectors UnlockedCellPhones 1116 143 Magnifiers OralIrrigators 48 82 #Ij #Rev 817 108693 13155 1741 174320 97049 8763 10301 423 54 (%) #Ij #Rev 96393 86 12278 96 781 144597 83 78836 542 89 5714 46 72 32 9832 85 223 27 (%) #Ij #Rev 82723 93 10423 100 370 116337 90 58788 257 94 3694 18 87 91 21 8987 (%) 97 100 96 97 100 90 This result shows that, considering 3 bins, the percentage of items for which the average score of the last bin is higher than the average score of the first bin is above 80% for each category (except for Magnifiers in case the minimum number of reviews is 20). Nevertheless, the percentage grows in almost all cases, when the minimum number of reviews increases. It exceeds 90% for every category, when the minimum number of reviews is, at least, 100. Therefore, in the majority of cases, it is true that, when the average adher- ence of reviews belonging to the last bin is higher than the average adherence of reviews included in the first bin, the same relation exists between their cor- respondent average scores. This finding is mostly supported when we consider only items with many reviews (at least 100). For the Booking dataset, we straight consider only hotels with at least 100 reviews. We perform three experiments according to the languages of reviews (English, Italian, and French). For each experiment, Kbins=3 and we report the number of items (#I), the total number of reviews (#Rev) considered and the percentage of Ij ∈ Ci for which (5) is true (%). The results are in Table 8. The percentage of items for which the average score of the last bin is higher than the average score of the first bin is above 90% in all the cases. Table 8. Booking dataset considering different languages - parameters: equation (5), bins = 3. Not enough Italian reviews were available for Los Angeles and Sydney. Category Ci London LosAngeles NewYork Paris Rome Sydney 56 English #Ij #Rev 356 467863 46700 163 182438 93164 211 144 68543 74 126744 Italian (%) #Ij #Rev 76 11952 97 93 - 6518 95 806 96 64 11040 97 100 - - 27 6 - French (%) #Ij #Rev 123 20507 96 - 993 60 10753 93 72 12623 100 4197 28 94 - 4 553 7 (%) 94 100 90 90 93 100 Thus, given a set of reviews on, e.g., hotels, or restaurants, in any language, we can identify a group of reviews that, on average, express better opinions than another group of reviews. Noticeably, this analysis works even if the associated score is not available, i.e., it can be applied to general comments about items. We consider now if also relation (6) is verified for each bin i = 1, . . . , Kbins, i.e., if the function between the ordered sets of average adherence values Avgadh,i and average score values Avgscore,i is a monotonic function. By plotting the average score vs the average adherence, for some items, we found out a general upward trend. Nevertheless, there were many spikes that prevent the function from being monotonic. Then, we tried to smooth down the curves by applying a moving average with window = 2 and we then computed the percentage of Ij ∈ Ci for which (6) was verified. For the Amazon dataset, we performed three experiments, modifying the minimum number of reviews required (minRev ) for each item, in order to discard items with few reviews. Results are in Table 9. Such results are worse with respect to the ones in Table 7. Nevertheless, in all cases (but Oral Irrigators), the percentage values increase when minRev increase (for Magnifiers, it remains the same with minRev = 50, 100). When minRev = 100, the percentage of Ij ∈ Ci for which (6) is true is above 72%. For the Booking dataset, due to the high number of available reviews, we also varied the number of bins from 3 to 5. We only considered reviews in English Table 9. Amazon dataset - parameters: equation (6), bins = 3. Category Ci BluetoothHeadsets BluetoothSpeakers UnlockedCellPhones Magnifiers OralIrrigators ScreenProtectors minRev=20 (%) minRev=50 (%) minRev=100 (%) 69 88 69 58 77 58 76 93 72 72 81 66 82 96 77 72 76 73 and computed the percentage of items for which the equation (6) is true. Table 10 shows a clear degradation of performances when the number of bin increases. Table 10. Booking dataset - parameters: equation (6). Category Ci bins=3 (%) bins=4 (%) bins=5 (%) London LosAngeles New York Paris Rome Sydney 83 75 66 65 82 92 95 88 88 87 94 95 67 61 47 40 67 85 So far, the results indicate a relation between the increasing adherence values and the increasing score values. However, we cannot prove a strong correlation between adherence and score, either considering a single review or groups of reviews. Therefore, we followed a different approach, by computing, for each item Ij ∈ Ci, the difference between the average values of the first and last bin, both for the adherence and the score: ∆adh(j) = Avgadh,Kbins ∆score(j) = Avgscore,Kbins − Avgadh,1 − Avgscore,1 If we average such differences for all the items Ij ∈ Ci, both for adherence and score, we obtain an average value for each category Ci: AvgDadh = AvgDscore = 1 J 1 J J(cid:88) J(cid:88) j=1 j=1 ∆adh(j) ∆score(j) (7) (8) where J is the total number of items j ∈ Ij. (a) Bluetooth headsets (b) Bluetooth speakers (c) London (en) (d) New York (en) Fig. 8. Average differences for Amazon and Booking example categories. Figure 8 shows the values of (7) and (8) for items belonging to some of the Amazon and Booking categories. In each graph, the x-axis reports the number of bins considered, wheres the y-axis represents the average differences values. We depicted the average differences for the adherence with a solid red line, while the average differences for the score with a dashed blue line. The graphs clearly show that, when the number of bin increases, the first and last bin include reviews which describe the product in a considerably different way, in term of positiveness. Thus, given a category, it is possible to discriminate among groups of reviews, related to that category, in such a way that each group expresses an opinion different from the others, ordered from the most negative to the most positive ones (or vice-versa). 4.5 Representative Terms in First and Last Bins Here, we extract the most recurrent terms in the positive and negative groups of reviews. Given an item (either a hotel or a product), we consider the terms included in the positive set and in the negative set (last and first bins, with Kbins = 10) that can be also found in the extracted terminology. For each term, we compute the term frequency -- inverse document frequency (tf-idf) value (in this case, tf is the term frequency inside the bin, that is the number of reviews that include such term), we sort the terms accordingly and we select the first 20 ones for the positive and negative set. We then remove the terms common to both sets, in order to identify the most discriminating ones. Table 11 shows the terms extracted for two Amazon products. Table 11. The most relevant positive and negative terms for two Amazon products. Product Negative Positive Terms Score Terms B005XA0DNQ refund, packag- ing, casing, discon- nected, gift, battery, packaged, addition, plugging, hooked, 99, hook, shipping, speaker, purpose, sounds, kitchen B0083RXA86 impressive, stereo, charger, mostly, product, button, charging, switch, louder, useless, price, usb 2.9 2.4 sound, compact, great, retractable, portable, very, price, unbelievable, satis- easy, fied, product, recommend, small, perfect, little, handy, size very, charge, use- blue, ful, coating, satisfied, quite, bat- tery, enough, music, attachment, excel- lent, highly, quality, pleased Score 4.3 4.6 Table 12. The most relevant positive and negative terms for the Amazon categories. Product Negative terms Positive terms BluetoothHeadsets charge, item, amazon, hear, purchased, device, problem, bought clear, fit, recommend, highly, music, easy, excel- lent, comfortable, quality BluetoothSpeakers ScreenProtectors speakers, volume, gift, reviews, charge, item, amazon, music, purchased, charging, bought purchase, cover, bought, item, iphone, pack, instruc- tions UnlockedCellPhones buy, phone, phones, seller, everything, amazon, problem, item, cell, iphone, bought AppetiteControl tried, these, hungry, try, pills, reviews, products, oz, bottle, waste, eat, bought little, portable, excellent, recom- bluetooth, mend, sounds, highly, quality, size small, easy, perfect, clear, highly, fits, apply, perfectly samsung, perfect, excellent, fast, card, easy, recommend, android, quality, sim cambogia, garcinia, loss, pounds, ommend, definitely, exercise lost, rec- highly, extract, diet, lose, After having extracted the terms for every item, we calculate their frequency within a whole category. Again, we remove the terms common to both sets (pos- itive and negative), to highlight the most representative positive and negative terms for the category. Table 12 shows the terms extracted for the five Amazon categories with more reviews. Table 13 shows the terms extracted for some Book- ing categories, for English, Italian and French. However, for Italian and French, few examples are shown, due to the low number of reviews for such datasets. 5 Related Work Terminology extraction. Automatic terminology extraction is one of the pillars of many terminology engineering processes, such as text mining, information retrieval, ontology learning, and semantic web technologies. The aim is to au- tomatically identify relevant concepts (or terms) from a given domain-specific corpus. Within a collection of candidate domain-relevant terms, actual terms are separated from non-terms by using statistical and machine learning methods [20]. Here, we rely on contrastive approaches, where the identification of relevant candidates is performed through inter-domain contrastive analysis [21,6,1]. Opinion Mining. Opinion mining techniques aim at automatically identifying polarities and sentiments in texts[11], by, e.g., extracting subjective expressions Table 13. The most relevant positive and negative terms for Booking categories. City Negative terms Positive terms London (en) booked, bar, floor, wifi, stayed, stay, shower, receptionist, recep- tion, booking, hotels New York (en) booked, square, checked, floor, door, reception, desk, reservation, booking, ho- tels stayed, stay, helpful, cleanliness, convenient, quiet, comfortable, beds, facil- ities, clean, excellent, friendly, size bathroom, perfect, helpful, cleanliness, comfortable, beds, clean, excellent, small, noisy, friendly, size Rome (it) Paris (fr) albergo, prenotazione, servizi, stanze, hotel, sog- giorno, reception, doccia, book- ing struttura, cortesia, gentile, disponibile, confortevole, termini, ottima, gentilezza, abbondante, pulita, cordiale gare, chambres, accueil, emplacement, anglais, hotel, clients, avons, sol, londres, wifi, lit, chambre, r´eservation, hotel, r´eception, pay´e, bruit, booking confortable, salle, g´eographique, d´ejeuner, petite, proche, petit, qualit´e, quartier, tr`es, m´etro, calme, propret´e, literie, situation, agr´eable, proximit´e, bain propre, representing personal opinions and speculations[25] or detecting so called con- textual polarity of a word, i.e., the polarity acquired by the word contextually to the sentence in which it appears, see, e.g., [26,27,17]. Often, opinion min- ing rely on lexicon-based approaches, involving the extraction of term polarities from sentiment lexicons and the aggregation of such scores to predict the overall sentiment of a piece of text, see, e.g., [5,8,4,3]. Clustering Opinions. Unsupervised learning does not require labelled data for the training process. Among them, clustering algorithms can be profitably used to find the natural clusters in the data, by calculating the distances or similari- ties from the centres of the clusters. Few efforts have been devoted to the study of polarity detection in online reviews with clustering techniques. In [9], the authors present the clustering-based sentiment analysis approach, by applying three different techniques, namely TF-IDF weighting, voting mechanism and en- hancement by hybrid with scoring method. In [13,12], the authors describe and experimental study of some common clustering techniques used for sentiment analysis of online reviews and investigate how any step of the clustering pro- cess (pre-processing, term weighting, clustering algorithm) can affect clustering results. The work in [18] studies the relationship between online movie reviews and the box office incomes. The detection of sentiments is carried out by using tf and idf values as features and Fuzzy Clustering as algorithm. Here, we proposed an alternative approach to polarity detection, relying on automatic terminology extraction, in a domain and language agnostic fashion, and not relying on linguistic resources. 6 Final Remarks We presented a novel approach for aggregating reviews, based on their polarity. The methodology did not require pre-labeled reviews and the knowledge of the reviews' domain and language. We introduced the adherence metric and we demonstrated its correlation with the review score. Lastly, we relied on adherence to successfully aggregate reviews, according to the opinions they express. Acknowledgments. Research partly supported by MSCA-ITN-2015-ETN grant agreement #675320 (European Network of Excellence in Cybersecurity) and by Fondazione Cassa di Risparmio di Lucca, financing the project Reviewland. References 1. Basili, R., et al.: A contrastive approach to term extraction. In: Terminologie et intelligence artificielle. Rencontres. pp. 119 -- 128 (2001) 2. Bonin, F., et al.: A contrastive approach to multi-word extraction from domain- specific corpora. In: Language Resources and Evaluation. ELRA (2010) 3. Bravo-Marquez, F., et al.: Building a twitter opinion lexicon from automatically- annotated tweets. Knowledge-Based Systems 108, 65 -- 78 (2016) 4. Cambria, E., Hussain, A.: Sentic Computing: A Common-Sense-Based Framework for Concept-Level Sentiment Analysis. Springer (2015) 5. Cambria, E., et al.: SenticNet 3: a common and common-sense knowledge base for cognition-driven sentiment analysis. In: 28th AAAI Artificial Intelligence. pp. 1515 -- 1521 (2014) 6. Chung, T.M., Nation, P.: Identifying technical vocabulary. System 32(2), 251 -- 263 (2004) 7. Del Vigna, F., Petrocchi, M., Tommasi, A., Zavattari, C., Tesconi, M.: Semi- supervised knowledge extraction for detection of drugs and their effects. In: Social Informatics I (2016) 8. Esuli, A., Sebastiani, F.: SENTIWORDNET: A publicly available lexical resource for opinion mining. In: Language Resources and Evaluation. pp. 417 -- 422 (2006) 9. Li, G., Liu, F.: Application of a clustering method on sentiment analysis. J. Inf. Sci. 38(2), 127 -- 139 (2012) 10. Ling Lo, S., et al.: A multilingual semi-supervised approach in deriving Singlish sen- tic patterns for polarity detection. Knowledge-Based Systems 105, 236 -- 247 (2016) 11. Liu, B.: Sentiment Analysis and Opinion Mining. Morgan & Claypool (2012) 12. Ma, B., Yuan, H., Wu, Y.: Exploring performance of clustering methods on docu- ment sentiment analysis. Information Science (2015) 13. Ma, B., et al.: A comparison study of clustering models for online review sentiment analysis. In: Web-Age Information Management. pp. 332 -- 337. Springer (2013) 14. McAuley, J., Pandey, R., Leskovec, J.: Inferring networks of substitutable and complementary products. In: 21th KDD. pp. 785 -- 794. ACM (2015) 15. McAuley, J., et al.: Image-based recommendations on styles and substitutes. In: 38th Research and Development in Information Retrieval. pp. 43 -- 52. ACM (2015) 16. Mellinas, J.P., Mar´ıa-Dolores, S.M.M., Garc´ıa, J.J.B.: Booking.com: The unex- pected scoring system. Tourism Management 49, 72 -- 74 (2015) 17. Muhammad, A., Wiratunga, N., Lothian, R.: Contextual sentiment analysis for social media genres. Knowledge-Based Systems 108, 92 -- 101 (2016) 18. Nagamma, P., et al.: An improved sentiment analysis of online movie reviews based on clustering for box-office prediction. In: Computing, Communication and Au- tomation. pp. 933 -- 937 (2015) 19. Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1-2), 1 -- 135 (2008) 20. Pazienza, M.T., et al.: Terminology extraction: An analysis of linguistic and sta- tistical approaches. In: Knowledge Mining, pp. 255 -- 279. Springer (2005) 21. Penas, A., Verdejo, F., Gonzalo, J.: Corpus-based terminology extraction applied to information access. In: Corpus Linguistics. vol. 13, pp. 458 -- 465 (2001) 22. Ren, Y., Zhang, Y., Zhang, M., Ji, D.: Context-sensitive Twitter sentiment classi- fication using neural network. In: Artificial Intelligence. pp. 215 -- 221. AAAI (2016) 23. Salton, G., Buckley, C.: Term-weighting approaches in automatic text retrieval. Inf. Process. Management 24(5), 513 -- 523 (1988) 24. Turney, P.D.: Thumbs up or thumbs down?: Semantic orientation applied to un- supervised classification of reviews. In: Computational Linguistics Meeting. pp. 417 -- 424. ACL (2002) 25. Wilson, T., et al.: OpinionFinder: A system for subjectivity analysis. In: HLT/EMNLP on Interactive Demonstrations. pp. 34 -- 35. ACL (2005) 26. Wilson, T., et al.: Recognizing contextual polarity in phrase-level sentiment anal- ysis. In: HLT/EMNLP. pp. 347 -- 354. ACL (2005) 27. Wilson, T., et al.: Recognizing contextual polarity: An exploration of features for phrase-level sentiment analysis. Comput. Linguist. 35(3), 399 -- 433 (2009)
1512.01043
1
1512
2015-12-03T11:29:36
Approaches for Sentiment Analysis on Twitter: A State-of-Art study
[ "cs.SI", "cs.CL", "cs.IR" ]
Microbloging is an extremely prevalent broadcast medium amidst the Internet fraternity these days. People share their opinions and sentiments about variety of subjects like products, news, institutions, etc., every day on microbloging websites. Sentiment analysis plays a key role in prediction systems, opinion mining systems, etc. Twitter, one of the microbloging platforms allows a limit of 140 characters to its users. This restriction stimulates users to be very concise about their opinion and twitter an ocean of sentiments to analyze. Twitter also provides developer friendly streaming API for data retrieval purpose allowing the analyst to search real time tweets from various users. In this paper, we discuss the state-of-art of the works which are focused on Twitter, the online social network platform, for sentiment analysis. We survey various lexical, machine learning and hybrid approaches for sentiment analysis on Twitter.
cs.SI
cs
Approaches for Sentiment Analysis on Twitter: A State-of-Art study Harsh Thakkar and Dhiren Patel Department of Computer Engineering, National Institute of Technology, Surat-395007, India {harsh9t,dhiren29p}@gmail.com Abstract. Microbloging is an extremely prevalent broadcast medium amidst the Internet fraternity these days. People share their opinions and sentiments about variety of subjects like products, news, institutions, etc., every day on mi- crobloging websites. Sentiment analysis plays a key role in prediction systems, opinion mining systems, etc. Twitter, one of the microbloging platforms allows a limit of 140 characters to its users. This restriction stimulates users to be very concise about their opinion and twitter an ocean of sentiments to analyze. Twit- ter also provides developer friendly streaming API for data retrieval purpose al- lowing the analyst to search real time tweets from various users. In this paper, we discuss the state-of-art of the works which are focused on Twitter, the online social network platform, for sentiment analysis. We survey various lexical, ma- chine learning and hybrid approaches for sentiment analysis on Twitter. Keywords. Microbloging, Sentiment Analysis, Online Social Network, Opin- ion Mining. 1 Introduction Sentiment analysis is a challenge of the Natural Language Processing (NLP), text analytics and computational linguistics. In a general sense, sentiment analysis deter- mines the opinion regarding the object/subject in discussion. Its initial use was made to analyze sentiment based on long texts such as letters, emails and so on. It is also deployed in the field of pre- as well as post-crime analysis of criminal activities. With the explosion of internet applications such as microbloging websites, forums and social networks, this field of study gained its limelight of late. People discuss, com- ment and criticize various topics, and write reviews, recommendations, etc. using these applications. User generated data carries a lot of valuable information on prod- ucts, people, events, and so on. The cut throat competition of the modern world has led to advanced mechanisms of customer feedback and satisfaction-to-innovation cycle. The large user generated content requires the use of automated techniques for mining and analyzing since crowd sourced mining and analysis are difficult. Work in this area originated early from its applications in blogs [1] and product/movie [2] reviews. Today, traditional news outlets have an online version of their news. Applying this field with the microbloging fraternity is a challenging job. This chal- lenge became our motivation. Substantial research has been carried out in both ma- chine learning and the lexical approaches to sentimental analysis for social networks. We summarize the work done so far will aim to improve the existing approaches Rest of the paper is organized as follows: Section 2 discusses background of sentiment analysis, section 3 summarizes the results obtained from the survey of approaches to sentiment analysis, and finally in section 4 we conclude our paper with conclusion and references at the end. 2 Background Sentiment analysis has been practiced on a variety of topics. For instance, sentiment analysis studies for movie reviews [4], product reviews [5], and news and blogs ([3], [6]). In this section, Twitter specific sentiment analysis approaches are reported. The research on sentiment analysis so far has mainly focused on two things: identifying whether a given textual entity is subjective or objective, and identifying polarity of subjective texts [3]. Most sentiment analysis studies use machine learning approaches. In sentiment analysis domain, the texts belong to either of positive or negative classes. There may also be multi-valued or binary classes like positive, negative and neutral (or irrelevant). The core complexity of classification of texts in sentiment analysis with respect to that of other topic-based cataloging is due to the non-usability of keywords [2], despite the fact that the number of classes in sentiment analysis is less than that in the later approach by [4]. Opinion mining (sentiment extraction) is employed on Twitter posts by means of following techniques  Lexical analysis  Machine learning based analysis  Hybrid/Combined analysis 2.1 Lexical analysis This technique is governed by the use of a dictionary consisting pre-tagged lexicons. The input text is converted to tokens by the Tokenizer. Every new token encountered is then matched for the lexicon in the dictionary. If there is a positive match, the score is added to the total pool of score for the input text. For instance if “dramatic” is a positive match in the dictionary then the total score of the text is incremented. Other- wise the score is decremented or the word is tagged as negative. Though this tech- nique appears to be amateur in nature, its variants have proved to be worthy ([11], [8]). Fig. 1 shows the working of a lexical technique. Yes No Fig. 1. Working of a lexical technique. The classification of a text depends on the total score it achieves. Considerable amount of work has been devoted for measuring which best lexical information works. An accuracy of about 80% on single phrases can be achieved by the use of hand tagged lexicons comprised of only adjectives, which are crucial for deciding the subjectivity of an evaluative text as demonstrated by [9]. The author of [7] extended this work making use of same methodology and tested a database of movie reviews, reported an accuracy of mere 62%. Other than the hand tagged lexicon approach, [2] came up with a variant by utilizing internet search engine for marking the polarity of words included in work of [7]. They used two AltaVista search engine queries: target word + „good‟ and other target word + „bad‟. The score was evaluated by the search that yielded the max number of hits, which reported to improve the earlier accuracy from 62% to 65%. In Subsequent research ([8], [10]) the scoring of words was ac- complished by using the WordNet database. They compared the target word with two pivot words („good‟ and „bad‟) and found the Minimum Path Distance (MPD) be- tween the words in the WordNet pyramid. The MPD is the converted to an incremen- tal score, which is stored in the word dictionary. This variant was reported to yield accuracy [10] of 64%. The author of [11] proposes another method which presents an alternative to ([8], [10]), taking motivation from [9], by evaluating the semantic gap between the words simply subtracting the set of positive ones from the negative ones yielding 82% accuracy. Lexical analysis has a limitation: its performance (in terms of time complexity and accuracy) degrades drastically with the exponential growth of the size of dictionary (number of words). 2.2 Machine learning based analysis Machine learning is one of the most prominent techniques gaining interest of re- searchers due to its adaptability and accuracy. In sentiment analysis, mostly the su- pervised learning variants of this technique are employed. It comprises of three stag- es: Data collection, Pre-processing, Training data, Classification and plotting results. In the training data, a collection of tagged corpora is provided. The Classifier is pre- sented a series of feature vectors from the previous data. A model is created based on the training data set which is employed over the new/unseen text for classification purpose. In machine learning technique, the key to accuracy of a classifier is the se- lection of appropriate features. Generally, unigrams (single word phrases), bi-grams (two consecutive phrases), tri-grams (three consecutive phrases) are selected as fea- ture vectors. There are a variety of proposed features namely number of positive words, number of negative words, length of the document, Support Vector Machines (SVM) ([14], [15]), and Naïve Bayes (NB) algorithm [16]. Accuracy is reported to vary from 63% to 80% depending upon the combination of various features selected. Fig. 2 shows the typical number of steps involved in a machine learning technique. Working of this technique can be explained as follows: First Step: Data Collecting – in this stage data to be analyzed is crawled from various sources like Blogs, Social networks (Twitter, MySpace, etc.) depending upon the area of application. Second Step: Pre-processing – In this stage, the acquired data is cleaned and made ready for feeding it into the classifier. Cleaning includes extraction of keywords and symbols. For instance – Emoticons are the smiley used in textual form to repre- sent emotions e.g. “:-)”, “:)”, “=)”, “:D”, “:-(“, “:(“, “=(“, “;(“, etc.. Correcting the all uppercase and all lowercase to a common case, removing the non-English (or prof- fered language texts), removing un-necessary white spaces and tabs, etc. Third Step: Training Data – A hand-tagged collection of data is prepared by most commonly used crowd-sourcing method. This data is the fuel for the classifier; it will be fed to the algorithm for learning purpose. Fourth Step: Classification – This is the heart of the whole technique. Depending upon the requirement of the application SVM or Naïve bayes is deployed for analysis. The classifier (after completing the training) is ready to be deployed to the real time tweets/text for sentiment extraction purpose. Fifth Step: Results – Results are plotted based on the type of representation selected i.e. charts, graphs, etc. Performance tuning is done prior to the release of the algorithm. Fig. 2. Steps involved in the machine learning approach. The machine learning technique faces challenges in: designing a classifier, availa- bility of training data, correct interpretation of an unforeseen phrase. It overcomes the limitation of lexical approach of performance degradation and it works well even when the dictionary size grows exponentially. 2.3 Hybrid analysis The advances in sentiment analysis lured researchers to explore the possibility of a hybrid approach which could collectively exhibit the accuracy of a machine learning approach and the speed of lexical approach. In [17] authors use two-word lexicons and an unlabeled data, dividing these two-word lexicons in two discrete classes nega- tive and positive. Pseudo documents encompassing all the words from the set of cho- sen lexicons are created. Then computed the cosine similarity amongst the pseudo documents and the unlabeled documents. Depending upon the measure of similarity, the documents were either assigned a positive or a negative sentiment. This training dataset was then fed to a naïve bayes classifier for training purpose. Another approach presented by [18], derived a “unified framework” using back- ground lexical information as word class associations. Authors renewed information for particular areas using the available datasets or training examples and proposed a classifier called as Polling Multinomial Classifier (PMC) (also known as the multi- nomial naïve bayes). Manually labeled data was incorporated for training purpose. They claimed that making use of lexical knowledge improved performance. Another variant of this approach was presented by [19]. But so far only [18] have been able to claim good results. 3 Summary In a survey conducted by [20], comparison of all approaches has showed that best results have been observed from machine learning approaches, and least by lexical approaches. However, without any proper training of a classifier in machine learning approach results may deteriorate drastically. Work is being carried on hybrid ap- proaches; hence so far only limited information is available to our knowledge. The techniques were tested by [20] on a movie review & recommendation and news review area based on user tweets. Their results seem to be promising for further research. For the training purpose of the classifiers, they used: Cornel movie review dataset [2], General inquirer adjective lists [12], yahoo web search API [13], Porter stemmer [22], WordNet Java API [23], Stanford log linear POS tagger with Penn Treebank tag set [23], WEKA M.L. java API (only for Machine Learning purpose) [24], SVM-light ML implementation (M.L. classifier) [25]. The results are summa- rized in Table 1. Table 1. Summary of accuracy in % of various techniques of sentiment analysis derived from tests carried out by [20] and our other survey (* - approx). Including features Baseline (as is) Baseline, stemming Baseline , WordNet Baseline , Yahoo web search Baseline, all above Approach Lexical [20] Lexical [20] Lexical ([8],[10]) Lexical [20] Lexical [20] Machine Learning ([14],[15]) SVM , Unigrams Machine Learning ([14],[15]) SVM , Unigrams , Aggregate Machine Learning [16] Machine Learning [16] Naïve Bayes , Unigrams Naïve bayes , Unigrams , Aggregate Accuracy 50 50.2 60.4 57.7 55.7 *~77 65 - 68 75 - 77 ~77-78 On the other hand hybrid approaches are showing the following general sentiment analysis results: Table 2. Summary of accuracy in % of various hybrid approaches derived from tests carried out by [20] and our other survey. Approach Hybrid [17] Hybrid [19] Hybrid [18] Features Class-two Naïve bayes , unlabeled data SVM + Naïve bayes , emoticons Class-two Naïve bayes , twitter datasets Accuracy ~64 70 ~84 4 Conclusion Open social networks are best examples of sociological trust. The exchange of mes- sages, followers and friends and varying sentiments of users provide a crude platform to study behavioral trust in sentiment analysis domain. Machine learning approaches have been so far good in delivering accurate results. Depending upon the application, the success of any approach will vary. Lexical approach is a ready-to-go and doesn‟t require any prior information or training. While on the other hand machine learning requires a well-designed classifier, huge amount of training data sets and performance tuning prior to deployment. Hybrid approach has so far displayed positive sentiment as far as performance is concerned. Though they have been deployed using unigrams and diagrams, their performance is worse on trigrams. This definitely leaves research- ers to explore the terrain. References 1. Bautin, M., Vijayrenu , L., and Skenia, International sentiment analysis for news and blogs. In Second Int. Conf. on Weblogs and Social Media ICWSM (2008) 2. Turney, P. D.: Thumbs up or thumbs down?. Semantic orientation applied to unsupervised classification of reviews. In Proceedings of the 40th annual meeting of the Association for Computational Linguistics (2002) 417–424 3. B. Pang and L. Lee,: Opinion mining and sentiment analysis. Foundations and Trends in Information Retrieval, vol. 2, no. 1-2 (2008) 1-135 4. B. Pang and L. Lee: Using very simple statistics for review search: An exploration. In Pro- ceedings of the International Conference on Computational Linguistics (COLING), (2008) 5. K. Dave, S. Lawrence, and D. M. Pennock,: Mining the peanut gallery: Opinion extraction and semantic classification of product reviews (2003) 519-528 6. N. Godbole, M. Srinivasaiah, and S. Skiena,: Large-scale sentiment analysis for news and blogs (2007) 7. Kennedy, A., Inkpen, D.,: Sentiment Classification of Movie and Product Reviews Using Contextual Valence Shifters, Computational Intelligence (2006) 110–125 8. Kamps J., Marx, M., Mokken, R.J.,: Using WordNet to Measure Semantic Orientation of Adjectives. LREC vol. IV (2004) 1115–1118 9. Hatzivassiloglou, V., Wiebe, J.: Effects of Adjective Orientation and Gradability on Sen- tence Subjectivity. Proceedings of the 18th International Conference on Computational Linguistics, New Brunswick, NJ (2000) 10. Andreevskaia, A., Bergler, S., Urseanu, M.: All Blogs Are Not Made Equal: Exploring Genre Differences in Sentiment Tagging of Blogs. In: International Conference on Web- logs and Social Media (ICWSM-2007), Boulder, CO (2007) 11. Turney, P.D., Littman, and M.L.: Measuring Praise and Criticism: Inference of Se-mantic Orientation from Association. ACM Transactions on Information Systems (2003) 315–346 12. Stone, P.J., Dunphy, D.C., and Smith, M.S.: The General Inquirer: A Computer Approach to Content Analysis. MIT Press, Cambridge, (1966) 13. Yahoo! Search Web Services, Online http:// developer. yahoo.com/search/ (2007) 14. Akshay, J.: A Framework for Modeling Influence, Opinions and Structure in Social Media. In: Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, Van- couver, BC, July (2007) 1933–1934 15. Durant, K., and Smith M.: Mining Sentiment Classification from Political Web Logs. Pro- ceedings of Workshop on Web Mining and Web Usage Analysis of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Philadel- phia (2006) 16. S. Prasad: Micro-blogging sentiment analysis using Bayesian classification methods (2010) 17. A. Pak and P. Paroubek: Twitter based system: Using twitter for disambiguating sentiment ambiguous adjectives. Proceeding SemEval '10 Proceedings of the 5th International Work- shop on Semantic Evaluation (2010) 436-439 18. B. Liu, X. Li, W.S. Lee, and P.S. Yu.: Text classification by labeling words. Proceedings of the National Conference on Artificial Intelligence, Menlo Park, CA; Cambridge, MA; London.. MIT Press (2004) 425-430 19. P. Melville, W. Gryc, and R.D. Lawrence. Sentiment analysis of blogs by combining lexi- cal knowledge with text classification. In Proceedings of the 15th ACM SIGKDD interna- tional conference on Knowledge discovery and data mining (2009) 1275-1284 20. R. Prabowo and M. Thelwall. Sentiment analysis: A combined approach. Journal of In- formatics (2009) 143-157 21. M. Annett and G. Kondrak: A comparison of sentiment analysis techniques: Polarizing movie blogs (2008) 25-35 22. No Title, Online http://tartarus.org/ ~martin/PorterStemmer/ java.txt, October (2007) 23. Fellbaum, C.: WordNet: An Electronic Lexical Database. Language, Speech, and Commu- nication Series. MIT Press, Cambridge (1998) 24. Toutanova, K., Manning, C.D.: Enriching the Knowledge Sources Used in a Maxi-mum Entropy Part-of-Speech Tagger. In Proceedings of EMNLP/VLC, Hong Kong, China (2000) 63–71 25. Witten, H., Frank, and E.: Data Mining: Practical Machine Learning Tools and Tech- niques, 2nd edition. Morgan Kaufmann, San Francisco (2005)
1510.03059
2
1510
2015-11-09T17:08:36
Influence of network topology on cooperative problem-solving systems
[ "cs.SI", "nlin.AO", "physics.soc-ph" ]
The idea of a collective intelligence behind the complex natural structures built by organisms suggests that the organization of social networks is selected so as to optimize problem-solving competence at the group-level. Here we study the influence of the social network topology on the performance of a group of agents whose task is to locate the global maxima of NK fitness landscapes. Agents cooperate by broadcasting messages informing on their fitness and use this information to imitate the fittest agent in their influence networks. In the case those messages convey accurate information on the proximity of the solution (i.e., for smooth fitness landscapes) we find that high connectivity as well as centralization boost the group performance. For rugged landscapes, however, these characteristics are beneficial for small groups only. For large groups, it is advantageous to slow down the information transmission through the network to avoid local maximum traps. Long-range links and modularity have marginal effects on the performance of the group, except for a very narrow region of the model parameters.
cs.SI
cs
Influence of network topology on cooperative problem-solving systems Jos´e F. Fontanari Instituto de F´ısica de Sao Carlos, Universidade de Sao Paulo, Caixa Postal 369, 13560-970 Sao Carlos, Sao Paulo, Brazil Instituto de Ciencias Matem´aticas e de Computa¸cao, Universidade de Sao Paulo, Caixa Postal 668, 13560-970 Sao Carlos, Sao Paulo, Brazil Francisco A. Rodrigues The idea of a collective intelligence behind the complex natural structures built by organisms suggests that the organization of social networks is selected so as to optimize problem-solving com- petence at the group-level. Here we study the influence of the social network topology on the per- formance of a group of agents whose task is to locate the global maxima of NK fitness landscapes. Agents cooperate by broadcasting messages informing on their fitness and use this information to imitate the fittest agent in their influence networks. In the case those messages convey accurate information on the proximity of the solution (i.e., for smooth fitness landscapes) we find that high connectivity as well as centralization boost the group performance. For rugged landscapes, however, these characteristics are beneficial for small groups only. For large groups, it is advantageous to slow down the information transmission through the network to avoid local maximum traps. Long-range links and modularity have marginal effects on the performance of the group, except for a very narrow region of the model parameters. I. INTRODUCTION The benefits of cooperative work have long been ex- plored by nature as revealed by the collective structures built by termites and slime molds. These structures may be thought of as the organisms' solutions to the problems that endanger their existence [1, 2]. Within this (admit- tedly controversial) perspective, competence in problem solving should be viewed as a selection pressure on the size and organization of groups of gregarious animals, in addition to the more traditional pressures such as de- fense against predation and foraging success [3]. In fact, given the ubiquity of network optimization in biology [4], one would expect that the size and the topology of so- cial networks are also selected for optimization of species adaptation and surveillance [5, 6]. Social networks are considered optimal if they improve communication and decision making at the group level, while keeping a min- imum number of (costly) connections between the indi- viduals [6]. The information in social networks flows between indi- viduals via social contacts and, in the problem-solving context, the relevant process is imitative learning or, more generally, social learning [7], as expressed in this quote by Bloom "Imitative learning acts like a synapse, allowing information to leap the gap from one creature to another" [1]. In fact, social learning has inspired the planning of a variety of optimization heuristics, such as the particle swarm optimization algorithm [8] and the adaptive culture heuristic [9, 10]. Although there has been some progress on the understanding of the fac- tors that make cooperative group work effective [11 -- 14], a workable minimal model to study group problem- solving via imitative learning was proposed only very re- cently [15, 16]. Our goal here is to investigate how the social network properties are related to efficiency at the group level within that minimal model framework. By efficiency we mean that the time to solve a problem must scale superlinearly with the number of individuals or re- sources employed in the task. The agent-based model we consider consists of a group of L agents that can perform individual trial-and-test searches to explore a fitness landscape and, most impor- tantly, can imitate a model agent -- the best perform- ing agent in their influence network at the trial -- with a certain probability p. Thus the model exhibits the two critical ingredients of a collective brain: imitative learning and a dynamic hierarchy among the agents [1]. It is the exchange of messages between agents inform- ing each other on their partial success (i.e., their fitness at the current trial) towards the completion of the task that characterizes the model as a distributed cooperative problem-solving system [11]. The task of the agents is to find the global maxima of smooth and rugged fitness landscapes created by the NK model and the performance or efficiency of the group is measured by the number of trials required to find those maxima. We assume that the links between agents are costless. Differently from a previous study that consid- ered only fully connected networks (i.e., each agent in- fluences and is influenced by all the other agents in the group) [16], here we focus on the structure of the social network that connects the agents within the group. In particular, we consider the effect of varying the connec- tivity (or coordination number) of one-dimensional lat- tices as well as of varying the structure of the network while keeping the average connectivity of the network fixed. We find that in both smooth and rugged landscapes the best group organization comprises an optimal num- ber L∗ of fully connected agents. For smooth landscapes, decrease of the connectivity and hence of the speed of 5 1 0 2 v o N 9 ] I S . s c [ 2 v 9 5 0 3 0 . 0 1 5 1 : v i X r a information transmission is always detrimental to the performance of the group, regardless of the group size L. For rugged landscapes, however, this decrease can be greatly beneficial if L > L∗, but it is slightly detrimental if L < L∗. In the case the number of agents and links are kept fixed, we find that centralization (i.e., the exis- tence of agents with a large number of connections) is, in general, advantageous for small size groups. In addi- tion, centralization in large groups leads to catastrophic performances in rugged landscapes. We find that the introduction of long-range connections has no effect on the performance of the group, except when the parame- ters are set close to the region where the imitative search fails to find the global maximum. In that case those links greatly harm the group performance. It is interesting to notice that this behavior is different from other dynam- ical processes taking place in networks. For instance, synchronization is strongly influenced by the decrease of the average shortest distances in the network [17]. The rest of the paper is organized as follows. In Sec- tion II we present a brief description of the NK model of rugged fitness landscapes. In Section III we describe in some detail the imitative learning search strategy and introduce a convenient measure of the performance of the search for the global maximum on NK landscapes. In Section IV we study the performance of the imita- tive search in the case the imitation network is modeled by a regular one-dimensional lattice with coordination number M and in Section V in the case it is modeled by more complex network topologies, namely, scale-free, small-world and community networks. Finally, Section VI is reserved to our concluding remarks. II. NK MODEL OF RUGGED FITNESS LANDSCAPES The NK model was introduced by Kauffman [18] to model the adaptive evolution process as walks on rugged fitness landscapes. The main advantage of the NK model of rugged fitness landscapes is the possibility of tuning the ruggedness of the landscape by changing the two in- teger parameters of the model, namely, N and K. The NK landscape is defined in the space of binary strings of length N . This parameter determines the size of the so- lution space, 2N . The other parameter K = 0, . . . , N − 1 influences the number of local maxima on the landscape. In particular, for K = 0 the corresponding (smooth) landscape has one single maximum. For K = N − 1, the (uncorrelated) landscape has on the average 2N / (N + 1) maxima with respect to single bit flips [19]. The solution space of the NK landscape consists of the 2N distinct binary strings of length N , which we denote by x = (x1, x2, . . . , xN ) with xi = 0, 1. To each string x we associate a fitness value Φ (x) which is an average of the contributions from each component i in the string, 2 FIG. 1. Example of the computation of the fitness for the string x = (0, 1, 1, 0) with N = 4 and K = 2. There are four components, as indicated in the figure. For instance, if φ(0, 1, 1) = 0.3, φ(1, 1, 0) = 0, 2, φ(1, 0, 0) = 0.5 and φ(0, 0, 1) = 0.1, then Φ (x) = (1/4)(φ0 +φ1 +φ2 +φ3) = 0.275. This procedure is performed for each of the 2N possible strings that define the landscape. i.e., N(cid:88) i=1 1 N Φ (x) = φi (x) , (1) where φi is the contribution of component i to the fitness of string x. It is assumed that φi depends on the state xi as well as on the states of the K right neighbors of i, i.e., φi = φi (xi, xi+1, . . . , xi+K) with the arithmetic in the subscripts done modulo N . We notice that K measures the degree of interaction (epistasis) among the compo- nents of the strings. It is assumed, in addition, that the functions φi are N distinct real-valued functions on {0, 1}K+1. As usual, we assign to each φi a uniformly dis- tributed random number in the unit interval [18]. Hence Φ ∈ (0, 1) has a unique global maximum. Figure 1 illus- trates the calculation of Φ (x). For K = 0 there are no local maxima and the sole max- imum of Φ is easily located by picking for each component i the state xi = 0 if φi (0) > φi (1) or the state xi = 1, otherwise. However, for K > 0 finding the global max- imum of the NK model is a NP-complete problem [20], which means that the time required to solve the problem using any currently known deterministic algorithm in- creases exponentially fast with the length N of the strings [21]. The increase of the parameter K from 0 to N−1 de- creases the correlation between the fitness of neighboring configurations (i.e., configurations that differ at a single component) in the solution space. For K = N − 1, those fitness values are uncorrelated so the NK model reduces to the Random Energy model [22, 23]. The simplest way to see this is to consider two neighboring configurations, say xa = (0, 0, . . . , 0) and xb = (1, 0, . . . , 0), and to cal- culate explicitly the correlation between their fitnesses, which yields corr(cid:0)Φ (xq) , Φ(cid:0)xb(cid:1)(cid:1) = 1 − (K + 1) /N , as expected. Since the functions φi are random, the ruggedness mea- sures (e.g., the number of local maxima) of a particular realization of a NK landscape are not fixed by the pa- rameters N and K. In fact, those measures can vary con- siderably between landscapes characterized by the same values of N and K > 0 [18], which implies that the per- 0110011001100101(0,1,1)(1,1,0)(1,0,0)(0,0,1) formance of any search heuristic based on the local corre- lations of the fitness landscape depends on the particular realization of the landscape. Hence in order to highlight the role of the parameters that are relevant to imitative learning -- the group size L, the network topology and average connectivity M , and the imitation probability p -- here we compare the performance of groups character- ized by different sets of those parameters for the same realization of the NK fitness landscape. In particular, we consider two types of landscape: a smooth landscape with N = 12 and K = 0 and a rugged landscape with N = 12 and K = 4. The effects of averaging over differ- ent landscape realizations is addressed briefly in Section V. III. THE MODEL We consider a group composed of L agents. Each agent operates in an initial binary string drawn at random with equal probability for the bits 0 and 1. Henceforth we use here the terms agent and string interchangeably. At any trial t, a target agent can choose between two distinct processes to operate on the strings. The first process, which happens with probability 1 − p, is the elementary move in the solution space that consists of picking a bit i = 1, . . . , N at random with equal probability and then flipping it. Through the repeated application of this op- eration, the agent can produce all the 2N binary strings starting from any arbitrary string. The second process, which happens with probability p, is the imitation of a model string. We choose the model string as the high- est fitness string at trial t among the (fixed) subgroup of agents that can influence the target agent. The string to be updated (target string) is compared with the model string and the different bits are singled out. Then the agent selects at random one of the distinct bits and flips it so that this bit is now the same in both the target and the model strings. Hence, as a result of the imita- tion process the target string becomes more similar to the model string. Figure 2 illustrates the steps involved in the model. The parameter p ∈ [0, 1] is the imitation probability. The case p = 0 corresponds to the baseline situation in which the L agents explore the solution space indepen- dently. The imitation procedure described above is moti- vated by the mechanism used to simulate the influence of an external media [24, 25] in the celebrated agent-based model proposed by Axelrod to study the process of cul- ture dissemination [26, 27]. We notice that in the case the target string is identical to the model string, and this situation is not uncommon since the imitation process re- duces the diversity of the group, the agent executes the elementary move with probability one. The collective search ends when one of the agents finds the global maximum and we denote by t∗ the number of trials made by the agent that found the solution. Since the agents operate in parallel and the search halts simul- 3 FIG. 2. Illustration of the update rules of the model. At any step, a target agent is selected and its binary string is changed either by flipping one randomly chosen bit or by copying a bit from the highest fitness (model) string. The former process occurs with probability 1 − p, whereas the latter with proba- bility p. Notice that when the imitation operation is selected, the updated string becomes closer to the model string. taneously for all agents, t∗ stands also for the number of trials made by any one of the L agents. In other words, the trial number t is incremented by one unit when the L agents have executed one of the two operations on its associated string. We notice that except for the case p = 0, the update of the L agents is not strictly a par- allel process since the model strings may change several times within a given trial. Nonetheless, since in a single trial all agents are updated, the total number of agent updates at trial t is given by the product Lt. Here we measure the efficiency of the search by the to- tal number of agent updates necessary to find the global maximum (i.e., Lt∗), which is essentially the computa- tional cost of the search. Since the typical number of tri- als to success t∗ scales with the size of the solution space 2N , it is convenient to present the results in terms of the rescaled computational cost, defined as C ≡ Lt∗/2N . In fact, in the case of the independent search it can be shown that the mean rescaled computational cost is given by [16] (cid:104) 1 − (λN )L(cid:105) , L (cid:104)C(cid:105) = 2N (2) where λN is the second largest eigenvalue of a tridi- agonal stochastic matrix T whose elements are Tij = (1 − j/N ) δi,j+1 + j/N δi,j−1 for j = 1, . . . , N − 1, Ti0 = δi,1, and TiN = δi,N , where δi,j is the Kronecker delta. The notation (cid:104). . .(cid:105) stands for the average over indepen- dent searches on the same landscape. The results of the simulations exhibited in the next sections were ob- L(cid:105) = tained by averaging over 105 searches. Notice that (cid:104)t∗ 1/ is the expected number of trials for a group of L independent agents to find the global max- imum. In particular, for N = 12 we have λ12 ≈ 0.99978 1(cid:105) ≈ 4545. Since (λ12)L ≈ e−L(1−λ12) we have and (cid:104)t∗ 1(cid:105) and (cid:104)C(cid:105) ≈ L/212 1(cid:105)/212 ≈ 1.110 for L (cid:28) (cid:104)t∗ (cid:104)C(cid:105) ≈ (cid:104)t∗ for L (cid:29) (cid:104)t∗ 1(cid:105). (cid:104) 1 − (λN )L(cid:105) 0 0 0 0 1Target agent0 1 0 0 1Flipping1-pp0 0 0 1 11 1 0 1 01 0 0 1 11 0 0 0 10 0 1 1 11 1 1 1 1...0 0 1 1 1highest fitnessfitness0.40.30.10.80.5copySubgroup of neighbours 4 FIG. 3. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) for the imitation probability p = 0.5 as function of the number of sites L of a regular one-dimensional lattice (ring) with coordination number M = 2((cid:3)), M = 10((cid:79)), and M = 50((cid:35)). The results for the fully connected lattice M = L − 1((cid:32)) as well as for the independent search (+) are (cid:104)C(cid:105) = 0.76(cid:0)L/212(cid:1)1/2 in the range L ∈ (cid:2)102, 103(cid:3). The pa- also shown. The solid curve is Eq. (2), the dashed line is the linear function (cid:104)C(cid:105) = L/212 and the dotted line is the fitting rameters of the NK landscape are N = 12 and K = 0. The landscape exhibits a single maximum. FIG. 4. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) for the imitation probability p = 0.5 as function of the num- ber of sites L of a regular one-dimensional lattice (ring) with coordination number M = 2((cid:3)), M = 4(×), M = 8((cid:79)), M = 20((cid:52)) and M = 50((cid:35)). The results for the fully con- nected lattice M = L − 1((cid:32)) as well as for the independent search (+) are shown also. The solid curve is Eq. (2) and the dashed line is the linear function (cid:104)C(cid:105) = L/212. The pa- rameters of the NK landscape are N = 12 and K = 4. The landscape exhibits 52 local maxima and a single global max- imum. IV. REGULAR LATTICES Here we consider the case that the agents are fixed at the L sites of a one-dimensional lattice with periodic boundary conditions (i.e., a ring) and can interact with their M/2 left neighbors as well as with their M/2 right neighbors. Hence M ≤ L− 1 is the coordination number of the lattice. This configuration is important because one can vary the connectivity M of the lattice without the risk of producing disconnected clusters. Figure 3 shows the performance of a group of L agents at the task of finding the global optimum of a smooth landscape (K = 0) in the case the copying and the elementary move operations are equally probable, i.e., p = 0.5. We find that, regardless of the number of agents L, the best performance is achieved by the fully con- nected lattice M = L − 1 and the performance degrades smoothly as the connectivity decreases. This can be ex- plained by the absence of local maxima in the landscape for K = 0. Since all sequences display faithful infor- mation about the location of the global maximum, the higher the information flow between them, the better the performance of the group. In addition, we find that re- gardless of the connectivity the computational cost de- creases as the imitation probability increases. We re- call that for p ≈ 1 only the model string, which is represented by several copies when L is large, is likely to perform the elementary move; all other strings imi- tate the model. This reduces greatly the effective group size since the strings are concentrated in the vicinity of the model string, which cannot accommodate more than L = N = 12 strings without duplication of work. This is the reason we observe the degradation of the perfor- mance when the group size increases beyond the optimal value L ≈ N . Notice that for K = 0 the imitative learn- ing search always performs better than the independent search. group sizes in the range L ∈ (cid:2)102, 103(cid:3), Fig. 3 reveals At this stage it is prudent to point out that a constant computational cost implies that the time t∗ necessary to find the global maximum decreases linearly with the number of agents. On the other hand, a computational cost that grows linearly with the group size means that adding more agents to the group does not affect t∗. For a sublinear decrease of t∗, since (cid:104)C(cid:105) increases with L1/2 and, therefore, t∗ decreases with L−1/2. According to our criterion for efficiency, as a collaborative strategy the imitative search is efficient only in the range L < 10 where we find the superlinear scaling t∗ ∝ L−2. Figure 4 shows the performance for a rugged land- scape (K = 4) having 52 local maxima and a single global maximum. Because of the presence of local max- ima that may trap the sequences in their neighborhoods, the computational cost exhibits a much more complex dependence on the model parameters than in the pre- vious case of a single-maximum landscape. This figure reveals many instructive facts about the imitative search strategy. In particular, this strategy may be disastrous, in the sense that it performs much worse than the inde- pendent search, for large groups with high connectivity 0.05 0.1 0.5 1 3100101102103104<C>L 0.3 1 10 30100101102103104<C>L 5 FIG. 5. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) for the imitation probability p = 0.5 as function of the coordination number number M ≤ L − 1 for regular one- dimensional lattices (rings) with L = 10((cid:52)), L = 100((cid:35)) and L = 1000((cid:79)). The lines are guides to the eyes. The parameters of the NK landscape are N = 12 and K = 4. The landscape exhibits 52 local maxima and a single global maximum. (i.e., L ∈ [20, 2000] and M > 15 for the data of Fig. 4). In this case, the decrease of the connectivity and consequently of the rate of information flow through the network greatly improves the performance of the imita- tive search. Most interestingly, however, is the finding that for small groups (say, L < 10) the fully connected system is the optimal one, as shown in Fig. 5. The same conclusion holds true in the case the number of agents is greater than the size of the solution space (L > 212) since it is very likely that some string will be close to the global maximum and it is thus advantageous to disseminate this information quickly through the group. For groups of in- termediate size (say, L = 100) the detrimental effects of increasing the connectivity of the lattice are startling as illustrated in Fig. 5. The main conclusion of this analysis is that the opti- mal setting for the imitative search is a small group of size L∗, which depends on the imitation probability p as well as on details of the landscape, where the agents are fully connected. In particular, L∗ decreases with in- creasing p as illustrated in Fig. 6: for p > 0.98 we find L∗ = 2 whereas for p → 0 we find L∗ ≈ 2N . Although the decrease of the connectivity between agents can boost significantly the performance of the group in the regime L∗ < L (cid:28) 2N , the leading factor for optimality is the group size, with the lattice connectivity playing a coad- juvant role (see Fig. 5). V. COMPLEX NETWORKS The previous section focused on the influence of vary- ing the connectivity of the regular network on the FIG. 6. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) for the fully connected lattice as function of the number of sites L for the imitation probability p = 0.2((cid:4)), p = 0.3((cid:78)), p = 0.5((cid:32)) and p = 0.7((cid:72)). The parameters of the NK land- scape are N = 12 and K = 4. The landscape exhibits 52 local maxima and a single global maximum. problem-solving performance of the group. Here we con- sider networks with the same average connectivity but very different organizations, as reflected by the degree distribution -- the degree ki of a node i is given by its number of connections. In particular, we consider scale-free networks generated by the Barab´asi-Albert al- gorithm [29], a star topology and a regular chain with nearest-neighbors links. In the three topologies there are L nodes and L − 1 links. In addition, to examine the in- fluence of long-range interactions we consider small-world networks [30] as well as a network exhibiting community structure [31]. A. Scale-free networks A scale-free network is a network whose degree distri- bution follows a power law when the number of nodes L is very large. For our purposes, the interesting fea- ture of this topology, besides being a good approxima- tion to social and biological networks [28], is that it in- troduces a distinction between agents, since the nodes of the network can exhibit very different degrees. Here we use the Barab´asi-Albert algorithm for generating random scale-free networks which exhibit the degree distribution P (k) ∼ k−3 in the asymptotic limit L → ∞ [29]. This algorithm is based on a preferential attachment mecha- nism and network growth. Thus, at each time step, a new node i with m0 connections is added to the network. The probability that a node j, which is present in the network, will receive a connection from i is proportional l kl. In the case we start with a single node and m0 = 1, the resulting network will exhibit L − 1 connections at the Lth step. In addition, if m0 = 1 then the network will to kj (the degree of j), i.e., P (i → j) = kj/(cid:80) 1 10100101102<C>M 0.4 0.6 0.8 1 1.2110100<C>L 6 FIG. 7. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) for the imitation probability p = 0.5 as function of the num- ber of sites L for a chain with coordination number M = 2 ((cid:35)), scale-free networks generated according to the Barab´asi- Albert algorithm with initial degree m0 = 1 ((cid:52)), and a star topology ((cid:79)). In each run we used a different random scale-free network. The parameters of the NK landscape are N = 12 and K = 0. show a tree-like structure [28]. Notice that the size of the neighbors group of each node (i.e., the influence network) varies in scale-free networks, contrariwise to the regular networks considered in the last section. The results of the imitative search in a smooth landscape (K = 0) and in a rugged landscape (K = 4) are summarized in Figs. 7 and 8, respectively, in the case the L agents are located at the nodes of a scale-free net- work. For the sake of comparison, we consider also a star topology where L − 1 agents are connected to a central agent (a super-spreader), and a regular one-dimensional lattice with free boundary conditions and coordination number M = 2. In the three network topologies consid- ered in these figures, the number of agents is L and the number of links is L− 1. In addition, for L = 3 the three topologies produce identical graphs. Since in the absence of local maxima (K = 0) the model string always displays faithful information about the location of the global maximum, the faster this in- formation spreads among the agents, the better the per- formance of the group. Figure 7 indicates that for L not too large, the star topology maximizes the information flow among agents and so it yields the best performance among the three topologies. The chain topology min- imizes the information flow and so it yields the worst performance, whereas the scale-free topology exhibits a performance level that is intermediate to those two ex- tremes. However, the star topology has obvious draw- backs that become apparent for large L only (L > 200 for the data of Fig. 7): in the case the fittest agent is not the central agent, the useful, new information it carries is not available for imitation to the other agents, who can imitate the central agent only. Actually, that piece of FIG. 8. (Color online) Same as Fig. 7 but for a rugged NK landscape with parameters N = 12 and K = 4. information can even be lost if the fittest agent is chosen as the target agent before it is imitated by the central one. In the presence of local maxima (K = 4), we find a similar pattern, as shown in Fig. 8, but the failure of the star topology already for L > 30 is probably due to the spreading of inaccurate information about the global optimum by the central agent. In fact, once the central agent reaches a local maxima it quickly attracts the rest of the group towards it. We may interpret the central agent of the star topol- ogy as a type of blackboard, which the other agents must access to get hints about the location of the global max- imum [32]. In fact, when the central agent is selected as the target and the imitation operation is chosen, it copies the best performing agent of the previous trial and this information become available to the other agents, which can then access the blackboard with probability p. Given the severe bottleneck to the information flow in the star topology, it comes to a surprise that it works so well for small groups. For topologies where the degree of the nodes (or agents) is not constant, we can estimate the probability Ph that the agent with the highest degree is the one that finds the global maximum. Since in the case all agents have the same probability of finding the global maximum (e.g., for the regular lattices discussed in Section IV) this probability is 1/L, it is convenient to consider the ratio rh = Ph/ (1/L) = LPh ≥ 1 which gives a measure of the influence of the degree of an agent on its chances of hitting that maximum. In Fig. 9 we show rh as function of the group size for the star and the scale-free topolo- gies. In the limit of very large L, chances are that the global maximum already shows up in the setting of the initial population, so we have rh → 1 in this limit. The influence of the degree on the ratio rh depends on the ruggedness of the landscape: it is significant for smooth landscapes but marginal for rugged landscapes. It is in- 0.2 0.4 0.6 0.8 1100101102103<C>L 0.7 0.8 0.9 1100101102103<C>L 7 B. Community structure and small-world networks To explore the effects of the structure of the population on the performance of the imitative search, we consider a network with L = 200 agents divided in 4 clusters of 50 agents each as illustrated in Fig. 10. The probability that two nodes of the same cluster are connected is 0.3, whereas nodes in different clusters are connected accord- ing to a probability of 0.001. The total number of links is 1519 so the average connectivity of the network is ap- proximately 15.2. We consider, in addition, small-world networks which allow the interpolation between struc- tureless (random) graphs and regular lattices [30]. In particular, the small-world networks we consider here are generated using the Watts and Strogatz algo- rithm. Explicitly, we begin with a one-dimensional lat- tice of L nodes, each node connected to M neighbors (M/2 on each side), and periodic boundary conditions. Then for every node i = 1, . . . , L we rewire the links be- tween i and j = i + 1 (the sums are done modulo L) with probability β. Rewiring of a link is done by replacing the original neighbor of node i by a random node chosen uniformly among all possible nodes that avoid self-loops and link duplication. This procedure is then repeated for the links between i and j = i + 2, i and j = i + 3, and so on until the links between i and j = i + M/2. The case β = 1 corresponds to random graphs with average connectivity M and the case β = 0 to a regular ring with number of coordination M . Figures 11 and 12 show the mean computational cost for small-world networks with rewiring probability β = 0, 0.2 and 1, and for the network with community struc- ture shown in Fig. 10. We find that (cid:104)C(cid:105) is completely insensitive to variations on the structure of the network for smooth landscapes (see Fig. 11). This conclusion ap- plies to rugged landscapes as well, except for p close to the boundary of the region where the imitative search fails to find the global maximum (see Fig. 12). In this case the sensitivity is extreme. For instance, for p = 0.58 searches using random networks (β = 1) fail to find the global maximum, whereas searches using regular (β = 0) or community networks succeed. In fact, for large values of the imitation probability, the risk of the search be- ing stuck in local maxima is very high and so long-range links which speed up the flow of information through the network may become notably detrimental to the imita- tive search performance. However, in the absence of local maxima (Fig. 11) the best performance is attained by im- itating the model string and allowing only their clones to explore the landscape through the elementary move. To check whether the specific realization of the NK rugged fitness landscape we used in our study has un- duly influenced our conclusions, we have considered four random realizations of the landscape with N = 12 and K = 4 in addition to that realization. We note that for smooth landscapes (K = 0) all realizations are equiva- lent. The comparison between the mean computational costs for those five realizations is shown in Fig. 13. The FIG. 9. (Color online) Ratio rh between the probability Ph that the agent with the highest degree in the network finds the global maximum and the baseline probability 1/L for the case the L agents are equiprobable to find that maximum. The symbols ((cid:52)) are the results for scale-free networks gen- erated according to the Barab´asi-Albert algorithm, whereas the symbols ((cid:79)) are for the star topology. In each run we used a different random scale-free network. The imitation proba- bility is p = 0.5 and the parameters of the NK landscape are N = 12, K = 0 (open symbols) and K = 4 (filled symbols). FIG. 10. (Color online) Network with a community structure consisting of L = 200 nodes divided in 4 groups of 50 nodes each. The average connectivity of the network is approxi- mately 15.2. teresting that for the star topology the regime where rh decreases with increasing L roughly coincides with the regime where the star topology performs less well than the other topologies considered in Figs. 7 and 8. 1 3 5 7 902004006008001000rhL 8 FIG. 13. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) as function of the probability of imitation p for the net- work with community structure illustrated in Fig. 10 and five realizations (different symbols) of the NK fitness landscape with N = 12 and K = 4. VI. DISCUSSION The tenet of our approach to study cooperative problem-solving systems is that group size and organi- zation are selected so as to maximize group-level per- formance as measured by the number of trials necessary to find the global maxima of fitness landscapes. Differ- ently from the definition of network optimality in biol- ogy, where there is a direct selection pressure to reduce the number of connections between entities because of their building and maintenance costs [33], here we as- sume that the connections between agents are costless. As a result, we find that the optimal group organization is obtained by a relatively small group of fully connected agents. The optimal group size L∗ is a decreasing func- tion of the imitation probability p (see Fig. 6) and is roughly proportional to the logarithm of the size of the solution space [16]. In our model, the problem-solving ef- ficiency decreases with the group size for L > L∗ because of the duplication of work resulting from the decrease of the diversity of the group members due to imitation. More traditional selection pressures that contribute to limit the size of groups are resource competition, parasite transmission and the managing of the social relationships [34, 35]. The manner the information on the location of the global maximum spreads among the agents, which is de- termined by the network structure, as well as the accu- racy of that information can greatly affect the problem- solving performance of the group. For instance, we find that for smooth landscapes the decrease of the agents' connectivity is always harmful to the performance, re- gardless of the group size L. For rugged landscapes, however, this decrease can be highly beneficial for large groups (i.e., L > L∗). In fact, because the model agent may broadcast misleading information in this case, it is FIG. 11. (Color online) Mean rescaled computational cost (cid:104)C(cid:105) as function of the imitation probability p for the net- work with community structure illustrated in Fig. 10 ((cid:35)), and for small-world networks with average connectivity 14 and rewiring probability β = 1 ((cid:52)), β = 0.2 (×), and β = 0 ((cid:79)). The number of nodes is L = 200 for the three networks and the parameters of the smooth NK landscape are N = 12 and K = 0. FIG. 12. (Color online) Same as Fig. 11 but for the rugged NK landscape of parameters N = 12 and K = 4. results are qualitatively the same. The quantitative dif- ferences are due to variations in the number of local max- ima as well as in their distances to the global maximum for the different landscape realizations. It is reassuring to note that the initial decrease of the mean cost with the imitation probability p, which indicates that (moder- ate) imitation is a sensible cooperation strategy, as well as the existence of a threshold imitation value beyond which the group fails to find the global maximum, are ro- bust properties of the imitative learning search on rugged landscapes. 0.2 0.4 0.6 0.8 1 1.200.20.40.60.81<C>p 0.6 0.8 1 1.200.10.20.30.40.50.60.7<C>p 0.4 0.6 0.8 1 1.200.10.20.30.40.50.60.70.8<C>p advantageous to slow down the information transmission so as to allow the agents more time to explore the solution space away from the neighborhoods of the local maxima. The same conclusion holds in the case of centralization: the presence of super-spreaders, which enhance the diffu- sion of information, is beneficial provided the information is accurate. Decentralized networks are less susceptible to the diffusion of inaccurate information. It is interest- ing that for small groups (i.e., L < L∗) both centraliza- tion and full connectivity are beneficial, regardless of the accuracy of the information. In addition, the presence of long-range links has no effect on the performance of the group, except for a very narrow region of the model pa- rameters. Notice that the evolution of other dynamical processes, such as synchronization or cascade failures, are strongly affected by the network structure [36]. There- fore, the weak influence of long-range links on the perfor- mance of the imitative learning search is not an expected result. An interesting question that we can address within our minimal model framework is whether the fixed topology of a social network can enhance the fitness of some group members [37]. In this case the accuracy of the transmit- ted information seems to be the crucial ingredient. In fact, for smooth landscapes we find that highly-connected agents are very likely to be the ones that find the global maximum, but for rugged landscapes the fitness advan- tage of the central agents is marginal only (see Fig. 9). Another interesting issue, which we plan to address in a future work, is the study of adaptive networks, in which 9 the network topology itself changes during the search [38, 39]. The difficulty here is to find a suitable procedure to update the topology, since simply adding more con- nection to the model (fittest) agent can be catastrophic if that agent is near a local maximum. Finally, we note that our study departs from the vast literature on the game theoretical approach to the evo- lution of cooperation [40] where it is usually taken for granted that mutual cooperation is beneficial to the play- ers. Here we consider a problem solving scenario and a specific cooperation mechanism (imitation) aiming at determining in which conditions cooperation is benefi- cial. The findings that in some cases cooperation results in maladaptive behavior [41, 42] and that for very large groups efficiency is achieved by minimizing communica- tion [43] support our conjecture that the efficacy of imi- tative learning could influence the size and organization of the groups of social animals. ACKNOWLEDGMENTS The research of JFF was partially supported by grant 2013/17131-0, Sao Paulo Research Foundation (FAPESP) and by grant 303979/2013-5, Conselho Na- cional de Desenvolvimento Cient´ıfico e Tecnol´ogico (CNPq). FAR acknowledges CNPq (grant 305940/2010- 4) and FAPESP (grant 2013/26416-9) for financial sup- port. [1] Bloom H (2001) Global Brain: The Evolution of Mass Mind from the Big Bang to the 21st Century. Wiley, New York [2] Queller DC, Strassmann JE (2009) Beyond society: the evolution of organismality. Phil. Trans. R. Soc. B 364: 3143 -- 3155 [9] Kennedy J (1998) Thinking is social: Experiments with the adaptive culture model. J. Conflict Res. 42: 56 -- 76 [10] Fontanari JF (2010) Social interaction as a heuristic for combinatorial optimization problems. Phys. Rev. E 82: 056118 [11] Huberman BA (1990) The performance of cooperative [3] Wilson E (1975) Sociobiology. Harvard University Press, processes. Physica D 42: 38 -- 47 Cambridge, MA [4] Barab´asi A-L, Oltvai ZN (2004) Network biology: un- derstanding the cells functional organization. Nat. Rev. Genet. 5: 101 -- 113 [5] Derex M, Beugin M-P, Godelle B, Raymond M (2013) Experimental evidence for the influence of group size on cultural complexity. Nature 503: 389 -- 391 [6] Pasquaretta C, Lev´e M, Claidi`ere N, van de Waal E, Whiten A, MacIntosh AJJ, Pel´e M, Bergstrom ML, Borgeaud C, Brosnan SF, Crofoot MC, Fedigan LM, Fichtel C, Hopper LM, Mareno MC, Petit O, Schnoell AV, di Sorrentino EP, Thierry B, Tiddi B, Sueur C (2014) Social networks in primates: smart and tolerant species have more efficient networks. Sci. Rep. 4: 7600 [12] Clearwater SH, Huberman BA, Hogg T (1991) Cooper- ative Solution of Constraint Satisfaction Problems. Sci- ence 254: 1181 -- 1183 [13] Hong L, Page SE (2004) Groups of diverse problem solvers can outperform groups of high-ability problem solvers. Proc. Natl. Acad. Sci. USA 101:16385 -- 16389 [14] Rendell L, Boyd R, Cownden D, Enquist M, Eriksson K, Feldman MW, Fogarty L, Ghirlanda S, Lillicrap T, Laland KN (2010) Why Copy Others? Insights from the Social Learning Strategies Tournament. Science 328: 208 -- 213 [15] Fontanari JF (2014) Imitative Learning as a Connector of Collective Brains. PLoS ONE 9: e110517 [16] Fontanari JF (2015) Exploring NK Fitness Landscapes [7] Heyes CM (1994) Social learning in animals: Categories Using Imitative Learning. Eur. Phys. J. B 88: 251 and mechanisms. Biol. Rev. 69: 207 -- 231. [17] Barahona M, Pecora LM (2002) Synchronization in [8] Bonabeau E, Dorigo M, Theraulaz G (1999) Swarm In- telligence: From Natural to Artificial Systems. Oxford University Press, Oxford, UK Small-World Systems. Phys. Rev. Lett. 89: 054101 [18] Kauffman S, Levin S (1987) Towards a general theory of adaptive walks on rugged landscapes. J. Theor. Biol. 128: 11 -- 45 10 [19] Kaul H, Jacobson SH (2006) New global optima re- sults for the Kauffman NK model: handling dependency. Math. Program. 108: 475 -- 494 [20] Solow D, Burnetas A, Tsai M, Greenspan NS (2000) On the Expected Performance of Systems with Complex Interactions Among Components. Complex Systems 12: 423 -- 456 [21] Garey MR, Johnson DS (1979) Computers and In- tractability: A Guide to the Theory of NP-Completeness. Freeman, San Francisco, CA [22] Derrida B (1981) Random-energy Model: An Exactly Solvable Model of Disordered Systems. Phys. Rev. B 24: 2613 -- 2626 [23] Saakian DB, Fontanari JF (2009) Evolutionary dynam- ics on rugged fitness landscapes: Exact dynamics and information theoretical aspects. Phys. Rev. E 80: 041903 [24] Shibanai Y, Yasuno S, Ishiguro I (2001) Effects of Global Information Feedback on Diversity. J. Conflict Res. 45: 80 -- 96 [31] Girvan M, Newman MEJ (2002) Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA 99: 7821 -- 7826 [32] Englemore R, Morgan T (1988) Blackboard Systems. Addison- Wesley, New York [33] Clune J, Mouret J-B, Lipson H (2013) The evolution- ary origins of modularity. Proc. R. Soc. B Biol. Sci. 280: 20122863 [34] Kurvers, RHJM, Krause J, Croft DP, Wilson ADM, Wolf M (2014) The evolutionary and ecological consequences of animal social networks: emerging issues. Trends Ecol. Evol. 29: 326 -- 335 [35] Dunbar RIM (1992) Neocortex size as a constraint on group size in primates. J. Human Evol. 22: 469 -- 493 [36] Barrat A, Barthelemy M, Vespignani A (2008) Dynami- cal processes on complex networks. Cambridge University Press, Cambridge, UK [37] Waters JS, Fewell JH (2012) Information Processing in Social Insect Networks. PLoS ONE 7: e40337 [25] Peres LR, Fontanari JF (2011) The media effect in Ax- [38] Gross T, Blasius B (2008) Adaptive coevolutionary net- elrod's model explained. Europhys. Lett. 96: 38004 works: a review. J. R. Soc. Interface 5: 259 -- 271 [26] Axelrod R (1997) The Dissemination of Culture: A Model with Local Convergence and Global Polarization. J. Conflict Res. 41: 203 -- 226 [27] Barbosa LA, Fontanari JF (2009) Culture-area relation in Axelrod's model for culture dissemination. Theor. Biosci. 128: 205 -- 210 [28] Albert R, Barab´asi A-L (2002) Statistical mechanics of complex networks. Rev. Mod. Phys. 74: 47 -- 97 [29] Barab´asi A-L, Albert R (1999) Emergence of scaling in random networks. Science 286: 509 -- 512 [30] Watts DJ, Strogatz SH (1998) Collective dynamics of 'small-world' networks. Nature 393: 440 -- 442 [39] Perra N, Gon¸calves B, Pastor-Satorras R, Vespignani A (2012) Activity driven modeling of time varying net- works. Sci. Rep. 2: 469 [40] Axelrod R (1984) The Evolution of Cooperation. Basic Books, New York [41] Laland KN, Williams K (1998) Social transmission of maladaptive information in the guppy. Behav. Ecol. 9: 493 -- 499 [42] Laland KN, Atton N, Webster MM (2011) From fish to fashion: experimental and theoretical insights into the evolution of culture. Phil. Trans. R. Soc. B 366: 958 -- 968 [43] Moffett MW (2011) Adventures among Ants: A Global Safari with a Cast of Trillions. University of California Press, Oakland
1802.01159
1
1802
2018-02-04T17:13:33
Mining Twitter Conversations around E-commerce Promotional Events
[ "cs.SI" ]
With Social Media platforms establishing themselves as the de facto destinations for their customers views and opinions, brands around the World are investing heavily on invigorating their customer connects by utilizing such platforms to their fullest. In this paper, we develop a novel technique for mining conversations in Twitter by weaving together all conversations around an event into one unified graph (Conversation Graph, henceforth). The structure of the Conversation Graph emerges as a variant of the BOWTIE structure (dubbed ASKEWBOWTIE henceforth) as a result of the complex communication patterns amongst these players. Finally, we investigate the structural properties of the ASKEWBOWTIE structure to understand the configuration of the components and their temporal evolution.
cs.SI
cs
CSCW '16 COMPANION, FEBRUARY 27 -- MARCH 2, 2016, SAN FRANCISCO, CA, USA Mining Twitter Conversations around E-commerce Promotional Events Binny Mathew Dept. of CSE IIT Kharagpur, India [email protected] Niloy Ganguly Dept. of CSE IIT Kharagpur, India [email protected] Unnikrishnan T A Dept. of CSE IIT Kharagpur, India [email protected] Samik Datta Flipkart Ltd. Bangalore, India [email protected] Tanmoy Chakraborty Dept. of CSE IIT Kharagpur, India [email protected] Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author. Copyright is held by the owner/author(s). CSCW '16 Companion, February 27 - March 02, 2016, San Francisco, CA, USA ACM 978-1-4503-3950-6/16/02. http://dx.doi.org/10.1145/2818052.2869130 345 Abstract With Social Media platforms establishing themselves as the de facto destinations for their customers' views and opinions, brands around the World are investing heavily on invigorating their customer connects by utilizing such platforms to their fullest. In this paper, we develop a novel technique for mining conversations in Twitter by weaving together all conversations around an event into one unified graph (Conversation Graph, henceforth). The structure of the Conversation Graph emerges as a variant of the BOWTIE structure (dubbed ASKEWBOWTIE henceforth) as a result of the complex communication patterns amongst these players. Finally, we investigate the structural properties of the ASKEWBOWTIE structure to understand the configuration of the components and their temporal evolution. Author Keywords Twitter conversations; ASKEWBOWTIE; E-commerce. ACM Classification Keywords E.1 [Data Structures]: Graphs and Networks Introduction The open nature of Twitter and its wealth of publicly available communications have attracted the attention of the research community. However, majority of the existing SESSION: POSTERS Event #tweets #users BBD BASD2 BASD3 135, 593 51, 323 160, 322 40, 891 10, 926 19, 155 # tweets with @ 96, 263 43, 360 139, 896 Table 1: Description of the data-sets. Data-set Precision% Recall% 89.50% 89.82% BBD 90.54% 91.56% BASD2 92.36% 92.54% BASD3 Table 2: Accuracy of sentiment tagger for three datasets. Graph BBD BASD2 BASD3 LSCC U T 36K 118K 83% 8K 56K 88% 14K 210K 90% T (LSCC) 95.21% 96.54% 95.49% Table 3: Statistics of the Conversation Graphs. The columns LSCC and T (LSCC) denote the percentage concentration of the total SCC mass and flow associated with LSCC respectively. Component IN LSCC OUT TENDRILS DISC BASD2 BBD BASD3 63% 55.3% 57.1% 12% 23.1% 21.1% 1.5% 3.5% 1.2% 21% 13.8% 14.3% 6.2% 2.8% 6.7% Table 4: Concentration of masses in different components of the ASKEWBOWTIE. literature [3] focus on studying these conversations in isolation. These works highlight the importance of studying the overall structure that emerges in Social Media due to an Event. Chierichetti et al. [2] studied short-lived events, like a goal scored in SUPERBOWL, where users share their views and opinions to the World. In contrast, in this paper we collect and study all the conversations that took place around three large-scale e-commerce promotional events conducted by India's largest e-commerce portal, Flipkart. Through a detailed study of the users' profile, activity etc., we find several classes of users existing in the conversational ecosystem. We weave together all these conversations into a Conversation Graph, and find that the graph demonstrates a stable BOWTIE-like structure - hitherto observed in World Wide Web [1] - mainly comprising of three connected components - IN, LSCC1, OUT (Figure 1). The IN component enjoys the largest concentration of users, and hence, we term this variant the ASKEWBOWTIE. Finally, we conduct a thorough analysis to understand the structural properties of the ASKEWBOWTIE. Data-sets We focus on three large-scale promotional events, conducted by FLIPKART, that attracted enormous public and mainstream media attention: BigBillionDay (BBD), BigAppShoppingDays (BASD2 and BASD3). The statistics of the crawled data-sets are presented in Table 1. We further gathered from Twitter other publicly available information on the authors of those tweets, e.g., account creation time, total number of tweets till date, list of followers and followings, the time-stamp of their latest tweets etc. As an estimate of their influence, we also obtained their Klout-scores2 through the publicly available APIs. 1Largest Strongly Connected Component 2https://klout.com/home Users and Opinions Given that 11% of the tweets across our data-sets were written in vernacular3, we chose not to use off-the-shelf Sentiment Analysis tools. Instead, building upon the features proposed in [5], we train a binary classifier (Support Vector Machine). Three annotators annotated 1000 tweets for each data-set with positive and negative sentiments (average inter-annotator agreement 89%). On average, we obtain precision and recall of 90%, as can be seen from Table 2 with 10-fold cross-validation. Based on this Sentiment Analysis, we further classify the Twitter handles into 4 categories: (i) HAPPY: Happy customers having a positive opinion on average, (ii) UNHAPPY: Unhappy customers who had negative opinion on average, (iii) ADVERSARIAL: Adversarial accounts spreading negative sentiments, purposefully, (iv) PROMOTER: Friendly accounts spreading positive sentiments, perhaps as a result of incentives. We resort to a collection of heuristics to arrive at a rule-based classifier for this purpose. The Conversation Graph Twitter provides two peer-to-peer communication primitives - reply and mention - that encourage conversations amongst the users. We also consider re-tweets, in our definition of conversation. Let T and U denote the universe of such tweets and users, respectively, in our crawls. For each tweet, t ∈ T , let a(t) ∈ U and R(t) ⊂ U denote the author and recipients of the tweet t, respectively. Then we create a Conversation Graph, G(U,T ). For each tweet t ∈ T , a directed edge is added from u to v, whenever u = a(t) and v ∈ R(t). Multiple edges between vertex-pairs are converted to weighted edges. Furthermore, let ta denote the 3https://github.com/irshadbhat/litcm 346 CSCW '16 COMPANION, FEBRUARY 27 -- MARCH 2, 2016, SAN FRANCISCO, CA, USA Figure 1: A Schematic diagram of a ASKEWBOWTIE. Data-sets Measures BBD BASD2 BASD3 WF LD PP CW WF LD PP CW WF LD PP CW T (IN → LSCC) 27930.01 0.47 0.34 0.01 9152.05 0.46 0.10 0.006 24264.46 0.46 0.20 0.02 T (LSCC → OUT) 423.31 0.48 0.41 0.004 408.71 0.47 0.15 0 3463.02 0.49 0.70 0.002 Table 5: Formality of tweets in T (IN → LSCC) and T (LSCC → OUT). Features [4]: (i) Word Frequency (WF ) measuring rarity of words, (ii) Lexical Density (LD) capturing the stylistic difference between corpora in terms of the proportion of verbs, nouns, adjectives and adverbs, (iii) Personal Pronouns (PP) measuring the usage of Third Person Pronouns, and, (iv) Curse Words (CW ) measuring frequency of abusing words. Higher values of LD and PP hints at more formal communication; whereas WF and CW has opposite effects. creation-time of the tweet. The sub-graph induced by tweets created during (d, d + ∆), G(T(d,d+∆)) allows us to view a time-slice of the conversation graph. For subsets of users, U ⊂ U, we let G(U ) denote the sub-graph induced by vertices in U. Similarly, for a pair of such subsets, (Ui, Uj), we let T (Ui → Uj) = {t a(t) ∈ Ui, R(t)∩ Uj 6= ∅, t ∈ T } denote the flow across the cut (Ui, Uj). We summarize all the conversation graphs in Table 3. The ASKEWBOWTIE. To begin with, we decompose the graph into its Strongly Connected Components (SCC). All pairs of vertices within each SCC enjoy bi-directional connectivity. We observe that the largest such SCC (dubbed LSCC) is a giant, accounting for 81.5% of SCC mass throughout our data-sets. We further decompose G(U,T ) into components according to their reachability to and from LSCC. For example, all vertices in LSCC are reachable from all vertices in IN, but not vice-versa. Similarly, all vertices in OUT are reachable from all vertices in LSCC in a strictly uni-directional manner. Note that vertices in TENDRILS enjoy no directed reachability to and from LSCC. Vertices in DISC are disconnected from rest of the graph. A schematic of the structure is presented in Figure 1. The relative sizes of these components across our data-sets are captured in Table 4. Given the skew of concentration towards the IN component, we call the structure ASKEWBOWTIE in what follows. Next, we study the users that fall into each of these components. Components To understand the components better, we now set out to investigate the users that fall into different components of ASKEWBOWTIE. User Type. First, we study the distributions of different 347 handle-types across components. We observe that, across our data-sets, majority of the PROMOTER handles fall into LSCC, whereas, majority of the ADVERSARIAL handles are concentrated within IN. Given the heavy concentration of users in IN, we observe a large concentration of handles of all types, apart from PROMOTER. User Influence. To study the influence of the users, we use Klout scores as an estimate. The median influence score for BBD in LSCC and OUT is 66% and 71% higher than that of the other components, respectively. This conforms to our intuition than LSCC and OUT house more influential users than rest of the graph. Figure 2: Alluvial diagram depicting the migration of users across components of the ASKEWBOWTIE over four consecutive days during BBD. Each colored block represents a different component. Block size indicates the size of the component, and the shaded waves joining the blocks represent migrations. The width of the wave is proportional to the fraction of users that had migrated. Temporal Dynamics. Here, we study the stability of the ASKEWBOWTIE by constructing time-slices of the conversation graph, G(T(d,d+1)), in cumulative fashion at different days during the promotional event. We see in SESSION: POSTERS Figure 3: Cumulative Distribution Function of the sentiment-scores for two flows - T (IN → LSCC) and T (LSCC → OUT) in the ASKEWBOWTIE (in x-axis, 0 and 1 indicate extreme negative and extreme positive sentiments respectively. Figure 2 that the observed skewness of the ASKEWBOWTIE structure remains invariant across the days. TENDRILS tend to be the most unstable among the components, with 35% of the users inside it eventually moving to the rest of the components, majority towards IN. We notice that 51.8% of the users who freshly join the conversations each day add to IN, followed by 37.2% added to TENDRILS each day. In contrast, LSCC sees only 4.04% of the arrivals each day, hinting at the relative stability of the core of the conversation. From the perspective of the organizers of these promotional events, the migration of users to LSCC and OUT indicates increasing engagement levels. Flows Now we turn our attention from the components to the flow across the components of the ASKEWBOWTIE. In particular, we seek flow features that discriminate the T (IN → LSCC) flow from the T (LSCC → OUT). Opinion. In Figure 3, we plot the cumulative distribution function of the sentiment-scores of tweets t ∈ T (IN → LSCC) and t ∈ T (LSCC → OUT). We observe that the T (IN → LSCC) flow is more negative in general, barring BASD2 where the overall sentiment was positive, and BBD where the overall sentiment was predominantly negative. This conforms to our hypothesis that the UNHAPPY users that abound in IN are responsible for the more negative opinions in T (IN → LSCC). Formality. We turn to study the language of the tweets - in particular, their degree of adherence to the linguistic standards. Using the technique proposed in [4], we answer the question: Is T (LSCC → OUT) more formal than T (IN → LSCC)? Table 5 summarizes our observations and demonstrates that communications in T (LSCC → OUT) are more formal than the communications in T (IN → LSCC), 348 again confirming our hypothesis. This perhaps indicates that LSCC serves as a refiner of the tweets flowing from IN to OUT and provides more meaningful information to the users in OUT. Conclusions and Future Work In this paper, we weaved together all the conversations around large-scale e-commerce promotional events in Twitter into a conversation graph, and found that the graph demonstrates a stable ASKEWBOWTIE structure. We believe that the insights regarding structure and temporal dynamics of the Conversation Graph obtained through this study would help design better Social Relationship Management tools, which is our penultimate goal. References [1] Andrei Broder, Ravi Kumar, Farzin Maghoul, Prabhakar Raghavan, Sridhar Rajagopalan, Raymie Stata, Andrew Tomkins, and Janet Wiener. 2000. Graph Structure in the Web. Comput. Netw. 33, 6 (2000), 309 -- 320. [2] Flavio Chierichetti, Jon Kleinberg, Ravi Kumar, Mohammad Mahdian, and Sandeep Pandey. 2014. Event detection via communication pattern analysis. In AAAI. 51 -- 60. [3] Peter Cogan, Matthew Andrews, Milan Bradonjic, W Sean Kennedy, Alessandra Sala, and Gabriel Tucci. 2012. Reconstruction and analysis of twitter conversation graphs. In HotSocial. ACM, 25 -- 31. [4] Yuheng Hu, Kartik Talamadupula, and Subbarao Kambhampati. 2013. Dude, srsly?: The Surprisingly Formal Nature of Twitter's Language. In ICWSM. Cambridge, USA, 244 -- 253. [5] Saif M Mohammad, Svetlana Kiritchenko, and Xiaodan Zhu. 2013. NRC-Canada: Building the state-of-the-art in sentiment analysis of tweets. In SEM. 321 -- 327.
1308.3831
3
1308
2013-11-20T02:31:23
Strict majority bootstrap percolation in the r-wheel
[ "cs.SI", "math.PR" ]
In this paper we study the strict majority bootstrap percolation process on graphs. Vertices may be active or passive. Initially, active vertices are chosen independently with probability p. Each passive vertex becomes active if at least half of its neighbors are active (and thereafter never changes its state). If at the end of the process all vertices become active then we say that the initial set of active vertices percolates on the graph. We address the problem of finding graphs for which percolation is likely to occur for small values of p. Specifically, we study a graph that we call r-wheel: a ring of n vertices augmented with a universal vertex where each vertex in the ring is connected to its r closest neighbors to the left and to its r closest neighbors to the right. We prove that the critical probability is 1/4. In other words, if p>1/4 then for large values of r percolation occurs with probability arbitrarily close to 1 as n goes to infinity. On the other hand, if p<1/4 then the probability of percolation is bounded away from 1.
cs.SI
cs
Strict majority bootstrap percolation in the r-wheel∗ M. Kiwia, P. Moisset de Espan´esa, I. Rapaporta,∗, S. Ricab, G. Theyssierc aDIM, CMM (UMI 2807 CNRS), Universidad de Chile bFacultad de Ingenier´ıa y Ciencias, Universidad Adolfo Ib´anez cLAMA, Universit´e de Savoie, CNRS, France Abstract In the strict Majority Bootstrap Percolation process each passive vertex v be- comes active if at least ⌈ deg(v)+1 ⌉ of its neighbors are active (and thereafter 2 never changes its state). We address the problem of finding graphs for which a small proportion of initial active vertices are likely to eventually make all ver- tices active. We study the problem on a ring of n vertices augmented with a "central" vertex u. Each vertex in the ring, besides being connected to u, is connected to its r closest neighbors to the left and to the right. We prove that if vertices are initially active with probability p > 1/4 then, for large values of r, percolation occurs with probability arbitrarily close to 1 as n → ∞. Also, if p < 1/4, then the probability of percolation is bounded away from 1. Keywords: bootstrap percolation, interconnection networks. 1. Introduction Consider the following deterministic process on a graph G = (V, E). Initially, every vertex in V can be either active or passive. A passive vertex v becomes active iff at least k of its neighbors are already active; once active, a vertex never changes its state. This process is known as k-neighbor bootstrap percolation [4]. If at the end of the process all vertices are active, then we say that the initial set of active vertices percolates. We wish to determine the minimum ratio of initial active vertices needed to achieve percolation with high probability. More precisely, suppose that the elements of the initial set of active vertices A ⊆ V ∗Corresponding author ([email protected]). ∗Supported by CONICYT via Basal (M.K.,P.M.,I.R), N´ucleo Milenio ICM/FI P10-024F (M.K.,I.R.), Fondecyt 1130061 (I.R.), Fondecyt 1130709 (S.R.), ANR-09-BLAN-0164 (G.T.). Preprint submitted to Elsevier October 18, 2018 are chosen independently with probability p. The problem is finding the least p for which percolation of A is likely to occur. Since its introduction by Chalupa et al [4], the bootstrap percolation process has mainly been studied in the d-dimensional grid [n]d = {1, . . . , n}d [1]. The precise definition of critical probability that has been used is the following: pc([n]d, k) = inf{p ∈ [0, 1] : Pp(cid:0)A percolates [n]d(cid:1) ≥ 1/2}. In [1] it is proved that, for every d ≥ k ≥ 2, pc([n]d, k) =(cid:16) λ(d,k)+o(1) log(k−1) n (cid:17)d−k+1 , where λ(d, k) < ∞ are equal to the values of specific definite integrals for every d ≥ k ≥ 2. In the (simple) Majority Bootstrap Percolation (simple MBP) process (introduced in [2]) each passive vertex v becomes active iff at least ⌈ deg(v) ⌉ of its neighbors are active, where deg(v) denotes the degree of vertex 2 v in G. Note that for [n]d, the critical probability for simple MBP percolation corresponds to pc([n]d, d), which goes to 0 as n → ∞. Here we introduce the strict Majority Bootstrap Percolation (strict MBP) process: each passive vertex v becomes active iff at least ⌈ deg(v)+1 2 ⌉ of its neigh- bors are active. Note that if deg(v) is odd, then strict and simple MBP coincide. For [n]d the critical probability in strict MBP pc([n]d, d+1) goes to 1. This holds because, in this case, any unit hypercube starting with its 2d corners passive will stay passive forever. A natural problem is finding graphs for which the critical probability in the strict MBP is small. Results by Balogh and Pittel [3] imply that the critical probability of the strict MBP for random 7-regular graphs is 0.269. In [6], two families of graphs for which the critical probability is also small (but higher than 0.269) are explored. The idea behind these constructions is the following. Consider a regular graph of even degree G. Let G ∗ u denote the graph G augmented with a single universal vertex u. The strict MBP dynamics on G ∗ u has two phases. In the first phase, assuming that vertex u is not initially active, the dynamics restricted to G corresponds to the strict MBP. If more than half of the vertices of G become active, then the universal vertex u also becomes active, and the second phase begins. In this new phase, the dynamics restricted to G follows the simple MBP (and full activation becomes much more likely to occur). 2 The two augmented graphs studied in [6] were the wheel WHn = u ∗ Rn and the toroidal grid plus a universal vertex TWHn = u ∗ R2 n (where Rn is the n is the toroidal grid on n2 vertices). For a family of ring on n vertices and R2 graphs G = (Gn)n, the following parameter was defined (as before, A denotes the initial set of active vertices): p+ c (G) = infnp ∈ [0, 1] : lim inf n→∞ Pp (A percolates Gn in strict MBP) = 1o . Consider the families WH = (WHn)n and T WH = (TWHn)n. It was proved in [6] that p+ c (WH) = 0.4030.... For the toroidal case it was shown that 0.35 ≤ p+ c (T WH) ≤ 0.372. Computing the critical probability for the wheel is trivial. Nevertheless, if we increase the radius of the vertices, then the situation becomes much more complicated. More precisely, let Rn(r) be the ring where every vertex is connected to its r closest vertices to the left and to its r closest vertices to the right. Here we study the strict MBP process in a generalization of the wheel that we call r-wheel WHn(r) = u ∗ Rn(r). Our main result is the following: Theorem 1. The limit of p+ c (WH(r)), as r → ∞, exists and equals 1/4. 2. Preliminary results We start by showing that we can reduce our problem to the issue of whether a single fixed (non-universal) vertex eventually becomes active. Lemma 2. Let 0 < p < 1 be the probability for a vertex to be initially active. Let r be a positive integer. Denote by pW (n, r, p) the percolation probability of the r-wheel and denote by pR(n, r, p) the probability that the strict majority on Rn(r) ends up with (strictly) more active than passive vertices. Then, lim inf n→∞ pR(n, r, p) ≤ lim inf n→∞ pW (n, r, p), lim sup n→∞ pW (n, r, p) ≤ p + (1 − p) · lim sup n→∞ pR(n, r, p). Proof. Note that for ǫ > 0 we can choose n large enough so that the probability that at least one block of r consecutive vertices are initially active is larger than 1 − ǫ, in which case percolation occurs iff the universal vertex becomes active during the evolution. We deduce the first inequality by taking ǫ arbitrarily small. 3 Note now that the universal vertex is active when the dynamics stabilizes only if it was either already active initially (probability p) or if it was initially passive and the dynamics on the ring Rn(r) produces more than n/2 active vertices. The vertices of the ring Rn will be denoted as 0, 1, . . . , n − 1, starting at some arbitrary vertex (arithmetic over vertex indices will always be modulo n). The positive integer r will be called the radius. Lemma 2 shows that we can study the ring Rn(r) and its dynamics to derive results about the r-wheel. Now, fix some arbitrary vertex and consider the 0-1 random variable Xi(n, r) giving the state of vertex i after stabilization of the dynamics (Xi(n, r) = 0 if the state is passive, and Xi(n, r) = 1 if it is active). Next, we show how to bound pR(n, r, p) in terms of Ep (X0(n, r)). Lemma 3. Let 0 < p < 1, n ∈ N+, and r a fixed radius. Then, 2Ep (X0(n, r)) − 1 ≤ pR(n, r, p) ≤ 2Ep (X0(n, r)) . Proof. By definition pR(n, r, p) = Pp (Pi Xi(n, r) > n/2). By Markov's inequal- ity we then have Pp (Pi Xi(n, r) > n/2) ≤ 2 Ep (Pi Xi(n, r)) . Using linearity of expectation and the fact that all Xi(n, r) are equally distributed (symmetry n of the ring), we deduce pR(n, r, p) ≤ 2Ep (X0(n, r)). The lower bound is ob- tained in the same way considering again Markov's inequality but for the (again positive) random variable n −Pi Xi(n, r). More precisely: pR(n, r, p) = 1 − Pp n −Xi Xi(n, r) > n/2! ≥ 1 − 2 n Ep n −Xi Xi(n, r)! 3. Lower bound on p + c (WH(r)) We will assume n > 2r + 1 and that the initial state of the universal vertex u is passive. Let 0 < p < 1/2 and q = 1 − p. The starting configuration σ = (σ0, . . . , σn−1), where vertex j is initially active (respectively passive) if and only if σj = 1 (respectively σj = 0), occurs with probability pPj σj qn−Pj σj . We write X0 instead of X0(n, r). Conditioning on σ0, Pp (X0 = 1) ≤ p + Pp (X0 = 1σ0 = 0) . (1) 4 We say there is a wall located ℓ > 0 vertices to the left of vertex 0 if σ−ℓ = 1, σ−ℓ−1 = σ−ℓ−2 = . . . = σ−ℓ−(r+1) = 0. Similarly, we say there is a wall located at ℓ > 0 vertices to the right of vertex 0 if σℓ = 1, σℓ+1 = σℓ+2 = . . . = σℓ+(r+1) = 0. Let L (respectively R) be the smallest positive ℓ such that there is a wall located ℓ vertices to the left (respectively right) of vertex 0 (if a wall does not occur, let L = R = n). For 0 < ∆ < n to be fixed later, and since L and R are identically distributed, we have that: Pp (X0 = 1σ0 = 0) ≤ 2 · Pp (X0 = 1, R ≥ ∆σ0 = 0) + Pp (X0 = 1 ∧ L, R < ∆σ0 = 0) (2) Summarizing, to bound Ep (X0) = Pp (X0 = 1) we can bound the two terms in the right hand side of (2). The proof of next lemma is straightforward. Lemma 4. For 0 < p < 1 and positive integers a, r, Ep (Rσ0 = σ1 = . . . = σa−1 = 0, σa = 1) ≤ q−r(aqr + 1/(pq)). Proof. Consider a Markov chain with states labeled 0, 1, . . . , r + 1 where for all s ≤ r, the probability of going from state s to 0 (respectively s to s + 1) is p (respectively q), and once state r + 1 is reached, the Markov chain stays there forever. For s ∈ {0, . . . , r+1}, let Ns be the number of steps it takes the Markov chain to reach state r + 1 when it starts at state s. Note that E (Rσ0 = σ1 = . . . = σa−1 = 0, σa = 1) ≤ a + E (N0) . Moreover, E (Nr+1) = 0, and E (Ns) = 1 + q · E (Ns+1) + p · E (N0) for all 0 < s ≤ r. Thus, for all 0 ≤ s ≤ r + 1, E (N0) = 1 qj + E (Ns) = s Xj=1 1 qj ≤ 1 pqr+1 . r+1 Xj=1 Putting everything together yields the result. Corollary 5. For 0 < p < 1 and positive integers r, ∆, Pp (X0 = 1, R ≥ ∆σ0 = 0) ≤ 1 ∆ · q−r(rqr + 1/(pq)). Proof. If vertex 0 eventually becomes active, it must be the case that initially it did not belong to a block of r + 1 consecutive passive vertices. Thus, if X0 = 1 and σ0 = 0, then there must exist a positive integer a such that a ≤ r, 5 σ1 = σ2 = . . . = σa−1 = 0, and σa = 1. For brevity, we will denote this particular array of outcomes for the σ's as Ca. By Markov's inequality, Pp (X0 = 1, R ≥ ∆σ0 = 0) ≤ Pp (R ≥ ∆Ca) Pp (Ca) ≤ 1 ∆ max a=1,...,r Ep (RCa) . r Xa=1 The desired conclusion follows from Lemma 4. Lemma 6. For 0 < p < 1/2 and positive integers r, ∆, Pp (X0 = 1 ∧ L, R < ∆σ0 = 0) ≤ 2∆ (4pq)r . Proof. Suppose the closest wall to the left (respectively right) of vertex 0 is at vertex −a (respectively b). Furthermore, suppose vertex 0 is passive. Note that for vertex 0 to eventually become active, it must be the case that some passive vertex i for −a < i < b must necessarily become active the first time the strict majority dynamics is applied. Hence, if Si denotes the number of j's, j 6= i and i − r ≤ j ≤ i + r, for which vertex j initially takes the value 1, then Pp (X0 = 1 ∧ L, R < ∆σ0 = 0) ≤ Pp (∃i, −∆ < i < ∆s.t.Si ≥ r + 1) ≤ 2∆ max i:−∆<i<∆ Pp (Si ≥ r + 1) . However, a Chernoff bound tells us that, for t = 1/2 − p ≤ (r + 1)/(2r) − p, Pp (Si ≥ r + 1) ≤ Pp (Si ≥ (p + t) · 2r) ≤ (cid:18) p p + t(cid:19)p+t(cid:18) q q − t(cid:19)q−t!2r ≤ (4pq)r Putting everything together yields the conclusion. Theorem 7. For all 0 < p < 1/4 there exists a large enough integer r0 = r0(p) such that if r ≥ r0 and n > 2r + 1, then Ep (X0(n, r)) < 1/4. Proof. Let r′ 0 = r′ 0(p) be such that r ≥ r′ C = 8r/(pq). By Corollary 5, Pp (X0 = 1, R ≥ Cq−rσ0 = 0) ≤ 2 0 implies that rqr ≤ 1/pq, and let Cpq = 1 4r . By (1), and fixing ∆ = Cq−r in (2), and Lemma 6, we obtain that: Pp (X0 = 1) ≤ p + 1 2r + 2Cq−r(4pq)r = p + 1 2r + 2C(4p)r. Hence, for p < 1/4 there exists a large enough positive integer r0 = r0(p) ≥ r′ so that if r ≥ r0, then p + 1 2r + 2C(4p)r < p + 1 r < 1/4. 0(p) Theorem 7, Lemma 3, and Lemma 2 yield the following: Corollary 8. lim inf r→∞ p+ c (WH(r)) ≥ 1/4. 6 4. Upper bound on p + c (WH(r)) Consider a simplified process with three states on the one-dimensional integer lattice Z: (i) w, a wall, (ii) s, a spreading state, and (iii) e, an empty lattice point. Let sites in state w and s remain so forever, and in consecutive rounds let sites in state e with at least one neighbor in state s update to state s. Let pw, ps and pe be positive initial probabilities of states w, s and e respectively, where pw + ps + pe = 1. Each lattice point is initially assigned a state, independent of the other lattice point states. Lemma 9. The probability that lattice point 0 is eventually in state s is greater than 1/(1 + pw/ps). Proof. Define sL (respectively sR) to be state of the closest lattice point on the left (respectively right) of 0 whose state is not e. Since pe = 1−pw −ps < 1, both sL and sR are well-defined with probability 1. Let E be the event that lattice point 0 is eventually in state s, and denote by P its probability of occurring. Note that for E to occur, either the lattice point 0 is initially in state s, or it is initially in state e and at least one of the lattice points sL or sR is initially in state s. Hence, recalling that pe = 1 − pw − ps < 1, P = ps + pe Xi≥0,j≥0 ≥ ps(cid:18)1 + 1 1 + pw/ps . pi+j e (p2 s + 2pwps) = ps + ps(ps + 2pw)pe (1 − pe)2 1 − pw − ps pw + ps (cid:19) = We now consider again the strict MBP process in the ring Rn(r) and reduce it to the aforementioned three-state model as follows: Fix some length ℓ and partition the vertices of Rn(r) into length ℓ blocks (i.e., sets of ℓ consecutive vertices, where n = tℓ). Let Wℓ,r be the set of all possible blocks of length ℓ that contain r + 1 consecutive passive vertices. Also, let Sℓ,r be the set of all blocks of length ℓ that do not contain r + 1 consecutive passive vertices and that, for any state configuration for vertices not contained in the block, all the vertices belonging to the block eventually become active when applying the strict majority dynamics. Any block in Wℓ,r is a wall in Rn(r) and any block in Sℓ,r is a spreading state. Any other block is an empty state. Let µ(Wℓ,r) 7 (respectively µ(Sℓ,r)) be the probabilityr that an arbitrary block belongs to Wℓ,r (respectively Sℓ,r). The following lemma is not difficult to prove: Lemma 10. For 0 < p < 1 and positive integers r, ℓ, (i) lim inf n→∞ Ep (X0(n, r)) ≥ 1/(cid:0)1 + µ(Wℓ,r)/µ(Sℓ,r)(cid:1). (ii) If ℓ ≥ r + 1, then µ(Wℓ,r) ≤ ℓqr+1. We will now find a lower bound for µ(Sℓ,r). The goal is to prove that µ(Wℓ,r ) µ(Sℓ,r ) goes to 0 when r → ∞. For that purpose we denote, for any 0-1 word v, by v0 (respectively v1) the number of occurrences of symbol 0 (respectively 1) in v, and denote the i-th character of v by vi. We set ℓ = 2r + 1 and consider the set Tr of binary words v of length ℓ satisfying the following properties: (1) v1 = r + 1,v0 = r; (2) v0 = v2r = 1, vr = 0 and (3) the word w = w1 · · · wr−1 of length r − 1 over alphabet {0, 1}2 defined by wi = (vi, vi+r) is a generalized Dyck word [5] associated to the weight function ω(a, b) = +1 if (a, b) = (0, 0), ω(a, b) = −1 if (a, b) = (1, 1) and ω(a, b) = 0 otherwise. I.e., ω satisfies the i=1 ω(wi) ≥ 0 for all 1 ≤ j ≤ r − 1, and (ii) following two conditions: (i) Pj Pr−1 i=1 ω(wi) = 0. Lemma 11. If r is a positive integer and ℓ = 2r + 1, then Tr ≤ Sℓ,r. Proof. Consider some v ∈ Tr and denote by w the word of length r − 1 over the alphabet {0, 1}2 as defined above. We first consider successively each vertex i of Rn(r), for i = r to i = 2r − 1, and apply the strict majority dynamics to it. Initially, the state of vertex i is vi. During this first sequence of updates, we denote by ni the number of 1s in the neighborhood of vertex i at the time this vertex is considered (i.e., we take into account updates of vertices j < i which possibly occurred before in the sequence). Since v ∈ Tr, we have that v1 = r + 1, so at the beginning of the process i = r and nr = r + 1. We claim that for all i with r ≤ i < 2r − 1, when we consider vertex i + 1 in the process we have ni+1 − ni = ω(wi+1−r) and the state of vertex i is 1. This claim is deduced by induction from the fact that i − r is the only vertex of index less than i + 1 in the symmetric difference of the neighborhoods of vertices i and i + 1, hence ni+1 − ni = δ+ − δ− where δ+ = 1 if vertex i was updated from 0 to 1 in the previous step and 0 otherwise, and δ− = 1 if vi−r = 1 and 0 otherwise. Using the induction hypothesis for all j ≤ i, by the Dyck property of w, we 8 have ni = nr +Pi−r j=1 ω(wj) ≥ nr = r + 1. Hence, if vertex i was 0 before being considered (vi = 0), it updates to 1 when considered. In any case vertex i is 1 once considered in the process. Moreover, we have δ+ = 1 iff vi = 0 and we deduce that δ+ − δ− = ω(wi+1−r), thus establishing the claim. Now, from the claim, we deduce that all vertices from i = r to i = 2r are active when the sequence of updates ends. Then, we consider a new sequence of updates from vertex i = r − 1 to vertex i = 1 (successively). Trivially, when vertex i is considered, its neighborhood contains at least r + 1 active vertices (because the neighborhood of vertex i contains the active vertices 0 and vertices i + 1, . . . , i + r). Hence, all vertices will be active at the end of this second sequence of updates. This completes the proof of the lemma. Theorem 12. If 1 > p > 1/4, then there is an r0 = r0(p) such that for all r ≥ r0 we have: limn→∞ Ep (X0(n, r)) = 1. Proof. First, we claim that there is some positive rational function φ(·) such that Tr ≥ φ(r) · 4r for all r. To prove this, choose r = 4k + 1 (this is without loss of generality since r 7→ Tr is increasing). It is straightforward to associate injectively a word v ∈ Tr to any word w of length r − 1 = 4k over alphabet {0, 1}2 which is a generalized Dyck word associated to the weight function ω as defined before. To obtain a lower bound on the number of such generalized Dyck words, we consider the subset Uk of words w of length 4k over the al- phabet {0, 1}2 and such that (cid:12)(cid:12)(cid:8)i : ω(wi) = +1(cid:9)(cid:12)(cid:12) =(cid:12)(cid:12)(cid:8)i : ω(wi) = −1(cid:9)(cid:12)(cid:12) = k and (cid:12)(cid:12)(cid:8)i : ω(wi) = 0(cid:9)(cid:12)(cid:12) = 2k. The set Uk can be generated, up to a straightforward interleaved by binary words of size 2k. Therefore, Tr ≥ D2k ·(cid:0)4k 2k(cid:1)22k. Using rational functions φ1 and φ2 we have D2k ∼ φ1(k) · 4k and(cid:0)4k 2k(cid:1) ∼ φ2(k) · 42k. It follows that there is some positive rational function φ such that Tr ≥ φ(r) · 4r. encoding, by considering classical Dyck words of length 2k (weights +1/−1) classical results about Catalan numbers and Stirling's formula, for some positive This establishes the claim. By Lemma 11, for some positive rational function φ it holds that µ(Sℓ,r) ≥ φ(r) · qrpr+14r. By Lemma 10 (ii), µ(Wℓ,r ) µ(Sℓ,r) is asymptotically less than Φ(r) · (4p)−r, where Φ(·) is another positive rational function. If p > 1/4 then µ(Wℓ,r)/µ(Sℓ,r) goes to 0 when r → ∞. The theorem follows from Lemma 10 (i). 9 It follows that lim supr→∞ p+ c (WH(r)) ≤ 1/4 and, invoking Corollary 8, we conclude that limr→∞ p+ c (WH(r)) = 1/4. References [1] J. Balogh, B. Bollob´as, H. Duminil-Copin and R. Morris. The sharp threshold for bootstrap percolation in all dimensions. Trans. Amer. Math. Soc. 364:2667-2701 (2012). [2] J. Balogh, B. Bollob´as and R. Morris. Majority bootstrap percolation on the hypercube. Combin. Probab. Comput. 18:17-51 (2009). [3] J. Balogh and B. Pittel. Bootstrap percolation on the random regular graph. Random Structures & Algorithms 30(1-2):257-286 (2007). [4] J. Chalupa, P. L. Leath and G. R. Reich. Bootstrap percolation on a Bethe lattice. J. Phys. C: Solid State Phys. 12:L31-L35 (1979). [5] P. Duchon. On the enumeration and generation of generalized Dyck words. Discrete Math. 225(1-3):121-135 (2000). [6] I. Rapaport, K. Suchan, I. Todinca and J. Verstraete. On dissemination thresholds in regular and irregular graph classes. Algorithmica 59:16-34 (2011). 10
1612.03639
1
1612
2016-12-12T12:10:28
Connection Discovery using Shared Images by Gaussian Relational Topic Model
[ "cs.SI", "cs.IR" ]
Social graphs, representing online friendships among users, are one of the fundamental types of data for many applications, such as recommendation, virality prediction and marketing in social media. However, this data may be unavailable due to the privacy concerns of users, or kept private by social network operators, which makes such applications difficult. Inferring user interests and discovering user connections through their shared multimedia content has attracted more and more attention in recent years. This paper proposes a Gaussian relational topic model for connection discovery using user shared images in social media. The proposed model not only models user interests as latent variables through their shared images, but also considers the connections between users as a result of their shared images. It explicitly relates user shared images to user connections in a hierarchical, systematic and supervisory way and provides an end-to-end solution for the problem. This paper also derives efficient variational inference and learning algorithms for the posterior of the latent variables and model parameters. It is demonstrated through experiments with over 200k images from Flickr that the proposed method significantly outperforms the methods in previous works.
cs.SI
cs
Connection Discovery using Shared Images by Gaussian Relational Topic Model Xiaopeng Li∗, Ming Cheung†, James She‡ ∗†‡HKUST-NIE Social Media Lab, Hong Kong University of Science & Technology, Hong Kong ∗[email protected], †[email protected], ‡[email protected] 6 1 0 2 c e D 2 1 ] I S . s c [ 1 v 9 3 6 3 0 . 2 1 6 1 : v i X r a Abstract -- Social graphs, representing online friendships among users, are one of the fundamental types of data for many applications, such as recommendation, virality prediction and marketing in social media. However, this data may be unavailable due to the privacy concerns of users, or kept private by social network operators, which makes such applications difficult. Inferring users' interests and discovering users' con- nections through their shared multimedia content has attracted more and more attention in recent years. This paper proposes a Gaussian relational topic model for connection discovery using user shared images in social media. The proposed model not only models users' interests as latent variables through their shared images, but also considers the connections between users as a result of their shared images. It explicitly relates user shared images to user connections in a hierarchical, systematic and supervisory way and provides an end-to-end solution for the problem. This paper also derives efficient variational inference and learning algorithms for the posterior of the latent variables and model parameters. It is demonstrated through experiments with over 200k images from Flickr that the proposed method significantly outperforms the methods in previous works. Keywords-Bayesian, topic model, variational inference, user shared images, connection, discovery, recommendation, social network analysis. I. INTRODUCTION Social graphs (SGs), representing online friendships among users, are fundamental data for many applications, such as recommendation, virality prediction and marketing in social media. However, this data may be unavailable due to the privacy concerns of users, or kept private by social net- work operators, and these applications become challenging with an incomplete set of data. Providing a potential solution to this problem, user connections are also reflected in the abundant social content, especially images, shared on social networks. Inferring users' interests and discovering users' connections through their shared multimedia content has attracted more and more attention in recent years. A common but unreliable approach is using user annotated tags (or user tagging) associated with each shared image to discover user connections when the SG is not accessible. However, user annotated tags may be unavailable or images may be incorrectly labeled, as shown in Fig. 1. Instead of indirectly taking the image content information through tags, a more direct method is to consider the image's visual content. Users with connections of follower/followee relationships Figure 1: Examples of user shared images, image tags, user interest reflected and user connections. are found to have relatively higher visual content similarities among their shared images. An simplistic example of user generated images on Flickr is shown in Fig. 1: Both users A and B share images of cars and user C shares an image of a flower. The follower/followee relationship between users A and B can possibly be detected from the higher similarity of visual features in their shared images. When more shared images from each of users A, B and C are accessible for evaluation, the actual follower/followee relationships should become reliably and accurately detectable, though such a task is becoming challenging with the number of shared images and user connections in social networks growing larger every day. The effectiveness of connection discovery using user shared images is mainly determined by two elements: effec- tive extraction of information from images and an effective method to connect the image content to user connections. On the one hand, with the recent development of convolutional neural network (CNN), the analysis and understanding of image content has become much more effective [1] through hierarchical representation, closing the semantic gap be- tween pixels and content. It is therefore possible to extract rich image content information through CNN. On the other hand, how to effectively discover user connections using the image content remains a challenge. Summarizing the #Race #Car#Sar#Awesome#Car #AwesomeUser SharedImages:Users:ABCTags:User Connections:ABCUser Interests:CarFlowerCarFlowerCarFlower methods or frameworks proposed in previous works such as [2], [3], [4] and [5], the process is generally divided into two stages: first, construction of user profile by counting the occurrences of image labels or summing the image feature vectors, and second, prediction of connections between users based on the constructed user profile. The limitation of these methods is two-fold. First, aggregating all items in a simple way for each user might not be solid enough to capture users' interests. An analogy can be found in text analytics, where the bag-of-words model is compared with topic mod- els, especially latent Dirichlet allocation (LDA)[6]. Second, user profiling through images is completely separated from connection discovery. Separating the two potentially results in untight relatedness of image content and social links, meaning that the observation of partial social links lends no help toward connection discovery using image content. In this paper, a Gaussian relational topic model (GRTM) is proposed for connection discovery using user shared images in order to overcome the abovementioned limitations. GRTM is an end-to-end hierarchical model specifically designed to not only model users' interests through image content but also to supervise the modeling in such a way that the content of shared images is statistically connected to the links between users, inspired by hierarchical relational model in text document domain [7]. GRTM effectively extracts rich image content information through CNN and models each semantic topic as a Gaussian topic. GRTM also models each user's interests as a latent factor and assumes that the action of the user sharing an image is probabilistically motivated by his or her interests. Furthermore, the links between users are modeled based on the images each user shares. Combining these in a coherent probabilistic generative process, the proposed GRTM provides a systematic way to close the gap between the actions of users sharing images and users connecting to each other. The main contributions of this paper are the following: • proposes an end-to-end Gaussian relational topic model for connection discovery using user shared images, closely relating user shared image content to user connections. • derives efficient variational inference for the proposed model to approximate the posterior of latent variables and learn model parameters. • evaluates the performance of the proposed model with real data and proves the significantly better performance of the proposed method. The rest of the paper is organized as follows. Section II discusses previous works. Section III introduces the GRTM for connection discovery using shared images. Section IV describes in detail the inference of latent variables and model parameters, as well as the prediction method. Section V presents experimental results and discussion, and Section VII concludes the paper. II. RELATED WORKS One content-based approach to discover connections through images is to generate a label for an image based on its visual elements [8][9]. However, determining the relation- ship between the visual elements and the label is not a trivial task because the same object can be visually different among images, and denoting each image by a single label loses a lot of information. [2] and [10] propose to first generate labels for user shared images by clustering and describe users' characteristics by counting the occurrences of image clusters appearing in their collections. The prediction is then made through analyzing the similarities among the users' histograms. Both methods assume each image contains one and only one topic, neglecting potentially rich information. On the other hand, [3] and [4] represent users' interests by summing the feature vectors of their images, achieving a similar effect to the other methods. However, all these methods do not actually connect shared images to the links between users, or only connect shared images to links, and not the other way around. Relational topic model was first proposed in [7] for docu- ment networks in the text analytics domain. It is an extension of the latent Dirichlet model (LDA) [6] and supervised LDA [11]. This family of approaches model each document as topic proportions, and each word in the document is drawn from a set of topics, which are distributions over a fixed vocabulary. Furthermore, the relational topic model models the links between documents as a binary random variable that is conditioned on their contents. More recent papers, [12] and [13], share a similar methodology with this paper, also proposing a hierarchical to process user images and infer users' interest as latent factors from Bayesian inference. However, [12] starts with low- level pixels and describes image regions with visual words, while [13] models the visual descriptor as drawn from a vocabulary, just like in the text domain. Also, [12] considers no social information and hence, as with other works, does not relate image content to user relationships for connection discovery, and [13] considers the social influence of existing links to the users rather than predicting new ones. Our work extracts rich information of image content through CNN and models users' interests and users' connections simutaneously. As an end-to-end model, ours closely relates users' connections to user shared images, with the goal being connection discovery. topic model III. THE PROPOSED MODEL FOR CONNECTION DISCOVERY USING SHARED IMAGES This section introduces the problem of connection dis- covery using shared images and the proposed Gaussian relational topic model. Given a social network, there are N users, {u1, u2, . . . , uN}. Each of the users, u, shares a collection of images, Iu = {xu,1, xu,2, . . . , xu,Nu}, where Nu is the number of images the user u shares and xu,n is the Figure 3: CNN feature extraction for images and Gaussian topic ii) Draw the image xu,nzu,n,{µ, Σ}1:K ∼ N (µzu,n , Σzu,n ). 2) For each pair of users u, v: a) Draw binary link indicator between users yzu, zv ∼ ψ(·zu, zv). Fig. 2 illustrates the graphical model for the generative process. Assuming there are a total of K topics, generating an image is done by first picking the topic it belongs to. The apparent choice of distribution for picking the topic assign- ment zu,n from K possible values is multinomial distribu- tion, parameterized by the k-dimensional user preference θu. The conjugate prior for multinomial distribution is Dirichlet distribution. Therefore, the user preference θu is assumed to be drawn from Dirichlet distribution, parameterized by α. Under each topic, an image is assumed to be drawn from a multivariate Gaussian distribution, parameterized by mean µ and covariance Σ: k=1 p(xu,nzu,n,{µ, Σ}1:K) = N (xu,nµk, Σk)1(zu,n=k). (1) where 1(·) is an indicator function. Therefore, given the pa- rameters α and topic distribution {µ, Σ}1:K, the generative probability of a user shared image is given by p(xu,n,zu,n, θuα,{µ, Σ}1:K) = p(θuα)p(zu,nθu)p(xu,nzu,n,{µ, Σ}1:K). (2) Given two users and the topic assignments of all their images, the link between the two users is determined by the link probability function ψ. Specifically, the exponential function is adopted due to the linear form of the log likelihood [7]: K(cid:89) (cid:80) ψ(y = 1zu, zv) = exp(ηT ( ¯zu ◦ ¯zv) + ν), (3) where ¯zu = 1 notation ◦ denotes the element-wise product. Nu n zu,n, η and ν are parameters, and the The overall joint likelihood of the observation, i.e., the user shared images and links between users, and the latent variables, i.e., the user preference and topic assignment, is Figure 2: The proposed Gaussian Relational Topic Model (GRTM) (shaded nodes are observed.) nth image shared by the user u. The connections between users are not available due to privacy concerns or proprietary information protection. However, the connections can still be discovered through the images shared by the users. The objective is to predict the possible connections between users based on the user shared images. The proposed GRTM model, is based on Gaussian mixture model and relational topic model, as shown in Fig. 2. It is a generative probabilistic model in which a user is described by a topic distribution that is reflected through his or her collection of shared images. It models that the action of a user sharing an image follows a generative process: a user's preferences or the topic proportion in his or her collections is generated through a Dirichlet-distributed vector, and he shares an image by first drawing a topic assignment from his or her preferences then drawing an image from the corresponding topic distribution. Unlike LDA and relational topic model, where text documents are the context and words are generated from a vocabulary, this paper extracts rich information from images through a pre-trained CNN and Gaussian topic is adopted in order to consider and preserve the rich information of the images, as shown in Fig. 3. The links between users are then modeled as binary variables and are determined by the users' preferences. In this way, the user shared images and the links between users are statistically connected. Formally, the generative process of the proposed GRTM is as follows: 1) For each user u: a) Draw topic proportions θuα ∼ Dir(α). b) For each image xu,n: i) Draw topic assignment zu,nθu ∼ M ult(θu). zu,nθuxu,nNuzv,nθvxv,nNvKyu,v!,#$%,Σ%'xu,nxv,nyu,vuseruser shared image…RdGaussian TopicConvolutional Neural Network (cid:89) determined by (cid:89) p(U, y, θ, zα,{µ, Σ}1:K) = p(θuα) p(zu,nθu)p(xu,nzu,n,{µ, Σ}1:K) (cid:89) u n (u,v) p(yzu, zv). (4) IV. INFERENCE, ESTIMATION AND PREDICTION In this section, the Bayesian variational inference for the proposed GRTM is presented. A. Inference The posterior distribution of the latent variables and parameters given the observations and topic parameters is inferred by: p(θ, z, η, νU, y, α,{µ, Σ}1:K) (cid:82)(cid:80) = p(U, y, θ, zα,{µ, Σ}1:K) p(U, y, θ, zα,{µ, Σ}1:K)dθ zu,n (5) . The exact posterior, however, is intractable since the denom- enator involves a complex summation and integral. Instead, like previous works, variational inference with free parame- ters is used to approximate the exact posterior. Specifically, the mean field approximation with the form (cid:89) (cid:89) q(θ, zγ, φ) = qu(θuγu) qz(zu,nφu,n) (6) u n is used to approximate the posterior p of θ and z. And the goal is to minimize the Kullback-Leibler (KL) divergence between the approximation and the exact posterior. Equiva- lently, we try to maximize the variational free energy, which is the evidence lower bound of the log marginal probability of the observations: L = Eq[log p(xu,nzu,n,{µ, Σ}1:K)] u n (cid:88) (cid:88) (cid:88) (cid:88) −(cid:88) Eq[log qθ(θuγu)] −(cid:88) (cid:88) Eq[log p(zu,nθu)] + Eq[log p(yu,vzu,v, η, ν)]. + + n u u u (cid:88) (cid:88) u n Eq[log p(θuα)] Eq[log qz(zu,nφu,n)] (u,v) B. Estimation (7) Having the evidence lower bound of the log likelihood, the maximization of the lower bound can be achieved through coordinate ascent, where each variable is iteratively updated assuming all others are fixed, until convergence. By taking the derivative of the evidence lower bound in Eq. 7, subject to the sum-to-one constraint, the update of the free parameter φ is φu,n,k ∝ exp(log N (xu,nµk, Σk) + Ψ(γi) − Ψ( K(cid:88) γj) (cid:88) + vyu,v=1 j=1 η ◦ ¯φv Nu ), (cid:80) (8) n φv,n. And the normalization where ¯φv = Eq[¯zv] = 1 Nv term is the sum over all K. γ is Nu(cid:88) With a similar method, the update of the free parameter (cid:80) (cid:80) (cid:80) (cid:80) (cid:80) (cid:80) u γu,k = αk + (9) Isolating the terms involving {µ, Σ}1:K in the lower bound and taking the derivative, the update of the topic parameters {µ, Σ}1:K is φu,n,k. n=1 (cid:80) u Σk = n φu,n,kxu,n (cid:80) µk = n φu,n,k(xu,n − µk)(xu,n − µk)T n φu,n,k u , (10) . (11) u n φu,n,k It would be inappropriate to regard all links except ob- served positive links as negative training examples since there might be positive but unobserved links between users, which is expected to predict. Therefore, following [7], we use a regularization penalty parameterized by ρ for the negative observations. And the updates of the link function are conducted analytically by ν ← log(M − 1T ¯Π) − log(ρ(1 − 1 K ρ ) + M − 1T ¯Π), (12) K 2 1 − 1ν), η ← log( ¯Π) − log( ¯Π + (13) where M =(cid:80) and ¯πu,v = 1 Nu C. Prediction 1(yu,v = 1), ¯Π =(cid:80) (cid:80) n φu,n ◦ 1 (cid:80) n φv,n. u,v Nv u,v ¯πu,v 1(yu,v = 1) With all the variational parameters estimated, the link between two users given their shared collection of images can be predicted. The variational Bayesian prediction is given by: p(yu,vxu, xv) = Eq[p(yu,v¯zu, ¯zv)]. it still involves complicated summations over However, all possible z for all the images considered. Instead, we perform plug-in approximation and substitute all z with its variational expectation. Hence, the predictive probability is approximated with (14) p(yu,vxu, xv) = exp(ηT ¯πu,v + ν), (15) where ¯πu,v = 1 Nu n φu,n ◦ 1 Nv n φv,n. (cid:80) (cid:80) V. EXPERIMENTAL RESULTS In this section, experiments are conducted to investigate the effectiveness of the proposed GRTM for connection discovery using user shared images. A. Dataset and Experimental Setup A set of 201,006 images uploaded by 542 users are scraped from Flickr, an online social network for image sharing, with millions of images uploaded. The 542 users are selected randomly from images under the same tag query page to provide diversity. The average number of shared images for each user is 370, covering diverse content, and there are 902 connections among the 542 users. The images are processed by GoogLeNet [14], pretrained using the ILSVRC 2014 dataset, for image representation, so that rich semantic information can be extracted. The links between users are divided into two parts: 60% of the links are used for training and 40% of the links are used for testing. Using the user shared images and training links, the latent variables and model parameters of the GRTM are estimated through an iterative process, as described in the previous section. Using Eq. 15, the testing process is then undertaken to predict the probability of the links existing between users , excluding the observed training links, and the results are then compared with the groundtruth of the testing links. The Dirichlet hyperparameter α is set to 2.0, and the number of topics is set to be 100 in our experiment. Though the number of topics has some influence to some extent, the overall performance does not vary much. As a comparison with previous works on similar applica- tions, the Mean method from [4] where users' profiles are constructed through their shared images by taking the mean features of all the images, and the BoFT method [2] where users' profiles are obtained by counting the occurrences of cluster labels in users' collections obtained through image clustering, are implemented. The prediction of user connec- tions is thus conducted through computing the similarity between users. And instead of using the scale invariant feature transform (SIFT) for image feature extraction, CNN (GoogLeNet) features are used. B. Results The prediction performance of the Mean method, BoFT method and proposed GRTM is shown in Fig. 4, where both the receiver operating characteristic (ROC) curve and precision-recall curve are plotted. The ROC curve is the function of true positive rate (TPR) and false positive rate (FPR) and is used to measure how well the model can distinguish whether two users are friends or not. As it is shown, the ROC curve of the GRTM clearly dominates the other two methods. For example, for the point in the ROC curve with TPR of 0.8, given a pair of users with a true friendship, GRTM has 80% probability of predicting it correctly, while given a pair of users without a friendship, Figure 4: ROC curve for Mean method [4], BoFT method [2] and proposed GRTM. Figure 5: Precision-Recall curve for Mean method [4], BoFT method [2] and proposed GRTM. it has 20% probability of predicting it incorrectly. For the same TPR, however, the BoFT method has 35% probability of incorrect prediction for users without a friendship, and Mean method has 45%. Overall, the area under curve (AUC) for ROC curve of the proposed GRTM is 0.89, while that of the BoFT method is 0.84 and that of Mean method is 0.78. As an alternative measure, the precision-recall curve, as shown in Fig. 5, is the function of the precision rate and recall rate. It measures what fraction of the recommended candidates are the user's true friends and what fraction of true friends are recommended. As with the ROC curve, the precision-recall curve of the proposed GRTM also dominates the others. For example, for the same recall rate of 10%, the precision rate of the GRTM is 18%, while that of the BoFT method is 11% and that of the Mean method is 5.9%. Overall, the precision-recall AUC of the proposed GRTM is 0.05, while that of the BoFT method is 0.039 and that of the Mean method is 0.021. In order to illustrate how the proposed GRTM interprets the user shared images, some example images are shown 00.20.40.60.8100.20.40.60.81False Positive RateTrue Positive RateROC Curve MeanBoFTGRTM00.20.40.60.8100.20.40.60.81RecallPrecisionPrecision-Recall Curve MeanBoFTGRTM REFERENCES [1] Y. LeCun, Y. Bengio, and G. Hinton, "Deep learning," Nature, vol. 521, no. 7553, pp. 436 -- 444, 2015. [2] M. Cheung, J. She, and Z. Jie, "Connection discovery using big data of user-shared images in social media," Multimedia, IEEE Transactions on, vol. 17, no. 9, pp. 1417 -- 1428, 2015. [3] L. Yang, C.-K. Hsieh, and D. Estrin, "Beyond classification: Latent user interests profiling from visual contents analy- sis," in International Conference on Data Mining Workshop. IEEE, 2015, pp. 1410 -- 1416. [4] J. Zhuang, T. Mei, S. C. Hoi, X.-S. Hua, and S. Li, "Modeling social strength in social media community via kernel-based learning," in Proceedings of the 19th International Conference on Multimedia. ACM, 2011, pp. 113 -- 122. [5] X. Geng, H. Zhang, Z. Song, Y. Yang, H. Luan, and T.-S. Chua, "One of a kind: User profiling by social curation," in Proceedings of the ACM International Conference on Multimedia. ACM, 2014, pp. 567 -- 576. [6] D. M. Blei, A. Y. Ng, and M. I. Jordan, "Latent Dirichlet allocation," Journal of Machine Learning Research, vol. 3, pp. 993 -- 1022, 2003. [7] J. Chang and D. M. Blei, "Relational topic models for document networks." in AIStats, vol. 9, 2009, pp. 81 -- 88. [8] E. Moxley, J. Kleban, J. Xu, and B. Manjunath, "Not all tags are created equal: Learning flickr tag semantics for global annotation," in Multimedia and Expo, International Conference on. IEEE, 2009, pp. 1452 -- 1455. [9] X. Zhang, X. Zhao, Z. Li, J. Xia, R. Jain, and W. Chao, "Social image tagging using graph-based reinforcement on multi-type interrelated objects," Signal Processing, vol. 93, no. 8, pp. 2178 -- 2189, 2013. [10] M. Cheung, J. She, and X. Li, "Non-user generated annotation on user shared images for connection discovery," in Cyber, Physical and Social Computing, the 8th IEEE Conference on. IEEE, 2015. [11] J. D. Mcauliffe and D. M. Blei, "Supervised topic models," in Advances in Neural Information Processing Systems, 2008, pp. 121 -- 128. [12] P. Xie, Y. Pei, Y. Xie, and E. P. Xing, "Mining user interests from personal photos." in AAAI. Citeseer, 2015, pp. 1896 -- 1902. [13] J. Sang and C. Xu, "Right buddy makes the difference: An early exploration of social relation analysis in multimedia applications," in Proceedings of the 20th ACM International Conference on Multimedia. ACM, 2012, pp. 19 -- 28. [14] C. Szegedy, W. Liu, Y. Jia, P. Sermanet, S. Reed, D. Anguelov, D. Erhan, V. Vanhoucke, and A. Rabinovich, "Going deeper with convolutions," in Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, 2015, pp. 1 -- 9. Figure 6: Left: examples of Gaussian topics; Right: examples of friendship prediction by Mean method, BoFT method and the proposed GRTM. in Fig. 6. Since each Gaussian topic is defined by µk and Σk and each image has a probability under the Gaussian topic, images that achieve the highest probabilities under that topic are selected as representatives. As shown in Fig. 6, the semantic meaning of the Gaussian topics, such as cars, flowers, buildings, race cars and surfing, can be readily distinguished. The Gaussian topics cover a variety of objects, scenes, sports, etc. Those images that contain more than one topic could also be revealed through the probabilities under different Gaussian topics. It is also noted that ordinary cars and race cars are separated as different topics, which is also beneficial to reflect users' preferences for subse- quent connection discovery. Fig. 6 shows examples of the friendship prediction results obtained by the three methods. The example user, A, shares a lot of car images. For recommendation purposes, all three methods are directed to recommend 10 friends. As shown in the figure, out of the 10 recommendations, the proposed GRTM successfully predicts 5 of them, whereas the BoFT only successfully predicts 2 and the Mean method successfully predicts 1. Furthmore, the successful predictions of the other two methods are in fact a subset of those of the proposed GRTM. VI. CONCLUSION This paper proposes a Gaussian relational topic model (GRTM) for connection discovery using user shared images in social media. The GRTM not only models users' interests as latent variables through user shared image content but also models the connections between users as a result of their shared images. It explicitly relates user shared images to the connections between users in a hierarchical, systematic and supervisory way and provides an end-to-end model for connection discovery using shared images. It is demonstrated by experiment that the proposed model significantly outper- forms the methods in previous works where the modeling of users' interests and connection discovery are separated. ACKNOWLEDGMENT This work is supported by the HKUST-NIE Social Media Lab., HKUST. Topic 1Topic 2Topic 3Topic 4Topic 5User AFriend 1Friend 2Friend 3Friend 4Friend 5GRTMBoFTMeanSuccessfully Predicted by:Friends list:(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)
1511.09050
2
1511
2016-11-27T12:08:29
Rank me thou shalln't Compare me
[ "cs.SI" ]
Centrality measures have been defined to quantify the importance of a node in complex networks. The relative importance of a node can be measured using its centrality rank based on the centrality value. In the present work, we predict the degree centrality rank of a node without having the entire network. The proposed method uses degree of the node and some network parameters to predict its rank. These network parameters include network size, minimum, maximum, and average degree of the network. These parameters are estimated using random walk sampling techniques. The proposed method is validated on Barabasi-Albert networks. Simulation results show that the proposed method predicts the rank of higher degree nodes with more accuracy. The average error in the rank prediction is approximately $0.16\%$ of the network size.
cs.SI
cs
Rank me thou shalln't Compare me Akrati Saxena, Vaibhav Malik, S. R. S. Iyengar {akrati.saxena, vaibhav.malik, sudarshan}@iitrpr.ac.in Department of Computer Science and Engineering, Indian Institute of Technology Ropar, India Abstract. Centrality measures have been defined to quantify the im- portance of a node in complex networks. The relative importance of a node can be measured using its centrality rank based on the central- ity value. In the present work, we predict the degree centrality rank of a node without having the entire network. The proposed method uses degree of the node and some network parameters to predict its rank. These network parameters include network size, minimum, maximum, and average degree of the network. These parameters are estimated us- ing random walk sampling techniques. The proposed method is validated on Barabasi-Albert networks. Simulation results show that the proposed method predicts the rank of higher degree nodes with more accuracy. The average error in the rank prediction is approximately 0.16% of the network size. 1 Introduction Complex networks have attracted researchers from the past few years. Com- plex networks [1] have been the part of our day to day life such as friendship networks [2], collaboration networks [3], World Wide Web [4], Internet [5], bi- ological networks [6], and so on. In complex networks, objects are represented by nodes and the relationship between a pair of nodes is represented by an edge connecting them. Researchers have been studying the evolving phenomenon and properties of these networks for a fairly long time. All real world complex networks are sparse and follow some properties such as small world phenomenon (six degrees of separation) [7], scale-free degree dis- tribution [8], preferential attachment [9], high clustering coefficient [10], etc. Each property shows a different aspect of these networks. For example, small world phenomenon shows that no two nodes are far from each other. Real world networks have high clustering coefficient, that shows how tightly knit a node is in its neighborhood. In friendship networks, a user has high probability to be friend with friends of her friends because of high trust factor and frequent encounters. This gives birth to high clustering coefficient due to the increase in number of triangular links. The topological structure of complex networks also has meso-scale properties which include community structure [11], and core- periphery structure [12, 13]. 2 Except these properties, each node also possess some unique characteristics. These properties can be measured using different centrality metrics. These cen- trality measures compute the importance of a node under different contexts. Some of these centrality measures can be computed using local information of the node like degree centrality [14], and semi-local centrality measure [15]. Others use global information of the network like closeness centrality [16], betweenness centrality [17], eigenvector centrality [18], katz centrality [19], pagerank [20], and so on. The computation of global centrality measures is very costly as they require entire structure of the network. These centrality measures assign an index value to each node. But in real life applications, most of the time actual value is not important, what's important is where you stand, not with respect to the mean but with respect to everyone else. For example, in most of the entrance exams, percentile of the candidate is considered for the shortlisting not the percentage, as percentile tells about the rank. Similarly in social networks, nodes might be interested in computing their rank based on different centrality measures. In the present work, we predict the global rank of a node based on its degree. The degree of a node denotes the total number of neighbors of the node. In social networks, the degree rank of a node denotes how popular or strong a node is in the given network. A node having more neighbors is stronger and has high rank. Similarly in WWW network, degree rank of a node denotes the relative importance of a particular article or topic that is associated with the web page. One simple way to compute the degree rank of a node is, collect the degree values of all nodes, and compare them to get the rank of the interested node. This method requires complete structure of the network in hand. But it is not feasible to collect and store the entire data on a single system, as the size of complex networks is increasing very fast with time. These networks are highly dynamic, and the collected dataset needs to be updated regularly. This has inspired researchers to propose approximation algorithms based on the local information. The local information of the node or the network can be collected using various sampling techniques. Authors have used random walk sampling techniques and its variations to estimate network parameters like network size [21 -- 25], clustering coefficient [21], average degree [26], online polls [27], etc. These approaches are storage efficient as a small snapshot of the dataset is collected to process the request. In this work, we propose a method to predict the degree rank of a node. The proposed method uses power law degree distribution characteristic of the network and few network parameters like network size, maximum, minimum and average degree of the network. These parameters are estimated using random walk sampling techniques in pre-processing steps. The network size is estimated using the method proposed by Hardiman and Katzir [21]. The minimum and maximum degree is estimated as the minimum and maximum degree available in the sample. The average degree of the network is estimated using the method proposed by Dasgupta et al. [26]. 3 The proposed method is simulated on BA networks to validate its accu- racy. The error in the predicted rank is computed as the modular difference of the actual and the predicted rank. Simulation results show that the proposed method estimates the rank with high accuracy. We have also proposed a prob- abilistic method to estimate the degree rank of a node [28]. As per the best of our knowledge, this is the first work of its kind1. The local estimation of the global rank can help to identify influential nodes in the network. Identification of influential nodes has been the core of various research problems like epidemic, memetics [30], viral marketing, information diffusion [31], opinion formation, and so on. The rest of this paper is organized as follows. Section 2 describes BA model followed by the mathematical analysis of degree ranking method. Section 3 contains experimental results and the paper is concluded in section 4. 2 Model and Background rank of a node u is defined as, Ra(u) = (cid:80) In this section, we introduce the mathematical analysis to approximate degree rank of a node. We will use following notations throughout our discussion. Let's assume that the given graph G has n nodes. Minimum, maximum, and average degree of the network are represented by kmin, kmax, and davg respectively. All these parameters are estimated using sampling methods. Degree of a node u is denoted by ku, that represents total number of neighbors of the node. Degree v Xvu + 1, where Xvu is 1 when deg(v) > deg(u) and 0 otherwise. It is also called actual degree rank of the node in the given network G. The predicted degree rank of a node u is denoted by Rp(u). Next, we discuss the preferential attachment model (BA model) to generate scale-free synthetic networks. 2.1 BA Model Barabasi and Albert proposed an evolutionary preferential attachment model to generate synthetic networks that follows the properties of real world scale- free complex networks [8]. This model starts with a seed graph that contains n0 disconnected nodes. At each time stamp, a new node is added and it is connected with m already existing nodes. The probability (cid:81)(u) of an existing node u to get a new connection depends on its degree ku. It is defined as, (cid:81)(u) = ku(cid:80) v kv So, the nodes having higher degrees acquire more links over time, thereby skewing the distribution towards lower degrees. Preferential attachment model gives rise to power law degree distribution where, the probability f (k) of a node having degree k is defined as, 1 This work has been published at [29]. 4 f (k) = ck−γ (1) where, γ is the power law exponent, and for real world scale-free networks its range is 2 < γ < 3. As the network grows, only a few nodes called hubs manage to get a large number of links. 2.2 Degree Ranking In this section, we propose a method to predict degree rank of a node in scale- free networks. Let's consider a scale-free network G having n nodes that follows power law degree distribution f . The probability of a node u having degree k is defined as, where, f (k) is power law function from equation (1). P (ku = k) = f (k) f (k) contains two parameters c and γ. First we compute the value of c. Using the law of probability, the integration of f (k) from kmin to kmax will be equal to 1, where kmin and kmax are the minimum and maximum degree in the network. (cid:82) kmax (cid:82) kmax kmin f (k)dk = 1 ck−γdk = 1 c (kmin)1−γ−(kmax)1−γ kmin γ−1 = 1 c = γ−1 (kmin)1−γ−(kmax)1−γ To compute the value of γ, we use average degree davg of the network, that can be written as, After integration, davg =(cid:82) kmax davg =(cid:82) kmax kmin kmin kf (k)dk kck−γdk davg = c k2−γ min−k2−γ max γ−2 Using value of c, the equation will be, davg = γ−1 davg = γ−1 max γ−2 ( k2−γ min−k2−γ k1−γ min−k1−γ max−kγ−2 γ−2 ( kγ−2 max−kγ−1 kγ−1 max min min )(kmaxkmin) )(kmaxkmin) where, kmin << kmax and 2 < γ < 3 for scale-free networks, max kγ−2 davg = γ−1 γ−2 kγ−1 davg = γ−1 max γ−2 kmin (kminkmax) 5 Now, the rank of a node u having degree ku = k can be estimated as, i.e. γ = 2 + kmin davg−kmin Rp(u) = n − n(cid:82) k Rp(u) = n − n(cid:82) k f (k)dk + 1 ck−γdk + 1 kmin kmin After integration, Using value of c, Rp(u) = n − nc k1−γ−k1−γ Rp(u) = n − nc k1−γ min−k1−γ 1−γ γ−1 min + 1 + 1 + 1 max Rp(u) = n − n k1−γ min−k1−γ min−k1−γ k1−γ Rp(u) = n( k1−γ−k1−γ min−k1−γ k1−γ )k1−γ − ( min−k1−γ k1−γ Rp(u) = ak1−γ + b max max max n ) + 1 nk1−γ k1−γ min−k1−γ max max − 1) Rp(u) = ( where, a = network. n k1−γ min−k1−γ max and b = nk1−γ max k1−γ min−k1−γ max − 1. a and b are constants for a given 3 Simulation Results The proposed method is simulated on BA networks of 100000−500000 nodes. BA networks are generated with a seed graph having 10 nodes, and each new coming node makes 10 connections using preferential attachment law. To simulate the proposed method, we first need to estimate the required network parameters. The network size is estimated using the method proposed by Hardiman and Katzir [21], and the average degree is estimated using the method proposed by Dasgupta et al. [26]. The network size estimation method converges when approximately 1% nodes of the network are sampled. The minimum and maximum degree is estimated as the minimum and maximum degree available in the sample. To measure the accuracy of the proposed method, the absolute error is computed for each degree, that is defined as Absolute Error(k) = Actual Rank(k) − P redicted Rank(k). The absolute error is averaged over all degrees to compute the overall error for the network. 6 (a) (c) (b) (d) (e) Fig. 1. Plots of actual and estimated rank on log-log scale for BA Network having a)100000 b)200000 c)300000 d)400000 e)500000 nodes. In Fig. 1, the actual and the predicted degree rank are plotted for BA net- works. According to the method, highest degree node has rank 1. It can be observed in Fig. 1 that the prediction for higher degree nodes is more accurate than the lower degree nodes. This difference occurs because the power law de- gree distribution function is integrated from minimum to maximum degree. It assumes that the nodes of all degrees are present in the network, but it might not be true for the generated networks. The one more reason is that the generated networks may not follow perfect power law as per the estimated power law ex- ponent. Table 1 shows the average error and standard deviation of the predicted rank for all networks. The results show that the average error is approximately 0.16% of the network size. The average absolute error increases with the network size, but the percentage average absolute error decreases with the network size. The percentage average absolute error is computed as, (average absolute error *100)/network size. 7 Table 1. Error in the Actual and Predicted Ranking Number of Nodes Average Error Standard Deviation 100000 200000 300000 400000 500000 1833.64 2128.77 2580.50 4531.16 5057.44 335.02 389.63 447.87 600.52 631.58 4 Conclusion In this work, we have proposed a method to estimate degree centrality rank of a node without having the entire network. The proposed method is based on the power law exponent of degree distribution of the network. The simulation results show that the average error in the predicted rank is around 0.16% of the network size. We will further validate the accuracy of the proposed method on real world scale-free networks. This work can be applied to identify influential nodes in real world networks. In future, we will extend this work to estimate the lower and upper bound on degree centrality rank of a node. With time, the size of complex networks is increasing very fast. It will be of great help, if local information of the network can be used to estimate the rank of a node based on global centrality measures such as betweenness centrality, closeness centrality, pagerank, and so on. References 1. Yaneer Bar-Yam. Dynamics of complex systems, volume 213. Addison-Wesley Reading, MA, 1997. 2. Stanley Wasserman and Katherine Faust. Social network analysis: Methods and applications, volume 8. Cambridge university press, 1994. 3. Mark EJ Newman. The structure of scientific collaboration networks. Proceedings of the National Academy of Sciences, 98(2):404 -- 409, 2001. 4. R´eka Albert, Hawoong Jeong, and Albert-L´aszl´o Barab´asi. Internet: Diameter of the world-wide web. Nature, 401(6749):130 -- 131, 1999. 5. Bernardo A Huberman and Lada A Adamic. Internet: growth dynamics of the world-wide web. Nature, 401(6749):131 -- 131, 1999. 6. Leland H Hartwell, John J Hopfield, Stanislas Leibler, and Andrew W Murray. From molecular to modular cell biology. Nature, 402:C47 -- C52, 1999. 7. Stanley Milgram. The small world problem. Psychology today, 2(1):60 -- 67, 1967. 8 8. Albert-L´aszl´o Barab´asi and R´eka Albert. Emergence of scaling in random networks. science, 286(5439):509 -- 512, 1999. 9. Hawoong Jeong, Zoltan N´eda, and Albert-L´aszl´o Barab´asi. Measuring preferential attachment in evolving networks. EPL (Europhysics Letters), 61(4):567, 2003. 10. Konstantin Klemm and Victor M Eguiluz. Highly clustered scale-free networks. Physical Review E, 65(3):036123, 2002. 11. Aaron Clauset, Mark EJ Newman, and Cristopher Moore. Finding community structure in very large networks. Physical review E, 70(6):066111, 2004. 12. Stephen P Borgatti and Martin G Everett. Models of core/periphery structures. Social networks, 21(4):375 -- 395, 2000. 13. Akrati Saxena and SRS Iyengar. Evolving models for meso-scale structures. In 2016 8th International Conference on Communication Systems and Networks (COM- SNETS), pages 1 -- 8. IEEE, 2016. 14. Marvin E Shaw. Some effects of unequal distribution of information upon group performance in various communication nets. Journal of abnormal and social psy- chology, 49(4):547 -- 553, 1954. 15. Duanbing Chen, Linyuan Lu, Ming-Sheng Shang, Yi-Cheng Zhang, and Tao Zhou. Identifying influential nodes in complex networks. Physica a: Statistical mechanics and its applications, 391(4):1777 -- 1787, 2012. 16. Gert Sabidussi. The centrality index of a graph. Psychometrika, 31(4):581 -- 603, 1966. 17. Linton C Freeman. A set of measures of centrality based on betweenness. Sociom- etry, pages 35 -- 41, 1977. 18. Karen Stephenson and Marvin Zelen. Rethinking centrality: Methods and exam- ples. Social Networks, 11(1):1 -- 37, 1989. 19. Leo Katz. A new status index derived from sociometric analysis. Psychometrika, 18(1):39 -- 43, 1953. 20. Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web search engine in: Seventh international world-wide web conference (www 1998), april 14-18, 1998, brisbane, australia. Brisbane, Australia, 1998. 21. Stephen J Hardiman and Liran Katzir. Estimating clustering coefficients and size of social networks via random walk. In Proceedings of the 22nd international conference on World Wide Web, pages 539 -- 550. International World Wide Web Conferences Steering Committee, 2013. 22. Maciej Kurant, Carter T Butts, and Athina Markopoulou. Graph size estimation. arXiv preprint arXiv:1210.0460, 2012. 23. Liran Katzir, Edo Liberty, and Oren Somekh. Estimating sizes of social networks via biased sampling. In Proceedings of the 20th international conference on World wide web, pages 597 -- 606. ACM, 2011. 24. Colin Cooper, Tomasz Radzik, and Yiannis Siantos. Estimating network parame- ters using random walks. Social Network Analysis and Mining, 4(1):1 -- 19, 2014. 25. Oded Goldreich and Dana Ron. Approximating average parameters of graphs. Random Structures & Algorithms, 32(4):473 -- 493, 2008. 26. Anirban Dasgupta, Ravi Kumar, and Tamas Sarlos. On estimating the average degree. In Proceedings of the 23rd international conference on World wide web, pages 795 -- 806. ACM, 2014. 27. Anirban Dasgupta, Ravi Kumar, and D Sivakumar. Social sampling. In Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 235 -- 243. ACM, 2012. 28. Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Estimating the degree centrality ranking of a node. arXiv preprint arXiv:1511.05732, 2015. 9 29. Akrati Saxena, Vaibhav Malik, and SRS Iyengar. Estimating the degree centrality In 2016 8th International Conference on Communication Systems and ranking. Networks (COMSNETS), pages 1 -- 2. IEEE, 2016. 30. Yayati Gupta, Akrati Saxena, Debarati Das, and SRS Iyengar. Modeling memetics using edge diversity. In Complex Networks VII, pages 187 -- 198. Springer, 2016. 31. Akrati Saxena, SRS Iyengar, and Yayati Gupta. Understanding spreading patterns on social networks based on network topology. In 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pages 1616 -- 1617. IEEE, 2015.
1412.8439
3
1412
2015-04-26T03:50:07
Spy vs. Spy: Rumor Source Obfuscation
[ "cs.SI", "cs.LG" ]
Anonymous messaging platforms, such as Secret and Whisper, have emerged as important social media for sharing one's thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian governments; the right to free expression and sometimes the personal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we consider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging protocols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying contact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles. We further consider a stronger adversarial model where a subset of colluding users track the reception of messages. We show that the adaptive diffusion provides a strong protection of the anonymity of the source even under this scenario.
cs.SI
cs
Spy vs. Spy: Rumor Source Obfuscation Giulia Fanti University of California, Berkeley [email protected] Peter Kairouz University of Illinois at Urbana-Champaign [email protected] Pramod Viswanath University of Illinois at Urbana-Champaign [email protected] Sewoong Oh University of Illinois at Urbana-Champaign [email protected] 5 1 0 2 r p A 6 2 ] I S . s c [ 3 v 9 3 4 8 . 2 1 4 1 : v i X r a ABSTRACT Anonymous messaging platforms, such as Secret, Yik Yak and Whisper, have emerged as important social media for sharing one’s thoughts without the fear of being judged by friends, family, or the public. Further, such anonymous platforms are crucial in nations with authoritarian govern- ments; the right to free expression and sometimes the per- sonal safety of the author of the message depend on anonymity. Whether for fear of judgment or personal endangerment, it is crucial to keep anonymous the identity of the user who initially posted a sensitive message. In this paper, we con- sider an adversary who observes a snapshot of the spread of a message at a certain time. Recent advances in rumor source detection shows that the existing messaging proto- cols are vulnerable against such an adversary. We introduce a novel messaging protocol, which we call adaptive diffusion, and show that it spreads the messages fast and achieves a perfect obfuscation of the source when the underlying con- tact network is an infinite regular tree: all users with the message are nearly equally likely to have been the origin of the message. Experiments on a sampled Facebook network show that it effectively hides the location of the source even when the graph is finite, irregular and has cycles. Categories and Subject Descriptors G.2.2 [Graph Theory]: Network problems, Graph algo- rithms Keywords Anonymous Social Media; Rumor Spreading; Privacy 1. INTRODUCTION Microblogging platforms form a core aspect of the fabric of the present Internet; popular examples include Twitter and Facebook. Users propagate short messages (texts, images, Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. SIGMETRICS’15, June 15–19, 2015, Portland, OR, USA. Copyright c(cid:13) 2015 ACM 978-1-4503-3486-0/15/06 ...$15.00. http://dx.doi.org/10.1145/2745844.2745866. videos) through the platform via local friendship links. The forwarding of messages often occurs through built-in mech- anisms that rely on user input, such as clicking “like” or “share” with regards to a particular post. Brevity of mes- sage, fluidity of user interface, and trusted party commu- nication combine to make these microblogging platforms a major communication mode of modern times. There has been tremendous recent interest in the privacy implications of these platforms, as evidenced by the explosive growth of anonymous microblogging platforms, like Secret [1], Whisper [2] and Yik Yak [3]. These platforms enable users to share messages with friends without leaking the message author’s identity. In such applications, it is crucial to hide the iden- tity of the user who initially posted the message. Existing anonymous messaging services store both mes- sages and authorship information on centralized servers, which makes them vulnerable to government subpoenas, hacking, or direct company access. A more robust solution would be to store this information in a distributed fashion; each node would know only its own friends, and message author- ship information would never be transmitted to any party. Distributed systems are more robust to monitoring due to lack of central points of failure. However, even under dis- tributed architectures, simple anonymous messaging pro- tocols (such as those used by commercial anonymous mi- croblogging apps) are still vulnerable against an adversary with side information, as proved in recent advances in ru- mor source detection. In this work, we study in depth a basic building block of the messaging protocol that would underpin truly anonymous microblogging platform – broad- casting a single message on a contact network with the goal of obfuscating the source under strong adversarial conditions. Specifically, we consider contact networks that represent a social graph among users of the service. A natural strategy for preventing source identification by an adversary would be to spread the message as fast as possi- ble; with reliable connection to infrastructure like the Inter- net, this could be in principle done nearly instantaneously. If all users receive the message instantaneously, any user is equally likely to have been the source. However, this strat- egy is not available in many of the key real-life scenarios we are considering. For instance, in social networks, messages are spread based on users approving the message via lik- ing, sharing or retweeting (to enable social filtering and also to avoid spamming) – this scenario naturally has inherent random delays associated with when the user happens to en- counter the message and whether or not she decides to “like” the message. Indeed, standard models of rumor spreading in networks explicitly model such random delays via a dif- fusion process: messages are spread independently over dif- ferent edges with a fixed probability of spreading (discrete time model) or an exponential time to spread (continuous time model). Related work. Anonymous communication has been a popular research topic for decades. For instance, anony- mous point-to-point communication allows a sender to com- municate with a receiver without the receiver learning the sender’s identity. A great deal of successful work has emerged in this area, including Tor [8], Freenet [5], Free Haven [7], and Tarzan [10]. In contrast to this body of work, we ad- dress the problem of anonymously broadcasting a message over an underlying contact network (e.g., a social network). Anonymous broadcast communication has been most stud- ied in context of the dining cryptographers’ (DC) problem. We diverge from the vast literature on this topic [4, 6, 11, 12, 23] in approach and formulation. We consider statisti- cal spreading models rather than cryptographic encodings, accommodate computationally unbounded adversaries, and consider arbitrary network structures rather than a fully connected network. Within the realm of statistical message spreading mod- els, the problem of detecting the origin of an epidemic or the source of a rumor has been studied under the diffusion model. Recent advances in [20, 19, 24, 18, 9, 13, 25, 17, 16, 14, 15] show that it is possible to identify the source within a few hops with high probability. Drawing an analogy to epi- demics, we refer to a person who has received the message as ‘infected’ and the act of passing the message as ‘spread- ing the infection’. Consider an adversary who has access to the underlying contact network of friendship links and the snapshot of infected nodes at a certain time. The prob- lem of locating a rumor source, first posed in [20], naturally corresponds to graph-centrality-based inference algorithms: for a continuous time model, [20, 19] used the rumor cen- trality measure to correctly identify the source after time T (with probability converging to a positive number for large √ d-regular and random trees, and with probability propor- T for lines). The probability of identifying the tional to 1/ source increases even further when multiple infections from the same source are observed [24]. With multiple sources of infections, spectral methods have been proposed for esti- mating the number of sources and the set of source nodes in [18, 9]. When infected nodes are allowed to recover as in the susceptible-infected-recovered (SIR) model, Jordan central- ity was proposed in [13, 25] to estimate the source. In [25], it is shown that the Jordan center is still within a bounded hop distance from the true source with high probability, in- dependent of the number of infected nodes. Under natural and diffusion-based message spreading – as seen in almost every content-sharing platform today – an adversary with some side-information can identify the rumor source with high confidence. We overcome this vulnerability by asking the reverse question: can we design messaging protocols that spread fast while protecting the anonymity of the source? Model. We focus on anonymous microblogging built atop an underlying contact network, such as Secret [1] over the network of phone contacts and Facebook friends. In such systems, the designer has some control over the spreading rate, by introducing artificial delays on top of the usual ran- dom delays due to users’ approval of the messages. We model this physical setup as a discrete-time system, where any individual receiving a message approves it immediately at the next timestep, at which point the protocol determines how much delay to introduce before sending the message to each of her uninfected neighbors. Given this control, the system designer wishes to design a spreading protocol that makes inference on the source of the message difficult. The assumption that all nodes are willing to approve and pass the message is not new. Such assumptions are common in the analysis of rumor spreading [20, 19, 25], and our devia- tion from those standard models is that we are operating in discrete time and approvals are immediate. Adversary. Following the adversarial model assumed in prior work on rumor source detection [20, 19, 25], we as- sume the adversary knows the whole underlying contact network and, at a certain time, it observes a snapshot of the state of all the nodes, i.e. who has received the mes- sage thus far. This adversary is strong in the sense that it sees the whole contact network as well as every node’s state, but it is also limited in the sense that the adversary is not aware of when (or from whom) a particular node re- ceived the message. This model captures an adversary that is able to indirectly observe the contents of users’ devices without actively compromising the devices; for instance, if the message in question contains the time and location of a protest, then the adversary learns a snapshot of the in- fection at a given point in time by observing who attends the protest. This adversarial model also captures an adver- sary that is able to monitor the network state more closely, but only at a high cost. As such, it cannot afford to continu- ously monitor state. We design a new anonymous messaging protocol, which we call adaptive diffusion, that is inherently distributed and provides strong anonymity guarantees under this adversarial model. We discuss other plausible adversar- ial models in Section 5. Spreading. At time t = 0, a single user v∗ ∈ V starts to spread a message on a contact network G = (V, E) where users and contacts are represented by nodes and edges, re- spectively. Upon receiving the message, a node can send the message to any of its neighbors. We assume a discrete-time system and model the delays due to user approval and in- termittent network access via a deterministic delay of one time unit. Therefore, a message always propagates with a delay of at least one time unit. Our goal is to introduce appropriate random delays into the system in order to ob- fuscate the identity of the source v∗. After T timesteps, let VT ⊆ V , GT , and NT (cid:44) VT denote the set of infected nodes, the subgraph of G containing only VT , and the num- ber of infected nodes, respectively. At a certain time T , an adversary observes the infected subgraph GT and produces an estimate v of the source v∗ of the message (with proba- bility of detection PD = P(v = v∗)). Since the adversary is assumed to not have any prior information on which node is likely to be the source, we use the maximum likelihood estimator (1) vML = arg max v∈GT P(GTv). We wish to achieve the following performance metrics. (a) We say a protocol has an order-optimal rate of spread if the expected time for the message to reach n nodes scales linearly compared to the time required by the fastest spreading protocol. Organization. The remainder of this paper is organized as follows. To warm up, we introduce, in Section 2, two mes- saging protocols customized for lines and trees. Combining the key insights of these two approaches, we introduce, in Section 3, a new messaging protocol called adaptive diffusion and analyze its performance theoretically and empirically, in Section 4. Section 5 discusses limitations and future work. 2. WARM-UP EXAMPLES In this section, we discuss two special contact networks as warm-up examples: a line and a regular tree with de- gree larger than two. We provide two fully-distributed, cus- tomized messaging protocols, one for each case, and show that these protocols spread messages quickly while effec- tively hiding the source. However, these protocols fail to protect the identity of the source when applied to a broader class of contact networks. In particular, the “Line Proto- col”, which is developed for line contact networks, reveals the source with high probability when applied to a regu- lar tree with degree larger than two. Similarly, the “Tree Protocol”, developed for regular tree contact networks with degree greater than two, reveals the source with high prob- ability when applied to a line. In Section 3, we introduce a novel messaging protocol, which we call adaptive diffusion, that combines the key ideas behind the two approaches pre- sented in this section. 2.1 Spreading on a line Given a contact network of an infinite line, consider the following deterministic spreading protocol. At time t = 1, the source node infects its left and right neighbors. At t ≥ 2, the leftmost and rightmost infected nodes spread the message to their uninfected neighbors. Thus, the message spreads one hop to the left and one hop to the right of the true source at each timestep. This scheme spreads as fast as possible, infecting NT = 2T + 1 nodes at time T , but the source is trivially identified as the center of the infection. Adding a little bit of randomness can significantly de- crease the probability of detection. Consider a discrete- time random diffusion model with a parameter p ∈ (0, 1) where at each time t, an infected node infects its uninfected neighbor with probability p. Using the analysis from [20] where the continuous time version of this protocol was stud- ied, we can show that this protocol spreads fast, infecting E[NT ] = 2pT + 1 nodes on average at time T . Further, the probability of source detection PD = P(vML = v∗) for the maximum likelihood estimator scales as 1/(cid:112)p(1 − p)T . With p = 1/2 for example, this gives a simple messaging √ protocol with a probability of source detection vanishing at a rate of 1/ T . In what follows, we show that with an appropriate choice of time-dependent randomness, we can achieve almost per- fect source obfuscation without sacrificing the spreading rate. The key insight is to add randomness such that all the in- fected nodes are (almost) equally likely to have been the origin of the infection (see Figure 2 and Equation (6)). This can be achieved by adaptively choosing the spreading rate such that the farther away the infection is from the source the more likely it is to spread. We now apply this insight to design precisely how fast the spread should be for each in- fected node at any timestep. A node v is designed to infect Figure 1: Illustration of a spread of infection when spreading immediately (left) and under the adaptive diffusion (right). (b) We say a protocol achieves a perfect obfuscation if the probability of source detection for the maximum likeli- hood estimator conditioned on n nodes being infected is bounded by P(cid:0) vML = v ∗NT = n(cid:1) = . (2) (cid:16) 1 (cid:17) 1 n + o n Key insights. Figure 1 (left) illustrates an example of the spread when the message is propagated immediately upon reception. The source is indicated by a solid circle. This scheme spreads the message fast but the source is trivially identified as the center of the infected subgraph if the contact network is an infinite tree. This is true independent of the infection size. Even if we introduce some randomness at each node, the source will still be identified within a few hops. This is due to the fact that the source is close to some notion of the center of the infected subgraph [20, 25]. Since we do not know a priori when the adversary is going to attack, the main challenge is to ensure that the source is equally likely to be anywhere in the infection at any given time. Figure 1 (right) illustrates the main idea of our ap- proach: we intentionally break the symmetry around the source. This is achieved by combining two insights illus- trated in the two warm-up examples in Section 2. The first insight is that nodes farther away from the source should spread the infection faster. The second insight is that the spread should be coordinated in order to maintain a symmet- ric structure centered around a ‘virtual source’ node. This leads to the source node being anywhere in the infected sub- graph with equal probability. Contributions. We introduce a novel messaging proto- col, which we call adaptive diffusion, with provable author anonymity guarantees against strong adversaries. Our pro- tocol is inherently distributed and spreads messages fast, i.e., the time it takes adaptive diffusion to reach n users is at most twice the time it takes the fastest spreading scheme which immediately passes the message to all its neighbors. We further prove that adaptive diffusion provides perfect obfuscation of the source when applied to regular tree con- tact networks. The source hides perfectly within all infected users, i.e., the likelihood of an infected user being the source of the infection is equal among all infected users. For a more general class of graphs which can be finite, irregular and have cycles, we provide results of numerical experiments on real- world social networks and synthetic networks showing that the protocol hides the source at nearly the best possible level of obfuscation. a neighbor at time t ∈ {1, 2, . . .} with probability pv,t (cid:44) δH (v, v∗) + 1 (3) where δH (v, v∗) is the hop distance between an infected node v at the boundary of infection and the source v∗. The details of this spreading model are summarized in Protocol 3 (Line Protocol). t + 1 , The next proposition shows that this protocol achieves the two main goals of an anonymous messaging protocol: order- optimal spreading rate and close-to-perfect obfuscation. Proposition 2.1. Suppose that the underlying contact net- work G is an infinite line, and one node v∗ in G starts to spread a message according to Protocol 3 (Line Protocol) at time t = 0. At a certain time T ≥ 0 an adversary estimates the location of the source v∗ using the maximum likelihood estimator vML defined in Equation (1). The following prop- erties hold for the Line Protocol: (a) the expected number of infected nodes at time T is E[NT ] = T + 1; (b) the probability of source detection at time T is upper bounded by P(vML = v ∗ ) ≤ 2T + 1 (4) (c) the expected hop-distance between the true source v∗ (T + 1)2 ; and and its estimate vML is lower bounded by E[δH (v ∗ , vML)] ≥ T 3 9(T + 1)2 . (5) The proof of the above proposition can be found in Ap- pendix B. Compared to the (fastest-spreading) determinis- tic spreading model with a spreading rate of NT = 2T + 1, The Line Protocol is slower by a factor of 2. This type of constant-factor loss in the spreading rate is inevitable: the only way to deviate from the deterministic spreading model is to introduce appropriate delays. The probability of de- tection is 2/E[NT ] + o(1/E[NT ]), which is almost perfect obfuscation up to a factor of 2. Further, the expected dis- tance of the true source from the ML source estimate scales linearly with the size of the infection E[NT ], which is the best separation one can hope to achieve. To illustrate the power of the Line Protocol, we consider a fixed T and a finite ring graph of size larger than 2T + 1, and compare the protocol to a simple random diffusion. If the source v∗ is chosen uniformly at random on the ring and its message is spread according to the Line Protocol, then the probability of the source being detected given a set of infected nodes VT is 1 VT + O , VT2 (6) for all k ∈ VT and VT ≤ 2T + 1. This follows from the exact computation of the posterior distribution, which can be found at the end of Appendix B. For an example with VT = 101, Figure 2 illustrates how the Line Protocol flat- tens the posterior distribution compared to the random dif- fusion model. When messages are sent according to the ran- √ dom diffusion model, the source can only hide in the central T ), leading to a probability of part, which has width O( source detection on the order of 1/ √ T [20]. P(cid:0)v ∗ = k(cid:12)(cid:12) VT (cid:1) = (cid:16) 1 (cid:17) ) T G k = ∗ v ( P Node k Figure 2: The Line Protocol has a close-to-uniform posterior distribution P(v∗ = k VT = {1, . . . , 101}). ) ∗ v = v ( P (4) Expected size of infection E[NT ] Figure 3: Detection probability versus the average size of in- fection on regular trees using Jordan center estimator, which is the ML estimate in case of a line (d = 2). For d > 2, the source is easily detected. On an infinite line, the Line Protocol provides maximum protection, since the probability of detection scales as 1/E[NT ] for any T . When the Line Protocol is applied to regular trees with degree larger than two, the infected subgraph contains exponentially many paths starting at v∗ of length close to T . In such cases, the Jordan center (i.e., the node with the smallest maximum distance to every other node in the graph) matches the source with positive probability, as shown in Figure 3 for different d-regular trees. 2.2 Spreading on a regular tree Consider the case when the underlying contact network is an infinite d-regular tree with d larger than two. Analogous to the line network, the fastest spreading protocol infects all the uninfected neighbors at each timestep. This spreads fast, infecting NT = 1 + d((d − 1)T − 1)/(d − 2) nodes at time T , but the source is trivially identified as the center of the infected subtree. In this case, the infected subtree is a balanced regular tree where all leaves are at equal depth from the source. 0 0.02 0.04 0.06 0.08 0.1 0.12 0 20 40 60 80 100line protocol diffusion; p=0.5 0.1 1 1 10 100 1000 10000d=5d=4d=3d=2bound in an adversary estimates the location of the source v∗ using the maximum likelihood estimator vML. Then the following properties hold for the Tree Protocol: (a) the number of infected nodes at time T ≥ 1 is at least d − 2 NT ≥ (d − 1)(T +1)/2 ∗(cid:1) = d − 1 P(cid:0)vML = v ; (7) (b) the probability of source detection for the maximum likelihood estimator at time T is (8) (c) the expected hop-distance between the true source v∗ 2 + (d − 2)NT ; and Figure 4: Spreading on a tree. The red node is the message source. Yellow nodes denote nodes that have been, are, or will be the center of the infected subtree. Now consider a random diffusion model. At each timestep, each uninfected neighbor of an infected node is indepen- In this case, E[NT ] = dently infected with probability p. 1 + pd((d − 1)T − 1)/(d − 2), and it was shown in [20] that the probability of correct detection for the maximum likeli- hood estimator of the rumor source is P(vML = v∗) ≥ Cd for some positive constant Cd that only depends on the degree d. Hence, the source is only hidden in a constant number of nodes close to the center, even when the total number of infected nodes is arbitrarily large. We now present a protocol that spreads the message fast (NT = O((d−1)T /2)) and hides the source within a constant fraction of the infected nodes (P(vML = v∗) = O(1/NT )). This protocol keeps the infected subtree balanced: at any time t, all the leaves of the infected subtree are at the same hop distance from its center. Further, as we will see next, the leaves of the infected subtree are equally likely to have been the source. Figure 4 illustrates how this protocol spreads a message on a regular tree of degree 3. At t = 1, node 0 (the message author) infects one of its neighbors (node 1 in this example) uniformly at random. Node 1 will be referred to as the virtual source at t = 1. The virtual source at time t is the center of the infected subtree at time 2t. At t = 2, node 1 infects all its uninfected neighbors, making the infected sub- graph G2 a balanced tree with node 1 at the center. Among the uninfected neighbors of node 1, one node is chosen to be the new virtual source (node 2 in the example). The mes- sage then spreads to the uninfected neighbors of node 2 at time t = 3, and then to their neighbors at time t = 4 making G4 a balanced tree with node 2 at the center. Notice that any given time t, all leaves are equally likely to have been the source. This follows form the symmetric structure of Gt. The distributed implementation of this spreading algorithm is given in Protocol 4 (Tree Protocol). The Tree Protocol ensures that the source can hide among the leaf nodes of the infected subtree, i.e. all leaves are equally likely to have been the source. Since a significant fraction of the infected nodes are at the leaf, this protocol achieves an almost perfect obfuscation. Proposition 2.2. Suppose that the underlying contact net- work G is an infinite d-regular tree with d > 2, and one node v∗ in G starts to spread a message according to Protocol 4 (Tree Protocol) at time t = 0. At a certain time T ≥ 1 and its estimate v is lower bounded by , vML)] ≥ T 2 E[δH (v ∗ . (9) The proof of the above proposition can be found in Ap- pendix C. Equation (7) shows that the spreading rate of the Tree Protocol is O((d − 1)T /2), which is slower than the de- terministic spreading model that infects O((d − 1)T ) nodes at time T . This is inevitable, as we explained in relation to the Line Protocol. Although this protocol spreads fast and provides an al- most perfect obfuscation on a tree with degree larger than two, it fails when the contact network is a line. There are only two leaves in a line, so at any given time T , the source can be detected with probability 1/2, independent of the size of the infected subgraph. Another drawback of this ap- proach, is that even in the long run, not every node receives the message. For instance, the neighbors of the source node that are not chosen in the first step are never infected. In the following section, we address these issues and propose a new messaging protocol that combines the key ideas of both spreading models presented in this section. 3. ADAPTIVE DIFFUSION Section 2 showed that by changing the infection rate and direction based on state variables, the source can hide from the adversary. In particular, the messaging protocols pre- sented in Sections 2.1 and 2.2 provide provable anonymity guarantees for line graphs and d-regular trees with d > 2, respectively. However, the Line Protocol fails to protect the source on graphs with larger degree. Similarly, the Tree Protocol fails to protect the source on a line and does not pass the message to some of the nodes. To overcome these challenges, we use ideas from the Line Protocol (nodes far- ther away from the source spread message faster) and from the Tree Protocol (keep the infected subgraph balanced and keep the source closer to the leaves) to design a protocol that achieves perfect obfuscation and spreads fast on all regular trees, including lines. We call this protocol adaptive diffu- sion to emphasize the fact that unlike diffusion, the protocol adapts the infection rate and direction as a function of time. We step through the intuition of the adaptive diffusion spreading model with an example, partially illustrated in Figure 5. Suppose that the underlying contact network is an infinite d-regular tree. As illustrated in Figure 5, we ensure that the infected subgraph Gt at any even timestep t ∈ {2, 4, . . .} is a balanced tree of depth t/2, i.e. the hop dis- tance from any leaf to the root (or the center of the graph) is t/2. We call the root node of Gt the “virtual source” at time 4G3G2G1G2147630589 t, and denote it by vt. We use v0 = v∗ to denote the true source. To keep the regular structure at even timesteps, we use the odd timesteps to transition from one regular subtree Gt to another one Gt+2 with depth incremented by one. Figure 5 illustrates two sample evolutions of infection, as per adaptive diffusion. The source v∗ = 0 starts the infection at t = 0. At time t = 1, node 0 infects node 1 and passes the virtual source token to it, i.e. v2 = 1 (we only define virtual sources for even timesteps). At time t = 1, node 1 infects its uninfected neighbors, nodes 2 and 3. Notice that it requires two timesteps to infect nodes {1, 2, 3} in order to spread infection to G2, which is a balanced tree of depth 1 rooted at node v2 = 1. At time t = 3, the adaptive diffusion protocol has two choices, either to pass the virtual source token to one of node 1’s neighbors that is not a previous virtual source, for example node 2 (Figure 5 left), or to keep the virtual source at node 1 (Figure 5 right). In the former case, it again takes two timesteps to spread infection to G4, which is a balanced tree of depth 2 rooted at node v4 = 2. In the latter case, only one timestep is required, but we add a unit time delay to be consistent with the previous case. Hence, G3 = G4 which is a balanced tree of depth 2 rooted at node v4 = 1. This random infection process can be defined as a time-inhomogeneous (time-dependent) Markov chain over the state defined by the location of the current virtual source {vt}t∈{0,2,4,...}. By the symmetry of the underlying contact network (which we assume is an infinite d-regular tree) and the fact that the next virtual source is chosen uniformly at random among the neighbors of the current virtual source, it is sufficient to consider a Markov chain over the hop distance between the true source v∗ and vt, the virtual source at time t. Therefore, we design a Markov chain over the state ht = δH (v ∗ , vt) , for even t. Figure 5 shows an example with (h2, h4) = (1, 2) on the left and (h2, h4) = (1, 1) on the right. At every even timestep, the protocol randomly determines whether to keep the virtual source token (ht+2 = ht) or to pass it (ht+2 = ht + 1). Using ideas from Section 2.1, we will construct an time-inhomogeneous Markov chain over {ht}t∈{2,4,6,...} by choosing appropriate transition probabil- ities as a function of time t and current state ht. For an even t, we denote this probability by αd(t, h) (cid:44) P(cid:0) ht+2 = htht = h(cid:1) , (10) where the subscript d denotes the degree of the underlying contact network. For the running example, at t = 2, the vir- tual source remains at the current node (right) with prob- ability α3(2, 1), or passes the virtual source to a neighbor with probability 1 − α3(2, 1) (left). The parameters αd(t, h) fully describe the transition probability of the Markov chain defined over ht ∈ {1, 2, . . . , t/2}. Let p(t) = [p(t) h ]h∈{1,...,t/2} denote the distribution of the state of the Markov chain at h = P(ht = h). The state transition can be time t, i.e. p(t) represented as the following ((t/2) + 1) × (t/2) dimensional column stochastic matrices:  αd(t, 1) 1 − αd(t, 1) p(t+2) = αd(t, 2) 1 − αd(t, 2) . . . . . . αd(t, t/2) 1 − αd(t, t/2)  p(t) . (11) We treat ht as strictly positive, because at time t = 0, when h0 = 0, the virtual source is always passed. Thus, ht ≥ 1 afterwards. We design the the parameters αd(t, h) to achieve perfect hiding. Precisely, at all even t, we desire p(t) to be p(t) = d − 2 (d − 1)t/2 − 1  1 (d − 1) ... (d − 1)t/2−1  ∈ Rt/2 , for d > 2 and for d = 2, p(t) = (2/t)1t/2 where 1t/2 is all ones vector in Rt/2. There are d(d− 1)h−1 nodes at distance h from the virtual source, and by symmetry all of them are equally likely to have been the source: P(GTv ∗ , δH (v ∗ , vt) = h) = = 1 d(d − 1)h−1 p(t) h d − 2 d((d − 1)t/2 − 1) , for d > 2, which is independent of h. Hence, all the infected nodes (except for the virtual source) are equally likely to have been the source of the origin. This statement is made precise in Equation (14). Together with the desired probability distribution in Equa- tion (11), this gives a recursion over t and h for computing the appropriate αd(t, h)’s. After some algebra and an initial state p(2) = 1, we get that the following choice ensures the desired Equation (11): (cid:40) (d−1)t/2−h+1−1 (d−1)t/2+1−1 t−2h+2 t+2 αd(t, h) = if d > 2 if d = 2 (12) Figure 5: Adaptive diffusion over regular trees. Yellow nodes indicate the set of virtual sources (past and present), and for T = 4, the virtual source node is outlined in red. With this choice of parameters, we show that adaptive dif- fusion spreads fast, infecting Nt = O((d − 1)t/2) nodes at time t and each of the nodes except for the virtual source is equally likely to have been the source. Theorem 3.1. Suppose the contact network is a d-regular tree with d ≥ 2, and one node v∗ in G starts to spread a mes- sage according to Protocol 1 at time t = 0. At a certain time T ≥ 0 an adversary estimates the location of the source v∗ 214100351112131G2G3G4G10254893761G2G34GG using the maximum likelihood estimator vML. The following properties hold for Protocol 1: Protocol 1 Adaptive Diffusion Require: contact network G = (V, E), source v∗, time T , (a) the number of infected nodes at time T is (cid:40) 2(d−1)(T +1)/2−d (d−2) T + 1 NT ≥ + 1 if d > 2 if d = 2 (13) (b) the probability of source detection for the maximum likelihood estimator at time T is P (vML = v ∗ ) ≤ d−2 2(d−1)(T +1)/2−d (1/T ) if d > 2 if d = 2 (14) (cid:26) (c) the expected hop-distance between the true source v∗ and its estimate vML under maximum likelihood esti- mation is lower bounded by E[d(vML, v ∗ )] ≥ d − 1 d T 2 . (15) Protocol 1 describes the details of the implementation of adaptive diffusion. The first three steps are always the same. At time t = 1, the rumor source v∗ selects, uniformly at random, one of its neighbors to be the virtual source v2 and passes the message to it. Next at t = 2, the new virtual source v2 infects all its uninfected neighbors forming G2 (see Figure 5). Then node v2 chooses to either keep the virtual source token with probability αd(2, 1) or to pass it along. If v2 chooses to remain the virtual source i.e., v4 = v2, it passes ‘infection messages’ to all the leaf nodes in the infected subtree, telling each leaf to infect all its uninfected neighbors. Since the virtual source is not connected to the leaf nodes in the infected subtree, these infection messages get relayed by the interior nodes of the subtree. This leads to Nt messages getting passed in total (we assume this happens instantaneously). These messages cause the rumor to spread symmetrically in all directions at t = 3. At t = 4, no more spreading occurs. If v2 does not choose to remain the virtual source, it passes the virtual source token to a randomly chosen neighbor v4, excluding the previous virtual source (in this example, v0). Thus, if the virtual source moves, it moves away from the true source by one hop. Once v4 receives the virtual source token, it sends out infection messages. However, these mes- sages do not get passed back in the direction of the previous virtual source. This causes the infection to spread asym- metrically over only one subtree of the infected graph (G3 in left panel of Figure 5). In the subsequent timestep (t = 4), the virtual source remains fixed and passes the same infec- tion messages again. After this second round of asymmetric spreading, the infected graph is once again symmetric about the virtual source v4 (G4 in left panel of Figure 5). Although adaptive diffusion obfuscates the source on infi- nite regular trees, real world contact networks have cycles, and degrees are irregular, and the size is finite. We study how adaptive diffusion works under more realistic contact networks. 4. GENERAL CONTACT NETWORKS We study adaptive diffusion on general networks when the underlying graph is cyclic, irregular, and finite. degree d else Infection Message(G,vt−1,v,Gt) vt−1 selects a random variable X ∼ U (0, 1) if X ≤ αd(t − 1, h) then for all v ∈ N (vt−1) do Ensure: set of infected nodes VT 1: V0 ← {v∗}, h ← 0, v0 ← v∗ 2: v∗ selects one of its neighbors u at random 3: V1 ← V0 ∪ {u}, h ← 1, v1 ← u 4: let N (u) represent u’s neighbors 5: V2 ← V1 ∪ N (u) \ {v∗}, v2 ← v1 6: t ← 3 7: for t ≤ T do 8: 9: 10: 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: procedure Infection Message(G,u,v,Vt) 23: 24: 25: 26: 27: vt−1 randomly selects u ∈ N (vt−1) \ {vt−2} h ← h + 1 vt ← u for all v ∈ N (vt) \ {vt−1} do Infection Message(G,vt,v,Vt) if t + 1 > T then t ← t + 2 if v ∈ Vt then else Vt ← Vt−2 ∪ {v} for all w ∈ N (v) \ {u} do Infection Message(G,v,w,Gt) break Infection Message(G,vt,v,Vt) 4.1 Irregular tree networks We first consider tree networks with potentially different degrees at the vertices. Although the degrees are irregu- lar, we still apply adaptive diffusion with αd0 (t, h)’s chosen for a specific d0 that might be mismatched with the graph due to degree irregularities. There are a few challenges in this degree-mismatched adaptive diffusion. First, finding the maximum likelihood estimate of the source is not im- mediate, due to degree irregularities. Second, it is not clear a priori which choice of d0 is good. We first show an ef- ficient message-passing algorithm for computing the max- imum likelihood source estimate. Using this estimate, we illustrate through simulations how adaptive diffusion per- forms and show that the detection probability is not too sensitive to the choice of d0 as long as d0 is above a thresh- old that depends on the degree distribution. Efficient ML estimation. To keep the discussion sim- ple, we assume that T is even. The same approach can be naturally extended to odd T . Since the spreading pattern in adaptive diffusion is entirely deterministic given the se- quence of virtual sources at each timestep, computing the likelihood P(GTv∗ = v) is equivalent to computing the probability of the virtual source moving from v to vT over T timesteps. On trees, there is only one path from v to vT and since we do not allow the virtual source to “back- track”, we only need to compute the probability of every virtual source sequence (v0, v2, . . . , vT ) that meets the con- straint v0 = v. Due to the Markov property exhibited by (cid:81) t<T−1 t even adaptive diffusion, we have P(GT{(vt, ht)}t∈{2,4,...,T}) = P(vt+2vt, ht), where ht = δH (v0, vt). For t even, P(vt+2vt, ht) = αd(t, ht) if vt = vt+2 and 1−αd(t,ht) deg(vt)−1 oth- erwise. Here deg(vt) denotes the degree of node vt in G. Given a virtual source trajectory P = (v0, v2, . . . , vT ), let JP = (j1, . . . , jδH (v0,vT )) denote the timesteps at which a new virtual source is introduced, with 1 ≤ ji ≤ T . It al- ways holds that j1 = 2 because after t = 0, the true source chooses a new virtual source and v2 (cid:54)= v0. If the virtual source at t = 2 were to keep the token exactly once after receiving it (so v2 = v4), then j2 = 6, and so forth. To find the likelihood of a node being the true source, we sum over all such trajectories P(GTv0) = (cid:88) 1 deg(v0) δH (v0,vT )−1(cid:89) (cid:123)(cid:122) k=1 × 1 (cid:125) deg(vjk ) − 1 (cid:89) (cid:124) t<T t even JP :P∈S(v0,vT ,T ) (cid:0)1{t+2 /∈JP}αd(t, ht) + 1{t+2∈JP}(1 − αd(t, ht))(cid:1) , (cid:125) Av0 (cid:124) (cid:123)(cid:122) Bv0 (16) where 1 is the indicator function and S(v0, vT , T ) = {P : P = (v0, v2, . . . , vT ) is a valid trajectory of the virtual source}. Intuitively, part Av0 of the above expression is the proba- bility of choosing the set of virtual sources specified by P, and part Bv0 is the probability of keeping or passing the virtual source token at the specified timesteps. Equation (16) holds for both regular and irregular trees. Since the path between two nodes in a tree is unique, and part Av0 is (approximately) the product of node degrees in that path, Av0 is identical for all trajectories P. Pulling Av0 out of the summation, we wish to compute the summation over all valid paths P of part Bv0 (for ease of exposition, we will use Bv0 to refer to this whole summation). Although there are combinatorially many valid paths, we can simplify the for- mula in Equation (16) for the particular choice of αd(t, h)’s defined in (12). Proposition 4.1. Suppose that the underlying contact net- work G is an infinite tree with degree of each node larger than one. One node v∗ in G starts to spread a message at time t = 0 according to Protocol 1 with the choice of d = d0. At a certain even time T ≥ 0, the maximum likelihood estimate of v∗ given a snapshot of the infected subtree GT is d0 − 1 (cid:89) d0 arg max v∈ GT \vT deg(v) v(cid:48)∈p(vT ,v)\{vT ,v} deg(v(cid:48)) − 1 ,(17) [3, 2, 0, 2, 4/3, 3, 3, 3/2]. In this case, nodes 1, 6, and 7 are most likely. When d0 is large, adaptive diffusion tends to place the source closer to the leaves of the infected subtree, so leaf nodes are more likely to have been the source. Figure 6: Irregular tree G4 with virtual source v4. Proof of Proposition 4.1. We first make two observa- tions: (a) Over regular trees, P(GTu) = P(GTw) for any u (cid:54)= w ∈ GT , even if they are different distances from the virtual souce. (b) Part Bv0 is identical for regular and ir- regular graphs, as long as the distance from the candidate source node to vT is the same in both, and the same d0 is used to compute αd0 (t, h). That is, let GT denote an in- fected subtree over an irregular tree network, with virtual source vT , and GT will denote a regular infected subtree with virtual source vT . For candidate sources v0 ∈ GT and v0 ∈ GT , if δH (vT , v0) = δH (vT , v0) = h, then Bv0 = Bv0 . So to find the likelihood of v0 ∈ GT , we can solve for Bv0 using the likelihood of v0 ∈ GT , and compute Av0 using the degree information of every node in the infected, irregular subgraph. To solve for Bv0 , note that over regular graphs, Av = 1/(d0 (d0 − 1)δH (v,vT )−1), where d0 is the degree of the regu- lar graph. If G is a regular tree, Equation (16) still applies. Critically, for regular trees, the αd0 (t, h)’s are designed such that the likelihood of each node being the true source is equal. Hence, P(GTv0) = d0(d0 − 1)δH (v0,vT )−1 × Bv0 , (18) (cid:124) 1 (cid:123)(cid:122) Av0 (cid:125) is a constant that does not depend on v0. This gives Bv0 ∝ (d0 − 1)δH (vT ,v0). From observation (b), we have that Bv0 = Bv0 . Thus we get that for a v0 ∈ GT \ {vT}, P( GTv0) = Av0 Bv0 (d0 − 1)δH (vT ,v0) v(cid:48)∈p(vT ,v0)\{v0,vT }(deg(v(cid:48)) − 1) After scaling appropriately and noting that p(vT , v0) = δH (vT , v0) + 1, this gives the formula in Equation (17). deg(v0)(cid:81) ∝ where vT is the (Jordan) center of the infected subtree GT , p(vT , v) is the unique path from vT to v, and deg(v(cid:48)) is the degree of node v(cid:48). To understand this proposition, consider Figure 6, which was spread using adaptive diffusion (Protocol 1) with a choice of d0 = 2. Then Equation (17) can be computed easily for each node, giving [1/2, 1, 0, 1, 2/3, 1/2, 1/2, 1/4] for nodes [1, 2, 3, 4, 5, 6, 7, 8], respectively. Hence, nodes 2 and 4 are most likely. Intuitively, nodes whose path to the center have small degrees are more likely. However, if we repeat this estimation assuming d0 = 4, then Equation (17) gives Implementation and numerical simulations. We pro- vide an efficient message passing algorithm for computing the ML estimate in Equation (17), which is naturally dis- tributed. We then use this estimator to simulate message spreading for random irregular trees and show that when d0 exceeds a threshold (determined by the degree distribution), obfuscation is not too sensitive to the choice of d0. Av0 can be computed efficiently for irregular graphs with a simple message-passing algorithm. In this algorithm, each node v multiplies its degree information by a cumulative likelihood that gets passed from the virtual source to the leaves. Thus if there are NT infected nodes in GT , then Av0 213456784v Algorithm 2 ML estimator of (17) Input: infected network GT = ( VT , ET ), virtual source vT , time T , the spreading model parameter d0 P( GTv∗ = v) Output: argmaxv∈ VT 1: Pv (cid:44) P( GTv∗ = v). 2: PvT ← 0 3: Av ← 1 for v ∈ VT \ {vT} 4: AvT ← 0 5: A ← Degree Message(GT , vT , vT , A) 6: P(GTvleaf ) ← 7: for all v ∈ VT \ {vT} do 8: 9: 10: h ← δH (v, vT ) Bv ← P(GTvleaf ) · d0 · (d0 − 1)h−1 Pv ← Av · Bv d0(d0−1)T /2−1 (cid:81) t<T t even 1 return argmaxv∈ VT Pv (1 − αd0 (t, t 2 ))} if v = u then for all w ∈ N (v) \ {u} do A w ← Av/deg( w) Degree Message( GT , v, w, A) 11: procedure Degree Message( GT , u, v, A) 12: 13: 14: 15: 16: 17: 18: 19: if v is not a leaf then A w ← Av · deg(v)/(deg( w) · (deg(v) − 1)) Degree Message( GT , v, w, A) else return A 2 , A4 = 1 for every v0 ∈ GT can be computed by passing O( NT ) mes- sages. This message-passing is outlined in procedure ‘Degree Message’ of Algorithm 2. For example, consider computing A5 for the graph in Figure 6. The virtual source vT = 3 starts by setting A2 = 1 3 . This gives A5, but to compute other other values of A w, the message passing continues. Each of the nodes v ∈ N (3) in turn sets A w for their children w ∈ N (v); this is done by dividing deg(v) in Av with Av by deg( w) and replacing the factor of deg(v−1) . For example, node 5 would set A7 = A5 2 .This step is applied recursively until reaching the leaves. If vleaf ∈ GT is a leaf node and G is a regular tree, we get As discussed earlier, Bv0 only depends on d0 and δH (vT , v0). 2 , and A5 = 1 2 · 3 1 1 P(GTvleaf) = (cid:124) d0(d0 − 1)T /2−1 1 (cid:123)(cid:122) Avleaf (cid:89) (cid:124) t<T t even (cid:125) (1 − αd0 (t, (cid:123)(cid:122) Bvleaf . (19) t 2 )) (cid:125) If v0 is h < T /2 hops from vT , then for node v0 with δH (v0, vT ) = h < T /2 over a regular tree, P(GTv0) = P(GTvleaf) = 1 d0 · (d0 − 1)h−1 Bv0 . 1 Finally, Bv0 = Bv0 . So to solve for B5 in our example, we compute P(GTvleaf ) for a 3-regular graph at time T = 4. 6 ·(1−α3(2, 1)) = This gives P(G4vleaf ) = Avleaf ·Bvleaf = 1 9 . Thus B5 = P(G4vleaf )· d0 · (d0 − 1)h−1 = P(G4vleaf )· 3· 3 . This gives P( G45) = A5 · B5 = 1 (2)0 = 1 9 . The same can be done for other nodes in the graph to find the maximum likelihood source estimate. We tested adaptive diffusion over random trees; each node’s degree was drawn i.i.d. from a fixed distribution. Figure 7 illustrates simulation results for random trees in which each node has degree 3 or 4 with equal probability, ) ∗ v = v ( P Average size of infection, NT Figure 7: The probability of detection by the maximum like- lihood estimator depends on the assumed degree d0; the source cannot hide well below a threshold value of d0. averaged over 100,000 trials. By the law of large numbers, the number of nodes infected scales as NT = eT E[log(D−1)] ∼ 2.45T , where D represents the degree distribution of the un- derlying random irregular tree. The value of d0 corresponds to a regular tree with size scaling as (d0 − 1)T . Hence, one can expect that for d0 − 1 < 2.45, the source is likely to be in the center of the infection, and for d0 > 2.45 the source is likely to be at the boundary of the infection. Since the num- ber of nodes in the boundary is significantly larger than the number of nodes in the center, the detection probability is lower for d0−1 > 2.45. This is illustrated in the figure, which matches our prediction. In general, d0 = 1 + (cid:100)e E[log(D−1)](cid:101) provides the best obfuscation, and it is robust for any value above that. In this plot, data points represent successive even timesteps; their uniform spacing implies the message is spreading exponentially quickly. Figure 8 illustrates the probability of detection as a func- tion of infection size while varying the degree distribution of the underlying tree. The notation (3, 5) => (0.5, 0.5) in the legend indicates that each node in the tree has de- gree 3 or 5, each with probability 0.5. For each distribution tested, we chose d0 to be the maximum degree of each de- gree distribution. The average size of infection scales as NT = eT E[log(D−1)] as expected, whereas the probability of detection scales as (dmin − 1)−T = 2−T , which is indepen- dent of the degree distribution. This suggests that adaptive diffusion fails to provide near-perfect obfuscation when the underlying graph is irregular, and the gap increases with the irregularity of the graph. 4.2 Real World Networks To understand how adaptive diffusion fares in realistic sce- narios that involve cycles, irregular degrees, and finite graph size, we ran the adaptive diffusion protocol over an under- lying connectivity network of 10,000 Facebook users in New Orleans circa 2009, as described by the Facebook WOSN dataset [22]. We eliminated all nodes with fewer than three friends (this approach is taken by Secret so users cannot guess which of their friends originated the message), which 10010110210310410−310−210−1Average size of infection (NT)Probability of Detection, P(vML=v*) do=2do=3do=4do=5do=61/NT ) ∗ v = v ( P ) ∗ v = v ( P Average size of infection, NT Average size of infection, NT Figure 8: Adaptive diffusion no longer provides perfect ob- fuscation for highly irregular graphs. Figure 9: Near-ML probability of detection for the Facebook graph with adaptive diffusion. left us with a network of 9,502 users. Over this underlying network, we selected a node uniformly at random as the ru- mor source, and spread the message using adaptive diffusion setting with d0 = ∞, which means that the virtual source is always passed to a new node. This choice is to make the ML source estimation faster, and other choices of d0 could out- perform this naive choice. To preserve the symmetry of our constructed trees as much as possible, we constrained each infected node to infect a maximum of three other nodes in each timestep. We also give the adversary access to the undi- rected infection subtree that explicitly identifies all pairs of nodes for which one node spread the infection to the other. This subtree is overlaid on the underlying contact network, which is not necessarily tree-structured. We demonstrate in simulation (Figure 9) that even with this strong side in- formation, the adversary can only identify the true message source with low probability. Using the naive method of enumerating every possible message trajectory, it is computationally expensive to find the exact ML source estimate since there are 2T possible tra- jectories, depending on whether the virtual source stayed or moved at each timestep. If the true source is one of the leaves, we can closely approximate the ML estimate among all leaf nodes, using the same procedure as described in 4.1, with one small modification: in graphs with cycles, the term (deg(vjk )−1) from equation (16) should be substituted with (degu(vjk )−1), where degu(vjk ) denotes the number of unin- fected neighbors of vjk at time jk. Loops in the graph cause this value to be time-varying, and also dependent on the lo- cation of v0, the candidate source. We did not approximate the ML estimate for non-leaves because the simplifications used in Section 4.1 to compute the likelihood no longer hold, leading to an exponential increase in the problem dimension. This approach is only an approximation of the ML estimate because the virtual source could move in a loop over the so- cial graph (i.e., the same node could be the virtual source more than once, in nonadjacent timesteps). On average, adaptive diffusion reached 96 percent of the network within 10 timesteps using d0 = 4. We also com- puted the average distance of the true source from the es- timated source over the infected subtree (Figure 10). We see that as time progresses, so does the hop distance of the estimated source from the true source. In social networks, nearly everyone is within a small number of hops (say, 6 hops [21]) from everyone else, so this computation is not as informative in this setting. However, it is relevant in location-based connectivity graphs, which can induce large hop distances between nodes. 5. DISCUSSION Besides the adversarial model studied in this paper, anony- mous messaging applications face challenges under alterna- tive adversarial models that can occur in practice. Examples include (a) an adversary that corrupts a subset of network nodes through malware, bribery, or Sybil node creation in order to access metadata like message timing and sender identity; (b) an adversary that prevents nodes from follow- ing the messaging protocol (e.g., via malware); or (c) an ad- versarial network provider that monitor all network activity and analyzes this activity retroactively. All these adversarial attacks increase the chance of source identification, which is a challenging problem for designing anonymous protocols. To a large extent, de-anonymization is an arms race in which there is always side information for an adversary to exploit. The point is to make that ex- ploitation as expensive and difficult as possible, thereby pre- venting it from scaling. Within this arms race, anonymous spreading protocols ensure that adversaries cannot use mes- sage propagation patterns as a weapon. 6. REFERENCES [1] Secret. https://www.secret.ly. [2] Whisper. http://whisper.sh. [3] Yik yak. http://www.yikyakapp.com/. [4] D. Chaum. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of cryptology, 1(1), 1988. [5] I. Clarke, O. Sandberg, B. Wiley, and T.W. Hong. Freenet: A distributed anonymous information storage 10010110210310−310−210−1Average size of infection (NT)Probability of Detection, P(vML=v*) (3,5)=>(0.5,0.5), do=5(3,6)=>(0.5,0.5), do=6(3,7)=>(0.5,0.5), do=7(3,10)=>(0.5,0.5), do=101/NT10010110210310−310−210−1100Average size of infection (NT)Probability of detection using ML leaf estimate α = 0 (Source = leaf)Lower bound on PD, 1/NT ] ) L M v , ∗ v ( H δ [ E Timestep, T Figure 10: Hop distance between true source and estimated source over infection subtree for adaptive diffusion over the Facebook graph. and retrieval system. In Designing Privacy Enhancing Technologies. Springer, 2001. [6] H. Corrigan-Gibbs and B. Ford. Dissent: accountable anonymous group messaging. In Proc. CCS. ACM, 2010. [7] R. Dingledine, M.J. Freedman, and D. Molnar. The free haven project: Distributed anonymous storage service. In Designing Privacy Enhancing Technologies. Springer, 2001. [8] R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. Technical report, DTIC Document, 2004. [9] V. Fioriti and M. Chinnici. Predicting the sources of an outbreak with a spectral technique. arXiv preprint arXiv:1211.2333, 2012. [10] M.J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In Proc. CCS. ACM, 2002. [11] S. Goel, M. Robson, M. Polte, and E. Sirer. Herbivore: A scalable and efficient protocol for anonymous communication. Technical report, Cornell University, 2003. [12] P. Golle and A. Juels. Dining cryptographers revisited. In Advances in Cryptology-Eurocrypt 2004. Springer, 2004. [13] Wuqiong Luo, W Tay, and Mei Leng. How to identify an infection source with limited observations. 2013. [14] E. A. Meirom, C. Milling, C. Caramanis, S. Mannor, A. Orda, and S. Shakkottai. Localized epidemic detection in networks with overwhelming noise. 2014. [15] C. Milling, C. Caramanis, S. Mannor, and S. Shakkottai. On identifying the causative network of an epidemic. In Allerton Conference, pages 909–914, 2012. [16] C. Milling, C. Caramanis, S. Mannor, and S. Shakkottai. Detecting epidemics using highly noisy data. In MobiHoc, pages 177–186, 2013. [17] Chris Milling, Constantine Caramanis, Shie Mannor, and Sanjay Shakkottai. Network forensics: Random infection vs spreading epidemic. In Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE Joint International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS ’12, pages 223–234, New York, NY, USA, 2012. ACM. [18] B. A. Prakash, J. Vreeken, and C. Faloutsos. Spotting culprits in epidemics: How many and which ones? In ICDM, volume 12, pages 11–20, 2012. [19] D. Shah and T. Zaman. Finding rumor sources on random graphs. arXiv preprint arXiv:1110.6230, 2011. [20] D. Shah and T. Zaman. Rumors in a network: Who’s the culprit? Information Theory, IEEE Transactions on, 57(8):5163–5181, Aug 2011. [21] Johan Ugander, Brian Karrer, Lars Backstrom, and Cameron Marlow. The anatomy of the facebook social graph. arXiv preprint arXiv:1111.4503, 2011. [22] Bimal Viswanath, Alan Mislove, Meeyoung Cha, and Krishna P. Gummadi. On the evolution of user interaction in facebook. In Proceedings of the 2nd ACM SIGCOMM Workshop on Social Networks (WOSN’09), August 2009. [23] L. von Ahn, A. Bortz, and N.J. Hopper. K-anonymous message transmission. In Proc. CCS. ACM, 2003. [24] Zhaoxu Wang, Wenxiang Dong, Wenyi Zhang, and Chee Wei Tan. Rumor source detection with multiple observations: Fundamental limits and algorithms. 2014. [25] K. Zhu and L. Ying. A robust information source estimator with sparse observations. arXiv preprint arXiv:1309.4846, 2013. APPENDIX A. LINE AND TREE PROTOCOLS A.1 Line Protocol v ← rightmost node in Vt draw a random variable X ∼ U (0, 1) if X ≤ (δH (v, v∗) + 1)/(t + 1) then Protocol 3 Spreading on a line Require contact network G = (V, E), source v∗, time T Ensure: infected subgraph GT = (VT , ET ) 1: V0 ← {v∗} 2: δH (v∗ − 1, v∗) ← 1 and δH (v∗ + 1, v∗) ← 1 3: t ← 1 4: for t ≤ T do 5: 6: 7: 8: 9: 10: 11: 12: 13: 14: 15: Vt ← Vt−1 ∪ {v + 1} δH (v + 1, v∗) ← δH (v, v∗) + 1 v ← leftmost node in Vt draw a random variable Y ∼ U (0, 1) if Y ≤ (δH (v, v∗) + 1)/(t + 1) then Vt ← Vt−1 ∪ {v − 1} δH (v − 1, v∗) ← δH (v, v∗) + 1 t ← t + 1 Let the underlying contact network be an infinite line with V = {...,−1, 0, 1, 2, ...} and E = {(i, i + 1) : i ∈ Z}. At time t, an infected node v at the boundary spreads the infection to its uninfected neighbor with probability pv,t given in Equa- tion (3). ‘Infection’ means transmitting the message, the 2468101214100101Time (T)Hop distance between source and estimate α = 0 (Source = leaf)Lower bound, (d−1)/d * T/2 hop-distance of the node (incremented by one), and the cur- rent timestep since the start of the outbreak (incremented by one). Note that this protocol is naturally distributed. A.2 Tree Protocol Protocol 4 Spreading on a tree Require contact network G = (V, E), source v∗, time T Ensure: infected subgraph GT = (VT , ET ) 1: V0 ← {v∗} 2: s1,v∗ ← 0 and s2,v∗ ← 0 3: v∗ selects one of its neighbors u at random 4: V1 ← V0 ∪ {u} 5: s1,u ← 1 and s2,u ← 1 6: t ← 2 7: for t ≤ T do 8: 9: 10: for all v ∈ Vt−1 with s2,v > 0 do if s1,v = 1 then random v selects one of its uninfected neighbors u at Vt ← Vt−1 ∪ {u} s1,u ← 1 and s2,u ← s2,v + 1 s1,v ← 0 else for all uninfected neighboring nodes w of v Vt ← Vt−1 ∪ {w} s1,w ← 0 and s2,w ← s2,v − 1 s2,v ← 0 t ← t + 1 11: 12: 13: 14: 15: 16: 17: 18: 19: do At time t = 0, the source node v∗ is initialized with s1,v∗ = 1 and s2,v∗ = 0. At time t = 1, v∗ selects, uni- formly at random, one of its neighboring nodes (say node u) and passes the updated state variables s1,u = 1 and s2,u = 1 along with the message to u. The first state s1,u = 1 indi- cates that node u is one of the ‘virtual sources’. The second state s2,u = 1 indicates that node u will eventually be at height 1 in the infected subtree. Afterwards, the protocol iterates the following procedures. Any infected node v that is not a future virtual source creates ‘offsprings’ that are not virtual sources (s1,v(cid:48) = 0) and have heights decreased by one (s1,v(cid:48) = s1,v−1). Any node v with height zero (i.e., s2,v = 0) stops spreading the infection in order to ensure that v and the true source are at the same depth from the center of Gt for any t. An infected node v that is a future virtual source proceeds similarly, with one difference: it chooses one of its neighbors to be a virtual source with the second state incre- mented by one, i.e. s2,v(cid:48) = s2,v + 1. Protocol 4 summarizes this process and Figure 4 illustrates that if the contact net- work is a regular tree, this process keeps the infected subtree balanced and regular, with the true source hiding among the leaves. Figure 4 shows an example of this spreading algorithm. At time t = 0, node v∗ = 0 starts spreading a rumor in the network. At t = 1, node 0 infects node 1 and sets s1,1 = 1 and s2,1 = 1. At t = 2, node 1 infects node 3 and sets s1,3 = 0 and s2,3 = 0. Node 1 also infects node 2 and sets s1,2 = 1 and s2,2 = 2. At t = 3, node 2 infects node 4 and sets s1,4 = 0 and s2,4 = 1. Node 2 also infects node 5 and sets s1,5 = 1 and s2,5 = 3. Observe that node 3 will not infect any of its neighbors because s1,3 = 0 and s2,3 = 0. by sending a state information along with the message. Each infected node u keeps two state variables: a binary variable s1,u ∈ {0, 1} and a non-negative integer s2,u ∈ {0, 1, 2, . . . , t}. The binary state s1,u marks the future vir- tual sources of the infected subtree; if s1,u = 1, then node u will be the Jordan center of the graph at some point in the future. The integer state s2,u keeps track of the eventual ‘height’ of node u in the infected subtree. In the example above, node 3 will always be at the leaf, so it has s2,3 = 0, where as node 9 is currently a leaf, but eventually will be at height 2 and has s2,9 = 2, since node 5 will be at some point a center of infected subtree of depth 3. These state variables are computed for each node when it is infected, and is constant over time. B. PROOF OF PROPOSITION 2.1 Spreading rate. Consider the following time-dependent random walk on N0 = {0, 1, . . .}. Let xt be the position of a black dot at time t and assume that x0 = 0. At time t ≥ 1, the dot can either move to the right: xt = xt−1 + 1 with probability p(t, xt−1) = (xt−1 + 1)/(t + 1); or stay where it is: xt = xt−1 with probability q(t, xt−1) = 1 − p(t, xt−1). We claim that P (xT = k) = 1/(T + 1), for k ∈ {0, . . . , T}. We will prove this by induction on T . Observe that for T = 1, x1 = x0 + 1 = 1 with probability 1/2 and x1 = 0 with probability 1/2. Therefore, the claim is true for T = 1. Assume it is true for T − 1. At t = T , P (xT = 0) = P (xT−1 = 0) 1 − 1 T + 1 = 1 T + 1 P (xT = T ) = P (xT−1 = T ) P (xT = k) = P (xT−1 = k − 1) T = k T + 1 T + 1 + T + 1 1 − k + 1 T + 1 1 P (xT−1 = k) = , T + 1 for k ∈ {1, . . . , T − 1}. Thus, the claim is true for any T . Given v∗ and T , consider an infected subgraph GT gener- ated by Protocol 3 (Line Protocol). GT can be decomposed into two independent chains: the chain to the right of v∗ rep- T and the chain to the left of v∗ represented by resented by Gr T ∪ {v∗}, where T . Therefore, we can write GT = Gr Gl T ∈ {0, . . . , T}. The Line Protocol spreads on each T,Gl Gr side of v∗ according to the time-inhomogeneous random walk described above. Hence, Gr T are independent T and Gl and identically distributed, and P (Gr T = k) = 1/(T + 1) for any k ∈ {0, . . . , T}. The number of infected nodes T + 1 is the sum of two indepen- NT = GT = Gr (cid:26) dent and uniformly distributed random variables. Thus, it is distributed according to the triangular distribution: k, k ≤ T + 1, 2(T + 1) − k, k ≤ 2T + 1, P (NT = k) = T + Gl T ∪ Gl 1 (T + 1)2 (20) Probability of detection. Assume that the adversary observes an infected subgraph GT of size NT = GT = k. Moreover, assume that the adversary knows T . Not knowing T will only lead to worse performance. If k ≤ T + 1, then for any v ∈ GT assumed to be the rumor source, we have that Gr T = k− kr − 1 with kr ∈ {0, 1, . . . , T}. There- fore, P(GTv) = P({Gr 1/(T + 1)2. This means that all v ∈ GT are equally likely T = k − kr − 1(cid:9)) = T = kr} ∩(cid:8)Gl T = kr, Gl (cid:18) (cid:18) (cid:19) 1 (cid:19) T = kr, T = k − kr, Gl and the maximum likelihood algorithm would select one node v ∈ GT at random. Hence, the probability of de- tecting the true source P(vM L = v∗GT , v∗) = 1/(T + 1) whenever k ≤ T + 1. If k > T + 1, then for some nodes v ∈ GT , we have that Gr T = k − kr − 1 with kr > T or Gr T = kl with kl > T . These nodes could not have generated GT in T timesteps and therefore P(GTv) = 0 for all such nodes. The reader can verify that there are 2k − 2T many such nodes. For the other nodes, one can easily verify (similar to above) that P(GTv) = 1/(T + 1)2. Therefore, the probability of detect- ing the true source P(vM L = v∗GT , v∗) = 1/(2T − k + 1) whenever k > T + 1. Putting it all together, we get that Gl C. PROOF OF PROPOSITION 2.2 First, under Protocol 4 (Tree Protocol), GT is a complete (d − 1)-ary tree (with the exception that the root has d children) of depth T /2 whenever T is even. GT is made up of two complete (d − 1)-ary trees of depth (T − 1)/2 each with their roots connected by an edge whenever T is odd. Therefore, it follows that NT is a deterministic function of T and is given by NT = 1, T = 0, − 2 2(d−1)(T +1)/2 d−2 d−2 − 2 d(d−1)T /2 d−2 , T ≥ 1, T odd , d−2 , T ≥ 2, T even ; (26)  P(vM L = v ∗GT )P(GTv ∗ ) The lower bound on NT in Equation (7) follows immediately from the above expression. P(vM L = v ∗ ) = = (cid:88) T(cid:88) GT k=0 k + 1 1 2T(cid:88) + T +1 k + 1 (T + 1)2 1 2T − k + 1 2T − k + 1 (T + 1)2 2T + 1 (T + 1)2 . = (21) Finally, observe that P(vM L = v∗) is not a function of v∗. We can use the above analysis to compute the exact pos- terior distribution of the Line Protocol when the underly- ing contact network is a finite ring. To put a prior on the source location, we fix the observation time T and consider a finite ring of size larger than 2T + 1. Assuming uniform prior for the source location on this finite ring, the next re- mark provides the posterior distribution of the source, given that we observe infected nodes {1, . . . , m} for some integer m ≤ 2T + 1. Remark B.1. Let the infected nodes be {1, 2, . . . , m}, then ∞(cid:88) t=max{m−k,k−1} 1 (t + 1)2 − k(m − k + 1) (cid:18) m + 1 (cid:19) (t + 2) ∗ P(v = kGT ) = 1 Zm ∞(cid:88) ∞(cid:88) t=m−k = = , (22) for all k ∈ [m] where Zm is the normalizing constant to ensure the probabilities sum to one. Proof of Remark B.1. Denote the m infected nodes by {1, . . . , m}, and let G∗ denote the infected subgraph. Then, for k ≤ (1 + m)/2, (t + 2)2 P(there exists a time T such that GT = G ∗v ∗ = k) (23) ∗ P(Gt = G (cid:16) and Gt+1 (cid:54)= G 1 −(cid:16) t + 2 − k t + 2 ∗ ∗v = k) (cid:17)(cid:16) t + 2 − (m − k + 1) (24) (cid:17)(cid:17) t + 2 , 1 t=m−k (1 + t)2 (25) where the last line follows from Equation (20), where P(Gl T = T = m − k) = 1/(T + 1), and k − 1) = 1/(T + 1), P(Gr P(no infection at time t + 1Gt = G∗ and v∗ = k) = ((t + 2− k)(t + 1 + k− m)/(t + 2)2). For k ≥ (1 + m)/2, we have a similar formula with summation starting from k − 1. With the uniform prior on the finite ring, this proves Equation (22). For any given infected graph GT , it can be verified that any non-leaf node could not have generated GT under the Tree Protocol. In other words, P(GTv non-leaf node) = 0 and v could not have started the rumor. On the other hand, we claim that for any two leaf nodes v1, v2 ∈ GT , we have that P(GTv1) = P(GTv2) > 0. This is true because for each leaf node v ∈ GT , there exists a sequence of state val- ues {s1,u, s2,u}u∈GT that evolves according to the Tree Pro- tocol with s1,v = 1 and s2,v = 0. Further, the regularity of the underlying graph G ensures that all these sequences are equally likely. Therefore, the probability of correct rumor source detection under the maximum likelihood algorithm is given by PM L(T ) = 1/Nl,T , where Nl,T represents the number of leaf nodes in GT . It can be also shown that Nl,T and NT are related to each other by the following expression This proves expression for P(cid:0)vML = v∗(cid:1) given in (8). d − 1 Nl,T = . (d − 2)NT + 2 (27) Expected distance. For any v∗ ∈ G and any T , E[δH (v∗, vML)] is given by ∗ E[δH (v , vML)] = (cid:88) (cid:88) v∈G GT P(GTv ∗ )P(vML = v)δH (v ∗ , v). (28) As indicated above, no matter where the rumor starts from, GT is a (d − 1)-ary tree (with the exception that the root has d children) of depth T /2 whenever T is even. More- over, vML = v with probability 1/Nl,T for all v leaf nodes in GT . Therefore, the above equation can be solved exactly to obtain the expression provided in the statement of the proposition. D. PROOF OF THEOREM 3.1 Spreading rate. Once again, under Protocol 1, GT is a complete (d − 1)-ary tree (with the exception that the root has d children) of depth T /2 whenever T is even. Whenever T is odd, with probability α(T, h), GT is again such a (d−1)- ary tree of depth (T + 1)/2. With probability 1 − α(T, h), GT is made up of two (d − 1)-ary trees of depth (T − 1)/2 each with their roots connected by an edge. Therefore, it follows that when d > 2, NT is given by 1, T = 0, − 2 2(d−1)(T +1)/2 d−2 − 2 d(d−1)(T +1)/2 d−2 d−2 − 2 d(d−1)T /2 d−2 , T ≥ 1, T odd, w.p. (1 − α) , d−2 , T ≥ 1, T odd, w.p. α , d−2 , T ≥ 2, T even ; (29)  NT = Similarly, when d = 2, NT can be expressed as follows:  NT = 1, T = 0, T + 1, T ≥ 1, T odd, w.p. (1 − α) , T + 2, T ≥ 1, T odd, w.p. α , T + 2, T ≥ 2, T even ; (30) The lower bound on NT in Equation (7) follows immediately from the above expressions. Probability of detection. For any given infected graph GT , the virtual source vT cannot have been the source node, since the true source always passes the token at timestep t = 1. So P(GTv = vT ) = 0. We claim that for any two nodes that are not the virtual source at time T , u, w ∈ GT , P(GTu) = P(GTw) > 0. This is true iff for any non-virtual- T source node v, there exists a sequence of virtual sources vi i=0 that evolves according to Protocol 1 with v0 = v that results in the observed GT , and for all u, w ∈ GT \ {vT}, this se- quence has the same likelihood. In a tree, a unique path ex- ists between any pair of nodes, so we can always find a valid path of virtual sources from a candidate node u ∈ GT \{vT} to vT . We claim that any such path leads to the formation of the observed GT . Due to regularity of G and the sym- metry in GT , for even T , P(GTv(1)) = P(GTv(2)) for all v(1), v(2) ∈ GT with δH (v(1), vT ) = δH (v(2), vT ). Moreover, recall that the αd(t, h)’s were designed to satisfy the distri- bution in Equation 11. Combining these two observations with the fact that we have (d − 1)h infected nodes h-hops away from the virtual source, we get that for all v(1), v(2) ∈ GT \ {vT}, P(GTv(1)) = P(GTv(2)). For odd T , if the vir- tual source remains the virtual source, then GT stays sym- metric about vT , in which case the same result holds. If the virtual source passes the token, then GT is perfectly sym- metric about the edge connecting vT−1 and vT . Since both nodes are virtual sources (former and present, respectively) and T > 1, the adversary can infer that neither node was the true source. Since the two connected subtrees are symmetric and each node within a subtree has the same likelihood of being the source by construction (Equation 11), we get that for all v(1), v(2) ∈ GT \{vT , vT−1}, P(GTv(1)) = P(GTv(2)). Thus at odd timesteps, P(vM L = v∗) ≥ 1/(NT − 2).
1808.06200
1
1808
2018-08-19T11:52:20
Ensemble-based Overlapping Community Detection using Disjoint Community Structures
[ "cs.SI", "physics.soc-ph" ]
While there has been a plethora of approaches for detecting disjoint communities from real-world complex networks, some methods for detecting overlapping community structures have also been recently proposed. In this work, we argue that, instead of developing separate approaches for detecting overlapping communities, a promising alternative is to infer the overlapping communities from multiple disjoint community structures. We propose an ensemble-based approach, called EnCoD, that leverages the solutions produced by various disjoint community detection algorithms to discover the overlapping community structure. Specifically, EnCoD generates a feature vector for each vertex from the results of the base algorithms and learns which features lead to detect densely connected overlapping regions in an unsupervised way. It keeps on iterating until the likelihood of each vertex belonging to its own community maximizes. Experiments on both synthetic and several real-world networks (with known ground-truth community structures) reveal that EnCoD significantly outperforms nine state-of-the-art overlapping community detection algorithms. Finally, we show that EnCoD is generic enough to be applied to networks where the vertices are associated with explicit semantic features. To the best of our knowledge, EnCoD is the second ensemble-based overlapping community detection approach after MEDOC [1].
cs.SI
cs
Ensemble-based Overlapping Community Detection using Disjoint Community Structures Tanmoy Chakraborty1, Saptarshi Ghosh2, Noseong Park3 1 Dept. of CSE, IIIT Delhi, India 2 Dept. of CSE, IIT Kharagpur, India 3 Dept. of Information Sciences and Technology, George Mason University, [email protected], [email protected], [email protected] (Accepted in Knowledge-Based Systems) USA Abstract While there has been a plethora of approaches for detecting disjoint com- munities from real-world complex networks, some methods for detecting overlapping community structures have also been recently proposed. In this work, we argue that, instead of developing separate approaches for detecting overlapping communities, a promising alternative is to infer the overlapping communities from multiple disjoint community structures. We propose an ensemble-based approach, called EnCoD, that leverages the solutions produced by various disjoint community detection algorithms to discover the overlap- ping community structure. Specifically, EnCoD generates a feature vector for each vertex from the results of the base algorithms and learns which fea- tures lead to detect densely connected overlapping regions in an unsupervised way. It keeps on iterating until the likelihood of each vertex belonging to its own community maximizes. Experiments on both synthetic and several real- world networks (with known ground-truth community structures) reveal that EnCoD significantly outperforms nine state-of-the-art overlapping community detection algorithms. Finally, we show that EnCoD is generic enough to be applied to networks where the vertices are associated with explicit semantic features. To the best of our knowledge, EnCoD is the second ensemble-based overlapping community detection approach after MEDOC [1]. Keywords: Ensemble algorithm, Overlapping communities, Community detection Preprint submitted to Knowledge-Based Systems August 21, 2018 1. Introduction Real-world networks are complex, high-dimensional and multi-faceted, thus can be interpreted in many different ways. A fundamental property of a real-world network is its "community structure", which is often assumed as organizational units in social networks [2], functional modules in biolog- ical networks [3], scientific communities in citation networks [4], and so on. Despite a huge amount of effort devoted in past decade or more [5, 6], the problem of community detection (CD) has turned out to be more compli- cated because of two reasons -- (i) CD is an ill-defined problem [5]; therefore one can obtain multiple solutions for a given network, each of which is impor- tant in its own way. Moreover a single objective function (even the "best", if exists) may not be able to effectively model such vast dimensions present in a network. (ii) The vertices in real-world networks often belong to multiple communities [7, 8], leading to the community structure being overlapped. None of the existing disjoint CD algorithms are able to detect overlapping regions inside a community structure. Although a growing body of literature is focusing on discovering the over- lapping community structure after the introductory work of Palla et al. [7], the number is considerably less compared to the vast amount of literature on disjoint CD. Moreover, in recent years, Chakraborty et al. [9, 1] showed that one can successfully detect overlapping regions inside a community struc- ture by leveraging huge number of diverse and accurate disjoint community structures. In this paper, we attempt to utilize multiple views of the disjoint commu- nity structure observed in a given network (obtained from different disjoint CD algorithms) by merging these views, distilling all their good qualities into an ensemble solution [10, 11]. The motivation for our work comes from the fact that ensemble approaches have already been proved to be successful in clustering and classification tasks [12]. Hence, ensemble approaches, if designed properly, can perform well in overlapping community detection as well. However, the challenge in applying ensemble techniques to network- based analysis is due to the lack of sufficient information such as representa- tive features of each vertex, extent of similarity between pair-wise vertices, and so on. Empirical observations and Motivation. Our algorithm is primarily 2 Figure 1: Conditional probability P (in y-axis) of (a) existence of an edge between two vertices, and (b) common overlapping community (OC) membership of two vertices in the ground-truth community structure of six real networks, given the fraction of the base disjoint communities that both the vertices share. We conclude that the more the vertices share common base disjoint communities, the more the chance that they are connected in the graph and belong to the same overlapping community. built on two interesting empirical observations on six large real networks (see Section 4 for dataset description). While analyzing the ground-truth commu- nity structures of these networks, we find many solutions by running each of the base disjoint CD algorithms on every single network. The solutions have significant (dis)similarity with the ground-truth, corroborating the observa- tion in [13]. We represent the memberships of each vertex in different base disjoint communities by a feature vector. Then we examine the probability of two vertices u and v being connected in the network, given that they have ku,v fraction of common base community memberships. Figure 1(a) plots this conditional probability for the six networks. We see an increasing re- lationship, i.e., the more base disjoint communities a pair of vertices has in common, the higher the probability of an edge connecting them. Further, we examine the conditional probability that two vertices belong to the same ground-truth overlapping community given that they have ku,v fraction of common base disjoint community memberships. Once again we observe a positive correlation in Figure 1(b). Thus, the probability of a pair of vertices belonging to the same overlapping community increases with the increase of their shared base community memberships. The above observa- tions motivated us to develop an overlapping CD algorithm, by combining 3 disjoint community structures identified for a given network. Ensemble-based overlapping community detection. Our method iteratively learns major dimensions of features for vertices that lead to densely- connected groups. In practice, since base disjoint CD algorithms produce many (and significantly different) community structures from a network, we leverage this information to extract the latent feature information associated with each vertex. 1 Our algorithm, named EnCoD is built on two hypotheses -- first, an overlapping community is formed by a group of densely-connected vertices; second, vertices within a community have significantly high fea- ture similarity. We represent the memberships of each vertex in different base disjoint communities by a feature vector, and then use the similarity between two vertices. We then learn important features that may lead to discover densely-connected overlapping communities [14, 15]. To the best of our knowledge, EnCoD is the second algorithm after MEDOC [1] to propose ensemble-based overlapping CD algorithm by leveraging several disjoint com- munity structures. Note that other two algorithms, namely PEACOCK [16] and PVOC [9] can detect overlapping community from a single disjoint com- munity structure by applying an efficient post-processing technique. They do not leverage multiple disjoint community structures. Summary of the evaluation. Experiments are conducted on both syn- thetic and six large real-world networks with known ground-truth overlapping community structure. We experiment with various disjoint CD algorithms as the base algorithms for EnCoD. For comparative evaluation, we choose seven non-ensemble based overlapping CD algorithms. Additionally, we compare EnCoD with PVOC [9] and MEDOC [1], two most recent overlapping CD algorithms that leverage disjoint community structures. Few notable obser- vations are as follows. (i) EnCoD is almost independent of how perfect the base CD algorithms are; however, stronger base algorithms have more impact in the aggregation stage than the weaker base algorithms. Also, the accuracy of EnCoD never de- creases with the increase in base solutions. (ii) EnCoD tends to get saturated after aggregating a certain number of base solutions, after which there is almost no effect on the final performance. How- ever, the accuracy never decreases with the increase in base solutions. 1Note that the set of communities returned by a CD algorithm is termed as 'community structure'. 4 (iii) On average, EnCoD outperforms the best baseline overlapping CD algo- rithm in terms of the overlapping NMI metric (ON M I) [17], Ω index and F-Score. (iv) We further apply EnCoD to networks where, apart from the topological structure, every vertex is associated with additional feature information. In such cases, EnCoD systematically combines the features into the model and produces more accurate overlapping community structure. Contributions of the paper. The major contributions of the paper are four-fold: • Ensemble algorithms for community detection have rarely been stud- ied. This paper will pave the way for enhancing the state-of-the-art on ensemble based community detection. • The idea of using the membership of a vertex in different disjoint com- munity structures as features is unique and, to our knowledge, has not been used earlier in community detection. • Empirical results indicate that EnCoD is either as good as the best baseline CD algorithm, or sometimes performs even better than that. Therefore, one can rely on such ensemble framework instead of choosing and picking the best one from the jungle of CD algorithms available at present. • The framework used in EnCoD is generalized enough to be used to com- bine any feature set of vertices to detect community structure (as shown in Section 6). Therefore, if the topology of a network is incomplete and sparse in nature and the properties of vertices are available, one can use the proposed framework to combine the features into the model for overlapping community detection. 2. Related Work Due to the abundance of literature on community detection (CD) algo- rithms [5, 6, 18], we restrict our discussion to some selected works that we deem as pertinent to our study. Two extensive survey articles on CD are [5] and [6]. Traditional community detection algorithms. Most of the early research in CD assumed the communities to be disjoint. Many different 5 CD approaches have been proposed, including, modularity optimization [19, 20, 21], information theoretic approaches [22], vertex similarity-based ap- proaches [23], significance-based approaches [24], label propagation [25], diffusion- based approach [26], and so on (see [5, 6] for surveys). Gradually, researchers realized that in real-world networks, a vertex can belong to multiple com- munities, resulting overlapping community structure. Palla et al. proposed 'CFinder' [7], the first ever method to detect overlapping communities based on clique-percolation technique. Subsequently, several overlapping CD tech- niques have been proposed, including modified modularity [27], fitness func- tion [28], local density function [29], affinity propagation function [30], in- tegrated approach [31], node location analysis based approach [32], non- negative matrix factorization [8], and so on. Recently, Li et al. [33] proposed a local spectral clustering for overlapping community detection. Huang et al. [34] proposed an overlapping community detection algorithm in het- erogeneous social networks via the user model. Sattari and Zamanifar [35] suggested a spreading activation-based label propagation algorithm for over- lapping community detection in dynamic social networks. Notably, though there have been several recent studies on the topic, the depth of study on overlapping community detection is much lesser than that for the disjoint case. Ensemble-approach for community detection. Ensemble approach has been well-studied in traditional data mining for clustering data points (see [12] for a detailed review). These approaches can be classified into two categories [12]: object co-occurrence based approaches and median parti- tioning based approaches. However, this number is significantly less when we talk about clustering vertices in the network. A pioneering attempt was made by Dahlin and Svenson [10] to propose ensemble clustering for network data. Raghavan et al. [36] showed the effectiveness of merging outputs of several community detection algorithms. Ovelgonne and Geyer-Schulz pro- posed CGGC [37], an ensemble-based modularity maximization approach. Kanawati proposed YASCA [38] that for each seed vertex considers its ego- centric network, partitions the network in different ways and combines the outputs. He further tuned two parameters -- quality and diversity of the par- titions for final combination [39]. Recently, Lancichinetti and Fortunato [11] proposed 'consensus clustering' which utilizes a consensus matrix for disjoint community detection. However, all the above works focused on identifying disjoint communities. 6 Recently, two algorithms, PEACOCK [16] and PVOC [9] argued that intelligently post-processing a disjoint solution can lead to the detection of overlapping community structure. PVOC was reported to outperform PEA- COCK [9]. The difference between PVOC and EnCoD is that PVOC uses a novel post-processing technique that modifies a given disjoint community structure using a metric called 'permanence' [40, 41], whereas EnCoD does not do any post-processing; rather it considers multiple disjoint community structures and uses them as features of a vertex for detecting overlapping regions. Another ensemble algorithm, called MEDOC [1] uses the idea of meta community (community of communities). It creates a multi-partite network using the base disjoint community structure. After this, it runs an existing CD algorithm to partition the multi-partite network. Finally, a membership function is to determine the membership of a vertex to a com- munity. EnCoD does not create any meta-community using base community structures; rather it uses them to generate features for each vertex to be used further in the optimization algorithm. In Section 5.2, we will show that our algorithm outperforms both PVOC and MEDOC. 3. Ensemble-based Overlapping CD Algorithm We design an overlapping CD algorithm by leveraging the solutions ob- tained from several disjoint CD algorithms. This section details the proposed overlapping CD algorithm, named EnCoD. We start by formally defining the ensemble-based overlapping community detection problem. Definition 1. (Ensemble-based Overlapping Community Detection) Given a network G = (V, E) and a set of M disjoint community detection al- gorithms AL = {Alm}M m=1, we aim at grouping the vertices into communities OC = {OC1, OC2,···} in such a way that a vertex may belong to multiple i OCi = V and (cid:64)i : OCi = φ. communities and the following conditions are satisfied: (cid:83) We now describe our algorithm, called EnCoD, an Ensemble based Over- lapping Community Detection. The overall framework of the algorithm is presented in Algorithm 1 and important notations are summarized in Table 1. network G(V, E) and the set of M base algorithms AL = {Alm}M Inputs to the algorithm: Two main inputs of the algorithm are the m=1 which 7 Table 1: Important notations used in this paper. Notation G(V, E) AL Ck m Γm Γ ¯a ξ OC t OC ζ τL Fv m=1, set of all M K base disjoint community structures k=1, set of base disjoint community structures discovered by base algorithm m }, base community structure discovered by algorithm Alm on kth vertex Description An undirected network with sets of vertices V and edges E m=1}, set of M base disjoint CD algorithms {AlM {C 1k m , ..., C ak ordering {Ck m}K Alm on K different vertex orderings ΓM Average size of a base community structure ¯aM K, approx. total number of communities in Γ {OC1, OC2,···}, final overlapping community structure consisting of overlapping communities Overlapping community structure at iteration t of EnCoD {τ1, τ2,···}, set of thresholds where τj corresponds to overlapping community OCj Global community threshold used to control the community size Feature vector of vertex v yield disjoint community structures. Apart from these, one needs to specify: K, number of vertex orderings of a particular network on which a base CD algorithm will run;2 INV(v, C), an involvement function that will determine to what extent v is a part of a base community C; SIM(cid:48)(C, v), a function that will measure the similarity of a vertex v with a community C; and τL, a threshold that confirms the minimum similarity value required by the vertices in a community to remain together, failing which the community is discarded. Possible definitions of these functions are discussed in Section 5.1. Summary of the algorithm: Motivated by the ego-centric circle de- tection algorithms proposed in [43, 44], we design EnCoD that aims at max- imizing the likelihood of the membership of each node inside a community. EnCoD starts by running all the base disjoint CD algorithms on different vertex orderings3 of a network, which produce dissimilar base community structures (Section 3.1). Following this, the base community information is used to generate a feature vector for each vertex (Section 3.2); this in turn transforms the vertices in the network into a feature space. The algorithm now tries to infer the overlapping community structure from the vector repre- sentation of vertices, by iteratively optimizing an objective function (detailed in Section 3.3). The actual iteration starts by assigning each vertex to a sin- 2Previous research reported that most disjoint CD algorithms produce different com- munity structures depending on the ordering of vertices in the input [42, 40, 11]. 3We here use random vertex ordering strategy [42]. 8 gleton community, and a high similarity threshold value is assigned to each community to maintain high integrity among its constituent vertices. In each iteration, the algorithm manipulates the community structure by randomly removing vertices from their assigned communities and allocating vertices to some unassigned communities, such that the similarity condition is not vio- lated (Section 3.4). After each iteration, the similarity threshold associated with each community is updated (Section 3.5). The iteration continues as long as the value of the objective function does not decrease. In the rest of the section, we elaborate the subroutines mentioned in Algorithm 1. 3.1. Generate Base Communities m = {C 1k Assume that we are given a network G = (V, E) and M different base CD algorithms AL = {Alm}M m=1. For each such base algorithm Alm, EnCoD gen- erates K different vertex orderings of G and runs Alm on each vertex ordering. This results in K different community structures denoted as Γm = {Ck k=1, m } constitutes a specific where each community structure Ck partitioning of vertices in G. The size of each Ck m might be different. We choose to use different vertex orderings of G since it has been shown that many of the disjoint CD algorithms produce different community structures depending on the ordering of vertices in the input [40, 11]. Here we use ran- dom vertex ordering strategy which ensures that the base algorithm starts from different seed vertices without any predefined bias and produces diverse community structures. At the end of this step, we obtain Γ, a set of M K base community structures (Step 3 of Algorithm 1). m ,··· , C ak m}K 3.2. Generate Feature Vectors for Vertices The ensemble step in Function 1 (which is invoked in step 5 of Algorithm 1) intends to leverage the base community structures Γ to construct the feature vector of vertices. Definition 2. (Feature vector for a vertex) Given a set of base com- munity structures Γ, the feature vector of vertex v is denoted by Fv, whose ith entry Fv(i) = P (Civ) indicates the probability of v being a member of the base community Ci, given vertex v is observed. The length of Fv is m. The value of P (Civ) is derived by mea- Fv = ξ = (cid:80) (cid:80)Ck Ck suring the involvement of v into Ci. Γm∈Γ m∈Γm 9 Algorithm 1: EnCoD: An Ensemble based Overlapping Community Detection Data: Network G(V, E); A set of base algorithms AL = {Alm}M K: No of iterations; INV(., .): Involvement function; SIM(cid:48)(., .): Vertex-to-community similarity function; τL: Lower limit for community threshold Result: Overlapping community structure OC m=1; 1 Γ = φ 2 for each algorithm Alm ∈ AL do Generate K different vertex orderings of G, run Alm on each vertex ordering and obtain K disjoint community structures Γm. The size of each community structure Ck different. Each such set is denoted by Ck Γ = Γ ∪ Γm m } m , ..., Cak m ∈ Γm is m = {C1k 5 for each v ∈ V do Fv = ExtractF eatures(v, Γ, INV); // Initialization 7 OC = φ 8 OC0 = φ 9 ζ0 = φ 10 for each v ∈ V do 0 = {v} 0 0 13 14 12 11 OCv OC0 = OC0 ∪ OCv 0 = ∞ τ v ζ0 = ζ0 ∪ τ v 15 P logl = −1 16 Clogl = −1 17 t = 1 18 OCt = OC0 19 ζt = ζ0 20 while Clogl ≥ P logl do // Final overlapping community structure // Initial set of overlapping community // Initial set of community threshold // Each vertex is in each community // Arbitrary high threshold // Previous log likelihood // Current log likelihood // Current number of iterations 3 4 6 21 22 23 24 25 26 27 28 29 30 31 32 OC = OCt P logl = Clogl OCt+1 = M anipulateComm(V, OCt) // Update thresholds and communities for OCj t+1 ∈ OCt+1 do t+1 ← min{SIM(cid:48)(OCj τ j if τ j t+1, v)v ∈ OCj t+1} t+1 < τL then // Threshold condition is violated OCt+1 ← OCt+1 (cid:114) {OCj for each v ∈ OCj t+1 do t+1} OCt+1 ← OCt+1 ∪ {v} ζt+1 ← ζt+1 (cid:114) τ j t+1 Clogl = lζt+1 (G; OCt+1) [Eq. 8] t = t + 1 33 return OC 10 Function 1: ExtractF eatures(Current vertex: v, Set of base disjoint communities: Γ, Involvement function: INV) 1 Fv = φ; Dv = 0; ξ = 0; AF (v) = φ; 2 for each Γm ∈ Γ do // Auxiliary vector ; for each Ck m ∈ Γm do for each C ∈ Ck Measure dC AFv = AFv ∪ {dC v }; v ≥ Dv then if dC Dv = dC v ; m do v = 1 − INV(v, C); ξ = ξ + 1; 10 for each AFi(v) ∈ AF (v) do Compute P (Civ) = Fv = Fv ∪ {P (Civ)}; ξ.Dv +ξ−(cid:80)ξ Dv−AFi(v)+1 k=1 AFk(v) 3 4 5 6 7 8 9 11 12 13 return Fv We now describe how we compute Fv for a vertex v using Function 1. To start with, we measure INV(v, C), the involvement v into each base commu- nity C ∈ Ck m (see Section 5.1 for the possible definitions of INV). Note if v is not a part of a certain community C, we leave the corresponding field as zero. The value returned by INV is subtracted from 1 to get the distance of v from the community (Step 5). Following this, we construct an auxiliary feature vector AF (v) for vertex v, which consists of elements indicating the distance of v from each base community (Step 6). The number of communities ξ ∈ Γ can be approximated by ξ = ¯aM K, where the average size of a community is denoted by ¯a. Therefore, the size of AF (v) is same as ξ. Dv = maxi AFi(v) denotes the maximum distance of v from any of the base community present in Γ (Step 8). To construct the actual feature vector Fv for vertex v, we measure the probability associated with each base community Ci given that vertex v is observed. For a given vertex v, the community label Ci is assumed to be a random variable from a distribution with probabilities {P (Civ)}ξ i=1. One can provide a non-parametric estimation of such probabilities based on the evidences of the data and the community structure. To transfer the distance into probability (the smaller the distance, the larger the probability), we use the following conditional probability [1] for vertex v to be a part of Ci 11 (Step 11): Dv − AFi(v) + 1 ξ.Dv + ξ −(cid:80)ξ P (Civ) = k=1 AFk(v) The denominator of the above equation ensures that (cid:80)ξ (1) i=1 P (Civ) = 1. Adding 1 in the numerator ensures a non-zero probability for all vertex- community pairs. For smaller distance values, P (Civ) increases proportion- ately to Dv − AFi(v), i.e., the larger the deviation of AFi(v) from Dv, the more the increase. As a consequence, the corresponding community Ci be- comes more likely for v. Now we can construct the actual feature vector Fv for v as Fv = {P (Ckv)}ξ k=1 (Step 12). This process essentially maps a vertex to a ξ-dimensional vector space. 3.3. Objective Function After the ensemble step, each vertex is represented by a feature vec- tor. Our method of detecting the overlapping community structure (denoted by OC = {OC1, OC2,···}) aims at maximizing a certain objective function which represents the likelihood of each vertex being a part of its own commu- nity. The likelihood function assumes that if two vertices u and v are found to have very similar feature vectors, then they -- (i) should be connected by an edge in the network, and (ii) should stay in the same community. These two assumptions are supported by the observations in Figure 1. We use the knowledge of the edges in the network to validate the inferred community structure. To start with, let us define few measures required to formulate the ob- jective function. Note that all the communities mentioned in this subsection correspond to the overlapping communities that we aim to detect from a network. Definition 3. Similarity between two vertices. For vertices u and v, let i=1 and Fv = {F i u}ξ Fu = {F i v}ξ i=1 represent their feature vectors respectively. Then the similarity between two vertices u and v is calculated using the cosine similarity among the feature vectors. SIM(u, v) = Fu.Fv FuFv = 2 (2) (cid:80)ξ (cid:113)(cid:80)ξ i=1 F i 2(cid:113)(cid:80)ξ uF i v i=1 F i u i=1 F i v 12 We also tried other similarity measures (see Section 5.1), and obtained best results with cosine similarity. With this similarity measure, we further define the similarity of a vertex with a community as follows. Definition 4. Similarity between a vertex and a community. Given a community OC and a vertex v, the similarity of v and OC is calculated as the average similarity of v with all other vertices in OC. (cid:80) SIM(cid:48)(OC, v) = u∈OC SIM(u, v) OC (3) Each community is associated with a minimum similarity threshold which every vertex needs to satisfy in order to be a part of the community. Definition 5. Similarity threshold per community. Each community OCj in our model is assigned a similarity threshold τj in such a way that if vertex v ∈ V is in OCj then it should satisfy SIM(cid:48)(OCj, v) ≥ τj. Given OC = {OC1, OC2,···}, an overlapping community structure and a set of thresholds ζ = {τ1, τ2,···}, we then define a membership similar- ity between two vertices based on their membership in different overlapping communities. Definition 6. Membership similarity of pair-wise vertices. The mem- bership similarity of two vertices u and v is defined in terms of their mem- berships in different communities as follows: where, β(u, v) = exp{[β1(u, v)]2 − [β2(u, v)]2} (cid:88) (cid:88) OCj :{u,v}⊆OCj OCj :{u,v}(cid:42)OCj β1(u, v) = β2(u, v) = (SIM(u, v) − τj + λ) −1 (SIM(u, v) − τj + λ) −1 (4) (5) We consider {u, v} ⊆ OCj if both the vertices u and v belong to the same community OCj; whereas {u, v} (cid:42) OCj if OCj does not contain either u or v or both. One should consider λ as large as possible so that individual 13 terms in the summation are always positive. In practice, we set λ as the maximum of all the threshold values corresponding to the communities men- tioned in Definition 5 (i.e., λ = max{τ1, τ2,···}). The value of β1(u, v) (resp. β2(u, v)) tends to become high if both u and v share (resp. do not share) common communities with very high thresholds. Furthermore, the value of membership similarity β(u, v) depends not only on the common community memberships, but also on the threshold specific to the communities. In par- ticular, with the increase of the number of the common communities where both u and v belong to and the community threshold, the value of β(u, v) also increases. Given the membership similarity of all pair-wise vertices, we further define the probability that a pair of vertices u and v are connected by an edge Eu,v as follows: p(Eu,v ∈ E) = β(u, v) 1 + β(u, v) (6) Similarly, the probability of two vertices not being connected is p(Eu,v /∈ E) = 1 − p(Eu,v ∈ E). The value of p(Eu,v ∈ E) increases with the increase in β(u, v), and add-one smoothing is applied to p(Eu,v ∈ E) in order to avoid "divided by zero" situation. One can thus obtain the predicted probability p(Eu,v ∈ E) from the information of the overlapping community structure OC and the set of thresholds ζ. The idea is that, the more the similarity between the feature vectors of two vertices, the common communities both of them are part of and the similarity threshold of the common communities, the more the membership similarity between them. Given the probability estimation, our model should therefore assure that its resultant network corresponds to the real network. Let us assume that each edge is generated independently. Then the joint probability of G and OC is estimated as: Pζ(G; OC) = p(Eu,v /∈ E) (7) (cid:89) Eu,v∈E (cid:89) Eu,v /∈E p(Eu,v ∈ E) 14 The log likelihood of the joint probability is: lζ(G; OC) = log (Pζ(G; OC)) (cid:88) log (p(Eu,v /∈ E)) (cid:88) (cid:88) (cid:88) Eu,v∈E Eu,v∈E = = = Eu,v /∈E log (p(Eu,v ∈ E)) + log (β(u, v)) − (cid:88) φ(u, v) − (cid:88) Eu,v∈V ×V (u,v)∈E Eu,v∈V ×V log(1 + β(u, v)) (8) log(1 + exp{φ(u, v)}) where φ(u, v) = log (β(u, v)) = ([β1(u, v)]2 − [β2(u, v)]2) EnCoD attempts to maximize the objective function mentioned in Equa- tion 8 (see line 31 in Algorithm 1) in order to obtain the final overlapping community structure OC. Function 2: M anipulateComm(Set of vertices: V, Current overlapping community structure at iteration t: OC t) 1 OCt+1 = OCt 2 for each v in V do 3 4 5 6 7 8 9 10 11 12 13 t = {OCj t = {OCj t ∈ OCt ∧ v ∈ OCj t OCj t } S1v t OCj t ∈ OCt ∧ v /∈ OCj t } S2v (cid:109) // Rand(x, y): a random number between x and y p1 ← Rand(1, S2v t ) t (cid:109) ACv S1v t p2 ← Rand(1, S1v t ) t RCv S1v t Choose randomly OCAC such that OCAC ⊆ S2v for each OCj t+1 ←(cid:108) p1+S1v t+1 ←(cid:108) p2+S1v t ∈ OCAC do t+1 ∪ {v} t+1 ← OCj OCj Choose randomly OCRC such that OCRC ⊆ S1v for each OCj t ∈ OCRC do (cid:114) {v} t+1 ← OCj t+1 14 OCj 15 return OCt+1 t , OCAC = ACv t+1 t , OCRC = RCv t+1 3.4. Manipulate Community Structure The framework for manipulating the overlapping community structure in each iteration is shown in Function 2. The function originally starts with the initializations mentioned in lines 7-9 of Algorithm 1. Initially at itera- tion t = 0, each vertex v is assigned to a separate community OC v 0 with a 15 very high threshold value τ v 0 . In every iteration, we change the memberships of v by removing it randomly from certain communities it belongs to, and assigning it to certain communities where it did not belong to. The thresh- old corresponding to each community is updated accordingly such that the constraint in Definition 5 is not violated. For a certain community Cj, if threshold τj falls below a certain lower limit τL, the community is discarded because such a community is too heterogeneous to represent a dense group in our model. The value of τL is empirically determined as described in Sec- tion 5.1. Since we intend to discover the communities of each vertex, in every iteration, we concentrate more on those vertices which are yet assigned to less number of communities, than those vertices which are already assigned to many communities. Therefore, with the increase in the number of com- munities a vertex is already part of after iteration t, it is less likely that the community membership of v is manipulated at iteration t + 1. t , OC 2 t = {OC 1 t OC j t ∈ OC t ∧ v ∈ OC j At each iteration t, the function M anipulateComm takes the set of t ,···}. Then for each vertex v, overlapping communities OC t } indicates the set of communities where t = {OC j S1v t ∧ v /∈ OC j t } v belongs to at iteration t. Similarly, S2v indicates those set of communities where v is currently not a member of. t+1 denote the number of communities to add v to, and RC v t+1 denote the number of communities to remove v from. These variables are measured as follows: t+1 ← (cid:24) p2 + S1v (cid:24) p1 + S1v t = {OC j t OC j t ∈ OC , RC v t+1 ← Now, let AC v (cid:25) t AC v S1v t (cid:25) t S1v t (9) t) such that the value of RC v t+1 to add v to, never exceeds S2v t) such that the number of Here, p1 is a random integer chosen from [1,S2v t, indicating the number communities AC v of v's current communities. Similarly, p2 is an integer randomly chosen from t (number [1,S1v of communities that v is currently part of). Note both the values AC v t+1 and t, ensuring that, the more RC v the number of communities v is currently part of, the less the manipulation of v in the current iteration, and vice versa. t+1 tend to decrease with the increase of S1v t+1 is less than or equal to S1v After selecting the number of communities v is to be added to and to be t randomly t+1 and assign v to OCAC (Step 12). Similarly, we t+1 many communities (indicated by the set OCRC) from removed from, we choose the set of communities OCAC from S2v such that OCAC = AC v randomly choose RC v 16 t and remove v from it (Step 14). The corresponding changed communities S1v are updated accordingly. 3.5. Update Thresholds and Compute Objective Function Once the manipulation of the current overlapping community structure is over (as described above), we obtain a new overlapping community structure OC t+1. The next task is to update the threshold corresponding to the new overlapping community structure (Steps 23-31 in Algorithm 1). For commu- nity OC j t+1 as the minimum value of all the similarities of the OC j t+1 itself, i.e., t+1} (Step 25). This assignment ensures t+1 = min{SIM(cid:48)(OC j t+1, v)v ∈ OC j τ j that Definition 5 is never violated. t+1's constituent vertices with OC j t+1 ∈ OC t+1, we set the new threshold τ j t+1 falls below τL, we discard OC j Apart from the minimum threshold assigned to each community, we also maintain another global threshold τL, which ensures the overall coherence among the members in each community. Once all the community-centric thresholds are updated, we further check whether all these thresholds are higher than τL (Step 26). If some threshold τ j t+1 corresponding to commu- nity OC j t+1 and set each of its constituent members as a separate community (Steps 26 -- 29). The value of τL controls the size of the final overlapping communities -- a higher value of τL results in smaller community size. The selection of the value of τL is described later in Section 5.1. Finally, we compute the log likelihood after the current iteration lζt+1(G; OC using Equation 8 (Step 31) and compare it with lζt(G; OC t) (Step 20). If the former is greater than the latter, we keep the current community structure OC t+1 and the current set of thresholds ζt+1 and continue the iteration. Otherwise, we discard the updated sets and retain the sets obtained in the previous iteration (Step 21). We terminate the process when there is no sufficient increase of the log likelihood. Note that this step is not shown in Algorithm 1 (which rather shows that the iteration immediately stops once the condition is violated) as it depends on the users' confidence on the num- ber of iterations she wants to continue after the log likelihood condition is violated. In practice, continuing the iterations ensures that the algorithm does not get stuck at any local optima of the objective function. 3.6. Complexity Analysis EnCoD terminates when it reaches a maxima of the objective function and the objective function does not change further. In the worst case, after any t+1) 17 iteration the maximum number of overlapping communities is V and the maximum number of vertices within each community is also V . Therefore, the runtime after each iteration is O(V + OC). Importantly, a manipula- tion of the current community structure is only possible if the log likelihood increases. Therefore, EnCoD generally converges after a finite number of it- erations. In practice, we assume that the local maxima is reached if the log likelihood does not change after V iterations. Note that, since EnCoD is an ensemble algorithm, it requires the running of all base algorithms. However, speedup might be achieved by parallelizing the base algorithms, or by using fewer base algorithms (potentially at the cost of performance, as analyzed later in Section 5). Table 2: Description of the real-world networks (τ : avg. edge-density per com- munity, ¯c: avg. community size, Vc: avg. number of community memberships per vertex). Community type Reference Network Senate Flickr Coauthorship Researcher Youtube LiveJournal Orkut User User User Vertex type Edge type Senate User Similar voting pattern Congress Friendship Collaborations Friendship Friendship Friendship Joined group Publication venues User-defined group User-defined group User-defined group [45] [46] [3] [8] [8] [8] Vc 4.76 18.96 10.45 2.27 3.09 95.93 Network Senate Flickr Coauthorship Youtube LiveJournal Orkut # vertices # edges 1,884 80,513 391,526 1,134,890 3,997,962 3,072,441 16,662 5,899,882 873,775 2,987,624 34,681,189 117,185,083 # communities 110 171 8,493 8,385 310,092 6,288,363 τ 0.65 0.046 0.231 0.732 0.536 0.245 ¯c 81.59 470.83 393.18 43.88 40.02 34.86 4. Experimental Setup In this section, we describe the datasets and the experimental setup used to evaluate the performance of EnCoD. 4.1. Datasets We use two types of network datasets to evaluate various CD algorithms: (1) Synthetic networks: We use the LFR benchmark model [47] to gen- erate synthetic networks along with their ground-truth communities. We 18 follow the parameters configuration suggested in [9] while generating net- works: number of vertices N = 10, 000, average degree ¯k = 50, maximum degree kmax = 150, maximum community size cmax = 150, minimum com- munity size cmin = 50, percentage of overlapping vertices On = 15%, number of communities to which a vertex belongs Om = 20, and mixing parameter µ = 0.3 (representing the ratio of inter- and intra-community edges; the lower the value of µ, the better the communities are). For each configuration, we create 100 such LFR networks and report the average result. (2) Real-world networks: We use six real-world networks of widely different scales, whose ground-truth communities are available a priori (see Table 2). 4.2. Evaluation Metrics To compare the detected overlapping community structure with the ground- truth, we use three standard metrics: (1) Overlapping Normalized Mutual Information (ON M I) [17], (2) Omega (Ω) Index [8], and (3) F-Score [8]. 4.3. Base Disjoint CD Algorithms for Aggregation: There exist numerous disjoint CD algorithms, which differ in the way they define the community structure. Here we select the following disjoint CD algorithms from different categories based on their working principles: (i) Modularity-based approach: FastGreedy [21], Louvain [19] and CNM [20]; (ii) Node similarity-based approach: WalkTrap [23]; (iii) Compression-based approach: InfoMap [22]; (iv) Diffusion-based approach: Label Propagation [25]. EnCoD ensembles the outputs of all these six algorithms and generates the feature vectors for the vertices. 4.4. Baseline Algorithms: We compare EnCoD with the following seven non-ensemble based overlap- ping CD algorithms that cover different types of overlapping CD heuristics: OSLOM [24], EAGLE [48], COPRA [49], SLPA [50], MOSES [51], BIG- CLAM [8] and IEDC [31]. We further compare EnCoD with PVOC [9] and MEDOC [1] which are the most recent algorithms that use disjoint commu- nity structure to detect the overlapping communities. 5. Experimental Results In this section, we discuss how the performance of EnCoD depends on various parameters, and compare its performance with state-of-the-art overlapping 19 Figure 2: Change in accuracy of EnCoD with different values of the algorithmic parameters. We vary µ (the mixing parameter of LFR) from 0.1 to 0.8. In (c) and (d), we vary K and τL respectively and report the accuracy for three different LFR and Senate networks. CD algorithms. We run EnCoD on both synthetic and real-world networks, and compare its performance with that of seven state-of-the-art overlapping CD algorithms. 5.1. Parameter Selection For parameter selection in EnCoD, we perform experiments over LFR networks of widely-varying quality of ground-truth community structures, obtained by varying the mixing parameter µ from 0.1 to 0.8 with the increase of 0.1. • Involvement Function (INV): The following two functions are used to quantify what extent a vertex is involved in a community [1]: (i) Closeness (cid:80) Centrality measures how close vertex v is from other vertices where v is a part of, i.e., u∈C dist(u,v), where dist(u, v) is the shortest distance from u to v; (ii) Permanence [40] measures how permanent is vertex is in its D(v)Emax(v) − (1 − cin(v, G[C])), where own community, i.e., P erm(v, C) = I(v,G[C]) G[C] is the induced subgraph of C, D(v) is the total degree of v, I(v, G[C]) C 20 is the internal degree of v w.r.t. G[C], Emax(v) is the maximum external connections to any one of the external communities of v, and cin(v, G[C]) is the clustering coefficient of v w.r.t. G[C] (see more in [40])4. Figure 2(a) shows that the performance of EnCoD tends to be always superior with INV as permanence. • Similarity between two vertices (SIM): Although in Definition 3, we have mentioned to measure the similarity between the feature vectors of two vertices using cosine similarity, we also measure the similarity with Pearson correlation coefficient between two feature vectors. Cosine similarity turns out to be the better similarity measure than Pearson correlation coefficient (see Figure 2(b)). • Number of iterations (K): We set K as a function of the number of vertices N in the network. The analysis in Figure 2(c) confirms that for most of the networks, especially the ones which possess distinct community structure (such as LFR network with µ = 0.1, Senate), the performance of EnCoD converges at K = 0.2V . We therefore consider this value as default. • Global threshold (τL): τL controls the size of the overlapping communi- ties -- the size changes inversely with the value of τL. We vary τL from 0.05 to 0.50 (in steps of 0.05) and observe that the maximum accuracy is attained at τL = 0.20 for most of the networks (Figure 2(d)). Therefore, unless otherwise stated, we will report the results of EnCoD with the following parameter settings: INV = permanence, SIM = cosine, K = 0.2V and τL = 0.20. 5.2. Comparative Evaluation Here we perform a two-fold evaluation of EnCoD with the baseline algo- rithms. Comparison with state-of-the-art overlapping CD algorithms. We run EnCoD and seven other state-of-the-art overlapping CD algorithms on default LFR network and six real-world networks, and compare the output with the ground-truth community structures in terms of three evaluation metrics. Tables 3, 4, and 5 show the performance of the competing methods in terms of ONMI, Ω Index and F-Score respectively. 4We also checked the performance of the algorithm by simply assigning 1 to the entry of v's feature vector if it belongs to the corresponding community, and 0 otherwise (without measuring its involvement). However, we did not obtain good results. 21 Figure 3: Effect of base CD algorithms: performance of EnCoD after (a) removing base algorithms in isolation, i.e., one at a time, (b) removing base algorithms one after another. When all base algorithms are removed, EnCoD does not work (N.A.). Table 3: Performance (ONMI) of the competing algorithms w.r.t. the ground- truth community structure of LFR and six real-world networks. Algorithm LFR Senate Flickr Coauth Youtube LiveJ Orkut 0.436 0.217 OSLOM 0.504 0.870 COPRA 0.87 0.798 SLPA 0.537 0.783 MOSES 0.714 EAGLE 0.174 0.741 BIGCLAM 0.791 IEDC 0.771 0.587 0.84 0.87 EnCoD 0.798 0.688 0.579 0.512 0.714 0.728 0.732 0.84 0.410 0.393 0.639 0.369 0.492 0.705 0.384 0.82 0.429 0.413 0.607 0.388 0.712 0.701 0.356 0.81 ONMI 0.546 0.624 0.585 0.391 0.195 0.654 0.398 0.78 0.158 0.197 0.276 0.395 0.158 0.678 0.453 0.79 Overall, EnCoD shows the best performance, followed by BIGCLAM. The absolute average ONMI of EnCoD for all the networks taken together is 0.82, which is 14.08% higher than BIGCLAM (0.71). The absolute average values of Ω index and F-Score for EnCoD are 0.80 and 0.80 respectively. 5.3. Effect of Base Algorithms One can anticipate some noise in the ensemble process due to those base CD algorithms which are generally weak in detecting accurate communities. Therefore we test which base algorithm has the most effect on the final output of EnCoD. To this end, we first consider all base algorithms together and measure the performance of EnCoD. Subsequently, we remove each base 22 Table 4: Performance (Ω Index) of the competing algorithms w.r.t. the ground- truth community structure of LFR and six real-world networks. Ω Index Algorithm LFR Senate Flickr Coauth Youtube LiveJ Orkut 0.563 0.735 OSLOM 0.717 0.472 COPRA 0.82 0.577 SLPA 0.525 0.563 MOSES 0.666 EAGLE 0.787 0.701 BIGCLAM 0.735 0.613 0.765 IEDC 0.84 0.82 EnCoD 0.656 0.656 0.82 0.765 0.765 0.765 0.743 0.82 0.395 0.641 0.79 0.592 0.543 0.706 0.452 0.79 0.592 0.592 0.592 0.691 0.543 0.657 0.435 0.79 0.10 0.15 0.15 0.25 0.20 0.667 0.565 0.75 0.415 0.674 0.83 0.622 0.570 0.708 0.421 0.83 Table 5: Performance (F-Score) of the competing algorithms w.r.t. the ground- truth community structure of LFR and six real-world networks. F-Score Algorithm LFR Senate Flickr Coauth Youtube LiveJ Orkut 0.112 OSLOM 0.506 COPRA 0.562 SLPA 0.562 MOSES EAGLE 0.112 BIGCLAM 0.731 IEDC 0.821 0.90 EnCoD 0.387 0.72 0.886 0.498 0.498 0.626 0.598 0.72 0.48 0.48 0.64 0.48 0.426 0.707 0.667 0.80 0.25 0.55 0.35 0.35 0.45 0.720 0.489 0.80 0.259 0.570 0.311 0.415 0.466 0.754 0.549 0.83 0.579 0.526 0.316 0.474 0.474 0.692 0.703 0.79 0.421 0.421 0.632 0.474 0.579 0.718 0.705 0.79 algorithm in isolation (i.e., one at a time) and compare the change in accuracy due to the removal. Figure 3(a) shows that for all the removals, the accuracy decreases significantly. InfoMap (which has been shown to be the best among all the base algorithms [22]) seems to be the one for which the accuracy of EnCoD deteriorates significantly. But Label Propagation and WalkTrap seem to have less effect on the performance of EnCoD. In another experiment, we remove the base algorithms one after another (not in isolation), and report the performance of EnCoD in Figure 3(b). Even with only the two 'weakest' base CD algorithms (WalkTrap and Label Prop- agation), EnCoD achieves more than 80% of its performance when all six base algorithms are used. In general, these results indicate that combining results from all sorts of (strong or weak) base CD algorithms is important to enhance the final per- formance of the ensemble method. Importantly, using more base algorithms 23 Table 6: Comparison of EnCoD with PVOC and MEDOC on different networks. Network LFR Senate Flickr Coauthorship Youtube LiveJournal Orkut PVOC MEDOC EnCoD F-Score Ω Index ONMI F-Score Ω Index ONMI F-Score Ω Index ONMI 0.75 0.69 0.62 0.64 0.63 0.74 0.69 0.78 0.73 0.65 0.68 0.63 0.72 0.72 0.79 0.71 0.67 0.69 0.67 0.71 0.75 0.80 0.78 0.70 0.74 0.70 0.80 0.79 0.78 0.80 0.73 0.71 0.66 0.76 0.81 0.82 0.76 0.71 0.70 0.64 0.78 0.80 0.90 0.79 0.72 0.80 0.80 0.83 0.79 0.84 0.82 0.75 0.79 0.83 0.79 0.82 0.87 0.84 0.79 0.78 0.82 0.81 0.84 never decreases the performance of the ensemble method. Comparison with PVOC and MEDOC. As mentioned earlier, EnCoD is the fourth algorithm after PEACOCK [16], PVOC [9] and MEDOC [1] which use disjoint community structure to detect the overlapping communities5. PVOC has been proved to outperform PEACOCK [9]; hence we compare EnCoD with PVOC along with MEDOC and present the results in Table 6. For all the networks, EnCoD performs significantly better than both PVOC and MEDOC. The performance of EnCoD (PVOC, MEDOC) averaged over all the datasets is as follows -- ONMI: 0.82 (0.74, 0.75), Ω Index: 0.81 (0.75, 0.70), F-Score: 0.80 (0.68, 0.76). The superior performance of EnCoD over PVOC and MEDOC is poten- tially due to the following reason. In a sense, the final performance of both PVOC and MEDOC depends upon the performance of a single CD algo- rithm. PVOC brings in the overlapping property as a post-processing step after finding a single disjoint community structure, and hence the quality of the overlapping community structure is dependent upon that of the dis- joint community structure found initially. MEDOC uses a CD algorithm to partition the multi-partite network that is created using the base disjoint community structures; hence the quality of the final overlapping commu- nity structure depends on the performance of the CD algorithm used over the multi-partite network. On the other hand, EnCoD obtains the features of vertices from the disjoint community structures given by several disjoint CD algorithms, and uses these features in an optimization setting. Thus the performance of EnCoD does not depend upon that of any one CD algorithm, and it can effectively learn from multiple disjoint community structures. 5Recall that MEDOC is an ensemble algorithm that uses multiple disjoint community structures, whereas PEACOCK and PVOC apply a post-processing on a single disjoint community structure to detect overlapping regions 24 6. Community Detection with Vertex Features In Section 3, one could notice that the solutions of the base algorithms are used to derive only the feature vector of each vertex. This approach is useful for most real networks, where additional information about the vertices is unavailable or difficult to obtain [8]. However, we hypothesize that if vertex- centric features are available along with the network structure, our algorithm can equally be effective to adopt these features. In this case, one needs to replace the ensemble-based features with the real features associated with each vertex (i.e., Step 3 in Algorithm 1 is not required in this case). To show the generic adaptation of EnCoD for overlapping community de- tection on networks where vertex-features are available, we set the following experimental framework. We acquire a coauthorship network6 of Computer Science domains, used in [4], where vertices are authors and edges repre- sent collaborations, with at least one paper written by the adjacent authors. There are 24 research areas (such as Algorithms, Data Mining, etc.), and each paper is annotated with one or more research areas. The (overlapping) ground-truth communities are marked by the publication venues (confer- ences/journals). The network contains 103, 677 vertices, 352, 183 edges and 1, 705 communities. To obtain vertex features, we assign each author a with a feature vector Fa of size 24 where Fa(i) denotes the fraction of papers published by a in the ith research area. We run all seven competing algorithms (see Section 4) along with modified non-ensemble based EnCoD (we call it MEnCoD) and detect the underlying community structure. We further consider SPAEM [2], a joint probabilistic model to detect communities by combining node attributes and topological structure, as another baseline. Table 7 shows the performance of all the competing algorithms along with EnCoD and MEnCoD. We observe that MEnCoD is superior to all other competing algorithms (followed by EnCoD). 7. Conclusion We proposed EnCoD, the second ensemble algorithm for overlapping com- munity detection by leveraging the outputs of many disjoint CD algorithms. We examined the dependencies of our algorithm on different parameters. We showed that EnCoD significantly outperforms several standard overlapping 6This network is different from the one mentioned in Table 2. 25 Table 7: Performance of the competing algorithms on coauthorship network with vertex feature (O=OSLOM, C=COPRA, S=SLPA, M=MOSES, E=EAGLE, B=BIGCLAM, I=IEDC, PV = PVOC, ME=MEDOC, SP = SPAEM). F-Sc Ω ONMI O 0.78 0.76 0.80 C 0.76 0.80 0.81 S 0.81 0.83 0.83 M 0.78 0.78 0.81 E 0.75 0.78 0.75 B 0.79 0.76 0.79 I 0.73 0.76 0.80 PV ME 0.76 0.74 0.74 0.73 0.76 0.79 SP EnCoD 0.83 0.80 0.86 0.84 0.81 0.86 MEnCoD 0.84 0.87 0.88 CD algorithms, and can be used for detecting the overlapping community structure of networks whose vertices are associated with features. There is still a lack of proper theoretical explanations to justify the su- periority of network-based ensemble approaches. Also, since all base CD algorithms are not equally important in terms of community assignment for vertices (as observed in Section 5.3), it might be possible to retain only the most important base CD algorithms through a correlation study or a machine learning-based approach. This could also potentially reduce the runtime cost of the algorithm. We plan to explore this possibility in future. Acknowledgement The authors thank the anonymous reviewers and the editor for their con- structive suggestions that helped to improve the paper. The first author would like to acknowledge the support of Ramanujan Faculty Fellowhsip and the Infosys Center for Artificial Intelligence, IIIT Delhi, India. References [1] T. Chakraborty, N. Park, V. S. Subrahmanian, Ensemble-based algo- rithms to detect disjoint and overlapping communities in networks, in: ASONAM, San Fransisco, USA, 2016, pp. 73 -- 80. [2] F. Zhang, Community detection based on links and node features in social networks, in: MMM, Sydney,NSW, Australia, 2015, pp. 418 -- 429. [3] G. Palla, I. J. Farkas, P. Pollner, I. Der´enyi, T. Vicsek, Fundamental statistical features and self-similar properties of tagged networks, New J. Phys. 10 (12) (2008) 123026. [4] T. Chakraborty, S. Sikdar, V. Tammana, N. Ganguly, A. Mukherjee, Computer science fields as ground-truth communities: their impact, rise and fall, in: ASONAM, ACM, Niagara, Canada, 2013, pp. 426 -- 433. 26 [5] S. Fortunato, Community detection in graphs, Physics Reports 486 (3-5) (2010) 75 -- 174. [6] J. Xie, S. Kelley, B. K. Szymanski, Overlapping community detection in networks: The state-of-the-art and comparative study, ACM Comput. Surv. 45 (4) (2013) 43:1 -- 43:35. [7] G. Palla, I. Derenyi, I. Farkas, T. Vicsek, Uncovering the overlapping community structure of complex networks in nature and society, Nature 435 (7043) (2005) 814 -- 818. [8] J. Yang, J. Leskovec, Overlapping community detection at scale: A nonnegative matrix factorization approach, in: WSDM, Rome, Italy, 2013, pp. 587 -- 596. [9] T. Chakraborty, Leveraging disjoint communities for detecting overlap- ping community structure, J. Stat. Mech 2015 (5) (2015) P05017. [10] J. Dahlin, P. Svenson, Ensemble approaches for improving community detection methods, CoRR abs/1309.0242 (2013). [11] A. Lancichinetti, S. Fortunato, Consensus clustering in complex net- works, Nature Scientific Reports (2) (2012). [12] R. Xu, D. Wunsch, II, Survey of clustering algorithms, Trans. Neur. Netw. 16 (3) (2005) 645 -- 678. [13] T. Chakraborty, Z. Cui, N. Park, Metadata vs. ground-truth: A myth behind the evolution of community detection methods, in: Companion Proceedings of the The Web Conference, 2018, pp. 45 -- 46. [14] Z. Li, Y. Yang, J. Liu, X. Zhou, H. Lu, Unsupervised feature selection using nonnegative spectral analysis, in: AAAI, 2012, pp. 1026 -- 1032. URL http://dl.acm.org/citation.cfm?id=2900728.2900874 [15] Z. Li, J. Tang, Weakly supervised deep matrix factorization for social image understanding, Trans. Img. Proc. 26 (1) (2017) 276 -- 288. doi: 10.1109/TIP.2016.2624140. URL https://doi.org/10.1109/TIP.2016.2624140 27 [16] S. Gregory, Finding overlapping communities using disjoint community in: Complex Networks: CompleNet, Springer- detection algorithms, Verlag, Berlin, Heidelberg, 2009, pp. 47 -- 61. [17] A. F. McDaid, D. Greene, N. J. Hurley, Normalized mutual infor- mation to evaluate overlapping community finding algorithms, CoRR abs/1110.2515 (2011). [18] T. Chakraborty, A. Dalmia, A. Mukherjee, N. Ganguly, Metrics for community analysis: A survey, ACM Comput. Surv. 50 (4) (2017) 54:1 -- 54:37. doi:10.1145/3091106. URL http://doi.acm.org/10.1145/3091106 [19] V. D. Blondel, J.-L. Guillaume, R. Lambiotte, E. Lefebvre, Fast unfold- ing of communities in large networks, J. Stat. Mech 2008 (10) (2008) P10008. [20] A. Clauset, M. E. J. Newman, , C. Moore, Finding community structure in very large networks, Phys. Rev. E 70 (6) (2004) 066111. [21] M. E. J. Newman, Fast algorithm for detecting community structure in networks, Phys. Rev. E 69 (6) (2004) 066133. [22] M. Rosvall, C. T. Bergstrom, Maps of random walks on complex net- works reveal community structure, PNAS 105 (4) (2008) 1118 -- 1123. [23] P. Pons, M. Latapy, Computing communities in large networks using random walks, J. Graph Algorithms Appl. 10 (2) (2006) 191 -- 218. [24] A. Lancichinetti, F. Radicchi, J. J. Ramasco, S. Fortunato, Finding statistically significant communities in networks, PLoS ONE 6 (4) (2011) e18961. [25] U. N. Raghavan, R. Albert, S. Kumara, Near linear time algorithm to detect community structures in large-scale networks, Phy. Rev. E 76 (3) (2007) 036106. [26] U. N. Raghavan, R. Albert, S. Kumara, Near linear time algorithm to detect community structures in large-scale networks, Phys. Rev. E 76 (2007) 036106. 28 [27] D. Chen, M. Shang, Z. Lv, Y. Fu, Detecting overlapping communities of weighted networks via a local algorithm, Physica A 389 (19) (2010) 4177 -- 4187. [28] F. Havemann, M. Heinz, A. Struck, J. Glser, Identification of overlap- ping communities and their hierarchy by locally calculating community- changing resolution levels, JSTAT 2011 (01) (2011) P01023. [29] J. Baumes, M. K. Goldberg, M. S. Krishnamoorthy, M. Magdon-Ismail, N. Preston, Finding communities by clustering a graph into overlapping subgraphs., in: IADIS AC, 2005, pp. 97 -- 104. [30] F. Ding, Z. Luo, J. Shi, X. Fang, Overlapping community detection by kernel-based fuzzy affinity propagation, in: ISA, 2010, pp. 1 -- 4. [31] M. Hajiabadi, H. Zare, H. Bobarshad, Iedc: An integrated approach for overlapping and non-overlapping community detection, Knowledge- Based Systems 123 (2017) 188 -- 199. [32] W. Zhi-Xiao, L. Ze-chao, D. Xiao-fang, T. Jin-hui, Overlapping commu- nity detection based on node location analysis, Knowledge-Based Sys- tems 105 (2016) 225 -- 235. [33] Y. Li, K. He, K. Kloster, D. Bindel, J. Hopcroft, Local spectral clustering for overlapping community detection, ACM Trans. Knowl. Discov. Data 12 (2) (2018) 17:1 -- 17:27. [34] M. Huang, G. Zou, B. Zhang, Y. Liu, Y. Gu, K. Jiang, Overlapping com- munity detection in heterogeneous social networks via the user model, Information Sciences 432 (2018) 164 -- 184. [35] M. Sattari, K. Zamanifar, A spreading activation-based label propaga- tion algorithm for overlapping community detection in dynamic social networks, Data & Knowledge Engineering 113 (2018) 155 -- 170. [36] U. N. Raghavan, R. Albert, S. Kumara, Near linear time algorithm to detect community structures in large-scale networks, Phys. Rev. E 76 (2007) 036106. [37] M. Ovelgonne, A. Geyer-Schulz, An ensemble learning strategy for graph clustering, in: Graph Partitioning and Graph Clustering, Vol. 588 of Contemporary Mathematics, AMS, 2012, pp. 187 -- 206. 29 [38] R. Kanawati, Yasca: An ensemble-based approach for community de- tection in complex networks, in: COCOON, Springer, Cham, 2014, pp. 657 -- 666. [39] R. Kanawati, Ensemble selection for community detection in complex networks, in: SCSM, Springer, CA, USA, 2015, pp. 138 -- 147. [40] T. Chakraborty, S. Srinivasan, N. Ganguly, A. Mukherjee, S. Bhowmick, On the permanence of vertices in network communities, in: SIGKDD, New York, USA, 2014, pp. 1396 -- 1405. [41] P. Agarwal, R. Verma, A. Agarwal, T. Chakraborty, Dyperm: Maxi- mizing permanence for dynamic community detection, in: Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, PAKDD 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part I, 2018, pp. 437 -- 449. [42] T. Chakraborty, S. Srinivasan, N. Ganguly, S. Bhowmick, A. Mukherjee, Constant Communities in Complex Networks, Nature Scientific Reports 3. [43] J. Mcauley, J. Leskovec, Discovering social circles in ego networks, ACM TKDD 8 (1) (2014) 4:1 -- 4:28. [44] T. Chakraborty, S. Patranabis, P. Goyal, A. Mukherjee, On the forma- tion of circles in co-authorship networks, in: SIGKDD, Sydney, NSW, Australia, 2015, pp. 109 -- 118. [45] L. G. S. Jeub, P. Balachandran, M. A. Porter, P. J. Mucha, M. W. Mahoney, Think locally, act locally: Detection of small, medium-sized, and large communities in large networks, Phys. Rev. E 91 (2015) 012821. [46] X. Wang, L. Tang, H. Liu, L. Wang, Learning with multi-resolution overlapping communities, Knowl. Inf. Syst. 36 (2) (2013) 517 -- 535. [47] A. Lancichinetti, S. Fortunato, Benchmarks for testing community de- tection algorithms on directed and weighted graphs with overlapping communities, Phy. Rev. E 80 (2009) 016118. [48] K. C. H. Shen, X. Cheng, M. B. Hu, Detect overlapping and hierarchical community structure in networks, Physica A 388 (8) (2009) 1706 -- 1712. 30 [49] S. Gregory, Finding overlapping communities in networks by label prop- agation, New J. Phys. 12 (10) (2010) 103018. [50] J. Xie, B. K. Szymanski, Towards linear time overlapping community detection in social networks, in: PAKDD, Malaysia, 2012, pp. 25 -- 36. [51] A. McDaid, N. Hurley, Detecting highly overlapping communities with model-based overlapping seed expansion, in: ASONAM, Odense, Den- mark, 2010, pp. 112 -- 119. 31
1709.04015
1
1709
2017-09-12T18:48:16
Network Clocks: Detecting the Temporal Scale of Information Diffusion
[ "cs.SI", "cs.DS" ]
Information diffusion models typically assume a discrete timeline in which an information token spreads in the network. Since users in real-world networks vary significantly in their intensity and periods of activity, our objective in this work is to answer: How to determine a temporal scale that best agrees with the observed information propagation within a network? A key limitation of existing approaches is that they aggregate the timeline into fixed-size windows, which may not fit all network nodes' activity periods. We propose the notion of a heterogeneous network clock: a mapping of events to discrete timestamps that best explains their occurrence according to a given cascade propagation model. We focus on the widely-adopted independent cascade (IC) model and formalize the optimal clock as the one that maximizes the likelihood of all observed cascades. The single optimal clock (OC) problem can be solved exactly in polynomial time. However, we prove that learning multiple optimal clocks(kOC), corresponding to temporal patterns of groups of network nodes, is NP-hard. We propose scalable solutions that run in almost linear time in the total number of cascade activations and discuss approximation guarantees for each variant. Our algorithms and their detected clocks enable improved cascade size classification (up to 8 percent F1 lift) and improved missing cascade data inference (0.15 better recall). We also demonstrate that the network clocks exhibit consistency within the type of content diffusing in the network and are robust with respect to the propagation probability parameters of the IC model.
cs.SI
cs
Network Clocks: Detecting the Temporal Scale of Information Diffusion Daniel J. DiTursi∗† Gregorios A. Katsios∗ Petko Bogdanov∗ ∗Department of Computer Science State University of New York at Albany Albany, NY 12222 †Department of Computer Science Siena College Loudonville, NY 12211 7 1 0 2 p e S 2 1 ] I S . s c [ 1 v 5 1 0 4 0 . 9 0 7 1 : v i X r a Abstract-Information diffusion models typically assume a discrete timeline in which an information token spreads in the network. Since users in real-world networks vary significantly in their intensity and periods of activity, our objective in this work is to answer: How to determine a temporal scale that best agrees with the observed information propagation within a network? A key limitation of existing approaches is that they aggregate the timeline into fixed-size windows, which may not fit all network nodes' activity periods. We propose the notion of a heterogeneous network clock: a mapping of events to discrete timestamps that best explains their occurrence according to a given cascade propagation model. We focus on the widely-adopted independent cascade (IC) model and formalize the optimal clock as the one that maximizes the likelihood of all observed cascades. The single optimal clock (OC) problem can be solved exactly in polynomial time. However, we prove that learning multiple optimal clocks (kOC), corresponding to temporal patterns of groups of network nodes, is NP-hard. We propose scalable solutions that run in almost linear time in the total number of cascade activations and discuss approximation guarantees for each variant. Our algorithms and their detected clocks enable improved cascade size classification (up to 8% F1 lift) and improved missing cascade data inference (0.15 better recall). We also demonstrate that the network clocks exhibit consistency within the type of content diffusing in the network and are robust with respect to the propagation probability parameters of the IC model. I. INTRODUCTION Models for information propagation in social networks assume a discrete timeline over which the information spreads [8, 9]. At the same time, real-world network data is collected at different temporal resolutions e.g. minutes, hours, weeks. Hence, a common step before analyzing real- world data is to define a temporal scale to aggregate events in the network into discrete snapshots. Such aggregations make the implicit assumption that there exists a single temporal resolution that works well for all network nodes and periods of activity. Empirical studies of social network activity, however, demonstrate a wide variance in activity levels across users and across time [13, 18, 19], thus challenging the above assumption. How can we account for heterogeneity in user activity over time when analyzing information propagation data from real-world networks? To address the above problem, we propose the problem of detecting data-driven heterogeneous temporal aggregations for information diffusion under the widely-adopted independent cascade (IC) model [8, 7]. We formalize the problem as finding the temporal aggregation that maximizes the likelihood of 3 4 5 1 0 2 6 X (1) ∆1 = (cid:104)1, 1(cid:105)(cid:104)2, 5(cid:105)(cid:104)6, 6(cid:105) LL(∆1) = −13.9 X (2) ∆2 = (cid:104)1, 2(cid:105)(cid:104)3, 4(cid:105)(cid:104)5, 6(cid:105) LL(∆1) = −16.3 ∆1,2 = (cid:104)1, 1(cid:105)(cid:104)2, 2(cid:105)(cid:104)3, 6(cid:105) LL(∆1,2) = −34.6 1 6 2 2 0 6 0 4 3 5 5 4 3 1 2 Fig. 1. An example network and two cascades X (1) and X (2) with their original measured activation times between 1 and 6. Assuming an independent cascade with spontaneous activation probability pe = 0.001 and a neighbor propagation probability pn = 0.1, the best clock for X (1) is ∆1 with a log-likelihood LL = −13.9 and the best clock for X (2) is ∆2 with LL = −16.3. An optimal clock that maximizes the likelihood of both cascades is ∆1,2, which is suboptimal for the individual cascades. observed cascades according to the IC model. We allow this aggregation to vary across time and across users, driven by the likelihood of observed data. We refer to such an optimal temporal aggregation as a network clock: a discrete timeline with time steps determined by user activity as opposed to regular intervals of "wall-clock" time. The example in Fig. 1 involves a small graph of 7 nodes (left) and two cascades X 1 and X 2 (right), which are observed over the duration of 6 discrete time steps. A cascade is a sequence of activation events with their originally measured times define the original time resolution of observed cascades. On the right, cascades are presented as directed graphs where edges denote the possibility of influence from an activated node to a network neighbor which is activated at a later time (the horizontal position of nodes corresponds to their original time of activation). Using the original time resolution for cascade X 1 will render nodes 5 and 0 being as spontaneous activations, since IC requires that potential influence nodes are activated in the immediately preceding time step. Such view of time will result in a low IC likelihood as activations through the network have typically higher-likelihood. Thus, using the original time resolution as a network clock will poorly capture how nodes influenced each other. Alternatively, the clock ∆1 aggregates the middle 4 time ticks into a single time step, i.e. the activations of nodes 2 and 5 are treated as simultaneous, with the activation of 6 preceding them and that of 0 immediately following. As all activations except the first are now explained by the immedi- ately prior influence of a neighbor, this clock maximizes the likelihood of the observed activations being produced by an IC process. In our running example (Fig. 1), the clocks ∆1 and ∆2 that optimize the two cascades separately are both different from each other and from the clock that maximizes the likelihood of both cascades considered together (∆1,2). Imposing the same overall clock on all users and all cascade instances may be overly restrictive. Different users might engage in the information propagation at different times depending on their interest, overall activity, time zone, etc. In addition, different information, e.g. videos vs. text, may spread at different rates and at different times. Hence, we also consider the problem of finding multiple clocks for a single dataset. Knowledge of the network clocks can improve a variety of applications. Based on past propagation, one can predict likely times of future activity and allocate computational resources to handle the user traffic accordingly. In addition, clocks may enable classification of cascades future sizes [6] and the type of non-text information (e.g. video and photos) without deep content analysis, but instead by relying on similarities to other annotated content. The latter may unlock applications such as automated hash-tagging for improved social media stream access. Given knowledge of community-specific clocks, one can also impute missing activations [20, 14], which in turn can be used for better influence maximization in the face of a deadline (e.g. elections or ticket sales), and the improved quality of simulations of diffusion processes. Our contributions in this work are as follows: 1. We introduce the novel concept of heterogeneous network clocks: optimal temporal aggregations for observed informa- tion diffusion in social media. We show that while the single network clock (OC) problem can be solved polynomially, the multiple network clocks (kOC) problem is NP-hard. 2. We provide an exact solution for OC that, while polyno- mial, is impractical for non-trivial instances. We also propose fast solutions for both OC and kOC, capable of processing instances with millions of nodes and cascade activations. 3. We demonstrate the utility of the network clocks for multiple applications, boosting the performance of existing algorithms for cascade size prediction (increase in F1-measure by 8%) and cascade completion (improving recall by 0.2 or more) in both synthetic and real-world data. II. PROBLEM FORMULATION AND COMPLEXITY A. Preliminaries We denote a static directed network as G(V, E) with nodes V and edges E ⊆ V × V . We refer to individual instances of diffusion processes over time through this network as cascades. Thus, a cascade Xi = {(u, t)} is a set of node- time pairs, each representing the activation of node u at time t, where the set of all observed cascades in a data set is X = {X1, . . . , Xm}. We assume a discrete timeline where 1 and T are the times of the first and last activation events in X, respectively. We also assume that each cascade activates a vertex at most once. Among the multiple models for cascade processes, we focus on the well-studied independent cascade (IC) model initially is that, with respect introduced by Goldenberg et al. [8]. The key intuition behind the model to a given cascade, each node may be in only one of three states: inactive, active, or previously activated. The critical notion in this model is that nodes can only influence neighbors for a single time period after activation. In other words, a node that is activated at time t increases the likelihood that its neighbors activate at time t + 1, but not at t + 2 or any later time. The IC model has two key parameters: the probability pn that a newly activated node activates any network neighbor, and the probability pe that an inactive node "spontaneously" activates due to external factors. Note that the above assumes homogeneous activation probabilities for all nodes and neigh- bor links. Our methods are directly applicable to the non- homogeneous IC setting where probabilities may differ across nodes and edges, but we do not explore that setting here. We assume that pe is much smaller than pn; otherwise the network structure becomes much less important. As suggested by the name of the model, all activation events are presumed to be independent of each other. The set of incoming neighbors of u is denoted by N (u) = {v (v, u) ∈ E}; these are the nodes that can potentially influence u. The set of nodes activated as part of a cascade X at time t is denoted by A(X, t). The activation time of node v within cascade X is denoted as X(v). Finally, the set of newly active neighbors of v at time t are denoted as C(X, v, t) = A(X, t − 1) ∩ N (v), i.e. those are the nodes that can potentially activate v at time t. Given the above definitions, we can quantify the a priori likelihood that node v is part of cascade X at time t as follows: L(v, X, t) = 1, if X(v) < t i.e. v is already in X 1 − (1 − pe)(1 − pn)C(X,v,t), o/w. (1) This likelihood reflects the possibility of a node being activated by at least one contagious neighbor or by sources external to the network. In order to characterize the likelihood of all independent observations, we use the common practice of working with log-likelihoods. Thus, the log-likelihood of node v joining X at time t is LL(X, v, t) = log L(X, v, t). For convenience, we also define the log likelihood of v not joining X at time t as LL(X, v, t) = log 1 − L(X, v, t). We can now quantify the log-likelihood of all observed cascades X and their activation events as: (cid:40) (cid:88) T(cid:88) (cid:0) (cid:88) (cid:88) LL(v, X, t)(cid:1) LL(X) = X∈X t=1 u∈A(X,t) v /∈A(X,t) LL(u, X, t) + (2) Note that the independence assumption across cascades and activation events results in the above sum of log-likelihoods. B. Network clocks and likelihood improvement The independent cascade model assumes discrete time of events and that all nodes are participants in the diffusion process at every time step. Such assumption enforces a uni- form mapping of "wall-clock" time to network events across the entire network, and thus, renders IC models infeasible to interpret information diffusion in real-world networks, which are often not governed by a single clock. For example, consider an online social network user who checks her feed upon waking up, once or twice during lunch break, and several times in the evening. No uniform timeline can explain her activity sessions well - short time steps will make morning activity appear unrelated to posts that came in overnight, while long time steps may lose information about rapid responses that occur in the evening. A heterogeneous division of the timeline, which we term a network clock is needed to accurately explain such activity. A network clock ∆ is a partitioning of T into contiguous segments of the original timeline corresponding to "new" discrete time steps. In effect, the events that occur within each interval of the timeline are considered to be simultaneous. In the example from Fig. 1, the clock ∆1 for cascade X (1) partitions the time into intervals (cid:104)1, 1(cid:105),(cid:104)2, 5(cid:105) and (cid:104)6, 6(cid:105), which renders the activations of nodes 2 and 5 simultaneous. Formally, a network clock ∆ = {δ1, . . . , δf} is a set of adjacent non-overlapping time intervals δi = (cid:104)ts, te(cid:105) that span the original timeline T, i.e. : ts(δi) ≤ te(δi), ts(δi) = te(δi−1) + 1,∀i. The two extreme clocks are the maximum aggregation (i.e. all original timestamps are simultaneous): ∆max = {(cid:104)1, T(cid:105)}, and the minimum aggregation, corresponding to the original timeline: ∆min = {(cid:104)1, 1(cid:105), . . . ,(cid:104)T, T(cid:105)}. The total number of possible clocks is 2T−1, since we can either split or not between any two consecutive points in (cid:104)1, T(cid:105). time t. Given a clock ∆, For a fixed clock ∆, we treat δi as individual consecutive time steps (indexed by i); however, as necessary we also use δ∆(t) to denote the unique interval δ ∈ ∆ containing the original the set of active nodes at period δ is all activations that happened during δ, t=ts(δ) A(X, t); other temporal entities are similarly mapped from the original times t to periods δ. We can now redefine the clock likelihood of an observed activation during interval δi following interval δi−1 as: L(v, X, δi ← δi−1) = denoted A(X, δ) =(cid:83)te(δ) (cid:40) 1, when X(v) < ts(δi) 1 − (1 − pe)(1 − pn)C(X,v,δi), o/w. (3) Note that the set of contagious neighbors of v at time δi are determined by the preceding interval: C(X, v, δi) = N (v) ∩ A(X, δi−1). As a result, different clocks will result in different likelihoods of observed events. We denote the log-likelihood of all events given a clock as LL(X∆), defined analogously to Eq. 2, where the sum over t and selection of active nodes is replaced by a sum over clock intervals. Our goal is to find a clock (if any) that provides a better explanation of observed cascades X than the timeline of ∆max, a default clock that groups all events into a single step. A clock improvement I(X∆) is the increase in likelihood compared to that of the default clock: I(X∆) = LL(X∆) − LL(X∆max). In our example in Fig. 1 the default clock ∆max will render the activation of all nodes spontaneous (i.e. activated from external sources) due to the lack of preceding time steps, and thus, of contagious neighbors. The log-likelihood of cascade X (1) (in red) under the default clock ∆max is L(X (1)∆min) = −23.5, while the same quantity for clock ∆1 is L(X (1)∆1) = −13.9, hence the improvement of ∆1 for cascade X (1) is I(X (1)∆1) = 9.6. Similarly, the improve- ment of the clock ∆1,2 when both cascades are considered simultaneously can be calculated as I({X (1), X (1)}∆1,2) = −34.6 − (−40) = 5.4. C. Optimal network clock problems: OC and kOC We are now ready to define our clock optimization prob- lems: the Optimal clock problem (OC) which seeks to identify a temporal clock that best explains all observed cascades; and the k-Optimal Clock problem (kOC) which maps nodes in the network to one of k ≤ V clocks corresponding to different temporal behaviors of network users. We show that the former can be solved in polynomial time, while the latter is NP-hard. Definition 1. [Optimal clock problem (OC)] Given a net- work G, a set of cascade observations X, and probabilities pe and pn, find the clock ∆∗ = argmax∆ I(X∆). Problem OC asks for the single partition of time that best captures the temporal properties of all observed cascades X given the IC model. The problem is most applicable in cases where either all of the network nodes have similar temporal habits of social network interactions (e.g. 9am-5pm office workers), or when cascades progress in a similar fashion. In such cases it is desirable to detect this shared temporal behavior across the whole network. Unlike a homogeneous clock, the optimal solution of OC will adaptively segment time in order to increase the likelihood of observed data. Thus, periods of bursty activity may be partitioned into more steps, while those of relatively low activity combined into a single step. The number of potential clocks is 2T−1; nevertheless, OC admits a polynomial-time exact solution based on dynamic programming discussed in detail in the following section. The assumption of a single temporal clock shared among all network nodes might be too stringent considering the size, scope and heterogeneity of real-world OSN users. Beyond 9am-5pm office worker activity patterns, we might observe those of high-school or college students, stay-at-home parents or seniors and in addition all these diverse demographics may reside in different time zones, while still participating in the same global OSN. To account for such diverse population of users we also consider a multiple clock version of the problem, where each node "follows" a single clock. One can think of a clock as how the events are temporally perceived from the viewpoint of a node. Instead of imposing the same clock on all nodes, we can model different behav- ioral patterns as multiple clocks that individual nodes follow. (cid:16) max ∆∈D (cid:17) (cid:88) v∈V LL(X(v)∆) − LL(X(v)∆min) Given a set of clocks D = {∆1, ∆2..., ∆k}, we define their improvement as: I(XD) = , (4) where X(v) denotes the activations of node v in all cascades in X. Note that I(XD) can be evaluated in polynomial time if the set of clocks D is predefined by calculating the likelihood of each node v's activations according to each clock. In our example in Fig. 1 clock ∆1,2 is the best single clock when considering both cascades X = {X (1), X (2)}; however, under this clock, the influence from 6 → 5 in X (1) is discounted since 6 is activated in the first interval of ∆1,2, while 5 is activated in its third interval. Similarly, the potential influences from 1 → 3 and 3 → 4 in X (2) are discarded as all of those activations are rendered simultaneous according to ∆1,2. Consider, however, a second alternative clock for these cascades ∆ = (cid:104)1, 3(cid:105)(cid:104)4, 4(cid:105)(cid:104)5, 6(cid:105). The improvement of both clocks will exceed that of ∆1,2 alone, i.e. I(X∆1,2, ∆) > I(X∆1,2), since the likelihoods of the activations of nodes 3 and 4 will increase by being reassigned to ∆, thus considering all of their potential network activations. Definition 2. [k-Optimal clock problem (kOC)] Given a network G, a set of cascade observations X, probabilities pe and pn, and a positive integer k > 0 find the set of clocks D∗ = argmaxD I(XD), s.t. D ≤ k. For values of k = 1 or k ≥ V , kOC can be solved in polynomial time. k = 1 is equivalent to the OC problem and can be solved using dynamic programming as discussed in the next section, and when the budget of clocks exceeds the number of graph nodes, k ≥ V , we can find the single best clock that optimizes the improvement of a given node's activations and then assign this clock to the node. However, for general k < V we show that the problem is NP-hard by a reduction from Graph coloring to a decision version of kOC. Theorem 1. kOC is NP-hard. Proof. We show a reduction from k-Graph Vertex Coloring (kVC) to a decision version of kOC. Given a graph, kVC asks for a mapping of each node to at most k colors such that no two colors are adjacent. Let kOC-B be a decision version of kOC asking if there exist k clocks s.t. I(XD) > B, B > 0. To construct the reduction we will need to show how we obtain an instance kOC from an instance of kVC and also set the values of B and k. Given a kVC instance G(V, E) we create an instance of kOC involving a graph G(cid:48)(V (cid:48), E(cid:48)) with V + 2E nodes, 4E edges and 4E cascades using the gadget in Fig. 2. For every kVC edge (u, v), we create four cascades involving two activations each. The later activations of each of the cascades involve nodes corresponding to the nodes in the kVC instance, while the earlier activations involve unique other nodes. For example, the gadget corresponding to edge (0, 1) in Fig. 2 involves the four cascades spanning times [1−4]. Two cascades "end" with the equivalent node to 0 in kOC: (a01, t1) → (0, t2) and (b01, t3) → (0, t4); and another two with the equivalent ∆1 ∆1 ∆1 ∆2 ∆2 ∆2 ∆2 ∆03 ∆03 ∆03 ∆03 ∆03 2 0 3 b01 4 0 1 1 5 a02 c02 d02 t: 1 a01 c01 d01 C O k C V k 8 0 2 2 2 9 a23 c23 d23 3 6 0 7 b02 0 1 10 2 11 12 13 b23 2 3 3 a12 c12 d12 14 1 15 16 b12 1 2 2 Fig. 2. Gadget used in the reduction from Vertex Coloring (kVC) to kOC. of node 1: (c01, t1) → (1, t4) and (d01, t1) → (1, t4). Note that it is not possible to devise a single clock that renders all 4 latter activations ((0, t2),(0, t4),and the two (1, t4)) of the cascades non-spontaneous, i.e. there is no set of splits in time that will "cut" all 4 cascade activation edges exactly once. Applying this transformation for each kVC edge we obtain an instance of 4E cascades, where a pair of cascades coin- cides in time only if they are within the same gadget. We set the log-likelihood requirement as B = 4E log pn, where we set pe and pn such that log pe < 2E log pn. In other words, we require k clocks that ensure that all latter gadget activations are non-spontaneous. If there exists a kVC solution, one can create a correspond- ing kOC solution by assigning one clock per color ensuring that all activations of the corresponding nodes of that color are non-simultaneous in each gadget. This is possible since nodes of the same color will never appear in the same gadget. Consider, as an example, the set of corresponding 4 clocks for a 4-coloring of the kVC instance in Fig. 2. Alternatively, assume there exists a kOC solution in which every cascade activation edge is cut exactly once by the clock assigned to the later node. Then all activations of a given end-node will be rendered network-induced by at least one clock and we can assign colors in the kVC instance based on this clock assignment ensuring that colors will not be adjacent. III. ALGORITHMS FOR OPTIMAL CLOCK DETECTION Next we present our solutions for OC and kOC. We first demonstrate that an exact solution for OC is possible in polynomial time employing dynamic programming (DP). Its complexity, however, makes it challenging to apply to real-world instances; hence we propose a fast and accurate greedy (GR) alternative. Although kOC is NP-hard, we show that the improvement function is monotonic and submodular with respect to the set of solution clocks, leading to greedy generalizations GRDP and GR2 of our single clock solutions, the former featuring an approximation guarantee. Tbl. I sum- marizes the algorithms and results discussed in this section. A. Single-clock approaches While there are O(2T−1) possible clocks for a timeline of T original steps, we show that we can compute the optimal one by considering O(T 2) intervals and employing dynamic programming. Let S : {δe s = (cid:104)s, e(cid:105)} be the set of all possible Algorithm Problem Complexity Asymptotic Time Guarantee DP GR GRDP GR2 OC OC kOC kOC Poly Poly NP-hard NP-hard O(X4) O(kX4) O(mX log(X)) O(kmX log(X)) TABLE I Exact 1 − 1/e ALGORITHMS, COMPLEXITY AND APPROXIMATION GUARANTEES. sub-intervals of the timeline [1, T ], where 1 ≤ s ≤ e ≤ T denote the start and end of the interval. Note that there is a quadratic number of possible intervals S = T (T + 1)/2. Let also δe← denote the set of all intervals ending at e and starting at a time no later than e. Let the improvement of v in cascade X over interval δe s ← δs−1 s given a preceding interval δs−1 I(v, X, δe be: b  LL(v, X, δe LL(v, X, δe 0 b ) = s ← δs−1 s ← δs−1 b b ) ) − log pe if X(v) > e if X(v) ∈ δe s if X(v) < s, (5) b b b s ← δs−1 ) = N (v) ∩ A(X, δs−1 ) is the interval log-likelihood of where LL(v, X, δe v defined as in Eq. 3 with the set of active neighbors of v s ← δs−1 ). Note that in the C(X, v, δe above definition we subtract the log-likelihood of the default clock ∆min in case the activation of v is within the interval X(v) ∈ δe s to quantify the improvement due to v's activation. s is defined The total improvement of the interval transition δe as the sum of all node improvements in all cascades: s ← δs−1 s ← δs−1 We will denote with I∗(δe X∈X s, X) the best improvement of log- s, over all sequences likelihood up-to and including interval δe of preceding intervals. In other words, I∗(δe s, X) is the optimal clock up to time e, such that the last interval in the clock is s. We can recursively define this quantity as: δe (cid:88) (cid:88) I(v, X, δe , X) = I(δe v∈V (6) ). b b I∗(δe s, X) = max δ∈δs−1← I∗(δ, X) + I(δe s ← δ, X) . (7) (cid:104) (cid:105) The maximum in the definition is taken over the set of all s: δs−1← . Based on the intervals ending immediately before δe above definition, the improvement of the best clock is the maximum over the best improvements of intervals ending at T , i.e. I(X∆∗) = argmaxδ∈δT← I∗(δ, X). This equivalence gives us the blueprint for a dynamic programming (DP) solution that progressively computes the improvement of all T (T + 1)/2 intervals and uses back-tracking to retrieve the optimal clock. Alg. 1 presents the steps of the DP algorithm based on Eq. 7 producing the optimal solution of OC. Steps 1-3 compute the best improvement for the base cases of the recursion, i.e. all intervals staring at t = 1 which do not have preceding intervals. Since no nodes are active before this time, all activations are considered spontaneous, and thus the individual 1 ← ∅, X) are node improvement scores and the cumulative I(δe all zero. The nested loops in Steps 4-9 incrementally compute the best improvement (Step 6) of intervals of increasing starting position and record the preceding interval that leads to the best improvement to be later used by backtracking (Step 1, X) = I(δe 1 ← ∅, X) = 0 // Init. intervals starting at t=1 Algorithm 1 DP Require: Graph G, set of cascades X Ensure: Clock ∆∗ solution to OC 1: for e = 1 . . . T do I∗(δe 2: 3: end for 4: for s = 2 . . . T do 5: 6: 7: 8: 9: end for 10: δT 11: Reconstruct ∆∗ by recursively following bt() starting from bt(δT b ) 12: return ∆∗ I∗(δe bt(δe end for b = argmaxδ∈δT← I∗(δ, X) // Last interval of ∆∗ for e = s . . . T do s , X) = max s ) = δs−1 (cid:2)I∗(δ, X) + I(δe s ← δ, X)(cid:3) is the maximizer in I∗(δe , where δs−1 δ∈δs−1← s , X) b b C = ∅ // Set of independent cut positions for t in increasing activation times of all (u, t(cid:48), X) ∈ X do Algorithm 2 GR Require: Graph G, set of cascades X Ensure: Clock ∆ 1: ∆ = {(cid:104)1, T(cid:105)} 2: Ea = {(u, v, X)(u, v) ∈ E, X(u) < X(v)} // Active edges 3: repeat 4: 5: 6: 7: 8: 9: 10: 11: 12: until C == ∅ 13: return ∆ Add active edges (u, v, X) to Ea(t) s.t. X(v) = t Compute I(Ea(t)) if I(Ea(t)) > 0 then add-or-drop((t, Ea(t)) → C) end if Remove active edges (u, v, X) from Ea(t) s.t. X(u) = t end for if C (cid:54)= ∅ then Add all cuts C to ∆ end if 7). Note that at the time at which interval δe s is considered, the best improvement of all immediately preceding intervals I∗(δs−1← , X) is already available, thus allowing the recursive computation of I∗(δe s, X) in Step 6. Finally, the interval of best improvement is selected among those that end at T and the optimal clock is reconstructed by backtracking from this interval using bt() (Steps 10-11). DP Complexity: Alg. 1 runs in time O(XT 3), where X denotes the number of all activations in all cascades. This is due to the nested loops (Steps 4-9) which consider all O(T 2) intervals and the maximization in line 6 which iterate over s. The complexity O(T ) preceding intervals of the current δe does not depend on the full graph G(V, E), since only nodes participating in the cascades and downstream neighbors need to be considered (the likelihood of non-active nodes without active neighbors can be computed in constant time for any interval). In addition, when there are time steps without acti- vations one can "drop" such intervals in a pre-processing step, effectively letting activations define the original time points. In this case the complexity becomes effectively O(X4). While DP solves OC exactly in polynomial time, its com- plexity is prohibitive for large real-world instances. GR is a top-down greedy approach that scales almost linearly, adding one partition at a time by splitting existing intervals, starting from the default clock ∆max. The greedy aspect is in the selection of the next split based on maximum improvement of the score. The steps of GR are outlined in Alg. 2. It initializes the solution with the default aggregate clock ∆max (Step 1) and computes all active edges Ea within cascades such that the source and destination are active preserving the temporal order (Step 2). It then iteratively tries to add groups of independent cuts C that do not intersect common active edges in Steps 3-12. C is empty at the beginning of each iteration (Step 4). The inner loop (Steps 5-10) is essentially a modified sweep line algorithm in 1D [16], where the segments are defined by active edges in Ea. Going from small to large times t of all activations in X, we first add active edges that "end" at t to Ea(t) (Step 6) and recompute the improvement I(Ea(t)) based on "current" active edges Ea(t) and based on whether they have been already cut by previous sweeps (Step 7). If the improvement at time t exceeds 0, we attempt to add the cut (t, Ea(t)) to the C (Step 8). A cut is added if (i) it does not have shared activations with any other cut in C, or (ii) in the case it does, it is added if its improvement exceeds that of the unique cut it shares active edges with. This logic in add-or- drop()(Step 8) ensures that C maintains the set of independent time cuts of highest improvement at every round of the outer loop. In Step 9 we remove active edges ending at t, since they will not be considered at t + 1. If C is not empty (Step 12) we add all cuts to ∆ and update their active edges to a cut state, which affects the improvement computations on Step 7 in subsequent iterations. Finally, if no new cuts were identified we terminate the loop and return the clock (Steps 12-13). GR complexity: Each sweep requires O(X log(Ea)) time, since we move through the activations and maintain the cur- rently active edges (that enter and exit only) once the structure Ea(t), where the log factor comes from maintaining them in a heap structure that support add (Step 6) and delete (Step 9). Since Ea grows slower than O(X2) the sweeps take O(X log(X)). Generating all Ea in Step 2 might in general be higher than O(X log(X)) for very dense networks, but assuming that the average degree grows as O(log V ) this step will not exceed in complexity a single sweep. The number of sweeps can also reach m = O(X) if we make one cut at a time on every sweep, but such instances will have lots of overlapping active edges in time. The total time is log-linear O(mX log(X)) if we assume that not too many sweeps m are performed. As demonstrated in the evaluation section, GR scales near-linearly to large real-world instances and produces very high-quality solutions (> 90% of optimal). B. Multi-clock approaches Unlike OC, kOC is NP-hard. We propose a greedy GRDP solution and show that it ensures a (1 − 1/e)-approximation. Theorem 2. I(XD) is monotonic and submodular as a function of the set of clocks D. Proof. The monoticity is due to the maximization in the definition of the improvement (Eq. 4): I(D ∪ ∆) ≥ I(D), since in the worst case no node will "select" ∆ rendering the improvement unchanged due to its addition. Given two nested sets of clocks D ⊆ C and ∆ /∈ C, let us consider four surjective (onto) functions from nodes V to clocks: fD, fD∪∆, fC and fC∪∆ mapping any node v I(D ∪ ∆) − I(D) ≥ I(C ∪ ∆) − I(C), to the clock (among the set in the function's subscript) that maximizes the node improvement. The submodularity property holds due to the following three possibilities for any v ∈ V : • fD∪∆(v) (cid:54)= ∆. This implies that fC∪∆(v) (cid:54)= ∆. As a result fD(v) = fD∪∆(v) and fC(v) = fC∪∆(v), and v contributes zero to both sides of the inequality. • fD∪∆(v) = ∆ and fC∪∆(v) (cid:54)= ∆. Then v makes a positive contribution to the LHS and zero contribution to the RHS. • fD∪∆(v) = fC∪∆(v) = ∆. Then v contributes positively to both sides. However, I(v, ∆) ≥ I(v, C) ≥ I(v, D) because fC has access to all of the clocks that fD does; it will not assign v to a lower-scoring clock. Corollary 1. selection of k clocks ensures a (1 − 1/e)-apx. for kOC. [Apx. of GRDP (due to [11])] A greedy To construct a Greedy solution for kOC we need to be able to find the best next clock ∆ to add to an existing solution of selected clocks D. Let fD(v) be a surjective function mapping every node to the clock ∆ ∈ D that maximizes the improvement due to v in all cascades I(v, X∆). Generalize the improvement of a node given previous clocks D as: I(v, X, δe s ← δs−1 D) = max{0, I(v, X, δe b b s ← δs−1 b b ) − I(v, XfD(v))}, s ← δs−1 (8) where I(v, XfD(v)) is the improvement due to v's activation as part of cascade X in the best clock that v is mapped to in the solutions so far fD(v). We can similarly generalize the definitions in Eqs. 6, 7 to account for already selected clocks s ← δs−1 , XD) obtaining the total interval improvement I(δe s, XD) by using and the optimal interval improvement I∗(δe D) in the corresponding definitions. Based I(v, X, δe on the above, we generalize DP (fD(v)) to return the clock of best improvement given a selected clocks set D by passing an additional parameter fD(v) and replacing all improvement functions in DP (Steps 2,6,7,10) with the corresponding im- provements given D. The overall GRDP algorithm starts with an empty set of clocks and incrementally adds the next best clock returned by DP (fD(v)). GRDP selects the best next clock greedily and is, thus, guaranteed to return a solution of at least (1 − 1/e)OP T due to Corr. 1. It, however, has a complexity O(kX4).As a fast alternative, we also extend GR (Alg. 2) to obtain a double- greedy GR2 scheme. It also calls incrementally a version of GR (fD(v)) with the additional parameter that allows for improvement evaluation, conditional on the best node scores from previously selected clocks D in (Step 7) of Alg. 1. The complexity of GR2 is O(kX2) in the worst case. IV. EXPERIMENTAL EVALUATION We evaluate the scalability and quality of our methods for optimal clock detection and demonstrate their utility for several applications in both synthetic and real world data. All experiments are performed on a single core conventional PC architecture and implemented in Java (single-threaded). Evaluation datasets are summarized in Tbl. II. Our Twitter dataset includes propagation of URLs over two months within X (cid:80) X minX Duration V 1000 ¯E 2200 Synthetic 5000 Twitter [13] 3331 1.2m 7685 Flickr-s [4] 4.2m 278 66k Flickr-b [4] 127k 8.4m 3176 185k 117k 200k 1m 30 5 500 200 N/A 3/12-4/12 9/04-3/09 9/04-3/09 TABLE II DATASETS USED FOR EVALUATION. (a) Clocks Twitter (conservative news) ∆ 163 739 193 V %I 83 1038 226 16 1 8 ∆0: ∆1: ∆2: (b) Clock statistics Fig. 3. Example of a kOC solution in Twitter for 500 conservative media cascades obtained by GR2. (a): Interval separators over the period 03/12- 04/12 for the first three clocks: ∆0, ∆1, ∆2. (b): Statistics of the clocks, their mapping to nodes and % improvement towards the final solution. a snowball subnetwork of the Twitter follower graph including 3.3k users [13]. We expand shortened URLs from tweet mes- sages and focus on domains of popular news and commentary websites (e.g. foxnews, breitbart, thehill) as well as photo and video domains, e.g. youtube, instagram, etc. Unique URLs tweeted by at least 5 nodes form individual cascades resulting in 7.6k cascades and 117k total activations. We also employ anonymized data from Flickr including friendship links and favourite photo markings from [4]. We treat each photo as a cascade over the friendship graph initiated by the owner of the photo (first activation) while subsequent users marking the photo as a favorite comprise the rest of the activation events within the photo cascade. We create two datasets for evaluation: all cascades of sizes exceeding 500 (Flikr-s) and all cascades of sizes exceeding 200 (Flikr-b). We also scale-free structured synthetic networks of at least 1000 nodes and sample IC cascades (pn = 0.1, pe = 0.001). To simulate the temporal heterogeneity of real-world activa- tions, we randomly stretch each original time step to multiple time steps and distribute its activations uniformly in the resulting time steps. This ensures that the relative order of non-simultaneous activations is conserved. A. Clock discovery: scalability, quality and stability We first evaluate our solutions and discuss obtained clocks in real and synthetic data and than move on to several applications. The clocks obtained by applying GR2 (k = 3) to the Twitter network are presented in Fig. 3. The very first clock ∆0 exhibits a relatively more regular partitioning of the timeline compared to the following clocks (Fig. 3(a)). Intuitively, it captures the best overall time partitioning that best explains all underlying cascades. The following clocks "improve" the resolution for activations of certain nodes in the network. About 25% of the nodes get assigned to the second clock ∆1 and less than a tenth of a percent of the nodes to clock ∆2 (Tbl. 3(b)). Similar diminishing returns are also observed in the percentage of improvement to the overall likelihood contributed by each clock (Col: %I in Tbl. 3(b)). Scalability and quality. We investigate the relative quality of the clocks obtained by GR and various homogeneous aggregations of time compared to the optimal solution ∆opt found with DP for a single clock (OC) in terms of relative likelihood improvement I(∆)/I(∆opt) in Fig. 4(a). GR's improvement consistently exceeds 90% of the optimal. We also plot the results for homogeneous time aggregations of fixed windows of 1 through 10 original time steps. As expected, no homogeneous clock will work as well because activation rates vary with time, requiring a varying data-driven temporal resolution. When the temporal resolution is too high, the cascades are fragmented; while when it is too low, many activations appear spontaneous. Only by allowing the reso- lution to change with time (i.e. OC solutions) do we obtain an effective model of cascade behavior. GR's near-optimal solution quality is critical, since DP algorithm does not scale to large instances, namely its execution time exceeds 1.5h on even modest instance sizes Fig. 4(b). In contrast, GR scales nearly linearly with the number of activations and discovers high-quality clocks in real-world data with as many as one million activations (see Fig. 5(c)). In the multi-clock (kOC) setting, we observe similar trends for GRDP and GR2. While GRDP provides a guarantee of a (1 − 1/e)-approximate solution, its reliance on DP limits its scalability to large instances. As observed in Figs. 4(c),4(d), the quality of GR2's solutions closely match those of GRDP with more than an order of magnitude execution speed-up. We perform similar evaluation on Twitter and Flickr data as well. The quality trends for Flickr-b for a single clock discovery are presented in Fig. 5(a). Ideally one should compare I(∆) to I(∆opt) (found using DP), as we did in Fig. 4(a); however, because these networks are larger, this was impractical for all but the smallest instances. GR's improve- ment score closely matches that of DP up to 200 activations and persistently dominates fixed-width aggregations for larger instances. Similar behaviour in terms of quality is observed for Twitter OC and for both datasets for multiple clock discovery kOC (figures omitted due to space constraints). Fig. 5(c) shows the runtime for GR on our three real-world data sets. Of particular interest is the fact that Twitter, though a much smaller instance, requires greater execution time for an equivalent number of activations than Flickr. This is because running time of GR is affected by the network density and our Twitter network is much denser. Sparser data (e.g. using @mentions instead of follows) would likely allow for much faster execution. While the largest size of Flickr-b requires several hours to extract a clock, it is worth mentioning that it 0101-Mar13-Mar25-Mar06-Apr18-Apr30-Apr2 (a) Quality (b) Time (c) Quality kOC (d) Time kOC Fig. 4. Solution quality and execution time for synthetic data. (a) Comparison against the optimal improvement score I(∆opt) for the clock found by GR and several homogeneous clocks. (b) Comparison of execution time for DP and GR. (c),(d) Solution quality I(∆) and execution time vs number of clocks discovered by GRDP and GR2 on two datasets, one with 300 activations and one with 500 activations. Note that I(∆) increases with more activations, as there are more possiblities for improvement over the baseline clock ∆max. B. Applications of optimal clocks Next we apply detected clocks for improved missing cas- cade data and cascade size and topic prediction. Inferring missing cascade activations. Due to limitations on API usage of OSNs or privacy restrictions, only a partial ob- servation of the diffusion process are typically available [20, 5, 14]. Hence, in order to accurately detect information sources, estimate virality along edges or maximize the influence of campaigns it is important to infer unobserved cascade partici- pants based on the network structure and the partially available cascade information. Zong et al. [20] study this problem in the context of IC and propose approximate algorithms for the NP- hard problem of optimal cascade reconstruction. To illustrate the importance of using an appropriate network clock for this application, we adopt the WPCT algorithm [20] to infer missing activations in both synthetic and real-world data, while comparing the accuracy due to the original and optimal clocks. WPCT attempts to reconstruct a feasible cascade tree based on partial observed activations. A cascade tree is feasible if the distance from a cascade's source to every observed activation is equal to the time of activation (assuming the source is activated at t = 0). To allow for cascades with multiple sources, we use a modified version of WPCT that returns a forest so long as all observed activations are reachable from one of the cascade sources. Because this is an NP-hard problem [20], the algorithm may fail to find such a forest even when one exists. Working with an appropriate timeline, thus become critical for the algorithm and the completion applications overall. The success rate of WPCT in finding a viable forest (measured as the fraction of cascades that obtained feasi- ble trees) is one measure of performance and the quality of predicted missing activation a second one. To test the algorithm, we begin with complete cascades and then hide activations, removing them from the data provided to WPCT. Each activation in a cascade has a fixed probability of being removed independent of all other activations, except that the first and last activation of each cascade are always kept since the algorithm has no chance of discovering them. Considering these hidden activations as true positives and any other non- observed nodes as false positives, we measure precision and recall for obtained solutions. (a) Flickr-b Quality (b) Reg. Clock Quality (c) Time Fig. 5. (a): Likelihood improvement of GR compared to DP and homogeneous clocks (AGGX, MIN) in Flickr. Similar quality trends persist for GR2 versus GRDP in Twitter and using multiple clocks (omitted due to space limitation). (b): Comparison of many different homogeneous clocks to GR using 19k activations on Flickr-s. (c): Execution time for detecting a single clock in all three real datasets. Multiple clock detection (omitted) shows an increase in runtime that is linear in k. processes a million activations in a 8.4m-edge network with effectively 10s of millions of active edges. For kOC, the trends are the similar to those in synthetic data (omitted due to space). Most notably, GR2 remains linear in k, since it performs the same call to DP for each round of clock discovery. Sensitivity to pn and pe. IC' propagation pn and spontaneous activation pe probabilities are the only two parameters for our algorithms. Hence, a natural question is: How stable is the clock w.r.t. these probabilities? In practice pe and pn have minimal impact on the produced clocks for large ranges of their settings. We performed both synthetic and real-world data experiments that systematically vary both parameters, namely pe taking values between 0.001 (i.e. spontaneous activations pn are very unlikely) and 1 (i.e. activations are equally driven by external sources and the network). The clocks detected by our algorithms in synthetic data were identical in all cases where pe < pn; only when the parameters were equal was there a change in the optimal clock. For real-world data, there was more sensitivity with some changes appearing at pe ≥ 0.2pn; however, even in these cases the obtained clocks were largely unchanged. Note that large settings of pe (comparative to pn) attempts to fit to a diffusion process that is predominantly driven by external forces due to the sheer number of nodes, and hence the network structure's effect is minimal. 1006000.00.51.0# of activationsI(D) / I(Dopt)GRMINAGG2AGG5AGG10100600030006000# of activationsTime (s)DPGR07501500kI(D)1234GRDP 300GR2 300GRDP 500GR2 500kTime (s)12340.01110010kGRDP 300GR2 300GRDP 500GR2 500030060090001000200030004000# of activationsI(D)AGG20AGG5MINGRDP0.000.250.50Intv. length / TI(D)030k60k90kGRXTime (s)250k1M101001k10kTwitterFlickr−sFlickr−b (a) Synthetic Success stretch (b) Synthetic F1 stretch (c) Synthetic success (d) Synthetic F1 (e) Twitter success (f) Twitter recall (g) Flickr success (h) Flickr recall Fig. 6. Comparison of solution quality for the cascade completion problem in [20]. M IN are results using the original timings (∆min). GR are results after remapping times according to the clock found by our greedy algorithm. AGG-match are results after remapping times onto a homogenous clock with the same number of intervals as the one found by GR. (a)-(d) show synthetic data; (e)-(h) show real-world data. To generate synthetic data for this experiment, random cascades with at least 30 activations were created on a fixed, scale-free network. To emulate the delays in a real-world net- work, these cascades were then stretched: a random clock with a known average interval length was generated, and then each cascade had its times remapped onto that clock. For example, if the third interval in a clock was (cid:104)5, 8(cid:105), then an activation at t = 3 would be remapped randomly onto a time between 5 and 8, inclusive. The results on synthetic data are shown in Figs.6(a)-6(b). Each figure shows three traces: the result after applying the clock found by GR, the result after applying a homogeneous clock with the same number of intervals as the GR clock (AGG-match), and the baseline (MIN) using the original timeline (∆min). Using the GR clock greatly increases the success rate when cascades have been stretched, which would be the case when the temporal resolution is too high. It also outperforms both alternatives for any rate of hiding activations from the algorithm. The spike in success rate at extremely high hidden-activation rates (Fig. 6(c)) stems from the removal of constraints. To complete a cascade tree, one of simply needs to recover any path from source to the few remaining activations of appropriate length. The prediction of missing nodes (F1 measure), however, decreases for large drop rate due to the large number of possible candidates Fig. 6(d). Essentially, while the recall for such cases is still high, precision decreasses drastically. In real-world data, we only vary the probability of hiding activations. Both networks are quite dense, resulting in huge number of candidates for completion and thus high false positive rates in all cases; hence, we only plot recall instead of F1-measure. The Twitter network is so dense that the homo- geneous clock outperforms GR on the success rate measure (Fig. 6(e); there are so many possible paths that at a matching level of temporal resolution (same number of intervals as in a GR clock, but homogeneous in length), it becomes very likely that a feasible tree can be found. Most of these solutions F1 w/o Clock F1 w Clock Data Twitter Flickr-b m 10 20 30 300 . . . 500 600 700 CASCADE SIZE PREDICTION AIDED BY DETECTED CLOCKS. 0.67 0.66 0.7 0.66 0.62 0.61 TABLE III 0.67 0.71 0.76 0.66 0.69 0.67 #casc. 1280 664 309 1177 . . . 271 173 94 are, however, incorrect, as indicated by the much lower recall rate of AGG-match than that of GR in Fig. 6(f). In Flickr's less-dense network, GR outperforms both alternatives on both metrics (Figs. 6(g)-6(h)). Predicting cascade size based on initial observations is another relevant application we consider. Recently Cheng et al [6] considered multiple features of the m-prefix of observed cascades (the first m activations) to predict the eventual size of cascades.The authors observed that temporal features have highest impact on prediction accuracy [6]. Naturally, precisely these features will be most affected by inappropriate temporal aggregations of the timeline. For example, in cascades initiated late at night, observing a large time-lag to the morning acti- vations might make the cascade prefix appear slow-growing and bias its prediction to limited future growth. Hence, we investigate the potential for improvement of size prediction based on learned network clocks. We employ only the temporal features proposed in [6] and set-up the same prediction problem: given the first m activations, how likely is it that a cascade exceeds size αm, α ≥ 1? We set α such that the considered cascades are balanced between the small (X < αm) and large (X ≥ αm) class. In [6], α was set to 2 as this produced balanced prediction problems, however, the appropriate setting for our datasets is α ≈ 1.5, as our cascade size distributions have a different slant. We compare the F1-measure in cross- validation of the temporal features according to (i) the original times of activation (col. 3 in Tbl. III) and the same according 123450.00.20.40.6Avg. interval lengthSuccess rate123450.000.100.20Avg. interval lengthF1−measure0.20.40.60.80.00.20.4Fraction of hidden activationsSuccess rateGRMINAGG−match0.20.40.60.80.00.20.4Fraction of hidden activationsF1−measure0.10.20.30.40.50.00.20.40.60.8Fraction of hidden activationsSuccess rate0.10.20.30.40.50.000.10Fraction of hidden activationsRecall0.10.20.30.40.50.00.20.40.6Fraction of hidden activationsSuccess rate0.10.20.30.40.50.00.20.40.6Fraction of hidden activationsRecallGRMINAGG−match Comparison Liberal v.s. Conservative Text v.s. Visual #acts. per class minX #casc. ACC 56.2% 57.5% 5301 15132 55 342 30 20 TABLE IV CASCADE TOPIC PREDICTION AS A PROXY FOR CLOCK CONSISTENCY. to the clock obtained by GR (col. 4 in Tbl. III), considering prefixes of increasing size m in Twitter and Flickr. In Twitter the optimal clock enables 7% lift of the F1 measure for m = 20 and 8% for m = 30, and performs on par with the original clock for shorter prefixes. A significant improvement due to the optimal clock in Flickr occurs for prefixes of size 600 and higher. The cascades in Flickr tend to be very large and a big number of the original activations are disconnected in the network and hence do not allow the clock to boost the informativeness of the features. This might be due to many popular photos being featured, thus inducing non-network driven favorite markings. The optimal clock provides a significant prediction improvement (m ≥ 600) and if combined with possible other features (tags,text) it might aide to even better performance for actual prediction. Topical consistency of clocks. Do similar topics and informa- tion types spread similarly in the network? In this application, we are interested to quantify the level of consistency of the optimal clocks for information of the same type. We use clock-based cascade topic prediction quality as a proxy for clock consistency. We prepare two classification tasks listed in Tbl. IV. In the first case we select URLs from liberal (Huffington post and the hill) and conservative (Breitbart and Foxnews) outlets such that the total number of activations match in each class and we predict (using leave-one-out validation) the accuracy of placing a cascade in its own category simply based on the likelihoods of the cascades according to the two clocks detected based on the remainder of the categories. We repeat the same for news URLs (Text) versus Visual content (photo/video). The accuracy in both settings is significantly above random (50% will be random due to the balanced number of activations per class and, thus, similar size clocks). This observation alludes to different content spreading according to different conserved clocks-a direction we plan to pursue in the future after obtaining a larger annotated corpus of simultaneous cascades. Similar evaluation is not possible in Flickr as the data is anonymized. It is also important to note that the clock likelihood is not the best predictor of cascade topic (e.g. content and users profiles would likely yield much higher quality), however, we use this task only as a proxy for clock consistency within topics/content. V. RELATED WORK To the best of our knowledge, we are the first to propose algorithms for model-driven heterogeneous time aggregations of dynamic network data on information cascades. Previously, varying time windows have been proposed by Yang et al [19] to mine progression stages in event sequences; however, this work assumes independent sequences and no network struc- ture involved, while we are interested in network diffusion processes. The effect of homogeneous temporal aggregations of the timeline in dynamic networks is a better-studied [12, 3, 17, 2]. Different fixed window sizes and their effect of the resulting smoothness of time series of network statistics was consisdered in [17, 3]. Significant differences in the structural features of networks formed by aggregating mobile phone call records at different resolutions was observed in [12], and the effect of aggregation window size on predicting changes in the network was studied in [2]. All above problems clearly demonstrate the need to select an optimal aggregation for evolving networks. However, the focus in all of them is on smoothness of global or local network statistics and the proposed approaches select a ho- mogeneous time scale, i.e. each aggregation window is the same length of time. We demonstrate in experiments that such homogeneous aggregations are inadequate for explaining observed information cascades, while our in-homogeneous network clock solutions are superior in terms of likelihood of observed cascades and for several applicatios. Other approaches for cascade completion were also con- sidered [14], as well as the problem of missing data when trying to limit cascades [1]. Providing information about the optimal clock to such algorithms could potentially improve their overall performance similar to the ones we considered. Other applications to which clock data could be applied include influence maximization [10] and estimation of the diffusion probabilities of IC [15]. VI. CONCLUSION We proposed network clocks: heterogeneous partitions of the timeline that best explain observed information propaga- tion cascades in real-world networks with respect to the inde- pendent cascade model (IC). We showed an optimal dynamic programming solution DP for the single optimal clock (OC) problem and a scalable greedy alternative GR that matches (within 10%) DP's quality, but is able to detect clocks in an 8.4-million-edges Flickr network and more than a million activations of nodes within cascades. We demonstrated that the multi-clock problem (kOC) is NP-hard and proposed both a (1 − 1/e)-approximation GRDP and a fast and accurate heuristic GR2. The detected clocks enable improved cascade size classification (up to 8% F1 lift) and improved missing cascade data inference (0.15 better Recall) in Twitter and Flickr, compared to using the original time or fixed-window aggregations of time. REFERENCES [1] C. Budak, D. Agrawal, and A. El Abbadi. Limiting the spread of misinformation in social networks. In ACM WWW, 2011. [2] M. Budka, K. Musial, and K. Juszczyszyn. Predicting the evolution of social networks: optimal time window size for increased accuracy. In Proc. PASSAT SocialCom, pages 21–30. IEEE, 2012. [3] R. S. Caceres, T. Berger-Wolf, and R. Grossman. Temporal scale of processes in dynamic networks. In IEEE ICDM Workshops, 2011. [4] M. Cha, A. Mislove, and K. P. Gummadi. A Measurement-driven Analysis of Information Propagation in the Flickr Social Network. In Proc. WWW, Madrid, Spain, April 2009. [5] Z. Chen, H. Tong, and L. Ying. Full diffusion history reconstruction in networks. In Proc IEEE Big Data, 2015. [6] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec. Can cascades be predicted? In Proceedings of the 23rd international conference on World wide web, pages 925–936. ACM, 2014. [7] J. Goldenberg, B. Libai, and E. Muller. Talk of the network: A complex systems look at the underlying process of word-of-mouth. Marketing letters, 12(3):211–223, 2001. [8] J. Goldenberg, B. Libai, and E. Muller. Using complex systems analysis to advance marketing theory development: Modeling heterogeneity effects on new product growth through stochastic cellular automata. Academy of Marketing Science Review, 2001:1, 2001. [9] M. Granovetter. Threshold models of collective behavior. American journal of sociology, pages 1420–1443, 1978. [10] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximizing the spread of In Proc. ACM SIGKDD, pages influence through a social network. 137–146. ACM, 2003. [11] A. Krause and D. Golovin. Submodular function maximization. In Chap- ter in Tractability: Practical Approaches to Hard Problems. Cambridge University Press, 2012. [12] G. Krings, M. Karsai, S. Bernhardsson, V. D. Blondel, and J. Saramaki. Effects of time window size and placement on the structure of an aggregated communication network. EPJ Data Science, 1(4):1–16, 2012. [13] K. Macropol, P. Bogdanov, A. K. Singh, L. Petzold, and X. Yan. I act, therefore i judge: Network sentiment dynamics based on user activity In Proc. of the 2013 IEEE/ACM Int'l Conf. on Advances in change. Social Networks Analysis and Mining, pages 396–402. ACM, 2013. [14] E. Sadikov, M. Medina, J. Leskovec, and H. Garcia-Molina. Correcting In Proc. of the fourth int'l for missing data in information cascades. conf. on Web search and data mining, pages 55–64. ACM, 2011. [15] K. Saito, R. Nakano, and M. Kimura. Prediction of information diffusion probabilities for independent cascade model. In Knowledge- based intelligent information and engineering systems, pages 67–75. Springer, 2008. [16] M. I. Shamos and D. Hoey. Geometric intersection problems. In Foundations of Computer Science, 1976., 17th Annual Symposium on, pages 208–215. IEEE, 1976. [17] R. Sulo, T. Berger-Wolf, and R. Grossman. Meaningful selection of In Proc. of the Eighth temporal resolution for dynamic networks. Workshop on MLG, pages 127–136. ACM, 2010. [18] A. Tagarelli and R. Interdonato. Time-aware analysis and ranking of lurkers in social networks. Soc. Net. Anal. and Mining, 5(1):46, 2015. [19] J. Yang, J. McAuley, J. Leskovec, P. LePendu, and N. Shah. Finding In Proc. of the progression stages in time-evolving event sequences. 23rd int'l conf. on World Wide Web, pages 783–794. ACM, 2014. [20] B. Zong, Y. Wu, A. K. Singh, and X. Yan. Inferring the underlying structure of information cascades. In Data Mining (ICDM), 2012 IEEE 12th International Conference on, pages 1218–1223. IEEE, 2012.
1506.03847
1
1506
2015-06-11T21:35:25
GMine: A System for Scalable, Interactive Graph Visualization and Mining
[ "cs.SI" ]
Several graph visualization tools exist. However, they are not able to handle large graphs, and/or they do not allow interaction. We are interested on large graphs, with hundreds of thousands of nodes. Such graphs bring two challenges: the first one is that any straightforward interactive manipulation will be prohibitively slow. The second one is sensory overload: even if we could plot and replot the graph quickly, the user would be overwhelmed with the vast volume of information because the screen would be too cluttered as nodes and edges overlap each other. GMine system addresses both these issues, by using summarization and multi-resolution. GMine offers multi-resolution graph exploration by partitioning a given graph into a hierarchy of com-munities-within-communities and storing it into a novel R-tree-like structure which we name G-Tree. GMine offers summarization by implementing an innovative subgraph extraction algorithm and then visualizing its output.
cs.SI
cs
GMine: A System for Scalable, Interactive Graph Visualization and Mining Jose F. Rodrigues Jr.*, Hanghang Tong+, Agma J. M. Traina*, Christos Faloutsos+, Jure Leskovec+ *University of Sao Paulo, Brazil {junio,agma}@icmc.usp.br +Carnegie Mellon University, USA +{htong,christos,jure}@cs.cmu.edu 5 1 0 2 n u J 1 1 ] I S . s c [ 1 v 7 4 8 3 0 . 6 0 5 1 : v i X r a Abstract—Several graph visualization tools exist. However, they are not able to handle large graphs, and/or they do not allow interaction. We are interested on large graphs, with hundreds of thousands of nodes. Such graphs bring two challenges: the first one is that any straightforward interactive manipulation will be prohibitively slow. The second one is sensory overload: even if we could plot and replot the graph quickly, the user would be overwhelmed with the vast volume of information because the screen would be too cluttered as nodes and edges overlap each other. GMine system addresses both these issues, by using summarization and multi-resolution. GMine offers multi- resolution graph exploration by partitioning a given graph into a hierarchy of com-munities-within-communities and storing it into a novel R-tree-like structure which we name G-Tree. GMine offers summarization by implementing an innovative subgraph extraction algorithm and then visualizing its output. I. INTRODUCTION An important support for graph exploration is interactive visualization, which can help to quickly identify the main components of a graph, its outliers, the most important edges and communities of related nodes. Interaction-enabled visual- ization allows to pick detailed and contextualized information on demand, interact with nodes and edges and determine topology aware arrangements for clearer inspection. However, up-to-date applications have produced graphs on the order of hundred thousand nodes and possibly million edges (referenced from here on as large graphs). Large graphs can be found in numerous real-life settings: web graphs (web pages, pointing to others with hypertext links) [3], computer communication graphs (IP addresses sending packets to other IP addresses), recommendation systems [4], who-trusts-whom networks [5], bipartite graphs of web-logs of who visits what page; blogs and similar. At this magnitude, efficient graph vi- sualization becomes prohibitive because of the excessive pro- cessing power requirements that prevent interaction. Besides that, hundred-thousand-node drawings result in unintelligible cluttered images that do not aid the users cognition. To face these challenges we present a system that explores two new ideas to address scalability in large graph visualization. The first idea establishes a hierarchical partitioned arrangement from a graph in order to allow multi-resolution visualization. The second idea utilizes an innovative algorithm to extract a subgraph of interest based on an initial set of target nodes. Our system uses either or both of these ideas to process large graphs bypassing the aforementioned limitations of massive graph drawing. The proposed interface permits to navigate through the levels of a graph hierarchy and also to mine subgraphs information for targeted graph exploration. The remaining of this paper is structured as follows. Section II introduces the DBLP dataset that will be used along this work. Section III describes our multi-resolution visualization idea and section IV illustrates our subgraph extraction algo- rithm. Section V concludes the work. II. DBLP DATASET Throughout this text we employ the DBLP dataset to illus- trate the functionalities of our system. This dataset originates from the Digital Bibliography & Library Project (or DBLP). DBLP is a publicly available database of publication data that embraces authors (also co-authors) from the Computer Science community and their published works. Its content is periodically updated and detailed information from DBLP can be achieved at http://dblp.uni-trier.de/. The version of DBLP dataset that we use defines a graph with n = 315,688 nodes and e = 1,659,853 edges, where each node represents an author of a publication and each edge denotes a co-authoring relationship between two authors. III. GRAPH HIERARCHY CREATION, STRUCTURING AND VISUALIZATION Our first idea to deal with massive graphs is the use of a commu-nities-within-communities structured visualization. In the next sections we overview the steps to come up with such proposal at the same time that we describe its features for visualization and interaction. A. The G-Tree structure For this work, initially we need to recursively and hierar- chically partition a given graph. We adopted the methodology named k-way partitioning (however any partitioning method- ology fits our system). That is, given a graph G = (V,E) with V = n, we want to have k subsets V1,V2, ...,Vk of V , such that Vi ∩Vj = /0 for i (cid:54)= j, Vi = n/k and ∪iVi = V . Also, the partitioning must minimize the number of edges of E whose incident vertices belong to different subsets. This partitioning methodology is implemented by METIS, whose details are found in the work by Karypis and Kumar [2] and in related works. Proceedings of the 32nd international conference on Very Large Data Bases, 2006 Hence, given a graph, we perform a sequence of recursive partitionings to achieve a hierarchy of communities-within- communities. At each recursion, each partition is submitted to a new partitioning cycle that will create another set of parti- tions. This process repeats until we get the desired granularity for the partitions (communities). For each new set of partitions, a new subtree is embedded in an R-tree like structure. At each new level of the tree, the tree nodes (communities) just created will have the formerly partitioned tree node as their parent. We call this structure G-Tree (named after Graph-Tree), which is the data structure that supports our system, illustrated in figure 1. The references for the graph nodes properly said are at the bottom level of the tree. The entire structure is stored in a single file and the nodes are transferred to main memory only when necessary. Fig. 1. together with its graph recursive structuring. G-Tree structure, which we utilize for our visualization system To demonstrate our methodology, we recursively partition DBLP dataset into 5 hierarchy levels each with 5 partitions. The dataset, thus, is broken into 54 + 1, or 626, communities with an average of 500 nodes per community. The commu- nities reflect the connectivity (number of edges) among their members according to METIS partitioning algorithm. B. Visualization and Interaction We propose an innovative interactive presentation for large graphs. For this purpose, our system promotes the navigation across the levels of the tree that represents the hierarchical partitioning of a large graph. As the user interacts with the visualization, the system keeps track of the connectivity among communities of nodes at different levels of the partitioned graph. When the user changes the focus position on the tree structure, the system works on demand to calculate and present contextual information. When we display a graph as communities-within- communities, we have new representations for graph drawing, as illustrated in figure 2. Besides conventional nodes and edges that appear only at the bottom level of the tree (leaf nodes), we also have community nodes, that comprehend a number of sub communities and nodes, and we have connectivity edges, that represent the number of edges between community nodes. These connectivity edges represent the number of edges between nodes from the original graph, but that are in different communities. The storage and management of this information is out of the scope of this demonstration paper. Fig. 2. Conventional nodes and an edge to denote relationship. Leaf com- munity nodes, subgraphs and a connectivity edge to denote how many nodes from the communities have an edge to connect them. Non-leaf community nodes, sub communities and connectivity edges. These features are illustrated in figure 3, which presents a sequence of interactive actions taken by the user when navigating in DBLP dataset. In figure 3(a), it is possible to see DBLP partitioned into 5 communities in its first hierarchy level, and other 5∗5, or 25 communities in its second hierarchy level. At this point, 3 communities are highly connected to every other community and also highly connected among their 5 sub communities. The other 2 first-level communities are relatively isolated from the other 3 and totally isolated among their sub communities. One can conclude that the 3 highly connected communities hold long term active and collaborating authors, while the other 2 hold casual, less productive authors who seldom interact with each other. In figure 3(b) we focus on community s034 and verify that its sub communities are isolated from each other. A deeper focus in community s034 in figure 3(c) shows that among its sub communities (highlighted), only two of these sub communities present an edge. Our system allows to inspect this specific outlier edge to reveal that authors “D. B. Miller” and “R. G. Stockton” define this co-authoring relation for their unique DBLP publication dated from 1989. It is also possible to execute a label query to locate a specific author within the hierarchy, as for example author Jiawei Han in figure 3(d). In figure 3(e) we go to its subgraph community and verify other important nodes surrounding this author. In figure 3(f) we interact with the graph to discover author Ke Wang, which is another very active author who has worked for years with author Jiawei Han. The exploration of communities of nodes instead of all the nodes at a time, the way we are doing, allows the perception of the relationships among communities of nodes. This way it is possible to trace the distribution of edges among communities, their connectivity degree and their scope of connectivity. It is also possible to pick outlier edges for suspicious connections between communities. The user can focus at different communities of nodes according to his/her interest and browse the levels of the hierarchy in order to identify interesting connections or to inspect specific graph nodes. At the user can access a subgraph that is part of the larger graph being analyzed. To do so, the system brings the correspondent graph nodes from disk to memory and draws them inside the region attributed to its parent community (tree node). Then this area of the visualization scene becomes a regular area for graph drawing. the bottom level of the tree, Copyright VLDB Endowment 1196 Proceedings of the 32nd international conference on Very Large Data Bases, 2006 “Tomahawk ” principle, because the chosen nodes remind of a tomahawk ax when shown on G-Tree method, illustrated in figure 4. That is, in order to limit the number of items presented at a time, we make use of G-Tree structure to determine a well-established context every time in response to user interaction. Thus, as the user chooses a community node to focus on, we traverse the tree in order to gather the desired node of interest, its sons and its siblings. Then we plot only these items inside the minimum node that bears this contextualization, see figure 3(b). We argue that the Tomahawk principle can provide a minimum contextualization to the user by presenting nodes above, beneath and by the side of a node of interest. Fig. 4. The Tomahawk principle to help decide what to exhibit according to user interaction. IV. CONNECTION SUBGRAPH EXTRACTION Our second idea to deal with massive graphs is the use of a novel algorithm for connection subgraph extraction. Our algorithm, which is not to be detailed in this demonstration work, aims to maximize what we call “goodness score” of the nodes within a subgraph. To reach this goal, an independent random walk with restart is simulated for each source node, and the goodness score of a node is computed by the steady- meeting probability that the random particles will finally meet each other at the given node. Then, a dynamic programming is used to discover important paths iteratively. The proposed al- gorithm can deal with multi-source queries, while the existing one [1] is restricted to pairwise source queries. A typical scenario to apply connection subgraph extraction is “given an initial set of interesting individuals, find a small number of individuals from a large social network that can best capture the relationship among the individuals of the initial set”. For large graphs, extracting a small (say, with tens of nodes) yet representative connection subgraph brings feasibility to large graph visual exploration. Also, due to the multi-faced nature of many real life relationships, connection subgraphs provide a better way to describe such kind of relationships if compared to single path descriptions. For (limited static) demonstration, a connection subgraph with 30 nodes extracted from the whole DBLP dataset is plotted in figure 5. The initial query set in figure 5 is composed of three authors from the database community: “Philip S. Yu”, “Flip Korn” and “Minos N. Garofalakis”. In figure 5, instead Fig. 3. DBLP dataset navigation. (a) First 5 main communities and its 25 sub communities. (b) Contextualization of community s034. (c) Closer look and complete expansion of community s034. (d) We locate author Jiawei Han. (e) Subgraph community of author Jiawei Han. (f) Interaction with the subgraph reveals co-author Ke Wang as one of the main contributors to Jiawei Han. For this subgraph, besides basic interaction (zoom, pan and details on demand) the user can also ask for the calculation of metrical features corresponding to this subgraph only. Our system supports the following calculations: degree distribution, number of hops, number of weak components, number of strong components and page rank calculation for the nodes. GMine also offers pop up node information, edge expansion and edition of nodes and edges. C. The Tomahawk Principle The presentation of the node communities together with the edges that connect them may cause sensory overload. This is due to the fact that every community can potentially be connected to every other community. This problem is aggravated if the graph has many hierarchy levels exhibited simultaneously when communities are expanded to show their content. To cope with this aspect of our multi-resolution graph visualization, we propose to display a small, but carefully chosen set of communities. We refer to this method as the Copyright VLDB Endowment 1197 Proceedings of the 32nd international conference on Very Large Data Bases, 2006 of a thousand nodes graph, one can concentrate on a subgraph of interest extracted from the original graph. The magnitude of the subgraph is thousand fold smaller than the original dataset and the subgraph being visualized is directly related to the interconnection defined by our initial set of target nodes. On the visualization, if the user moves the mouse over a node, GMine pops up more information about that node - in the example, one can see Prof. H. V. Jagadish data and his edges highlighted. Prof. Jagadish has direct connection with Flip Korn, and 1-step-away connections with Dr. Philip Yu and Dr. Minos Garofalakis. Fig. 6. (a) A 200 nodes subgraph extracted from DBLP dataset. (b) The same graph presented as three partitions. (c) One level down the hierarchy and we have three other communities inside the community highlighted in (b). (d) Zoom in the community highlighted in (c) and another level down the hierarchy. We reach the very nodes of the graph. Fig. 5. Illustration for connection subgraph extraction. In our system, subgraph extraction can be utilized alone or combined to communities-within-communities visualization. Alone, one can extract a subgraph of interest from a given large graph. Combined, (see figure 6), it can be used to generate a subgraph to be hierarchically partitioned for visualization or, alternatively, it can be used to generate a subgraph from an existing graph partition. Figure 6 illustrates the combination of subgraph extraction and com-munities-within-communities visualization. Figure, 6(a) displays a 200 nodes subgraph extracted from the DBLP dataset. In figure 6(b) it possible to see this subgraph parti- tioned into 3 main communities. In figures 6(c) and 6(d) we go deeper into the hierarchy to analyze the connectivity between communities and, finally, the very nodes of the graph. V. CONCLUSIONS We have demonstrated a system that supports the visu- alization of large graphs in an interactive environment. In our tool the user can navigate through the graph structure in a hierarchical fashion, having different perspectives of the graph arrangement, varying from multiple resolution levels to detailed inspection of specific graph nodes. The system also supports an innovative subgraph extraction algorithm that can speed up large graph exploration by concentrating on a targeted subset of the graph. The benefits of our ideas come from its compartmented graph management that promotes scalability while keeping visual comprehension. The scalability is due to the fact that smaller parts of the graph are processed one at a time instead of the whole graph at every cycle. Visual comprehension derives from limited visual data presentation in contrast to cluttered visualizations generated when large graphs are entirely drawn. it is not Due space limitations the GMine possible for functionalities. Therefore, to to show all a better exposition, we have GMine available online at http://www.cs.cmu.edu/junio/GMine, where the software, datasets and videos can be downloaded. For VLDB demonstration session, we plan to let the interested VLDB participants interact directly with the system, possibly checking for their name, their connection-subgraphs with their colleagues, and zooming in and out their corresponding communities. VI. ACKNOWLEDGEMENTS This work has been supported by FAPESP (Sao Paulo State Research Foundation), CNPq (Brazilian National Research Foundation), CAPES (Brazilian Committee for Graduate Stud- ies), National Science Foundation, (PITA) Pennsylvania Infras- tructure Technology Alliance and donations from Intel, NTT and Hewlett-Packard. Any opinions, findings and conclusions or recommendations expressed here are those of the author(s) and do not necessarily reflect the views of the funding parties. REFERENCES [1] C. Faloutsos, K. S. McCurley, and A. Tomkins. Fast discovery of connection subgraphs. In KDD, pages 118–127, 2004. [2] George Karypis and Vipin Kumar. Multilevel graph partitioning schemes. In IEEE/ACM International Conference on Parallel Processing, pages 113–122, Oconomowoc, Wisconsin, USA, August 1995. [3] S. R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Trawling the web for emerging cyber-communities. Computer Networks, 31(11- 16):1481–1493, 1999. [4] J. Leskovec, A. Singh, and J. Kleinberg. Patterns of influence in a In PAKDD, volume 3918, pages 380–389. recommendation network. Springer-Verlag, 2006. [5] R. Matthew, R. Agrawal, and P. Domingos. Trust management for the semantic web. In 2nd ISWC, pages 351–368, 2003. Copyright VLDB Endowment 1198
1608.08331
1
1608
2016-08-30T05:20:41
Analysis of Home Location Estimation with Iteration on Twitter Following Relationship
[ "cs.SI" ]
User's home locations are used by numerous social media applications, such as social media analysis. However, since the user's home location is not generally open to the public, many researchers have been attempting to develop a more accurate home location estimation. A social network that expresses relationships between users is used to estimate the users' home locations. The network-based home location estimation method with iteration, which propagates the estimated locations, is used to estimate more users' home locations. In this study, we analyze the function of network-based home location estimation with iteration while using the social network based on following relationships on Twitter. The results indicate that the function that selects the most frequent location among the friends' location has the best accuracy. Our analysis also shows that the 88% of users, who are in the social network based on following relationships, has at least one correct home location within one-hop (friends and friends of friends). According to this characteristic of the social network, we indicate that twice is sufficient for iteration.
cs.SI
cs
Analysis of Home Location Estimation with Iteration on Twitter Following Relationship Shiori Hironaka Mitsuo Yoshida Kyoji Umemura Department of Computer Science and Engeneering, Toyohashi University of Technology, Toyohashi, Aichi, Japan [email protected], [email protected], [email protected] 6 1 0 2 g u A 0 3 ] I S . s c [ 1 v 1 3 3 8 0 . 8 0 6 1 : v i X r a Abstract -- User's home locations are used by numerous social media applications, such as social media analysis. However, since the user's home location is not generally open to the public, many researchers have been attempting to develop a more accurate home location estimation. A social network that expresses relationships between users is used to estimate the users' home locations. The network-based home location esti- mation method with iteration, which propagates the estimated locations, is used to estimate more users' home locations. In this study, we analyze the function of network-based home location estimation with iteration while using the social network based on following relationships on Twitter. The results indicate that the function that selects the most frequent location among the friends' location has the best accuracy. Our analysis also shows that the 88% of users, who are in the social network based on following relationships, has at least one correct home location within one-hop (friends and friends of friends). According to this characteristic of the social network, we indicate that twice is sufficient for iteration. Keywords -- network-based home location estimation; label propagation; Twitter I. INTRODUCTION Social media provides content with user data, and user data is used to analyze the content of social media. Based on this feature, the user's attributes are used for social media analysis and numerous applications. There are various user attributes such as gender, hobbies, and the user's home location. Among the various user attributes, this study focuses on the user's home location. However, since the user's home location is not generally open to the public, many researchers have been attempting to develop a more accurate home location estimation. There are three ways of location estimation mainly: the the network-based content-based method (e.g., method [3], and the hybrid method (e.g., [4]) that is based on both of content and network. The network-based method has an advantage that does not depend on languages. In this study, we focus on the network-based home location estimation. [2]), [1], The network-based home location estimation is a method that can estimate a user's home location by using a social network that expresses relationships between users. The first approach for network-based location estimation is using the home locations of friends [5], [6], [7]. The next approach is to estimate more home locations by using home location 978 -- 1 -- 5090 -- 1636 -- 5/16/$31.00 c(cid:13) 2016 IEEE estimation with iteration [8], [9], in order to improve the esti- mation coverage using the first approach. The social network is generally created from the following relationships on Twitter1 (follow-follower relationship) between users. However, we need to know the performance of network-based home location estimation with iteration using the social network based on following relationship. In this study, we analyze the function of network-based home location estimation with iteration while using the social network based on following relationships on Twitter. Accord- ing to the characteristic of a social network on Twitter, twice is described as a sufficient iteration count in the social network based on the following relationships. II. SPATIAL LABEL PROPAGATION In the network-based location estimation method, the home location of users is estimated based on the social network and a few parts of the assigned user's home locations. We define the social network as a simple directed graph, the node as a user, and the edge as the relationship between the users. The user's home location is expressed as a label assigned to the node. Spatial label propagation (SLP) [8] imports the idea of label propagation [10] to network-based home location estimation. SLP is a way of applying the home location estimation method using the labels of the adjacent nodes iteratively. SLP is capable of estimating a greater number of nodes, and performs well in a sparse graph. In addition, SLP can estimate home locations using labels of non-adjacent nodes. SLP has two parameters, the select function and the iteration count. We use the network-based home location estimation method using adjacent labels as the select function. In this study, we use four network-based home location estimation methods using adjacent labels as the select function, explained in Section II-A to II-D. The select function of node u defined as Select(u) uses only the following information: Nu is a set of adjacent nodes of node u, and a set of labels of Nu. We use the following variables for explanation: L is a set of learning data (nodes), Nu is a set of adjacent nodes of node u, A is a set of labels (areas), lu is a correct label of 1https://twitter.com/ node u, dist(a, b) is the distance between labels a and b. The distance between labels is the geographic distance between two centroids of areas corresponding with the labels calculated by Hubeny's distance formula. A. Probability Model Probability Model [5] is the method that selects the label (home location) having the highest likelihood of the target node, with the model of the probability that there is an edge at the geographic distance. When the geographic distance between the nodes is d, the probability of the edge being present p(d) is expressed in (1), where a, b and c are the static parameters of a real number. We use a = 0.0019, b = 0.196, c = −1.05 in original paper [5]. Home location of the node u is estimated by (2) using the probability model2. (cid:89) (cid:89) v∈L p(d) = a(d + b)c γl(l) = [1 − p(dist(l, lv))] γ(l, u) = p(dist(l, lv)) 1 − p(dist(l, lv)) P robabilityM odel(u) = arg max v∈Nu∩L l∈{lnn∈Nu∩L} (1) γl(l) γ(l, u) (2) B. Majority Vote Majority Vote [6] is the method that selects the most frequent label (home location) among the labels of the adjacent nodes (friends). The hypothesis based on this method is that the majority of my friends live the same location with me. In the original paper [6], the concept of majority may be ambiguous. The paper does not specify the majority when two or more labels are the most frequent in the labels of adjacent nodes. Therefore, in this study, we preferentially choose a label which appears frequently in the entire social network. The method is expressed in (3), where arg max* is defined that returns a set of the equivalent. Su = arg max* l∈{lnn∈Nu∩L} M ajorityV ote(u) = arg max {vv ∈ Nu ∩ L, l = lv} {nn ∈ L, l = ln} l∈Su (3) This method contains two parameters, the range of the num- ber of adjacent nodes and the minimum number of votes. Since other methods do not have the corresponding parameters, the maximum range is selected for the Majority Vote method. The range of the number of adjacent nodes of the user is zero to infinity, and the minimum number of votes is zero. C. Geometric Median Geometric Median [8] is the method that selects the geo- metric median among the labels of the adjacent nodes. The method is expressed in (4). (cid:88) GeometricM edian(u) = arg min l∈{lnn∈Nu∩L} x∈Nu∩L,n(cid:54)=x dist(l, lx) (4) 2We make up for γl(l) to equation γ(l, u) because it is thought that the equation used in the original paper is incorrect. D. Random Neighbor Random Neighbor is the baseline method that selects ran- domly among the labels of the adjacent nodes. This method is expressed in (5), where choice(S) is the function that selects an element randomly from the set S. RandomN eighbor(u) = lchoice(Nu∩L) (5) III. DATASET In this study, we analyze home location estimation of Twitter users using the social network based on following relationships. We use home location data and their social network for the experiment, and we describe the details below. Specifically, the home location data contains 52,508 users, and the social network includes 8,003,858 nodes and 40,453,444 edges. A. Home Location from Geo-tagged Tweets In this study, a home location is an area of the city, as expressed in the previous study [6]. We find a city where the coordinate of the geo-tagged tweet is included, and we use the city as the area. Furthermore, we assume that a user is active mainly around their home location. We assign the home location as the most frequent city where the user posts geo- tagged tweets at least five times to the user who posts geo- tagged tweets more than 365 times. We collected 250,564,317 geo-tagged tweets posted in the includes Japan3 in 2014, using the Twitter rectangle that Streaming API4. We excluded tweets posted by BOT accounts. As a result, we assigned home locations to 71,166 users. B. Social Network based on Following Relationship Twitter users can follow other users by subscribing to the users' tweets. A followee is the user who is following, and a follower is the user who follows the user. The followee and follower relationships are called following relationships. In this study, we create a social network based on following relation- ships. At first, we collect two sets of following relationships of the users to which a home location can be assigned; followees of the user5 and followers of the user6. Then, we merge the two sets, and create a social network by making an edge when the users follow one another mutually. We collected the following relationships among the users who were assigned a home location. We were able to collect the following relationships of 52,508 users among the 71,166 users in July 2015, and their social network had 8,003,858 nodes and 40,453,444 edges. IV. EXPERIMENT AND DISCUSSION In this section, we conduct experiments to compare the select functions. We first describe the experimental setup. Then, we present results and analysis, and provide some discussion regarding those results. 3Range of lat. 20◦ to 50◦N and long. 110◦ to 160◦E. 4https://dev.twitter.com/streaming/reference/post/statuses/filter 5https://dev.twitter.com/rest/reference/get/friends/ids 6https://dev.twitter.com/rest/reference/get/followers/ids A. Experimental Setup The evaluation is based on a 10-fold cross-validation with 52,508 users who were assigned a home location. We compare four select functions with the social network created by the following relationships. The experimental results are reported with their precision, recall and F1 (f-measure). We have defined precision as the ratio of users that have been correctly estimated a home location, recall as the ratio of users that have been correctly estimated a location to the users in the test dataset, and F1 as the harmonic mean of precision and recall. In addition, we use the coverage that shows the ratio of users who can be estimated for analysis. Because isolated nodes exist in the social network, the maximum coverage is not 100%. We also evaluate by mean error distance and median error distance based on the distance between correct and estimated locations. The calculation of six metrics can be seen in (6), where X is the set of estimated users, T is the set of test users, lu is the home location of user u, eu is the estimated location of user u, DU is the set of distance dist(lu, eu) of all users u ∈ U, mean(A) is the function that returns the mean value in the set A, and median(A) is the function that returns the median value in the set A. The evaluation value is the mean of the metrics for each fold. P recision(T, X) = Recall(T, X) = T ∩ X {uu ∈ T ∩ X, lu = eu} {uu ∈ T ∩ X, lu = eu} 2 ∗ P recision(T, X) ∗ Recall(T, X) P recision(T, X) + Recall(T, X) T ∩ X T Coverage(T, X) = T F 1(T, X) = (6) M eanErrorDistance(T, X) = mean(DT∩X ) M edianErrorDistance(T, X) = median(DT∩X ) B. Results and Analysis We evaluate four select functions using the social network based on following relationships. We show the evaluation results, which changes the select functions by changing the iteration count from one to six in Fig. 1. The Majority Vote method has the highest precision and recall in all iterations. The Probability Model method has the second best precision and recall. The highest precision and recall are achieved when the iteration count is two. The Geometric Median method features small differences between the maximum and minimum values of precision and recall. The coverage for a single iteration is 0.745, and the coverage after two iterations is approximately 0.986. This comparison with the select func- tions is not consistent with using the social network based on mention relationships reported in the previous study [8]. Fig. 2 shows the evaluation results by mean and median error distance. The Geometric Median method has the lowest mean error distance in all iterations. The Majority Vote and Probability Model methods have lower median error distances on the second iteration. (a) Precision (b) Recall (c) F1 Fig. 1. The precision, recall and F1 with four select functions. The Majority Vote method has the highest precision and recall. The highest precision and recall is achieved when the iteration count is two. 00.050.10.150.20.250.30.35123456PrecisionIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median00.050.10.150.20.250.30.35123456RecallIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median00.050.10.150.20.250.30.35123456F1Iteration CountMajority VoteProbability ModelRandom NeighborGeometric Median The hypothesis that the SLP improves F1 is that the esti- mated location can be trusted as sufficiently as the assigned home location. The select functions can have higher precision when setting parameters, such as the number of adjacent nodes to estimate. There is a trade-off between precision and recall. There is a possibility that the select function having high precision can reliably estimate home location. A detailed analysis of select functions will likely be presented in a future study. We analyze the distribution of the distance on the graph to the user having the same home location in the social network. Fig. 3 shows the percentage of the users of each distance. "-" indicates the percentage of the users who are not able to reach a user that has the same home location. Approximately 88% of users have a user having at least one same home location within one-hop (friends and friends of friends). For a higher recall, to estimate the correct home location to a greater number of users is important. The result indicates that the iteration count of SLP is sufficient with two times calculation. C. Discussion As indicated in Fig. 1, the Majority Vote method had the best performance in our experiments. Jurgens et al. [8] have shown that the Geometric Median method has higher performance than the other three select functions, excluding the Probability Model method, which was not used. Two reasons can be considered for this result: the difference of the size of the home location, and the difference of the relationships in the social network. is considered that Firstly, the home location is different in size and shape. The Majority Vote method estimates a home location by selecting the majority area. It the Majority Vote method is more affected by the size of the area and the shape of the area than the other methods because the number of votes becomes the same value when the area is too small. Therefore, a certain number of votes is necessary to conduct an accurate estimation. We have defined a home location as an area of a city in Japan. This definition could be a reason that the Majority Vote method had the best performance in our experiment. Secondly, the relationship of the social network that it is based on is different. Our study uses the social network based on following relationships, which is used in previous stud- ies [6], [7], [11]. By contrast, some previous studies [8], [3] have used the social network based on mention relationships. McGee et al. [12] reported that the ratio of friends located geographically near changes with the relationship between the users. It is considered that the best select function changes through this feature of the social network. V. CONCLUSION (a) Mean Error Distance (b) Median Error Distance Fig. 2. The mean error distance and median error distance with four select functions. The Geometric Median method has the lowest mean error distance in all iterations. The Majority Vote and Probability Model methods have lower median error distances at iteration two. We analyzed the select functions of SLP using a social network based on following relationships. As a result, we revealed that the Majority Vote method that selects the most frequent location among the friends' locations had the highest precision and recall. We also indicated that the iteration count Fig. 3. The distribution of the distance on the graph to the user having the same home location. "-" indicates the percentage of the users who are not able to reach a user that has the same home location. The distance to the adjacent node (friend) is zero-hop. Approximately 88% of users have a user having at least one same home location within one-hop (friends and friends of friends). 050100150200250123456Mean Error DistanceIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median0102030405060123456Median Error DistanceIteration CountMajority VoteProbability ModelRandom NeighborGeometric Median0102030405060-012345Percentage of UsersDistance on the Graph [hop] of SLP is sufficient with two times calculation, because, since 88% of users are in the social network based on following relationships, in which users' possessed at least one correct home location within one-hop (friends and friends of friends). REFERENCES [1] Z. Cheng, J. Caverlee, and K. Lee, "You Are Where You Tweet: A Content-Based Approach to Geo-locating Twitter Users," in Proceedings of the 19th ACM International Conference on Information and Knowl- edge Management, 2010, pp. 759 -- 768. [2] J. Mahmud, J. Nichols, and C. Drews, "Home Location Identification of Twitter Users," ACM Transactions on Intelligent Systems and Tech- nology, vol. 5, no. 3, pp. 47:1 -- 47:21, 2014. [3] D. Jurgens, T. Finethy, J. Mccorriston, Y. T. Xu, and D. Ruths, "Geolo- cation Prediction in Twitter Using Social Networks: A Critical Analysis and Review of Current Practice," in Proceedings of the 9th International AAAI Conference on Web and Social Media, 2015, pp. 188 -- 197. [4] R. Li, S. Wang, H. Deng, R. Wang, and K. C.-C. Chang, "Towards Social User Profiling: Unified and Discriminative Influence Model for Inferring Home Locations," in Proceedings of the 18th ACM Interna- tional Conference on Knowledge Discovery and Data Mining, 2012, pp. 1023 -- 1031. [5] L. Backstrom, E. Sun, and C. Marlow, "Find Me If You Can: Improving Geographical Prediction with Social and Spatial Proximity," in Proceed- [6] C. A. Davis Jr., G. L. Pappa, D. R. R. de Oliveira, and F. de L. Arcanjo, "Inferring the Location of Twitter Messages Based on User Relationships," Transactions in GIS, vol. 15, no. 6, pp. 735 -- 751, 2011. [7] J. McGee, J. Caverlee, and Z. Cheng, "Location Prediction in Social Media Based on Tie Strength," in Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013, pp. 459 -- 468. [8] D. Jurgens, "That's What Friends Are For: Inferring Location in Online Social Media Platforms Based on Social Relationships," in Proceedings of the 7th International AAAI Conference on Weblogs and Social Media, 2013, pp. 273 -- 282. [9] L. Kong, Z. Liu, and Y. Huang, "SPOT: Locating Social Media Users Based on Social Network Context," Proceedings of the VLDB Endow- ment, vol. 7, no. 13, pp. 1681 -- 1684, 2014. ings of the 19th International Conference on World Wide Web, 2010, pp. 61 -- 70. [10] X. Zhu, Z. Ghahramani, and J. Lafferty, "Semi-Supervised Learning Us- ing Gaussian Fields and Harmonic Functions," International Conference on Machine Learning, vol. 20, no. 2, pp. 912 -- 919, 2003. [11] D. Rout, K. Bontcheva, D. Preoiuc-Pietro, and T. Cohn, "Where's @wally?: A Classification Approach to Geolocating Users Based on their Social Ties," in Proceedings of the 24th ACM Conference on Hypertext and Social Media, 2013, pp. 11 -- 20. [12] J. McGee, J. A. Caverlee, and Z. Cheng, "A Geographic Study of Tie Strength in Social Media," in Proceedings of the 20th ACM International Conference on Information and Knowledge Management, 2011, pp. 2333 -- 2336.
1706.07624
1
1706
2017-06-23T10:05:54
Social Bots: Human-Like by Means of Human Control?
[ "cs.SI" ]
Social bots are currently regarded an influential but also somewhat mysterious factor in public discourse and opinion making. They are considered to be capable of massively distributing propaganda in social and online media and their application is even suspected to be partly responsible for recent election results. Astonishingly, the term `Social Bot' is not well defined and different scientific disciplines use divergent definitions. This work starts with a balanced definition attempt, before providing an overview of how social bots actually work (taking the example of Twitter) and what their current technical limitations are. Despite recent research progress in Deep Learning and Big Data, there are many activities bots cannot handle well. We then discuss how bot capabilities can be extended and controlled by integrating humans into the process and reason that this is currently the most promising way to go in order to realize effective interactions with other humans.
cs.SI
cs
Running head: SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL?1 Social Bots: Human-Like by Means of Human Control? Christian Grimme, Mike Preuss, Lena Adam, and Heike Trautmann {christian.grimme, mike.preuss, lena.adam, trautmann}@uni-muenster.de University of Münster Department of Information Systems Leonardo-Campus 3 48419 Münster, Germany 7 1 0 2 n u J 3 2 ] I S . s c [ 1 v 4 2 6 7 0 . 6 0 7 1 : v i X r a SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 2 Abstract Social bots are currently regarded an influential but also somewhat mysterious factor in public discourse and opinion making. They are considered to be capable of massively distributing propaganda in social and online media and their application is even suspected to be partly responsible for recent election results. Astonishingly, the term 'Social Bot' is not well defined and different scientific disciplines use divergent definitions. This work starts with a balanced definition attempt, before providing an overview of how social bots actually work (taking the example of Twitter) and what their current technical limitations are. Despite recent research progress in Deep Learning and Big Data, there are many activities bots cannot handle well. We then discuss how bot capabilities can be extended and controlled by integrating humans into the process and reason that this is currently the most promising way to go in order to realize effective interactions with other humans. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? Social Bots: Human-Like by Means of Human Control? Contents Abstract Social Bots: Human-Like by Means of Human Control? Introduction Definition and Taxonomy of Social Bots Social Bots . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bots Not Regarded as Social Bots . . . . . . . . . . . . . . . . . . . . . . . . . Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Automation using Social Bots A simple reactive Twitter Bot example . . . . . . . . . . . . . . . . . . . . . . Functionality . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A Social Bot with human-like behavior . . . . . . . . . . . . . . . . . . . . . . Extending bot functionality . . . . . . . . . . . . . . . . . . . . . . . . . Experimental evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . Costs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Hybrid Social Bots Hybridization as low-cost mimicry approach . . . . . . . . . . . . . . . . . . . Hybridization as strategy against rule-based detection mechanisms . . . . . . . Methodology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Comparison of Bots and average accounts . . . . . . . . . . . . . . . . . A comment on detection mechanisms and hybridization . . . . . . . . . . Conclusion References 3 2 3 4 5 7 9 10 11 11 11 12 13 14 15 16 17 18 19 19 20 21 21 31 SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 4 Introduction Social media is a phenomenon that exists for a bit more than a decade now (Facebook went online 2004, Twitter in 2006). For the first time, a large part of the world population is enabled to participate in direct and partly world-wide visible information exchange. Together with the increasing importance of the social media in all-day live and a growing reach of these networks, their use (or misuse) for orchestrated information distribution in terms of advertisement up to political propaganda becomes attractive for different stakeholders. Due to the underlying technical nature of the communication medium, automated and thus cost efficient access to social media channels is easy. Like for email services several years ago, social media channels are used for simple spamming (Tynan, 2012). However, since about 2010, reports on trolling or automated so-called social bot activity in social media increase - especially with a focus on political manipulation and propaganda (Chu, Gianvecchio, Wang, & Jajodia, 2010; Elliott, 2014; Fredheim, 2013). Today, it is not doubted that social bots have a high societal impact (Cordy, 2017), whatever the approaches realizing them currently are. This leaves research with new and multidisciplinary challenges: Detecting and fighting automated and orchestrated manipulation via social media necessitates insights and understanding of motivation, processes, economics, and current limits of manipulation. Computer scientists track networks, measure interactions, build algorithms, and are concerned with security issues, but are unfamiliar with communication aspects and effects. Social scientists have to understand new (semi-automatic) ways of distributing information or propaganda and answer questions of possible societal impact. Both have to collaborate with statisticians and researchers in the area of artificial intelligence to understand challenges and limits of developing big data-based detection mechanisms. As a first step, this work covers technical details and processes, economic considerations, as well as limits of automated manipulation via social networks in a multi-disciplinary way and provides some baseline for further discussion. For an initial common understanding, we review the existing interpretations of the term "social bots" SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 5 and propose a consolidated definition. This definition is complemented by a comprehensive discussion and classification of automated actors in the web. Then, we focus on the technical details and challenges in the development of social bots. We first show the construction and implementation principle of a responsive Twitter bot and extend this implementation to a framework for realizing human-like behavior. Additionally, the second concept is validated by a social bot experiment at Twitter, applying 30 of our social bots for gaining followers and distributing (ethically harmless) content. For both concepts we discuss the costs of realization. In a final step, we address the existing gap of automation on the behavioral level and automation on the communication level. Here, we argue that it is currently most cost efficient to automate bots on a behavioral level, while content generation and bot-human-communication is still steered by humans. In the context of the performed bot network experiment, we empirically show that current automatic detection mechanisms cannot significantly distinguish hybrid bots from human users. Definition and Taxonomy of Social Bots When journalists, bloggers, or scientists report on social bots and their potential influence on society, many of these articles provide an own definition of the term "social bot". Very often, these definitions strongly differ from each other, some focusing on technical details, others highlighting social interaction. Sometimes, the definitions even contradict each other or explicitly exclude a class of "social bots" others include. Although the capabilities and effects of social bots taking part in public internet communication are more and more discussed, no common understanding of the vehicle itself has evolved. As the term itself suggests, definitions stem from a mixed, partly social science and partly technical perspective, while the weighting of the perspectives is usually up to the respective definition's author. From a technical perspective, the term "bot" is often related to robots, automation and algorithms (Maréchal, 2016). All of these terms are certainly part of the SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 6 understanding of social bots, however, their equivalent substitution interweaves technically different concepts like algorithms and robots in a simplistic way and may lead to misunderstandings. Geiger (2016) defines social bots-in a more exact but still very general way-as automated software agents. Emmer (interviewed in Heinrich-Böll-Stiftung (2017)) adds properties like artificial intelligence and the ability to autonomously act in the web. The social science perspective usually addresses the social or political implications of the actions of social bots. Woolley (2016) states that social bots "mimic human social media users" and "manipulate public opinion and disrupt organizational communication". He also defines so called "political bots" as a special case of social bots. Hegelich (2016) highlights that social bots are hidden actors with a political agenda. He explicitly distinguishes them from "chat bots" or other "assistants". A wider definition which specifically considers the communication behavior is given by Frischlich, Boberg, and Quandt (2017). The authors point out, that the imitation of human communication (behaviour) is a key feature of social bots. This certainly also includes chat bots. Even more general, Kollanyi, Howard, and Woolley (2016) consider interaction with other users through automated social media as key property of social bots. Interestingly, social media platforms like Facebook recently recognized possible effects of social bots by admitting "false amplifications", however, they do not use the term "social bot" throughout their publication (Weedon, Nuland, & Stamos, 2017). Many application examples of social bots are presented in a recent overview paper by Ferrara, Varol, Davis, Menczer, and Flammini (2016). This work allows to identify many types of bots and check the available definitions. Additionally, the authors give a good but (in our view) slightly too tight definition of social bots: "A social bot is a computer algorithm that automatically produces content and interacts with humans on social media, trying to emulate and possibly alter their behavior." We will keep several aspects of this definition but do not restrict ourself to social media alone. Additionally, we include the communication aspect introduced by Frischlich et al. (2017) and cover the interaction property by referring to agent behavior: SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 7 The term "Social Bot" is a superordinate concept which summarizes different types of (semi-) automatic agents. These agents are designed to fulfill a specific purpose by means of one- or many-sided communication in online media. The most significant difference to other definitions is that we define social bots as a high-level concept which comprises many types of specific bots. Additionally, our definition covers: • fully automated as well as partly human-steered bot action, • autonomous action (agent-like), • an orientation towards a goal, • multiple modes of communication, • and a wider ecosystem (all online media). In the following paragraphs, we give several examples of social bots and specific sub-types as well as of bots which are not covered by our definition and, thus, are not supposed to be social bots. Social Bots The most popular type of a social bot is the chat bot, „a software system, which can interact or "chat" with a human user in natural language such as English." (Shawar & Atwell, 2007a). The oldest and best known chat bot may be Joseph Weizenbaums ELIZA. It was able to participate in a discussion on psychological topics, controlled by scripts that discover context by identifying keywords (Weizenbaum, 1966). By means of pattern matching, ELIZA answered questions in a very human like manner, so sometimes participants did not even recognize that they talked to a machine instead of a real therapist. The recent wave of chat bot development probably originated in the context of the "Loebner Prize" competition1, where Hugh Loebner set the task to find the most human-like acting program (Mauldin, 1994). Nevertheless, chat bots are only as intelligent as their scripts and the databases 1http://www.loebner.net/Prizef/loebner-prize.html SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 8 behind those scripts are. That is why they are often developed only for specific topics. Nowadays, lots of different chat bots with different aims exist 2. Meanwhile, companies often use chat bots to handle customer service issues. One can find them "in daily life, such as help desk tools, automatic telephone answering systems, tools to aid in education, business and e-commerce." (Shawar & Atwell, 2007b). As chat bots are created to communicate in dialogs with specific users or customers, a multitude of chat platforms are conceivable, e.g. private chats of social media pages, as well as other online media like email or help sections on private company websites. The bots partly replace human interaction and are often used to do simple preprocessing tasks, e.g., figuring out the right contact person for a specific service issue. Whereas chat bots focus on one-to-one communication, spam bots are developed to reach a large audience. The goal of this one-to-many communication is spreading information, advertisements or fishing links, without involving the recipient. As they were used to communicate a certain message on behalf of a company, group, or person, they nevertheless fall into the category of social bots. As mentioned earlier, political bots can be seen as a special type of social bots with the aim to spread political content or participate in political discussions on online platforms (Woolley, 2016). Political bots are designed by politically oriented groups to represent their opinions and mindsets. A typical goal of political bots is, e.g., boosting the popularity of a specific idea or person on a (social) media platform, by generating 'likes' or 'follows'. Furthermore, political bots may make use of the characteristics of chat bots or spam bots. They discover public conversations, posts and comments by identifying keywords and intervene or flood them with own (propagandistic) content. Whether political bots are able to participate in simple conversations with other users or just spread spam in a not reactive way is just a question of the aim (and technical skill) of the operator and the code behind the bot profile. Human-like political bots that act on social media platforms as Twitter and Facebook or comment in forums are potentially capable to influence other users. Especially, if there are many bots 2https://www.chatbots.org SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 9 cooperating in bot networks, they are able to arise a potentially undeserved awareness to political moods. Examples of potential bot armies were, e.g., discovered in the context of the U.S. presidential election 2016. Bessi and Ferrara (2016) found out that nearly 19 percent of all election-related Twitter posts during this time were made by bots. Furthermore, the German news page "Spiegel Online" reports on parties which considered the usage of social bots supporting their election campains for the German parliamentary elections of 2017 (Pfaffenzeller, 2017; Rosenbach, 2016). Another type of social bots is the class of mobile phone assistants. Software like Apples Siri3 is designed to manage human to machine communication with the input of natural language. Nearly any possible functionality of the mobile phone can be used just by voice commands. In this case, the social bot acts as a translator between human users and the phone. With the help of voice recognition and keyword identification, the program figures out appropriate actions or search results for the user. Bots Not Regarded as Social Bots Bots that are not covered by our definition of social bots are, e.g., content management bots, aka 'curator bots'. The job of a curator bot is to manage or collect content and to present it in an easy-to-digest way to humans. In contrast to social bots, for curator bots the communication aspect is not pronounced; they only work 'silently' with content. Wikipedia bots are an appropriate example for this class of bots. Pywikibot4 helps users to nurture articles by deleting superfluous whitespace, generating links to related pages or correcting typos. Another example of content bots are data aggregation bots which are built to manage data and are used for analysis only. Game bots help their users to be successful in games. Tasks of these bots can be as various as the games they are used in. Game bots can act as opponents in order to enable training, help to navigate through the game or can be used for cheating or just as stand-in for short periods of unavailability (afk). So-called farming bots as e.g. in 3https://www.apple.com/de/ios/siri/ 4https://www.mediawiki.org/wiki/Manual:Pywikibot/Overview SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 10 games like World of Warcraft5 assume simple tasks and free players from time-consuming but necessary duties (Mitterhofer, Kruegel, Kirda, & Platzer, 2009). Nowadays, game bots that realize all these functions and more are available in USB stick format from graphics card vendors. Instead of social bots, game bots focus not on communication and interaction but exclusively on substituting users by imitation. Service-Level-Agreement (SLA) negotiators focus on machine-to-machine communication. These bots are built to handle Service Level Agreements autonomously. Again, there is no human communication or interaction aspect regarding this class of bots, which is why they are not covered by our definition of social bots. Discussion As also shown by the categorization into social and not social bots above, we see the human-machine interaction as a key-factor. Social bots automate social interaction via communication Every online medium where human communication through publicly visible posts, chats, comment-functions, direct messages, etc., takes place, is a possible point of connection for the involvement of social bots. Nevertheless, our definition of social bots should be seen more or less as a high-level concept. Social bots appear as different from each other as the reasons they were built for, and have to be discussed in their specific context. Having a look at the mentioned examples, one can see that there are more and different tasks for social bots than to influence people. Some social bots just substitute their users by assuming duties or handle simple preprocessing tasks. Announcements as Facebook's support for group bots and bot repositories6 lead us to expect that social bots are going to be a more and more pervasive part of our internet experience in the coming years. When discussing the possibilities of social bots to influence single users up to whole societies, we shall therefore employ more precise notions and terms. 5https://www.worldofwarcraft.com/ 6https://techcrunch.com/2017/03/29/facebook-group-bots/ SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 11 Automation using Social Bots The application of social bots for multiple purposes (from advertisement to propaganda) implies different technical challenges as well as economic considerations to be handled. On the one hand, costs are rapidly increasing in terms of technical complexity (e.g. for making social bots more human-like). On the other hand, simple technical realizations may have a big enough impact to maximize monetary or social/political revenue in some cases. In the following sections, we will present a most simple technical realization of a social bot and extend it to a moderately complex behavioral human-like actor on Twitter-trying to keep costs rather low. We then present an experiment using 30 of those Twitter bots and lead over to an economic discussion of hybrid extensions of social bots in the next chapter. A simple reactive Twitter Bot example One of the most simple ways to develop a reactive social bot adopts the Twitter Stream API7. This basically means, that we listen to the ongoing worldwide Twitter activity and react to arriving posts. More formally, we use a Twitter Stream Listener component that registers with Twitter and additionally implement a simple actuator component which is triggered by incoming Twitter posts and uses the Twitter REST API8 to reply to these posts, if applicable. Figure 1 provides a schematic overview of the components and data flow of the social bot. For the full implementation details using the Python tweepy9 framework, refer to the listing given in appendix A. Note that due to bandwidth management of the public Twitter Stream, only a subset of posts will reach the listener. Depending on the registered topics and activity at the platform, only about 1% up to 40% (in very restricted cases also more) of the actual traffic may arrive at the listener (Ferrara et al., 2016). Functionality. The presented social bot enables us to react on twitter posts directly, answering to the sender. In our implementation, the Twitter Stream listener 7https://dev.twitter.com/streaming/overview 8https://dev.twitter.com/rest/public 9http://www.tweepy.org/ SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 12 consumes the current Twitter Stream with respect to a given set of hash tags or topics. Thereby, we are able to adapt to a specific context or domain of interest. Although the current implementation only greets the user of current post, the functionality of the actuator can easily be extended. The application of this bot ranges from simple demonstration (and greeting) purposes to simple service activities based on standardized responses, e.g.: • Returning the weather forecast for a city or region mentioned in the current post. Therefore, the actuator may use external weather information sources like OpenWeatherMap10. • Answering questions on specific topics detected in the current post. Using the Google Knowledge Graph11, a mighty ontology network can be connected to the bot, covering an enormous knowledge base. • In a political context: Respond to specific topics and confront users (usually independent of content posted) with a number of fixed political statements. Only these three application examples demonstrate the potential of a very simple social bot implementation comprising not more than 30 lines of code for a fully functional frame. Costs. Obviously, the costs for developing a simple service social bot can almost be neglected. Implementation time is certainly lower than one hour for a medium experienced developer (including error handling code, which is not provided in our listing). The main effort has to be put into the setup for the bot's Twitter account and access to the Twitter API. Therefore, a standard Twitter account must be created and connected to a mobile number for developer access. Both can easily be done in an anonymous way using a fake email address and an invalid or anonymously registered mobile number. Clearly, the behavior of the presented bot can easily be detected as automated action. No human recipient of a message will consider it to be sent by another human. Instant reaction, permanent activity, and restricted capabilities to analyze content and 10https://openweathermap.org/api 11https://developers.google.com/knowledge-graph/ SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 13 react dynamically will expose the social bot as such. A Social Bot with human-like behavior Development of a social bot with sophisticated human-like behavior addresses three main challenges: 1. Producing credible and "intelligent" content, which is accepted as such by human consumers. 2. Leaving a trace of human-like meta-data in social networks. 3. Creating an adequate (often balanced) network of friends or followers to spread information. While the first challenge is a rather open issue in science and even the more in practice (we will comment on this later), the second aspect can be handled to a certain extent by imitating human actions in social networks sticking to normal human temporal and behavioral patterns. This includes performing activities in a typical day-night-cycle, carefully measured actions at the social media platform, as well as variability in actions and timing. Thus, at Twitter, a bot should pause actions to simulate phases of inactivity (e.g. sleep or work), limit posting and re-tweeting activities to a realistic, human-like level, and vary these pauses and limits. Another key issue is to grow a network of followers or friends. For social media, a network of friends implies a certain reach: the larger the network of followers, the more Twitter users receive distributed content of the respective account. To create a network, Lehmann (2013) proposes an effective strategy based on a simple observation: users follow other users hoping that those follow back again (which they often do, if the pro-active profile does not obviously look bot-like), thereby establishing a friendship relation. In case this does not happen within a certain time span (i.e. the other user does not follow back), the one-sided connection is often dissolved to keep a balanced following-follower-ratio. An exception to this are very prominent accounts with usually strongly imbalanced following-follower-ratios (far more followers than followed users) or accounts that are mainly used to distribute advertisement (far more followed users than SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 14 followers). These clearly indicate not human-like behavior and are used for bot-detection. The overall principle of "follow-for-follow" is not only respected by most human users but can also be applied to grow the follower network of a bot account. Extending bot functionality. The previously presented simple social bot can easily be extended to fulfill the challenges two and three. Therefore, several Actuators are created that independently perform specific actions on Twitter. Considering the schematic depiction in Figure 2, we briefly describe the important components: CollectionActuator: This component listens to the Twitter stream and stores user names as candidates to follow later on. The selection of following candidates can be made with respect to different characteristics like the following-follower-ratio (i.e. balanced accounts are preferred), activity on Twitter (potential multiplicators are preferred), Tweet properties (e.g. users sending popular tweets are preferred). BotProfile: The personal profile of a social bot is defined using a dedicated component which stores all constraints and guidelines to simulate a certain behavior. Here, the day-night-cycle and rest periods can be defined, general parameters for the posting and re-tweeting behavior can be set, and an individual following behavior is formulated. Note that all settings should be guidelines only, in order to add some random variability. The component also provides functionality to request the next action time for all other actuators. This function interprets the given behavior values and (adding some random noise), proposes the next action. FollowActuator: This actuator ensures a continuous execution and management of the follow-for-follow procedure. With respect to the BotProfile, the component follows a certain amount of previously collected users (see CollectionActuator) and supervises reactions. Is a contacted user follows back, the component adds this user as friend. In case of no response within a certain time window (i.e. 24 hours), the one-sided friendship is canceled and the user is blacklisted. PostActuator: This Actuator enables the bot to post or re-tweet on Twitter. Therefore, a database of individual tweets and collected tweets is accessed. The amount of SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 15 actions is determined by the BotProfile. PictureActuator: The ability to post pictures on Twitter is implemented by this Actuator. Analog to the behavior of the PostActuator, pictures and matching comments are extracted from a picture database and posted on Twitter. Experimental evaluation. In order to evaluate our mimicry approach for human behavior in the real-world context, we set up an experiment comprising 30 Twitter bots. In cooperation with the German TV station Pro7, we created 30 fake profiles, see also Table 1, and equipped them with the social bot framework described before. Each bot ran the same code, however, we individualized the bot profiles and Twitter Stream listeners. Each social bot had its own day-night-cycle, activity pattern, and following behavior. Additionally, each bot listened for an individual set of topics within the Twitter Stream. Overall, the experiment was divided into three phases: 1. Build a network of followers over a setup and testing period of 2 days and the following 8 days of combined action. Thus, the experiment lasted 10 days in total of which only the 8 productive days were documented. Note that half of the social bots were mutually befriended by default, while the second half started with no followers at all. 2. Publish content in a coordinated way to test the potential of setting a trend on Twitter. The published content was devised by human actors and only distributed by the bots. 3. Reveal the social bot identity of the respective fake accounts to followers and the public (supported by a TV documentary on the experiment, which is available in German12). Especially phase one demonstrated, that the follow-for-follow approach could successfully be applied to acquire followers automatically. As shown in Figure 3, the amount of followers continuously increased for the evaluated eight days, resulting in 12http://www.prosieben.de/tv/galileo/videos/2016347-social-bots-das-experiment-clip SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 16 about 1350 followers after this short time period. During the second phase, two (harmless and humorous) hash tags were promoted to test the reach of the acquired followers. Although the hash tag briefly appeared in the German top 100 trending topics, a significant trend could not be established. However, phase three showed, that many human followers had been deceived by the fake bot identities and actions. Reactions from Twitter users were different ranging from disappointment to anger and from amusement to disbelieve. Although our experiment is only a snap-shot of what is possible by applying human-like acting social bots, some important insights can be extracted: • Tedious tasks as building a follower network, as well as posting and re-tweeting content, may be automated without being exposed as bot. • The automatically generated network can be used to spread content to all followers at any point in time. This will cause at least brief visibility and possibly push a topic in order to reach wider popularity. • Human users can easily be deceived by simple, but fairly realistic social bots behaviors. Certainly, an important ingredient for the success of our social bots was-besides the human like behavior patterns-the human-generated content published by all bots. As mentioned before, we used manually generated content to be spread by the bots. We include the discussion of this aspect into our cost review. Costs. The development time of the extended Twitter bot (less than two days) can still be neglected compared to the functionality and benefit of automation provided by the general framework. The more tedious task was to generate all thirty fake accounts on Twitter. Thereafter, we were able to deploy the same code thirty times with only minor adaptations regarding the individual configuration of each bot. Then, phase one (growing the network) was performed by all bots without any human intervention. Likewise, publishing content in phases two and three needed no intervention. However, content was not automatically generated but provided by humans. We decided SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 17 to do so after reasoning on the following to questions: What would have been the costs of generating content automatically, and what quality of content can be achieved? Implementing the generation of intelligent and creative content for our hash tags would have cost far more effort than setting up the whole social bot framework. Simple approaches based on templates still require some human interaction and lack creativity. More complex generators based on learned patterns still follow firm rule sets, which limits the variability of linguistic expression. Both probably would have had reduced the credibility of our social bots due to repetitive content. Furthermore, due to the application of thirty cross-linked social bots and their continuous re-tweeting behavior, a single message was repeated many times by other bots and followers, thereby extending its range automatically. Hybrid Social Bots The extended social bot framework presented in the previous chapter is able to mimic human behavior on the action level, i.e. a social bot is able to automatically create a follower network, and manage content. Content production, however, is done by human actors. Figure 4 qualitatively shows the automation-orchestration relationship of human users and simple social bots as single actors and as human troll farm or "bot army" respectively. Hybrid social bots are, with respect to automation, an intermediate class of fully automated (behavioral simple) bots and purely human users. Used under orchestration, communication approaches and activity patterns of single actors differ: The army of simple bots is often following a mere client server model with rather similar acting single bots and little autonomy per agent. Hybrid bot networks are certainly still centrally controlled. Each bot, however, possesses a behavioral autonomy, which mimics human behavior. In contrast, Human troll farms are acting on a central interest, context or overall goal but have the highest autonomy per agent. For them, a central content generation becomes dispensable. In this chapter, we argue that hybridization of bots is an effective (compared to an army of social bots) and low-cost (compared to a human troll farm) approach to gain a SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 18 high potential of influence via social media by simulating human behavior and speech. We will show that a network of these hybrid bots is able to sufficiently outsmart current automatic detection mechanisms as BotOrNot13 (Varol, Ferrara, Davis, Menczer, & Flammini, 2017). Hybridization as low-cost mimicry approach The current societal opinion on bot technology seems to be driven by recent success stories of AI, for example the prominently featured wins of an AI against world-class Go players. These successes follow to a large part from the development of deep learning algorithms (Lecun, Bengio, & Hinton, 2015) that are a) able to employ big data collections for learning and b) benefit from extreme parallelization. However, at the core of deep learning successes, we see human competitive (or even better) pattern matching and modeling capabilities. It is not at all trivial to use these capabilities to establish creative tasks, and especially human communication skills are still beyond of what algorithms can do. Riedl (2016) gives an overview and vision of how AI can approach computational interactive narrative, which requires that computers can understand human communication and react adequately. Attempts in this direction are currently still very limited, as, e.g. shown by Martin, Harrison, and Riedl (2016) in terms of computational improvisation in relatively open (not targeted) communication. Existing chat bots can answer simple questions in a limited domain of their expertise but lack skills to participate in an open discussion. Recent attempts to improve their capabilities include the ParlAI14 platform published by Facebook, but these approaches are currently active research directions. Whereas progress in modification of images is astonishing (Zhu, Park, Isola, and Efros (2017) provides a tool that can translate images to other styles, e.g., the style of a specific painter), this is not yet possible for working with text, which is, in this respect, considered much more 13https://botometer.iuni.iu.edu 14https://code.facebook.com/posts/266433647155520/parlai-a-new-software-platform-for-dialog- research/ SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 19 complex than image translations. In the related fields of computational creativity and procedural content generation (mainly for games), we see similar problems, which has led to so-called mixed initiative approaches (Liapis, Smith, & Shaker, 2016) where a human designer and a computer program work together, taking turns, in order to reach a specific design goal. Without human interaction, the available methods would not be able to produce results in a human compatible style. At least for the time being, it is seemingly mandatory to employ hybrid approaches in order to establish results that can be taken for generated by a human and thereby appear human-like. Hybridization as strategy against rule-based detection mechanisms In order to evaluate our social bots against state-of-the-art detection mechanisms, we confronted them with the BotOrNot service provided by Indiana University (Varol et al., 2017). The BotOrNot service tries to state on the overall probability that a submitted Twitter account is automated. Therefore, the service compares previously learned patterns regarding the account's meta data, network, behavioral timing, friendship relations, sentiment, and content. The authors report of more than 1, 150 features that constitute the patterns in all the named high-level classes. Finally, the results of all indicators are aggregated to a value in [0, 1] which represents a probability of an account being controlled by a social bot. Table 1 shows the overall rating for each continuously active social bot account of our experiment. Obviously, the probability ranges between 0.37 and 0.6 with an average of 0.48. That confirms, in average, no clear bot-identification is possible for our social bots. In order to judge on the quality of these score distribution for our bots, we generate a baseline distribution of score BotOrNot values of worldwide user accounts. Methodology. As basis for user extraction we used data from the Twitter Decahose Stream, which provides a random 10% sample of worldwide Twitter traffic. The Twitter Decahose Stream provides roughly 300 posts per second. This sums up to about 160 GB of data per day. From this huge data sample of a single day, we extracted SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 20 unique user accounts at four points in time: midnight, morning (6 am), noon (12 am), and evening (6pm) to respect possible effects of the day-night-cycle. The gathered user accounts (about 1200) were classified by using the BotOrNot-API provided by the BotOrNot service. As our Social bots acted in the German language domain, we additionally extracted only German user accounts at the same points in time for a second, localized baseline distribution of scores. Comparison of Bots and average accounts. The comparison of our social bots' overall scores to the baseline distributions for the worldwide and and German users is shown in Figure 5. Although the bots cannot clearly be classified as bots with respect to the score measure, in retrospective evaluation, their score is significantly higher than the baseline score of our sample score from the worldwide and German Twitter Stream. To further analyze these findings, we additionally take a look at the detailes meta-features provided by BotOrNot and the according scores. Content-related features: Figure 6 shows the detailed results for the sentiment, content, and language scores. For the sentiment score features like happiness, valence, arousal, and dominance as well as polarization and emoticon statistics of tweets are evaluated and aggregated. Here our bots obviously behave like baseline German users. Both, German users and bots are generally scored higher than the worldwide baseline, which may be caused by the fact, sentiment analysis for the German language is more difficult than for e.g. English. The same observation can be made for the content feature, which aggregates tweet length and entropy. Here, the bot also range in the German baseline. Language features combine statistics on part-of-speech tags in tweets, i.e. low level features on the tagged or annotated grammar and context of words used in the tweets. Here, a significant difference to both baselines is observed. The reason for this may be the high amount of slang terms and thus grammatically complex structure of tweets used to push a topic in phase 2 of our social bot experiment. Meta data-related features: For meta data features we observe that our bots behave in average similar to the German user baseline, except for the user score. The user SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 21 score aggregates account-specific meta data information like age of the account and profile description as well as frequency and temporal development of actions on Twitter. Especially for these features, our experimental bot accounts are certainly too short-lived to be classified human-like. All other meta-features, however, confirm human-likeness of the social bot behavior-especially, when we consider friendship features, networking and temporal behavior. Here, no significant difference to the German baseline accounts can be identified. A comment on detection mechanisms and hybridization. The evaluation of our social bot network showed that multiple features of a state-of-the-art detection tool like BotOrNot can be bypassed. Especially the scores "attacked" by our automation framework (friendship, network, temporal behavior) are not distinguishable for bots and the evaluated random German account sample. Only features on content and the user profile showed some indications for bot behavior. These indicators, however, are only identifiable due to an a-priori grouping of the known social bot accounts. If confronted with a single bot account, the BotOrNot detection mechanism does not provide a sufficient overall score to identify any of our social bots as such. Conclusion With this paper, we have contributed an interdisciplinary perspective on social bot taxonomy, degrees of automation, developmental costs, and the benefit and importance of human interaction for making social bots invisible for modern detection mechanisms. In detail, we gave a consolidated definition of social bots and applied it to known variants of automated actors in the web. From a more technical perspective, we provided insight into the implementation and costs necessary to deploy simple but reactive social bots in Twitter. To increase credibility, we extended the simple bot implementation by mimicking human behavior in temporal and operational properties. Content production was left to human controllers leading to a hybrid bot network. We experimentally deployed such a network and demonstrated its principle applicability. Tedious tasks were automated (like collecting followers, re-tweeting, or posting SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 22 human-prepared content). Finally, we discussed the costs and current technological limits for full human-like hybridization. Futhermore, by means of an empirical analysis from the Twitter bot experiment and average user data extracted from the Twitter Decahose Stream, we have shown that hybrid social bots are able to bypass important indicators of current rule-based detection mechanisms as BotOrNot. Our results reveal several new challenges for future research in social bot detection: The next big challenge for detection systems will be to identify hybrid social bots, which expose real human behavior, on the one hand, and automatic patterns in some actions, on the other hand. We assume, that rule-based methods will not suffice for these tasks. In fact, adaptive and real-time detection mechanisms, which are able to reconfigure and learn are necessary to react on changing behavioral patterns almost instantly. Additionally, we believe that the inclusion of human interaction into hybrid social bots should shift the focus from purely automatic detection systems to hybrid detection systems that are able to judge on content, background strategies and distributed narratives by the inclusion of human (possibly crowd) intelligence. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 23 Table 1 List of all Twitter bots used during the experiment including the probability of being a Twitter bot determined by BotOrNot for each account. Bot name Bot Twitter ID BotOrNot Bot name Bot Twitter ID BotOrNot 803538518014300160 MagaritaWolff 803584267653709824 KumlehnLisa 803580625911480320 DreysKatharina 803575433862283264 LaurySamsy 803577951040180224 Eva_Omaha Jonas_Der_Baum 803581393393643520 803580666260705281 NickyTheMan1 ruediwig 803579187344904192 803271431400394752 Kalle_dod Shagggy_93 803274850768920576 803583207069351936 Luise_D2 803584623594897409 hoppendorf sabinepeterson7 803585050721783808 803988474416295937 ullaschoene80 40% 44Maler 39% FlorianWanken 49% IHeulach 53% porryflo12 46% DiamondGirl_97 37% kenny_boy300 42% Saschamachtsgut 56% ollerbaum121 54% DinoDingi 46% wernerbbbright 58% The_pfist 51% hansemeister11 57% wendtneraxxxy 54% 803586351807479809 803586889802465280 803917039597473792 803915544755847168 803595282969755648 803278016709332994 803279247804628992 803574359281598464 803582934376738816 803584898271444992 803881433840361472 803901587827621889 803912137630420992 40% 47% 47% 48% 40% 42% 41% 52% 60% 48% 47% 54% 56% SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 24 Figure 1. Components and data flow of simple Twitter bot realization using the Twitter Stream API. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 25 Figure 2. Components and data flow of our advanced social bot with behavioral settings, follow-for-follow mechanism, and human-like activity profile. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 26 Figure 3. The plot shows the growth of the follower network for the initial Twitter bot setup in about one week. 27 of initially 30 Twitter bots continuously performed the follow-for-follow strategy automatically without any human intervention. Potential followers were selected from the Twitter stream regarding individual topics. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 27 Figure 4. Qualitative classification of the potential influence of humans and bots in social media with respect to automation and orchestration. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 28 Figure 5. Statistics of the overall BotOrNot score values for our the social bot network (red box plots, grouped into bots that initially act as single entity or group respectively) contrasted with two baseline overall scores for a set of sample users. The sample users are taken from the worldwide (green box plots) and German (light green box plots) Decahose Twitter stream at four points in time. The analysis was performed using the BotOrNot API. SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 29 Figure 6. Detailed statistics of three meta features (sentiment, content, and language) for our social bots (red) and the baseline accounts worldwide (green) and from Germany (light green). SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 30 Figure 7. Detailed statistics of four meta features (friendship, network, temporal, and user) for our social bots (red) and the baseline accounts worldwide (green) and from Germany (light green). SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 31 References Bessi, A., & Ferrara, E. (2016). Social bots distort the 2016 us presidential election online discussion. First Monday, 21(11). Chu, Z., Gianvecchio, S., Wang, H., & Jajodia, S. (2010). Who is Tweeting on Twitter: Human, Bot, or Cyborg? In Proceedings of the 26th annual computer security applications conference (pp. 21–30). New York, NY, USA: ACM. doi: 10.1145/1920261.1920265 Cordy, J. (2017). The social media revolution: Political and security implications (Draft CDS Report No. [064 CDSDG 17 E]). NATO Parliamentary Assembly, Sub-Committee on Democratic Governance. Retrieved from http://www.nato-pa.int Elliott, C. (2014, Mai). The readers' editor on. . . pro-Russia trolling below the line on Ukraine stories. online. (http://www.theguardian.com/commentisfree/2014/may/04/pro-russia-trolls- ukraine-guardian-online) Ferrara, E., Varol, O., Davis, C., Menczer, F., & Flammini, A. (2016). The rise of social bots. Commun. ACM, 59(7), 96–104. Fredheim, R. (2013). Putin's bot army – part one: a bit about bots. online. (http://quantifyingmemory.blogspot.co.uk/2013/06/putins-bots-part-one-bit- about-bots.html) Frischlich, L., Boberg, S., & Quandt, T. (2017). Online hate speech. In K. Kaspar, L. Grässer, & A. Riffi (Eds.), (chap. Un-menschlicher Hass: Die Rolle von Empfehlungsalgorithmen und Social Bots für die Verbreitung von Cyberhate). kopaed. Geiger, R. S. (2016). Bot-based collective blocklists in twitter: the counterpublic moderation of harassment in a networked public space. Information, Communication & Society, 19(6), 787–803. Retrieved from SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 32 http://dx.doi.org/10.1080/1369118X.2016.1153700 Hegelich, S. (2016). Invasion der Meinungs-Roboter. Analysen & Argumente, 221(2016), 1–9. Heinrich-Böll-Stiftung. (2017, 02). Social bots. https://www.boell.de/de/2017/02/09/social-bots. Kollanyi, B., Howard, P. N., & Woolley, S. C. (2016). Bots and automation over twitter during the u.s. election (Tech. Rep. No. Data Memo 2016.4). www.politicalbots.org: Oxford, UK: Project on Computational Propaganda. Lecun, Y., Bengio, Y., & Hinton, G. (2015, 5). Deep learning. Nature, 521(7553), 436–444. doi: 10.1038/nature14539 Lehmann, S. (2013, 12). You are here because of a robot. https://sunelehmann.com/2013/12/04/youre-here-because-of-a-robot/. Liapis, A., Smith, G., & Shaker, N. (2016). Mixed-initiative content creation. In Procedural content generation in games (pp. 195–214). Cham: Springer International Publishing. doi: 10.1007/978-3-319-42716-4\_11 Maréchal, N. (2016). Automation, algorithms, and politics when bots tweet: Toward a normative framework for bots on social networking sites (feature). International Journal of Communication, 10(0). Martin, L. J., Harrison, B., & Riedl, M. O. (2016). Improvisational computational storytelling in open worlds. In F. Nack & A. S. Gordon (Eds.), Interactive storytelling: 9th international conference on interactive digital storytelling, icids 2016, los angeles, ca, usa, november 15–18, 2016, proceedings (pp. 73–84). Cham: Springer International Publishing. doi: 10.1007/978-3-319-48279-8\_7 Mauldin, M. L. (1994). Chatterbots, tinymuds, and the turing test: Entering the loebner prize competition. In Aaai (Vol. 94, pp. 16–21). Mitterhofer, S., Kruegel, C., Kirda, E., & Platzer, C. (2009). Server-side bot detection in massively multiplayer online games. IEEE Security & Privacy, 7(3). Pfaffenzeller, M. (2017, Mar). Bundestagswahlkampf: CDU erwägt Einsatz von Chatbots. SPIEGEL ONLINE. Retrieved from SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 33 http://www.spiegel.de/netzwelt/web/cdu-peter-tauber-erwaegt-einsatz -von-chatbots-im-bundestagswahlkampf-a-1141207.html Riedl, M. O. (2016). Computational narrative intelligence: A human-centered goal for artificial intelligence. CoRR, abs/1602.06484. Retrieved from http://arxiv.org/abs/1602.06484 Rosenbach, S., Marcel. (2016, Oct). Internet-Kommentare von Automaten: AfD will im Wahlkampf Meinungsroboter einsetzen. SPIEGEL ONLINE. Retrieved from http://www.spiegel.de/netzwelt/netzpolitik/ afd-will-im-wahlkampf-social-bots-einsetzen-a-1117707.html Shawar, B. A., & Atwell, E. (2007a). Chatbots: are they really useful? In Ldv forum (Vol. 22, pp. 29–49). Shawar, B. A., & Atwell, E. (2007b). Different measurements metrics to evaluate a chatbot system. In Proceedings of the workshop on bridging the gap: Academic and industrial research in dialog technologies (pp. 89–96). Tynan, D. (2012, Apr). Social Spam is taking over the Internet. Retrieved from http://www.itworld.com/article/2832566/it-management/ social-spam-is-taking-over-the-internet.html Varol, O., Ferrara, E., Davis, C., Menczer, F., & Flammini, A. (2017). Online human-bot interactions: Detection, estimation, and characterization. Retrieved from https://aaai.org/ocs/index.php/ICWSM/ICWSM17/paper/view/15587 Weedon, J., Nuland, W., & Stamos, A. (2017, 04). Information operations on facebook (Tech. Rep. No. 1). Facebook, Inc. Weizenbaum, J. (1966). Eliza-a computer program for the study of natural language communication between man and machine. Communications of the ACM, 9(1), 36–45. Woolley, S. (2016). Automating power: Social bot interference in global politics. First Monday, 21(4). Zhu, J., Park, T., Isola, P., & Efros, A. A. (2017). Unpaired image-to-image translation using cycle-consistent adversarial networks. CoRR, abs/1703.10593. Retrieved SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 34 from http://arxiv.org/abs/1703.10593 SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 35 Appendix Code of a Simple Twitter Bot The following code is a fully functional Twitter bot which continuously tracks the Twitter stream for a given hash tag (#Hashtag) and instantly replies to the sender with a simple 'Hello'. Please note, that login information for the Twitter API has been obscured and some error handling code has been removed for brevity. import tweepy from tweepy . parsers import RawParser # f o l l o w e d t o p i c and i d e n t i t y o f b o t search_topics = ['# Hashtag '] bot_identity = 'twitter_name ' # API o b j e c t api = None # I m p l e m e n t s b o t class TwitterActuator : s i m p l e a c t i o n s def act(self , status ): if not api is None: username = status . author . screen_name tweettext = status .text if not username == bot_identity : print('Received :' + tweettext + '\n') # t w e e t t h e w o r l d t o api. update_status ('Hello @' + username + '.') # S t r e a m L i s t e n e r class TwitterStreamListener ( tweepy . StreamListener ): on t w i t t e r ( r e a c t s p o s t s ) actuator = None t h e # s e t def setActuator (self , actuator ): a c t u a t o r self. actuator = actuator t h e # C a l l p o s t s def on_status (self , status ): a c t u a t o r i f a p p e a r i n s t r e a m self. actuator .act( status ) # Main P r o g r a m SOCIAL BOTS: HUMAN-LIKE BY MEANS OF HUMAN CONTROL? 36 if __name__ == '__main__ ': try: auth = tweepy . OAuthHandler (' ∗∗∗ ', ' ∗∗∗ ') auth. set_access_token (' ∗∗∗ ', ' ∗∗∗ ') api = tweepy .API( auth_handler =auth , parser = RawParser (), wait_on_rate_limit =True) twitterBot = TwitterActuator () twitterListener = TwitterStreamListener () twitterListener . setActuator ( twitterBot ) myStream = tweepy . Stream (auth = api.auth , listener = twitterListener ) myStream .filter (track= search_topics , languages =['en'], encoding ='utf−8') finally : print('Program end.')
1909.01132
1
1909
2019-08-29T04:15:25
PageRank algorithm for Directed Hypergraph
[ "cs.SI", "cs.LG", "stat.ML" ]
During the last two decades, we easilly see that the World Wide Web's link structure is modeled as the directed graph. In this paper, we will model the World Wide Web's link structure as the directed hypergraph. Moreover, we will develop the PageRank algorithm for this directed hypergraph. Due to the lack of the World Wide Web directed hypergraph datasets, we will apply the PageRank algorithm to the metabolic network which is the directed hypergraph itself. The experiments show that our novel PageRank algorithm is successfully applied to this metabolic network.
cs.SI
cs
PageRank algorithm for Directed Hypergraph Loc Tran 1 , Tho Quan 2 , and An Mai 3 1 John von Neumann Institute, VNU-HCM, Ho Chi Minh City, Vietnam (E-mail: [email protected]) Ho Chi Minh City University of Technology, VNU-HCM, Ho Chi Minh City, Vietnam (E-mail: 3 John von Neumann Institute, VNU-HCM, Ho Chi Minh City, Vietnam (E-mail: [email protected]) [email protected]) Preprint submitted to RGN Publications on 29/6/2018 Abstract During the last two decades, we easily see that the World Wide Web's link structure is modeled as the directed graph. In this paper, we will model the World Wide Web's link structure as the directed hypergraph. Moreover, we will develop the PageRank algorithm for this directed hypergraph. Due to the lack of the World Wide Web directed hypergraph datasets, we will apply the PageRank algorithm to the metabolic network which is the directed hypergraph itself. The experiments show that our novel PageRank algorithm is successfully applied to this metabolic network. 2010 AMS Classification: 05C85 Keywords and phrases: directed hypergraph, Laplacian, metabolic network, PageRank algorithm 2 Article type: Research article 1 Introduction With the quick growth of the World Wide Web during the last two decades, information retrieval introduces growing theoretical and practical challenges. With the huge amount of information inflowing the World Wide Web every second, it becomes more difficult and more difficult to retrieve information from the Web. This explains why the existence of a search engine is as important as the existence of the web itself. Since the appearance of the web, there has been a fundamental talk in the web research community to develop the rapid, effective, and precise search engines. This paper will be chiefly discussing about the most common search engine nowadays which is Google. The mathematical theory behind the Google search engine is the PageRank algorithm, which was presented by Sergey Brin and Lawrence Page [1]. In 1998, Brin and Page were PhD students at Stanford University, USA. Then they took a leave of absence from their Ph.D. to concentrate on developing their Google model. Their original paper describing the PageRank algorithm is used nowadays by Google to create the rankings of the web pages of the World Wide Web. A search engine contains three important modules: a crawler, and an indexer, and a query engine [2]. The crawler gathers and stores data from the web. Data is stored in the indexer which mines information from the data gathered from the crawler. The query engine responds to the queries from customers. The PageRank algorithm (i.e. one of the ranking algorithms), part of the query engine, ranks the web pages in the order of their "importance" to the query. The ranking is attained by the contribution of a score to each web page of the World Wide Web. PageRank is a ranking algorithm of web pages of the World Wide Web. The PageRank algorithm exploits the link structure of the web. The World Wide Web's link structure forms a directed graph where the web pages are the nodes of the directed graph and the links are the directed edges of the directed graph. The web page (i.e. the node of the directed graph) is considered "important" if it is pointed to by other "important" web pages. During the last two decades, we easily recognized that the World Wide Web's link structure was modeled as the directed graph. Moreover, the PageRank algorithm was developed for this directed graph only. In general, this model, the directed graph, is not the best and the generalized model for the World Wide Web's link structure. In this paper, we will model the World Wide Web's link structure as the directed hypergraph [3, 4]. This work, to the best of our knowledge, has not been investigated up to now. However, due to the lack of the World Wide Web directed hypergraph datasets, we will exploit the metabolic network dataset that is available from [5]. This metabolic network can easily be represented as the directed graph or the directed hypergraph. We will show clearly how to construct the directed graph and the directed hypergraph from this metabolic network. Then our next task is to develop the PageRank algorithm for the directed hypergraph. This is the novel work. Moreover, we will define the un-normalized and the symmetric normalized directed hypergraph Laplacian in this paper. In the future, if the World Wide Web's directed hypergraph datasets are available, then the directed hypergraph Laplacian based semi-supervised learning will be developed in order to solve the spam detection problem. We can easily see that the applications of the directed hypergraph are huge. We will organize the paper as follows: Section 2 will introduce the preliminary notations and definitions used in this paper. Section 3 will introduce the PageRank algorithm for the directed hypergraph. Section 4 will introduce the definitions of the un-normalized and symmetric normalized directed hypergraph Laplacian and their applications. Section 5 will show the experimental results. Section 6 will conclude this paper and discuss the future direction of researches. 2 Preliminary notations and definitions Given the directed hypergraph 𝐻 = (𝑉, 𝐸) where V is the set of vertices and E is the set of hyper- arcs. Each hyper-arc 𝑒 ∈ 𝐸 is written as 𝑒 = (𝑒𝑇𝑎𝑖𝑙, 𝑒𝐻𝑒𝑎𝑑). The vertices of e are denoted by 𝒆 = 𝑒𝑇𝑎𝑖𝑙 ∪ 𝑒𝐻𝑒𝑎𝑑. 𝑒𝑇𝑎𝑖𝑙 is called the tail of the hyper-arc e and 𝑒𝐻𝑒𝑎𝑑 is called the head of the hyper- arc e. Please note that 𝑒𝑇𝑎𝑖𝑙 ≠ ∅, 𝑒𝐻𝑒𝑎𝑑 ≠ ∅, 𝑒𝑇𝑎𝑖𝑙 ∩ 𝑒𝐻𝑒𝑎𝑑 = ∅. The directed hypergraph 𝐻 = (𝑉, 𝐸) can be represented by two incidence matrices 𝐻𝑇𝑎𝑖𝑙 and 𝐻𝐻𝑒𝑎𝑑. These two incidence matrices 𝐻𝑇𝑎𝑖𝑙 and 𝐻𝐻𝑒𝑎𝑑 can be defined as follows ℎ𝑇𝑎𝑖𝑙(𝑣, 𝑒𝑇𝑎𝑖𝑙) = {1 𝑖𝑓 𝑣 ∈ 𝑒𝑇𝑎𝑖𝑙 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) = {1 𝑖𝑓 𝑣 ∈ 𝑒𝐻𝑒𝑎𝑑 0 𝑜𝑡ℎ𝑒𝑟𝑤𝑖𝑠𝑒 Let 𝑤(𝑒) be the weight of the hyper-arc e. Let W be the diagonal matrix containing the weights of hyper-arcs in its diagonal entries. From the above definitions, we can define the tail and head degrees of the vertex v and the tail and head degrees of the hyper-arc e as follows 𝑑𝑇𝑎𝑖𝑙(𝑣) = ∑ 𝑤(𝑒)ℎ𝑇𝑎𝑖𝑙(𝑣, 𝑒𝑇𝑎𝑖𝑙) 𝑒∈𝐸 𝑑𝐻𝑒𝑎𝑑(𝑣) = ∑ 𝑤(𝑒)ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) 𝑒∈𝐸 𝑑𝑇𝑎𝑖𝑙(𝑒) = ∑ ℎ𝑇𝑎𝑖𝑙(𝑣, 𝑒𝑇𝑎𝑖𝑙) 𝑣∈𝑉 𝑑𝐻𝑒𝑎𝑑(𝑒) = ∑ ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) 𝑣∈𝑉 𝑇𝑎𝑖𝑙 , 𝐷𝑣 𝐻𝑒𝑎𝑑 , 𝐷𝑒 𝑇𝑎𝑖𝑙 , and 𝐷𝑒 𝐻𝑒𝑎𝑑 be four diagonal matrices containing the tail and head Let 𝐷𝑣 degrees of vertices and the tail and head degrees of hyper-arcs in their diagonal entries 𝑇𝑎𝑖𝑙 respectively. Please note that 𝐷𝑣 are the 𝑅𝐸∗𝐸 matrices. 3 PageRank algorithm for directed hypergraph 𝑇𝑎𝑖𝑙 are the 𝑅𝑉∗𝑉 matrices and 𝐷𝑒 𝐻𝑒𝑎𝑑 and 𝐷𝑣 𝐻𝑒𝑎𝑑 and 𝐷𝑒 From [4], we know that the transition probability of the random walk on directed hypergraph can be defined as follows 𝑝(𝑢, 𝑣) = ∑ 𝑤(𝑒) 𝑒∈𝐸 ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙) ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) 𝑑𝑇𝑎𝑖𝑙(𝑢) 𝑑𝐻𝑒𝑎𝑑(𝑒) From the above definition, the transition probability matrix P of the random walk on the directed hypergraph can be defined as follows 𝑃 = 𝐷𝑣 𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒 𝐻𝐻𝑒𝑎𝑑𝑇 𝐻𝑒𝑎𝑑−1 𝑇𝑎𝑖𝑙−1 Next, we need to prove that the row sum of P is 1. We have that ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙) ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) 𝑑𝑇𝑎𝑖𝑙(𝑢) 𝑑𝐻𝑒𝑎𝑑(𝑒) ∑ ℎ𝐻𝑒𝑎𝑑(𝑣, 𝑒𝐻𝑒𝑎𝑑) 𝑣∈𝑉 𝑑𝐻𝑒𝑎𝑑(𝑒) ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙) 𝑑𝑇𝑎𝑖𝑙(𝑢) ∑ 𝑝(𝑢, 𝑣) = ∑ ∑ 𝑤(𝑒) 𝑣∈𝑉 𝑣∈𝑉 𝑒∈𝐸 ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙) 1 = ∑ 𝑤(𝑒) 𝑒∈𝐸 𝑑𝑇𝑎𝑖𝑙(𝑢) = ∑ 𝑤(𝑒) 𝑒∈𝐸 1 𝑑𝑇𝑎𝑖𝑙(𝑢) = ∑ 𝑤(𝑒)ℎ𝑇𝑎𝑖𝑙(𝑢, 𝑒𝑇𝑎𝑖𝑙) 𝑒∈𝐸 = 1 So, we easily see that 𝑝(𝑢, 𝑣) ≥ 0, ∀𝑢, 𝑣 and ∑ , ∀𝑣. Then we can conclude that P is the stochastic matrix. Following the work from [1], the PageRank vector 𝜋 of the directed hypergraph is the left dominant eigenvector of the transition probability matrix P of the random walk on the directed hypergraph. In the other words, the PageRank vector 𝜋 of the directed hypergraph is the solution of the following equation 𝑝(𝑢, 𝑣) = 1 𝑣∈𝑉 𝜋𝑇 = 𝜋𝑇𝑃 Moreover, we know that the above equation can easily be solved by the Power method. 4 Directed hypergraph Laplacian In this section, we give two novel definitions of the directed hypergraph Laplacian which are un- normalized directed hypergraph Laplacian and symmetric normalized directed hypergraph Laplacian. Let S be the diagonal matrix containing all elements of PageRank vector 𝜋 of the directed hypergraph in its diagonal entries. The un-normalized directed hypergraph Laplacian can be defined as follows 𝐿 = 𝑆 − 𝑇𝑎𝑖𝑙 −1 𝑆𝐷𝑣 𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒 𝐻𝑒𝑎𝑑−1 𝐻𝐻𝑒𝑎𝑑𝑇 𝑇𝑎𝑖𝑙−1 + (𝐷𝑣 𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒 𝐻𝑒𝑎𝑑−1 𝐻𝐻𝑒𝑎𝑑𝑇 )𝑇𝑆 2 The symmetric normalized directed hypergraph Laplacian can be defined as follows 𝐻𝑒𝑎𝑑−1 𝐻𝑒𝑎𝑑−1 𝑇𝑎𝑖𝑙−1 𝑇𝑎𝑖𝑙−1 1 𝐻𝐻𝑒𝑎𝑑𝑇 𝑆− 2 + 𝑆− 1 2(𝐷𝑣 𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒 1 2𝐷𝑣 𝑆 𝐻𝑇𝑎𝑖𝑙𝑊𝐷𝑒 𝐻𝐻𝑒𝑎𝑑𝑇 )𝑇𝑆 1 2 𝐿𝑠𝑦𝑚 = 𝐼 − From these two definitions, we can develop the directed hypergraph Laplacian Eigenmaps algorithms, the spectral directed hypergraph clustering algorithms, and the directed hypergraph Laplacian based semi-supervised learning algorithms. These are our future works. 5 Experiments and Results 2 Datasets Due to the lack of the World Wide Web directed hypergraph datasets, we use the metabolic network dataset that is available from [5]. This metabolic network is itself the directed hypergraph. Thus, we don't need to transform it to the directed hypergraph. This metabolic network contains 72 metabolites (i.e. nodes of the directed hypergraph) and 95 reactions (i.e. hyper-arcs of the directed hypergraph). However, in the experiment, we just use 50 metabolites that are both in the head AND in the tail of some hyper-arcs. In the other words, we can avoid the case that the tail degree OR the head degree of the metabolite is zero. Moreover, we just use 75 reactions that the tail degree AND the head degree of the hyper-arc are not zero. In the other words, we set that 𝑒𝑇𝑎𝑖𝑙 ≠ ∅ AND 𝑒𝐻𝑒𝑎𝑑 ≠ ∅. Finally, we have the metabolic network (i.e. the directed hypergraph dataset) that has 50 metabolites (i.e. nodes of the dataset) and 75 reactions (i.e. hyper-arcs of the dataset). Experiments 𝑇𝑎𝑖𝑙, 𝐷𝑣 𝐻𝑒𝑎𝑑 , 𝐷𝑒 𝑇𝑎𝑖𝑙, and 𝐷𝑒 In the experiment, we initially construct 𝐻𝑇𝑎𝑖𝑙 and 𝐻𝐻𝑒𝑎𝑑 matrices. Then we can construct 𝐻𝑒𝑎𝑑 matrices. Finally, we can compute the transition probability 𝐷𝑣 matrix P of the random walk on the directed hypergraph. In order to obtain the PageRank vector of the directed hypergraph, we compute the left dominant eigenvector of the matrix P. The following table 1 and table 2 show the 10 highest rank values of 10 metabolites in the directed hypergraph and the names of these 10 metabolites that have highest ranks. Rank order Rank values 1 2 3 4 5 6 7 8 9 10 0.6366 0.2640 0.2321 0.2180 0.2087 0.2039 0.2006 0.1941 0.1798 0.1701 Table 1: The rank values of 10 highest ranks Rank order Names of 1 2 3 4 5 6 metabolites with highest ranks H Nicotinamide- adenine- dinucleotide- reduced ADP Phosphate ATP Nicotinamide- adenine- dinucleotide- phosphate H Pyruvate Nicotinamide- adenine- dinucleotide Coenzyme-A 7 8 9 10 Table 2: The names of 10 metabolites that have highest ranks 6 Conclusions In this paper, we develop the PageRank algorithm for the directed hypergraph. We successfully apply it to the metabolic network which is the directed hypergraph itself. This is the novel work not only in web mining field but also in bio-informatics field. In the future, we will develop the directed hypergraph Laplacian based semi-supervised learning in order to solve the spam detection problem since two directed hypergraph Laplacian was defined in this paper. Moreover, in the future, we will also try to develop the directed hypergraph p-Laplacian semi- supervised learning method. This method is worth investigated because of its hard nature and its close connection to PDE on directed hypergraph field. Acknowledgement This research is funded by Vietnam National University Ho Chi Minh City (VNU-HCM) under grant number B2018-20-07. References [1] Brin, Sergey, and Lawrence Page. "The anatomy of a large-scale hypertextual web search engine." Computer networks and ISDN systems 30.1-7 (1998): 107-117. [2] Bonato, Anthony. A course on the web graph. Vol. 89. American Mathematical Soc., 2008. [3] Ausiello, Giorgio, Paolo G. Franciosa, and Daniele Frigioni. "Directed hypergraphs: Problems, algorithmic results, and a novel decremental approach." Italian conference on theoretical computer science. Springer, Berlin, Heidelberg, 2001. [4] Ducournau, Aurélien, and Alain Bretto. "Random walks in directed hypergraphs and Image application semi-supervised Understanding 120 (2014): 91-102. [5] http://systemsbiology.ucsd.edu/Downloads/EcoliCore segmentation." Computer Vision and to image
1712.00139
3
1712
2018-02-22T23:30:47
The Size Conundrum: Why Online Knowledge Markets Can Fail at Scale
[ "cs.SI" ]
In this paper, we interpret the community question answering websites on the StackExchange platform as knowledge markets, and analyze how and why these markets can fail at scale. A knowledge market framing allows site operators to reason about market failures, and to design policies to prevent them. Our goal is to provide insights on large-scale knowledge market failures through an interpretable model. We explore a set of interpretable economic production models on a large empirical dataset to analyze the dynamics of content generation in knowledge markets. Amongst these, the Cobb-Douglas model best explains empirical data and provides an intuitive explanation for content generation through concepts of elasticity and diminishing returns. Content generation depends on user participation and also on how specific types of content (e.g. answers) depends on other types (e.g. questions). We show that these factors of content generation have constant elasticity---a percentage increase in any of the inputs leads to a constant percentage increase in the output. Furthermore, markets exhibit diminishing returns---the marginal output decreases as the input is incrementally increased. Knowledge markets also vary on their returns to scale---the increase in output resulting from a proportionate increase in all inputs. Importantly, many knowledge markets exhibit diseconomies of scale---measures of market health (e.g., the percentage of questions with an accepted answer) decrease as a function of number of participants. The implications of our work are two-fold: site operators ought to design incentives as a function of system size (number of participants); the market lens should shed insight into complex dependencies amongst different content types and participant actions in general social networks.
cs.SI
cs
The Size Conundrum: Why Online Knowledge Markets Can Fail at Scale Chase Geigle University of Illinois (UIUC) [email protected] Himel Dev University of Illinois (UIUC) [email protected] Qingtao Hu University of Illinois (UIUC) [email protected] 8 1 0 2 b e F 2 2 ] I S . s c [ 3 v 9 3 1 0 0 . 2 1 7 1 : v i X r a Jiahui Zheng Peking University [email protected] ABSTRACT In this paper, we interpret the community question answering web- sites on the StackExchange platform as knowledge markets, and analyze how and why these markets can fail at scale. A knowl- edge market framing allows site operators to reason about market failures, and to design policies to prevent them. Our goal is to pro- vide insights on large-scale knowledge market failures through an interpretable model. We explore a set of interpretable economic pro- duction models on a large empirical dataset to analyze the dynamics of content generation in knowledge markets. Amongst these, the Cobb-Douglas model best explains empirical data and provides an intuitive explanation for content generation through the concepts of elasticity and diminishing returns. Content generation depends on user participation and also on how specific types of content (e.g. answers) depends on other types (e.g. questions). We show that these factors of content generation have constant elasticity-a per- centage increase in any of the inputs leads to a constant percentage increase in the output. Furthermore, markets exhibit diminishing returns-the marginal output decreases as the input is incremen- tally increased. Knowledge markets also vary on their returns to scale-the increase in output resulting from a proportionate in- crease in all inputs. Importantly, many knowledge markets exhibit diseconomies of scale-measures of market health (e.g., the percent- age of questions with an accepted answer) decrease as a function of the number of participants. The implications of our work are two-fold: site operators ought to design incentives as a function of system size (number of participants); the market lens should shed insight into complex dependencies amongst different content types and participant actions in general social networks. CCS CONCEPTS • Information systems → Data mining; Social networks; KEYWORDS community question answering; knowledge market; content gener- ation; diseconomies of scale This paper is published under the Creative Commons Attribution 4.0 International (CC BY 4.0) license. Authors reserve their rights to disseminate the work on their personal and corporate Web sites with the appropriate attribution. WWW 2018, April 23–27, 2018, Lyon, France © 2018 IW3C2 (International World Wide Web Conference Committee), published under Creative Commons CC BY 4.0 License. ACM ISBN 978-1-4503-5639-8/18/04. https://doi.org/10.1145/3178876.3186037 Hari Sundaram University of Illinois (UIUC) [email protected] ACM Reference Format: Himel Dev, Chase Geigle, Qingtao Hu, Jiahui Zheng, and Hari Sundaram. 2018. The Size Conundrum: Why Online Knowledge Markets Can Fail at Scale. In WWW 2018: The 2018 Web Conference, April 23–27, 2018, Lyon, France. ACM, New York, NY, USA, 11 pages. https://doi.org/10.1145/3178876. 3186037 1 INTRODUCTION In this paper, we analyze a large group of community question answering (CQA) websites on StackExchange network through the Economic lens of a market. Framing StackExchange sites as knowledge markets has intuitive appeal: in a hypothetical knowl- edge market, if no one wants to answer questions, but only ask, or conversely, there are individuals who want to only answer but not ask questions, the "market" will collapse. What, then, is the required relationship among actions (say between questions and answers) in such a knowledge market for us to deem it healthy? Are larger markets with more participants healthier since there will be more people to ask and answer questions? Studying CQA websites through an economic lens allows site operators to reason about whether they should grow the user base. Since most of the popular CQA websites (e.g. Quora, StackExchange) do not charge participants, but instead depend on site advertise- ments for revenue, there is a natural temptation for operators of these sites to grow the user base so that there is increase in revenue. As we show in this paper, for most StackExchange sites, growth in the user base is counter-productive in the sense that they turn unhealthy-specifically, more questions remain unanswered. Explaining the macroscopic behavior of knowledge markets is important, yet challenging. One can regress some variable of in- terest (say number of questions) on variables including number of users, time spent in the website among others. However, explaining why the regression curve looks the way it does is hard. As we show in this work, using an economic lens of a market allows us to model dependencies between number of participants and the amount of content, and to predict the production of content. Our main contribution is to model CQA websites as knowledge markets, and to provide insight on the relationship between size and health of these markets. To this end, we develop models to capture content generation dynamics in knowledge markets. We analyze a set of basis functions (the functional form of how an input contributes to output) and interaction mechanisms (how the inputs interact with each other), and identify the optimal power basis function and the interactive essential interaction form using a prediction task on the outputs (questions, answers, and comments). This form is the well-known Cobb-Douglas form that connects production inputs with output. Using the best model fits for each StackExchange site, we show that the Cobb-Douglas model predicts the production of content with high accuracy. The Cobb-Douglas function provides an intuitive explanation for content generation in StackExchange markets. It demonstrates that, in StackExchange markets, (1) factors such as user participa- tion and content dependency have constant elasticity-percentage increase in any of these inputs will have constant percentage in- crease in output; (2) in many markets, factors exhibit diminishing returns-decrease in the marginal (incremental) output (e.g., answer production) as an input (e.g. number of people who answer) is incrementally increased, keeping the other inputs constant; (3) mar- kets vary according to their returns to scale-the increase in output resulting from a proportionate increase in all inputs; and (4) many markets exhibit diseconomies of scale-measures of health decrease as a function of overall system size (number of participants). There are two reasons why we see diminishing returns in the StackExchange markets. First, the total activity of participants for any StackExchange market unsurprisingly follows a power-law pattern. What is interesting is that the power-law exponent falls with increase in size for most markets, implying that new users do not participate in the same manner as earlier users. Second, we can identify a stable core of users who actively participate for long periods of time, contributing to the market health. Finally, we show diseconomies of scale through experiments on system size, analysis of health metrics, and user exchangeabil- ity. For most StackExchange markets, we see that as system size grows, the ratio of answers to questions falls below a critical point, when some questions go unanswered. Furthermore, using health metrics of the number of questions with an accepted answer, and the number of questions with at least one answer, we observe that most StackExchange markets decline in health with increase in size. Finally, we compare the top contributors with the bottom con- tributors to see if they are "exchangeable." Most StackExchange markets are not exchangeable in the sense the contributions of the top and the bottom contributors are qualitatively different and differ in absolute terms. These experiments on diseconomies of scale are consistent with the insight from Cobb-Douglas model of production that predicts diminishing returns. 2 RELATED WORK Our work draws from, and improves upon, several research threads. Sustainability. Srba and Bielikova [35] conducted a case study on why StackOverflow, the largest and oldest of the sites in StackEx- change network, is failing. They shed some insights into knowledge market failure such as novice and negligent users generating low quality content perpetuating the decline of the market. However, they do not provide a systematic way to understand and prevent failures in these markets. Wu et al. [41] introduced a framework for understanding the user strategies in a knowledge market-revealing the importance of diverse user strategies for sustainable markets. In this paper, we present an alternative model that provides many interesting insights including knowledge market sustainability. Activity Dynamics. Walk et al. [39] modeled user-level activity dynamics in StackExchange using two factors: intrinsic activity decay, and positive peer influence. However, the model proposed there does not reveal the collective platform dynamics, and the eventual success or failure of a platform. Abufouda [1] developed two models for predicting the interaction decay of community mem- bers in online social communities. Similar to Walk et al. [39], these models accommodate user-level dynamics, whereas we concentrate on the collective platform dynamics. Wu and Zhang [42] proposed a discrete generalized beta distribution (DGBD) model that reveals several insights into the collective platform dynamics, notably the concept of a size-dependent distribution. In this paper, we improve upon the concept of a size-dependent distribution. Economic Perspective. Kumar et al. [24] proposed an eco- nomic view of CQA platforms, where they concentrated on the growth of two types of users in a market setting: users who provide questions, and users who provide answers. In this paper, we concen- trate on a subsequent problem-the "relation" between user growth and content generation in a knowledge market. Butler [9] proposed a resource-based theory of sustainable social structures. While they treat members as resources, like we do, our model differs in that it concentrates on a market setting, instead of a network setting, and takes the complex content dependency of the platform into consideration. Furthermore, our model provides a systematic way to understand successes and failures of knowledge markets, which none of these models provide. Scale Study. Lin et al. [27] examined Reddit communities to characterize the effect of user growth in voting patterns, linguistic patterns, and community network patterns. Their study reveals that these patterns do not change much after a massive growth in the size of the user community. Yla et al. [44] investigated the effects of crowd size on solution quality in StackExchange com- munities. Their study uncovers three distinct levels of group size in the crowd that affect solution quality: topic audience size, ques- tion audience size, and number of contributors. In this paper, we examine the consequence of scale on knowledge markets from a different perspective by using a set of health metrics. Stability. Successes and failures of platforms have been studied from the perspective of user retention and stability [12, 16, 22, 30]. Notably, Patil et al. [30] studied the dynamics of group stability based on the average increase or decrease in member growth. Our paper examines stability in a different manner-namely, by consid- ering the relative exchangeability of users as a function of scale. User Growth. Successes and failures of user communities have also been widely studied from the perspective of user growth [6, 21, 25, 32, 45]. Kairam et al. [21] examined diffusion and non- diffusion growth to design models that predict the longevity of social groups. Ribeiro [32] proposed a daily active user prediction model which classifies membership based websites as sustainable and unsustainable. While this perspective is important, we argue that studying the successes and failures of communities based on content production can perhaps be more meaningful [23, 47, 48]. Modeling CQA Websites. There is a rich body of work that extensively analyzed CQA websites [3, 5, 10, 34, 40], along with user behavior [4, 19, 31, 38, 46], roles [15, 26], and content generation [7, 14, 43]. Notably, Yang et al. [43] noted the scalability problem of CQA-namely, the volume of questions eventually subsumes the capacity of the answerers within the community. Understanding and modeling this phenomenon is one of the goals of this paper. 3 PROBLEM FORMULATION The goal of this paper is to develop a model for content generation in knowledge markets. Content is integral to the success and failure of a knowledge market. Therefore, we aim to better understand the content generation dynamics. A model for content dynamics should have the following prop- erties: macro-scale, explanatory, predictive, minimalistic, compre- hensive. Macro-scale: The model should capture content generation dy- namics via aggregate measures. Aggregate measures help us un- derstand the collective market by summarizing a complex array of information about individuals, which is especially important for policy-making. Explanatory: The model should be insightful about the behavior of a knowledge market. Understanding market behavior is a crucial first step in designing policies to maintain a resilient, sustainable market. Predictive: The model should allow us to make predictions about future content generation and resultant success or failure. These market predictions are integral to the prevention and mitigation of market failures. Minimalistic: The model should have as few parameters as nec- essary, and still closely reflect the observed reality. Comprehensive: The model should encompass content genera- tion dynamics for different content types (e.g., question, answer, comment) in varieties of knowledge markets. This is important for developing a systematic way to understand the successes and failures of knowledge markets. In remaining sections we propose models that meet the aforemen- tioned requirements, and show that our best-fit model accurately reflects the content generation dynamics and resultant successes and failures of real-world knowledge markets. 4 MODELING KNOWLEDGE MARKETS In this section, we introduce economic production models to cap- ture content generation dynamics in real-world knowledge markets. We first draw an analogy between economic production and content generation, and report the content generation factors in knowledge markets (Section 4.1). Then, we concentrate on the knowledge mar- kets in StackExchange-presenting production models for different content types (Section 4.2). 4.1 Preliminaries Economic production mechanisms well describe content generation in knowledge markets. In economics, production is defined as the process by which human labor is applied, usually with the help of tools and other forms of capital, to produce useful goods or services- the output [36]. We assert that participants of a knowledge market function as labor to generate content such as questions and answers. Analogous to economic output, content contributes to participant utility. Motivated by the production analogy, we design macroeconomic production models to capture content generation dynamics in knowledge markets. In these models, instead of directly model- ing content generation as a dynamic process (function of time), we model it in terms of associated factors which are dynamic. There are two key factors that affect content generation in knowl- edge markets, namely user participation and content dependency. User participation is the most important factor in deciding the quantity of generated content. The participation of more users in- duce more questions, answers, and other contents in a knowledge market. Content dependency also affects the quantity of gener- ated content for different types. Content dependency refers to the dependency of one type of content (e.g., answers) on other type of content (e.g., questions). In absence of questions, there will be no answers in a knowledge market, even in the presence of many potential participants who are willing to answer. 4.2 Modeling StackExchange StackExchange is a network of community question answering websites where each site is based on a focused topic. Each user of the StackExchange network participates in one or more of these sites based on their interests. StackExchange sites are free knowledge markets where participants generate content for non-monetary reputation-based incentives. These markets are diverse, varying in theme (subject matter), size (number of users and amount of activity), and age (number of days in existence). We design production models for three primary content types in StackExchange: questions (the root content), answers (which nest below questions), and comments (which can nest either beneath questions or answers). Based on the content dependency and user roles in content generation, we propose the following relationships for question, answer and comment generation in StackExchange (see Table 1 for notation). Table 1: Notation used in the model Symbol Definition Uq(t) Ua(t) Uc(t) Nq(t) Na(t) q c (t) N N a c (t) Nc(t) fx # of users who asked questions at time t # of users who answered questions at time t # of users who made comments at time t # of active questions at time t # of answers to active questions at time t # of comments to active questions at time t # of comments to active answers at time t # of comments to active questions/answers at time t The functional relationship for content type x There is a single factor in generating Nq questions: the number of users Uq who ask questions (askers). Nq = fq(Uq) There are two key factors in generating Na answers: the number of questions Nq, and the number of users Ua who answer questions (answerers). Na = fa(Nq , Ua) There are two types of comments: comments on questions, and comments on answers. Accordingly, there are three key factors in generating Nc comments: the number of questions Nq, the number of answers Na, and the number of users Uc who make comments (commenters). N q c = fcq(Nq , Uc) N a c = fc a(Na, Uc) q c + N a Nc = N c The aforementioned relationships imply that the amount of gen- erated content of each type depends on the function describing its factor dependent growth, and the availability of factor(s). These relationships make three assumptions. First, different content types interact only through their use of factors. Second, the functional relationships depend on the consumption or usage of each factor. Third, the functional relationships depend on the interaction among the factors-how the factors of a particular content type interact. Now, we transform the functional relationships into production models by first choosing a basis function to capture how a content type consumes its factor(s), and then choosing an interaction type to capture the interaction among factors. Basis Function. We use a basis function to capture the effect of a given factor on a particular content type. While there is a variety of basis functions available for regression, we consider three basis functions widely used in economics and growth mod- eling [13]: power- д(x) = ax λ; exponential- д(x) = abx ; and sigmoid- д(x) = Interaction among the Factors. We use an aggregate function to capture the interaction among multiple factors of a given content type. Specifically, we consider the pairwise interaction functions listed in Table 2. 1+e k(x−x0) L . λ1 q , a2U We combine a basis function and an interaction type to design production models for different content types. For example, answer generation can be modeled using power basis and essential interac- λ2 tion as Na = min(a1N a ). We consider twelve such possible models (combination of three basis and four interaction type) for answer and comment generation in StackExchange. User Role Distribution. A fundamental assumption of our model is the awareness of user roles (e.g., asker, answerer, and com- menter) and their distribution (e.g., how many users are askers?). We empirically observe that all StackExchange markets have a sta- ble distribution of user roles. In fact, given the number of users, we can accurately predict the number of participants for each role. We apply linear regression to determine the number of partic- ipants Ux of a particular role x ∈ {q, a, c} from the number of users U in a StackExchange market. For each market, we compute three distinct coefficients of determination, R2, for predicting three roles (asker, answerer, and commenter) using linear regression. In Figure 1 we show the distribution of R2 for regressing user roles across 156 StackExchange markets. We use letter value plots1 to present these distributions-showing precise estimates of their tail behavior. We observe that, in most markets, the R2 values are close to 1. Further, the tail capturing low R2 values consists of markets with a relatively small number of monthly users. Number of Users. The number of users is the only free input to our content generation models; the remaining inputs are functions of the number of users. In all these models, the growth or decline of number of users is exogenous-determined outside the model, by non-economic forces. 1The letter-value plot display information about the distribution of a variable [20]. It conveys precise estimates of tail behavior using letter values; boxplots lack such precise estimation. Table 2: Pairwise interaction between factors with contour Essential: Essential factors are both re- quired for content generation, with zero marginal return for a single factor. For a pair of essential factors, content gen- eration is determined by the more limit- ing factor: z = min(y1, y2) [37]. This is known as Liebig's law of the minimum. Interactive Essential: In interactive es- sential interaction, we get diminishing return (instead of zero return) for a sin- gle factor: z = y1y2 [37]. If factors are consumed using power basis function, i.e., yi = ax λ i , it captures Cobb-Douglas production function. Antagonistic: For antagonistic factors, content generation is determined solely by the availability of the fac- tor which yields the largest return: z = max(y1, y2) [37]. This interaction implies that the production process has maximum possible efficiency. Substitutable: Factors that can each sup- port production on their own are sub- stitutable relative to each other: z = w1y1+w2y2 [37]. This implies that there exists some equivalence between the two factors. This is analogous to the general additive models. Figure 1: The distribution of coefficient of determination, R2, for regressing user roles across 156 StackExchange. In most StackExchange, the role distribution is stable-as man- ifested by the arrangement of R2 in letter-value plots. 5 DATASET We collected the latest release (September, 2017) of the StackEx- change dataset. This snapshot is a complete archive of all activities in StackExchange sites. There are 169 sites in our collected dataset. 012345y1012345y2z=1z=2z=3z=min(y1,y2)012345y1012345y2z=1z=2z=3z=y1y2012345y1012345y2z=5z=4z=3z=max(y1,y2)012345y1012345y2z=1z=3z=5z=y1+y2AnswererAskerCommenter0.00.20.40.60.81.0Coe(cid:29).ofDetermination,R2 For the purpose of empirical analysis, we only consider the sites that have been active for at least 12 months beyond the ramp up period (site created, but few or no activity). There are 156 such sites. The age of these sites vary from 14 months to 111 months, number of users from 1,072 to 547,175, and the number of posts (questions and answers) from 1,600 to 1,985,869. Further, the sites have small overlaps in user base; therefore, we can reasonably argue that the underlying markets are independent. Figure 2: The log-scale distribution of number of months (age), number of users, and number of posts for 156 Stack- Exchange sites. In Figure 2 we present letter value plots (in log-scale) to show the distribution of number of months (age), number of users, and number of posts for 156 StackExchange sites. 6 EVALUATING OUR PROPOSED MODELS In this section, we identify optimal models (basis and interaction) based on the accuracy of fitting content generation time series observed in our dataset (Section 6.1), and evaluate the performance of the optimal models in predicting content volume in long run (Section 6.2). 6.1 Model Fitting We fit each variant of production model (basis and interaction), for each content type, to the observed content generation time series (monthly granularity), in each StackExchange site. Notice that among the different variants of production models, the models using power or exponential basis have a parsimonious set of pa- rameters. For example, answer generation model using power basis function requires only three parameters for interactive essential interaction (See Section 4.2), and four parameters for remaining in- teraction types. In contrast, answer generation model using sigmoid basis function requires five parameters for interactive essential in- teraction, and six parameters for remaining interaction types. Parameter Estimation. We learn the best-fit parameters for capturing the observed content generation time series. We restrict some parameters of our production models to be non-negative, e.g., non-negative exponents in power basis. These restrictions are important because the underlying factors positively affect the output. We use the trust-region reflective algorithm [8] to solve our constrained least square optimization problem. The algorithm is appropriate for solving non-linear least squares problems with constraints. (cid:113) 1 T T RMSE ; AIC = T ∗ln( 1 Evaluation Method. We evaluate fitting accuracy using four metrics: root mean square error (RMSE), normalized root mean square error (NRMSE), explained variance score (EVS), and Akaike information criterion (AIC). Given two series for each content type, T the observed series N(t), and the prediction N(t) of the series by a model with k parameters, we compute the four metrics as follows: T t =1(N(t) − N(t))2; NRMSE = RMSE = ; max(N(t))−min(N(t)) EVS = 1− V ar(N(t)− N(t)) t =1(N(t)− N(t))2) + 2k. V ar(N(t)) Among the four metrics, RMSE and NRMSE are error metrics (low value implies good fit), AIC is an information theoretic metric to capture the trade-off between model complexity and goodness-of- fit (low value implies good model), and EVS refers to a model's ability to capture variance in data (high value implies good model). Fitting Results. We compare the fitting accuracy of production models for all StackExchange sites using the four metrics. Each metric is summarized via the mean, across all sites, for each con- tent type. We use content generation time series with monthly granularity as observed data. We found that the models with the exponential and sigmoid basis functions do not fit the data for many StackExchange sites. Accordingly, in Table 3 we only present the results for production models with the power basis and different interaction types. Notice that the models with interactive essen- tial interaction outperform the remaining models for all metrics and content types. We performed paired t-tests to determine if the improvements for interactive essential interaction are statistically significant; the results are positive with p < 0.01. Table 3: The comparison of fitting accuracy of production models (with power basis and different interaction types) for all StackExchange sites. The models with interactive es- sential interaction outperform the remaining models for all metrics and content types. The improvements for interac- tive essential interaction are statistically significant, vali- dated via paired t-tests, where p < 0.01. Content Question Answer Comment Interaction Type Single Factor Essential I. Essential Antagonistic Substitutable Essential I. Essential Antagonistic Substitutable Avg. Avg. RMSE NRMSE 25.74 70.31 64.62 72.77 68.90 146.64 137.23 155.97 155.43 0.09 0.09 0.08 0.09 0.09 0.08 0.08 0.09 0.09 Avg. EVS 0.79 0.79 0.83 0.78 0.81 0.83 0.85 0.82 0.82 Avg. AIC 104.47 208.82 196.39 210.96 207.61 328.25 318.24 334.12 335.10 Thus we use production models with power basis and interactive essential interaction for prediction tasks. 6.2 Forecasting Content Generation We apply production models with power basis and interactive es- sential interaction to forecast content volume in long run-one #ofMonths101102#ofUsers103104105106#ofPosts103104105106 year ahead in the future. Specifically, we train each model using the content generation data from the first 12 months (beyond the ramp period), and then examine how well the model forecasts con- tent dynamics in the next 12 months. We validate the forecasting capability by examining the overall prediction error (NRMSE). We compute the prediction NRMSE across all StackExchange sites, and summarize the results using the mean (µ) and variance (σ)- (i) question: µ = 0.11, σ = 0.08; (ii) answer: µ = 0.12, σ = 0.09; (iii) comments: µ = 0.11, σ = 0.10. Notice that our models can forecast future content dynamics with high accuracy. We performed these experiments for different time granularity, e.g., week, month, quarter, and reached a consistent conclusion. We do not report these results for brevity. 7 CHARACTERIZING KNOWLEDGE MARKETS In this section, we characterize the knowledge markets in Stack- Exchange. We explain the best-fit models and their foundations (Section 7.1), reveal two key distributions that control the markets (Section 7.2), and uncover the stable core that maintains market equilibrium (Section 7.3). 7.1 Model Interpretation First, we explain the best-fit models found in Section 6.1. We observe that content generation in StackExchange markets are best modeled through the combination of power basis and interactive essential interaction. In addition, we found that the best-fit exponents (λ parameter in basis д(x) = ax λ, where x is a factor) of these models lie between 0 and 1 (inclusive), for all factors of all content types, for all StackExchange markets. A model that uses the power basis (where exponents lie between 0 and 1) and interactive essential interaction is known as the Cobb- Douglas production function [18]. In its most standard form for production of a single output z with two inputs x1 and x2, the function is: z = ax λ1 1 x λ2 2 . Here, the coefficient a represents the total factor productivity-the portion of output not explained by the amount of inputs used in production [18]. As such, its level is determined by how efficiently the inputs are utilized in production. The exponents λi represent the output elasticity of the inputs-the percentage change in output that results from the percentage change in a particular input [18]. The Cobb-Douglas function provides intuitive explanation for content generation in StackExchange markets. In particular, the explanation stands on three phenomena or principles: constant elasticity, diminishing returns, and returns to scale. Constant Elasticity. In StackExchange markets, factors such as user participation and content dependency have constant elas- ticity-percentage increase in any of these inputs will have con- stant percentage increase in output [18], as claimed by the cor- responding exponents in the model. For example, in academia (Na = 6.93N 0.18 ), a 1% increase in number of answerers (Ua) leads to a 0.65% increase in number of answers (Na). Diminishing Returns. For a particular factor, when the expo- nent is less than 1, we observe diminishing returns-decrease in q U 0.65 a the marginal (incremental) output as an input is incrementally in- creased, while the other inputs are kept constant [18]. This "law of diminishing returns" has many interesting implications for the StackExchange markets, including the diminishing benefit of hav- ing a new participant in a market. For example, in academia, if the number of answerers is 100, then the marginal contribution of a new answerer is c(1010.65−1000.65) = 0.129c, where c is a constant; in contrast, if the number of answerers is 110, then the marginal contribution of a new answerer is c(1110.65 − 1100.65) = 0.125c. Thus, for answer generation in academia, including a participant when the number of participants (system size) is 110 is likely to be less beneficial compared to including a participant when the system size is 100. Returns to scale. The knowledge markets in StackExchange vary in terms of scale efficiency, as manifested by their returns to scale-the increase in output resulting from a proportionate increase in all inputs [18]. If a market has high returns to scale, then greater efficiency is obtained as the market moves from small- to large- scale operations. For example, in academia, for answer generation, the returns to scale is 0.18 + 0.65 = 0.83 < 1. The market becomes less efficient as answer generation is expanded, requiring more questions and answerers to increase the number of answers by same amount. 7.2 Two Key Distributions Next, we discuss two key distributions that control content genera- tion in knowledge markets, namely participant activity and subject POV (perspective). These two distributions induce the three phe- nomena reported in section 7.1. Participant Activity. The distribution of participant activities implicitly drives a market's return in terms of user participation, as manifested by the corresponding exponent. For example, in a hypothetical knowledge market where each answerer contributes equally, the answer generation model should be Na = AN a . In reality, the distribution of participant activities is a size dependent distribution controlled by the number of participants (system size). As the system size increases, most participants contribute to the head of the distribution (few activities), whereas very few join the tail (many activities). q U 1.0 λ1 Figure 3: The visibility of size dependent distribution: strong-android; moderate-apple; and weak-biology. In most StackExchange markets, the power-law exponent de- creases with system size, similar to android. In other mar- kets, there exists a non-zero correlation between system size and power-law exponent. 100200300400500#ofUsers,U-1.8-1.6-1.4-1.2-1.0-0.8Power-lawExp.,αandroid2004507009501200#ofUsers,Uapple5080110140170#ofUsers,Ubiology We systematically reveal the size dependent distribution for participant activities in three steps. First, we empirically a fit power- law distribution to the activities of participants in a month, for each month, for each StackExchange market. We follow the standard procedure to fit a power-law distribution [2]. We observe that the power-law well describes the monthly activity distributions. Second, we plot the exponents of the power-law against the number of participants for all observed months in a market, for each market in StackExchange. We observe that for most StackExchange markets, the power-law exponent decreases as the system size increases. Third, we apply linear regression to reveal the relationship between power-law exponent and system size. We observe that in general power-law exponent is negatively correlated with system size. This negative correlation is strongly visible in big knowledge markets that have at least 500 monthly participants in each month. In Figure 3 we present empirical evidence of the size dependent distribution for answer generation in three StackExchange markets: android, apple, and biology. We choose these examples to cover three possible visibilities of the size dependent distribution, as manifested by the correlation between the power-law exponent and system size-strong correlation (r2 ≥ 0.5), moderate correlation (0.3 ≤ r2 < 0.5), and weak correlation (r2 < 0.3). Subject POV. The distribution of subject POV implicitly drives a market's return in terms of content dependency, as manifested by the corresponding exponent. Subject POV refers to the num- ber of distinct perspectives on a particular content (e.g., questions) that imposes a conceptual limit to the number of dependent con- tents (e.g., answers). For example, an open-ended question such as 'What's your favorite book?' has many possible answers, whereas a close-ended question such as 'What's the solution for 3x+5 = 2?' has a single correct answer. In reality, most questions are neither completely open-ended nor completely closed; however, from an answerer's perspective, there's a diminishing utility in answering a question that already has an answer. This diminishing utility varies from question to question-questions asking for recommen- dations attract many answers, whereas questions seeking factual information attract few answers. 7.3 Uncovering the Stable Core We uncover a stable user community in each StackExchange market, that maintains the dynamic equilibria-the increase or decrease in overall user community does not affect the Cobb-Douglas models. We assert that this stable user community generates a large fraction of high-threshold contents that require more effort, e.g, answers and comments, whereas the remaining users are unstable and contribute a small fraction of high-threshold contents. We reveal the presence of the stable core by summarizing the answer contribution of users with different tenure levels (# of active months). First, for each StackExchange market, we apply equal- width binning to categorize its users into five tenure levels. Then, we plot the distribution of monthly answer contribution by the users of each category using a letter-value plot. We present the letter-value plots for android in Figure 4. We observe that monthly answer contribution is an increasing function of tenure level-the users who contribute for many months also contribute a large number of answers. Figure 4: The distribution of monthly answer contribution of users with different # of active months, for android. The users who contribute for many months also contribute a large number of answers. 8 FAILURES AT SCALE In this section, we discuss how and why knowledge markets may fail at scale. We first empirically examine diseconomies of scale (Section 8.1), then analyze the effects of scale on market health (Section 8.2), and finally study user exchangeability under scale changes (Section 8.3). 8.1 Diseconomies of Scale First, we examine disceconomies of scale-the ratio of answers to questions declining with the increase in number of users. The opposite of diseconomies is economies, when the ratio increases with the increase in number of users. The concept of diseconomies is important because a decrease in the answer to question ratio implies an increase in the gap between market supply (answer) and demand (question). In fact, if the ratio falls below 1.0, the gap becomes critical-guaranteeing there will be some questions with no answers. In Figure 5 we present the economies and diseconomies of scale in three StackExchange markets: cstheory, puzzling and supe- ruser. We choose these examples to cover three cases: strong dis- economies, strong economies, and weak economies. Among the three markets, superuser shows strong diseconomies of scale: if Figure 5: Diseconomies/economies of scale: the ratio of answers to questions decreasing/increasing with the in- crease in number of users. Most StackExchange mar- kets exhibit diseconomies of scale. Examples: strong diseconomies-superuser; weak economies-puzzling; and strong economies-cstheory. 1-130102030#ofAnswers14-2627-39#ofMonthsandroid40-5253-6520003500500065008000#ofUsers,U0.61.32.02.73.4Econ.Ratio,Na/qsuperuserCobb-Douglas2004006008001000#ofUsers,UpuzzlingCobb-Douglas100150200250300#ofUsers,UcstheoryCobb-Douglas the number of users increases by 1%, then the answer to question ratio declines by 0.95%. The other two markets show economies of scale, where cstheory shows strong economies: if the number of users increases by 1%, then the answer to question ratio increases by 0.8%; and puzzling shows weak economies: if the the number of users increases by 1%, then the answer to question ratio increases by 0.2%. Note that most markets, especially the ones with more than 500 monthly active participants, exhibit diseconomies of scale similar to superuser. Only five markets exhibit strong economies of scale in StackExchange: cstheory, expressionengine, puzzling, ja_stackoverflow, and softwareengineering. The Cobb-Douglas curves well fit the empirical trends of economies and diseconomies (as shown in Figure 5). We derive these curves by dividing the answer models by the corresponding question models, and subsequently developing curves that capture economies and diseconomies (Na/q) as a function of number of users (system size). We get similar curves via log regression. Between the two model types, the Cobb-Douglas models provide better explanation. The Cobb-Douglas models well explain the economies and dis- ceconomies of scale. As per the models, the primary cause of dis- ceconomies is the difference between the diminishing returns of questions and answers for user participation. In other words, in most markets, for user input, the marginal question output is higher compared to the marginal answer output, i.e., an average user is likely to ask more questions and provide few answers. This causes the ratio of answers to questions to decline with an increase in the number of users. 8.2 Analyzing Health Next, we examine the disadvantage of scale through two health metrics: H1-the fraction of answered questions (questions with at least one answer); and H2-the fraction of questions with an accepted answer (questions for which the asker marked an answer as accepted). H1 and H2 capture the true gap between market supply (answers) and demand (questions). An increase in the number of users may cause a decline in H1 and H2, as both metrics are related to the ratio of answers to questions. In fact, if the ratio falls below 1.0, it guarantees the decline of both metrics. In Figure 6 we present the health advantage and disadvantage of scale (through H1 and H2) for three StackExchange markets: cstheory, puzzling and superuser. We observe that the results are consistent with our analysis of economies and diseconomies- cstheory exhibits health advantage at scale, puzzling remains stable, whereas superuser exhibits disadvantage at scale. These three examples cover the possible health effects of scale in knowl- edge markets. 8.3 Effects on Exchangeability Finally, we empirically study the effects of scale on user exchange- ability. By exchangeability, we specifically mean the gap between the top contributors and other participants in a knowledge market. Studying this gap is important because it can reveal if a market's success or failure depends on a small group of users. To empirically study user exchangeability, we define two metrics that reflect the gap between the top contributors and other par- ticipants in a knowledge market. Note that, we only consider the Figure 6: Health disadvantage/advantage of scale: H1- the fraction of answered questions, and H2-the fraction of questions with accepted answer, decreasing/increasing with the increase in number of users. Most StackEx- change markets exhibit health disadvantage at scale. Ex- amples: disadvantage-superuser; neutral-puzzling; and advantage-cstheory. active participants who contributed at least one content. The first metric E1 is defined as the ratio of contribution between the top 5% and the bottom 5% of users. For computing E1, we measure the contribution of a user v as the ratio N v a/q of the number of answers N v a provided by the user to the number of questions N v q asked by the user. Notice that E1 is a ratio based metric and we define user contribution to be consistent with this metric. The second metric E2 is defined as the sum of two distances: (i) the distance between Figure 7: User exchangeability under scale: the gap (E1 and E2) between the top contributors and other partici- pants in a knowledge market decreasing or increasing with the increase in number of users. Most markets exhibit a large gap between the top contributors and other partici- pants. Examples: high dissimilarity-superuser; moderate dissimilarity-puzzling; and low dissimilarity-cstheory. 200035005000650080000.20.40.60.81.0HealthMetric,H1superuser2004006008001000puzzling100150200250300cstheory20003500500065008000#ofUsers,U0.20.40.60.81.0HealthMetric,H22004006008001000#ofUsers,U100150200250300#ofUsers,U200035005000650080001030507090Exch.Metric,E1superuser2004006008001000puzzling100150200250300cstheory20003500500065008000#ofUsers,U1030507090Exch.Metric,E22004006008001000#ofUsers,U100150200250300#ofUsers,U the contribution of the top 5% of users and the median 5% of users, and (ii) the distance between the contribution of the median 5% of users and the bottom 5% of users. For computing E2, we measure the contribution of a user v as a tuple < N v q >, consisting of the number of answers N v a provided by the user and the number of questions N v q asked by the user. Notice that E2 is an interval based metric and we define user contribution to be consistent with this metric. While both metrics have certain limitations, e.g., they are sensitive to outliers, these metrics allow us to comprehend user exchegeability to some extent. a , N v In Figure 7 we present the exchangeability of users under scale changes (through E1 and E2) for three StackExchange markets: cstheory, puzzling and superuser. Among the three markets, superuser exhibits the highest gap between the top contributors and the other participants. However, as the number of participants increases, this gap decreases, i.e., the users become more exchange- able. In contrast, cstheory exhibits the lowest gap between the top contributors and the other participants. However, as the number of participants increase, this gap increases, i.e., the users become less exchangeable. 9 IMPLICATIONS Our work promotes two new research directions-size-dependent mechanism design and content dependency in social media-while advancing several others-metrics of market health, power law of participation, and microfoundations of knowledge markets. Size-Dependent Mechanism Design. We reveal that the health of a knowledge market depends on the market's size. A natural implication of this dependency is that site operators should adjust mechanisms based on the number of participants. For example, a site operator can decide between retaining existing users (via incentives) and attracting new users (via advertising) based on the number of participants and their activity distribution. Content Dependency in Social Media. We observe that many social media platforms support several possible user actions with "complex dependencies". For example, in Facebook, a post is the root content (primary), comments on the post nest below the post (secondary), and replies to these comments nest beneath the origi- nal comments (tertiary). Further, a user can react to any of these content types with several possible reactions. Overall user activ- ity in Facebook is distributed across these possible actions with complex dependencies, which drives the platform's health. Metrics of Market Health. We demonstrate the presence of diseconomies of scale with several metrics that partially capture the health of a knowledge market. While we concentrate on content- generation based production metrics, our concepts can be extended for page-view based consumption metrics as well. Also, there is room for developing new health metrics that capture a more de- tailed picture of a knowledge market's health including market efficiency-the degree to which market price (amount of responses and reactions) is an unbiased estimate of the true value of the investment (user effort in content generation) [11]. Power Law of Participation. In StackExchange markets, a small fraction of the user community participate in high-engagement activities (e.g., linking similar questions), whereas the larger fraction participate in low-threshold activities (e.g., voting). This asymme- try leads to a Power Law of Participation [29]. We assert that both low-threshold and high-engagement activities are required for a knowledge market's survival, and should proportionately increase with the increase in number of participants. However, in reality, for most knowledge markets, the size of the user community con- tributing high-engagement activities does not scale with the system size. This creates a "gap" between market supply and demand, and consequently affects market health. Microfoundations of Knowledge Markets. The size-dependent distribution of user contribution implies that users who join a com- munity later in its lifecycle exhibit different behavior than those who were present from the beginning. This very well may imply that the distribution of individual user behaviors (not just their over- all production) is "also" a function of the system size. We should expect to see a stable user behavior distribution over time for mar- kets that appear to be more scale-insensitive; preliminary results suggest that this may indeed be the case [17]. 10 LIMITATIONS We discuss several limitations of our work. First, the economic production models do not account for user growth. While there exist several user growth models for two-sided markets [24], mem- bership based websites [32], and online social networks [6, 21, 45], it would be useful to introduce economic user growth models that complement our proposed content generation models. Specifically, there is a need to develop resource-based user growth models that account for market health. A potential direction in this research is to extend the Malthusian growth model [28]. Second, the pro- posed production models inherit the fundamental assumptions of macroeconomics: an aggregate is homogeneous (without look- ing into its internal composition), and aggregates are functionally related etc. [33]. It would be useful to empirically study these as- sumptions for real-world knowledge markets. 11 CONCLUSION In this paper, we examined the CQA websites on StackExchange platform through an economic lens by modeling them as knowl- edge markets. In particular, we designed a set of production models to capture the content generation dynamics in these markets. The resulting best-fit model, Cobb-Douglas, predicts the production of content in StackExchange markets with high accuracy. We showed that the model provides intuitive explanations for content genera- tion. Specifically, it reveals that factors of content generation such as user participation and content dependency have constant elastic- ity; in many markets, factors exhibit diminishing returns; markets vary according to their returns to scale; and finally many markets exhibit diseconomies of scale. We further investigated these prog- noses by showing the presence of diseconomies of scale in terms of content production, and several measures of market health. The implications of our work are two-fold: site operators need to design incentives as a function of number of participants; there is a need to develop Economic lenses that can shed insights into the com- plex dependencies amongst different content types and participant actions in general social networks. REFERENCES [1] Mohammed Abufouda. 2017. Community Aliveness: Discovering Interaction Decay Patterns in Online Social Communities. CoRR abs/1707.04477 (2017). arXiv:1707.04477 http://arxiv.org/abs/1707.04477 [2] Lada A Adamic. 2000. Zipf, power-laws, and pareto-a ranking tuto- rial. Xerox Palo Alto Research Center, Palo Alto, CA, http://ginger. hpl. hp. com/shl/papers/ranking/ranking. html (2000). [3] Lada A. Adamic, Jun Zhang, Eytan Bakshy, and Mark S. Ackerman. 2008. Knowl- edge Sharing and Yahoo Answers: Everyone Knows Something. In Proceedings of the 17th International Conference on World Wide Web (WWW '08). ACM, New York, NY, USA, 665–674. https://doi.org/10.1145/1367497.1367587 [4] Pal Aditya, Chang Shuo, and Konstan Joseph, A. 2012. Evolution of Experts in Question Answering Communities. In Proceedings of the 6th International AAAI Conference on Weblogs and Social Media. [5] Ashton Anderson, Daniel Huttenlocher, Jon Kleinberg, and Jure Leskovec. 2012. Discovering Value from Community Activity on Focused Question Answering Sites: A Case Study of Stack Overflow. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '12). ACM, New York, NY, USA, 850–858. https://doi.org/10.1145/2339530.2339665 [6] Lars Backstrom, Dan Huttenlocher, Jon Kleinberg, and Xiangyang Lan. 2006. Group Formation in Large Social Networks: Membership, Growth, and Evolution. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06). ACM, New York, NY, USA, 44–54. https: //doi.org/10.1145/1150402.1150412 [7] Ricardo Baeza-Yates and Diego Saez-Trumper. 2015. Wisdom of the Crowd or Wisdom of a Few?: An Analysis of Users' Content Generation. In Proceedings of the 26th ACM Conference on Hypertext &#38; Social Media (HT '15). ACM, 69–74. https://doi.org/10.1145/2700171.2791056 [8] Mary Ann Branch, Thomas F Coleman, and Yuying Li. 1999. A subspace, interior, and conjugate gradient method for large-scale bound-constrained minimization problems. SIAM Journal on Scientific Computing 21, 1 (1999), 1–23. [9] Brian S Butler. 2001. Membership size, communication activity, and sustainability: A resource-based model of online social structures. Information systems research 12, 4 (2001), 346–362. [10] Yan Chen, TECK-HUA HO, and YONG-MI KIM. 2010. Knowledge market design: A field experiment at Google Answers. Journal of Public Economic Theory 12, 4 (2010), 641–664. [11] Aswath Damodaran. 2002. Investment Valuation: Tools and Techniques for Deter- mining the Value of Any Asset. Wiley. [12] Katherine Ellis, Moises Goldszmidt, Gert Lanckriet, Nina Mishra, and Omer Reingold. 2016. Equality and Social Mobility in Twitter Discussion Groups. In Proceedings of the Ninth ACM International Conference on Web Search and Data Mining (WSDM '16). ACM, New York, NY, USA, 523–532. https://doi.org/10.1145/ 2835776.2835814 [13] Desta Fekedulegn, Siútáin Mártín Pádraig Mac, and Jim J. Colbert. 1999. Parameter Estimation of Nonlinear Models in Forestry. Finnish Society of Forest Science and the Finnish Forest Research Institute (1999). [14] Emilio Ferrara, Nazanin Alipourfard, Keith Burghardt, Chiranth Gopal, and Kristina Lerman. 2017. Dynamics of Content Quality in Collaborative Knowledge Production. In Proceedings of the Eleventh International Conference on Web and Social Media, ICWSM 2017, Montréal, Québec, Canada, May 15-18, 2017. 520–523. [15] Adabriand Furtado, Nazareno Andrade, Nigini Oliveira, and Francisco Brasileiro. 2013. Contributor Profiles, Their Dynamics, and Their Importance in Five Q&A Sites. In Proceedings of the 2013 Conference on Computer Supported Cooperative Work (CSCW '13). ACM, 1237–1252. https://doi.org/10.1145/2441776.2441916 [16] David Garcia, Pavlin Mavrodiev, and Frank Schweitzer. 2013. Social Resilience in Online Communities: The Autopsy of Friendster. In Proceedings of the First ACM Conference on Online Social Networks (COSN '13). ACM, New York, NY, USA, 39–50. https://doi.org/10.1145/2512938.2512946 [17] Chase Geigle, Himel Dev, Hari Sundaram, and Chengxiang Zhai. 2018. Discovering and Analyzing Action-Based Roles in Community Question Answering Networks. Technical Report. [18] Glossary of economics. 2017. Glossary of economics - Wikipedia, The Free (2017). https://en.wikipedia.org/wiki/Glossary_of_economics Encyclopedia. [Online; accessed 30-October-2017]. [19] Benjamin V. Hanrahan, Gregorio Convertino, and Les Nelson. 2012. Modeling Problem Difficulty and Expertise in Stackoverflow. In Proceedings of the ACM 2012 Conference on Computer Supported Cooperative Work Companion (CSCW '12). ACM, New York, NY, USA, 91–94. https://doi.org/10.1145/2141512.2141550 [20] Heike Hofmann, Hadley Wickham, and Karen Kafadar. 2017. Letter-Value Plots: Boxplots for Large Data. Journal of Computational and Graphical Statistics 26, 3 (2017), 469–477. https://doi.org/10.1080/10618600.2017.1305277 [21] Sanjay Ram Kairam, Dan J. Wang, and Jure Leskovec. 2012. The Life and Death of Online Groups: Predicting Group Growth and Longevity. In Proceedings of the Fifth ACM International Conference on Web Search and Data Mining (WSDM '12). ACM, New York, NY, USA, 673–682. https://doi.org/10.1145/2124295.2124374 [22] Komal Kapoor, Mingxuan Sun, Jaideep Srivastava, and Tao Ye. 2014. A Hazard Based Approach to User Return Time Prediction. In Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '14). ACM, New York, NY, USA, 1719–1728. https://doi.org/10.1145/2623330. 2623348 [23] Robert E. Kraut and Andrew T. Fiore. 2014. The Role of Founders in Building Online Groups. In Proceedings of the 17th ACM Conference on Computer Supported Cooperative Work &#38; Social Computing (CSCW '14). ACM, New York, NY, USA, 722–732. https://doi.org/10.1145/2531602.2531648 [24] Ravi Kumar, Yury Lifshits, and Andrew Tomkins. 2010. Evolution of Two-sided Markets. In Proceedings of the Third ACM International Conference on Web Search and Data Mining (WSDM '10). ACM, New York, NY, USA, 311–320. https://doi. org/10.1145/1718487.1718526 [25] Ravi Kumar, Jasmine Novak, and Andrew Tomkins. 2006. Structure and Evolution of Online Social Networks. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '06). ACM, New York, NY, USA, 611–617. https://doi.org/10.1145/1150402.1150476 [26] Varun Kumar and Niranjan Pedanekar. 2016. Mining Shapes of Expertise in Online Social Q&#38;A Communities. In Proceedings of the 19th ACM Conference on Computer Supported Cooperative Work and Social Computing Companion (CSCW '16 Companion). ACM, New York, NY, USA, 317–320. https://doi.org/10.1145/ 2818052.2869096 [27] Zhiyuan Lin, Niloufar Salehi, Bowen Yao, Yiqi Chen, and Michael Bernstein. 2017. Better When It Was Smaller? Community Content and Behavior After Massive Growth. In Proceedings of the 11th International AAAI Conference on Web and Social Media. [28] Thomas Robert Malthus. 1809. An essay on the principle of population, as it affects the future improvement of society. Vol. 2. [29] Ross Mayfield. 2006. Power Law of Participation. (2006). http://ross.typepad. com/blog/2006/04/power_law_of_pa.html [Online; accessed 30-October-2017]. [30] Akshay Patil, Juan Liu, and Jie Gao. 2013. Predicting Group Stability in Online Social Networks. In Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). ACM, 1021–1030. https://doi.org/10.1145/2488388.2488477 [31] Liu Qiaoling and Agichtein Eugene. 2011. Modeling Answerer Behavior in Collaborative Question Answering Systems. In Proceedings of the 33rd European conference on Advances in information retrieval. [32] Bruno Ribeiro. 2014. Modeling and Predicting the Growth and Death of Membership-based Websites. In Proceedings of the 23rd International Confer- ence on World Wide Web (WWW '14). ACM, New York, NY, USA, 653–664. https://doi.org/10.1145/2566486.2567984 [33] Christopher A Sims. 1980. Macroeconomics and reality. Econometrica: Journal of the Econometric Society (1980), 1–48. [34] Ivan Srba and Maria Bielikova. 2016. A Comprehensive Survey and Classification of Approaches for Community Question Answering. ACM Trans. Web 10, 3, Article 18 (Aug. 2016), 63 pages. https://doi.org/10.1145/2934687 [35] Ivan Srba and Maria Bielikova. 2016. Why is Stack Overflow Failing? Preserving IEEE Software 33, 4 (July Sustainability in Community Question Answering. 2016), 80–89. https://doi.org/10.1109/MS.2016.34 [36] Jim Stanford. 2008. Economics for Everyone: On-Line Glossary of Terms & Concepts. (2008). [37] David Tilman. 1980. Resources: A Graphical-Mechanistic Approach to Com- petition and Predation. The American Naturalist 116, 3 (1980), 362–393. https: //doi.org/10.1086/283633 arXiv:https://doi.org/10.1086/283633 [38] Utkarsh Upadhyay, Isabel Valera, and Manuel Gomez-Rodriguez. 2017. Uncover- ing the Dynamics of Crowdlearning and the Value of Knowledge. In Proceedings of the Tenth ACM International Conference on Web Search and Data Mining (WSDM '17). ACM, 61–70. https://doi.org/10.1145/3018661.3018685 [39] Simon Walk, Denis Helic, Florian Geigl, and Markus Strohmaier. 2016. Activity Dynamics in Collaboration Networks. ACM Trans. Web 10, 2, Article 11 (May 2016), 32 pages. https://doi.org/10.1145/2873060 [40] Gang Wang, Konark Gill, Manish Mohanlal, Haitao Zheng, and Ben Y. Zhao. 2013. Wisdom in the Social Crowd: An Analysis of Quora. In Proceedings of the 22Nd International Conference on World Wide Web (WWW '13). ACM, 1341–1352. https://doi.org/10.1145/2488388.2488506 [41] Lingfei Wu, Jacopo A. Baggio, and Marco A. Janssen. 2016. The Role of Diverse Strategies in Sustainable Knowledge Production. PLoS ONE (2016). [42] Lingfei Wu and Jiang Zhang. 2011. Accelerating growth and size-dependent distribution of human online activities. Phys. Rev. E 84 (Aug 2011), 026113. Issue 2. https://doi.org/10.1103/PhysRevE.84.026113 [43] Jie Yang, Alessandro Bozzon, and Geert-Jan Houben. 2015. "Harnessing Engage- ment for Knowledge Creation Acceleration in Collaborative Q&A Systems". In Proceedings of the 23rd International Conference on user Modeling, Adaptation, and Personalization (UMAP), Francesco Ricci, Kalina Bontcheva, Owen Conlan, and Séamus Lawless (Eds.). 315–327. [44] Tausczik Yla, Wang Ping, and Joohee Choi. 2017. Which Size Matters? Effects of Crowd Size on Solution Quality in Big Data Q&A Communities. In Proceedings of the 11th International AAAI Conference on Web and Social Media. [45] Chengxi Zang, Peng Cui, and Christos Faloutsos. 2016. Beyond Sigmoids: The NetTide Model for Social Network Growth, and Its Applications. In Proceedings of the 22Nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD '16). ACM, New York, NY, USA, 2015–2024. https://doi.org/ 10.1145/2939672.2939825 [46] Jun Zhang, Mark S. Ackerman, and Lada Adamic. 2007. Expertise Networks in Online Communities: Structure and Algorithms. In Proceedings of the 16th International Conference on World Wide Web (WWW '07). ACM, New York, NY, USA, 221–230. https://doi.org/10.1145/1242572.1242603 [47] Haiyi Zhu, Jilin Chen, Tara Matthews, Aditya Pal, Hernan Badenes, and Robert E. Kraut. 2014. Selecting an Effective Niche: An Ecological View of the Success of Online Communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 301–310. https://doi.org/10.1145/2556288.2557348 [48] Haiyi Zhu, Robert E. Kraut, and Aniket Kittur. 2014. The Impact of Membership Overlap on the Survival of Online Communities. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI '14). ACM, New York, NY, USA, 281–290. https://doi.org/10.1145/2556288.2557213
1807.06124
1
1807
2018-07-16T21:43:52
Computational Social Dynamics: Analyzing the Face-level Interactions in a Group
[ "cs.SI" ]
Interactional synchrony refers to how the speech or behavior of two or more people involved in a conversation become more finely synchronized with each other, and they can appear to behave almost in direct response to one another. Studies have shown that interactional synchrony is a hallmark of relationships, and is produced as a result of rapport. %Research has also shown that up to two-thirds of human communication occurs via nonverbal channels such as gestures (or body movements), facial expressions, \etc. In this work, we use computer vision based methods to extract nonverbal cues, specifically from the face, and develop a model to measure interactional synchrony based on those cues. This paper illustrates a novel method of constructing a dynamic deep neural architecture, specifically made up of intermediary long short-term memory networks (LSTMs), useful for learning and predicting the extent of synchrony between two or more processes, by emulating the nonlinear dependencies between them. On a synthetic dataset, where pairs of sequences were generated from a Gaussian process with known covariates, the architecture could successfully determine the covariance values of the generating process within an error of 0.5% when tested on 100 pairs of interacting signals. On a real-life dataset involving groups of three people, the model successfully estimated the extent of synchrony of each group on a scale of 1 to 5, with an overall prediction mean of $2.96%$ error when performing 5-fold validation, as compared to 26.1% on the random permutations serving as the control baseline.
cs.SI
cs
Computational Social Dynamics: Analyzing the Face-level Interactions in a Group Nicholas Watkins and Ifeoma Nwogu Department of Computer Science, Rochester Institute of Technology Rochester, NY 8 1 0 2 l u J 6 1 ] I S . s c [ 1 v 4 2 1 6 0 . 7 0 8 1 : v i X r a Abstract- Interactional synchrony refers to how the speech or behavior of two or more people involved in a conversation become more finely synchronized with each other, and they can appear to behave almost in direct response to one another. Studies have shown that interactional synchrony is a hallmark of relationships, and is produced as a result of rapport. In this work, we use computer vision based methods to extract nonverbal cues, specifically from the face, and develop a model to measure interactional synchrony based on those cues. This paper illustrates a novel method of constructing a dynamic deep neural architecture, specifically made up of intermediary long short-term memory networks (LSTMs), useful for learning and predicting the extent of synchrony between two or more processes, by emulating the nonlinear dependencies between them. On a synthetic dataset, where pairs of sequences were generated from a Gaussian process with known covariates, the architecture could successfully determine the covariance values of the generating process within an error of 0.5% when tested on 100 pairs of interacting signals. On a real-life dataset involving groups of three people, the model successfully estimated the extent of synchrony of each group on a scale of 1 to 5, with an overall prediction mean of 2.96% error when performing 5-fold validation, as compared to 26.1% on the random permutations serving as the control baseline. I. INTRODUCTION Research in Social Psychology has shown extensively that in cohesive groups, individuals typically mirror each other's facial expressions and facial articulations [3]. Furthermore, in groups with established rapport, typically individuals provide feedback to others' opinions using facial features. Thus the ability to measure the extent of interactional synchrony among the members in a group can be used as a metric for cohesion or rapport within that group. Developing and maintaining rapport is a critical compo- nent of successful interactions in different social settings. For example, it has been shown in that in organizational settings, using techniques of rapport management in the interpersonal communication between leaders and team members can lead to building more positive relationships in the organization, which in turn can result in higher quality of work[8]. In a separate study from Japan[16] that investigated prisoners' reasons for confessions when being interrogated, partici- pants who experienced a relationship-focused interviewing style, which stressed active listening and rapport-building while talking about their criminal incidents directly, were more likely to confess. In yet another study on interracial mentoring relationships, findings suggested that affect and rapport were the key features in facilitating more positive outcomes[12]. In general, rapport management is a key component of social dynamics1and a quantitative measure of the extent of rapport can prove to be very useful in difference social constellations. We expect pairs or groups of individuals with high cohesion and established rapport to exhibit the mirroring effect, a form of interactional synchrony. The mirroring effect is a phenomenon which occurs when individuals mimic each other's behavior subconsciously to gain and keep rapport[3]. Thus, we expect the cohesion of a group to directly correspond the extent of synchrony occurring. Interactional synchrony can be manifested in various forms other than mirroring which is the most common. These include entrainment at the voice prosody level, convergence (when people in a group initially behave very differently from each other but eventually begin to behave similarly), mimicking, which is a type of mirroring but with time delays, etc.. To this end, to better understand interactional synchrony, we study coupled or interacting processes, where given two or more time series signals, our goal is to determine if and how much they are interacting. This general problem has numerous applications such as modeling human impact in social dynamics (as described above), explaining weather patterns, studying financial markets and their dependences, etc. In this work, we focus on studying how well individuals are interacting with each other in a given social context. We abstract our concept of processes by examining mea- surements over time (e.g. once every second) and refer to these sets of time series X and Y . We say two time series X, Y are synchronous if their corresponding processes are interacting, i.e. if the patterns in X are influenced by Y or vice versa. We assume that interaction always has an impact on the process. II. PAST RELATED WORK ON COMPUTATIONAL SYNCHRONY While the notion of interactional synchrony has been studied extensively in the Social Psychology literature, much less work has been reported in the computational analysis literature on this subject. Delaherche et al. [5] presented an extensive survey of synchrony evaluation from a mul- tidisciplinary perspective, focusing on psychologists' coding 1Social dynamics refers to the behavior of groups, which results from the interactions of individual group members. It also refers to the study of the relationship between individual-level interactions and group-level behaviors. methods, non-computational evaluation and early machine learning techniques. Rudimentary forms of synchrony analysis has long been performed using covariance measures in statistics, however, this only works if the processes have a liner relation. But in real-life settings, such interactions can be nonlinear. Although most covariate time series are synchronous, not all synchronous data is covariate, such as is the case when synchronous data are nonlinearly coupled. Additionally, syn- chronous data can have a similar noise pattern (with an underlying independent trend) or have a nonuniform delay. These cases would all fail under traditional variance analysis. Synchronicity analysis has also been previously approached by using coupled hidden Markov models (cHMMs) [2], [14] to classify taichi movements, under the assumption that different parts of the body moving in taichi will be synchronous to each other. Although cHMMs are power- ful, they cannot model irregular delays between the two sequences. Furthermore, due to the stringent Markovian assumption2, they are often heavily augmented to be useful. Li et al. [13] presented a supervised model used to predict the outcomes of video-conferencing conversations in the context of new recruit negotiations, again making the Markov assumption on interactional synchrony between the inter- locutors. Yu et al. [17] presented a technique to investigate interactive synchrony in facial expressions and showed using the Pearson's correlation measure, that synchrony features were effective at detecting deception; Hammal et al. [9] evaluated the temporal coordination of head movements in couples with history of interpersonal violence and Chu et al. [4] developed a search-based technique for unsupervised, accelerated, multi-synchrony detection. In much of the model based works described, first-order Markov assumptions are made for modeling interactional synchrony. Group cohesion analysis (not in the context of synchrony) has been previously approached by using using SVMs on extracted audiovisual features from group meeting videos labeled as having high or low cohesion by human annotators [10]. In this paper we describe our work on studying group cohesion using a neural network model, specifically the long short-term memory (LSTM). Our method is advantageous over the aforementioned ones in that our model uses less preset features, we are injecting less bias into the model and it is well-suited to classify, process and predict time series data given time lags of unknown size and duration between events. III. METHOD In this section, we present our techniques for synthetic data generation, feature extraction and selection from the real- life dataset and interactional synchrony measurement via the LSTM. We also describe the process of obtaining a form of ground truth via human annotations, since labels were not provided for the data. LSTMs are a class of recursive neural networks (RNN) which use memory cells to "remember" 2The kth order Markov assumption states that only the t − k, t − k + 1, ..., t − 1, t measurements impact the t + 1 measurement 2 prior computations. LSTMs and RNNs are frequently used for time series prediction and classification. The memory cells of LSTM networks cause the time series they generate to adhere to higher orders of the Markov property. They are therefore capable of learning and modeling arbitrary sequential functions (given the neural topology is sufficiently complex). Fig. 1. An unrolled LSTM network showing the repeating module U with four interacting layers internally, along with inputs {xi} and outputs {hi}. A. Synthetic data To sufficiently ensure our approach would be successful on a variety of different applications, we generated syn- thetic data with desired levels of synchronousity. We took inspiration from Jamali's method of generating correlated Gaussian processes [11] and added a post processing step to ensure the data need not necessarily be correlated (but merely synchronous). We also implemented a rudimentary tread feature that allows us to prescribe a trend to both time series. The extended version of the algorithm is described in more detail in Algorithm 1. Algorithm 1 Data generating process 1: procedure DATAGEN(len, C, f1(t, x), f2(t, x), delay) 2: 3: 4: 5: 6: 7: 8: 9: 10: Sxx = f f t(Cxx) Syy = f f t(Cyy) Sxy = f f t(Cxy) u = SampleGaussian(len) v = SampleGaussian(len) U = f f t(u) V = f f t(v) β = 1 (cid:17) Sxy Sxx∗Syy α = β + cos−1(cid:16) Cq =(cid:112)Syy ∗ cos(α) Dq =(cid:112)Syy ∗ sin(α) √ √ Sxx ∗ cos(α) √ Sxx ∗ sin(α) Aq = Bq = 11: 12: 13: 14: 15: 16: 17: 18: 19: 20: 21: 22: 23: end procedure X = Aq ∗ U T + Bq ∗ V T Y = Cq ∗ U t + Bq ∗ V T x∗ = if f t(X) y∗ = if f t(Y ) x = x∗[1 + delay :] y = y∗[1 : −delay] Return [f1(1, x1), ..., f1(len, xlen)], [f2(1, y1), ..., f2(len, ylen)] htxt+x x σtanh σx tanh σUht-1xt-1Uht+1xt+1htctct-1ht-1ct+1ht+1 3 interaction, resulting in a total of four videos - one at the overall group level showing body movements and three at the individual level showing mainly the face. Figure 3 shows sample frames from one of the videos depicting the overall group interaction as well as the faces of individual partici- pants in the group. The database contains a total of 172,800 frames, with 1,800 frames for each of 96 participants. Fig. 3. participant face level. Examples of video frames from the dataset - group level and 1) Data Processing: Each individual's facial expression was parsed using OpenFace [1], an open-source toolkit capa- ble of facial landmark detection, head pose estimation, facial action unit recognition, and eye-gaze estimation. Action units (AUs) correspond to various muscle groups on the face and can range from being fully activated to not activated[6]. For each trio in a group, we took the top 3 most active action units. We defined the activity of an action unit as the mean average deviation. The amount of mirroring directly corresponds to our definition of synchrony (as increased synchrony between the facial behavior in pairs of individuals indicates mirroring); thus, for our neural network to detect mirroring, it must detect synchrony (by proxy). We took these action units and measured them through time, thus obtaining a collection of behavioral signals (based on the face). These signals can be seen as a high order coupled Markov process as individual channels interacted with each other. 2) Human annotations: In the absence of ground truth data, we requested five individuals labelers to review the videos in the dataset and provide an aggregate group syn- Fig. 4. OpenFace output on a sample frame showing the facial landmarks used to compute action units, head pose and eye gaze. Fig. 2. synthetically generated. Examples of synchronized pairs of random variable sequences Examples of the outputs of the data generating process for a pair of synchronized 100-length sequences are shown in Figure 2. The left image is a basic pair of stationary synchronized sequences: the middle image shows another pair of synchronized sequences, but shifted by one unit of time - note that the sequences are not exactly the same, rather they are random sequences generated by the same stochastic process. The right image shows a pair of synchronized sequences where one of the signals is quasi-periodic and the other is trending If the covariance between the two signals is given as: and we train an ample number of signal pairs with the neural network structure presented in Section III-C using a regression loss on Φ12, we are able to effectively recover this value back when tested with newly generated signals with known covariances. Details of the experiment and results are given in Section IV. (cid:20)Φ11 Φ12 Φ21 Φ22 (cid:21) B. The Sayette Group Formation Task dataset We are testing this approach on a dataset obtained from Girard et al. [7] which was drawn from a larger study on the impact of alcohol on group formation processes [15]. All participants in the study were previously unacquainted and met for the first time at the experiment. They were instructed to consume a beverage and then engage with two other study participants. The groups of interlocutors were made up of three such subjects who were engaged for about 30-40 minutes of unstructured interactions. The data provided for this study focused on a 1 minute portion of the entire video where the collectors believed the participants in the group had become sufficiently acquainted with each other. Unfortunately, the associated labels for the videos were not provided. Separate wall-mounted cameras faced each participant and another camera captured the overall group 4 IV. TESTING AND RESULTS In this section, we first define the different performance measures used to evaluate the architecture and then describe the overall testing methodology, both for the synthetic and the real datasets. Lastly, we provide the results obtained from both sets of experiments. A. Performance measures To test the effectiveness of our model, we computed the mean of the absolute percent error µe given as: (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Yi − Yi Yi (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) N(cid:88) i=1 µe = 1 N (cid:118)(cid:117)(cid:117)(cid:116) 1 N (cid:32) N(cid:88) i=1 (cid:33)2 Yi − Yi Yi − µ Additionally, we computed the standard deviation of percent error σe given as: chrony score based on their perception of how well the group was interacting. The scores were in the range of 1 to 5, with 1 implying the group was completely unsynchronized, 5 being completely synchronized. The labelers were instructed to judge overall synchrony so that even if two people in the group are interacting well with each other, but not with the third person, the group could not receive a high score. To account for the subjectivity in the labeling, we computed the total variances for the scores provided by all but one of the labelers (we did this five times), and removed the set of annotations that caused the largest variance in the set. We also spot-checked the variances across each group and when this was larger than a preset threshold, had additional ad hoc labelers re-score the video - this was done for only two groups in the entire dataset. The average score obtained from the labelers was now considered as the human impression of synchrony, the new gold-standard we used to train the network. C. LSTM Model σe = Finally, we computed the standard statistical measure, R2 also known as the coefficient of determination, as: (cid:80)N (cid:80)N i=1(Yi − Yi)2 i=1 Yi − µ R2 = 1 − is the ground-truth synchronicity measure (or where Yi measure of cohesion) of the ith group, Yi is the model's prediction on the same ith group and N is the total number of groups. For synthetic data, the "group" is the pair of signals generated using the DATAGEN algorithm. For the more complex real-life scenario, the group consists of the data from the three people in conversation. Each person's data consists of 3 AUs. B. Testing methodology The testing methodologies are similar for the synthetic and the real-life datasets, where the time series data is input to an LSTM architecture, the output codes from all the LSTMs are fed into a fully-connected dense neural network and the algorithm is trained using a regression-based mean-squared error (MSE) loss (Figure 5). As proof-of-concept, we first tested the network on the synthetic dataset to attempt to recover the covariate measure between the two interacting signals (this is known since we generated the data). We trained the network on 100 pairs of signals, each signal having a length of 1000. Using an overlapping window of length 100 and a stride of 1, we extracted pairs of sub-signals which were fed into the LSTM architecture where 80% was used for training and 20% for validation. During training, each pair of sub-signals extracted with the overlapping window is input to the network and Fig. 5. An LSTM network to predict the synchrony among 3 sets of input signals, where each set has 3 channels. For the first layer, not all the connections are shown in the diagram for the sake of clarity, but every channel of data from each person is connected to all the input nodes of every LSTM network. Note: the number of LSTM networks does not necessarily equal the number of sets at the input. We implement an LSTM network followed by a fully connected layer to predict the extent of interaction between two or more sets of input signals. The network utilizes a lookback feature of one second (or 30 frames). It is important to note that the number of LSTM networks does not necessarily have to be equal to the number of sets at the input. More information is provided on how we selected the optimal number of input networks in Section IV. All neurons use the ReLU activation function. For the real-life data, since we are analyzing 3 different action units (the 3 most prominently changing AUs), in the first layer, each LSTM network has a neuron for each channel of the input for all individuals. A simplified model can be seen in Figure 5. labeled with the overall synchrony metric which in this case is the covariate value between the entire signals. Since we selected the number of LSTM networks arbitrar- ily, we tested using a varying number of LSTM networks, from 1 to 9 as shown in Figure 6. The optimal number of LSTMs for the synthetic dataset was 6, although it can be seen that the number of LSTMs makes only a small difference to the end result. Fig. 6. x-axis is the number of LSTM networks and y-axis is the lowest error obtained from the model on the same data. The red (or lower curve) represents the results obtained from training data and the blue (or upper) represents the results obtained from the validation data. We tested the network on 100 pairs of signals, each of length of 1000. Similar to the training paradigm, the pairs of sub-signals were extracted and fed to the network to retrieve their synchrony metric. The overall mean error between the predicted and actual values was 0.5%. For the real-life data, the same paradigm was employed. All signals were one-minute or 1800 frames long. Similar to the process employed for the synthetic data, we used an overlapping window of size 30 and fed the sub-signals to a similar LSTM architecture. In this case, we used 10 LSTM networks and the inputs consisted of 3 sets of 3 channels each. During training, the sub-signals were labeled with the ground-truth label (previously assigned by human annotators to the entire group of three, as a measure of their perceived level of interaction - between 1 and 5). To train, we used 5-fold cross validation across the groups i.e. 24 groups were used for training and the remaining 8 for testing, over 5 folds. As a type of control baseline, to ensure we are accurately measuring interactional synchrony and not some other underlying phenomenon, for each group in the test set, we selected one of the three original members and combined their data with that of two individuals from two other randomly selected groups to create a new group (referred to as random in Table since we should be unable to predict better than random). We then performed the pre- dictions on these permutations and compared the predicted values to the ground-truth labels of the group. After training the regressor, we obtained results within a mean of 2.96% error when performing 5-fold validation with a 30th order Markov assumption as compared to 26.1% on the random permutations. The full set of results on the real-life dataset are shown in Table . The R2 value is the most telling metric in this work, where a value of 1.0 indicates that the model fits the data well and the differences between the ground-truth values and the model's predicted values are small and unbiased. An R2 Data Random 5-Fold validation 5 R2 0.00717 0.979 Mean of Absolute Percent Error Standard Deviation Percent Error 0.261 0.0296 0.203 0.0296 TABLE I RESULTS AFTER RUNNING 5 FOLD VALIDATION ON DATASET AND ON CONTROL BASELINE value of 0.0 indicates the contrary. For this work, on the real-life data set, after five folds of validation, the resulting R2 was 0.979 while the value for the random permutation was 0.00717. V. CONCLUSION We can observe that our model is highly accurate. Fur- thermore, based on the analysis and results reported, we can be confident the proposed architecture is looking to measure synchrony. Unfortunately, as with many techniques based on neural networking, it is difficult to completely understand the inner workings of this model and fully interpret what the architecture is inferring from the data. Thus, we can only conjecture about the means to which it derives its conclusions. Notwithstanding, this type of architecture can be used for efficient classification of group dynamics. Potential applications using transfer learning and applying this to sequences could be investigated. REFERENCES [1] T. Baltrusaitis, P. Robinson, and L. P. Morency. Constrained local neural fields for robust facial landmark detection in the wild. In 2013 IEEE International Conference on Computer Vision Workshops, pages 354–361, Dec 2013. [2] M. Brand, N. Oliver, and A. Pentland. Coupled hidden markov models for complex action recognition. Proceedings of IEEE Computer Society Conference on Computer Vision and Pattern Recognition. [3] T. L. Chartrand and J. A. Bargh. The chameleon effect: The perception-behavior link and social interaction. Journal of Personality and Social Psychology, 76(6):893910, 1999. [4] W.-S. Chu, J. Zeng, F. De la Torre, J. F. Cohn, and D. Messinger. Un- supervised synchrony discovery in human interaction. In International Conference on Computer Vision, ICCV. CVF/IEEE, 2015. [5] E. Delaherche, M. Chetouani, A. Mahdhaoui, C. Saint-Georges, S. Viaux, and D. Cohen. Interpersonal synchrony: A survey of evaluation methods across disciplines. IEEE Transactions on Affective Computing, 3(3):349–365, July 2012. [6] P. Ekman and E. L. Rosenberg. What the face revealsbasic and applied studies of spontaneous expression using the facial action coding system (facs). 2005. [7] J. M. Girard, W.-S. Chu, L. A. Jeni, J. F. Cohn, and F. De la Torre. Sayette group formation task (gft) spontaneous facial expression database. In 2017 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition (FG), 2017. [8] D. D. Gremler and K. P. Gwinner. Customer-Employee Rapport in Service Relationships. Journal of Service Research, 3(1):82–104, Aug. 2000. [9] Z. Hammal, T. E. Bailie, J. F. Cohn, D. T. George, J. Saraghi, J. N.Chiquero, Temporal coordination of head In IEEE motion in couples with history of interpersonal violence. International Conference on Automatic Face and Gesture Recognition, FG, 2013. , and S. Lucey. [10] H. Hung and D. Gatica-Perez. Estimating cohesion in small groups using audio-visual nonverbal behavior. IEEE Transactions on Multi- media, 12(6):563575, 2010. [11] T. Jamali and G. R. Jafari. Method for generating two coupled gaussian stochastic processes, 2016. 6 [12] J. B. Leitner, . Ayduk, C. M. Boykin, and R. Mendoza-Denton. Reducing negative affect and increasing rapport improve interracial mentorship outcomes. PloS One, 13(4):e0194123, 2018. [13] R. Li, J. Curhan, and M. E. Hoque. Predicting video-conferencing conversation outcomes based on modeling facial expression synchro- In IEEE International Conference on Automatic Face and nization. Gesture Recognition, FG, 2015. [14] I. Rezek, P. Sykacek, and S. J. Roberts. Learning interaction dynamics IEE Proceedings - Science, with coupled hidden markov models. Measurement and Technology, 147(6):345–350, Nov 2000. [15] M. A. Sayette, K. G. Creswell, J. D. Dimoff, C. E. Fairbairn, J. F. Cohn, B. W. Heckman, T. R. Kirchner, J. M. Levine, , and R. L. Moreland. Alcohol and group formation: A multimodal investigation of the effects of alcohol on emotion and social bonding. Psychological Science, 23(8):869–878, 2012. [16] T. Wachi, K. Watanabe, K. Yokota, Y. Otsuka, and M. E. Lamb. [Prisoners reasons for confessions and interviewing styles]. Shinrigaku Kenkyu: The Japanese Journal of Psychology, 87(6):611–621, Feb. 2017. [17] X. Yu, S. Zhang, Y. Yu, N. E. Dunbar, M. L. Jensen, J. K. Burgoon, and D. N. Metaxas. Automated analysis of interactional synchrony In IEEE using robust facial tracking and expression recognition. International Conference on Automatic Face and Gesture Recognition, FG, 2013.
1310.8038
2
1310
2013-11-15T01:33:21
Community Structures Are Definable in Networks: A Structural Theory of Networks
[ "cs.SI", "physics.soc-ph" ]
We found that neither randomness in the ER model nor the preferential attachment in the PA model is the mechanism of community structures of networks, that community structures are universal in real networks, that community structures are definable in networks, that communities are interpretable in networks, and that homophyly is the mechanism of community structures and a structural theory of networks. We proposed the notions of entropy- and conductance-community structures. It was shown that the two definitions of the entropy- and conductance-community structures and the notion of modularity proposed by physicists are all equivalent in defining community structures of networks, that neither randomness in the ER model nor preferential attachment in the PA model is the mechanism of community structures of networks, and that the existence of community structures is a universal phenomenon in real networks. This poses a fundamental question: What are the mechanisms of community structures of real networks? To answer this question, we proposed a homophyly model of networks. It was shown that networks of our model satisfy a series of new topological, probabilistic and combinatorial principles, including a fundamental principle, a community structure principle, a degree priority principle, a widths principle, an inclusion and infection principle, a king node principle and a predicting principle etc. The new principles provide a firm foundation for a structural theory of networks. Our homophyly model demonstrates that homophyly is the underlying mechanism of community structures of networks, that nodes of the same community share common features, that power law and small world property are never obstacles of the existence of community structures in networks, that community structures are {\it definable} in networks, and that (natural) communities are {\it interpretable}.
cs.SI
cs
Community Structures Are Definable in Networks: A Structural Theory of Networks ∗ Angsheng Li1, Yicheng Pan1,3, Jiankou Li1,2 1State Key Laboratory of Computer Science Institute of Software, Chinese Academy of Sciences 2University of Chinese Academy of Sciences, P. R. China 3State Key Laboratory of Information Security Institute of Information Engineering, Chinese Academy of Sciences, P. R. China Community detecting is one of the main approaches to understanding network struc- tures. However it has been a longstanding challenge to give a definition for community structures of networks. We found that neither randomness in the ER model nor the preferential attachment in the PA model is the mechanism of community structures of networks, that community structures are universal in real networks, that community structures are definable in networks, that communities are interpretable in networks, and that homophyly is the mechanism of community structures and a structural the- ory of networks. We proposed the notions of entropy- and conductance-community structures. It was shown that the two definitions of the entropy- and conductance- community structures and the notion of modularity proposed by physicists are all equivalent in defining community structures of networks, that neither randomness in the ER model nor preferential attachment in the PA model is the mechanism of community structures of networks, that there is an empirical criterion for deciding the existence and quality of community structures in networks, and that the existence ∗State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of Sciences, P. O. Box 8718, Beijing, 100190, P. R. China. Email: {angsheng, yicheng, lijk}@ios.ac.cn. Correspondence: {angsheng, yicheng}@ios.ac.cn. Angsheng Li is partially supported by the Hundred-Talent Program of the Chinese Academy of Sciences. All authors are supported by the Grand Project "Network Algorithms and Digital Information" of the Institute of software, Chinese Academy of Sciences, and NSFC grant No. 61161130530. 1 of community structures is a universal phenomenon in real networks. This poses a fundamental question: What are the mechanisms of community structures of real net- works? To answer this question, we proposed a homophyly model of networks. It was shown that networks of our model satisfy a series of new topological, probabilistic and combinatorial principles, including a fundamental principle, a community structure principle, a degree priority principle, a widths principle, an inclusion and infection principle, a king node principle and a predicting principle etc. The new principles provide a firm foundation for a structural theory of networks. Our homophyly model demonstrates that homophyly is the underlying mechanism of community structures of networks, that nodes of the same community share common features, that power law and small world property are never obstacles of the existence of community structures in networks, that community structures are definable in networks, and that (natural) communities are interpretable. Our theory provides a foundation for analyzing the properties and roles of community structures in robustness, security, stability, evolu- tionary games, predicting and controlling of networks. 1 Background Defining community structures in networks is a fundamental challenge in modern network theory. Our notions of the entropy- and conductance-community structures are information theoretical and mathemat- ical definitions respectively. We found that our definitions of entropy-, conductance- and the modularity- community structures (18) are equivalent in defining community structures of networks, that randomness and preferential attachment are not mechanisms of community structures of networks, and that commu- nity structures are universal in real networks. This shows that community structure is a phenomenon definable in networks. The discoveries here provide a foundation for a new theory of community (or local) structures of networks. 2 Generally speaking, the missing of a structural theory of networks hinders us from rigorous analysis of networks and networking data. In fact, the current state of the art shows that the current tools for analyzing networks and networking data are mainly the probabilistic or statistical methods, which of course neglect the structures of data. However, structures are essential. In nature and society, especially in the current highly connected world, we observe that mechanisms determine the structures, and that structures determine the properties, which could be a new hypothesis of real network data. In particular, a grand challenge in network science is apparently the missing of a structural theory of networks. Community structures determine the local properties of networks that may have global implications. Network has become a universal topology in science, industry, nature and society. Most real networks satisfy a power law degree distribution (3), (2), and a small world phenomenon (17), (23), (13). Community detecting or clustering is a powerful tool for understanding the structures of networks, which has already been extensively studied (5), (8), (21), (9), (19). Many definitions of communities have been introduced, and various methods for detecting communities have been developed in the liter- ature, see (12) for a recent survey. However, the problem is still very hard, not yet satisfactorily solved. The approach of community finding takes for granted that networks have community structures. The fundamental questions are thus: Are communities objects naturally formed in a network or simply out- puts of a graphic algorithm? Can we really take for granted that networks have community structures? Are community structures of networks robust? What are the natural mechanisms which generate the community structure of a network, if any? What can we do with the communities? How can we test the quality of various community finding algorithms? Our experiments here showed that community structures are definable in networks, that randomness and preferential attachment are not mechanisms of community structures of networks, that there is an empirical criterion for deciding the existence and quality of community structures of networks, and that the existence of community structures is a universal phenomenon of real world networks. This pre- 3 dicts that community structures have their own mechanisms other than the well-known ones of classical models of networks. It is easy to recognize that the key to answer all the questions listed above is to understand the mechanisms of community structures of networks. We proposed a new model of networks, the homophyly model below, by introducing the new mech- anism of homophyly in the classical preferential attachment model. Our model constructs networks dynamically by using the natural mechanisms of preferential attachment and homophyly. Our homophyly model explores that homophyly is the mechanism of community structures in net- works, that community structures are provably definable in networks, and that communities are inter- pretable in networks. It was shown that the homophyly networks satisfy simultaneously a series of new topological, probabilistic and combinatorial principles, including a fundamental principle, a community structure principle, a degree priority principle, a widths principle, an inclusion and infection principle, a king node principle and a predicting principle etc. The new principles we found here provide a foun- dation for analyzing the properties and roles of community structures in new issues of networks such as robustness, security, stability of networks, evolutionary game and predicting in networks, and controlling of networks. Our results here provide a firm first step for us to develop a structural theory of networks, which would be essential to many important new issues of networks and networking data. 2 Definitions of Community Structures of Networks The first definition of community structures is the notion of modularity. Newman and Girvan (18) defined the notion of modularity to quantitatively measure the quality of community structure of a network. It is built based on the assumptions that random graphs are not expected to have community structure and that a network has a community structure, if it is far from random graphs. Let G = (V, E) be a graph with n nodes and m edges and P be a partition of nodes in V . The modularity of G by P is defined by 4 σP (G) = (Aij − Pij)δ(Ci, Cj), 1 2mXi,j where the sum runs over all pairs of vertices, A is the adjacency matrix, Pij is the expected number of edges between nodes i and j in a null graph, i.e., a random version of G. δ(Cj , Cj) = 1 if Ci = Cj, and 0 otherwise, Ck is an element of the partition P. A standard null model imposes that the expected degree after averaging over all possible configura- tions matches the actual degree of the original graph (11). Such a null model is essentially equivalent to the configuration model (7), in which each node i is associated with di half-edges, where di is the degree of node i in G, and all the half-edges are joined randomly. It is easy to obtain that Pij = didj/2m and the modularity of G by P can then be rewritten as σP (G) = L Xl=1" kl m −(cid:18) Vl 2m(cid:19)2# , (1) where L is the number of modules in partition P, kl is the number of edges whose both ends are in module l, and Vl is the sum of the degrees of the nodes in l, also called the volume of l. Note that the first term of each summation represents the fraction of edges of G inside the module and the second term represents the expected fraction of edges that would be in the null model. We define the modularity of G as σ(G) = max P {σP (G)}. σ(G) is a real number in [0, 1]. The larger σ(G) is, the better community structure G has. We define the modularity community structure ratio (M-community structure ratio) of G to be the modularity of G. The second definition is based on random walks. The intuition is that random walks from a node in a quality community are not easy to go out of the community. We define the notion of entropy community 5 structure ratio of a network. We consider the entropy of a network and of a network given by a partition of nodes of the network. Let G = (V, E) be a graph with n nodes and m edges, and P be a partition of V . We use LU (G) to denote the minimum average number of bits to represent a single step of random walk (in the stationary distribution) with a uniform code in G, and LP (G) to denote the minimum average number of bits to represent that with an aforementioned "module-node" code. By information theoretical principle, LU (G) = − di 2m · log2 di 2m , n Xi=1 where di is the degree of node i. LP (G) = − L nj Xj=1 Xi=1 d(j) i 2m · log2 d(j) i Vj − (2) (3) mg m   Vj 2m · log2 L Xj=1 Vj 2m  , where L is the number of modules in partition P, nj is the number of nodes in module j, d(j) degree of node i in module j, Vj is the volume of module j, and mg is the number of edges crossing two is the i different modules. We define the entropy community structure ratio of G by P by τ P (G) = 1 − LP (G) LU (G) . We define the entropy community structure ratio of G (E-community structure ratio of G) by τ (G) = max P {τ P (G)}. We notice that similar idea has been used in community detecting, for instance, Rosvall and Bergstrom (22) proposed an algorithm to detect communities by compressing a description of the information flow by using the Huffman code to encode prefix-freely each module and each node. Our definition here is purely an information theoretical notion. 6 Both definitions of the modularity and entropy community structure ratio depend on partitions of G. In these definitions, the existence of a community structure of a graph means that there is a "good partition" for the graph. However the intuitive relationship between "good partitions" and community structures is not clear, and more seriously, both the two definitions are not convenient for us to compare the community finding algorithms, which usually do not give partitions of networks. In fact, a community finding algorithm may find overlapping communities, and may neglect part of the nodes in the community findings. In addition, both modularity and the entropy community structure ratio can be regarded as global definitions of community structures of networks. We will introduce a mathematical definition based on conductance, which is applicable to over- lapping communities, and to partial solutions of searching etc. We define the conductance community structure ratio of a network. To describe our definition, we recall the notion of conductance. Given a graph G = (V, E), and a set S ⊂ V , the conductance of S in G is defined by ΦG(S) = E(S, ¯S) min{vol(S), vol( ¯S)} , where ¯S is the complement of S in G, E(S, ¯S) is the set of all edges with one endpoint in S and the other in ¯S, vol(X) is the volume of X. Clearly, a community of a network must satisfy certain basic conditions, for instance: the induced subgraph must be connected, and the size of the community is not too small, and not too large. For this, we define: Definition 2.1 (Possible community) Given a graph G = (V, E), let n = V , and S ⊂ V . We say that S is a possible community of G, if: (1) The induced subgraph GS of S in G is connected, (2) S ≥ log n, i.e., the size of S is not too small, and 7 (3) S ≤ √n, that is, the size of S is not too large. Definition 2.2 (Conductance community structure ratio of communities) Let G = (V, E) be a graph, and n = V . Suppose that X = {X1, X2,··· , Xl} is a set of possible communities of G (overlapping is permitted). Then, (1) Let X = ∪jXj. (2) For each x ∈ X, suppose that Xj1, Xj2,··· , Xjr are all the possible communities Xj ∈ X that contain x, then define aX (x) = r Xi (1 − Φ(Xji))/r. (3) Define the conductance community structure ratio of G by X by θX (G) = aX (x). 1 n · Xx∈X By using θX (G), we define the conductance community structure ratio of a network. Definition 2.3 (Defining θ(G)) Let G = (V, E) be a network. We define the conductance community structure ratio of G by θ(G) = max X {θX (G)}. The conductance community structure ratio (C-community structure ratio, for short) can be inter- preted as a mathematical definition of community structures of networks. It is a local definition of community structures of networks. Suppose that G = (V, E) is an expander with the following properties: for any nontrivial set S ⊂ V , the conductance Φ(S) > α for some large constant α. Then by definition, θ(G) < 1 − α. Therefore 8 θ(G) cannot be large for graph G with expanding property. In particular, for a nontrivial network G constructed from the PA model, with probability 1 − o(1), θ(G) < 1 − α for some large constant α. More importantly, the conductance community structure ratio can be defined for algorithms. Definition 2.4 (Defining θA(G)) Let G = (V, E) be a network. Let A be a community detecting algo- rithm. Suppose that X is the set of all possible communities of G found by algorithm A. Then define: θA(G) = θX (G). By using Definition 2.4, we can define a community finding problem as follows. Definition 2.5 (Community finding problem) To design an algorithm, A say, such that for any network G, θA(G) is maximized. This gives rise to the algorithmic problem of searching. 3 Community Structures Are Robust Now we have three definitions of community structure ratios of networks. Are there any relationships among the three definitions for the quality of community structures of networks, i.e., the M-, E-, and C-community structure ratios? Do the three definitions give the same answer to the question whether or not a network has a community structure? We conjecture that the answer is yes. For this, we propose the following: Community structure hypothesis: Given a network G, the following properties are equivalent, 1) G has an M-community structure, 2) G has an E-community structure, and 3) G has a C-community structure. 9 c-ratios e-ratios m-ratios 1.0 0.8 0.6 0.4 0.2 s o i t a R e r u t c u r t S y t i n u m m o C 0.0 0.000 0.001 0.002 p 0.003 0.004 0.005 Figure 1: This figure gives the E-, M- and C-community structure ratios (denoted by e-, m- and c-ratios respectively) of networks, for n = 10, 000, and for p up to 0.005 of the ER model. We verify the community structure hypothesis by computing the M-, E-, and C-community structure ratios for networks of classical models. The first model is the ER model (10). In this model, we construct graph as follows: Given n nodes 1, 2,··· , n, and a number p, for any pair i, j of nodes i and j, we create an edge (i, j) with probability p. The second is the PA model (3). In this model, we construct a network by steps as follows: At step 0, choose an initial graph G0. At step t > 0, we create a new node, v say, and create d edges from v to nodes in Gt−1, chosen with probability proportional to the degrees of nodes in Gt−1, where Gt−1 is the graph constructed at the end of step t − 1, and d is a natural number. We depict the curves of the M-, E-, and C-community structure ratios of networks of the ER model and the PA model in Figures 1 and 2 respectively. From Figures 1 and 2, we observe that the following results hold: (1) The curves of the M-, E-, and C-community structure ratios of networks generated from the ER model are similar. (2) The curves of the M-, E-, and C-community structure ratios of networks generated from the PA model are similar. (3) Nontrivial networks of the ER and PA models fail to have a community structure. 10 1.0 0.8 0.6 0.4 0.2 s o i t a R e r u t c u r t S y t i n u m m o C 0.0 0 (G) (G)  (G)  10 20 d 30 40 50 Figure 2: This figure gives the E-, M- and C-community structure ratios (denoted by e-, m- and c-ratios respectively) of networks, for n = 10, 000, and for d ≤ 50 of the PA model. (4) For a network constructed from either the ER or the PA model, if the average number of edges d of the network is bounded by a small constant, 5 say, then the network has some community structure. (1) and (2) show that the community structure hypothesis holds for all networks generated from the classic ER and PA models. We notice that every network essentially uses the mechanisms of both the ER and the PA models. Our results here imply that the hypothesis may hold for all networks. (3) and (4) show that neither randomness in the ER model nor preferential attachment in the PA model alone is the mechanism of community structures of networks. 4 Community Structures Are Universal in Real Networks By observing the experiments in Figures 1 and 2, we have that for a network G of either the ER model or the PA model, the following three properties (1), (2) and (3) either hold simultaneously or fail to hold simultaneously: (1) the E-community structure ratio of G, τ (G), is greater than 0, (2) the M-community structure ratio of G, σ(G), is greater than 0.3, and 11 (3) the C-community structure ratio of G, θ(G), is greater than 0.3. This result suggests an empirical criterion for deciding whether or not a network has a community structure. Let G be a network, then 1. We say that G has a community structure if the E-, M-, and C-community structure ratios of G are greater than 0, 0.3 and 0.3 respectively. 2. The values σ(G), τ (G) and θ(G) represent the quality of community structure of G, the larger they are, the better community structure G has. By using the empirical criterion of community structure of networks, we are able to decide whether or not a given network has a community structure. We implemented the experiments of the M-, E- and C-community structure ratios for 22 real net- works, which are given in Table 1. From the table, we have that if one of the M-, E- and C-community structure ratios is high, then the other two ratios are high too, and that for each of the networks, the E-, M- and C-community structure ratios are greater than 0, 0.3 and 0.3 respectively. The experiments in Table 1 show that the community structure hypothesis holds for (each of the) real networks, which further validates the community structure hypothesis, and that the existence of community structure is a universal phenomenon for (almost all) real networks. By observing the experiments in Figures 1 and 2, and Table 1, we have that the community structure of a network is independent of which of the three definitions of community structures, i.e., the E-, M- and C-community structures, is used. This shows that community structures are robust in networks, and that the existence of community structures in real networks is a universal phenomenon, independent of both definitions of community structures and algorithms for finding the communities. By observing all the curves in Figures 1 and 2, and all experiments in Table 1 again, our conclusions are further validated. That is: 12 network cit hepph cit hepth col astroph col condmat col grqc col hepph col hepth email enron email euall p2p4 p2p5 p2p6 p2p8 p2p9 p2p24 p2p25 p2p30 p2p31 roadnet ca roadnet pa roadnet tx τ (G) σ(G) 0.56 0.22 0.53 0.2 0.24 0.51 0.64 0.37 0.79 0.44 0.26 0.58 0.69 0.39 0.5 0.21 0.73 0.39 0.11 0.38 0.4 0.11 0.39 0.12 0.15 0.46 0.46 0.15 0.47 0.21 0.49 0.23 0.24 0.5 0.5 0.25 0.99 0.67 0.99 0.66 0.67 0.99 θ(G) 0.37 0.36 0.49 0.76 0.89 0.7 0.83 0.63 0.76 0.36 0.36 0.38 0.46 0.42 0.48 0.5 0.53 0.52 0.98 0.98 0.98 Table 1: The entropy, modularity and conductance community structure ratios of real networks, written by τ (G), σ(G) and θ(G) respectively. 13 (1) Community structures are robust and hence definable in networks. (2) Community structures are universal in real networks. (3) Neither randomness nor preferential attachment is the mechanism of community structures of net- works. (1) implies that community structures can be theoretically analyzed in networks, and that community structures are objective existence in networks, instead of simply outputs of algorithms. This suggests a fundamental issue to investigate the role of community structures of networks. (2) and (3) suggest some fundamental questions such as: what are the mechanisms of community structures of real networks? What roles do the community structures play in real networks? 5 Homophyly Networks and Theorems Recall that community structures are definable in networks and universal in real networks. Real networks are from a wide range of disciplines of both social and physical sciences. This hints that community structures of real networks may be the result of natural mechanisms of evolutions of networking systems in nature and society. Therefore mechanisms of community structures of real networks must be natural mechanisms in nature and society. In both nature and society, whenever an individual is born, it will be different from all the existing individuals, it may have its own characteristics from the very beginning of its birth. An individual with different characteristics may develop links to existing individuals by different mechanisms, for instance, preferential attachment or homophyly. We propose our homophyly model based on the above intuition. It constructs a network dynamically by steps as follows. Definition 5.1 (Homophyly model) Let d be a natural number, and a be a homophyly exponent. The homophyly model constructs networks by steps. 14 (1) Let G2 be an initial graph with two nodes connected by d multi-edges. Each node is associated with a distinct color and called seed. For i + 1 > d, let Gi be the graph constructed at the end of step i. Let pi = 1 loga i . (2) Create a new node v. (3) With probability pi, v chooses a new color, in which case, we say that v is a seed node, and create d edges (v, uj ) for j = 1, 2,··· , d such that each uj is chosen with probability proportional to the degrees of nodes in Gi. (4) Otherwise, v chooses an old color, in which case: (a) v chooses randomly and uniformly an old color as its own color, and (b) create d edges (v, uj) for j = 1, 2,··· , d such that each uj is chosen with probability pro- portional to the degrees of nodes among all the nodes sharing the same color with v. The homophyly model constructs networks dynamically with both homophyly and preferential at- tachment as its mechanisms. It better reflects the evolution of networking systems in nature and society. We call the networks constructed from the homophyly model homophyly networks. We will show that homophyly networks satisfy a series of new principles, including the well known small world and power law properties. At first, it is easy to see that the homophyly networks have the small diameter property, which basically follows from the classic PA model. Secondly, the networks follow a power law, for which we see Figure 3 for the intuition. At last, they have a nice community structure, for which we depict the entropy-, conductance-community structure ratios, and the modularity- (18) of some homophyly networks in Figure 4. From Figure 4, we know that the entropy-, modularity- and conductance-community structure ratios of the homophyly networks are greater than 0.5, 0.9 and 0.9 respectively. Therefore the homophyly networks have a community structure by our criterion in Section 4. 15 104 103 102 101 s e d o n _ f o _ r e b m u n 100 100 101 102 degree 103 Figure 3: Power law distribution of a homophyly network: n = 10, 000, a = 1.2 and d = 5. We notice that the homophyly model is dynamic with homophyly and preferential attachment as its mechanisms. The initial graph G2 could be any finite colored graph, which does not change the statistic characteristics of the model. We use H(n, a, d) to denote the set of networks constructed from the homophyly model with average number of edges d and homophyly exponent a. We call a set of nodes of the same color, κ say, a homochromatic set, written by Sκ. We say that a homochromatic set is created at time step t, if the seed node of the set is created at time step t. Here we verify that homophyly networks satisfy a number of new topological, probabilistic and com- binatorial principles, including the fundamental principle, the community structure principle, the degree priority principle, the widths principle, the inclusion and infection principle, the king node principle and the predicting principle below. At first, we have a fundamental theorem. Theorem 5.1 (Homophyly theorem) Let a > 1 be the homophyly exponent, and d ≥ 4 be a natural number. Let G = (V, E) be a network constructed by H(n, a, d). Then with probability 1 − o(1), the following properties hold: (1) (Basic properties): 16 1.0 0.9 0.8 0.7 0.6 s o i t a R e r u t c u r t S y t i n u m m o C (G) (G)   (G)  0.5 0 5 10 d 15 20 Figure 4: The E-, M- and C-community structure ratios (denoted by e-, m- and c-ratios respectively) of a homophyly network for n = 10, 000 and a = 1.2. (i) (Number of seed nodes is large) The number of seed nodes is bounded in the interval [ n 2 loga n , 2n loga n ]. (ii) (Communities whose vertices are interpretable by common features are small) Each ho- mochromatic set has a size bounded by O(loga+1 n). (2) For degree distributions, we have: (i) (Internal centrality) The degrees of the induced subgraph of a homochromatic set follow a power law. (ii) The degrees of nodes of a homochromatic set follow a power law. (iii) (Power law) Degrees of nodes in V follow a power law. (iv) (Holographic law) The power exponents in (i) - (iii) above are all the same. (3) For node-to-node distances, we have: (i) (Local communication law) The induced subgraph of a homochromatic set has a diameter bounded by O(log log n). (ii) (Small world phenomenon) The average node to node distance of G is bounded by O(log2 n). 17 (1)(i) gives an estimation on the number of communities. (1)(ii) shows that the induced subgraph of a homochromatic set is a community in which all the nodes share common features, the same color here, and that a community interpretable by common features is small. (2)(i)-(2)(iv) show that power law is holographic in networks of the homophyly model, and that a community has an internal centrality in the sense that it has a small set dominating the community. This predicts that the holographic property may hold for many real networks, and that natural communities of a real network may have the internal centrality. (3) shows that G have the small world property, that communications within a community have length bounded by O(log log n), and that the local influence of a node is within O(log log n) steps in the network. The later property can be used to define some locally collective notions of networks. These observations lead to new issues of networks which will be further discussed in Section 12. Secondly, we have the following: Theorem 5.2 (Community structure theorem) For a > 1 and d ≥ 4, let G be a network constructed from the homophyly model. Then with probability 1 − o(1), the following properties hold: (1) (Small community phenomenon) There are 1 − o(1) fraction of nodes of G each of which belongs to a homochromatic set, W say, such that the size of W is bounded by O(loga+1 n), and that the conductance of W , Φ(W ), is bounded by O(cid:16) 1 W β(cid:17) for β = a−1 4(a+1) . (2) (Conductance community structure theorem) The conductance community structure ratio of G is at least 1 − o(1), that is, θ(G) = 1 − o(1). (3) (Modularity community structure theorem ) The modularity of G is 1 − o(1), that is, σ(G) = 1 − o(1). (4) (Entropy community structure theorem) The entropy community structure ratio of G is 1 − o(1), that is, τ (G) = 1 − o(1). 18 (1) means that a set of nodes X forms a natural community if the nodes in the set share the same color, that the conductance of a community X is bounded by a number proportional to X−β for some (2) - (4) show that the definitions constant β, and that communities of a network are interpretable. of modularity-, entropy- and conductance- community structure are equivalent in defining community structures in networks, and that community structures are provably definable in networks. The essence of this theorem is that community structures are definable in networks, and that communities of a net- work are interpretable, giving rise to a mathematical understanding of both community structures and communities. The fundamental and community structure principles explore some basic laws governing both the local and global structures of a network. However, to understand the roles of community structures in networks, we need to know the properties which hold for all the communities of a network. We will see that homophyly networks do satisfy a number of such principles. Our third principle consists of a number of properties of degrees of the networks. Given a node v ∈ V , we define the length of degrees of v to be the number of colors associated with all the neighbors of v, written by l(v). For j ≤ l(v), we define the j-th degree of v to be the j-th largest number of edges of the form (v, u)'s such that the u's here share the same color, denoted by dj(v). Define the degree of v, d(v), to be the number of edges incident to node v. In a sharp contrast to classic graph theory, for a network constructed from our homophyly model, G say, and a vertex v of G, v has a priority of degrees. This new feature must be universal in real networks in the following sense: A community is an interpretable object in a network such that nodes of the same community share common features. In this case, a vertex v may have its own community and may link to some neighbor communities by some priority ordering. In our model, a node v more likes to contact with nodes sharing the same color (or feature) with it, and has no much preferences in contacting with nodes in its neighbor communities. For the degree priority, we have: 19 Theorem 5.3 (Degree priority theorem) Let G = (V, E) be a homophyly network. Then with probability 1 − o(1), the degree priority of nodes in V satisfies the following properties: (1) (First degree property) The first degree of v, d1(v) is the number of edges from v to nodes of the same color as v. (2) (Second degree property) The second degree of v is bounded by a constant, i.e., d2(v) ≤ O(1) (3) (The length of degrees) (a) The length of degrees of v is bounded by O(log n). (b) Let N be the number of seed nodes in G. For r = N logc N for some constant c. Let x be a node created after time step r. Then the length of degrees of x is bounded by O(log log n). (4) If v is a seed node, then the first degree of v, d1(v) is at least Ω(log a+1 4 n). Theorem 5.3 shows that the highest priority of a node is to link nodes of its own community, that the links of a node to nodes outside of its own community are evenly distributed among a few communities, that for almost all nodes x, x links to nodes of at most O(log log n) many communities, and that for almost all seed nodes x, x has at least Ω(log a+1 4 n) many edges linking to nodes of its own community. These properties intuitively capture the patterns of links among different communities. Clearly, both lower and upper bounds of the length of degrees, of first and second degrees of nodes are essential to the roles of community structures of networks. For homophyly networks, we have Theorem 5.3. In some applications, we may need some lower bounds of the length of degrees of seeds or hubs. Anyway, the notion of degree priority provides new insight on understanding the properties and roles of community structures of networks. Our fourth principle determines the ways of connections from a community to outside of the com- munity. Let X be a homochromatic set of G. Define the width of X in G to be the number of nodes x's such that x ∈ X and l(x) > 1. We use wG(X) to denote the width of X in G. 20 Then we have: Theorem 5.4 ( Widths Principle): Let G = (V, E) be a homophyly network. Then with probability 1 − o(1), the following properties hold: (1) For a randomly chosen X, the width of X in G is wG(X) = O(log n). Let N be the number of seed nodes in G. For l = N 1−θ and r = N logc N for some constants θ and c. We say that a community is created at time step t, if the seed node of the community is created at time step t. (2) Let X be a community created before time step l. Then the width of X in G is at least Ω(log n). (3) Let Y be a community created before time step r. Then the width of Y in G is at least Ω(log log n) (4) Let Z be a community created after time step r. Then the width of Z in G is at most O(log log n). The width of a community X determines the patterns of links from nodes in the community to nodes outside of the community. By (4), we have that almost all communities have widths bounded by O(log log n). This property, together with the holographic law in the fundamental principle show that almost surely, a community has both an internal and an external centrality. This helps us to analyze the communications among different communities. Our fifth principle is an inclusion and infection among the nodes of a homophyly network. Given a node x of some community X. We define the width of x in G, denoted by wG(x), is the number of communities Y 's such that X 6= Y and such that there is a non-seed node y ∈ Y with which there is an edge between x and y. Then we have: Theorem 5.5 ( Inclusion and infection principle): Let G = (V, E) be a homophyly network. Then the following properties hold: 21 (1) (Inclusion property) For a non-seed node x in G, the width of x in G is wG(x) = 0. (2) (Widths of seed nodes) For every seed node x in G, the width of x is bounded by O(1). Intuitively speaking, non-seed nodes of a network are vulnerable against attacks. In the cascading failure model of attacks, it is possible that a few number of attacks may generate a global failure of the network. For this, one of the reasons is that the huge number of vulnerable nodes form a giant connected component of the network, in which the attack of a few vulnerable nodes may infect the giant connected component of the vulnerable nodes. (1) ensures that this is not going to happen in homophyly networks. We interpret seed nodes as strong against attacks. Let x be a seed node. If wG(x) > 1, then it is possible for x to infect two vulnerable nodes, y1 and y2 say, of two different communities Y1 and Y2 respectively. In this case, it is easy for y1 and y2 to infect the seed nodes of Y1 and Y2 respectively. By this way, the infections of communities intrigued by the seed node x may grow exponentially in a tree of communities. (2) ensures that for each seed node x of G, wG(x) = O(1), which is probably larger than 1. By this reason, we know that homophyly networks are insecure against attacks in the cascading failure models. This suggests that to make a network G secure, we have to make sure that for each hub, x say, the width of x in G is at most 1. In fact, by using this principle, we have proposed a protocol of provable security of networks (15). Our sixth principle is the remarkable role of seed nodes in the corresponding communities and in the whole network. We have: Theorem 5.6 ( King node principle): Let G = (V, E) be a homophyly network. Then with probability 1 − o(1), for a community X and its seed node x0, the expectation of the degree of x0 is at least twice of that of the second largest degree node x ∈ X. This principle ensures that there is a significant fraction of communities, each of which contains a king node whose degree is at least twice of that of the second largest degree node within the community. This is a phenomenon similar to that in a community of honey bees. It implies that in evolutionary 22 prisoner's dilemma games in a network, the strategies of nodes within a community could follow that of the king node, similarly to the behaviors of a community of honey bees in nature. By using this idea, we are able to develop a theory to solve the prisoner's dilemma in power law networks (14). The six principles above explore the mathematical properties of the homophyly networks. They show that the community structures and properties of the communities do play essential roles in fundamental issues and applications of networks. Our model demonstrates that dynamic and scale-free networks may have a community structure for which homophyly and preferential attachment are the underlying mechanisms. This explains the reason why most real networks have community structures and simultaneously follow a power law and have a small world property. 6 Fundamental Theorem In this section, we prove Theorem 5.1. We use H(n, a, d) to denote the set of all networks of n nodes constructed by the homophyly model with homophyly exponent a, and average number of edges d. Given a network G = (V, E) of the homophyly model, then every node v ∈ V is associated with a color. The vertices V is partitioned naturally by the homochromatic sets of V . For an edge e = (u, v), we call e a local edge, if the two endpoints u, v share the same color, and global edge, otherwise. A homochromatic set, X say, of V is expected to be a natural community of G. Then every commu- nity contains a seed node, which is the first node of the community. Proof 1 (Proof of Theorem 5.1) At first, we state a Chernoff bound which will be used frequently in our proofs. Lemma 6.1 (Chernoff bound, (6)) Let X1, . . . , Xn be independent random variables with Pr[Xi = 1] = pi and Pr[Xi = 0] = 1 − pi. Denote the sum by X = Xi with expectation E(X) = n Pi=1 pi. Then we n Pi=1 23 have Pr[X ≤ E(X) − λ] ≤ exp(cid:18)− λ2 2E(X)(cid:19) , Pr[X ≥ E(X) + λ] ≤ exp(cid:18)− λ2 2(E(X) + λ/3)(cid:19) . Let G be a homophyly network. We use Gt to denote the graph obtained at the end of time step t of the construction of G, and Ct to denote the set of seed nodes of Gt. Let T1 = loga+1 n. For (1)(i). It suffices to show that the size of Ct is bounded as desired. Lemma 6.2 (Number of seeds lemma) With probability 1 − o(1), for all t ≥ T1, t 2 loga t ≤ Ct ≤ 2t loga t. By the construction of G, the expectation of Ct is Xi=3 E[Ct] = 2 + t 1 loga i . By indefinite integral 1 loga x − Z ( a loga+1 x )dx = x loga x + C, we know that if t is large enough, then t Xi=3 1 loga i ≤ 1 +Z t 2 1 loga x dx ( 1 loga x − a loga+1 x )dx 6 5 4t ≤ Z t ≤ 2 , 3 loga t where 6 5 and 4 3 are chosen arbitrarily among the numbers larger than 1. Similarly, t Xi=3 2 1 loga i ≥ Z t ≥ Z t ≥ 2 1 loga x dx 1 ( loga x − 3t . 4 loga t 24 a loga+1 x )dx By the Chernoff bound, with probability 1 − exp(−Ω( t loga t )) = 1 − o(n−1), we have t 2 loga t ≤ Ct ≤ 2t loga t . By the union bound, such an inequality holds for all t ≥ T1 with probability 1 − o(1). (1)(i) follows from Lemma 6.2 immediately. Now we define an event E: Ct is bounded in the intervalh By Lemma 6.2, E almost surely holds for all t ≥ T1. loga ti. 2 loga t , t 2t For (1)(ii). We prove the following: Lemma 6.3 (Size of community lemma) For every T ≥ T1, with probability 1 − o(1), every homochro- matic set in GT has size bounded by O(loga+1 T ). It suffices to show that with probability 1 − o(T −1), the homochromatic set of the first color κ has size O(loga+1 T ). We define an indicator random variable Yt for the event that the new node created at time step t chooses color κ. We define independent Bernoulli trails {Zt} satisfying Pr[Zt = 1] =(cid:18)1 − 1 loga T(cid:19) 2 loga t t . So conditioned on the event E (which happens with extremely high probability), Y := PT stochastically dominated by Z :=PT t=1 Zt, which has an expectation t=1 Yt is By the Chernoff bound, E[Z] ≤ 2 loga t t T Xt=1 ≤ 2 loga+1 T. Pr[Z > 4 loga+1 T ] ≤ T −1. Therefore, with probability 1 − T −1, the size of Xκ, the community of color κ, is Y ≤ 4 loga+1 T . The lemma follows. 25 (1)(ii) follows from Lemma 6.3 by choosing T = n. Before proving (2) of Theorem 5.1, we establish both a lower and an upper bound of sizes of commu- nities. Set T2 = (1 − δ1)n, where δ1 = 10 By using a similar analysis to that in the proof of Lemma 6.3, we have: loga−1 n . Lemma 6.4 (Lower and upper bounds of sizes of communities) With probability 1 − o(1), both (1) and (2) below hold: (1) For a homochromatic set created at a time step ≤ T2, it has size at least log n; (2) For a homochromatic set created at a time step > T2, it has size at most 30 log n. Then we turn to the proof of the power law degree distributions in G, i.e., (2) of Theorem 5.1. We prove the following two items together, which proves (2)(i) and (2)(ii) of Theorem 5.1, respectively. (A) For each homochromatic set X, the degree distribution of induced subgraph GX follows a power law, and (B) For each homochromatic set X, the degrees of nodes in X follow a power law. (2)(iii) of Theorem 5.1 follows immediately from (B) by observing that the join of several power law distributions with the same power exponent is also a power law distribution. (2)(iv) follows from the proofs of (i) - (iii). The idea of the proofs of (A) and (B) is to verify that the contribution of degrees of a community from global edges is negligible, compared with those from its local edges. This is intuitively true, since the construction of a community basically follows the classic preferential attachment scheme, and the number of global edges created by seed nodes is negligible. We will realize this idea gradually in the proofs below. 26 Let X denote a homochromatic set of a fixed color, κ say. Let T0 be the time step at which X is created. Suppose that the size of X goes to infinity as n → ∞. In fact, by Lemma 6.4, this holds for all the homochromatic sets created before time T2. For positive integers s and k, define As,k to be the number of nodes of degree k in X when X reaches s, Bs,k to be the number of nodes of degree k in the induced subgraph of X when X reaches s, and gs,k to be the number of global edges associated with the nodes in X of degree k in the induced subgraph of X when X reaches s. Obviously, As,k = Bs,k +gs,k, A1,d = 1, A1,k = 0 for all k > d, and B1,k = 0 for all k. Then we establish the recurrence formula for the expectation of both As,k and Bs,k. Define T (s) (or T , for simplicity) to be the time step at which the size of X becomes to be s, and s1 to be the number of global edges connecting to X in the case that X = s (note that probably at several consecutive time steps, X keeps s). We consider the time interval (T (s − 1), T (s)). Since T (s) − T (s − 1) = Θ(CT) = Θ(T / loga T ), the number of times that a global edge is created and linked to a node in X of degree k at some time step in the interval (T (s − 1), T (s)) is expected to be Θ( ). Denote Θ(log2a T ) by s2. T 1 loga T · dk·As,k For s > 1 and k > d, we have loga T ) = Θ( k·As,k log2a T 2dT · E(As,k) = As−1,k(cid:18)1 − kd 2d(s − 1) + s1 − k s2(cid:19) + As−1,k−1 ·(cid:18) (k − 1)d 2d(s − 1) + s1 + s2 (cid:19) + O(cid:18) 1 s2(cid:19) , k − 1 where the error terms caused by the case that more than one edge joins to a single node are absorbed in the O(1/s2) term. Taking expectations on both sides, we have E(As,k) = E(As−1,k)(cid:18)1 −(cid:18) +E(As−1,k−1)(cid:18) 2(s − 1) + s1/d − 2(s − 1) + s1/d + 1 1 1 s2(cid:19) k(cid:19) s2(cid:19) . s2(cid:19) (k − 1) + O(cid:18) 1 1 When k = d, E(As,d) = E(As−1,d)(cid:18)1 −(cid:18) 1 2(s − 1) + s1/d − 1 s2(cid:19) d(cid:19) + 1 + O(cid:18) 1 s2(cid:19) . 27 (4) (5) Similarly, for s > 1 and k > d, E(Bs,k) = Bs−1,k − d · (kBs−1,k + gs−1,k) 2d(s − 1) + s1 + d · ((k − 1)Bs−1,k−1 + gs−1,k−1) 2d(s − 1) + s1 + O( 1 s2 ). Taking expectations on both sides, we have E(Bs,k) = E(Bs−1,k)(cid:18)1 − kd 2d(s − 1) + s1(cid:19) + E(Bs−1,k−1) · (k − 1)d 2d(s − 1) + s1 + When k = d, E(gs−1,k−1 − gs−1,k) 2d(s − 1) + s1 + O( 1 s2 ). E(Bs,d) = Bs−1,d − = Bs−1,d(cid:18)1 − + 1 + O( d · (dBs−1,d + gs−1,d) 2d(s − 1) + s1 2(s − 1) + s1/d(cid:19) +(cid:18)1 − d 1 s2 ) 2d(s − 1) + s1(cid:19) , gs−1,d (6) (7) and E(Bs,d) = E(Bs−1,d)(cid:18)1 − d 2(s − 1) + s1/d(cid:19) +(cid:18)1 − E(gs−1,d) 2d(s − 1) + s1(cid:19) . To solve these recurrences, we introduce the following lemma that is used in the canonical proof of the preferential attachment model. Lemma 6.5 ( (7), Lemma 3.1) Suppose that a sequence {as} satisfies the recurrence relation as+1 = (1 − bs s + s1 )as + cs for s ≥ s0, where the sequences {bs},{cs} satisfy lims→∞ bs = b > 0 and lims→∞ cs = c respectively. Then the limit of as s exists and lim s→∞ as s = c 1 + b . For the recurrence of E(As,k), we have to deal with s1 and s2. Note that s2 = Θ(log2a T ) = ω(s). For s1, we give an upper bound for the expected volume of X at time T , denoted by VT , as follows. E(VT ) = T 1 Xi=2(cid:20)(cid:18)1 − = O T Xi=2 loga i(cid:19) · 2d Ci Ci! = O T Xi=2 2d 28 1 + loga i · 4d loga i i dVi−1 2di (cid:21) ! = O(loga+1 T ). 1 O(cid:16) mochromatic sets have size at most O(loga+1 T ). So it is easy to observe that s1 In fact, by using an analysis of martingale, we are able to show that, almost surely, almost all ho- 2dT / loga T loga−1 T(cid:17) goes to zero as n, and in turn s, approach to infinity. For the recurrence of E(Bs,k), we approach to 0. Define gs =Pi gs,i s ) → 0 as show that as s goes to infinity, both E(gs−1,k−1−gs−1,k) to be the total number of global edges associated to X when X reaches s. We show that E( gs s → ∞. t = O(cid:16) 1 and E(gs−1,d) 2d(s−1)+s1 loga T · VT 2d(s−1)+s1 T (cid:17) = Note that X is created at time T0. E(gs) = O  T (s) Xi=T0 1 loga i · T (s) dVi  = O 2di Xi=T0  log i 2i   = O(log2 T (s) − log2 T0). We consider the size of X at some time step t > T0. E(X) = t Xi=T0(cid:18)1 − = Ω(cid:18)Z t T0 t 1 loga i = Ω Xi=T0  2i  loga i(cid:19) 1  Ci dx(cid:19) = Ω(loga+1 t − loga+1 T0). 2x loga x Thus at time T (s), by the Chernoff bound, with probability 1 − o(1), s = Ω(loga+1 T (s) − loga+1 T0). Therefore, E(gs) = o(s), that is, E( gs s ) → 0 as s → ∞. Then we turn to solve the recurrences of E(As,k) and E(Bs,k). Now the terms s1/d and 1 s2 in equalities (4) and (5) are comparatively negligible, and so do the terms E(gs−1,k−1−gs−1,k) 2d(s−1)+s1 and E(gs−1,d) 2d(s−1)+s1 in equalities (6) and (7). By Lemma 6.5, E(As,k) s and E(Bs,k) s must have the same limit as t goes to infinity. Thus we will only give the proof of the power law distribution for E(As,k), which also holds for E(Bs,k). Denote by Sk = limt→∞ E(As,k) s for k ≥ d. In the case of k = d, we apply Lemma 6.5 with bs = d/2, cs = 1 + O(1/s), s1 = −1, and get Sd = lim s→∞ E(As,d) t = 1 1 + d 2 = 2 2 + d . For k > d, assume that we already have Sk−1 = limt→∞ E(As,k−1) t . Applying Lemma 6.5 again with 29 bs = k/2, cs = E(As−1,k−1) s−1 · k−1 2 , s1 = −1, we get Sk = lim t→∞ E(As,k) s = Thus recurrently, we have Sk−1 · k−1 2 1 + k 2 = Sk−1 · k − 1 k + 2 . Sk = Sd · (d + 2)!(k − 1)! (d − 1)!(k + 2)! = 2d(d + 1) k(k + 1)(k + 2) . (8) This implies and thus E(As,k) − Sk · s = o(s), E(As,k) = (1 + o(1))k−3s. Since s = ω(1) goes to infinity as n → ∞, E(As,k) ∝ k−3. For the same reason, E(Bs,k) ∝ k−3. This proves (A) and (B), and also completes the proof of (2)(i) and (2)(ii). For (2)(iii), a key observation is that the union of several power law distributions is also a power law distribution if the power exponents are equal. We will give the same explicit expression of the expectation of the number of degree k nodes by combining those for the homochromatic sets, leading to a similar power law distribution. To prove the power law degree distribution of the whole graph, we take the union of distributions of all homochromatic sets. We will show that with overwhelming probability, almost all nodes belong to some large homochromatic sets so that the role of small homochromatic sets is unimportant. Suppose that Gn has m homochromatic sets of size at least log n. For i = 1, . . . , m, let Mi be the size of the i-th homochromatic set and N (i) s,k denote the number of nodes of degree k when the i-th set has size s. For each i, we have Hence, E(N (i) Mi,k) Mi lim n→∞ = Sk. lim n→∞ Mi,k) i=1 N (i) i=1 Mi E(Pm Pm 30 = Sk. Let M0 denote the size of the union of all other homochromatic sets of size less than log n, and N (0) s,k denote the number of nodes of degree k in this union when it has size s. By Lemma 6.4, with probability 1 − o(1), all these sets are created after time T2, and thus M0 ≤ n − T2 = 10n loga−1 n = o(n). Define Nt,k to be the number of nodes of degree k in Gt, that is, the graph obtained after time step t. Then we have For M0, we have that and lim n→∞ E(Nn,k) n = lim n→∞ Mi,k) i=0 N (i) i=0 Mi E(Pm Pm . lim n→∞ M0 i=1 Mi Pm = lim n→∞ M0 n − M0 = 0 E(N (0) M0,k) n lim n→∞ ≤ lim n→∞ M0 n = 0 hold with probability 1 − o(1). So lim n→∞ E(Nn,k) n = lim n→∞ This implies and thus, Mi,k) i=1 N (i) i=1 Mi E(Pm Pm = Sk. E(Nn,k) − Sk · n = o(n), E(Nn,k) = (1 + o(1))k−3n, and E(Nn,k) ∝ k−3. (2)(iii) follows. (2)(iv) is clear from the proofs of (2)(i) - (2)(iii). This completes the proof of Theorem 5.1(2). Then we turn to the proof of the third part of Theorem 5.1. For (3)(i), we will use the well-known result on the diameter of a graph from the PA model to bound the diameter of each homochromatic set. Bollob´as and Riordan (4) have shown that a randomly con- structed graph of size n from the PA model has a diameter O(log n) with probability 1 − O( 1 log2 n ). By 31 Lemma 6.3, we know that the sizes of all homochromatic sets are bounded by O(loga+1 n). Thus the induced subgraph of a homochromatic set has diameter O(log log n). (3)(i) follows. For (3)(ii), to consider the average node to node distance of the whole graph G, we first clarify the hierarchical structure of G as follows. The first level of G is obtained by shrinking the nodes of the same color in G to a single node while maintaining the global edges. Denote the first-level graph by G′. The second level of G is the graph obtained from G by simply deleting all the global edges from G, which consists of the isolated homochromatic sets. We define a path Pu,v connecting two nodes u, v as follows. If u and v share the same color, then Pu,v is the shortest path between u and v in the corresponding homochromatic set. Otherwise, choose the shortest path from u to the seed node su in the same homochromatic set and pick among the d global edges born with su the one which connects to the earliest created node, say u′. These two parts compose a path Pu,u′ from u to u′. Do the same to v and also find a path Pv,v′. Recursively, we define the path Pu′,v′, and Pu,v consists of Pu,u′, Pu′,v′ and Pv,v′. Note that Pu,v consists of paths from the two levels of G alternately, that is, Pu,v consists of blocks of local edges and global edges alternately. Next, we consider the paths in the two levels and show that the average node to node path Pu,v has length at most O(log2 n) with high probability. To estimate the number of edges in Pu,v from G′, i.e., the first-level graph of G, we recall a known conclusion on random recursive trees. A random recursive tree is constructed by stages. At each stage, a new vertex is created and linked to an earlier node uniformly and randomly. In this case, we call it a uniform recursive tree (16). We use a result of Pittel in (20), saying that the height of a uniform recursive tree of size n is O(log n) with high probability. Lemma 6.6 (Recursive tree lemma) ( (20)) With probability 1 − o(1), the height of a uniform recursive tree of size n is asymptotic to e log n, where e is the natural logarithm. Consider G′ as a union of d recursive trees. Note that the earlier created homochromatic sets in G 32 have larger expected volumes than the later created ones. So with higher probability than the uniform recursive tree, the height of a recursive tree in G′ is asymptotic to e log Cn, where Cn is the number of colors in G and is also the number of nodes in G′. This means that with probability 1− o(1), the number of global edges in Pu,v is at most 2e log Cn = O(log n). To estimate the diameters of the homochromatic sets in the second-level graph of G, we adjust the parameters in the proof of the diameter of the PA model in (4) to get a weaker bound on diameters, but a tighter bound on probability. In so doing, we have the following lemma. Lemma 6.7 (Diameter of PA networks) For any constant a′ > 2, there is a constant K such that with probability 1 − 1 Kn1/(a′+1). na′+1 , a randomly constructed graph G from the PA model P(n, d) has a diameter The proof for this is a standard argument as that in the proof of the small diameter property of networks of the PA model. Choose a′ in Lemma 6.7 to be the homophyly exponent a, and then we have a corresponding K from Lemma 6.7. Given a homochromatic set S, we say that S is bad, if the diameter of S is larger than KS1/(a+1). We define an indicator XS of the event that S is bad. Since log n ≤ S = O(loga+1 n), by Lemma 6.7, for a randomly chosen S, Pr[XS = 1] ≤ 1 loga+1 n . By Lemma 6.2, the expected number of bad sets is at most 2n loga n · 1 loga+1 n = 2n log2a+1 n . By the Chernoff bound, with probability 1 − O(n−2), the number of bad sets is at most of nodes belonging to some bad set is O(cid:16) n its diameter is at most KS1/(a+1) = O(log n). loga n(cid:17). On the other hand, for any large set S that is not bad, 3n log2a+1 n . Thus the total number To estimate the average node-to-node distance of G, we consider the length of Pu,v for uniformly and randomly chosen u and v. If neither u nor v is in a bad homochromatic set, then the length of Pu,v 33 is O(log n). Otherwise, its length is O(loga+1 n· log n) = O(loga+2 n). Thus, the average node to node distance in G is bounded by n2 loga n · loga+2 n + n2 · log n n2 O( ) = O(log2 n). (3)(ii) follows. This completes the proof of Theorem 5.1. 7 Community Structure Principle In this section, we prove Theorem 5.2. We will show that the homochromatic sets appearing not too early and too late are good communities with high probability. Then the theorem follows from the fact that the total size of the remaining part of nodes takes up only o(1) fraction of nodes in G. Set T3 = n loga+2 n , T4 =(cid:16)1 − 1 log(a−1)/2 n(cid:17) n. Proof 2 (Prof of Theorem 5.2) For (1). We focus on the homochromatic sets created in time interval [T3, T4]. Given a homochro- matic set S, we use tS to denote the time at which S is created. Suppose that S is a homochromatic set with tS ∈ [T3, T4], and s is the seed node of S. For t ≥ tS, define S[t] to be the snapshot of S at time step t, and ∂(S)[t] to be the set of edges from S[t] to S[t], the complement of S[t]. In our proof, we first make an estimation on the total degrees of nodes in S[t] at any given time t > tS, and then show that the global edges connecting to S is not too many. For each t ≥ tS, we use D(S)[t] to denote the total degree of nodes in S[t] at the end of time step t. We have the following lemma. Lemma 7.1 (Degree of communities lemma) For any homochromatic set S created at time tS ≥ T3, D(S)[n] = O(loga+1 n) holds with probability 1 − o(1). 34 We only have to show that for any t ≥ T3, if S is a homochromatic set created at time step t, then Dn(S)[n] = O(loga+1 n) holds with probability 1− o(n−1). We assume the worst case that S is created at time step tS = T3. The recurrence on D(S)[t] can be written as E[D(S)[t] D(S)[t − 1]] = D(S)[t − 1] + loga t(cid:19) · We suppose again the event E that for all t ≥ T1 = loga+1 n, +(cid:18)1 − 1 1 · d D(S)[t − 1] 2d(t − 1) . loga t · 2d Ct−1 2 loga t ≤ Ct ≤ 2t t loga t, which almost surely happens by Lemma 6.2. It holds also for t ≥ T3. On this condition, 1 E[D(S)[t] D(S)[t − 1],E] ≤ D(S)[t − 1](cid:20)1 + 2(t − 1) loga t(cid:21) + 4d loga t t . (9) To deal with this recurrence, we use the submartingale concentration inequality (see (7), Chapter 2, for information on martingales) to show that D(S)[t] is small with high probability. Since 10d loga+1(t + 1) − 10d(cid:18)1 + 1 2(t − 1) loga t(cid:19) · loga+1 t 10d log t 2(t − 1) ≥ 10d loga t(cid:18)log ≥ t + 1 − 10d loga t t + 1 t (cid:19) − 10d loga t 2(t − 1) 4d loga t t , ≥ applying it to Inequality (9), we have E[D(S)[t] D(S)[t − 1],E] − 10d loga+1(t + 1) ≤ (cid:18)1 + For t ≥ T3, define θt = Πt 1 2(t − 1) loga t(cid:19) · (D(S)[t − 1] − 10d loga+1 t). i=T3+1(cid:16)1 + 1 2(i−1) loga i(cid:17) and X[t] = D(S)[t]−10d loga+1(t+1) θt . Then E[X[t] X[t − 1],E] ≤ X[t − 1]. 35 Note that X[t] − E[X[t] X[t − 1],E] = D(S)[t] − E[D(S)[t] D(S)[t − 1], E] θt ≤ 2d. Since we have D(S)[t] − D(S)[t − 1] ≤ 2d, Var[X[t] X[t − 1],E] = E[(X[t] − E(X[t]X[t − 1],E))2] E[(D(S)[t] − E(D(S)[t] D(S)[t − 1],E))2] E[(D(S)[t] − D(S)[t − 1])2D(S)[t − 1],E] E[D(S)[t] − D(S)[t − 1] D(S)[t − 1],E] t (cid:20) 4d loga t = ≤ ≤ ≤ = ≤ ≤ 1 θ2 t 1 θ2 t 2d θ2 t 2d θ2 t 8d2 loga t tθ2 t 8d2 loga t tθ2 t 10d2 loga t tθ2 t + + d + 2(t − 1) loga t(cid:21) D(S)[t − 1] (t − 1)θt loga t · 10d2 loga+1 t t loga t (t − 1)θ2 dX[t − 1] + (t − 1)θt loga t + . D(S)[t − 1] θt dX[t − 1] (t − 1)θt loga t Note that θt can be bounded as θt ∼ ePt i=T3+1 1 2(i−1) loga i ∈ [( t T3 ) 1 2 loga n , ( 1 2 loga T3 ]. t T3 ) Then t Xi=T3+1 and 10d2 loga i iθ2 i ≤ 10d2 loga nZ t T3 1 x ·(cid:18) T3 x (cid:19) 1 loga n dx ≤ 10d2 loga n · log n = 10d2 loga+1 n, t Xi=T3+1 1 (i − 1)θi loga i ≤ 2 loga T3 Z t T3 36 1 2 log n T 3 x · x 1 2 log n dx ≤ 2 log n loga T3 . Here we can safely assume that X[t] is non-negative, which means that D(S)[t] ≥ 10 loga+1(t + 1), because otherwise, the conclusion follows immediately. Let λ = 20 loga+1 n. By the submartingale inequality ( (7), Theorem 2.40), Pr[X[t] = ω(loga+1 n)] ≤ Pr[X[t] ≥ X[T3] + λ] λ2 ≤ exp(− 2(10d2 loga+1 n + (2 log n/ loga T3)λ + dλ/3) ) + O(n−2) = O(n−2). This implies that D(S)[n] = O(loga+1 n) holds with probability 1 − O(n−2). Suppose that T3 ≤ tS < T4. We consider the edges from seed nodes created after time step tS to nodes in S. By a similar proof to that in Lemma 6.4 (1), we are able to show that, with probability a+1 a+1 2 n), and so a volume Ω(log 1− o(1), S = S[n] has a size Ω(log by F, that for any t ≥ TS, D(S)[t] = O(loga+1 n), which holds with probability 1 − o(1) by Lemma 7.1. For each t ≥ TS, we define a random variable Xt to be the number of global edges that connect to S at time t. We have 2 n). We suppose the event, denoted E[XtF] = d · 1 loga t · D(S)[t − 1] 2d(t − 1) ≤ log1+ǫ n 2(t − 1) , for arbitrarily small positive ǫ. Then n E[ Xt=tS XtF] ≤ log1+ǫ n n Xt=tS 1 2(t − 1) ≤ a(log1+ǫ n)(log log n). By the Chernoff bound, n Pr[ Xt=tS Xt ≥ 2a(log1+ǫ n)(log log n)] ≤ n−2. That is, with probability at least 1 − n−2, the total number of global edges joining S is upper bounded by 2a(log1+ǫ n)(log log n). Let 0 < ǫ < a−1 4 . Then, with probability 1 − o(1), for each such S (satisfying tS ∈ [T3, T4]), the conductance of S is Φ(S) = O(cid:18) 2a(log1+ǫ n)(log log n) + log n log(a+1)/2 n 37 (cid:19) ≤ O(cid:16)log− a−1 4 n(cid:17) ≤ O(cid:16)S− a−1 4(a+1)(cid:17) . On the other hand, the total number of nodes belonging to the homochromatic sets which appear n loga+2 n n + log(a−1)/2 n = o(n) for any constant before time T3 or after time T4 is at most O(loga+1 n) · a > 1. Therefore, 1 − o(1) fraction of nodes of G belongs to a subset W of nodes, which has a size bounded by O(loga+1 n) and a conductance bounded by O(cid:16)W− a−1 4(a+1)(cid:17). (1) follows. For (2). We only have to show that in the case of a specific X in G, θX (G) = 1 − o(1). We define X by colors such that each homochromatic set created before time T4 is a module in X . Note that each module is connected, and by Lemma 6.3 and 6.4, with probability 1 − o(1), its size is between log n and √n. So each module is a possible community. If a node x is in a homochromatic set S with tS ∈ [T3, T4], aX (x) = 1−Φ(S) = 1−O(cid:16)log− a−1 Otherwise, we assume the worst case that aX (x) = 0. Since the number of such nodes is at most o(n), 4 n(cid:17). we have (2) follows. θX (G) ≥ n − o(n) n h1 − O(cid:16)log− a−1 4 n(cid:17)i = 1 − o(1). For (3). We define the partition P as follows. Each homochromatic set S with tS ∈ [T3, T4] is a module in P, and the union of the rest homochromatic sets, that is those created before T3 or after T4, forms a module in P. Note that σP (G) = L Xl=1" kl m −(cid:18) Vl 2m(cid:19)2# = 1 m L Xl=1 kl − L 2m(cid:19)2 Xl=1(cid:18) Vl , (10) where PL l=1 kl is at least the number of local edges in G. Since the number of global edges is exactly d · Cn, which by Lemma 6.2 is at most 2dn/ loga+1 n with probability 1 − o(1), the number of local edges is m − (2dn/ loga+1 n). Since m = dn, we have 1 m L Xl=1 kl ≥ 1 − (2/ loga+1 n). Next we bound Vl for each module l. First we consider the homochromatic sets appearing in time 38 interval [T3, T4]. By Lemma 7.1, with probability 1 − o(1), the volume of every such l is bounded by O(loga+1 n). So the contribution of these modules to the termPL after T4. Since T4 = (cid:16)1 − log(a−1)/2 n(cid:17) n, the total volume of the homochromatic sets appearing after Then we consider the module which is the union of the homochromatic sets appearing before T3 or 2m(cid:17)2 l=1(cid:16) Vl in Equation (10) is o(1). 1 . For those appearing before T3, since T3 = n loga+2 n , the total volume of them T4 is at most 2dn log(a−1)/2 n cannot exceed 2dn loga+2 n O(loga+1 n) = O(n/ log n) plus the number of all global edges. Since the latter is at most 2dn/ loga+1 n with probability 1− o(1), the volume of this part is at most O(n/ log n). So the contribution of this module to the termPL Combining these two parts, the termPL For (4). We define a partition P as follows: Each homochromatic set in G is a module in P. We will calculate LU (G) and LP(G), respectively. We will use the power law degree distribution of G, and also in Equation (10) is o(1). Thus σP (G) = 1− o(1). 2m(cid:17)2 l=1(cid:16) Vl 2m(cid:17)2 l=1(cid:16) Vl in Equation (10) is also o(1). (3) follows. of each module. By Theorem 5.1, (2)(iii) and (2)(ii), the degrees of nodes in G follows a power law distribution with power exponent β = 3, and this holds in each homochromatic set, that is, in each module in P. Let where dmax is the maximum degree of nodes in G. So the number of nodes of degree i in G is (roughly) A = k−3, dmax Xk=d n · i−3/A. Note that dmax A = Xk=d k−3 ≤Z ∞ d−1 1 x3 dx = 1 2(d − 1)2 . So the number of nodes of degree i in G is at least 2(d−1)2n . Therefore, i3 39 LU (G) ≥ − 2(d − 1)2n i3 dmax 2m · log2 Xi=d (cid:18) i (d − 1)2n log2 e m (d − 1)2n log2 e m (d − 1)2n log2 e 2m2 (d − 1)2n log2 e 2m2 2m i i dmax 2m(cid:19) · 1 Xi=d i2 · log Z dmax Z (cid:20)(cid:18) 2m d · log 2m dmax 2m d d log ydy = ≥ = = 1 x2 · log 2m x dx 2m d − 2m d (cid:19) −(cid:18) 2m dmax · log 2m dmax − 2m dmax(cid:19)(cid:21) . Since dmax goes to infinity as m → ∞, 2m d ≫ 2m dmax for large enough m. Note that m = dn. So we have LU (G) ≥ 2m2 (d − 1)2n d (cid:19)2 ≥ (cid:18) d − 1 2m d · log 2m d · log n. Then we give an upper bound for LP(G). For each homochromatic set j, let Lj = − and LP = − L Pj=1 Vj 2m · log2 Vj 2m . By the definition of LP (G), d(j) Vj ·log2 i d(j) i Vj nj Pi=1 LP (G) = Vj 2m Lj + mg m LP. L Xj=1 To bound Lj's and LP, we note that, by information theoretical principle, the uniform distribution indicates the maximum entropy. So for each j, if it has a size sj, which is almost surely O(loga+1 n) by Theorem 5.1 (1)(ii), then and by average, Lj ≤ log2 sj = O(log log n), Vj 2m L Xj=1 Lj = O(log log n). 40 Since by Theorem 5.1 (1)(i), L is almost surely at most 2n/ loga n, LP ≤ log2 L ≤ log n. Note that the number of global edges is d· L, which is almost surely at most 2dn/ loga n. Combining them together, we have Thus, mg m LP = O(cid:18) 1 loga n(cid:19) . LP (G) = O(log log n). The entropy community structure ratio of G by P τ P (G) = 1 − LP (G) LU (G) = 1 − O(cid:18) log log n log n (cid:19) = 1 − o(1). The entropy community structure ratio of G τ (G) = max P {τ P (G)} = 1 − o(1). (4) follows. This completes the proof of Theorem 5.2. 8 Combinatorial Characteristics Principle In this section, we prove the combinatorial characteristics principles of homophyly networks, including Theorems 5.3, 5.4, 5.5, and 5.6. 8.1 Degree Priority Principle Proof 3 (Proof of Theorem 5.3) Let T3 = n loga+2 n , T4 =(cid:16)1 − We just need to consider the nodes in the homochromatic sets that appear in time interval [T3, T4]. 1 log(a−1)/2 n(cid:17) n. We will show that they satisfy the properties (1)-(4) with probability 1 − o(1). 41 For (1) and (2), since for each node v, with probability O(1/t2), there are at least two edges as- sociated with a newly created seed node connecting to v, the second degree of v is at most one with probability 1 − o(1). So the first degree of v is the number of neighbors of the same color as v. Both (1) and (2) follow. For (3), note that for a node v of degree dv at time t, the probability that there is a new seed connect- ing to v is at most 1 loga t · dv 2dt · d = dv 2t loga t = O( 1 t ). Thus the length of degrees of v is expected to be O(log n), and so with probability 1 − o(1), it is at most O(log n). For a node x created after time step r, the length of degrees of x is expected to be bounded by O(log log n), so that with probability 1 − o(1), it is at most O(log log n). For (4), note that a homochromatic set is constructed by preferential attachment scheme, in which the degree of the first node is lower bounded by square root of the number of nodes. Since the size of the homochromatic set is Ω(log(a+1)/2), the degree of the seed node contributed by the nodes of the same color, that is the first degree, is lower bounded by Ω(log(a+1)/4). Theorem 5.3 is proved. We notice that for homophyly networks, we have only the upper bound of lengths of degrees of nodes. In applications, both upper and lower bounds of lengths of degrees of nodes may play essential roles. 8.2 Widths Principle Proof 4 (Proof of Theorem 5.4) Let N be the number of seed nodes in G. By Theorem 5.1, N = Ω( n loga n ). Suppose that t1 < t2 < ··· < tN are the time steps at which the seed nodes x1, x2,··· , xN are created. For each j, let Xj be the community of xj. By the construction of G, we have that for a fixed j, for every t with tj < t < tj+1, the node created at time step t contributes to the volume of a randomly and uniformly chosen community Xi 42 among X1, X2,··· , Xj. Therefore in the interval (tj, tj+1), the volumes of X1, X2 ··· , Xj increased uniformly and randomly. At time step tj+1, the new seed node xj+1 is created. By the construction of G, for each i ∈ {1, 2,··· , j}, the contribution of both widths and volume of Xi is proportional to the volume of Xi immediately before time step tj+1. By neglecting the contribution of volumes by global edges, we have that the expected increment of widths of Xi during time step tj+1 is Ω( 1 j ). By using the above analysis, we prove our theorem. For (1), for X = Xi for some i ≤ l, then wG(X) is at least Ω( Pj=l (2) follows similarly. For (3), for an X = Xi for some i > r, we have that the width of X is at most N 1 j ) = Ω(log N ) = Ω(log n). 1 j ) = O(log log N ) = O(log log n). By the choice of r, (4) follows from (3). Theorem 5.4 follows. O( N Pj=r 8.3 Inclusion and Infection Principle Proof 5 (Proof of Theorem 5.5) For (1). Let x be a non-seed node created at time step s. Then at step s, x links only to nodes of the same color. By the construction, for any t > s, if a non-seed node y is created at step t, then y has edge with x only if y shares the same color with x. (1) holds. For (2). Let x be a seed node created at time step s. Then there are at most d non-seed nodes which link to x during step s. By the construction, for any t > s, if a non-seed node y is created at step t, then there is no edge between x and y that can be created in step t. Therefore wG(x) = O(1). (2) holds. Theorem 5.5 holds. 8.4 King Node Principle Proof 6 (Proof of Theorem 5.6) Suppose that x0, x1,··· , xN are all nodes of X, created at time steps t0 < t1 < ··· < tN respectively. We use d(i)[t] to denote the degree of xi at the end of time step t. By the construction of G, we have that d(0)[t0] = d, d(0)[t1] ≥ 2d, 43 for all i > 0. d(i)[ti] = d By the construction of G, at every time step t + 1 with ti < t + 1 ≤ ti+1, there is a fixed number αt ≥ 1 such that for every j ≤ i, the expectation of the degree of xj is amplified by αt. Therefore E[d(0)] is at least twice of E[d(i)] for all i ∈ {1, 2,··· , N}. The theorem holds. We remark that Theorem 5.6 gives us only some statistical properties of the remarkable role of the seed nodes. Rigorous proofs of the roles of the king nodes need concentration results of the king amplifier, defined by θ(x0) = max{d(x) x∈X, x6=x0} , where X is a community, x0 is the seed node of X, d(x0) for which new methods are needed. 9 Predicting Principle in Networks Theorems 5.1, 5.2, 5.3, 5.4, 5.5 and 5.6 show that there is a structural theory for the homophyly networks. Equally important, our homophyly model explores that there is a semantical interpretation for each of the natural communities, that is, nodes of the same community share common features. We will show that this property provides a principle for predicting in networks. To verify that communities of a network are interpretable, we introduce a community finding algo- rithm. 9.1 A Community Finding Algorithm We design our algorithm by modifying the personalized PageRank vector. For this, we first review some key ingredients of the PageRank vector and the related partitioning algorithm which will be useful for us. Given a graph G, an initial vector s on the vertex set and a teleportation parameter κ, the PageRank vector prκ(s) is defined recursively as prκ(s) = κs + (1 − κ)prκ(s)W, 44 (11) where W = I+D−1A 2 is the lazy random walk on G and I, D, A denote the identity matrix, the diagonal degree matrix of G and the adjacency matrix of G, respectively. It is easy to see that equation (11) has a unique solution. When s equals the indicator vector χv of vertex v, we say that the prκ(χv) is the personalized PageRank vector with starting vertex v and teleportation parameter κ. For an arbitrarily small constant ǫ, there is an efficient ǫ-approximation algorithm ApproximatePR(v, κ, ǫ) to compute prκ(χv), which outputs a vector p = prκ(χv − r) (1). Theorem 5.1 (1) shows that an interpretable community has size bounded by O(lnγ n), and Theorem 5.2 (1) shows that the conductance of an interpretable community X is bounded by O( 1 X β ) for some constant β. We will design our algorithm by using these conditions as the stopping conditions in a personalized pagerank searching. We use A to denote the algorithm, which proceeds as follows: Algorithm A Given a node v and two constants α, β, we describe the algorithm to find a community, if any, as follows: 1) Choose small constants κ and ǫ, and obtain an ǫ-approximation vector p of the personalized PageRank vector starting from v with teleportation parameter κ by invoking ApproximateP R(v, κ, ǫ). 2) Do a sweep operation over the vector p such that: pv1 deg(v1) ≥ pv2 deg(v2) ≥ ··· ≥ pvs deg(vs) , (12) where s = supp(p) is the size of the support set of p. 3) In increasing order, for each i = 1,··· , s, calculate the conductance of the vertex set Si = {v1,··· , vi} and output the first set, Si, satisfying simultaneously the following two conditions: Φ(Si) ≤ α/iβ , Φ(Si) < Φ(Si+1). (13) (14) Therefore, our algorithm A is the approximation algorithm in (1) with a new terminating condition predicted by Theorem 5.2 (1). 45 9.2 Finding Missing Keywords of Papers from Citation Networks We study Arxiv HEP-TH (high energy physics theory). It is a citation graph from the e-print arXiv which covers all the citations within a dataset of 27, 770 papers with 352, 807 edges. If paper i cites paper j, then the graph contains a directed edge from i to j. Each of the papers in the network contains a title, abstract, publication journal, and publication date of the paper. There are 1214 papers among the total 27400 papers for which keywords were listed by their authors. We call a paper annotated, if the keywords of the paper have been listed by its authors, and un-annotated, otherwise. Our goal is to use the annotated papers to predict and confirm keywords for the un-annotated papers in the network. Our homophyly model implies that a community has a short list of keywords which very well repre- sent the features of the community. Let C be a community found by our algorithm A in Subsection 9.1. For some small constant i, we use the most popular i keywords appeared in the annotated papers in C to represent the common features of C, written CF(C). Then we predict that each keyword in CF(C) is a keyword of an un-annotated paper in C. For a keyword K ∈ CF(C), and a paper P ∈ C, we say that K is confirmed to be a keyword of P , if K appears in either the title or the abstract of paper P . For each community, C say, suppose that K1, K2,··· , Kl are all known keywords among anno- tated papers in the community C. We use the known keywords K1, K2,··· , Kl to predict and confirm keywords for un-annotated papers in C. We proceed as follows: 1. Let i ≤ l be a number. 2. Suppose that K1, K2,··· , Ki are the most popular i keywords among all the known keywords of annotated papers in C. 3. Given a un-annotated paper P in C, for each j ≤ i, if Kj appears in either the title or the abstract of paper P , then we say that Kj is a predicted and confirmed keyword of paper P . 46 30000 25000 20000 15000 10000 5000 d e m r i f n o c e r a s d r o w y e k e s o h w s r e p a p f o r e b m u n 0 0 10 20 30 number of keywords 40 50 Figure 5: Keywords prediction. The curve represents the numbers of papers whose keywords are pre- dicted and confirmed by using the most popular k keywords as the common keywords of all the commu- nities, for k ≤ 50. The curve increases quickly and becomes flatten after k > 10. This means that each community has a few (10) remarkable common keywords, a result predicted by the homophyly networks. In Figure 5, we depict the curve of numbers of papers whose keywords are predicted and confirmed for i up to 50, where i is the number with which the most popular i keywords are used to predict the keywords of the community, for all the communities. The results in Figure 5 show that a community of the citation network can be interpreted by the most popular 10 keywords and that the interpretations of communities can be used in predictions and confirmations of functions of nodes in the network. This experiment shows that for each community, nodes of the same community do share common features, that is, the short list of common keywords, and that the common features of each of the communities can be used in predicting and confirming functions in networks. Our homophyly model predicts that this property may be universal for many real networks. This provides a principle for predicting and confirming functions in networks. 9.3 Homophyly Law of Networks In Table 2, we describe the full prediction and confirmation of keywords of papers in the network. In the table, the first row shows that if we define the keywords of a community to be the most popular 5 keywords of annotated papers in the community, then the prediction algorithm above finds exactly 1 47 keyword for 5286 papers, 2 keywords for 2979 papers, 3 keywords for 1639 papers, 4 keywords for 768 papers, 5 keywords for 345 papers, 6 keywords for 166 papers, 7 keywords for 65 papers, 8 keywords for 21 papers, 9 keywords for 7 papers, and even 10 keywords for 2 papers. In total, there are 11279 papers to each of them there is at least one keyword is predicted and confirmed. The second row shows the number of papers for which r keywords are predicted and confirmed for all r ∈ [1, 10], in the case that we define the keywords of a community to be the most popular 10 known keywords of annotated papers in the community. In this case, there are 13795 papers in total each of which has at least one keyword is predicted and confirmed. Table 2 shows that most communities have a short list of representative keywords, this is 10 or even 5. This is exactly the result predicted by our homophyly model. i\r 5 10 15 20 25 30 35 40 45 50 all 1 5286 4701 4360 3953 3666 3344 3199 3081 2987 2869 2336 2 2979 3605 3627 3467 3301 3169 3116 3044 2992 2915 2587 3 1639 2429 2671 2853 2909 2934 2952 2922 2850 2770 2560 4 768 1407 1798 1999 2116 2223 2238 2255 2321 2340 2348 5 345 790 1074 1310 1498 1648 1681 1734 1741 1844 1883 6 166 434 606 798 912 1053 1152 1218 1253 1291 1528 7 65 236 340 462 575 692 728 752 836 880 1150 8 21 102 178 268 342 410 460 500 517 579 849 9 7 48 95 144 201 253 272 323 364 413 568 10 2 23 37 67 81 129 145 158 181 214 373 total 11279 13795 14829 15397 15721 16015 16151 16239 16333 16453 16842 Table 2: Keywords prediction Let G = (V, E) be a network. Suppose that each node v ∈ V has some colors. For a node v ∈ V , we use D(v) to denote the number of colors associated with v. We define the dimension of G by dim(G) = max v∈V {D(v)}. Suppose as usual that in a citation network, G say, each paper has up to 5 keywords. Then G has dimension 5. By Figure 5 and Table 2, we observe the following property: Given a network G, if G 48 has dimension D, then, each community, C say, of G can be interpreted by O(D) many common colors of the community C. This experiment, together with our homophyly model, predicts that the following predicting principle may hold for many real networks. Predicting principle: Let G be a network of dimension D. Then for a (typical or natural) community C of network G, there is a list of functions of length O(D) which represent the common features of nodes in C, so that C is interpreted by a list of common features as short as O(dim(G)). This principle provides not only the mechanism for network predicting, but also a quantitative crite- rion for predicting functions in networks. 10 C-Community Structure Ratio of Real Networks In Definition 2.4, we defined the conductance community structure ratio of a network given by an al- gorithm, A say. This suggests the algorithmic problem to find the algorithm which finds the maximal conductance community structure ratios of networks. In Section 4, we used three algorithms C, E and M based on conductance, entropy and modularity definitions of community structures respectively, where C is the algorithm A in Subsection 9.1. Here we use these algorithms again to compute the conductance community structure ratios of the networks given by the three algorithms. In Table 3, we report the conductance community structure ratios of the algorithms C, E and M on 22 real networks. Table 3 shows that for most real networks, algorithm C finds the largest conductance community structure ratio, and that for some real networks, algorithm E finds the largest conductance community structure ratio. A common property of all the real networks is that the conductance community structure ratios of all real networks are large. In fact, there are 6 networks whose conductance community struc- ture ratios are greater than 0.9, there are 9 networks whose conductance community structure ratios are between 0.8 and 0.9, there is one network whose conductance community structure ratio is between 0.7 and 0.8, and there is one network whose conductance community structure ratio is at least 0.59. These 49 Networks\Algorithms football cit-hepph cit-hepth col-astroph col-condmat col-grqc col-hepph col-hepth p2p24 p2p25 p2p30 p2p31 p2p4 p2p5 p2p6 p2p8 p2p9 email-enron email-euall road-ca road-pa road-tx θC(G) 0.97 0.7 0.59 0.72 0.84 0.96 0.77 0.89 0.83 0.85 0.84 0.82 0.87 0.91 0.92 0.94 0.92 0.73 0.77 0.98 0.98 0.99 θE(G) 0.76 0.83 0.54 0.56 0.55 0.72 0.8 0.67 0.46 0.56 0.58 0.52 0.6 0.71 0.56 0.81 0.80 0.55 0.85 0.92 0.97 0.94 θM(G) 0.74 0.19 0.31 0.25 0.77 0.82 0.24 0.7 0.51 0.54 0.5 0.54 0.38 0.4 0.37 0.47 0.46 0.48 0.25 0.996 0.99 0.99 Table 3: conductance community structure ratios of community detecting algorithms based on minimal conductance, information flow and modularity on some real networks, written by C, E and M respec- tively. 50 30000 25000 20000 15000 10000 5000 d e m r i f n o c e r a s d r o w y e k e s o h w s r e p a p f o r e b m u n 0 0 10 prediction prediction prediction   40 50 20 30 keywords number in community Figure 6: Keywords Prediction. The three curves correspond to the results of prediction and confirmation of the three algorithms C, E and M, marked by θ-, τ -, and σ-predictions respectively in the figure. This figure shows that θC(G) is the largest among the three algorithms, and at the same time, the prediction and confirmation of keywords based on the communities found by algorithm C are the best among that of the three algorithms. results show that each of the real networks has a remarkable community structure. However it is hard to have a single algorithm which finds the maximal conductance community structure ratios θ's for all networks. 11 Test of Community Finding Algorithms Given a network, G say, and a community finding algorithm A, we have a conductance community structure ratio θA(G). Theoretically speaking, for two algorithms A and B, if θA(G) > θB(G), then A is better than B for G. However, we don't know: what does this mean in real networks analyses and real world applications? We use the three algorithms C, E, and M in Section 10 again. We implement the keywords prediction and confirmation on the same citation network based on three community finding algorithms C, E, and M respectively. We found that the conductance community structure ratios of the network G given by C, E, and M are 0.59, 0.54 and 0.31 respectively (referred to Table 3). We depict the curves of keywords predictions and confirmations of the three algorithms on the citation network in Figure 6. 51 From Figure 6, we observe that algorithm C has the largest conductance community structure ratio and the best performance of keywords prediction and confirmation. This means that larger conductance community structure ratio implies a better interpretation of communities and a better performance in pre- dicting and confirming functions in networks. Therefore maximizing conductance community structure ratios of networks does have implications in real world network analyses and applications. 12 Conclusions and New Directions We proposed a new model of networks, the homophyly model, based on which we built a structural theory of networks. Our theory is a mathematical understanding of networks. However, the homophyly model is motivated by observing the connecting behaviors in nature and society, therefore the high level open issue is to explore the social, biological and physical understandings of the homophyly model. The fundamental results of our theory are: community structures are definable, and communities are interpretable in networks. The two results point out the syntax and semantic aspects of networks respectively. We believe that our research provides a firm foundation for a structural theory of networks. However, to fully develop such a theory, there are a number of new issues left open. We discuss a few of the most important ones here. The first is a non-linear or high dimensional network theory. Given a network, G say, in which each node has some colors, for each node v, we use D(v) to denote the number of colors associated with it. In this case, we define the dimension of G to be the maximal of D(v)'s among all nodes v, that is, dim(G) = max v∈V {D(v)}. By this definition, our homophyly networks all have dimension 1, so that they are linear networks. Therefore our theory is a linear network theory. Clearly, it is interesting to develop a non-linear or high dimensional network theory, which is expected to be harder, since there would be more combinatorics involved in the theory. The second is a global theory of networks. We regard communities as local structures of networks. This means that our theory is a local theory of networks, predicting a global theory of networks simulta- 52 neously. The third is to develop new theory and applications based on the principles of the community struc- tures discovered in the present paper. For this, we introduce a few of them: (1) To understand the nature and to develop applications of the holographic law predicted here in large-scale real network data Our theory predicts that for a large-scale real network, G say, the power exponent of the power law of G is the same as that of a natural or typical community GX of G for some set X of size polynomial in log n, where GX is the induced subgraph of X in G. This would be an interesting new phenomenon of real world big data. New applications of the result are of course possible. For instance, in network searching, we may find a community X of size as large as a few hundreds, which is still large for real recommendation. By the holographic law, there is a small set, X0 ⊂ X which almost dominates X, in which case, X0 could be as small as 10 to 20 nodes. In so doing, we could simply recommend X0, which would keep the most useful information of X. (2) To understand the roles of external centrality of communities of a network Our widths principle predicts that for a natural community X of a network G such that the size of X is polynomial in log n, where n is the number of nodes in G, there is a set X0 ⊂ X such that X0 is as small as O(log log n) and such that X0 almost dominates the external links from X to outside of X. This property is useful in both theory and applications. For instance, in a citation network G, we may find a community of G, X say, in which case, X could be interpreted as the papers on some topic, and the external centrality set X0 of X could be interpreted as the papers having influence on research of other topics. By extracting the keywords of papers in X0, we may already know much of the relationships between the topic of X and the topics relevant to that of X. (3) To understand the roles of the local communication law in network communications 53 Our fundamental theorem says that the diameters of natural communities are bounded by O(log log n). This means that in a communication network, the most frequent communications are local ones which are exponentially shorter than that of a global communication, and that global communica- tions are much less frequent. This provides an insight to analyze the complexity of communica- tions in networks. (4) To investigate new notions of networks that are locally collective by using our local theory of networks We understand that communities of a network are local structures of the network, and that there are important notions of networks which are locally collective. Our theory provides an insight to study the locally collective notions by the community structure of networks. Here we discuss one of the most important such notions, the happy node problem below. In a homophyly network, G say, each node v is associated with a color. We could define happiness as follows: we say that a node v is happy in G, if all the neighbors of v share the same color as v. With this definition, we know that most nodes are happy in G. On the other hand, the diameter of a community in G is O(log log n). This means that for a node v, whether or not v is happy in G, is independent of nodes Ω(log log n) far away from v. These observations provide an insight to build happiness of individuals as a locally collective notion of networks, which calls for further investigation. (5) To develop a security theory of networks based on the structural theory of networks The first achievement of this is the security model and provable security of networks in (15), in which a number of open problems were posed. (6) To develop a theory of evolutionary games in networks based on the structural theory of networks This is possible by our work in (14). The goal of this theory would solve some long standing challenges in social science and economics. The later mission is of course a grand challenge. 54 (7) Approximation and hardness of approximation of the conductance community structure ratio of networks Our definition of the conductance community structure ratio provides a way to test the quality of community finding algorithms. In real networks, each of the algorithms based on personalized pagerank, compression of information flow and modularity has reasonably good performance in finding the conductance community structure ratios. However, it is an open question to prove some theoretical results for approximation and hardness of approximation of the problem. (8) To prove theoretically that the community structure hypothesis holds for networks of other classical models such as the ER and PA models. We have shown experimentally that the hypothesis holds for networks of both the ER and PA models. It would be interesting to have theoretical proofs of the results. Generally, it is interesting to prove the hypothesis for networks of all reasonable models. References and Notes 1. R. Andersen, F. Chung, and K. Lang. Local graph partitioning using pagerank vectors. 47th Annual IEEE Symposium on Foundations of Computer Science, 2006. FOCS'06., pages 475 -- 486, 2006. 2. A. L. Barab´asi. Scale-free networks: A decade and beyond. Science, 325(24):412 -- 413, July 2009. 3. A. L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286:509 -- 512, 1999. 4. B. Bollob´as and O. Riordan. The diameter of a scale-free random graph. Combinatorica, 24(1):5C34, 2004. 5. P. Chen and S. Redner. Community structure of the physical review citation network. Journal of Informetrics, 4(3):278 -- 290, 2010. 55 6. H. Chernoff. A note on an inequality involving the normal distribution. The Annals of Probability, 9:533 -- 535, 1981. 7. F. Chung and L. Lu. Complex graphs and networks. American Mathematical Society, 2006. (book). 8. A. Clauset. Finding local community structure in networks. Physical Review E, 72(2):026132, 2005. 9. A. Clauset, M.E.J. Newman, and C. Moore. Finding community structure in very large networks. Physical Review E, 70(6):066111, 2004. 10. P. Erdos and A. R´enyi. On the evolution of random graphsrandom graphs, i. Magyar Tud. Akad. Mat. Kutat´o Int. K´ozl., 5:17 -- 61, 1960. 11. S. Fortunato. Community detection in graphs. CoRR abs, 0906(0612), Jan 2009. 12. S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75 -- 174, 2010. 13. J. Kleinberg. Navigation in a small world. Nature, 406:845, 2000. 14. A. Li, Y. Pan, and X. Yong. A honey bee principle solves the prisoner's dilemma in a power law world. To appear, 2013. 15. A. Li, Y. Pan, and W. Zhang. Provable security of networks. To appear, 2013. 16. T. Luczak. Sparse random graphs with a given degree sequence. Theory of Probability and Mathe- matical Statistics, 51:1 -- 27, 1995. 17. S. Milgram. The small world problem. Psychology Today, 2(1):60 -- 67, 1967. 18. M. Newman and M. Girvan. Physical Review E, 69(2):026113, 2004. 19. M.E.J. Newman. Detecting community structure in networks. The European Physical Journal B- Condensed Matter and Complex Systems, 38(2):321 -- 330, 2004. 56 20. B. Pittel. Note on the heights of random recursive trees and random m-ary search trees. Random Structures and Algorithms, 5:337 -- 347, 1994. 21. F. Radicchi, C. Castellano, F. Cecconi, V. Loreto, and D. Parisi. Defining and identifying communi- ties in networks. Proceedings of the National Academy of Sciences, 101(9):2658, 2004. 22. M. Rosvall and C.T. Bergstrom. Maps of random walks on complex networks reveal community structure. Proceedings of the National Academy of Sciences, 105(4):1118, 2008. 23. D. J. Watts and S. H. Strogatz. Collective dynamics of small world networks? Nature, 393:440 -- 442, 1998. 57 0.9 0.8 0.7 0.6 0.5 0.4 0.3 0.2 0.1 s o i t a R e r u t c u r t S y t i n u m m o C (G) (G) (G)  0.0 0.000 0.001 0.002 p 0.003 0.004 0.005 30000 25000 20000 15000 10000 5000 d e m r i f n o c e r a s d r o w y e k e s o h w s r e p a p f o r e b m u n 0 0 10 prediction  prediction prediction   40 50 20 30 keywords number in community
1610.01961
2
1610
2016-10-17T17:00:51
Fast Hierarchy Construction for Dense Subgraphs
[ "cs.SI" ]
Discovering dense subgraphs and understanding the relations among them is a fundamental problem in graph mining. We want to not only identify dense subgraphs, but also build a hierarchy among them (e.g., larger but sparser subgraphs formed by two smaller dense subgraphs). Peeling algorithms (k-core, k-truss, and nucleus decomposition) have been effective to locate many dense subgraphs. However, constructing a hierarchical representation of density structure, even correctly computing the connected k-cores and k-trusses, have been mostly overlooked. Keeping track of connected components during peeling requires an additional traversal operation, which is as expensive as the peeling process. In this paper, we start with a thorough survey and point to nuances in problem formulations that lead to significant differences in runtimes. We then propose efficient and generic algorithms to construct the hierarchy of dense subgraphs for k-core, k-truss, or any nucleus decomposition. Our algorithms leverage the disjoint-set forest data structure to efficiently construct the hierarchy during traversal. Furthermore, we introduce a new idea to avoid traversal. We construct the subgraphs while visiting neighborhoods in the peeling process, and build the relations to previously constructed subgraphs. We also consider an existing idea to find the k-core hierarchy and adapt for our objectives efficiently. Experiments on different types of large scale real-world networks show significant speedups over naive algorithms and existing alternatives. Our algorithms also outperform the hypothetical limits of any possible traversal-based solution.
cs.SI
cs
Fast Hierarchy Construction for Dense Subgraphs 6 1 0 2 t c O 7 1 ] I S . s c [ 2 v 1 6 9 1 0 . 0 1 6 1 : v i X r a Ahmet Erdem Sarıyuce Sandia National Laboratories Livermore, CA, USA [email protected] ABSTRACT Discovering dense subgraphs and understanding the rela- tions among them is a fundamental problem in graph min- ing. We want to not only identify dense subgraphs, but also build a hierarchy among them (e.g., larger but sparser subgraphs formed by two smaller dense subgraphs). Peel- ing algorithms (k-core, k-truss, and nucleus decomposition) have been effective to locate many dense subgraphs. How- ever, constructing a hierarchical representation of density structure, even correctly computing the connected k-cores and k-trusses, have been mostly overlooked. Keeping track of connected components during peeling requires an addi- tional traversal operation, which is as expensive as the peel- ing process. In this paper, we start with a thorough survey and point to nuances in problem formulations that lead to significant differences in runtimes. We then propose efficient and generic algorithms to construct the hierarchy of dense subgraphs for k-core, k-truss, or any nucleus decomposition. Our algorithms leverage the disjoint-set forest data structure to efficiently construct the hierarchy during traversal. Fur- thermore, we introduce a new idea to avoid traversal. We construct the subgraphs while visiting neighborhoods in the peeling process, and build the relations to previously con- structed subgraphs. We also consider an existing idea to find the k-core hierarchy and adapt for our objectives efficiently. Experiments on different types of large scale real-world net- works show significant speedups over naive algorithms and existing alternatives. Our algorithms also outperform the hypothetical limits of any possible traversal-based solution. INTRODUCTION 1. Graphs are used to model relationships in many applications such as sociology, the WWW, cybersecurity, bioinformat- ics, and infrastructure. Although the real-world graphs are sparse (E << V 2), vertex neighborhoods are dense [23]. Clustering coefficients [50], and transitivity [49] of real-world networks are also high and suggest the micro-scale dense structures. Literature is abundant with the benefits of dense subgraph discovery for various applications [30, 22]. Exam- ples include finding communities in web [29, 13], and social networks [26], detecting spam groups in web [20], discover- ing migration patterns in stock market [14], improving soft- licensed under This work is the Creative Commons Attribution- NonCommercial-NoDerivatives 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-nd/4.0/. For any use beyond those covered by this license, obtain permission by emailing [email protected]. Proceedings of the VLDB Endowment, Vol. 10, No. 3 Copyright 2016 VLDB Endowment 2150-8097/16/11. Ali Pinar Sandia National Laboratories Livermore, CA, USA [email protected] ware understanding by analyzing static structure of large- scale software systems [55], analyzing gene co-expression networks [54], finding DNA motifs [16], quantifying the sig- nificance of proteins [53] and discovering molecular com- plexes [4] in protein interaction networks, identifying real- time stories in microblogging websites [3], and improving the throughput of social-networking sites [21]. k-core [43, 34], k-truss [39, 10, 56, 47, 44, 57, 26], and their generic variant for larger cliques, nucleus decomposi- tion [42], are deterministic algorithms which are effective and efficient solutions to find dense subgraphs and creat- ing hierarchical relations among them. They also known as peeling algorithms due to their iterative nature to reach the densest parts of the graph. Hierarchy has been shown to be a central organizing principle of complex networks, which is useful to relate communities of a graph and can offer in- sight into many network phenomena [9]. Peeling algorithms do not aim to find a single optimum dense subgraph, but rather gives many dense subgraphs with varying sizes and densities, and hierarchy among them, if supported by a post-processing traversal step [34, 42]. 1.1 Problem, Misconception and Challenges We focus on undirected, unattributed graphs. Hierarchy of dense subgraphs is represented as the tree structure where each node is a subgraph, each edge shows a containment relation, and the root node is the entire graph. The aim is to efficiently find the hierarchy by using peeling algorithms. Misconception in the literature: Recent studies on peeling algorithms has interestingly overlooked the connec- tivity condition of k-cores and k-trusses. In the original def- inition of k-core, Seidman states that k-core is the maximal and connected subgraph where any vertex has at least degree k [43]. However, almost all the recent papers on k-core algo- rithms [8, 18, 19, 6, 36, 32, 28, 52, 51, 32] did not mention that k-core is a connected subgraph although they cite Seid- man's seminal work [43]. On the k-truss side, the idea is in- troduced independently by Saito et al. [39] (as k-dense), Co- hen [10] (as k-truss), Zhang and Parthasarathy [56] (as trian- gle k-core), and Verma and Butenko [47] (as k-community). They all define k-truss as a subgraph where any edge is in- volved in at least k triangles. Regarding the connectivity, Cohen [10], and Verma and Butenko [47] defined the k-truss as a single component subgraph, while others [39, 56] ig- nored the connectivity. In practice, overlooking the con- nectedness limits the contributions of most previous work regarding the performance and semantic aspects. More de- tails are given in Section 3. Finding k-cores requires traversal on the graph after the peeling process, where maximum k-core values of vertices are found. It is same for k-truss and nucleus decompositions Table 1: Speedups with our best algorithms for each decomposition. Starred columns (*) show lower bounds, when the other algorithm did not finish in 2 days or did a partial work. Best k-truss and (3,4) algorithms are significantly faster than alternatives, and also more efficient than the hypothetically best possible algorithm (Hypo) that does traversal to find the hierarchy. k-core Naive Hypo Naive TCP*[26] Hypo Naive* (3, 4) nucleus k-truss 25.50x 1.10x 12.58x Stanford3 twitter-hb 27.89x 1.33x 16.24x 58.02x 1.68x 90.50x uk-2005 3.41x 1.48x 1321.89x 38.96x 3.27x 1.78x 11.07x 1.24x 1.98x where the traversal is done on higher order structures. Con- structing the hierarchy is only possible after that. However, it is not easy to track nested structure of subgraphs dur- ing a single traversal over entire graph. Traversing k-cores is cheap by a simple breadth-first search (BFS) in O(E) time. When it comes to k-truss and higher order peeling algorithms, however, traversal becomes much costly due to the larger clique connectivity constraints. 1.2 Contributions Motivated by the challenging cost of traversals and hierarchy construction, we focus on efficient algorithms to find the k- cores, k-trusses or any nuclei in general. Our contributions are as follows: • Thorough literature review: We provide a detailed review of literature on peeling algorithms to point the misconception about k-core and k-truss definitions. We highlight the implications of these misunderstandings on the proposed solutions. We also stress the lack of under- standing on the hierarchy construction and show that it is as expensive as the peeling process. • Hierarchy construction by disjoint-set forest: We propose to use disjoint-set forest data structure (DF) to track the disconnected substructures that appear in the same node of the hierarchy tree. Disjoint-set forest is in- corporated into the hierarchy tree by selectively process- ing the subgraphs in a particular order. We show that our algorithm is generic, i.e., works for any peeling algorithm. • Avoiding traversal: We introduce a new idea to build the hierarchy without traversal. In the peeling process, we construct the subgraphs while visiting neighborhoods and bookkeep the relations to previously constructed sub- graphs. Applying a lightweight post-processing operation to those tracked relations gives us all the hierarchy, and it works for any peeling algorithm. • Experimental evaluation: All the algorithms we pro- posed are implemented for k-core, k-truss and (3, 4)-nucleus decompositions, in which peeling is done on triangles and the four-clique involvements. Furthermore, we bring out an idea from Matula and Beck's work [34], and adapt and implement it for our needs to solve the k-core hierar- chy problem more efficiently. Table 1 gives a summary of the speedups we get for each decomposition. Our k-core hierarchy algorithm adaptation outperforms naive base- line by 58 times on uk-2005 graph. The best k-truss and (3, 4) algorithms are significantly faster than alternatives. They also beat the hypothetically best possible algorithm (Hypo) that does traversal to find hierarchy. It is a strik- ing result to show the benefit of our traversal avoiding idea. Table 2: Summary of notations Symbol Description Kr r-clique; complete graph of r vertices ωs(u) Ks-degree of u; number of s-cliques containing u ωr,s(H) min{ωs(u) : u ∈ H}; min Ks-degree of a Kr in H H u λs(u) λr,s(H) min{λs(u) : u ∈ H}; min λs of a Kr in graph H Tr,s 2. PRELIMINARIES max k-(r, s) nucleus associated with the Kr u ωr,s(H u); max k-(r, s) number of the Kr u sub-(r, s) nucleus; maximal union of Krs of same λs This section presents building blocks for our work. 2.1 Nucleus decomposition Let G be an undirected and simple graph. We start by quoting the Definitions 1 and 2 from [42]. We use Kr to denote an r-clique. Definition 1. Let r < s be positive integers and S be a set of Kss in G. • Kr(S) is the set of Krs contained in some C ∈ S. • The number of C ∈ S containing u ∈ Kr(S) is the Ks-degree of u. • Two Krs u, u(cid:48) are Ks-connected if there exists a se- quence u = u1, u2, . . . , uk = u(cid:48) in Kr(S) such that for each i, some Ks C ∈ S contains ui ∪ ui+1. These definitions are generalizations of the standard ver- Indeed, setting r = 1 and tex degree and connectedness. s = 2 (so S is a set of edges) yields exactly that. The main definition is as follows. Definition 2. Let k, r, and s be positive integers such that r < s. A k-(r, s) nucleus is a maximal union S of Kss such that: • The Ks-degree of any u ∈ Kr(S) is at least k. • Any u, u(cid:48) ∈ Kr(S) are Ks-connected. Figure 1: 2-(2,3) and 2-(2,4) nuclei on left and right. Figure 1 gives an example for 2-(2,3) and 2-(2,4) nucleus. For r = 1, s = 2, a k-(1,2) nucleus is a maximal (induced) connected subgraph with minimum vertex degree k. This is exactly k-core [43]. Setting r = 2, s = 3 gives maximal sub- graphs where every edge participates in at least k triangles, and edges are triangle-connected. This is almost the same definition of k-dense [39], k-truss [10], triangle-cores [56] and k-community [47]. The difference is on the connectivity con- dition; [10, 47] defines k-truss and k-community as a con- nected component, whereas [39, 56] do not mention connect- edness, implicitly allowing disconnected subgraphs. The k- truss community defined by Huang et al. [26] is the same as the k-(2,3) nucleus: both require any pair of edges to be triangle-connected. More details can be found in Section 3. In the rest of the paper, we will be generic and present all our findings for the k-(r, s) nucleus decomposition, which subsumes k-core and k-truss definitions. For an r-clique Kr u, ωs(u) denotes the Ks-degree of u. For a subgraph H ⊆ G, ωr,s(H) is defined as the minimum Ks-degree of a Kr in H, i.e., ωr,s(H) = min{ωs(u) : u ∈ H}. Definition 3. The maximum k-(r,s) nucleus associ- ated with a Kr u, denoted by H u, is the k-(r, s) nucleus that contains u and has the largest k = ωr,s(H u) (i.e., (cid:64) H s.t. u ∈ H ∧ H is an l-(r, s) nucleus ∧ l > k). The maximum k-(r, s) number of the r-clique u, denoted by λs(u), is defined as λs(u) = ωr,s(H u). Throughout the paper, λs(u) implies that u is a Kr. We also abuse the notation as λ(u) when r and s are obvious. The maximum k-(1, 2) nucleus is same as the maximum k-core, defined in [41]. For a vertex, v, λ2(v) is also equal to the maximum k-core number of v [41], or core number of v [8, 36]. Likewise, for an edge e, λ3(e) is previously defined as the trussness of an edge in [26]. Building the (r, s) nucleus decomposition of a graph G is finding the λs of all Krs in G and building the k-(r, s) nuclei for all k. The following corollary shows that given the λs of all Krs, all (r, s) nuclei of G can be found. Corollary 1. Given λs(v) for all Kr v ∈ G and assum- ing λs(u) = k for a Kr u, the maximum k-(r, s) nucleus of u, denoted by H u, consists of u as well as any Kr v that has λs(v) ≥ k and is reachable from u via a path P of Kss such that ∀C∈P , λr,s(C) ≥ k, where λr,s(C) = min{λs(u) : u ⊂ C (u is a Kr)}. Corollary 1 is easy to see for the k-core case, when r = 1, s = 2. All the traversed vertices are in H u due to maxi- mality property of k-cores, and all the vertices in H u are tra- versed due to the connectivity condition, both mentioned in Definition 2. For the maximum k-(2, 3) nucleus, we can also see the equality by Definition 2. For all edges e, λ3(e) ≥ k satisfies the first condition, and the path of triangles, which does not contain any edge whose λ3 is less than k, implies the second condition of Definition 2. Corollary 2. H u can be found by traversing G starting at the Kr u and including each Kr v to H u if • λs(v) ≥ k • ∃ a Ks C s.t. v ⊂ C ∧ λr,s(C) ≥ k. Repeating this traversal for all Krs u ∈ G gives all the k- (r, s) nuclei of G. Traversal is trivial for k-(1, 2) nucleus (k-core): include every vertex with greater or equal λ2. For r = 2, s = 3, maximum k-(2, 3) nucleus is found by doing traversal on edges. Assuming the λ3 value of the initial edge is k, the next edge in the traversal should have the λ3 value ≥ k; should be in the same triangle; and all the edges of this triangle should have λ3s greater-than or equal to k. Similar for r = 3, s = 4; traversal is done on triangles, and neighborhood condition is on the containment of triangles in four-cliques. In summary, (r, s) nucleus decomposition problem has two phases: (1) peeling process which finds the λs values of Krs, (2) traversal on the graph to find all the k-(r, s) nuclei. For r = 1, s = 2 case, the algorithm for finding λ2 of vertices is based on the following property, as stated in [34]: to find the vertices with the λ2 of k, all vertices of degree less than k and their adjacent edges are recursively deleted. For first phase, we provide the generic peeling algorithm in Alg. 1, which has been introduced in our earlier work [42], and for the second phase, we give the generic traversal algorithm in Alg. 2, which is basically the implementation of Corollary 2. The final algorithm, outlined in Alg. 3 combines the two. Lastly, we define sub-(r, s) nucleus and strong Ks -connected ness to find the Krs with same λs values. We will use them to efficiently locate all the k-(r, s) nuclei of given graph. Mark u as processed 11 return array λs(·) and maxλ Algorithm 2: Traversal(G, r, s, λ(·), maxλ) 1 for each k ∈ [1, maxλ] do visited[v] = false, ∀ Kr v ∈ G for each Kr u ∈ G do if λs(u) = k and not visited[u] then Q ← empty queue, Q.push(u) S ← empty set, S.add(u) visited[u] ← true while not Q.empty() do 9 10 2 3 4 5 6 7 8 9 10 Algorithm 1: Set-λ(G, r, s) 1 Enumerate all Krs in G(V, E) 2 For every Kr u, set ωs(u) as the number of Kss containing u 3 Mark every Kr as unprocessed 4 for each unprocessed Kr u with minimum ωs(u) do 5 6 7 8 λs(u) = ωs(u), maxλ = λs(u) Find set S of Kss containing u for each C ∈ S do if any Kr v ⊂ C is processed then continue for each Kr v ⊂ C, v (cid:54)= u do if ωs(v) > ωs(u) then ωs(v) = ωs(v) − 1 u ← Q.pop() for each Kr v s.t. (u ∪ v ⊂ C) ∧ (C is a Ks) ∧ (λr,s(C) ≥ k) do 11 12 13 14 if not visited[v] then Q.push(v), S.add(v) visited[v] ← true report S // output the k-(r, s) nucleus Algorithm 3: NucleusDecomposition(G, r, s) 1 λs(·), maxλ ← Set-λ(G, r, s)// Finding λs of Krs 2 Traversal(G, r, s, λ(·), maxλ)// Finding all (r, s) nuclei Definition 4. Two Krs u, u(cid:48) with λs(u) = λs(u(cid:48)) are strongly Ks-connected if there exists a sequence u = u1, u2 , . . . , uk = u(cid:48) such that: • ∀i, λs(ui) = λs(u) • ∀i,∃ C s.t. -- C is a Ks -- (ui ∪ ui+1) ⊂ C -- λr,s(C) = λs(u). Definition 5. sub-(r,s) nucleus, denoted by Tr,s, is a maximal union of Krs s.t. ∀ Kr pair u, v ⊂ S, • λs(u) = λs(v) • u and v are strongly Ks-connected The sub-(1, 2) nucleus is defined as the subcore in [41, 40]. All the notations are given in Table 2. 2.2 Disjoint sets problem Disjoint-set data structure, also known as union-find, keeps disjoint dynamic sets, and maintains upon the operations that modifies the sets [11]. Each set has a representative. There are two main operations: Union (x, y) merges the dynamic sets with ids x and y, and creates a new set, or just merge one of the sets into the other. Find (x) returns the representative of the set which contains x. Disjoint-set forest is introduced with two powerful heuris- tics [45]. In the disjoint-set forest, each set is a tree, each Algorithm 4: Disjoint-Set Forest Link(x, y): if x.rank > y.rank then y.parent ← x else x.parent ← y if x.rank = y.rank then y.rank ← y.rank + 1 // x and y are nodes in the tree Find(x): S ← empty set while x.parent is not null do x ← x.parent, S.add(x) for each u ∈ S do u.parent ← x return x Union(x, y): Link(Find(x), Find(y)) node in the tree is an element of the set, and the root of each tree is the identifier of that set. To keep the trees flat, two heuristics are used that complement each other. First is union-by-rank, which merges the shorter tree under the longer one. Second heuristic is path-compression that makes each node on the find path point directly to the root. Time complexity with union-by-rank and path-compression heuristics is O((m+n)log∗n), where log∗n is the inverse Ack- ermann function which is almost linear [45]. Pseudocode for Find and Union operations are given in Alg. 4. 3. LITERATURE AND MISCONCEPTIONS In this section, we present a detailed review of related work on peeling algorithms. We point some misconceptions about the definitions and the consequences. Our focus is on peeling algorithms and their output, so we limit our scope to k- core and k-truss decompositions and their generalizations. Detailed literature review of dense subgraph discovery can be found in [22, 30]. 3.1 k-core decomposition The very first definition of a k-core related concept is given by Erdos and Hajnal [15] in 1966. They defined the degen- eracy as the largest maximum core number of a vertex in the graph. Matula introduced the min-max theorem [35] for the same thing, highlighting the relationship between de- gree orderings of the graph and the minimum degree of any subgraph, and its applications to graph coloring problem. Degeneracy number has been rediscovered numerous times in the context of graph orientations and is alternately called the coloring number [33], and linkage [17]. First definition of the k-core subgraph is given by Seid- man [43] for social networks analysis, and also by Matula and Beck [34], as k-linkage, for clustering and graph color- ing applications, in the same year of 1983. Seidman [43] introduced the core collapse sequence, also known as degen- eracy ordering of vertices, as an important graph feature. He states that k-cores are good seedbeds that can be used to find further dense substructures. Though, there is no algorithm in [43] on how to find the k-cores. Matula and Beck [34], on the other hand, gives algorithms for finding λ2 values of vertices, and also finding all the k-cores of a graph (and their hierarchy) by using these λ2 values, be- cause there can be multiple k-cores for same k value. Both papers defined the k-core subgraph as follows: "A connected and maximal subgraph H is k-core (k-linkage) if every vertex in H has at least de- gree k." [43, 34] The connectedness is an important detail in this definition because it requires a post-processing traversal operation on vertices to locate all the k-cores of the graph. Figure 2 shows this. There are two 3-cores in the graph, and there is no way to distinguish them at the end of the peeling process by just looking at the λ values of vertices. Figure 2: Multiple 3-cores Batagelj and Zaversnik introduced an efficient implemen- tation that uses bucket data structure to find the λ values of vertices [5]. They defined the k-core as a not necessar- ily connected subgraph, in contrast to previous work they cited [43, 34]. With this assumption, they claimed that their implementation finds all the k-cores of the graph. Finding the relationships between k-cores of a graph has gained a lot of interest. Nested structure of k-cores reveals a hierarchy, and it has been shown to be useful for visu- alization [1] and understanding the underlying structure of complex networks arising in many domains. Carmi et al. [7] and Alvarez-Hamelin et al. [2] investigated the k-core hi- erarchy of internet topology at autonomous systems (AS) level. Healy et al. [25] compared the k-core hierarchies of real-world graphs in different domains and some generative models. Given the practical benefit and efficiency of k-core decom- position, there has been a lot of recent work to adapt k-core algorithms for different data types or setups. Out of memory computation is an important topic for many graph analytic problems that deal with massive graphs not fitting in mem- ory. Cheng et al. [8] introduced the first external-memory algorithm. Wen et al. [51] and Khaouid et al. [28] provided further improvements in this direction. Regarding the dif- ferent type of graphs, Giatsidis et al. adapted the k-core de- composition for weighted [19] and directed [18] graphs. To handle the dynamic nature of real-world data, Sariyuce et al. [41] introduced the first streaming algorithms to main- tain k-core decomposition of graphs upon edge insertions and removals. They recently improved these algorithms fur- ther by leveraging the information beyond 2-hop [40]. Li et al. [32] also proposed incremental algorithms for the same problem. More recently, Wu et al. [52] approached dynamic data from a different angle, and adapted k-cores for tem- poral graphs where possibly multiple interactions between entities occur at different times. Motivated by the incom- plete and uncertain nature of the real network data, O'Brien and Sullivan [36] proposed new methods to locally estimate core numbers (λ values) of vertices when entire graph is not known, and Bonchi et al. [6] showed how to efficiently do the k-core decomposition on uncertain graphs, which has existence probabilities on the edges. One common oversight in all those recent work (except [41, 42]) is that they ignore the connectivity of k-cores. This oversight does not change their results, but limit their contributions: they adapt/improve the peeling part of k- core decomposition, which finds the λs of vertices, not the entire k-core decomposition which also needs traversal to locate all the (connected) k-cores. Considering the exter- nal memory k-core decomposition algorithms [8, 28, 51], existing works only focused on how to compute the λ val- ues of vertices. However, the additional traversal operation in external memory is not taken into consideration which is at least as expensive as finding λ values. Finding the (connected) k-cores and constructing the hierarchy among 2-core3-core3-core Figure 3: k-dense [39] (triangle k-core [56]), k-truss [10] (k-community [47]) and k-truss community [26] (k-(2, 3) nucleus [42]) on the same graph for k=2. Each subgraph given by the corresponding algorithm is shown in dashed. Again there was no reference to the connectedness, implying multiple components can be observed in a triangle k-core. In the same year, Verma and Butenko [47] introduced the following: "k-community is a connected subgraph if every edge is involved in at least k triangles." The subtle difference between those papers is the con- nectedness issue. k-dense [39] and triangle k-core [56] defi- nitions allow the subgraph to be disconnected whereas the k-truss [10] and k-community [47] are defined to be con- nected. All of these works only provided algorithms to find the λ3 values of edges. k-dense and triangle k-cores can be found this way since they can be disconnected. How- ever, finding the k-truss and k-community subgraphs re- quires a post-processing traversal operation, which increases the cost. As a stronger alternative to the k-truss, Huang et al. [26] introduced the k-truss community. The only differ- ence is that each edge pair in a k-truss community is directly or transitively triangle-connected, where two edges should reside in the same triangle to be triangle-connected. The generic k-(r, s) nucleus, proposed by Sariyuce et al. [42], for r = 2, s = 3 gives the exact same definition. This brings a stronger condition on the connectivity structure, and shown to result in denser subgraphs than the classical k-truss def- inition [26]. However, it has an extra overhead of post- processing traversal operation that requires to visit trian- gles, which is more expensive than the traditional traversal. Authors devised TCP index, a tree structure at each vertex, to remedy this issue [26]. Figure 3 highlights the difference between those definitions on a simple example. k-truss decomposition serves as a better alternative to the k-core. For most applications that k-core is useful for, k- truss decomposition performs better. Gregori et al. [24] in- vestigated the structure of internet AS-level topologies by looking at the k-dense subgraphs, similar to Carmi et al. [7] and Alvarez-Hamelin et al. [2] who used k-core for same purpose. Orsini et al. [37] also investigated the evolution of k-dense subgraphs in AS-level topologies. It has been also used to understand the global organization of clusters in complex networks [44]. Colomer-de-Simon et al. used the hierarchy of k-dense subgraphs to visualize real-world networks, as Healy et al. [25] used the k-cores for the same objective. Proven strength of k-truss decomposition drew further in- terest for adapting to different data types and setups, sim- ilar to the k-core literature. Wang and Cheng introduced external memory algorithms [48] and more improvements are provided by Zhao and Tung [57] for visualization pur- poses. More recently, Huang et al. [27] introduced proba- bilistic truss decomposition for uncertain graphs. Similar to the k-core case, overlooking the connectivity constraints limits the contributions in the k-truss literature as well. For example, external memory k-truss decomposi- tion [48] would be more expensive and require more intricate algorithms if it is done to find connected subgraphs by do- ing the traversal in external memory model. We believe that our algorithms for efficiently finding the k-trusses and constructing the hierarchy will be helpful to deal with this issue. 3.3 Generalizations them efficiently in the external memory computation model is not a trivial problem and will limit the performance of proposed algorithms for finding k-core subgraphs and con- structing the hierarchy. Similar argument can be considered for weighted [19], probabilistic [6], and temporal [52] k-core decompositions, all of which have some kind of threshold- based adaptations on weights, probabilities and timestamps, respectively. On the other hand, connectedness definition is semantically unclear for some existing works like the di- rected graph core decomposition [18]. It is only defined that in- and out-degrees of vertices can be considered to find two λ values, but traversal semantic is not defined for find- ing subgraphs or constructing the hierarchy. One can think about building the hierarchy by considering the edges from lower level k-cores to higher level ones, or the opposite. To remedy those misconceptions, we focus on the efficient com- putation of traversal part for k-core decomposition and its higher-order variants. 3.2 k-truss decomposition k-truss decomposition is inspired by the k-core and can be thought as the same peeling problem in a higher level that deals with triangles. It is independently introduced, with subtle differences, by several researchers. Chronologically, the idea is first proposed by Saito et al. [39], to the best of our knowledge, in 2006: "k-dense is a subgraph S if each adjacent vertex pair in S has more than or equal to (k-2) com- mon adjacent vertices in S." In other words, each edge in S should be involved in at least k-2 triangles. Nothing is mentioned about the connectedness of the vertices and edges, which implies that a k-dense sub- graph might have multiple components. Saito et al. argue that k-dense is a good compromise between easy to com- pute k-cores and high quality k-cliques, and it is useful to detect communities in social networks. In 2008, Jonathan Cohen introduced the k-truss as a better model for cohesive subgraphs in social networks [10], which became the most popular naming in the literature: "k-truss is a one-component subgraph such that each edge is reinforced by at least k-2 pairs of edges making a triangle with that edge." In 2012, Zhang and Parthasarathy [56] proposed a new defini- ton for visualization purposes: "triangle k-core is a subgraph that each edge is contained within at least k triangles in the sub- graph." k-densetriangle k-corek-trussk-communityk-truss communityk-(2,3) nucleus Given the similarity between k-core and k-truss decompo- sitions, people have been interested in unified schemes to generalize the peeling process for a broader set of graph substructures. Saito et al. pointed a possible direction of generalization in their pioneering work [39], where they defined k-dense subgraphs. Their proposal is as follows: "Subgraph S is a h-level k-dense community if the vertices in every h-clique of S is adjacent to at least h-k common vertices." [39] In other words, h-level k-dense community is the set of h- cliques where each h-clique is contained in at least h − k number of (h + 1)-cliques. Note that, there is no connectiv- ity constraint in the definition. h-level k-dense community subsumes the disconnected k-core, which contains multiple k-cores, for h = 1. For h = 2, it is their k-dense defini- tion [39]. They claimed that h-level k-dense communities for h > 2 are more or less same with h = 2 and incurs higher computation cost. So they did not dive into more algorithmic details and stick with h = 2. Sariyuce et al. [42] introduced a broader definition to unify the existing proposals, which can be found by a generic peel- ing algorithm. As explained in Section 2.1, their definition subsumes k-core and k-truss community [26] concepts. It is also more generic than h-level k-dense community of [39], since (1) it allows to look for involvement of cliques whose size can differ by more than one, (2) enforces a stronger con- nectivity constraint to get denser subgraphs. h-level k-dense community can be expressed as the k-(r, r+1) nucleus which does not have any connectivity constraint (k is actually h−k and it does not matter). Well-defined theoretical notion of k-(r, s) nucleus enables to provide a unified algorithm to find all the nuclei in graph, as explained in Section 2.1. O(RTr(G) +(cid:80) Sariyuce et al. [42] also analyzed the time and space com- plexity of (r, s)-nucleus decomposition. For the first phase, they report that finding λ values of nuclei (Alg. 1) requires v ωr(v)d(v)s−r) time with O(Kr(G)) space, where RTr(G) is Kr enumeration time, and second part is searching each Ks that a Kr is involved in (ωr(v) is the num- ber of Krs containing vertex v, d(v) is the degree of v, and Kr(G) is the number of Krs in G). For the second phase, traversal on the entire graph needs to access each Kr and examine all the Kss it is involved. Its time complexity is the v ωr(v)d(v)s−r) same as the second part of first phase: O((cid:80) which also gives the total time complexity. 4. ALGORITHMS In this part, we first highlight the challenging aspects of the traversal phase, then introduce two algorithms for faster computation of (r, s)-nucleus decomposition to meet those challenges. 4.1 Challenges of traversal As mentioned in the previous section, time complexity of the v ωr(v)d(v)s−r). However, designing an algorithm that constructs the hierar- chy with this complexity is challenging. In [42], it is stated that finding the nuclei in the reverse order of λ is better since it enables to discover previously found components, thus avoiding repetition. No further details are given, though. This actually corresponds to finding all Tr,s (sub-(r, s) nu- clei of Definition 5), connected Krs with the same λ value, traversal algorithm for (r, s) nuclei is O((cid:80) and incorporating the relations among them. But, keeping track of all the Tr,s in a structured way is hard. Figure 4 shows a case for k-core (r = 1, s = 2). Traversal algorithm needs to understand the relation between T1,2s of equal λ that are not directly connected. For instance, Tr,s A and E are in the same 2-core, but the traditional BFS will find 3 other Tr,s (F, D, G) between those two. During the traver- sal operation, there is a need to detect each k-(r, s) nucleus, determine containment relations and construct the hierar- chy. One solution that can be thought is to construct the - expectedly smaller - supergraph which takes all the Tr,s as vertices and their connections as edges. Then, repeti- tive traversals can be performed on this supergraph to find each k-(r, s) nucleus and the hierarchy. However, it is not guaranteed to get a significantly smaller supergraph which can be leveraged for repetitive traversal. The Tr,s structure of real-world networks, which are investigated in Section 5, also verify this concern. It is clear that there is a need for a lightweight algorithm/data structure that can be used on- the-fly, so that all the k-(r, s) nuclei can be discovered with the hierarchy during the traversal algorithm. The other challenge with the traversal algorithm is the high computational cost for r ≥ 2 cases. Consider the (2, 3) case. We need to traverse on edges, and determine the ad- jacencies of edges by looking at their common triangles. At each step, it requires to find the common neighbors of the vertices on extremities (of the edge), check whether each adjacent edge is previously visited, and push to queue if not. As explained at the end of Section 3.3, complexity be- comes O(3 ∗ (cid:52)). Cost is getting much higher if we look for (3, 4) nuclei, which is shown to give denser subgraphs with more detailed hierarchy. Ideally we are looking to com- pletely avoid the costly traversal operation. 4.2 Disjoint-set forest idea We propose to use disjoint-set forest data structure (DF) to track the disjoint Tr,s (of equal λ), and construct the hierarchy where Tr,s with smaller λ is on the upper side, and greater λ is on the lower side. DF has been used to track connected components of a graph and fits perfectly to our problem where we need to find the connected components at multiple levels. DF-Traversal algorithm, outlined in Alg. 5, is used to replace the naive Traversal (Alg. 2) in NucleusDecom- position (Alg. 3). Basically it finds all the Tr,s in the de- creasing order of λ. We construct the hierarchy-skeleton tree by using Tr,ss. Each node in the hierarchy-skeleton is a Tr,s. We define subnucleus struct to represent a Tr,s. It consists of λ, rank, parent and root fields. λ field is the λ(v) for v ∈ Tr,s, rank is the height of the node in the hierarchy- Figure 4: Example of T1,2s for λ = 2 and λ = 3. Hierarchy tree is shown on the right with participating T1,2s. λs are shown in red. Traversal algorithm needs to infer that, for instance, components A and E are in the same 2-core. 3333333322222DFG332FGABCDEFGBADCE skeleton, parent is a pointer to the parent node and root is a pointer to the root node of the hierarchy-skeleton. De- fault values for parent and root are null, and rank is 0. Figure 5 shows an example hierarchy-skeleton obtained by Alg. 5. Thin edges show the disjoint-set forests consisting of Tr,ss of equal λ value. The hierarchy of all (r, s) nuclei, the output we are interested, can be obtained by using the hierarchy-skeleton easily: we just take the child-parent links for which the λ values are different. In the DF-Traversal algorithm, we keep all the subnuclei in hrc list (line 1) which also represents the hierarchy-skeleton. Krs in a Tr,s are stored by inverse-indices; comp keeps subnucleus index of each Kr in hrc (line 2). We also use visited to keep track of traversed Krs (line 3). Main idea is to find each Tr,s in decreasing order of λ (in lines 4-7). We construct the hierarchy-skeleton in a bottom-up manner this way and it lets us to use DF to find the representative Tr,s, i.e., the greatest ancestor, at any time. At each iter- ation we find an un-visited Kr with the λ value in order (line 6) and find its Tr,s by SubNucleus algorithm (line 7), which also updates the hierarchy-skeleton. SubNucleus (Alg. 6) starts by creating a subnucleus, Algorithm 5: DF-Traversal(G, r, s, λ(·), maxλ) 1 hrc ← list of subnuclei in a tree structure 2 comp(.) ∀ Kr ∈ G 3 visited[v] = false 4 for each k ∈ [maxλ, 1] do for each Kr u ∈ G do // subnucleus id for each Kr // lazy init 5 6 7 if λ(u) = k and not visited[u] then SubNucleus (u, G, r, s, λ(·), visited, comp, hrc) 8 root ← subnucleus, with λ = 0 9 for each s ∈ hrc do if s.parent is null then s.parent ← root 10 11 hrc.add(root) and Report All the Nuclei by hrc,comp Algorithm 6: SubNucleus(u, G, r, s, λ(·), visited, comp, hrc) 1 sn ← subnucleus, with λ = λ(u), hrc.add(sn) 2 comp(u) ← sn, k ← λ(u) 3 marked[v] = false 4 merge ← list of subnuclei, merge.add(sn) 5 Q ← empty queue, Q.push(u) 6 visited[u] ← true 7 while not Q.empty() do 8 9 u ← Q.pop(), comp(u) ← sn for each Kr v s.t. (u ∪ v ⊂ C) ∧ (C is a Ks) ∧ (λr,s(C) = k) do // lazy init 10 11 12 13 14 15 16 17 18 19 20 21 22 if λ(v) = k then if not visited[v] then Q.push(v), visited[v] ← true comp(v) ← sn else s ← comp(v) // λ(v) > k if not marked[s] then marked[s] = true s ← Find-r(s) if not marked[s] ∧ s (cid:54)= sn then if hrc(s).λ > k then hrc(s).parent ← hrc(s).root ← sn else merge.add(s) hrc(s).λ = k marked[s] = true // 23 for each m, n ∈ merge do 24 Union-r(m, n) Figure 5: A graph shown with Tr,s regions on the left and the corresponding hierarchy-skeleton on the right. λ values of Tr,ss are the white numbers. Thin edges are disjoint-set forests. with λ of the Kr of interest. We will store the discovered Krs in this subnucleus (by inverse indices). We put this subnucleus into hrc (line 1) and assign its comp id (line 2). We use marked (line 3) to mark the adjacent subnuclei en- countered during traversal so that unnecessary computation is avoided in lines 16-22. We do traversal (lines 7-22) by us- ing a queue. At each step of the traversal, we process the next Kr in the queue. First, we assign its comp id as the new subnucleus (line 8) and then visit the adjacent Krs residing in same Kss, in which min λ of Kr is equal to λ(v) (line 9). This is exactly the condition for Tr,s, given in Defi- nition 5. For each adjacent Kr, its λ is either equal (line 10) or greater (line 14) by definition of Tr,s. If it is equal and not visited before, we visit it, put into queue (line 12) and also store in the current subnucleus (line 13). Otherwise, we find an adjacent subnucleus s with greater λ (line 15), that is already in hierarchy-skeleton, and can update the hierarchy-skeleton (lines 18-22) unless we had encountered s before (line 16). Location of the subnucleus s in the hierarchy-skeleton is important. If it is parentless, we can just make it a child of the current subnucleus we build. If not, it means subnucleus s is a part of a larger structure and we should relate our current subnucleus to the representative of this large structure, which is the greatest ancestor of s that is guaranteed to have greater or equal λ (by line 9). So, hierarchy-skeleton update starts by finding the greatest an- cestor of the s in line 18. Find-r procedure is defined in Its difference from Find of Alg. 4 is that we use Alg. 7. root field, not parent. root of a node implies its greatest ancestor in the hierarchy-skeleton, i.e., either it is the great- est ancestor or a few steps of root iterations would find the greatest ancestor. parent of a node, on the other hand, represents the links in hierarchy-skeleton, and not modified in Find-r. After finding the root and making sure that it is not processed before (line 19), we can merge the current subnucleus to the hierarchy-skeleton. If the root has greater λ, we make it a child of our current subnucleus (line 21), by assigning both root and parent fields. Otherwise, we defer merging to the end (line 22), where we merge all subnuclei with equal λ by Union-r operations (lines 23- 24), defined in Alg. 7. Union-r is slightly different than Union of Alg. 4 in that it uses Find-r instead of Find and sets the root field of child node to the parent (in Link-r). Figure 5 displays the resulting hierarchy-skeleton for the Tr,s regions shown on the left. We process Tr,s in alpha- betical order, which also conforms with decreasing order of λ. Consider the Tr,s O, which is found and processed last. O finds the adjacent Tr,ss I, J and K, during lines 9-22 of Alg. 6. All have greater λ values, so we focus on lines 14- 22. Greatest ancestor of I is G, and we make G child of O 6545655DACELFMJHBIOKNG44455555LMONCFJGKDEHIAB (line 21) since its λ is greater. Greatest ancestors of J and K are L and N, respectively, and they have equal λ values. So, we merge L and N with O in lines 23-24. Say we merge O and N first and O becomes parent of N since its rank is higher. Then, we merge O and L. Their ranks are equal and we arbitrarily choose L as the parent. DF-Traversal does not change, i.e., O((cid:80) After traversing all the Tr,s, we create a root subnucleus to represent entire graph and make it parent to all the par- entless nodes (lines 8-11 in Alg. 5). Time complexity of v ωr(v)d(v)s−r). Additional space is required by the auxiliary data structures in DF-Traversal. hrc needs 4 · Tr,s (for four fields), and comp and visited requires Kr space each. In addition, SubNucleus might require at most 2·Tr,s for marked and merge, and at most Kr for Q, but reaching those upper bounds in practice is quite unlikely. Overall, additional space requirement of DF-Traversal at any instant is be- tween 4 · Tr,s + 2 · Kr and 6 · Tr,s + 3 · Kr. An upper bound for Tr,s can be given as Kr, when each Kr is as- sumed to a subnucleus, but this case is also quite unlikely as we show in Section 5. 4.3 Avoiding traversal All the Tr,s can be detected without doing a traversal. A Kr is said to be processed, if its λ is assigned. During the peeling process, neighborhood of each Kr is examined, see lines 6-7 of Alg. 1, but processed neighbors are ignored (line 8). We leverage those ignored neighbors to construct the Tr,s. We Algorithm 7: New Disjoint-Set Forest Link-r(x, y): if x.rank > y.rank then y.parent ← x, y.root ← x else // x and y are nodes in the tree x.parent ← y, x.root ← y if x.rank = y.rank then y.rank ← y.rank + 1 Find-r(x): S ← empty set while x.root is not null do x ← x.root, S.add(x) for each u ∈ S do u.root ← x return x Union-r(x, y): Link-r(Find-r(x), Find-r(y)) Algorithm 8: FastNucleusDecomposition(G, r, s) 1 Enumerate all Krs, mark them unprocessed, find their ωs 2 hrc ← list of subnuclei in a tree structure 3 comp(v) = −1 ∀ Kr v ∈ G // subnucleus id for each Kr 4 ADJ ← list of adjacent subnucleus pairs 5 for each unprocessed Kr u with minimum ωs(u) do 6 7 8 9 10 11 12 λ(u) = ωs(u), hrc.maxλ = λ(u) sn ← subnucleus with λ = λ(u) Find set S of Kss containing u for each C ∈ S do if ωs(v) > ωs(u) then ωs(v) = ωs(v) − 1 if all Kr v ⊂ C is unprocessed then for each Kr v ⊂ C, v (cid:54)= u do introduce FastNucleusDecomposition algorithm (Alg. 8) to detect Tr,s early in the peeling process so that costly traversal operation is not needed anymore. At each iteration of the peeling process, a Kr with the minimum ω is selected and ω of its unprocessed neighbors are decremented. No information about the surrounding processed Krs is used. If we check the processed neigh- bors, we can infer some connectivity information and use it towards constructing all the Tr,s as well as the hierarchy- skeleton. For example, assume we are doing k-core decom- position and a vertex u with degree d is selected. We as- sign λ(u) = d and check the unprocessed neighbors of u to decrement their degree, if greater than d. We can also ex- amine the processed neighbors. λ of any processed neighbor is guaranteed to be less than or equal to d, by definition. Say v is a neighbor with λ(v) = d. Then, we can say that u and v are in the same Tr,s. Say w is another neighbor with λ(w) < d. Then, we can infer that maximum d-(1, 2) nucleus of w contains u, and Tr,s of u is an ancestor of Tr,s of w in the hierarchy-skeleton. Leveraging these pairwise relations enables us to find all the Tr,s and construct the hierarchy-skeleton. An important thing to note is that, it is not always possi- ble to detect the Tr,s of a Kr by only looking at the processed neighbors. Consider k-core decomposition on a star graph, for which all vertices has λ = 1. Center vertex is processed in the last two steps of peeling, so it is not possible to infer two connected vertices with equal λ until that time. We find non-maximal Tr,ss (denoted as T ∗ r,s) and combine them by using the disjoint-set forest algorithm. The difference from the DF-Traversal algorithm is that our hierarchy-skeleton will have more nodes because of non-maximal Tr,s. Colored lines 13-20 in Alg. 8 implements our ideas. For each Ks we encountered (line 9), processed neighbors are explored starting from line 13. Note that, there is no need to check every adjacent and processed Kr in the same Ks, since the relations among them are already checked in pre- vious steps. It is enough to find and process the Kr w with minimum λ, as in line 15. If w has an equal λ value (line 16), we need to either put our Kr of interest to the subnucleus of w (line 17) or merge to the subnucleus of w by Union-r operation (line 17). In FastNucleusDecom- position algorithm, we only build disjoint-set forests during the peeling process (until line 20). If λ(w) happens to have a smaller value (line 18), we put the pair of subnuclei to a list (ADJ), which will be used to build the hierarchy-skeleton after the peeling. We do not process the relations between Algorithm 9: BuildHierarchy(ADJ, hrc) 1 binned ADJ ← hrc.maxλ # of empty lists 2 for each (s, t) ∈ ADJ do // to bin ADJ // hrc(s).λ > hrc(t).λ 13 14 15 16 17 18 19 else D ← set of processed Krs ⊂ C w ← v ∈ D with the smallest λ if λ(w) = λ(u) then if comp (u) = −1 then comp(u) = comp(w) else Union-r (comp(u), comp(w)) else ADJ.add(comp(u), comp(w)) // λ(w) < λ(u) if comp (u) = −1 then comp(u) ← sn, hrc.add(sn) Update all (−1, ·) ∈ ADJ with (comp(u), ·) 20 BuildHierarchy (ADJ, hrc) 21 create subnucleus root with λ = 0, tie to all existing roots 22 hrc.add(root) and Report All the Nuclei by hrc,comp // postprocessing binned ADJ[hrc(t).λ].add(s, t) 4 for each list l ∈ binned ADJ in [hrc.maxλ ... 1] order do 3 5 6 7 8 9 10 11 12 13 merge ← empty list of subnucleus pairs for each (s, t) ∈ l do s ← Find-r(s), t ← Find-r(t) if s (cid:54)= t then if hrc(s).λ > hrc(t).λ then hrc(s).parent = hrc(s).root = t else merge.add(s, t) for each (s, t) ∈ merge do Union-r (s, t) Table 3: Statistics for the real-world graphs. Largest graph in the dataset has more than 37M edges. (cid:52) is the number of triangles, K4 is the number of four-cliques. Ratios of s-cliques to r-cliques are shown in columns 6,7,8, for s ≤ 4 r,s), and s− r = 1. Columns 9 to 14 show sub-(r, s) nuclei numbers (Tr,s) and non-maximal sub-(r, s) nuclei numbers (T ∗ artifact of Alg. 8, for the (r, s) values we interested. Last two columns are the number of connections from T ∗ r,ss with higher λ values to the ones with lower λ values. E V K4 2,3) c↓(T ∗ T ∗ 3,4 T3,4 T1,2 V (cid:52) 8.0 M 2M 1.1M 1.2M 2.1M 2.7M 1.4M 1.7M 11.1M 28.8M 148.8M 6.54 2.59 5.17 8.6K 9.3K 106.3K 137.7K 206.0K 261.1K 1.4 M 22.9K 852.4K 5.3M 26.6M 37.22 6.30 4.96 2.7K 2.8K 27.3K 34.6K 77.6K 105.7K 509.1 K 6.4K 251.2K 2.3M 13.7M 39.24 9.44 5.77 1.2 M 11.6K 568.3K 5.8M 37.1M 49.05 10.27 6.37 4.7K 4.9K 56.8K 72.5K 185.2K 255.1K 36.4K 1.6M 11.2M 70.7M 43.74 7.03 6.33 13.5K 14.9K 210.0K 266K 395.5K 498.9K 2.6 M 3,4) 8.2 M skitter(SK) 1.9 M Berkeley13(BE) 1.3 M MIT(MIT) 2.9 M Stanford3(ST) Texas84(TX) 3.7 M twitter-hb(TW) 456.6K 12.5M 83.0M 429.7M 27.39 6.63 5.18 341.4K 350K 2.9M 3.3M 5.6M 7.3M 27.2 M 59.5 M 916.4K 4.3M 13.4M 39.9M 4.71 3.10 2.98 408.7K 508.3K 386.9K 568.4K 251.4K 382.8K 982.8 K 814.7 K Google(GO) 1.5K 1.7K 129.6K 11.7M 837.9M 52.2B 90.60 71.35 62.36 uk-2005(UK) 0 wiki-0611(WK) 3.1M 37.0M 88.8M 162.9M 11.76 2.40 1.83 2.4M 2.5M 7.9M 9.7M 6.7M 9.3M 45.1 M 45.0 M c↓(T ∗ T ∗ 2,3 T ∗ 1,2 T2,3 K4 837 837 836 836 0 E (cid:52) (cid:52) E subnuclei of different λ right away for two reasons: (1) subnucleus of the Kr of interest might not be assigned yet (comp(u) is -1), (2) order of processing subnuclei relations is crucial to build the hierarchy-skeleton correctly and effi- ciently. Regarding (1), we take care of the Krs not belonging to a subnucleus in lines 19 and 19. For (2), we have the BuildHierarchy function (line 20), defined in Alg. 9. In BuildHierarchy, we create maxλ number of bins to distribute the subnuclei pairs based on the smaller λ of the subnucleus pair. The reason is same with our reverse order discovery of subnuclei in DF-Traversal (Alg. 5): we construct the hierarchy-skeleton in a bottom-up manner and it enables us to use disjoint-set forest algorithm to lo- cate the k-(r, s) nuclei that we need process. Distribution is done in lines 2-3. Then, we just process the binned list (binned ADJ) in reverse order of λ values (line 4). We do the same operations to build the hierarchy-skeleton: lines 7-11 of BuildHierarchy and lines 18-22 of SubNucleus algo- rithm (Alg. 6) are almost same. Once we finish each list in binned ADJ, we union the accumulated subnuclei of equal λ values (lines 12-13), as we did in lines 23-24 of SubNu- cleus algorithm. Finally, in FastNucleusDecomposition we create a subnucleus to represent entire graph, make it parent to all parentless subnuclei, and report the hierar- chy. r,s) is(cid:0)s (cid:1)Ks, when each Kr is assumed to Avoiding traversal does not change the time complexity of overall algorithm, since the peeling part was already taking more time. Auxiliary data structures in FastNucleusDe- composition requires additional space, though. hrc needs 4 · T ∗ r,s in which subnuclei are not necessarily maximal, and comp needs Kr. ADJ structure corresponds to the con- nections from T ∗ r,ss with higher λ values to the ones with lower λ values, which we denote as c↓(T ∗ r,s). The upper bound for c↓(T ∗ be a T ∗ r,s and their λ values are adversary (see the end of Section 3.3 for details). However, it is quite unlikely as we show in Section 5. binned ADJ in BuildHierarchy is just an ordered version of ADJ, and needs the same amount of space; c↓(T ∗ r,s). Lastly, merge in BuildHierarchy might r,s) at most, but it is quite unlikely. require another c↓(T ∗ Overall, additional space requirement of FastNucleusDe- composition at any instant is 4 · T ∗ r,s) + Kr and additional c↓(T ∗ r,s) might be needed. Section 5 gives more details on T ∗ r,s structure of real-world networks and their impact to the memory cost. r,s + 2 · c↓(T ∗ r 5. EXPERIMENTS We evaluated our algorithms on different types of real-world networks, obtained from SNAP [31], Network Repository [38] and UF Sparse Matrix Collection [12]. Our dataset includes an internet topology network (skitter), facebook friendship networks of some universities (Berkeley13, MIT, Stanford3, Texas84) [46], follower network of Twitter users tweeted about Higgs boson-like particle discovery (twitter-hb), web networks (Google, uk-2005) and network of wikipedia pages (wiki-0611). We ignore the directions for directed graphs. Important statistics of the networks are given in Table 3. Ks/Kr ratio gives an estimate for the k-(r, s) nucleus de- composition runtime, as explained at the end of Section 3.3, and we put them in columns 6-8 to show the challenging and diverse characteristics of the networks in our dataset. Note that most of the networks have relatively high edge density in the realm of real-world networks and it makes the computation more expensive. We also included graphs with various Ks/Kr ratios to diversify our dataset. Last eight columns are shown to explain the runtime and memory costs of our algorithms. All the algorithms are implemented in C++ and compiled using gcc 5.2.0 at -O2 optimization level. All experiments are done on a Linux operating system running on a machine with Intel Xeon Haswell E5-2698 2.30 GHz processor with 128 GB of RAM. Nucleus decomposition has been shown to give denser sub- graphs and more detailed hierarchies for s − r=1 cases, for fixed s [42]. We implemented and tested our algorithms for s − r=1 cases where s ≤ 4: giving us (1, 2), (2, 3) and (3, 4) nucleus decompositions. (1, 2)-nucleus decomposition is same as the k-core decomposition [43] and (2, 3) corre- sponds to k-truss community finding [26] (stronger defini- tion of k-truss decomposition [10]). We consider the k-(r, s) nucleus as a set of Krs. In our algorithms, we find the k- (r, s) nuclei for all k values and determine the hierarchy tree among those nuclei. We report the total time of peeling and traversal (or post-processing) that takes the graph as input and gives all the nuclei with an hierarchy. 5.1 Peeling phase of the k-core decomposition, which finds λ values of vertices, is well studied, and most efficient imple- mentation is used in our work. As mentioned before, traver- sal part, however, is mostly overlooked and there is no true algorithm to serve as a baseline. k-core decomposition (or (1, 2) nuclei) In their pioneering work, Matula and Beck [34] introduced a high-level algorithm, named LCPS (Level Component Pri- Table 4: k-core decomposition results. Hypo is the hy- pothetical limit for the best possible traversal based al- gorithm. Naive is Alg. 3, DFT is the one using Alg. 5, FND is the Alg. 8 and LCPS is our adaptation from [34]. Right-most column is the runtimes of fastest algorithm and rest are its speedups over other algorithms. speedups with respect to time (s) (1,2)-nuclei Hypo Naive DFT FND LCPS 1.94 skitter 0.05 Berkeley13 0.01 MIT 0.03 Stanford3 0.11 Texas84 1.18 twitter-hb 3.83 Google 0.17 uk-2005 7.79 wiki-0611 avg best 5.94x 2.79x 1.33x 0.41x 0.82x 19.74x 1.68x 2.77x 0.82x 17.51x 1.74x 2.80x 0.78x 25.50x 1.76x 2.19x 0.78x 23.01x 1.61x 2.57x 0.80x 27.89x 1.94x 2.60x 0.15x 3.45x 0.40x 0.27x 0.86x 58.02x 2.61x 3.32x 0.52x 10.09x 1.96x 1.41x 0.66x 21.24x 1.83x 2.14x ority Search), to detect k-cores and the hierarchy among them. LCPS algorithm traverses the vertices based on λ val- ues in a selective order and outputs them with interspersed brackets. The vertices enclosed by paired brackets at depth k + 1 are the vertices of a k-core in G. The traversal can be started from any vertex, and neighbors are discovered and put in a priority queue along with their λ values. At each step, vertex with the maximum λ is chosen from the queue, and processed. Closed/open brackets are interspersed ac- cording to the λ values of consecutively processed vertices. Authors argue that time complexity of LCPS is O(E), but an implementation may not always be possible owing to the difficulty of maintaining an appropriate priority queue [34]. We adapt and implement the LCPS algorithm for our objectives. We alleviate the problem of maintaining an ap- propriate priority queue by using the bucket data structure, known by the bucket sort [11]. During the traversal, we place the discovered vertices in the bucket according to their λ values, and find the one with the maximum λ value in O(1) time. We also adapted the placing brackets part to have the tree hierarchy, where each node is a T1,2. If the λ value of vertex of interest is equal to the one in the previous step, we stay in the same node. If it is greater, we go down in the tree by creating a chain of new nodes, otherwise we climb up in the tree. Number of these new nodes (or steps to climb) is the difference between λs of current and previous vertex. As a result, we create a tree hierarchy with as many levels as the max λ in the graph. Table 4 gives the total k-core decomposition runtimes for experimented algorithms; the fastest one shown on the right- most column and its speedups over other algorithms given on the corresponding columns. Naive is the base nucleus decomposition algorithm, given in Alg. 3, and uses the naive traversal to find all k-cores. DFT is the algorithm that uses DF-Traversal (Alg. 5) and FND is the FastNucleusDe- composition algorithm (Alg. 8). LCPS denotes the run- time of our LCPS adaptation. Note that we are not aware of any other adaptation/implementation of the LCPS algo- rithm in [34]. We also have a hypothetical runtime, shown as Hypo, which is the peeling time plus a BFS traversal on the entire graph. Hypo is a limit for the most efficient traversal (plus regular peeling) that can be done on a given graph. Although it does not compute the hierarchy and find k-cores, it shows the best that can be done with a traversal- based nucleus decomposition algorithm. Peeling phases of Hypo, Naive, DFT, and LCPS are same. Results show that our LCPS adaptation outperforms other alternatives. Detailed timings suggest that traversal time is almost same with peeling, satisfying the linear complexity in the number of edges. On average, LCPS is 21.24x faster than Naive algorithm. Speedups over DFT and FND are 1.83x and 2.14x. Our LCPS adaptation also runs in only 66% time of the theoretical limit of Hypo, where the over- head is due to the bucket data structure. (2, 3) nuclei 5.2 Table 5 gives the runtime comparison for entire (2, 3) nu- cleus decomposition, where rightmost column is the fastest algorithm and other columns are its speedups over other algorithms. To start with, we state that our peeling imple- mentation for (2, 3) nucleus decomposition is quite efficient; for instance [48] computes λ values of skitter graph in 281 secs where we can do it in 74 secs. We also tested wiki-Talk graph just to compare with [26], and we get 41/13 = 3.15 times faster results despite our less powerful CPU. Apart from Naive, DFT and FND algorithms, we give Hypo as the bound for the best possible traversal-based nucleus de- composition algorithm that traverses graph over edges and triangles. In addition, we implemented the TCP index con- struction algorithm introduced by Huang et al. [26]. In that work, authors devise TCP index on vertices which enable fast traversal to answer max-(2, 3) nucleus queries on ver- tices. TCP index is a tree structure at each vertex, which is actually the maximum spanning forest of each ego-network. TCP index is constructed after the peeling process to be ready for incoming queries. Note that our implementation of TCP index construction is also quite efficient that is 1.8x faster than [26] for the dataset in their work. In Table 5, we show the time only for peeling plus TCP index construction. Entire graph still needs to be traversed using TCP to find all the (2, 3) nuclei and the hierarchy among them. Peeling phases of Hypo, Naive, TCP and DFT are same. Before checking the fastest, we look at the DFT algo- rithm, which is the second best. It is 2.4x and 122.4x faster than TCP and Naive algorithms, respectively. Note that, TCP time is even before the traversal. In 40% of the time that TCP spends for being ready to answer queries, DFT is able to give all the answers, i.e, (2, 3) nuclei and the hi- erarchy. This shows the benefit of using disjoint-set forests to detect the nuclei and construct the hierarchy. One of our initial objectives was to meet the computational complexity of traversal phase by true design and implementation. DFT does that by keeping the traversal time close to the peeling time; traversal takes only 23% more time than peeling on av- erage. Figure 6 shows the comparison, where we normalize runtimes with respect to total DFT. Also, DFT performs only 34% slower than the hypothetical bound (Hypo). The fastest algorithm is FND. It is 215x faster than Naive on average and gives 1729 speedup on Google. It outper- forms TCP by 4.3x on average and up to 11x (on uk-2005). FND also works 1.76x faster than DFT and Figure 6 shows the detailed comparison. For DFT, peeling is Alg. 1 and postprocessing is the traversal time (Alg. 5). For FND, postprocessing is the BuildHierarchy algorithm (Alg. 9) and peeling is the rest in Alg. 8. FND is able to keep the total time comparable to the peeling of DFT; it is only 29% slower! This is exactly the benefit of avoiding traversal by early discovery of non-maximal T2,3. On uk-2005 graph, benefit of avoiding traversal is most apparent; DFT per- forms worst compared to FND. Because there are only 837 Table 5: (2,3) and (3,4) nucleus decomposition results. Right-most column for each is the runtimes of the fastest algorithm and rest are its speedup over other algorithms. Starred numbers (*) show lower bounds, when the algorithm did not finish in 2 days. Hypo is the hypothetical limit for the best possible traversal based algorithm. For (2,3), it is done on edges and triangle connections, and for (3,4) it is on triangles and four-clique connections. Naive is Alg. 3 and TCP* is the indexing algorithm proposed by [26] and does not even include (2, 3) nuclei finding. DFT is the one using Alg. 5 and FND is the Alg. 8. (2,3)-nuclei (3,4)-nuclei speedups with respect to time (s) Hypo Naive TCP*[26] DFT FND Hypo skitter Berkeley13 MIT Stanford3 Texas84 twitter-hb Google uk-2005 wiki-0611 avg 45.62x 1.54x 10.76x 1.13x 11.68x 1.10x 12.58x 1.10x 14.41x 1.10x 1.33x 16.24x 1.31x 1729.93x 90.50x 1.68x 1.53x 7.06x 1.31x 215.4x 3.69x 2.04x 3.41x 1.40x 3.45x 1.33x 3.41x 1.36x 3.35x 1.37x 3.27x 1.49x 3.90x 1.59x 11.07x 3.64x 3.37x 1.63x 4.32x 1.76x T2,3s which means no work is done by disjoint-set forest and all the time is spent on traversal (see Figure 6). As men- tioned in Section 4, extended peeling in FND finds non- maximal T2,3, and the count might be much larger than the number of T2,3s. However, it is not the case. Last 6 columns of Table 3 show that there is no significant difference; on av- erage non-maximal T2,3s are 24% more than T2,3s. DFT and FND algorithms require additional memory, as mentioned at the end of Section 4.2. The upper bound of additional space for DFT is 6 · T2,3 + 3 · E, and takes at most ∼650MB for any graph in our dataset, where int is used to store each number (four bytes). Although the upper bound of T2,3 is E, we observed that it is only 13.1% of E on average, which can be calculated from Table 3. Regarding the FND, upper bound is given as 4 · T ∗ 2,3 + 3 · c↓(T ∗ 2,3)+E (see Section 4.3) and it takes at most ∼1.4GB for the experimented graphs (two ints for each connection in c↓(T ∗ 2,3)). We observed that uk-2005 graph have so many edges with no triangles that results in isolated T ∗ 2,3s (and 3,4) = 0. For the rest, we see 3,4s), so c↓(T ∗ T ∗ that c↓(T ∗ average. 2,3) is only 8.7% of the upper bound ((cid:0)3 (cid:1)(cid:52)), on 2,3) = c↓(T ∗ Lastly, we check FND vs. Hypo. FND is faster on all in- stances, and 1.31x on average, meaning that it outperforms any possible traversal-based algorithm for (2, 3) nucleus decomposition. This is so important to show the strength of 2 Figure 6: (2,3) [top] and (3,4) [bottom] nucleus decom- position comparison for DFT (the one using Alg. 5 for traversal) and FND (shown in Alg.8). Two main results: (1) Traversal part of DFT is close to the peeling part, (2) FND is able to keep the total runtime comparable to the peeling part of DFT time (s) FND speedups with respect to DFT Naive 163.91∗x 1.78x 1.42x 1812.47∗x 1.45x 3848.02∗x 1.48x 1321.89∗x 679.06∗x 1.49x 38.96∗x 1.78x 1.35x 1083.02∗x 1.98∗x 1.24x 23.00∗x 1.82x 1.96x 1054.2 91.3 1.52x 95.3 7.3 1.53x 44.9 2.8 1.58x 130.7 7.8 1.57x 254.5 16.8 1.81x 4434.9 255.5 1.43x 159.6 13.0 1.98∗x 87329.6 562.5 7513.5 584.9 1.91x best 1.53x > 996.92x > 1.70 x best (3, 4) nuclei (1) detecting the non-maximal T2,3 early to avoid traversal, (2) using disjoint-set forest data structure to handle on-the- fly computation. 5.3 Table 5 and Figure 6 gives the comparison of all algorithms on (3, 4)-nucleus decomposition, which has been shown to give subgraphs with highest density and most detailed hi- erarchy [42]. Results are similar to the (2, 3) case: FND is the best and speedups are sharper. Naive algorithm could not be completed in 2 days for any graph. DFT also could not finish its computation on uk-2005 graph in that time. Regarding the memory requirement, we see that DFT and FND take at most ∼10GB and ∼3.5GB for the graphs in our dataset. Also, T3,4 and c↓(T ∗ 3,4) are far from the upper bounds, only of 3.9% and 2.5% on average. Overall, FND outperforms all others. Figure 6 shows that total time of FND is only 21% more than the peeling time of DFT and only 2% slower on wiki-0611. Most significantly, FND is 1.53x faster than hypothetical limit (Hypo) of any possible traversal-based (3, 4) nucleus decomposition algorithm. 6. CONCLUSION In this work, we focused on computing the hierarchy of dense subgraphs given by peeling algorithms. We first provided a detailed review of previous work and pointed misconceptions about k-core and k-truss decompositions. We proposed two generic algorithms to compute any nucleus decomposition. Our idea to leverage disjoint-set forest data structure for hierarchy computation works well in practice. We further improved the performance by detecting the subgraphs dur- ing peeling process to avoid traversal. We also adapted and implemented an existing idea for k-core decomposition hi- erarchy, and showed its benefit. Overall, our algorithms significantly outperformed the existing alternatives. There are two open questions that might be worth to look at. First is about the analysis. Nested structures given by the resulting hierarchy only show the k-(r, s) nuclei. Instead looking at the Tr,ss, which are many more than the k-(r, s) nuclei, might reveal more insight about networks. This actu- ally corresponds to the hierarchy-skeleton structure that our algorithms produce. Second is regarding the performance. We believe that adapting the existing parallel peeling algo- rithms for the hierarchy computation can be helpful. 0 20 40 60 80 100% wrt total DFT 0 20 40 60 80 100DFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFNDDFTFND% wrt total DFTpeelingpostprocWKUKGOTWTXSTMITBESK 7. ACKNOWLEDGMENTS This work was funded by the Applied Mathematics Pro- gram at the U.S. Department of Energy and Sandia's Labo- ratory Directed Research & Development (LDRD) program. Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for the U.S. Department of Energy's National Nuclear Security Ad- ministration under contract DE-AC04-94AL85000. 8. REFERENCES [1] J. I. Alvarez-Hamelin, A. Barrat, and A. Vespignani. Large scale networks fingerprinting and visualization using the k-core decomposition. In NIPS, pages 41 -- 50, 2006. [2] J. I. Alvarez-Hamelin, L. Dall'Asta, A. Barrat, and A. Vespignani. K-core decomposition of Internet graphs: hierarchies, self-similarity and measurement biases. Networks and Heterogeneous Media, 3(2):371 -- 293, 2008. [3] A. Angel, N. Sarkas, N. Koudas, and D. Srivastava. Dense subgraph maintenance under streaming edge weight updates for real-time story identification. PVLDB, 5(6):574 -- 585, Feb. 2012. [4] G. D. Bader and C. W. Hogue. An automated method for finding molecular complexes in large protein interaction networks. BMC Bioinformatics, 4(1):1 -- 27, 2003. [5] V. Batagelj and M. Zaversnik. An o(m) algorithm for cores decomposition of networks. Technical Report cs/0310049, Arxiv, 2003. [6] F. Bonchi, F. Gullo, A. Kaltenbrunner, and Y. Volkovich. Core decomposition of uncertain graphs. In KDD, pages 1316 -- 1325, 2014. [7] S. Carmi, S. Havlin, S. Kirkpatrick, Y. Shavitt, and E. Shir. A model of internet topology using k-shell decomposition. PNAS, 104(27):11150 -- 11154, 2007. [8] J. Cheng, Y. Ke, S. Chu, and M. T. Ozsu. Efficient core decomposition in massive networks. In ICDE, pages 51 -- 62, 2011. [9] A. Clauset, C. Moore, and M. E. J. Newman. Hierarchical structure and the prediction of missing links in networks. Nature, 453:98 -- 101, 2008. [10] J. Cohen. Trusses: Cohesive subgraphs for social network analysis. National Security Agency Technical Report, 2008. [11] T. H. Cormen, C. Stein, R. L. Rivest, and C. E. Leiserson. Introduction to Algorithms. McGraw-Hill, 2001. [12] T. A. Davis and Y. Hu. The university of florida sparse matrix collection. ACM Trans. Math. Softw., 38(1):1:1 -- 1:25, 2011. [13] Y. Dourisboure, F. Geraci, and M. Pellegrini. Extraction and classification of dense communities in the web. In WWW, pages 461 -- 470, 2007. [14] X. Du, R. Jin, L. Ding, V. E. Lee, and J. H. T. Jr. Migration motif: a spatial - temporal pattern mining approach for financial markets. In KDD, pages 1135 -- 1144, 2009. [15] P. Erdos and A. Hajnal. On chromatic number of graphs and set-systems. Acta Mathematica Hungarica, 17:61 -- 99, 1966. [16] E. Fratkin, B. T. Naughton, D. L. Brutlag, and S. Batzoglou. Motifcut: regulatory motifs finding with maximum density subgraphs. In ISMB, pages 156 -- 157, 2006. [17] E. C. Freuder. A sufficient condition for backtrack-free search. J. ACM, 29(1):24 -- 32, Jan. 1982. [18] C. Giatsidis, D. M. Thilikos, and M. Vazirgiannis. Evaluating cooperation in communities with the k-core structure. In ASONAM, pages 87 -- 93, 2011. [19] C. Giatsidis, D. M. Thilikos, and M. Vazirgiannis. D-cores: measuring collaboration of directed graphs based on degeneracy. Knowl. Inf. Syst., 35(2):311 -- 343, 2013. [20] D. Gibson, R. Kumar, and A. Tomkins. Discovering large dense subgraphs in massive graphs. In VLDB, pages 721 -- 732, 2005. [21] A. Gionis, F. Junqueira, V. Leroy, M. Serafini, and I. Weber. Piggybacking on social networks. PVLDB, 6(6):409 -- 420, 2013. [22] A. Gionis and C. E. Tsourakakis. Dense subgraph discovery: Tutorial. In KDD, pages 2313 -- 2314, 2015. [23] D. F. Gleich and C. Seshadhri. Vertex neighborhoods, low conductance cuts, and good seeds for local community methods. In KDD, pages 597 -- 605, 2012. [24] E. Gregori, L. Lenzini, and C. Orsini. k-dense communities in the internet as-level topology. In COMSNETS, pages 1 -- 10, 2011. [25] J. Healy, J. Janssen, E. Milios, and W. Aiello. Characterization of Graphs Using Degree Cores, pages 137 -- 148. Springer Berlin Heidelberg, 2008. [26] X. Huang, H. Cheng, L. Qin, W. Tian, and J. X. Yu. Querying k-truss community in large and dynamic graphs. In SIGMOD, pages 1311 -- 1322, 2014. [27] X. Huang, W. Lu, and L. V. Lakshmanan. Truss decomposition of probabilistic graphs: Semantics and algorithms. In SIGMOD, pages 77 -- 90, 2016. [28] W. Khaouid, M. Barsky, S. Venkatesh, and A. Thomo. K-core decomposition of large networks on a single PC. PVLDB, 9(1):13 -- 23, 2015. [29] R. Kumar, P. Raghavan, S. Rajagopalan, and A. Tomkins. Trawling the web for emerging cyber-communities. In WWW, pages 1481 -- 1493, 1999. [30] V. E. Lee, N. Ruan, R. Jin, and C. Aggarwal. A survey of algorithms for dense subgraph discovery. In Managing and Mining Graph Data, volume 40. 2010. [31] J. Leskovec and A. Krevl. SNAP Datasets, June 2014. [32] R. Li, J. X. Yu, and R. Mao. Efficient core maintenance in large dynamic graphs. IEEE TKDE, 26(10):2453 -- 2465, 2014. [33] D. Lick and A. White. k-degenerate graphs. Canadian Journal of Mathematics, 22:1082 -- 1096, 1970. [34] D. Matula and L. Beck. Smallest-last ordering and clustering and graph coloring algorithms. JACM, 30(3):417 -- 427, 1983. [35] D. W. Matula. A min-max theorem for graphs with application to graph coloring. SIAM Review, 10(4):481 -- 482, 1968. [36] M. P. O'Brien and B. D. Sullivan. Locally estimating core numbers. In ICDM, pages 460 -- 469, 2014. [37] C. Orsini, E. Gregori, L. Lenzini, and D. Krioukov. Evolution of the internet k-dense structure. IEEE/ACM Trans. Netw., 22(6):1769 -- 1780, 2014. [38] R. Rossi and N. Ahmed. The network data repository with interactive graph analysis and visualization. In AAAI, pages 4292 -- 4293, 2015. [39] K. Saito and T. Yamada. Extracting communities from complex networks by the k-dense method. In ICDMW, 2006. [40] A. E. Sarıyuce, B. Gedik, G. Jacques-Silva, K.-L. Wu, and U. V. C¸ atalyurek. Incremental k-core decomposition: algorithms and evaluation. VLDB Journal, pages 1 -- 23, 2016. [41] A. E. Sarıyuce, B. Gedik, G. Jacques-Silva, K.-L. Wu, and U. V. C¸ atalyurek. Streaming algorithms for k-core decomposition. Proc. VLDB Endow., 6(6):433 -- 444, Apr. 2013. [42] A. E. Sarıyuce, C. Seshadhri, A. Pınar, and U. V. C¸ atalyurek. Finding the hierarchy of dense subgraphs using nucleus decompositions. In WWW, pages 927 -- 937, 2015. [43] S. B. Seidman. Network structure and minimum degree. Social Networks, 5(3):269 -- 287, 1983. [44] P. Simon, M. Serrano, M. Beiro, J. Alvarez-Hamelin, and M. Boguna. Deciphering the global organization of clustering in real complex networks. Scientific Reports, 3(2517), 2013. [45] R. E. Tarjan. Efficiency of a good but not linear set union algorithm. JACM, 22(2):215 -- 225, Apr. 1975. [46] A. L. Traud, P. J. Mucha, and M. A. Porter. Social structure of facebook networks. Physica A: Statistical Mechanics and its Applications, 391(16):4165 -- 4180, 2012. [47] A. Verma and S. Butenko. Network clustering via clique relaxations: A community based approach. In DIMACS Graph Part. and Clustering, pages 129 -- 140, 2012. [48] J. Wang and J. Cheng. Truss decomposition in massive networks. PVLDB, 5(9):812 -- 823, 2012. [49] S. Wasserman and K. Faust. Social Network Analysis: Methods and Applications. Cambridge Univ Press, 1994. [50] D. Watts and S. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393:440 -- 442, 1998. [51] D. Wen, L. Qin, Y. Zhang, X. Lin, and J. Yu. I/o efficient core graph decomposition at web scale. In ICDE, pages 133 -- 144, 2016. [52] H. Wu, J. Cheng, Y. Lu, Y. Ke, Y. Huang, D. Yan, and H. Wu. Core decomposition in large temporal graphs. In Big Data, IEEE International Conf. on, pages 649 -- 658, 2015. [53] S. Wuchty and E. Almaas. Peeling the yeast protein network. PROTEOMICS, 5(2):444 -- 449, 2005. [54] B. Zhang and S. Horvath. A general framework for weighted gene co-expression network analysis. Statistical Applications in Genetics and Molecular Biology, 4(1):Article 17+, 2005. [55] H. Zhang, H. Zhao, W. Cai, J. Liu, and W. Zhou. Using the k-core decomposition to analyze the static structure of large-scale software systems. J. of Supercomputing, 53(2):352 -- 369, 2009. [56] Y. Zhang and S. Parthasarathy. Extracting analyzing and visualizing triangle k-core motifs within networks. In ICDE, pages 1049 -- 1060, 2012. [57] F. Zhao and A. Tung. Large scale cohesive subgraphs disc. for social network visual analysis. In PVLDB, pages 85 -- 96, 2013.
1602.01103
2
1602
2016-02-06T20:13:55
Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions
[ "cs.SI", "cs.CL", "physics.soc-ph" ]
Changing someone's opinion is arguably one of the most important challenges of social interaction. The underlying process proves difficult to study: it is hard to know how someone's opinions are formed and whether and how someone's views shift. Fortunately, ChangeMyView, an active community on Reddit, provides a platform where users present their own opinions and reasoning, invite others to contest them, and acknowledge when the ensuing discussions change their original views. In this work, we study these interactions to understand the mechanisms behind persuasion. We find that persuasive arguments are characterized by interesting patterns of interaction dynamics, such as participant entry-order and degree of back-and-forth exchange. Furthermore, by comparing similar counterarguments to the same opinion, we show that language factors play an essential role. In particular, the interplay between the language of the opinion holder and that of the counterargument provides highly predictive cues of persuasiveness. Finally, since even in this favorable setting people may not be persuaded, we investigate the problem of determining whether someone's opinion is susceptible to being changed at all. For this more difficult task, we show that stylistic choices in how the opinion is expressed carry predictive power.
cs.SI
cs
Winning Arguments: Interaction Dynamics and Persuasion Strategies in Good-faith Online Discussions Chenhao Tan Vlad Niculae Cristian Danescu-Niculescu-Mizil Cornell University {chenhaovladcristianllee}@cs.cornell.edu Lillian Lee 6 1 0 2 b e F 6 ] I S . s c [ 2 v 3 0 1 1 0 . 2 0 6 1 : v i X r a ABSTRACT Changing someone’s opinion is arguably one of the most important challenges of social interaction. The underlying process proves difficult to study: it is hard to know how someone’s opinions are formed and whether and how someone’s views shift. Fortunately, ChangeMyView, an active community on Reddit, provides a plat- form where users present their own opinions and reasoning, invite others to contest them, and acknowledge when the ensuing discus- sions change their original views. In this work, we study these interactions to understand the mechanisms behind persuasion. We find that persuasive arguments are characterized by interest- ing patterns of interaction dynamics, such as participant entry-order and degree of back-and-forth exchange. Furthermore, by compar- ing similar counterarguments to the same opinion, we show that language factors play an essential role. In particular, the interplay between the language of the opinion holder and that of the coun- terargument provides highly predictive cues of persuasiveness. Fi- nally, since even in this favorable setting people may not be per- suaded, we investigate the problem of determining whether some- one’s opinion is susceptible to being changed at all. For this more difficult task, we show that stylistic choices in how the opinion is expressed carry predictive power. 1. INTRODUCTION Changing a person’s opinion is a common goal in many settings, ranging from political or marketing campaigns to friendly or pro- fessional conversations. The importance of this topic has long been acknowledged, leading to a tremendous amount of research effort [9, 15, 17, 42, 46, 47]. Thanks to the increasing number of social interactions online, interpersonal persuasion has become observ- able at a massive scale [19]. This allows the study of interactive persuasion in practice, without elicitation, thus bypassing some limitations of laboratory experiments and leading to new research questions regarding dynamics in real discussions. At the same time, the lack of the degree of experimental control offered by lab trials raises new methodological challenges that we address in this work. It is well-recognized that multiple factors are at play in persua- sion. Beyond (i) the characteristics of the arguments themselves, Copyright is held by the International World Wide Web Conference Com- mittee (IW3C2). IW3C2 reserves the right to provide a hyperlink to the author’s site if the Material is used in electronic media. WWW 2016, April 11–15, 2016, Montréal, Québec, Canada. ACM 978-1-4503-4143-1/16/04. http://dx.doi.org/10.1145/2872427.2883081. such as intensity, valence and framing [1, 2, 4, 6, 23], and (ii) so- cial aspects, such as social proof and authority [7, 10, 33], there is also (iii) the relationship between the opinion holder and her belief, such as her certainty in it and its importance to her [44, 45, 54, 59]. Thus, an ideal setting for the study of persuasion would allow ac- cess to the reasoning behind people’s views in addition to the full interactions. Furthermore, the outcome of persuasion efforts (e.g., which efforts succeed) should be easy to extract.1 One forum satisfying these desiderata is the active Reddit sub- community /r/ChangeMyView (henceforth CMV).2 In contrast to general platforms such as Twitter and Facebook, CMV requires posters to state the reasoning behind their beliefs and to reward successful arguments with explicit confirmation. Moreover, dis- cussion quality is monitored by moderators, and posters commit to an openness to changing their minds. The resulting conversa- tions are of reasonably high quality, as demonstrated by Figure 1, showing the top portion of a discussion tree (an original post and all the replies to it) about legalizing the “tontine”.3 In the figure, Reply B.1 branches off to an extended back-and-forth between the blue original poster (OP) and the orange user; as it turns out, nei- ther ends up yielding, although both remain polite. Reply A.1, on the other hand, is successful, as the OP acknowledges at A.2. The example suggests that content and phrasing play an important role (A.1 does well on both counts), but also that interaction factors may also correlate with persuasion success. Examples include time of entry relative to others and amount of engagement: the discussion at B.1 started earlier than that at A.1 and went on for longer. Outline and highlight reel. This work provides three different per- spectives on the mechanics of persuasion. First, we explore how interaction dynamics are associated with a successful change of someone’s opinion (§3). We find (example above to the contrary) that a challenger that enters the fray before another tends to have a higher likelihood of changing the OP’s opinion; this holds even for first-time CMV challengers, and so is not a trivial consequence of more experienced disputants contriving to strike first. Although engaging the OP in some back-and-forth is correlated with higher chances of success, we do not see much OP conversion in extended conversations. As for opinion conversion rates, we find that the more participants there are in the effort to persuade the OP, the larger the likelihood of the OP changing her view; but, interest- ingly, the relationship is sublinear. 1 One might think that the outcome is trivially “no one ever changes their mind”, since people can be amazingly resistant to evidence contravening their beliefs [8, 32, 36]. But take heart, change does occur, as we shall show. 2https://reddit.com/r/changemyview 3 It is not necessary for the reader to be familiar with tontines, but a brief summary is: a pool of money is maintained where the annual payouts are divided evenly among all participants still living. Figure 1: A fragment of a “typical” /r/ChangeMyView discussion tree—typical in the sense that the full discussion tree has an av- erage number of replies (54), although we abbreviate or omit many of them for compactness and readability. Colors indicate distinct users. Of the 17 replies shown (in our terminology, every node except the original post is a reply), the OP explicitly acknowledged only one as having changed their view: (The full discussion tree is available at https://www.reddit.com/r/changemyview/comments/3mzc6u/cmv_the_tontine_should_be_ legalized_and_made_a/.) the starred reply A.1. The explicit signal is the “∆” character in reply A.2. Besides interaction dynamics, language is a powerful tool that is in the full control of the challengers. In §4 we explore this perspec- tive by tackling the task of predicting which of two similar coun- terarguments will succeed in changing the same view. By com- paring similar arguments we focus on the role of stylistic choices in the presentation of an argument (identifying reasoning strate- gies is a separate problem we do not address). We experiment with style features based solely on the counterargument, as well as with features reflecting the interplay between the counterargument and the way in which the view is expressed. Style features and inter- play features both prove useful and outperform a strong baseline that uses bag-of-words. In particular, interplay features alone have strong predictive power, achieving an improvement of almost 5% in accuracy over the baseline method (65.1% vs 59.6%) in a com- pletely fresh heldout dataset. Our results also show that it is useful to include links as evidence—an interesting contrast to studies of the backfire effect: “When your deepest convictions are challenged by contradictory evidence, your beliefs get stronger” [8, 32, 36]. However, it hurts to be too intense in the counterargument. The feature with the most predictive power of successful persuasion is the dissimilarity with the original post in word usage, while exist- ing theories mostly study matching in terms of attitude functions or subject self-discrepancy [43, 56]. In the majority of cases, however, opinions are not changed, even though it takes courage and self-motivation for the original poster to post on CMV and invite other people to change her opinion. Can we tell whether the OP is unlikely to be persuaded from the way she presents her reasoning? In §5, we turn to this challenging task. In our pilot study, humans found this task quite difficult in a paired set- ting and performed no better than random guessing. While we can outperform the random baseline in a realistic imbalanced setting, the AUC score is only 0.54. Our feature analysis is consistent with existing theories on self-affirmation [11, 12] and shows that mal- leable beliefs are expressed using more self-confidence and more organization, in a less intense way. While we believe that the observations we make are useful for understanding persuasion, we do not claim that any of them have causal explanations. In §6, we discuss other observations that may open up future di- rections, including attempts to capture higher-level linguistic prop- erties (e.g., semantics and argument structure); §7 summarizes ad- ditional related work and §8 concludes. 2. DATASET We draw our data from the /r/ChangeMyView subreddit (CMV), which has over 211,000 subscribers to date. It is self-described4 as “dedicated to the civil discourse [sic] of opinions”. CMV is well- suited to our purposes because of its setup and mechanics, the high quality of its arguments, and the size and activity of its user base. We elaborate below. The mechanics of the site are as follows. Users that “accept that they may be wrong or want help changing their view” submit orig- inal posts, and readers are invited to argue for the other side. The original posters (OPs) explicitly recognize arguments that succeed in changing their view by replying with the delta (∆) character (an example is node A.2 in Figure 1) and including “an explana- tion as to why and how” their view changed. A Reddit bot called the DeltaBot confirms deltas (an example is A.3 in Figure 1) and maintains a leaderboard of per-user ∆ counts.5 The experimental 4Quotations here are from the CMV wiki. 5Although non-OPs can also issue deltas, in this work, we only count deltas given by a user in their OP role. A consequence is that we only consider discussion trees where the OP’s Reddit account (OP) Title: I believe that you should be allowed to drive at whatever speed you wish as long as you aren’t driving recklessly or under extenuating circumstances CMV. I think that if you feel comfortable driving 80 mph or 40 mph you should be allowed to do so, as long as you aren’t in a school or work zone, etc. because there are a lot more risks in those areas. I think when you’re comfortable driving you will be a better driver, and if you aren’t worrying about the speed limit or cops you are going to be more comfortable. However, I think that you should only be allowed to drive at whatever speed you wish as long as you aren’t driving recklessly. If you’re weaving in and out of traffic at 90, you probably shouldn’t be allowed to go 90, but if you just stay in the fast lane and pass the occasional person I don’t think there is a problem. CMV. (C1) Some issues with this: ↓ 1. Who’s to say what is reckless driving? Where do you draw the line? Speed is the standard that ensures we know what is considered to be reckless. The idea of driving any speed you want creates a totally subjective law. 2. How do you judge whether to pass other drives and such? There are a lot of spatial awareness issues with the roads being so unpredictable. 3. How do you expect insurance and courts to work out who’s at fault for an accident? A: “Yeah this guy was going 100 mph!” B: “But I wasn’t driving recklessly - you were!” It’s simply not realistic and creates some serious legal issues. ↓ (C2) They’re many issues I have with this idea but I’ll start with the most pressing one. Think of the amount of drivers you pass by every day. Imagine all of them going at whatever speed they choose. How would this work? You cannot have a driver going 35 and a driver who wants to go 65 in the same lane. Now lets take this onto the highway and you can see how horrific this could get quickly. They’re too many drivers out on the road for everyone to choose there own speed. Speed limits protect us all because it gives us a reasonable expectation in whatever area we’re driving in. Have you ever been on the highway being a driver going 40mph? If you’re doing the speed limit (65) you catch up to them so fast you barely have time to react before an accident occurs. You aren’t expecting this low speed when everyone is going at similar speeds to yours. Drivers need to know the speed expectations so they can drive and react accordingly. If everyone goes at whatever speed they want it will only cause many many accidents. Figure 2: An original post and a pair of root replies C1 and C2 contesting it, where C1 and C2 have relatively high vocabulary overlap with each other, but only one changed the OP’s opinion. (§4 reveals which one.) advantages of this setup include: (1) Multiple users make different attempts at changing the same person’s mind on the same issue based on the same rationale, thus controlling for a number of variables but providing variation along other important aspects. Figure 2, for example, presents in full two counter-arguments, C1 and C2. They both respond to the same claims, but differ in style, structure, tone, and other respects. (2) The deltas serve as explicit persuasion labels that are (2a) pro- vided by the actual participants and (2b) at the fine-grained level of individual arguments, as opposed to mere indications that the OP’s view was changed. (3) The OP has, in principle, expressed an openness to other points of view, so that we might hope to extract a sufficient number of view-changing examples. These advantages are not jointly exhibited by other debate sites, such as CreateDebate.com, ForandAgainst.com, or Debate.org. The high quality of argumentation makes CMV a model site for seeing whether opinion shifts can at least occur under favorable conditions. Moderators enforce CMV rules, making sure that OPs explain why they hold their beliefs and do so at reasonable length (500 characters or more), and that OPs engage in conversation with challengers in a timely fashion. Other rules apply to those who contest the original post. There are rules intended to prevent “low effort” posts, such as “Posts that are only a single link with no substantial argumentation”, but “Length/conciseness isn’t the de- termining [criterion]. Adequate on-topic information is.”6 Figure 2 had not been deleted—i.e., the original post is not attributed to the ambiguous name “[deleted]”— at the time of crawl. 6It is worth noting that, as in many online communities, not all these rules were in place at the site’s creation. It is a separate and interesting research question to understand what effects these rules have and why they were put in place. The currently en- forced set of rules is available at https://www.reddit.com/ r/changemyview/wiki/rules. Table 1: Dataset statistics. The disjoint training and test date ranges are 2013/01/01–2015/05/07 and 2015/05/08–2015/09/01. # discussion trees 18,363 2,263 # nodes 1,114,533 145,733 # OPs 12,351 1,823 # uniq. participants 69,965 16,923 Training Heldout shows an example where indeed, the OP described their point in reasonable detail, and the responders raised sensible objections. The high amount of activity on CMV means that we can extract a large amount of data. We process all discussion trees created at any time from January 2013, when the subreddit was created, to Au- gust 2015, saving roughly the final 4 months (May–August 2015) for held-out evaluation. Some size statistics are given in Table 1. Monthly trends are depicted in Figure 3:7 after the initial startup, activity levels stabilize to a healthy, stable growth in average num- ber of replies and challengers, as, gratifyingly, do OP conversion rates, computed as the fraction of discussion trees wherein the OP awarded a ∆ (Figure 3d). For posts where the OP gave at least one delta, the OP gave 1.5 deltas on average. This dataset is available at https://chenhaot.com/pages/changemyview.html. 3. INTERACTION DYNAMICS Changing someone’s opinion is a complex process, often involv- ing repeated interactions between the participants. In this section we investigate the relation between the underlying dynamics and the chances of “success”, where “success” can be seen from the perspective of the challenger (did she succeed in changing the OP’s opinion?), as well as from that of the set of challengers (did anyone change the OP’s view?). 7We omit the first month as the DeltaBot may not have been set up. (a) Number of posts per month. (b) Average no. replies per post. (a) Delta ratio vs. entry order. (b) Delta ratio vs. degree of back- and-forth exchanges. Figure 4: Figure 4a shows the ratio of a person eventually winning a delta in a post with at least 10 challengers depending on the order of her/his entry. Early entry is more likely to win a delta. Figure 4b presents the probability of winning a delta given the number of comments by a challenger in a back-and-forth path with OP. With 6 or more replies in a back-and-forth path, no challengers managed to win a delta among our 129 data points (with 5 replies, the success ratio is 1 out of 3K). In both figures, error bars represent standard errors (sometimes 0). attract attempts by 10 unique challengers, the first two challengers are 3 times more likely to succeed as the 10th (Figure 4a). One potential explanation for this finding is that dedicated expert users are more likely to be more active on the site and thus see posts first. To account for this, we redo the analysis only for users that are participating for the first time on CMV. We observe that even after controlling for user experience, an earlier entry time is still more favorable. We omit the figure for space reasons. Back-and-forth. After entering a discussion, the challenger can ei- ther spend more effort and engage with the OP in a back-and-forth type of interaction or call it quits. Figure 4b shows the relation between the likelihood of receiving a ∆ and degree of back-and- forth, defined as the number of replies the root challenger made in a path involving only her and the OP.9 We observe a non-monotonic relation between back-and-forth engagement and likelihood of suc- cess: perhaps while some engagement signals the interest of the OP, too much engagement can indicate futile insistence; in fact, after 5 rounds of back-and-forth the challenger has virtually no chance of receiving a ∆. 3.2 OP’s conversion From the perspective of an original post, conversion can happen when any of the challengers participating in the discussion suc- ceeds in changing the OP’s view. We now turn to exploring how an OP’s conversion relates to the volume and type of activity her original post attracts. Number of participants. It is reasonable to expect that an OP’s conversion is tied to the number of challengers [7, 10]. For in- stance, the OP might be persuaded by observing the sheer number of people arguing against her original opinion. Moreover, a large number of challengers will translate into a more diverse set of ar- guments, and thus higher likelihood that the OP will encounter the ones that best fit her situation. Indeed, Figure 5a shows that the likelihood of conversion does increase with the number of unique 9If a subtree won a ∆, we only consider the winning path; other- wise, other conversations would be mistakenly labeled unsuccess- ful. For instance, the path A.1, A.2, A.4, A.5 in Figure 1 is not considered. (c) Average no. challengers per post. (d) Average delta percentage. Figure 3: Monthly activity over all full months represented in the training set. The delta percentage is the fraction of discussion trees in which the OP awarded a delta. In order to discuss the relation between interaction dynamics and success, we now introduce corresponding terminology using the example illustrated in Figure 1: • An original statement of views (original post) together with all the replies form a discussion tree. • A direct reply to an original post is called a root reply (A.1 and B.1 in Figure 1). The author of a root reply is a root challenger. • A subtree includes a root reply and all its children (B.1–B.12 form one of the two subtrees in Figure 1). • A path constitutes all nodes from root reply to a leaf node. Figure 1 contains four paths: P1: A.1, P2: A.1, A.2, A.4, A.5, P3: B.1–B.11 and P4: B.1, B.12. Note that when a ∆ is awarded, the DeltaBot automatic reply (A.3) and the OP’s post that triggers it (A.2) are not considered part of the path. In order to focus on discussions with non-trivial activity, in this section we only consider discussion trees with at least 10 replies from challengers and at least one reply from the OP. 3.1 Challenger’s success A challenger is successful if she manages to change the view of the OP and receive a ∆. We now examine how the interaction patterns in a discussion tree relate to a challenger’s success. Entry time. How does the time when a challenger enters a dis- cussion relate to her chances of success? A late entry might give the challenger time to read attempts by other challengers and bet- ter formulate their arguments, while an early entry might give her the first-mover advantage.8 Even for original posts that eventually 8Note that although reply display order is affected by upvotes, en- try time is an important factor when the OP follows the post closely. 201302201306201310201402201406201410201502201504020040060080010001200#posts201302201306201310201402201406201410201502201504304050607080average#replies201302201306201310201402201406201410201502201504101520253035average#challengers20130220130620131020140220140620141020150220150420%30%40%deltapercentage0246810challengerrankintime1%2%3%4%5%deltapercentage123456+#repliesinaback-and-forthpath0%1%2%3%4%5%6%deltapercentage challenger’s opening argument in a rooted path-unit, and full path, which considers the text in all replies within a rooted path-unit. In response to the same original post, there are many possible ways to change someone’s view. We aim to find linguistic factors that can help one formulate her/his argument, rather than to analyze reasoning strategies.10 Hence, for each rooted path-unit that wins a ∆, we find the rooted path-unit in the same discussion tree that did not win a ∆ but was the most “similar” in topic. We measure similarity between rooted path-units based on Jaccard similarity in the root replies after removing stopwords (as defined by Mallet’s dictionary [31]). Jaccard(A, B) = A ∩ B A ∪ B , where A, B are the sets of words in the first reply of each of the two rooted path-units. This leads to a balanced binary prediction task: which of the two lexically similar rooted path-units is the successful one? With this setup, we attempt to roughly de-emphasize what is being said, in favor of how it is expressed. We further avoid trivial cases, such as replies that are not argu- ments but clarifying questions, by removing cases where the root reply has fewer than 50 words. In order to make sure that there are enough counterarguments that the OP saw, motivated by the results in §3.2, we also require that there are at least 10 challengers in the discussion tree and at least 3 unsuccessful rooted path-units before the last reply that the OP made in the discussion tree. In an ideal world, we would control for both length [13] and topic [25, 52], but we don’t have the luxury of having enough data to do so. In our pilot experiments, annotators find that Jaccard- controlled pairs are easier to compare than length-matched pairs, as the lexical control is likely to produce arguments that make similar claims. Since length can be predictive (for instance, C2 won a ∆ in Figure 2), this raises the concern of false positive findings. Hence we develop a post-mortem “dissection” task (labelled root truncated) in which we only consider the root reply and truncate the longer one within a pair so that both root replies have the same number of words. This forcefully removes all length effects. Disclaimer: Features that lose predictive power in the root trun- cated setting (or “reverse direction”11) are not necessarily false positives (or non-significant), as truncation can remove significant fractions of the text and lead to different distributions in the re- sultant dataset. Our point, though, is: if features retain predictive power even in the root truncated settings, they must be indicative beyond length. We extract pairs from the training and heldout periods respec- tively as training data (3,456 pairs) and heldout testing data (807 pairs). Given that our focus is on language, we only use text-based features in this section.12 In preprocessing, we remove explicit ed- its that users made after posting or commenting, and convert quo- tations and URLs into special tokens. 4.2 Features In order to capture characteristics of successful arguments, we explore two classes of textual features: (§4.2.1) features that de- scribe the interplay between a particular challenger’s replies and the original post, and (§4.2.2) features that are solely based on his/her 10That is an intriguing problem for future work that requires a knowledge base and sophisticated semantic understanding of lan- guage. 11E.g., more of feature f is significantly better for root reply, but less f is significantly better in root truncated. 12An entry order baseline only achieves 54.3% training accuracy. (a) Delta percentage vs. number of unique challengers. Single-challenger subtree (b) vs. multiple-challenger subtree controlled by the number of replies. Figure 5: Probability that a submitted view will be changed, given (a) the total number of unique challengers binned using log2, and (b) the number of replies in a subtree. challengers. Notably, we observe a saturation in how much value each new challenger adds beyond a certain point. Sheer number of challengers or diversity of counterarguments? To distinguish between the two possible explanations proposed in the previous paragraph, we control for the diversity of counterargu- ments by focusing only on subtrees, in which challengers generally focus on the same argument. To make a fair comparison, we fur- ther control the number of total replies in the subtree. In light of Figure 4b, we only consider subtrees with between 2 and 4 replies. Figure 5b shows that single-challenger subtrees consistently out- perform multiple-challenger subtrees in terms of conversion rate. This observation suggests that the sheer number of challengers is not necessarily associated with higher chances of conversion. The fact that multiple-challenger subtrees are less effective might sug- gest that when talking about the same counterargument, challengers might not be adding value to it, or they might even disagree (e.g., B.12 vs. B.2 in Figure 1); alternatively, root replies that attract mul- tiple challengers might be less effective to begin with. 4. LANGUAGE INDICATORS OF PERSUASIVE ARGUMENTS The interaction dynamics studied in the previous section are to a large extent outside the challenger’s influence. The language used in arguing, however, is under one’s complete control; linguistic cor- relates of successful persuasion can therefore prove of practical value to aspiring persuaders. In order to understand what factors of language are effective, we set up paired prediction tasks to ex- plore the effectiveness of textual discussion features, in the context of CMV. 4.1 Problem setup In order to study an individual’s success in persuasion, we con- sider the collection of arguments from the same person in the same line of argument. We focus on arguments from root challengers since the root reply is what initiates a line of argument and deter- mines whether the OP will choose to engage. We define all replies in a path by the root challenger as a rooted path-unit, e.g., reply A.1 and B.1 in Figure 1. As shown in §3, situations where there is more than one reply in a rooted path-unit correspond to a higher chance that the OP will be persuaded. So, while the challenger’s opening argument should be important, statements made later in the rooted path-unit could be more important. To distinguish these two cases, we con- sider two related prediction tasks: root reply, which only uses the 183264128256#challengers5%10%15%20%25%30%35%40%45%50%deltapercentageavg#challengersavgdelta%234#replies3%4%5%6%7%8%deltapercentagesinglemultiple Table 2: Significance tests on interplay features. Features are sorted by average p-value in the two tasks. In all feature testing tables, the number of arrows indicates the level of p-value, while the direction shows the relative relationship between positive instances and neg- ative instances, ↑↑↑↑: p < 0.0001, ↑↑↑: p < 0.001, ↑↑: p < 0.01, ↑: p < 0.05. T in the root reply column indicates that the feature is also significant in the root truncated condition, while T R means that it is significant in root truncated but the direction is reversed. Feature name reply frac. in all reply frac. in content OP frac. in stopwords #common in stopwords reply frac. in stopwords OP frac. in all #common in all Jaccard in content Jaccard in stopwords #common in content OP frac. in content Jaccard in all root reply ↓↓↓↓ (T ) ↓↓↓↓ (T ) ↑↑↑↑ (T R) ↑↑↑↑ (T R) ↓↓↓↓ ↑↑↑↑ (T R) ↑↑↑↑ (T R) ↓↓↓↓ (T ) ↑↑↑↑ (T R) ↑↑↑↑ (T R) ↑ (T R) ↓ (T ) full path ↓↓↓↓ ↓↓↓↓ ↑↑↑↑ ↑↑↑↑ ↓↓↓↓ ↑↑↑↑ ↑↑↑↑ ↓↓↓↓ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ Interplay with the original post: Table 2 replies. We present those features that are statistically significant in the training data under the paired t-test with Bonferroni correction for multiple comparisons. 4.2.1 The context established by the OP’s statement of her view can provide valuable information in judging the relative quality of a challenger’s arguments. We capture the interplay between argu- ments and original posts through similarity metrics based on word overlap.13 We consider four variants based on the number of unique words in common between the argument (A) and the original post (O): • number of common words: A ∩ O, • reply fraction: • OP fraction: • Jaccard: O A∩O A∪O . , A∩O A A∩O , Table 3: Argument-only features that pass a Bonferroni-corrected significance test. Features are sorted within each group by average p-value over the two tasks. Due to our simple truncation based on words, some features, such as those based on complete sentences, cannot be extracted in root truncated; these are indicated by a dash. We remind the reader of the root truncated disclaimer from §4. Feature name #words Word category–based features #definite articles #indefinite articles #positive words #2nd person pronoun #links #negative words #hedges #1st person pronouns #1st person plural pronoun #.com links frac. links frac. .com links #examples frac. definite articles #question marks #PDF links #.edu links frac. positive words frac. question marks #quotations Word score–based features arousal valence Entire argument features word entropy #sentences type-token ratio #paragraphs Flesch-Kincaid grade levels Markdown formatting #italics bullet list #bolds numbered words frac. italics root reply ↑↑↑↑ full path ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ (T R) ↑↑↑↑ ↑↑↑↑ (T ) ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ (T ) ↑↑↑↑ (T ) ↑↑↑↑ (T ) ↑ ↑ (T ) ↑ — ↑ ↓ — ↓ ↓ (T ) ↑↑↑↑ ↑↑↑↑ — ↓↓↓↓ (T R) ↑↑↑↑ — — ↑↑↑↑ — ↑↑↑↑ — ↑↑ — ↑ ↑ — ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑ ↑↑↑↑ ↑↑↑ ↑ ↓ ↑↑↑↑ ↓↓↓ ↑↑↑↑ ↑↑↑↑ ↓↓↓↓ ↑↑↑↑ ↓↓↓ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↑ While stopwords may be related to how challengers coordinate their style with the OP [14, 35], content words can be a good signal of new information or new perspectives. Thus, inspired by previous results distinguishing these vocabulary types in studying the effect of phrasing [52], for each of the four variants above we try three different word sets: stopwords, content words and all words. The features based on interplay are all significant to a certain degree. Similar patterns occur in root reply and full path: in num- ber of common words and OP fraction, persuasive arguments have larger values because they tend to be longer, as will be shown in §4.2.2; in reply fraction and Jaccard, which are normalized by re- ply length, persuasive arguments are more dissimilar from the orig- inal post in content words but more similar in stopwords. Keeping in mind that the pairs we compare are chosen to be similar to each other, our analysis indicates that, under this constraint, persuasive arguments use a more different wording from the original post in content, while at the same time matching them more on stopwords. 13We also tried tf-idf, topical, and word embedding–based similarity in cross validation on training data. We defer discussion of poten- tially useful features to §6. If we instead use truncation to (artificially) control for reply length, persuasive arguments present lower similarity in all metrics, sug- gesting that effects might differ over local parts of the texts. How- ever, it is consistent that successful arguments are less similar to the original post in content words. 4.2.2 Argument-only features: Table 3 We now describe cues that can be extracted solely from the replies. These features attempt to capture linguistic style and its connec- tions to persuasion success. Number of words. A straightforward but powerful feature is the number of words. In both root reply and full path, a larger number of words is strongly correlated with success. This is not surpris- ing: longer replies can be more explicit [37, 38] and convey more information. But naïvely making a communication longer does not automatically make it more convincing (indeed, sometimes, more succinct phrasing carries more punch); our more advanced features attempt to capture the subtler aspects of length. (a) Arousal in root replies. (b) Concreteness in root replies. (c) Dominance in root replies. (d) Valence in root replies. (e) Arousal in original posts. (f) Concreteness in original posts. (g) Dominance in original posts. (h) Valence in original posts. Figure 6: Style features in different quarters. The first row shows how arousal, concreteness, dominance and valence change in different quarters of the root reply, while the second row shows the same features in the original posts. The descending concreteness trend suggests that opinions tend to be expressed in a particular-to-general way; replies notably differ by having both the opening and the closing be abstract, with a concrete middle. These differences are indicative of the functions that the two forms of utterances serve: a CMV rule is that original posts should not be “like a persuasive essay”. Error bars represent standard errors. Word category–based features. As suggested by existing psy- chology theories and our intuitions, the frequency of certain types of words may be associated with persuasion success. We consider a wide range of categories (see §9 for details), where for each, we measure the raw number of word occurrences and the length- normalized version. Word score–based features. Beyond word categories, we employ four scalar word-level attributes [5, 57]: • Arousal captures the intensity of an emotion, and ranges from “calm” words (librarian, dull) to words that excite, like ter- rorism and erection. • Concreteness reflects the degree to which a word denotes something perceptible, as opposed to abstract words which can denote ideas and concepts, e.g., hamburger vs. justice. • Dominance measures the degree of control expressed by a word. Low-dominance words can suggest vulnerability and weakness (dementia, earthquake) while high-dominance words evoke power and success (completion, smile). • Valence is a measure of how pleasant the word’s denotation is. Low-valence words include leukemia and murder, while sunshine and lovable are high-valence. We scale the four measures above to lie in [0, 1].14 We extend these measures to texts by averaging over the ratings of all content words. Table 3 shows that it is consistently good to use calmer language. Aligned with our findings in terms of sentiment words (§9), per- suasive arguments are slightly less happy. However, no significant differences were found for concreteness and dominance. 14While the resources cover most common words, out-of- vocabulary misses can occur often in user-generated content. We found that all four values can be extrapolated with high accuracy to out-of-vocabulary words by regressing on dependency-based word embeddings [29] (median absolute error of about 0.1). Generaliz- ing lexical attributes using word embeddings was previously used for applications such as figurative language detection [55]. Characteristics of the entire argument. We measure the number of paragraphs and the number of sentences: persuasive arguments have significantly more of both. To capture the lexical diversity in an argument, we consider the type-token ratio and word entropy. Persuasive arguments are more diverse in root reply and full path, but the type-token ratio is surprisingly higher in root truncated: be- cause of correlations with length and argument structure, lexical di- versity is hard to interpret for texts of different lengths. Finally, we compute Flesch-Kincaid grade level [26] to represent readability. Although there is no significant difference in root reply, persuasive arguments are more complex in full path. Formatting. Last but not least, discussions on the Internet employ certain writing conventions enabled by the user interface. Since Reddit comments use Markdown15 for formatting, we can recover the usage of bold, italic, bullet lists, numbered lists and links for- matting.16 While these features are not applicable in face-to-face arguments, more and more communication takes place online, mak- ing them highly relevant. Using absolute number, most of them are significant except numbered lists. When it comes to normalized counts, though, only italicizing exhibits significance. 4.2.3 They hold no quarter, they ask no quarter Understanding how a line of argument might evolve is another interesting research problem. We investigate by quartering each argument and measuring certain feature values in each quarter, al- lowing for finer-grained insight into argument structure. Word score–based features in quarters. (Figure 6) With the ex- ception of arousal, effective arguments and ineffective arguments present similar patterns: the middle is more concrete and less dom- inant than the beginning and end, while valence rises slightly over the course of an argument. We also see interesting differences in psycholinguistic patterns between original posts and replies. (We 15 https://daringfireball.net/projects/markdown/ 16We also consider numbered words (first, second, third, etc.) as the textual version of numbered lists. 1st2nd3rd4th0.3960.3970.3980.3990.4000.4010.402arousaleffectivenoteffective1st2nd3rd4th0.4850.4900.4950.5000.505concretenesseffectivenoteffective1st2nd3rd4th0.55400.55450.55500.55550.55600.55650.55700.55750.55800.5585dominanceeffectivenoteffective1st2nd3rd4th0.5500.5510.5520.5530.5540.5550.556valenceeffectivenoteffective1st2nd3rd4th0.3980.3990.4000.4010.4020.4030.404arousalmalleableresistant1st2nd3rd4th0.4850.4900.4950.5000.5050.5100.515concretenessmalleableresistant1st2nd3rd4th0.5400.5450.5500.555dominancemalleableresistant1st2nd3rd4th0.5300.5350.5400.5450.5500.555valencemalleableresistant Figure 7: Similarity between each quar- ter of an argument and the entire original post. Figure 8: Prediction results. The cyan fraction in the left figure shows the performance in root truncated, and the purple bar shows the performance in root reply. The magenta line shows the performance of #words in root reply, while the gray line shows the performance of #words in root truncated, which is the same as random guessing. The figure on the right gives the performance in full path (the magenta line gives the performance of #words). The number of stars indicate the significance level compared to the #words baseline according to McNemar’s test. (*: p < 0.05, **: p < 0.01, ***: p < 0.001.) defer detailed discussion to §5.) In terms of arousal, however, suc- cessful arguments begin by using calmer words. Interplay with the original post. (Figure 7) To capture partial overlap and possible divergence from the OP’s view, we divide both the original post and the rooted path-unit into quarters, and measure similarity metrics between all subdivisions (including the full unit).17 Since the reply fraction in content words is the most significant interplay feature, in Figure 7 we only show the frac- tion of common content words in different quarters of replies vs. the original post. Both effective and ineffective arguments start off more similar with the original post; effective arguments remain less similar overall. 4.3 Prediction results We train logistic regression models with (cid:96)1 regularization on the training set and choose parameters using five cross-validation folds, ensuring that all pairs of arguments that share the same OP are in the same fold.18 All features are standardized to unit variance, and missing values are imputed using the training fold sample mean. We evaluate using pairwise accuracy in the heldout dataset, where we restricted ourselves to a single experimental run (after holding our collective breath) to further reduce the risk of overfitting. The results are, in fact, in line with what we describe in the training-data analysis here. Feature sets. As shown in §4.2, the number of words is very pre- dictive, providing a strong baseline to compare against. Bag-of- words features (BOW) usually provide a strong benchmark for text classification tasks. We restrict the size of the vocabulary by re- moving rare words that occurred no more than 5 times in train- ing and (cid:96)2-normalize term frequency vectors. Since part-of-speech tags may also capture properties of the argument, we also use nor- malized term frequency vectors by treating part-of-speech tags as words (POS). Features in §4.2.1 are referred to as interplay; fea- tures in §4.2.2 constitute the feature set style. Finally, we use a 17In prediction, we also take the maximum and minimum of these quarter-wise measures as an order-independent way to summarize fragment similarity. 18We also tried (cid:96)2 regularization, random forests and gradient boosting classifiers and found no improvement beyond the cross- validation standard error. combination of style and interplay, as well as a combination that includes all the above features (all). Note that style and interplay are dense and very low-dimensional compared to BOW. Interplay with the OP plays an essential role. (Figure 8) #words is indeed a very strong baseline that achieves an accuracy of 60% in root reply and 66% in full path. As a sanity check, in root trun- cated, it indeed gets only 50%. In comparison, BOW achieves sim- ilar performance as #words, while POS gives even worse perfor- mance. However, interplay features lead to a 5% absolute improve- ment over the #words baseline in root reply and full path, and a 14% absolute improvement in root truncated. In fact, the performance of interplay is already close to using the combination of interplay and style and using all features. In root truncated, although the perfor- mance of style features drops significantly, interplay achieves very similar performance as in root reply, demonstrating the robustness of the interplay features. 5. “RESISTANCE” TO PERSUASION Although it is a good-faith step for a person to post on CMV, some beliefs in the dataset are still “resistant” to changes, possi- bly depending on how strongly the OP holds them and how the OP acquired and maintained them [45, 54, 59]. Since CMV mem- bers must state their opinion and reasons for it in their own words, we can investigate differences between how resistant and malleable views are expressed. In this section, we seek linguistic and style patterns characterizing original posts in order to better understand the mechanisms behind attitude resistance and expression, and to give potential challengers a sense of which views may be resistant before they engage. However, recognizing the “malleable” cases is not an easy task: in a pilot study, human annotators perform at chance level (50% on a paired task to distinguish which of two original posts is mal- leable). In light of our observation that persuasion is unsuccessful in 70% of the cases from §3, we set up an imbalanced prediction task. We focus on cases where at least 10 challengers attempt coun- terarguments, and where the OP replied at least once,19 alleviating 19Although in preprocessing we replaced all explicit edits, we also remove all posts containing the word “changed”, to avoid includ- ing post-hoc signals of view change. 1st2nd3rd4th0.410.420.430.440.450.460.470.480.49argumentfractioneffectivenoteffective50%55%60%65%accuracy#wordsBOWPOSinterplaystyleinterplay+styleall******Rootreply50%55%60%65%70%accuracy**Fullpath Table 4: Opinion malleability task: statistically significant features after Bonferroni correction. Feature name #1st person pronouns frac. 1st person pronoun dominance frac. 1st person plural pronoun #paragraphs #1st person plural pronoun #bolds arousal valence bullet list More malleable? ↑↑↑↑ ↑↑↑↑ ↑↑↑↑ ↓↓↓ ↑↑ ↓↓ ↑ ↓ ↑ ↑ the concern that an opinion appears resistant simply because there was little effort towards changing it. This brings us 10,743 original posts in the training data and 1,529 original posts in the heldout data. We then analyze systematic expression patterns that charac- terize malleable beliefs and that signal open-mindedness. 5.1 Stylistic features for open-mindedness We employ the same set of features from §4.2.2 to capture the characteristics of original posts. Among them, only a handful are significantly predictive of malleability, as shown in Table 4. Personal pronouns and self-affirmation. First person pronouns are strong indicators of malleability, but first person plural pro- nouns correlate with resistance. In psychology, self-affirmation has been found to indicate open-mindedness and make beliefs more likely to yield [11, 12]. Our result aligns with these findings: indi- vidualizing one’s relationship with a belief using first person pro- nouns affirms the self, while first person plurals can indicate a di- luted sense of group responsibility for the view. Note that it was also found in other work that openness is negatively correlated with first person singular pronouns [39]. Formatting. The use of more paragraphs, bold formatting, and bulleted lists are all higher when a malleable view is expressed. Taking more time and presenting the reasons behind an opinion in a more elaborated form can indicate more engagement. Word score–based features. Dominance is the most predictive of malleability: the average amount of control expressed through the words used is higher when describing a malleable view than a re- sistant one. The same holds for happiness (captured by valence). In terms of arousal, malleable opinions are expressed significantly more serenely, ending on a particularly calm note in the final quar- ter, while stubborn opinions are expressed with relatively more ex- citement. 5.2 Prediction performance We use weighted logistic regression and choose the amount and type of regularization ((cid:96)1 or (cid:96)2) by grid search over 5 cross-validation folds. Since this is an imbalanced task, we evaluate the prediction results using the area under the ROC curve (AUC) score. As in §4, we use the number of words as our baseline. In addition to the above features that characterizes language style (style), we use bag-of-words (BOW), part-of-speech tags (POS) and a full feature set (all). The holdout performance is shown in Figure 9. The classifiers trained on bag of words features significantly out- performs the #words baseline. Among words with largest coef- ficients, resistant views tend to be expressed using more decisive words such as anyone, certain, ever, nothing, and wrong, while help and please are malleable words. The POS classifier signifi- cantly outperforms random guessing, but not the baseline. Never- theless, it yields an interesting insight: comparative adjectives and Figure 9: Opinion malleability prediction performance: AUC on the heldout dataset. The purple line shows the performance of #words, while the gray line gives the performance of random guessing. The BOW and all feature sets perform significantly bet- ter than the #words baseline, according to one-sided paired permu- tation tests. BOW, POS, style and all outperform random guess- ing using bootstrapped tests. (*: p < 0.05, **: p < 0.01, ***: p < 0.001.) adverbs are signs of malleability, while superlative adjectives sug- gest stubbornness. The full feature set (all) also significantly out- perform the #words baseline. The overall low scores suggest that this is indeed a challenging task for both humans and machines. 6. FURTHER DISCUSSION Here we discuss other observations that may open up avenues for further investigation of the complex process of persuasion. Experience level. Beyond the interactions within a discussion tree, CMV is a community where users can accumulate experience and potentially improve their persuasion ability. Figure 10a shows that a member’s success rate goes up with the number of attempts made. This observation can be explained by at least two reasons: the success rate of frequent challengers improves over time, and/or frequent challengers are better at persuasion from the beginning. To disentangle these two possible reasons, for challengers who at- tempted to change at least 16 views, we split all the attempts into 4 equal chunks sorted by time. Figure 10b presents how the success rate changes over a challenger’s life, suggesting that the success rate of frequent challengers does not increase.20 It is worth not- ing that this lack of apparent improvement might be explained by a gradual development of a “taste” for original posts that are harder to address [30]. Such community dynamics point to interesting re- search questions for future work. Attempts to capture high-level linguistic properties. We experi- mented with a broader set of features in cross validation, which we still deem interesting but did not discuss in depth for space reasons. One important class are attempts to capture the semantics of orig- inal statements and arguments. We experimented with using topic models [3] to find topics that are the most malleable (topic: food, eat, eating, thing, meat and topic: read, book, lot, books, women), and the most resistant (topic: government, state, world, country, countries and topic: sex, women, fat, person, weight). However, topic model based features do not seem to bring predictive power to either of the tasks. For predicting persuasive arguments, we at- tempted to capture interplay with word embeddings for text similar- 20In terms of the correlation between previous success (lifetime deltas) and success rate, the result is similar: beyond 4–5 deltas there is no noticeable increase. 0.480.500.520.540.56AUC#wordsBOWPOSstyleallrandom** Finally, beyond mechanisms behind persuasion, it is a vital re- search problem to understand how community norms encourage such a well-behaved platform so that useful rules, moderation prac- tices, or even automated tools can be deployed in future community building. 9. APPENDIX In this section we explain the features based on word categories. • (In)definite articles (inspired by [13]). These are highly corre- lated with length, so they are both highly significant in terms of absolute numbers. However, in terms of word ratios, definite arti- cles (e.g., “the” instead of “a”) are preferred, which suggests that specificity is important in persuasive arguments. • Positive and negative words. We use the positive and negative lexicons from LIWC [40]. In absolute numbers, successful argu- ments are more sentiment-laden in both root reply and full path. When truncating, as well as when taking the frequency ratio, per- suasive opening arguments use fewer positive words, suggesting more complex patterns of positive emotion in longer arguments [23, 58]. • Arguer-relevant personal pronouns. We consider 1st person pro- nouns (me) 2nd person pronouns (you) and 1st person plural pro- nouns (us). In both root reply and full path, persuasive arguments use a significantly larger absolute number of personal pronouns. • Links. Citing external evidence online is often accomplished using hyperlinks. Persuasive arguments use consistently more links, both in absolute and in per-word count. We make spe- cial categories for interesting classes of links: those to .com and .edu domains, and those to PDF documents. Maybe due to high recall, .com links seem to be most powerful. Features based on links also tend to be significant even in the root truncated condi- tion. • Hedging. Hedges indicate uncertainty; an example is “It could be the case”. Their presence might signal a weaker argument [16], but alternately, they may make an argument easier to accept by softening its tone [28]. We curate a set of hedging cues based on [21, 24]. Hedging is more common in persuasive arguments under root reply and full path. • Examples. We consider occurrences of “for example”, “for in- stance”, and “e.g.”. The absolute number of such example mark- ers is significantly higher in persuasive arguments. • Question marks. Questions can be used for clarification or rhetor- ical purposes. In terms of absolute number, there are more in root reply and full path. But when it comes to ratio, if anything, it seems better to avoid using question marks. • Quotations. One common practice in argumentation is to quote the other party’s words. However, this does not seem to be a useful strategy for the root reply. Acknowledgments. We thank X. Chen, J. Hessel, S. Hu, S. Kundu, N. Li, M. Raghu, N. Rojas, A. Schofield, T. Shi, and J. Zhang for participating in our pilot annotation experiments. We thank Y. Artzi, J. Carpenter, P. Grabowicz, J. Hessel, Y. Hua, J. Park, M. Rooth, A. Schofield, A. Singh, and the anonymous reviewers for helpful comments. This work was supported in part by NSF grant IIS-0910664, a Google Research Grant, a Google Faculty Research Award and a Facebook Fellowship. (a) Delta ratio vs. log2 #posts. (b) No growth over life. Figure 10: Effect of experience. ity using both the centroid distance and the word mover’s distance [27]. Both distances proved predictive by themselves, but were not able to improve over the features presented in the paper in cross validation. More generally, better semantic models applicable to online discussions could open up deeper investigations into effec- tive persuasion strategies. Sequential argument structure. Another promising direction is to examine the structure of arguments via the sequence of discourse connectors. For instance, we can recover interesting structures such as “first0–but1–because2” and “now1–then2–instead3”, where the subscripts indicate which quarter the discourse connector occurred in. These features did not perform well in our tasks due to low re- call, or lack of argumentative structure in the data, but they deserve further exploration. 7. ADDITIONAL RELATED WORK A few lines of research in natural language processing are re- lated to our work. Argumentation mining focuses on fine-grained analysis of arguments and on discovering the relationships, such as support and premise, between different arguments [34]. Studies have also worked on understanding persuasive essays [18, 41, 51] and opinion analysis in terms of agreement and ideology [53, 49, 22, 50, 48]. Another innovative way of using Internet data to study mass persuasion is through AdWords [20]. 8. CONCLUSION In this work, in order to understand the mechanisms behind per- suasion, we use a unique dataset from /r/ChangeMyView. In addition to examining interaction dynamics, we develop a frame- work for analyzing persuasive arguments and malleable opinions. We find that not only are interaction patterns connected to the suc- cess of persuasion, but language is also found to distinguish persua- sive arguments. Dissimilarity with the wording in which the opin- ion is expressed turns out to be the most predictive signal among all features. Although members of CMV are open-minded and willing to change, we are still able to identify opinions that are resistant and to characterize them using linguistic patterns. There are many possible extensions to our approach for repre- senting arguments. In particular, it would be interesting to model the framing of different arguments and examine the interplay be- tween framing of the original post and the replies. For instance, is benefit-cost analysis the only way to convince a utilitarian? Furthermore, although this novel dataset opens up potential op- portunities for future work, other environments, where people are not as open-minded, can exhibit different kinds of persuasive in- teractions; it remains an interesting problem how our findings gen- eralize to different contexts. It is also important to understand the effects of attitude change on actual behavior [44]. 02468log2#postsattempted0.5%1.0%1.5%2.0%2.5%3.0%deltapercentage1st2nd3rd4thquarterinuserlife1.3%1.4%1.5%1.6%deltapercentage References [1] T. Althoff, C. Danescu-Niculescu-Mizil, and D. Jurafsky. How to ask for a favor: A case study on the success of al- truistic requests. In Proceedings of ICWSM, 2014. [2] M. Bailey, D. J. Hopkins, and T. Rogers. Unresponsive and unpersuaded: The unintended consequences of voter persua- sion efforts. In Meeting of the Society for Political Methodol- ogy at the University of Virginia, 2014. [3] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent Dirichlet Al- location. J. Mach. Learn. Res., 3:993–1022, 2003. [4] C. J. Bryan, G. M. Walton, T. Rogers, and C. S. Dweck. Mo- tivating voter turnout by invoking the self. Proceedings of the National Academy of Sciences, 108(31):12653–12656, 2011. [5] M. Brysbaert, A. B. Warriner, and V. Kuperman. Concrete- ness ratings for 40 thousand generally known English word lemmas. Behavior Research Methods, 46(3):904–911, 2014. [6] M. Burgoon, S. B. Jones, and D. Stewart. Toward a message- centered theory of persuasion: Three empirical investigations of language intensity. Human Communication Research, 1 (3):240–256, 1975. [7] S. Chaiken. The heuristic model of persuasion. influence: The Ontario Symposium, 1987. In Social [8] M. J. Chambliss and R. Garner. Do adults change their minds after reading persuasive text? Written Communication, 13(3): 291–313, 1996. [9] R. B. Cialdini. Influence: The Psychology of Persuasion. HarperCollins, 1993. [10] R. B. Cialdini, W. Wosinska, D. W. Barrett, J. Butner, and M. Gornik-Durose. Compliance with a request in two cul- tures: The differential influence of social proof and com- mitment/consistency on collectivists and individualists. Per- sonality and Social Psychology Bulletin, 25(10):1242–1253, 1999. [11] G. L. Cohen, J. Aronson, and C. M. Steele. When beliefs yield to evidence: Reducing biased evaluation by affirming the self. Personality and Social Psychology Bulletin, 26(9): 1151–1164, 2000. [12] J. Correll, S. J. Spencer, and M. P. Zanna. An affirmed self and an open mind: Self-affirmation and sensitivity to argument strength. Journal of Experimental Social Psychology, 40(3): 350–356, 2004. [13] C. Danescu-Niculescu-Mizil, J. Cheng, J. Kleinberg, and L. Lee. You had me at hello: How phrasing affects memo- rability. In Proceedings of ACL, 2012. [14] C. Danescu-Niculescu-Mizil, L. Lee, B. Pang, and J. Klein- berg. Echoes of power: Language effects and power differ- ences in social interaction. In Proceedings of WWW, 2012. [15] J. P. Dillard and L. Shen. The Persuasion Handbook: Devel- opments in Theory and Practice. SAGE Publications, 2014. [16] A. M. Durik, M. A. Britt, R. Reynolds, and J. Storey. The effects of hedges in persuasive arguments: A nuanced analy- sis of language. Journal of Language and Social Psychology, 2008. [17] A. H. Eagly and S. Chaiken. The Psychology of Attitudes. Harcourt Brace Jovanovich College Publishers, 1993. [18] N. Farra, S. Somasundaran, and J. Burstein. Scoring persua- sive essays using opinions and their targets. In Proceedings of the NAACL Workshop on Innovative Use of NLP for Building Educational Applications, 2015. [19] B. J. Fogg. Mass interpersonal persuasion: An early view of a new phenomenon. In Persuasive Technology, 2008. [20] M. Guerini, C. Strapparava, and O. Stock. Evaluation metrics for persuasive NLP with Google AdWords. In Proceedings of LREC, 2010. [21] D. A. Hanauer, Y. Liu, Q. Mei, F. J. Manion, U. J. Balis, and K. Zheng. Hedging their mets: The use of uncertainty terms in clinical documents and its potential implications when shar- ing the documents with patients. In Proceedings of the AMIA Annual Symposium, 2012. [22] K. S. Hasan and V. Ng. Why are you taking this stance? Iden- tifying and classifying reasons in ideological debates. In Pro- ceedings of EMNLP, 2014. [23] C. R. Hullett. The impact of mood on persuasion: A meta- analysis. Communication Research, 32(4):423–442, 2005. [24] K. Hyland. Hedging in Scientific Research Articles. Benjamins Publishing, 1998. John [25] A. Jaech, V. Zayats, H. Fang, M. Ostendorf, and H. Hajishirzi. Talking to the crowd: What do people react to in online dis- In Proceedings of EMNLP, pages 2026–2031, cussions? 2015. [26] J. P. Kincaid, R. P. Fishburne Jr, R. L. Rogers, and B. S. Chissom. Derivation of new readability formulas (automated readability index, fog count and Flesch reading ease formula) for Navy enlisted personnel. Chief of Naval Technical Train- ing, Naval Air Station, Research Branch Report 8-75, 1975. [27] M. J. Kusner, Y. Sun, N. I. Kolkin, and K. Q. Weinberger. From word embeddings to document distances. In Proceed- ings of ICML, 2015. [28] G. Lakoff. Hedges: A study in meaning criteria and the logic of fuzzy concepts. Journal of Philosophical Logic, 2, 1975. [29] O. Levy and Y. Goldberg. Dependency-based word embed- dings. In Proceedings of ACL, 2014. [30] J. J. McAuley and J. Leskovec. From amateurs to connois- seurs: Modeling the evolution of user expertise through on- line reviews. In Proceedings of WWW, 2013. [31] A. K. McCallum. Mallet: A machine learning for language toolkit. http://mallet.cs.umass.edu, 2002. [32] D. McRaney. //youarenotsosmart.com/2011/06/10/ the-backfire-effect/, 2011. 10-15. Accessed: The backfire effect. http: 2015- [33] T. Mitra and E. Gilbert. The Language that Gets People to In Pro- Give: Phrases that Predict Success on Kickstarter. ceedings of CSCW, 2014. [51] C. Stab and I. Gurevych. Identifying argumentative discourse In Proceedings of EMNLP, structures in persuasive essays. 2014. [52] C. Tan, L. Lee, and B. Pang. The effect of wording on mes- sage propagation: Topic- and author-controlled natural exper- iments on Twitter. In Proceedings of ACL, 2014. [53] M. Thomas, B. Pang, and L. Lee. Get out the vote: Determin- ing support or opposition from Congressional floor-debate transcripts. In Proceedings of EMNLP, 2006. [54] Z. L. Tormala and R. E. Petty. What doesn’t kill me makes me stronger: The effects of resisting persuasion on attitude certainty. Journal of Personality and Social Psychology, 83 (6):1298, 2002. [55] Y. Tsvetkov, L. Boytsov, A. Gershman, E. Nyberg, and C. Dyer. Metaphor detection with cross-lingual model trans- fer. In Proceedings of ACL, 2014. [56] O. Tykocinski, E. T. Higgins, and S. Chaiken. Message framing, self-discrepancies, and yielding to persuasive mes- sages: The motivational significance of psychological situa- tions. Personality and Social Psychology Bulletin, 20(1):107– 115, 1994. [57] A. B. Warriner, V. Kuperman, and M. Brysbaert. Norms of valence, arousal, and dominance for 13,915 English lemmas. Behavior Research Methods, 45(4):1191–1207, 2013. [58] D. T. Wegener and R. E. Petty. Effects of mood on persua- sion processes: Enhancing, reducing, and biasing scrutiny of attitude-relevant information. In L. L. Martin and A. Tesser, editors, Striving and Feeling: Interactions Among Goals, Af- fect, and Self-regulation. Psychology Press, 1996. [59] J. R. Zuwerink and P. G. Devine. Attitude importance and re- sistance to persuasion: It’s not just the thought that counts. Journal of Personality and Social Psychology, 70(5):931, 1996. [34] R. Mochales and M.-F. Moens. Argumentation mining. Arti- ficial Intelligence and Law, 19(1):1–22, 2011. [35] K. G. Niederhoffer and J. W. Pennebaker. Linguistic style matching in social interaction. Journal of Language and So- cial Psychology, 21(4):337–360, 2002. [36] B. Nyhan and J. Reifler. When corrections fail: The persis- tence of political misperceptions. Political Behavior, 32(2): 303–330, 2010. [37] D. J. O’Keefe. Standpoint explicitness and persuasive effect: A meta-analytic review of the effects of varying conclusion articulation in persuasive messages. Argumentation and Ad- vocacy, 34(1):1–12, 1997. [38] D. J. O’Keefe. Justification explicitness and persuasive ef- fect: A meta-analytic review of the effects of varying support articulation in persuasive messages. Argumentation and Ad- vocacy, 35(2):61–75, 1998. [39] J. W. Pennebaker and L. A. King. Linguistic styles: language use as an individual difference. J Pers Soc Psychol, 77(6): 1296–1312, 1999. [40] J. W. Pennebaker, M. E. Francis, and R. J. Booth. Linguistic inquiry and word count: LIWC 2007. Technical report, 2007. [41] I. Persing and V. Ng. Modeling argument strength in student essays. In Proceedings of ACL, 2015. [42] R. E. Petty and J. T. Cacioppo. Communication and Per- suasion: Central and Peripheral Routes to Attitude Change. Springer Science & Business Media, 2012. [43] R. E. Petty and D. T. Wegener. Matching versus mismatch- ing attitude functions: Implications for scrutiny of persuasive messages. Personality and Social Psychology Bulletin, 24(3): 227–240, 1998. [44] R. E. Petty, D. T. Wegener, and L. R. Fabrigar. Attitudes and attitude change. Annual Review of Psychology, 48(1):609– 647, 1997. [45] E. M. Pomerantz, S. Chaiken, and R. S. Tordesillas. Attitude strength and resistance processes. Journal of Personality and Social Psychology, 69(3):408, 1995. [46] S. L. Popkin. The Reasoning Voter: Communication and Per- suasion in Presidential Campaigns. University of Chicago Press, Chicago, 1994. [47] K. K. Reardon. Persuasion in Practice. Sage, 1991. [48] S. Rosenthal and K. McKeown. I couldn’t agree more: The role of conversational structure in agreement and disagree- ment detection in online discussions. In Proceedings of SIG- dial, 2015. [49] S. Somasundaran and J. Wiebe. Recognizing stances in ideo- logical on-line debates. In Proceedings of the NAACL Work- shop on Computational Approaches to Analysis and Genera- tion of Emotion in Text, 2010. [50] D. Sridhar, J. Foulds, B. Huang, L. Getoor, and M. Walker. Joint models of disagreement and stance in online debate. In Proceedings of ACL, 2015.
1802.03573
1
1802
2018-02-10T12:22:59
Social Media, News and Political Information during the US Election: Was Polarizing Content Concentrated in Swing States?
[ "cs.SI" ]
US voters shared large volumes of polarizing political news and information in the form of links to content from Russian, WikiLeaks and junk news sources. Was this low quality political information distributed evenly around the country, or concentrated in swing states and particular parts of the country? In this data memo we apply a tested dictionary of sources about political news and information being shared over Twitter over a ten day period around the 2016 Presidential Election. Using self-reported location information, we place a third of users by state and create a simple index for the distribution of polarizing content around the country. We find that (1) nationally, Twitter users got more misinformation, polarizing and conspiratorial content than professionally produced news. (2) Users in some states, however, shared more polarizing political news and information than users in other states. (3) Average levels of misinformation were higher in swing states than in uncontested states, even when weighted for the relative size of the user population in each state. We conclude with some observations about the impact of strategically disseminated polarizing information on public life.
cs.SI
cs
Social Media, News and Political Information during the US Election: Was Polarizing Content Concentrated in Swing States? COMPROP DATA MEMO 2017.8 / September 28 2017 Bence Kollanyi Oxford Internet Institute Oxford University Samantha Bradshaw Oxford Internet Institute Oxford University Lisa-Maria Neudert Oxford Internet Institute Oxford University @lmneudert Computational propaganda flourished during the 2016 US Presidential Election. There were numerous examples of misinformation distributed online with the intention of misleading voters or simply earning a profit. Multiple media reports have investigated how "fake news" may have propelled Donald J. Trump to victory.3–5 What kinds of political news and information were social media users in the United States sharing in advance of voting day? How much of it was extremist, sensationalist, conspiratorial, masked commentary, fake, or some other form of junk news? Was this misleading information concentrated in the battleground states where the margins of victory for candidates had big consequences for electoral outcomes? SOCIAL MEDIA AND JUNK NEWS Junk news, widely distributed over social media platforms, can in many cases be considered to be a form of computational propaganda. Social media platforms have served significant volumes of fake, sensational, and Philip N. Howard Oxford Internet Institute Oxford University [email protected] @pnhoward [email protected] [email protected] [email protected] @bencekollanyi @sbradshaww ABSTRACT US voters shared large volumes of polarizing political news and information in the form of links to content from Russian, WikiLeaks and junk news sources. Was this low quality political information distributed evenly around the country, or concentrated in swing states and particular parts of the country? In this data memo we apply a tested dictionary of sources about political news and information being shared over Twitter over a ten day period around the 2016 Presidential Election. Using self-reported location information, we place a third of users by state and create a simple index for the distribution of polarizing content around the country. We find that (1) nationally, Twitter users got more misinformation, polarizing and conspiratorial content than professionally produced news. (2) Users in some states, however, shared more polarizing political news and information than users in other states. (3) Average levels of misinformation were higher in swing states than in uncontested states, even when weighted for the relative size of the user population in each state. We conclude with some observations about the impact of strategically disseminated polarizing information on public life. COMPUTATIONAL PROPAGANDA AND THE 2016 US ELECTION Social media plays an important role in the circulation of ideas about public policy and politics. Political actors and governments worldwide are deploying both people and algorithms to shape public life.1,2 Bots are pieces of software intended to perform simple, repetitive, and robotic tasks. They can perform legitimate tasks on social media like delivering news and information-real news as well as junk-or undertake malicious activities like spamming, harassment and hate speech. Whatever their uses, bots on social media platforms are able to rapidly deploy messages, replicate themselves, and pass as human users. They are also a pernicious means of spreading junk news over social networks of family and friends. that and other forms of junk news at sensitive moments in public life, though most platforms reveal little about how much of this content there is or what its impact on users may be. The World Economic Forum recently identified the rapid spread of misinformation online as among the top 10 perils to society.6 Prior research has found that social media favors sensationalist content, regardless of whether the content has been fact checked or is from a reliable source.7 When junk news is backed by automation, either through dissemination algorithms the platform operators cannot fully explain or through political bots that promote content in a preprogrammed way, political actors have a powerful set of tools for computational propaganda.8 Both state and non-state political actors deliberately manipulate amplify non-factual information online. Fake news websites deliberately publish misleading, deceptive or incorrect information purporting to be real news for political, economic or cultural gain.9 These sites often rely on social media to attract web traffic and drive engagement. Both fake news websites and political bots are crucial tools in digital propaganda attacks-they aim to influence conversations, demobilize opposition and generate false support. SAMPLING AND METHOD Our analysis is based on a dataset of 22,117,221 tweets collected between November 1-11, 2016, that contained hashtags related to politics and the election in the US. Our previous analyses have been based on samples of political conversation, over Twitter that used hashtags that were relevant to the US election as a whole. In this analysis, we selected users who provided some evidence of physical location across the United States in their profiles. Within our initial sample, approximately 7,083,691 tweets, 32 percent of the total 1 traffic, were coming from users who volunteered enough location information in their profile to determine which state they were in. Many users have not provided enough details to allow us to identify which state they were tweeting from, added a location with a spelling mistake, or just entered a made-up location or a joke. After cleaning the data, we were able to successfully label 49.1 percent of the tweets from the users who provided any form of location information within their profile. The rest of the tweets were coming from profiles with a location field that refers to a location outside of the US or contains a location that we were not able to identify. Full access to user location data would provide better resolution on the distribution of users across states, but this response rate is sufficient to help us begin to understand the relationship between where users are and what kinds of political content they are being served by Twitter. These tweets and associated data were collected from Twitter's public Streaming API at the time of the election, not retroactively with the Search API. The platform's precise sampling method is not known, but the company itself reports that the data available through the Streaming API is at most one percent of the overall global public communication on Twitter at any given time.10 Tweets were selected based on a list of hashtags associated with the US election, and tweets were collected from the API that (1) contained at least one of the relevant hashtags; (2) contained the hashtag in the text of a link, such as a news article, shared in that tweet; (3) were a retweet of a message that contained the hashtag in the original message; or (4) quoted tweets in which the hashtag was included but in which the original text was not included and Twitter used a URL to refer to the original tweet. To evaluate different sources being shared over social media, we determined the source of each of the URLs in the dataset. Overall, 1,275,430 of the 7,083,691 tweets from users that had provided location information also contained a URL. Many sources that were easy to identify were auto-coded, but other kinds of content obscured by link shorteners or re-shared less were also catalogued. Effectively is built on successful cataloguing of 81% of the 1,275,430 links, with the remainder being single URLs shared only a few times or otherwise inaccessible. This typology that has emerged over our study of elections in five democracies: • Professional News Outlets. typology this that display fact-checking and credible o Major News Brands. This is political news and information the qualities of professional by major outlets journalism, with standards of production. They provide clear information about real authors, editors, publishers and owners, and the content is clearly produced by an organization with a reputation for professional journalism. This content comes from significant, branded news organizations, including any locally affiliated broadcasters. o Minor News Brands. As above, but this content comes from small news organizations or startups that display evidence of organization, that distinguishes between fact-checked news and commentary. Professional publishers that cover other domains of social life, such and professionalized output resources, • Professional Political Content • Polarizing and Conspiracy Content Junk News. This content Government. These links are to the websites of branches of as sports, fashion, or technology, but occasionally produce high quality political news. o government or public agencies. o Experts. This content takes the form of white papers, policy papers, or scholarship from researchers based at universities, think tanks or other research organizations. o Political Party or Candidate. These links are to official content produced by a political party or candidate campaign. o includes various forms of propaganda and ideologically extreme, hyper-partisan, or conspiratorial political news and information. Much of this content is deliberately produced false reporting. It seeks to persuade readers about the moral virtues or failings of organizations, causes or people and presents commentary as a news product. This content is produced by organizations that do not employ professional journalists, and the content uses attention grabbing techniques, lots of pictures, moving images, excessive capitalization, ad hominem attacks, emotionally charged words and pictures, unsafe generalizations and other logical fallacies. o WikiLeaks. These tweets provide links to unverified claims or irrelevant documentation on WikiLeaks.org. o sources of political news and information. Russia. This content was produced by known Russian • Other Political News and Information o Citizen, Civic, or Civil Society. Links to content produced by independent citizens, civic groups, or civil society organizations. Blogs and websites dedicated to citizen journalism, citizen-generated petitions, personal activism, and other forms of civic expression that display originality and creation more than curation or aggregation. o Humor and Entertainment. Content that involves political jokes, sketch comedy, political art or lifestyle- or entertainment- focused coverage. o Religion. Links to political news and information with distinctly religious themes and faith-based editorializing presented as political news or information. o Other Political Content. Myriad other kinds of political content, including portals like AOL and Yahoo! that do not themselves have editorial policies or news content, survey providers, and political documentary movies. • Other o Social Media Platforms. Links that simply refer to other social media platforms, such as Facebook or Instagram. If the content at the ultimate destination could be attributed to another source, it is. o successfully archive after repeated attempts. o political content. Not Available. Links that are no longer available or not Other Non-Political. Links to sites that actually have no Our two-stage coding process involved developing an initial, grounded coding scheme and running it as a kind of pilot study of a subsample of Michigan-based users (See Memo 2017.1).11 We then revised our definitions and recoded the complete dataset according to the categories defined below. limitations. Tweets about the US Presidential Election by individuals who did not use one of these hashtags would not have been captured. Tweets from people who used these hashtags but were tweeting about something else would be captured in this sample. We infer that volunteered location the political constituency of a human user. While demographic This methodology has several is a proxy for information 2 less about conversation over Twitter factors may explain a user's decision to geotag tweets, researchers outside Twitter know the distribution of self-reported location information.12 There are some complex techniques for inferring physical location from tweet content or metadata, but there is evidence that volunteered information from urban areas is more trustworthy and it is not clear that the machine learning techniques yield better data than self-reported data.13,14 The coding of source types was derived from the dataset and is not intended to be a comprehensive list of all types of information providers. Some types of political news and information are easy to catalogue. The category of "other content" was used for links to completely unpolitical pages. The overall percentages of different information sources are intended as a metric for the overall information environment surrounding the 2016 Presidential Election and as a way to stimulate further research and conversation. FINDINGS AND ANALYSIS This sample allows us to draw some conclusions about the character and process of political conversation over Twitter during the election, particularly as it relates to US voters and the circulation of different kinds of news and political information in swing states. In Data Memos 2016.1-2016.4 we analyze during US political Presidential candidate debates and the 10 days leading up to the election itself.15–18 Data Memo 2017.1 evaluates the circulation of junk news by taking a close look at what kinds of content Twitter users in Michigan were sharing just before the election.11 In that study, we found that (1) in Michigan, conversation about politics over Twitter mirrored the national trends in that Trump-related hashtags were used more than twice as often as Clinton- related hashtags. (2) Social media users in Michigan shared a lot of political content, but the amount of professionally researched political news and information was consistently smaller than the amount of extremist, sensationalist, conspiratorial, masked commentary, fake news and other forms of junk news. (3) Not only did such junk news "outperform" real news, but the proportion of professional news content being shared hit its lowest point the day before the election. If junk news was so prevalent in this important swing state, how was it distributed across the rest of the country? What Were Citizens Sharing? To investigate the distribution of political news and information being shared over social media we took the catalogue of content found in Michigan and classified the links being shared in the entire national sample. Table 1 catalogues the different kinds of URLs being shared in election- related tweets by users in the US. We removed tweets with links that were in foreign languages, no longer available, or inaccessible for some other reason. All in all, 1,033,742 links were still available online and successfully labelled. Table 1 presents the findings of this grounded catalogue of content. Overall, 20% of the links being shared with election-related hashtags came from to content professional news organizations. Links produced by government agencies, political parties and candidates, or experts, altogether added up to just 10% of the total. Indeed, only small fractions of the content being shared originated with the political parties, candidates, civil society groups, universities or public agencies. themselves. Second, a worryingly Two things should be noted across categories. First, the number of links to professionally produced content is less than the number of links to polarizing and conspiratorial junk news. In other words, the number of links to Russian news stories, unverified or irrelevant links to WikiLeaks pages, or junk news was greater than the number of links to professional researched and published news. Indeed, the proportion of misinformation was twice that of the content from experts and the candidates large proportion of all the successfully catalogued content provides links to polarizing content from Russian, WikiLeaks, and junk news sources. This content uses divisive and inflammatory rhetoric, and presents faulty reasoning or misleading information to manipulate the reader's understanding of public issues and feed conspiracy theories. Thus, when links to Russian content and unverified WikiLeaks stories are added to the volume of the successfully catalogued political content was polarizing, conspiracy driven, and of an untrustworthy provenance. junk news, fully 32% of all Table 1: What Political News and Information Were US Twitter Users Sharing during the Election? Type of Source N % of Subset % of Total 20 77 23 100 196,697 60,055 256,752 Professional News Content Major News Brands Minor News Brands Subtotal Professional Political Content Political Party or Candidate Experts Government 10 Subtotal Polarizing and Conspiracy Content Junk News WikiLeaks Russia 20 Subtotal Other Political News and Information Other Political Citizen, Civic or Civil Society Political Humor or Entertainment Religion Political Merchandise Subtotal 13 Other Social Media Platform Not Available Other Non-Political 36 Subtotal 100 TOTAL Source: Authors' calculations from data sampled 1-11/11/16. For the full list of hashtags used to capture this sample see Memo 2017.1).11 121,323 6,350 2,294 129,967 203,591 48,068 7,683 259,342 97,900 34,935 30,021 2,124 2,067 167,047 195,470 241,688 25,164 462,322 1,269,736 93 5 2 100 79 19 3 100 59 21 18 1 1 100 42 52 5 100 3 Polarizing Content and Swing States. To help understand the national distribution of polarizing content from Russian, WikiLeaks, and junk news sources, we then create a simple index, organized by states. Since states have different numbers of Twitter users, for each state we calculated the ratio of a state's tweets about politics to the entire country's tweets about politics. Then we added up all the tweets with junk news, links to unverified WikiLeaks pages, or links to Russian content (such as RussiaToday or Sputnik). For each state, we calculated a second ratio-the ratio of each state's junk content to the entire country's junk content. Putting these two ratios together gives an index of the proportion of junk news tweets from the state relative to the number of all political tweets from the state. The distribution of this "ratio of ratios" is uneven because half the distribution of possible values ranges from 0 to 1 (less junk news than expected given national averages) and the other half ranges from 1 to +infinity (more junk news than expected given national averages). However, by taking the natural log of the ratio of ratios the index will become more balanced: from –infinity to 0 becomes less junk news than expected, and 0 to +infinity becomes more junk news than expected. Mathematically, the 0 point on the index is the national average. Ratio of Ratios T = state Links Links Polarizing Polarizing ∑ states all PoliticalL ∑ inks PoliticalL country state inks Expression A: Indexing Polarizing Political Content from Russian, WikiLeaks, and Junk News Sources Table 2 identifies the weighted junk news scores for each state. States with scores around zero are close the national average, so they have about the concentration of junk news expected given the amount of Twitter conversation about politics occurring in that state. States with more negative scores have less junk news than expected given the amount of Twitter conversation about politics occurring in that state. Finally, states with more positive scores have unusual concentrations of junk news, even considering how much political conversation was occurring among Twitter users in that state. States that were considered swing states on November 2, 2017, according to the non-partisan National Constitution Center are marked by an (*) asterisk.19 At the bottom of this table the simple but revealing averages are calculated. This index is weighted for the relative number of tweets about politics generated by each state. If a state had about the level of junk news to be expected for the size of its Twitter user base, the state earned a score around the national average. If it had more junk then expected it scored above that, and if it had less than expected it scored below that. Table 2 reveals surprisingly concentrated in swing states even considering the amount of political conversation occurring in the state. Indeed, 12 that polarizing content was Table 2: Concentration of Polarizing Political Content from Russian, WikiLeaks, and Junk News Sources, Indexed by State Junk News Index -0.75 -0.54 -0.38 -0.30 -0.26 -0.20 -0.19 -0.18 -0.17 -0.16 -0.15 -0.14 -0.13 -0.13 -0.12 -0.11 -0.09 -0.07 -0.07 -0.06 -0.03 -0.03 -0.02 -0.01 +0.01 +0.01 +0.01 +0.03 +0.05 +0.05 +0.06 +0.07 +0.10 +0.10 +0.11 +0.12 +0.14 +0.14 +0.14 +0.16 +0.18 +0.18 +0.20 +0.22 +0.23 +0.25 +0.26 +0.27 +0.35 +0.45 +0.47 State North Dakota Washington D.C. Iowa* New York Wyoming New Mexico Nebraska Rhode Island Hawaii Wisconsin* Minnesota* Washington Illinois Kansas Connecticut Utah Idaho Mississippi Alaska Massachusetts California Maine* Oregon Louisiana Colorado* Ohio* New Jersey Maryland Michigan* Arkansas Texas Georgia* South Carolina Vermont New Hampshire* Pennsylvania* Oklahoma North Carolina* Virginia* Florida* Nevada* Indiana Tennessee Missouri* Alabama Arizona* Kentucky South Dakota Delaware Montana West Virginia Averages Not Contested State Average National Average Swing State Average Source: Authors' calculations from data sampled 1-11/11/16. Note: (*) Indicates a swing state in November 2016 according to the National Constitution Center. of the 16 swing states were above the average among less competitive states, and 11 of the 16 were above the national average. States that were not hotly contested had, on average, lower levels of junk news. -0.02 +0.00 +0.05 4 Figure 1: States With Above Average Concentrations of Polarizing Political Content from Russian, WikiLeaks, and Junk News Sources Source: Authors' calculations from data sampled 1-11/11/16. Note: Shades of green indicate that state users shared less of this content than expected given the size of their Twitter user base. Shades of red indicate that state users shared more junk content than expected given the size of their Twitter user base. The "fake news" CONCLUSIONS Many of the swing states getting highly concentrated doses of polarizing content were also among those with large numbers of votes in the Electoral College. Figure 1 presents a heat map of the distribution of junk news around the country. to term operationalize, so our grounded typology reflects the diversity of organizations behind the content that was circulated over Twitter by people in the United States in the ten days before voting day. Social media users in many states traded links to high quality political news and information. Junk news, characterized by ideological extremism, misinformation and the intention to persuade readers to respect or hate a candidate or policy based on emotional appeals, was just as, if not more, prevalent than the amount of information produced by professional news organizations. is difficult on Project Computational involves ABOUT THE PROJECT Propaganda The (www.politicalbots.org) and interdisciplinary, researchers in the investigation of the impact scripts-computational propaganda-on public life. Data Memos are designed to present quick snapshots of analysis on current events in a short format. They reflect methodological experience and considered analysis, but have not been peer-reviewed. international, automated of Council, Research Working Papers present deeper analysis and extended arguments that have been collegially reviewed and that engage with public issues. The Project's articles, book chapters and books are significant manuscripts that have been through peer review and formally published. ACKNOWLEDGMENTS AND DISCLOSURES The authors gratefully acknowledge the support of the European "Computational Propaganda: Investigating the Impact of Algorithms and Bots on Political Discourse in Europe," Proposal 648311, 2015-2020, Philip N. Howard, Principal Investigator. Project activities were approved by the University of Oxford's Research Ethics Committee. The project gratefully thanks the Ford Foundation for their support. Any or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the University of Oxford or the European Research Council. REFERENCES 1. Gallacher, J., Kaminska, M., Kollanyi, B., Yasseri, T. & Howard, P. N. Social Media and News Sources during the 2017 UK General Election. (2017). conclusions opinions, findings, 2. Forelle, M., Howard, P., Monroy-Hernández, A. & Savage, S. Political Bots and the Manipulation of Public Opinion in Venezuela. ArXiv150707109 Phys. (2015). and 5 3. Parkinson, H. J. Click and elect: how fake news helped Donald Trump win a real election. The Guardian (2016). 4. Read, M. Donald Trump Won Because of Facebook. New York Magazine (2016). 5. Dewey, C. Facebook Fake-News Writer: 'I Think Donald Trump is in the White House Because of Me'. The Washington Post (2016). 6. World Economic Forum. 10. The Rapid Spread of the Global Misinformation Online. Outlook on Agenda 2014 (2014). 7. Vicario, M. D. et al. The Spreading of Misinformation Online. Proc. Natl. Acad. Sci. 113, 554–559 (2016). 8. Kümpel, A. S., Karnowski, V. & Keyling, T. News Sharing in Social Media: A Review of Current Research on News Sharing Users, Content, and Networks. Soc. Media Soc. 1, 2056305115610141 (2015). 9. Howard, P. N. Digitizing the social contract: Producing American political culture in the age of new media. Commun. Rev. 6, 213–245 (2003). 10. Morstatter, F., Pfeffer, J., Liu, H. & Carley, K. M. Is the Sample Good Enough? Comparing Data from Twitter's Streaming API with Twitter's Firehose. ArXiv13065204 Phys. (2013). 11. Howard, P. N., Bolsover, G., Kollanyi, B., Bradshaw, S. & Neudert, L.-M. Junk News and Bots during the U.S. Election: What Were Michigan Voters Sharing Over Twitter? (2017). 12. Sloan, L. & Morgan, J. Who Tweets with Their Location? Understanding the Relationship between Demographic Characteristics and the Use of Geoservices and Geotagging on Twitter. PLOS ONE 10, e0142209 (2015). 13. Ajao, O., Hong, J. & Liu, W. A survey of location inference techniques on Twitter. J. Inf. Sci. 41, 855– 864 (2015). 14. Huang, B. & Carley, K. M. On Predicting Geolocation of Tweets using Convolutional Neural Networks. ArXiv170405146 Cs (2017). 15. Kollanyi, B., Howard, P. N. & Woolley, S. C. Bots and Automation over Twitter during the First U.S. Presidential Debate. 4 (Project on Computational Propaganda, 2016). 16. Kollanyi, B., Howard, P. N. & Woolley, S. C. Bots and Automation over Twitter during the Second U.S. Presidential Debate. 4 (Project on Computational Propaganda, 2016). 17. Kollanyi, B., Howard, P. N. & Woolley, S. C. Bots and Automation over Twitter during the Third U.S. Presidential Debate. 4 (Project on Computational Propaganda, 2016). 18. Howard, P., Kollanyi, B. & Woolley, S. Bots and Automation over Twitter during the U.S. Election. Oxf. UK Proj. Comput. Propag. (2016). 19. NCC Staff. A recent voting history of the 15 Battleground states - National Constitution Center. National Constitution Center – constitutioncenter.org Available at: https://constitutioncenter.org/blog/voting-history-of- the-15-battleground-states. September 2017) (Accessed: 22nd 6
1706.02324
1
1706
2017-06-07T18:17:38
Efficient method for estimating the number of communities in a network
[ "cs.SI", "physics.soc-ph" ]
While there exist a wide range of effective methods for community detection in networks, most of them require one to know in advance how many communities one is looking for. Here we present a method for estimating the number of communities in a network using a combination of Bayesian inference with a novel prior and an efficient Monte Carlo sampling scheme. We test the method extensively on both real and computer-generated networks, showing that it performs accurately and consistently, even in cases where groups are widely varying in size or structure.
cs.SI
cs
Efficient method for estimating the number of communities in a network Maria A. Riolo,1 George T. Cantwell,2 Gesine Reinert,3 and M. E. J. Newman1, 2 1Center for the Study of Complex Systems, University of Michigan, Ann Arbor, Michigan, USA 2Department of Physics, University of Michigan, Ann Arbor, Michigan, USA 3Department of Statistics, University of Oxford, 24–29 St. Giles, Oxford, UK While there exist a wide range of effective methods for community detection in networks, most of them require one to know in advance how many communities one is looking for. Here we present a method for estimating the number of communities in a network using a combination of Bayesian inference with a novel prior and an efficient Monte Carlo sampling scheme. We test the method extensively on both real and computer-generated networks, showing that it performs accurately and consistently, even in cases where groups are widely varying in size or structure. 7 1 0 2 n u J 7 ] I S . s c [ 1 v 4 2 3 2 0 . 6 0 7 1 : v i X r a I. INTRODUCTION Many networks of interest in the sciences display com- munity structure, meaning that their nodes divide nat- urally into clusters, modules, or groups, such that there are many network connections within groups but few be- tween groups [1–3]. The decomposition of networks into their constituent communities is one of the primary tools used for interpreting the structure of large networked sys- tems, allowing us to break data sets apart into manage- able pieces and hence make sense of systems that can otherwise defy analysis. Community detection-the process of identifying good community divisions of a given network-has been the subject of a vigorous research effort in the last 15 years or so, and many different approaches have been proposed. A fundamental shortcoming of most of them, however, is that they require us to know in advance how many communities a network contains. We don't usually know this number a priori, meaning we need some way to es- timate it from the data. Recently, a number of authors, including ourselves, have proposed methods for making such estimates using Bayesian inference applied to fits of network models to observed network data [4–12]. In these approaches, one defines a generative random-graph model of a network with community structure, then fits it to the data to obtain a Bayesian posterior probabil- ity distribution over possible divisions of the network into groups, along with the associated number of groups, which we denote k. Then one averages over this distri- bution in some way to produce an estimate of the rela- tive probability of different values of k for the network in question. In this paper, which builds on our previous work in [10], we do a number of things. First, we give a detailed derivation of a practical method for computing the number of groups or communities in real-world net- work data. Many of the previous approaches have de- veloped useful formal ideas, but not practical algorithms for real data, because they are based on unrealistic net- work models-most often the so-called stochastic block model, which is known to be a poor model for calcula- tions of this kind [13]. In this paper we employ a more so- phisticated model, the degree-corrected stochastic block model, which gives substantially superior results. Second, we look carefully at the prior probability dis- tribution over divisions of a network into groups, and particularly at generative processes for priors with non- empty groups. As in many Bayesian approaches, the choice of prior turns out to be crucial to performing use- ful inference, and in particular we point out that various types of uniform (maximum-entropy) priors, including ones used in previous work, give poor results and should be avoided. We propose a new prior based on a queueing- type process that appears to give excellent results in our tests. Third, we describe an efficient Monte Carlo algorithm that exploits specific features of our proposed prior to perform rapid calculations on large networks. Finally, we give the results of extensive tests of our method on both real and synthetic benchmark networks, which indicate that the method is able to consistently re- cover known values for the number of communities under real-world conditions. II. DEGREE-CORRECTED STOCHASTIC BLOCK MODEL The method we propose for estimating the number of communities in a network is based on techniques of statis- tical inference, in which observed network data are fitted to a generative model of network structure. The param- eters of the fit tell us about the aggregate properties of the data in much the same way that the fit of a straight line through a set of data points can tell us about their slope. The network model we employ in our calculations is the degree-corrected stochastic block model [13]. The tra- ditional (non-degree-corrected) stochastic block model, first proposed in the 1980s [14], is a simple model for networks with community structure that has been widely studied in the statistics, sociology, and physics literature. Recently, however, it has been recognized that this model has serious shortcomings [13] because the networks it generates have a Poisson degree distribution within each community, making them very unlike most empirically observed networks, which typically have highly right- skewed degree distributions. In practice, this means that the model is often unable to fit observed network data well for any choice of parameter values. The degree- corrected stochastic block model remedies this problem by introducing additional mechanisms that allow for ar- bitrary, non-Poisson degree distributions and is found in practice to give much better fits to real-world network data. In the degree-correct stochastic block model n nodes are divided into some number k of groups, labeled 1 . . . k, with gi denoting the group to which node i is assigned. Then edges are placed between nodes with probabilities that depend on group membership. There are several variants of the model in use that employ slightly different strategies for placing edges, but the most common strat- egy, and the one we use here, is to place between any node pair i, j a number aij of edges that is Poisson dis- tributed with mean θiθjωgigj , where {θi} and {ωrs} are sets of parameters whose values we choose. The numbers of edges aij form the elements of the adjacency matrix A of the network, the standard mathematical representa- tion of network structure. Although these numbers are Poisson distributed, the expected degrees of the nodes can follow any distribution-within each group they are proportional to the values of the parameters θi, which we are at liberty to choose in any way we please. The use of a Poisson distribution for the numbers of edges means that the network generated can in theory have multiedges, i.e., pairs of nodes connected by more than one edge, which is not usually realistic-most real- world networks do not have multiedges. Most networks of scientific interest, however, are very sparse, meaning that the values of θiθjωgigj are very small and the proba- bility of having two edges between the same pair of nodes is smaller still. Multiedges are, as a result, few enough in number that they can usually be neglected. One also normally allows self-edges in the network (edges that con- nect a node to itself), placing at each node i a Poisson dis- tributed number of self-edges with mean 1 i ωgigi . Again this is not realistic but in practice the number of self- edges is small, so they can be neglected. (By convention, the number of self-edges at node i is denoted 1 2 aii and not aii, i.e., aii is twice the number of self-edges. The factor of 1 is in- cluded for consistency with this definition-it makes the expected value of aij equal to θiθjωgigj for all i, j.) 2 in the number of self-edges 1 i ωgigi 2 θ2 2 θ2 The description above does not completely specify the degree-corrected block model because there remains an arbitrary normalization of the parameters θi that has yet to be fixed. We can increase the values of all the θi in group r by any factor we please and, provided we simul- taneously decrease ωrs by the same factor, the value of θiθjωgigj , and hence also the model itself, will not change. We can fix the values of the parameters by choosing a spe- cific normalization for the θi. A number of choices are possible, all of which are ultimately equivalent, but for our purposes here a convenient choice is to fix the mean of the θi to be 1 in each group: 1 nr n Xi=1 θiδr,gi = 1, 2 (1) number of nodes in group r. where δij is the Kronecker delta and nr =Pi δr,gi is the For the case of given number of group k and group as- signments g this completes the specification of the model. With the model specified we can now write down the probability that any particular network with adjacency matrix A = {aij} is generated: P (Aω, θ, g, k) =Yi<j(cid:0)θiθjωgigj(cid:1)aij e−θiθj ωgi gj 2 θ2 ×Yi (cid:0) 1 i ωgigi(cid:1)aii/2 e−θ2 i ωgi gi /2 rr e−n2 ωmrr rωrr /2, (2) =Yi θdi i Yr<s ωmrs rs e−nrnsωrsYr where we have made use of Eq. (1) in the second equality, di =Pj aij is the observed degree of node i, and when r 6= s, when r = s, (3) mrs =(Pij aijδgi,rδgj ,s 2Pij aijδgi,rδgj ,r 1 is the number of edges running between groups r and s. We have also discarded an overall multiplying constant in Eq. (2), which has no effect on our results. The parameters θ and ω are irrelevant to the questions we are interested in and can be integrated out. To do this we need to fix the prior probabilities on the parameters θ and ω. We assume the priors to be independent (condi- tioned on g, k), so that P (ω, θg, k) = P (ωk)P (θg, k), and P (Ag, k) =ZZ P (Aω, θ, g, k)P (θg, k)P (ωk) dθ dω. (4) We employ maximum-entropy (i.e., least informative) priors on both θ and ω. For θ this means a uniform prior over the regular simplex of values specified by Eq. (1). For ω the situation is more complex. We note that the expected number of edges between groups r and s is Xij θiθjωgigj δr,giδs,gj = ωrsXi θiδr,giXj = ωrsnrns, θjδs,gj (5) where we have made use of (1) again. But the total number of places one can place an edge between groups r and s is nrns, which means that the average probability of an edge is simply ωrs. As mentioned above, most of the networks we look at in practice are very sparse-the average probability of an edge is much less than one. For this reason a uniform prior on ωrs is not appropriate. Rather, we need a prior that favors values of ωrs in the vicinity of the average probability of an edge in the network as a whole, which is p = 2m/n2, where m is the total number of edges in the network. Here, as previously [10], we use a maximum- entropy prior conditioned on fixing the expected value of ωrs to be equal to p, which yields the exponential distribution P (ω) = (1/p)e−ω/p. With these choices of priors on θ and ω, the integrals in Eq. (4) can be completed and we get P (Ag, k) =Yr ×Yr<s nκr r (nr − 1)! (nr + κr − 1)! mrs! (pnrns + 1)mrs+1 Yr where diδr,gi κr =Xi mrr! r + 1)mrr+1 ( 1 2 pn2 , (6) (7) is the sum of the degrees of the nodes in group r, and we have again discarded an overall multiplying constant. III. PRIOR ON GROUP ASSIGNMENTS Our goal is to use this model as the basis for a Bayesian model selection procedure to estimate the correct value of k for a given network. To do this, we need to specify a prior on the group assignments, meaning a joint prob- ability distribution P (g, k) on the group labels and the number of groups. This then allows us to write P (g, kA) = P (g, k)P (Ag, k) P (A) , (8) where P (Ag, k) is given by Eq. (6). Given this distri- bution, we can either sum over k to get the posterior distribution on g, which allows us to do community de- tection, or sum over g to get the posterior distribution on k, which allows us to choose a value for k. It is the lat- ter computation that is our primary focus in this paper. In practice, we cannot perform the sum over g exactly, but we can approximate it using Markov chain Monte Carlo. As is often the case with Bayesian methods, the tricky part of the calculation (or one of the tricky parts) is choosing the prior P (g, k). It turns out that in the present case this choice can have a substantial impact on the results, making the difference between a method that works well in most cases and a method that does not. Moreover, some obvious choices of prior, including ones in common use elsewhere in the literature, result in methods that work poorly, so it is not a matter of simply grabbing a well-understood prior off the shelf. A. Dirichlet prior 3 Suppose for the moment that the number of groups k is known and let us then ask what the prior P (gk) on group assignments should be. (This is not a very realistic as- sumption, since our whole purpose here is to estimate k, but the exercise is nonetheless instructive as we will see.) Our first guess at P (gk) might be to choose a flat prob- ability distribution: all assignments g are equally likely, or equivalently every node is equally likely to be in each of the k groups. This approach is used, for example, in [15], but, as pointed out by Peixoto [12], it is unlikely to give good results. If nodes are distributed with equal probability among the groups then when n is large (as it usually is) the sizes of the groups will be sharply peaked around n/k. Any state with group sizes significantly dif- ferent from n/k will occur rarely. This is strongly at odds with the observed situation in real-world networks, where we commonly encounter heterogeneous group sizes. An alternative approach, therefore, and the one that is most commonly adopted in the literature, is to assume a uniform distribution not over assignments g but over the sizes of the groups nr. That is, all possible sets of sizes are equally likely, subject only to the constraint that The standard way to achieve this is to specify the ex- pected fraction γr ∈ [0, 1] of the network occupied by they sum to the size of the whole network: Pr nr = n. each group r, such that Pr γr = 1, then assign nodes to groups independently at random, with probability γr of being assigned to group r. If the γr are themselves drawn from a uniform distribution, this makes the distribution of the sizes of the groups uniform. (It is obvious that this makes the expected sizes of the groups uniform, since the expected sizes are proportional to γr, but it is not entirely obvious that the sizes themselves are also uniform. How- ever, the results given in Section III B provide a proof that they are.) The probability of generating a particular group as- signment g using this process is P (gγ, k) = γgi = n Yi=1 γnr r . k Yr=1 (9) Since Pr γr = 1, the points defined by the values γr fall on a regular (k − 1)-dimensional simplex, which has volume 1/(k − 1)!. So a uniform distribution over val- ues of γ has probability density P (γk) = (k − 1)! and integrating (9) over the simplex then gives [8–10] P (gk) =Z P (gγ, k)P (γk) dγ = (k − 1)! (n + k − 1)! (10) The uniform distribution over values of γ is a special case of the so-called Dirichlet prior, a general prior on a simplex that includes this choice but also includes a spectrum of non-uniform choices as well. nr! k Yr=1 B. Non-parametric prior The derivation in the previous section is a standard one, but in a sense it is needlessly complicated. If our goal is simply to choose group sizes such that all choices are equally likely then assign nodes to those groups at random, why not just do so directly, without introducing other parameters? There are (cid:0)n+k−1 k groups such that their sizes sum to n. Let us choose uniformly among these, then the number of ways of plac- ing the nodes in the groups is given by the multinomial k−1 (cid:1) possible choices of coefficient n!/Qr nr!, so the probability of any given as- signment g of nodes to groups is P (gk) = 1 (cid:0)n+k−1 k−1 (cid:1) n!/Qr nr! = (k − 1)! (n + k − 1)! nr! k Yr=1 (11) which recovers Eq. (10) without the need for the param- eters γr. (A corollary of this result is that the Dirichlet process of Section III A does indeed generate a uniform distri- bution over possible group sizes, as claimed, since the distributions (10) and (11) are identical.) C. Non-empty groups A possible objection to these methods for generating assignments g (widely used though they are) is that they allow groups to be empty. It is unclear what the meaning is of an empty group. If someone were to hand you a network with two clear groups in it, then tell you that really there are three groups but one of them is empty, you might justifiably say that this is not a meaningful statement. One advantage of the non-parametric formulation of Section III B is that generalizes easily to the case where groups are required to be non-empty. One need simply replace the binomial coefficient for the number of ways of generating the group sizes with the corresponding co- efficient for non-empty groups, which is (cid:0)n−1 k−1(cid:1). Then 1 P (gk) = . (12) (cid:0)n−1 k−1(cid:1) n!/Qr nr! D. Choice of the number of groups We turn now to the choice of prior P (k) on the number of groups itself. Again one's first guess at a prior might be a flat distribution with all choices equally likely. For non-empty groups as in Section III C, the possible choices for number of groups range from 1 to n, so a flat prior would have P (k) = 1/n in this range and zero for all other values of k. This choice has been made in some previ- ous work [9], but we find it to give poor results, placing too much weight on high values of k and significantly 4 overestimating the number of groups in well-understood test cases. In practice one must use a strongly decreasing prior on k to achieve consistent results. Previous authors have given qualitative arguments in favor of a prior going as 1/k! [8] or even steeper [16]. In this paper we take a somewhat different approach and do away with an explicit prior on k, instead employ- ing a generative process for group assignments g that automatically incorporates the choice of the number of groups in a simple way. The process we use, a queueing- type mechanism which is a variant on the "restaurant" processes of traditional probability theory, is as follows. Take the n nodes in random order and place the first one in group 1. Then for each subsequent node either (a) with probability 1 − q place it in the same group as the previous node or (b) with probability q make it the first node in the next group. Note that this process never gen- erates an empty group. All groups contain at least one node. The number of possible orders of the nodes in this pro- cess is n!, with each one occurring with equal probabil- ity 1/n!. If the process generates k groups in total then there must be k − 1 new groups started and, since every node except the first has equal chance q of starting a new group, the probability of generating k groups with sizes n1 . . . nk is (1−q)n1−1q(1−q)n2−1q . . . q(1−q)nk−1 = qk−1(1−q)n−k, (13) where we have made use of the fact thatPr nr = n. Fur- thermore, there areQr nr! ways of rearranging the nodes within each group that give rise to the same assignment g. Hence the probability of generating any given assignment under our proposed process is P (g, k) = 1 n! qk−1(1 − q)n−k nr! (14) k Yr=1 Given that P (g, k) = P (k)P (gk) and comparing with Eq. (12), we see that this process is equivalent to the process of Section III C if one chooses a prior P (k) on the number of groups thus: P (k) = P (g, k) P (gk) =(cid:18)n − 1 k − 1(cid:19)qk−1(1 − q)n−k, (15) with 1 ≤ k ≤ n. In other words, the number of new groups k − 1 created in the generating process has a bino- mial distribution (as one can easily derive by considering the process directly). For our purposes it will be convenient to parametrize the probability q by q = µ/(n − 1), so that µ is the ex- pected number of new groups started during the assign- ment process, which is one less than the total number of groups. Then P (g, k) = (1 − q)n µk qn! (n − µ − 1)k nr! (16) k Yr=1 The leading factor of (1 − q)n/qn! is independent of both g and k and will cancel out of subsequent calculations. 5 E. Choice of parameter value Our prior on g, k now has just one parameter µ, whose value we have yet to choose. One way to proceed is to take the Bayesian approach a step further and place a prior on the prior-a so-called hyperprior, meaning a probability distribution on µ. In principle one could go even further and place a hyperhyperprior on the hyper- prior too, and so forth ad infinitum. This process usually yields diminishing returns, however, and one normally stops at some point, simply fixing a value for the param- eters. In the present case, we choose to halt the process at the level of the parameter µ. In our tests we have found that a value µ = 1 works well, so that, neglecting constants • Type 2: Moving a single node to a newly created group, thereby increasing the value of k by one. A sufficient condition for a correct Monte Carlo algo- rithm is that the algorithm satisfy the requirements of ergodicity and detailed balance [17]. The requirement of ergodicity says that every state of the system must be accessible from every other by a finite sequence of Monte Carlo steps. It is trivial to show that this condition can be satisfied by steps of the kind described above that move individual nodes from one group to another. More demanding is the requirement of detailed bal- ance, which in the present situation says that the rate R(g, k → g ′, k′) to go from a state (g, k) to another state (g ′, k′) and the rate R(g ′, k′ → g, k) to go back again must satisfy P (g, k) = (n − 2)−k nr! k Yr=1 (17) R(g, k → g ′, k′) R(g ′, k′ → g, k) = P (g ′, k′A) P (g, kA) = P (g ′, k′) P (g, k) × P (Ag ′, k′) P (Ag, k) , where we have used Eq. (8). From Eq. (17) we have (19) although other values around 1 give basically the same results, so the method does not seem sensitive to the precise choice we make. No doubt a hyperprior centered roughly around 1, such as a suitably sized normal distri- bution, would also give similar results, but we don't see any advantage to taking this approach. It is interesting to note that when q = µ/(n − 1) with µ = 1, and taking the limit of large n, the prior on k, Eq. (15), becomes P (k) = e−1 (k − 1)! . (18) In other words, this choice is essentially equivalent to the 1/k! prior proposed previously on heuristic grounds [8]. IV. MONTE CARLO ALGORITHM Given the prior, Eq. (17), on g, k, we can now write down the complete posterior distribution (8) on the same quantities. Then by summing over all values of g we can find the probability distribution P (kA) and hence de- duce the most likely value of k. Unfortunately the sum it has kn terms, which is a very over g is hard to do: large number in most cases, making exhaustive numeri- cal evaluation impossible, and no simple scheme presents itself for performing the sum analytically. Instead there- fore we estimate the distribution over k by Markov chain Monte Carlo sampling. The Monte Carlo scheme we propose employs steps of two types: • Type 1: Moving a single node from group to group. This type of move includes processes that decrease the number of groups (if the node moved is the last of its group) and processes that keep the number of groups constant (if the node moved is not the last of its group). P (g ′, k′) P (g, k) = (n − 2)k−k′Qk′ Qk r=1 n′ r! r=1 nr! , (20) where n′ ment g ′. r are the sizes of the groups for group assign- We use a traditional accept/reject Monte Carlo scheme in which we repeatedly propose a potential move then ei- ther accept or reject that move with probabilities chosen to satisfy the detailed balance condition. Thus the rate R(g, k → g ′, k′) divides into the product of the proba- bility π of proposing the move in question and the prob- ability α of accepting it: R(g, k → g ′, k′) = π(g, k → g ′, k′) α(g, k → g ′, k′). Then R(g, k → g ′, k′) R(g ′, k′ → g, k) = π(g, k → g ′, k′) π(g ′, k′ → g, k) × α(g, k → g ′, k′) α(g ′, k′ → g, k) . (21) The algorithm we propose is as follows: 1. (a) On each step of the algorithm, with probabil- ity 1 − 1/(n − 1) we propose a move of type 1. Specifically, if k = 1 we do nothing (because there are no possible moves that move a node from one group to another). Otherwise, when k > 1, we choose a pair of distinct group la- bels r, s uniformly at random from the set of all such pairs in the range 1 . . . k, then choose a single node uniformly at random from group r and move it to group s. (b) If, in the process, we remove the last remain- ing node from group r, leaving that group empty, we relabel the non-empty groups so that their labels run from 1 . . . k−1, and we de- crease k by one. In practice, the most efficient way to do the relabeling is just to change the current group k to have label r (unless r = k, in which case no relabeling is necessary). 2. (a) Otherwise, with probability 1/(n − 1) we pro- pose a move of type 2. Specifically, we choose a pair of distinct group labels r, s uniformly at random from the set of all such pairs in the range 1 . . . k+1, relabel group r as group k+1, and create a new empty group r (unless r = k + 1, in which case we simply create a new empty group k + 1 and no relabeling is nec- essary). Then we choose a node uniformly at random from group s and move it to the newly created group r. (b) If, in the process, we remove the last remain- ing node from group s, leaving that group empty, we change group k + 1 to have label s. Otherwise we increase k by 1. (Note that k can never become greater than n during this process, since doing so would always involve removing the last node from group s, which precludes increasing k any further.) 3. Once we have proposed our move from state (g, k) to state (g ′, k′), we accept it with acceptance prob- ability α(g, k → g ′, k′) = min(cid:18)1, P (Ag ′, k′) P (Ag, k) (cid:19). (22) If the move is accepted, g ′, k′ becomes the new state of the system. Otherwise the system remains in the old state g, k. Note, crucially, that the probabilities appearing on the right-hand side of (22) are of the form P (Ag, k), and not P (g, kA) as you might ex- pect if you are familiar with standard (Metropolis– Hastings) Monte Carlo methods. 4. Repeat from step 1. To see that that this algorithm does indeed satisfy the condition of detailed balance, Eq. (19), consider first a move of type 1 that moves a node from group r to group s, where nr > 1 so that the node moved is not the last node in group r and the value of k does not change. Thus k′ = k and Eq. (20) simplifies to P (g ′, k′) P (g, k) = n′ t! nt! = n′ s nr , k Yt=1 (23) with the terms for all groups other than r and s can- celing. Moves of type 1 are performed with probability 1 − 1/(n − 1), there are k(k − 1) possible choices of dis- tinct groups r, s, and nr nodes to choose from in group r, so the total probability of proposing a specific move of a specific node is 6 Similarly, the probability of proposing the reverse move, in which the same node is moved from group s to group r, is π(g ′, k′ → g, k) = n − 2 (n − 1)k(k − 1)n′ s . (25) And the ratio of the two is π(g, k → g ′, k′) π(g ′, k′ → g, k) = = n − 2 (n − 1)k(k − 1)nr n′ s nr , × (n − 1)k(k − 1)n′ s n − 2 (26) which is precisely equal to Eq. (23). We can also demonstrate an equivalent result for moves that change the value of k. Consider a move of type 1 that removes the last node from group r and moves it to group s, thereby reducing the number of groups by 1, so that k′ = k − 1. For such a move, Eq. (20) becomes P (g ′, k′) P (g, k) = (n − 2)n′ s. (27) The probability of proposing such a move is again given by Eq. (24), except that in this case nr = 1, so the ex- pression simplifies to π(g, k → g ′, k′) = n − 2 (n − 1)k(k − 1) . (28) The reverse of such a move is a move of type 2, in which a node in group s becomes the founding member of new group r. Moves of type 2 are performed with probabil- ity 1/(n−1), there are (k′ +1)k′ = k(k−1) ways of choos- ing the labels r, s, and n′ s ways of choosing the node to be moved. Thus the total probability of proposing such a move is π(g ′, k′ → g, k) = 1 (n − 1)k(k − 1)n′ s . (29) Taking the ratio of (28) and (29), we get π(g, k → g ′, k′) π(g ′, k′ → g, k) = n − 2 (n − 1)k(k − 1) × (n − 1)k(k − 1)n′ s = (n − 2)n′ s, (30) which is equal to (27). Finally, there is one further class of moves that have to be considered separately, namely moves of type 2 that remove the last node from group s and make it the initial node in a new group r. By contrast with other moves of type 2, these moves do not change the value of k. Moreover they don't change the product Qr nr! either, so Eq. (20) is simply P (g ′, k′) P (g, k) = 1. (31) π(g, k → g ′, k′) =(cid:18)1 − 1 n − 1(cid:19) × n − 2 1 k(k − 1) × 1 nr = (n − 1)k(k − 1)nr . (24) At the same time, the probability of proposing such a move is the same in both directions, equal to 1/[(n − 1)k(k + 1)], and hence the ratio of the forward and back- ward proposal probabilities is 1, which is equal to (31). Thus for all moves of all types we have π(g, k → g ′, k′) π(g ′, k′ → g, k) = P (g ′, k′) P (g, k) . (32) Equating Eqs. (19) and (21) and making use of (32), we then find that the detailed balance condition becomes α(g, k → g ′, k′) α(g ′, k′ → g, k) = P (Ag ′, k′) P (Ag, k) . (33) If we can choose the acceptance ratios to satisfy this re- lation, then Eq. (19) will be obeyed. But the choice in Eq. (22) trivially satisfies (33), hence detailed balance is obeyed and the proposed algorithm will sample correctly from the distribution P (g, kA). A. Implementation Implementation is a relatively straightforward trans- lation of the algorithm described above into computer code. We maintain not only a record of the group assign- ment gi of each node but also a separate, unordered list of the members of each group, which allows us to choose a random member of a group rapidly, and to efficiently relabel all members of a group when required. We cal- culate the logarithm of the ratio P (Ag ′, k′)/P (Ag, k), rather than the ratio itself, to avoid numerical problems with powers and factorials (which can become large) and only take the exponential at the end to determine the acceptance ratio, Eq. (22). We also employ a look-up table of log-factorials to speed their calculation, and a running record of the nr and mrs, updated after every accepted move, so as to avoid recalculating these values repeatedly. As a practical matter, the relabeling process for moves of type 2 can be slow if group r contains many nodes, so in our implementation we always give new groups la- bel k + 1, which frees us from having to relabel any nodes other than the one node that is placed in the newly cre- ated group. Technically, this means that our Monte Carlo algorithm does not sample labelings g with the true prob- ability of Eq. (17): group k will typically be the newest group and therefore smaller on average than the others. However, the algorithm does still sample divisions of the network into groups and values of k with the correct prob- ability, and these are the only physical quantities we care about. The group labels themselves have no meaning- they exist only as a mathematical convenience for the purposes of notation. The only meaningful quantities are the value of k and the division into groups, and these are correctly generated. (And if one were concerned to sam- ple labelings g correctly, one could do so easily by taking the labelings generated by the algorithm and randomly permuting the labels.) 7 The initial assignment of nodes to groups is drawn at random from the prior distribution defined in Sec- tion III D. In order to avoid any bias in the results, in- stead of just setting µ = 1 we use a value of µ that is itself chosen randomly. In the example calculations presented in Section V, the value of µ for the initial assignment is chosen uniformly in the interval from 0 to 100, meaning in practice the initial number of groups lies approximately uniformly in this range. (In the actual Monte Carlo cal- culation, however, we always use µ = 1, as described in Section III E.) Our code is implemented in C, and performs about a million Monte Carlo steps per second on a typical desktop computer (circa 2017), which puts the analysis of large networks, up to hundreds of thousands of nodes or more, within reach. Our code is available for download on the web-see Ref. [18]. B. Relation to previous approaches In a previous paper [10] we proposed a slightly different algorithm for determining the number of communities, based on the same principles used here but different in detail. We expect the present algorithm to be more effi- cient than the earlier one, primarily because of the way it incorporates the prior on group assignments P (g, k) into the proposal probability π rather than the acceptance probability α. However, we also believe the derivation given here is more appropriate than that given in the pre- vious paper, particularly in its focus on the prior P (g, k) on group assignments. The argument given in the previous paper differs from that given here in two ways. First, in the previous paper we advocated using a flat prior P (k) on the number of groups, whereas in this paper we argue for a decreasing prior going as 1/k!. On the other hand, the probabil- ity P (gk) given in the previous paper omits a factor of k!, equal to the number of ways the labels on a given par- tition of the network can be permuted without changing the partition. These two factors of k! cancel, leaving the equations essentially unchanged. Thus the formulas and algorithm given in the previous paper are essentially equivalent to those given here, but the motivation differs, with the arguments given here being, in our opinion, the correct ones. V. EXAMPLE APPLICATIONS In this section we apply our method to a wide range of networks and find it to give good results in most cases. To evaluate performance under controlled conditions, we test the method on several large sets of computer- generated networks, created using both the stochastic block model and the widely used LFR benchmark. To test the method under real-world conditions we have also applied it to a range of observed networks, including a number of staples of the community detection canon, as well as a large example network with over 300 000 nodes. A. Computer-generated networks In order to explore the performance of our method sys- tematically we have tested it on a range of computer- generate ("synthetic") networks. These are networks with known community structure planted within them, generated using random graph models. Using synthetic networks allows us to vary the number of planted com- munities and quantify the extent to which our algorithm is able to correctly recover that number. In our first set of tests, we use networks generated us- ing the standard (non-degree-corrected) stochastic block model [13, 14]. Figures 1a and 1b show results for two different sets of networks. Each panel shows the number of communities k inferred by our method plotted against the known number planted in the network as the latter is varied (blue circles in the plots). In Fig. 1a the size of the network is held fixed as the number of communities in increased, while in Fig. 1b the size of the communities is held fixed, so that the size of the network increases with the number of communities. As the figures show, in both cases the algorithm infers the correct number of communities with high accuracy for values of k up to about 20. For higher values it has a tendency to underestimate the number of communities. These calculations, however, are for runs of the Monte Carlo algorithm that start with a random assignment of nodes to groups, as described in Section IV A. Also shown in the figures are the re- sults of runs on the same networks in which the Monte Carlo algorithm was started with group assignments cor- responding exactly to the planted ground-truth commu- nity division (red triangles). As the figures show, for this choice of initialization the algorithm finds the cor- rect number of communities for the entire range of values of k explored. These results suggest that the underesti- mation of k arises not because the correct group assign- ment fails to maximize the posterior probability P (kA), but rather because the Monte Carlo algorithm has not run for long enough to find the maximum. That is, the method is theoretically sound but the numerical calcu- lation becomes too demanding as k becomes large. Pos- sibly this problem could be solved with a more efficient Monte Carlo sampling scheme, although it seems likely that some similar issue will eventually arise no matter what sampling scheme is used. The fundamental prob- lem is that the number of possible group assignments kn increases very rapidly with k, so it becomes unfeasible to explore the space of assignments effectively when k is very large. On the other hand, since, as Figs. 1a and 1b show, the method only underestimates the value of k and does not overestimate, the algorithm gives a lower bound on the number of communities in the network, which may well have some utility even when the exact value 8 of k is not found. Note that the fact that the algorithm underestimates k does not appear to be a result of the initial conditions. As described in Section IV A, the algo- rithm starts with an initial number of groups anywhere up to 100, so the initial conditions are at least as likely to overestimate k as underestimate. It seems likely, there- fore, that the underestimates we see in the final results are a consequence of the Monte Carlo sampling method and not of the initial conditions. The examples in Fig. 1a and 1b assume so-called as- sortative network structure, meaning that there are more in-group edges than between-group edges in the network. Our method, however, should in principle be just as good at finding the number of communities in disassortative cases, where there are more between-group edges, or in mixed assortative/disassortative cases. Figure 1c shows results from tests on networks of mixed type, generated again using a stochastic block model but now taking a diagonally dominant matrix of edge probabilities and per- muting the rows and columns to move some of the large matrix entries off the diagonal. As the figure shows, the algorithm does indeed perform well in this case, indeed it appears to perform better than in the purely assortative case of Figs. 1a and 1b. A possible explanation is that in the purely assortative case one can (erroneously) join together groups and produce another assortative network with strong community structure, but in a disassortative or mixed case joining groups is not guaranteed to produce another network with strong structure. The parameter values used in each of these examples mean that the networks generated have quite prominent community structure-the number of communities varies from network to network but all have strong structure that should be relatively straightforward to detect. It is interesting to ask how the method fares if we make the structure weaker. Figure 2 shows the results of a set of tests on networks with varying difference between the number of in-group and between-group connections. The horizontal axis is normalized to place the so-called detectability threshold at ±1. This is the point at which communities become formally undetectable in the net- work because the structure is too weak [20–22]. As the figure shows, our method gets the value of k correct vir- tually all of the time outside of the undetectable region (marked by the vertical dashed lines in the figure), except again for assortative networks with very large numbers of communities (such as the right-hand portion of the curve for k = 32). Widely used though it is, one could argue that the stochastic block model is not a very realistic model. The networks it generates have Poisson degree distributions within each community, for instance, and in the cases studied here we have also limited ourselves to commu- nities of uniform size. An alternative model that avoids these limitations is the LFR benchmark model of Lan- cichinetti, Fortunato, and Radicchi [19]. This model is essentially a special case of the degree-corrected stochas- tic block model of Section II, with both the degrees and k d e t a m i t s E k d e t a m i t s E 4 0 3 0 2 0 1 0 1 1 4 0 3 0 2 0 1 0 1 1 1 0 2 0 3 0 4 0 Tr ue k 1 0 2 0 3 0 4 0 Tr ue k 9 k d e t a m i t s E k d e t a m i t s E 4 0 3 0 2 0 1 0 1 1 4 0 3 0 2 0 1 0 1 1 1 0 2 0 3 0 4 0 Tr ue k 1 0 2 0 3 0 4 0 Tr ue k FIG. 1: Tests of the method on synthetic networks. In each panel, circles represent results derived from Monte Carlo runs with random initial assignment of nodes to group ("random initial conditions"), while triangles represent runs started with the known correct assignments ("ground truth initial conditions"). (a) Networks generated using the stochastic block model with n = 1000 nodes, mean degree 30, and equally sized groups with 90% of connections with groups and 10% between groups. (b) Networks generated using the stochastic block model with groups of fixed size 250 nodes (so that network size varies with the number of groups k), and each node having an average of 16 in-group connections and 8 out-group connections. (c) Networks generated using the same stochastic block model as in (a) but with the rows and columns of the matrix of edge probabilities permuted to produce a mixed assortative/disassortative structure. (d) Networks generated using the LFR benchmark model of [19], which is parametrized by it maximum and minimum group sizes. In these tests we used minimum groups sizes between 10 and 80 nodes, and maximum group size equal to five times the minimum. Ten Monte Carlo runs were performed for each network of 2000 steps per node each, with the distribution over k being calculated from the final 1000 only. the sizes of the communities drawn from power-law dis- tributions, giving the networks similar features to those seen in many real-world examples. Figure 1d shows the results of tests of our method on LFR networks generated with the same model parame- ters as those used by Lancichinetti and Fortunato [23] in a widely cited study. The results are similar to those for the stochastic block model: the method performs well for smaller values of the number of groups k but tends to underestimate as the value of k gets larger. If, how- ever, the Monte Carlo algorithm starts with an initial group assignment equal to the planted structure, then it reliably finds the correct number of groups for all values of k, again suggesting that the problem is in the time available for equilibration and sampling, rather than any fundamental issue with the approach. If one were able to sample from the entire distribution P (g, kA) in reason- able time, one should find the correct number of groups. 1.0 0.8 0.6 0.4 0.2 t c e r r o c n o i t c a r F 0.0 -6 2 g r oups 4 g r oups 8 g r oups 16 g r oups 32 g r oups -4 -2 2 N or m alize d m ixing 0 4 6 FIG. 2: Fraction of runs on which the algorithm correctly estimates the number of groups k in tests on networks gen- erated using the stochastic block model, as a function of the normalized mixing parameter (cin − cout)/√c. Networks have n = 1000 nodes, average degree c = 30 and k = 2, 4, 8, 16, 32, with mixing varying from perfect assortativity (right- hand size of the plot) to perfect disassortativity (left-hand side). The dashed gray lines at ±1 denote the theoretical detectability thresholds. Fifty Monte Carlo runs were per- formed for each network of 2000 steps per node each, with the distribution over k calculate from the final 1000 only. B. Real-world networks As a complement to the synthetic tests of the previ- ous section, as have also tested our method on a range of real-world networks. There exist a number of well stud- ied example networks in the literature that have widely agreed upon ground-truth community divisions, based in part on knowledge of the specific systems the networks describe and in part on consensus derived from repeated analyses with many different community detection algo- rithms. Figure 3 shows results for four such networks. The first column in Fig. 3 shows results for tests on the "karate club" network of Zachary [24], perhaps the best known and most widely used benchmark of community detection. This small social network is universally agreed to contain two clear communities, and when applied to the network our method firmly favors k = 2. The top panel in the figure shows a histogram of the values of k sampled by the Monte Carlo algorithm on this network, and the probability shows a clear peak for two commu- nities. It could be argued, however, that looking directly at the values of k generated by the Monte Carlo algorithm has the potential to be misleading in some cases. Imag- ine, for instance, that a network breaks apart into two large groups that occupy most of the network, plus a third group with only a very few nodes in it. In this sit- uation one might be justified in saying that the network 10 really only contains two groups, not three. One can cap- ture this kind of situation by defining an effective number of groups keff = eS, S = − nr n log nr n . k Xr=1 (34) Here S is the entropy of the group assignment, which has a maximum value of log k when the groups are equally sized, so that keff = eS = k in this case. On the other hand, if there are a few small groups in the network and the remainder are large and equally sized then the mea- sure will ignore the small groups to a great extent and keff will be roughly equal to the number of large groups only. The second panel in column 1 of Fig. 3 shows results for this alternative measure of group number, as calculated using our Monte Carlo algorithm on the karate club net- work. It is straightforward to show that keff ≤ k strictly, so by necessity the distribution in the second panel is to the left of that in the top panel. There are three clear peaks visible in the distribution of keff, corresponding to states with one, two, and three groups, so it seems reasonable to assume that these are "real" divisions of the network. The peak for keff = 1 is the highest, but the area under the peak for keff = 2 is greater, so two groups, which is the widely accepted number, still seems to be preferred overall. The third panel in column 1 shows the group assign- ment g with the maximum likelihood sampled by the Monte Carlo algorithm, which in this case corresponds closely to the accepted community structure of the karate club network. The fourth panel shows an alternative vi- sualization of the community structure, a plot of the adja- cency matrix of the network where the rows and columns have been ordered so as to put the two groups in contigu- ous blocks. As we can see, this places most edges within blocks and only a few between blocks, as we would expect for a network with strong community structure. Finally, in the bottom panel of the column, we show a visual- ization of the group structure itself, a "meta-network" in which the nodes represent the groups and edges rep- resent connections between groups. In this simple case the meta-network does not offer much insight, since it consists of just two meta-nodes and a single edge, but in more complicated situations with larger numbers of groups-including some of the others in Fig. 3-it can be a useful tool. The remaining three columns of Fig. 3 show corre- sponding analyses for three further networks: the Amer- ican college football network studied in [1], the net- work of fictional character interactions in the novel Les Mis´erables by Victor Hugo [25], and a disassortative ex- ample, the network of word adjacencies of adjectives and nouns in the novel David Copperfield by Charles Dick- ens [26]. In each case the algorithm finds the accepted number of communities-six, eleven, and two, respec- tively. The distributions of keff largely agree with those Karate club American football Les Mis´erables Word adjacency 11 y c n e u q e r F 0.6 0.5 0.4 0.3 0.2 0.1 0.0 y c n e u q e r F 0.7 0.6 0.5 0.4 0.3 0.2 0.1 0.0 1 2 3 4 5 6 7 N um b e r of g r oup s 9 10 11 12 13 N um b e r of g r oup s 3 4 5 6 7 8 N um b e r of g r oup s y t i s n e d y t i l i b a b o r P 2.0 1.5 1.0 0.5 0.0 y t i s n e d y t i l i b a b o r P 1.0 0.5 0.0 1 2 3 4 5 6 N um b e r of g r oup s y c n e u q e r F 0.6 0.5 0.4 0.3 0.2 0.1 0.0 y t i s n e d y t i l i b a b o r P 3.0 2.5 2.0 1.5 1.0 0.5 0.0 1 2 3 4 5 6 7 9 10 11 12 13 3 4 5 6 7 8 1 2 3 4 5 6 E ffe c tive k E ffe c tive k E ffe c tive k E ffe c tive k 1 0 9 8 7 6 5 4 3 2 1 0 5 4 3 2 1 0 1 0 0 1 0 1 2 3 4 5 6 7 8 9 1 0 0 1 2 3 4 5 0 1 y c n e u q e r F 0.4 0.3 0.2 0.1 0.0 y t i s n e d y t i l i b a b o r P 1.0 0.5 0.0 1 0 FIG. 3: Results for four real-world networks. Each column shows results for one network, as indicated. From top to bottom the results shown are the posterior probability distribution of the number of groups, the distribution of the effective number of groups calculated using the entropy measure of Eq. (34), the maximum likelihood community structure, the adjacency matrix, and the "meta-network" representation of the communities and their pattern of connectivity. 10¡3 10¡4 10¡5 10¡6 10¡7 y t i s n e D FIG. 4: A plot of the matrix ωgi gj of connection parameters for a large network of copurchased products on Amazon.com. In this network nodes represents products and edges join pairs of products frequently purchased by the same buyer. In this calculation we performed ten runs of 10 000 Monte Carlo steps per node each and we display results from the run with the highest average likelihood during the last 1000. The calcu- lation found 81 groups in total. Color is on a log scale for clarity. for k, though for the Les Mis´erables and college football networks they favor five and ten groups respectively, one less than the peak in the distribution of k in each case, perhaps suggesting that these networks have one group that is small enough to be neglected. These examples are all relatively small networks, up to around a hundred nodes in the larger cases, but our method is applicable in principle to much larger net- works. As an example, Fig. 4 shows results for a network of e-commerce data, a copurchasing network of items sold by the online retailer Amazon.com [27]. In this network, which comes from the Stanford Large Network Dataset collection, the nodes represent 334 863 products for sale on the Amazon web site and edges between them in- dicate products that were frequently purchased by the same buyer. The figure shows a visualization of the in- ferred values of the edge probability parameters ωgigj , 12 again with the columns ordered so as to make the groups contiguous. As we can see, there appears to be strong assortative structure in the network, with the algorithm finding 81 groups in this case. VI. CONCLUSIONS In this paper we have described a method for deter- mining the number of communities in a network with community structure. The method relies on a combina- tion of Bayesian inference applied to the degree-corrected stochastic block model and a novel Monte Carlo algo- rithm. Much of the method's success turns on the ap- propriate choice of prior probability for the number of groups and we describe a variation on the "restaurant" processes of traditional model selection that appears to work well. We have illustrated the performance of the method with applications to a wide range of networks, including a diverse set of synthetic test networks and a number of real-world examples, one with over 300 000 nodes. The primary limitation of the method as described is that the Monte Carlo algorithm appears not to equili- brate fully when the number of groups becomes large. A possible objective for future work, therefore, would be to find a method or algorithm that could sample the pos- terior distribution over group assignments faster, which would allow us to better apply the method to networks with large numbers of groups. Acknowledgments The authors thank Tiago Peixoto and Jia-Rong Xie for helpful conversations. This work was funded in part by the US National Science Foundation under grants DMS– 1107796 and DMS–1407207 (MEJN), the UK Engineer- ing and Physical Sciences Research Council under grant EP/K032402/1 (GR), the James S. McDonnell Foun- dation (MAR), the Simons Foundation (MEJN), and the Advanced Studies Centre at Keble College, Oxford (MEJN and GR). [1] M. Girvan and M. E. J. Newman, Community structure in social and biological networks. Proc. Natl. Acad. Sci. USA 99, 7821–7826 (2002). [2] S. Fortunato, Community detection in graphs. Phys. Rep. 486, 75–174 (2010). [3] S. Fortunato and D. Hric, Community detection in net- works: A user guide. Phys. Rep. 659, 1–44 (2016). [4] M. S. Handcock, A. E. Raftery, and J. M. Tantrum, Model-based clustering for social networks. J. R. Statist. Soc. A 170, 301–354 (2007). [5] J. J. Daudin, F. Picard, and S. Robin, A mixture model for random graphs. Statistical Computing 18, 173–183 (2008). [6] P. Latouche, E. Birmel´e, and C. Ambroise, Bayesian methods for graph clustering. In Advances in Data Anal- ysis, Data Handling, and Business Intelligence, pp. 229– 239, Springer, Berlin (2009). [7] P. Latouche, E. Birmel´e, and C. Ambroise, Variational Bayesian inference and complexity control for stochastic block models. Statistical Modelling 12, 93–115 (2012). [8] A. F. McDaid, T. B. Murphy, N. Friel, and N. Hurley, Im- proved Bayesian inference for the stochastic block model with application to large networks. Computational Statis- tics and Data Analysis 60, 12–31 (2013). [9] E. Come and P. Latouche, Model selection and clustering in stochastic block models based on the exact integrated complete data likelihood. Statistical Modelling 15, 564– 589 (2015). [10] M. E. J. Newman and G. Reinert, Estimating the num- ber of communities in a network. Phys. Rev. Lett. 117, 078301 (2016). [11] X. Yan, Bayesian model selection of stochastic block models. In Proceedings of the 2016 IEEE/ACM Interna- tional Conference on Advances in Social Networks Anal- ysis and Mining, pp. 323–328, Institute of Electrical and Electronics Engineers, New York (2016). [12] T. P. Peixoto, Nonparametric Bayesian inference of the microcanonical stochastic block model. Phys. Rev. E 95, 012317 (2017). [13] B. Karrer and M. E. J. Newman, Stochastic blockmodels and community structure in networks. Phys. Rev. E 83, 016107 (2011). [14] P. W. Holland, K. B. Laskey, and S. Leinhardt, Stochas- tic blockmodels: Some first steps. Social Networks 5, 109–137 (1983). [15] R. Guimer`a and M. Sales-Pardo, Missing and spurious interactions and the reconstruction of complex networks. Proc. Natl. Acad. Sci. USA 106, 22073–22078 (2009). [16] T. P. Peixoto, Hierarchical block structures and high- resolution model selection in large networks. Phys. Rev. X 4, 011047 (2014). [17] M. E. J. Newman and G. T. Barkema, Monte Carlo Methods in Statistical Physics. Oxford University Press, Oxford (1999). 13 [18] Computer code for the algorithm described in this paper is available for download from the world wide web at www.umich.edu/~mejn/communities. [19] A. Lancichinetti, S. Fortunato, and F. Radicchi, Bench- mark graphs for testing community detection algorithms. Phys. Rev. E 78, 046110 (2008). [20] A. Decelle, F. Krzakala, C. Moore, and L. Zdeborov´a, In- ference and phase transitions in the detection of modules in sparse networks. Phys. Rev. Lett. 107, 065701 (2011). [21] L. Massouli´e, Community detection thresholds and the weak Ramanujan property. In Proceedings of the 46th Annual ACM Symposium on the Theory of Computing, pp. 694–703, Association of Computing Machinery, New York (2014). [22] E. Mossel, J. Neeman, and A. Sly, Reconstruction and es- timation in the planted partition model. Probability The- ory and Related Fields 162, 431–461 (2015). [23] A. Lancichinetti and S. Fortunato, Community detection algorithms: A comparative analysis. Phys. Rev. E 80, 056117 (2009). [24] W. W. Zachary, An information flow model for conflict and fission in small groups. Journal of Anthropological Research 33, 452–473 (1977). [25] D. E. Knuth, The Stanford GraphBase: A Platform for Combinatorial Computing. Addison-Wesley, Reading, MA (1993). [26] M. E. J. Newman, Finding community structure in net- works using the eigenvectors of matrices. Phys. Rev. E 74, 036104 (2006). [27] J. Yang and J. Leskovec, Defining and evaluating network communities based on ground-truth. Knowledge and In- formation Systems 42, 181–213 (2015).
1507.08462
1
1507
2015-07-30T11:36:54
Defensive Resource Allocation in Social Networks
[ "cs.SI", "cs.GT" ]
In this work, we are interested on the analysis of competing marketing campaigns between an incumbent who dominates the market and a challenger who wants to enter the market. We are interested in (a) the simultaneous decision of how many resources to allocate to their potential customers to advertise their products for both marketing campaigns, and (b) the optimal allocation on the situation in which the incumbent knows the entrance of the challenger and thus can predict its response. Applying results from game theory, we characterize these optimal strategic resource allocations for the voter model of social networks.
cs.SI
cs
Defensive Resource Allocation in Social Networks Antonia Maria Masucci ∗1 and Alonso Silva †2 1INRIA Paris-Rocquencourt, Domaine de Voluceau B.P. 105, 78153 Le Chesnay, France 2Alcatel-Lucent Bell Labs France, Centre de Villarceaux, Route de Villejust, 91620 Nozay, France Abstract In this work, we are interested on the analysis of competing marketing campaigns between an in- cumbent who dominates the market and a chal- lenger who wants to enter the market. We are in- terested in (a) the simultaneous decision of how many resources to allocate to their potential cus- tomers to advertise their products for both mar- keting campaigns, and (b) the optimal allocation on the situation in which the incumbent knows the entrance of the challenger and thus can predict its response. Applying results from game theory, we characterize these optimal strategic resource allo- cations for the voter model of social networks. 1 Introduction In contrast to mass marketing, which promotes a product indiscriminately to all potential customers, direct marketing promotes a product only to cus- tomers likely to be profitable. Focusing on the lat- ter, Domingos and Richardson [1, 2] incorporated the influence of peers on the decision making pro- cess of potential customers deciding between dif- ferent products or services promoted by competing marketing campaigns. This aggregated value of a customer has been called the network value of a customer. If we consider that each customer makes a buy- ing decision independently of every other customer, we should only consider his intrinsic value (i.e., the expected profit from sales to him). However, if we ∗Email: [email protected] †Email: [email protected] To whom corre- spondence should be addressed. consider the often strong influence of her friends, acquaintances, etc., then we should incorporate this peer influence to his value for the marketing cam- paigns. In the present work, our focus is different from previous works where their interest is to which po- tential customers to market, while in our work is on how many resources to allocate to market to poten- tial customers. Moreover, we are interested on the scenario when two competing marketing campaigns need to decide how many resources to allocate to potential customers to advertise their products ei- ther simultaneously or where the incumbent can foresee the arrival of the challenger and commit to a strategy. The process and dynamics by which influence is spread is given by the voter model. 1.1 Related Works The (meta) problem of influence maximization was first defined by Domingos and Richardson [1, 2], where they studied a probabilistic setting of this problem and provided heuristics to compute a spread maximizing set. Based on the results of Nemhauser et al. [3], Kempe et al. [4, 5] and Mossel and Roch [6] proved that for very natural activa- tion functions, the function of the expected num- ber of active nodes at termination is a submodular function and thus can be approximated through a greedy approach with a (1−1/e−ε)-approximation algorithm for the spread maximization set problem. A slightly different model but with similar flavor, the voter model, was introduced by Clifford and Sudbury [7] and Holley and Liggett [8]. In that model of social network, Even-Dar and Shapira [9] found an exact solution to the spread maximization 1 set problem when all the nodes have the same cost. Competitive influence in social networks has been studied in other scenarios. Bharathi et al. [10] proposed a generalization of the independent cas- cade model [11] and gave a (1 − 1/e) approxima- tion algorithm for computing the best response to an already known opponent's strategy. Sanjeev and Kearns [12] studied the case of two players simulta- neously choosing some nodes to initially seed while considering two independent functions for the con- sumers denoted switching function and selection function. Borodin et al. [13] showed that for a broad family of competitive influence models it is NP-hard to achieve an approximation that is bet- ter than the square root of the optimal solution. Chasparis and Shamma [14] found optimal adver- tising policies using dynamic programming on some particular models of social networks. Within the general context of competitive con- tests, there is an extensive literature (see e.g. [15, 16, 17, 18]), however their focus is mainly on the case when the contest success function is given by the marketing campaign that put the maxi- mum resources. In that case, Powell [19] stud- ied the sequential, non-zero sum game who has a pure strategy subgame perfect equilibrium where the defender always plays the same pure strategy in any equilibrium, and the attacker's equilibrium response is generically unique and entails no mix- ing. Friedman [20] studied the Nash equilibrium when the valuations for both marketing campaigns are the same. 2 Model Consider two firms: an incumbent (or defender) D and a challenger (or attacker) A. Consider the set N = {1, 2, . . . , n} of potential customers. The chal- lenger decides to launch a viral marketing campaign at time t0 = 0 (we will also refer to the viral mar- keting campaign as an attack). The budget for the challenger is given by BA ≥ 0. The incumbent D decides to allocate a budget BD ≥ 0 at time t0 to prevent its customers to switch. The players of the game are the competing marketing campaigns and the nodes correspond to the potential customers. The strategy for player ∈ {D, A}, consists on an allocation vector xi = (xi,1, xi,2 . . . , xi,n) where xi,j represents the budget i, where i allocated by player i to customer j (e.g., through promotions or offers). Therefore, the set of strate- gies is given by the (n − 1)-dimensional simplex ∆i = {(xi,1, . . . , xi,n) : n xi,j ≥ 0,∀ 1 ≤ j ≤ n and xi,j = Bi}. Xj=1 We consider each potential customer as a com- ponent contest. Let pi,j(xi,j , x−i,j ), henceforth the contest success function (CSF), denote the proba- bility that player i wins component contest j when player i allocates xi,j resources and the adversary player −i allocates x−i,j resources to component contest j. We assume that the CSF for a player i is proportional to the share of total advertising ex- penditure on customer j, i.e., xi,j 1 2 xi,j +x−i,j pi,j(xi,j , x−i,j) =(cid:26) if xi,j 6= 0 or xi,j 6= 0, if xi,j = x−i,j = 0. (1) Both firms may have different valuations for dif- ferent customers. The intrinsic value for player i of customer j is given by wi,j where i ∈ {D, A} and 1 ≤ j ≤ N . The intrinsic payoff function for player i is given by π(xi, x−i, wi) = n Xj=1 wi,j pi,j(xi,j , x−i,j), (2) where wi = (wi,1, wi,2, . . . , wi,n). We are interested as well on the network value of a customer. In the next subsection we will compute this. 2.1 Network value of a customer Let G = (V, E) be an undirected graph with self- loops where V is the set of nodes in the graph which represent the potential customers of the com- peting marketing campaigns and E is the set of edges which represent the influence between indi- viduals. We denote by S the cardinality of the set S, by the index i to one of the two players (D or A) and by the index −i to the opponent of player i. We consider that the graph G has n V = n. For a node j ∈ V , we de- nodes, i.e. note by N (j) the set of neighbors of j in G, i.e. N (j) = {j′ ∈ V : {j, j′} ∈ E} and by dj the degree of node j, i.e. dj = N (j). 2 We consider two labeling functions for a node j ∈ V given by its initial preference between different players, D or A, denoted by functions f 0 A and f 0 D respectively. We denote by f 0 i (v) = 1 when node v ∈ V prefers the product promoted by marketing campaign i. We consider that every customer has an initial preference between the firms, i.e. f 0 i = 1 − f 0 −i. We assume that the initial preference for a cus- tomer j is proportional to the share of total adver- tising expenditure on customer j, i.e., f 0 (3) i (j) =(cid:26) 1 with probability pi,j(xi, yi) 0 with probability p−i,j(xi, yi) where the function pi,j(·,·) is given by eq. (1). The evolution of the system will be described by the voter model. Starting from any arbitrary initial preference assignment to the vertices of G, at each time t ≥ 1, each node picks uniformly at random one of its neighbors and adopts its opin- ion. In other words, starting from any assignment f 0 i : V → {0, 1}, we inductively define f t+1 i (j) =( 1 with prob. 0 with prob. . (4) For player i and target time τ , the expected pay- {j ′∈N (j):f t N (j) {j ′∈N (j):f t N (j) i (j ′)=1} i (j ′)=0} , off is given by E Xj∈V wi,jf τ i (j)  . (5) We notice that in the voter model, the probabil- ity that node j adopts the opinion of one its neigh- bors j′ is precisely 1/N (j). Equivalently, this is the probability that a random walk of length 1 that starts at j ends up in j′. Generalizing this obser- vation by induction on t, we obtain the following proposition. of expectation, we have that for player i E Xj∈V wi,jf τ i (j)  wi,j P[f τ i (j) = 1]. (6) = Xj∈V The probability that a random walk of length t starting at j ends in j′, is given by the (j, j′)-entry of the matrix M t. Then P[f t i (j) = 1] = Xj ′∈V = Xj ′∈V pt j,j ′ P[f 0 i (j′) = 1] M t(j, j′)P[f 0 i (j′) = 1], and therefore, E Xj∈V wi,jf t i (j)  = Xj∈V Xj ′∈V We know that P[f 0 Therefore, eq. (7) becomes (7) i (j′) = 1] = pi,j ′ (xi,j ′ , x−i,j ′ ). wi,j M t(j, j′)P[f 0 i (j′) = 1]. Xj∈V Xj ′∈V wi,jM t(j, j′)pi,j ′ (xi,j ′ , x−i,j ′ ). (8) Therefore, the expected payoff for player i is given by Fi(xi, x−i, vi) = vi,j ′ n Xj ′=1 xi,j ′ xi,j ′ + x−i,j ′ , (9) where vi = (vi,1, vi,2, . . . , vi,n). wi,jM t(j, j′), (10) vi,j ′ = Xj∈V corresponds to the network value of customer j′ at time t. The previous expression is subject to the constraint xi ∈ ∆i. Proposition 1 (Even-Dar and Shapira [9]). Let pt j,j ′ denote the probability that a random walk of length t starting at node j stops at node j′. Then the probability that after t iterations of the voter model, node j will adopt the opinion that node j′ had at time t = 0 is precisely pt j,j ′ . Let M be the normalized transition matrix of G, i.e., M (j, j′) = 1/N (j) if j′ ∈ N (j). By linearity 3 Results From the previous section, we are able to compute the network value of each customer, therefore we can restrict ourselves to work with these values. With the next proposition, we are able to determine the best response function for player i considering the network value of each customer at a target time τ given that the strategy of the opponent −i is x−i. 3 Proposition 4. Assume that vA,ℓ = v ∀1 ≤ ℓ ≤ n. If there exist k, k′ ∈ {1, . . . , n} such that vD,k = vD,k′ , then xA,k = xA,k′ and xD,k = xD,k′ . Proof. For j ∈ {1, . . . , n}, ∀1 ≤ ℓ ≤ n, from eq. (12) we have since vA,ℓ = v xA,j + xD,j = γ√xD,j, where γ = does not depend on j. (BA + BD) k=1 √xD,k Pn From the difference between eq. (12) and eq. (13), where xD,j = κ2vD,jxA,j, k=1 √xD,k κ = Pn k=1 √vD,kxA,k Pn does not depend on j. Replacing eq. (20) on eq. (18), (18) (19) (20) (21) Proposition 2 (Friedman [20]). The best response function for player i, given that player −i strategy is x−i, is: x∗i,j = −x−i,j + (Bi + B−i) . (11) √vi,jx−i,j k=1 √vi,kx−i,k Pn From the previous proposition, we obtain that the best response functions for players A and D are given by Pn Pn .(13) , (12) √vA,j xD,j k=1 √vA,kxD,k √vD,j xA,j k=1 √vD,kxA,k x∗A,j = −xD,j + (BD + BA) x∗D,j = −xA,j + (BA + BD) In the next proposition, we assume that the valu- ations of one of the players are proportional (bigger (α > 1), smaller (α < 1) or equal (α = 1)) to the valuations of the adversary player. In that case, we have the following proposition. Proposition 3. If vi,j = αv−i,j ∀j ∈ {1, . . . , n}, i ∈ {A, D}, with α > 0, then the Nash equilibrium of the game is given by xi,j = Bi vi,j Vi , (14) or equivalently, (1 + κ2vD,j)xA,j = γκ√vD,jxA,j, (22) where Vi =Pn j=1 vi,j. Proof. The proof for the case α = 1 is given by Friedman [20]. For that case, from eq. (9), the objective function for player i is given by Fi(xi, x−i, v−i). For α > 0, we have that the ob- jective function, Fi(xi, x−i, vi) j=1 vi,j j=1 v−i,j =Pn = αPn xi,j xi,j +x−i,j , (15) xi,j xi,j+x−i,j . (16) = αFi(xi, x−i, vi), (17) and thus we conclude from the previous case. The previous result not only gives explicitly the Nash equilibrium under some constraints, but it proves that a scaling factor for every contest does not change the Nash equilibrium strategies of the players. An interesting property, that we will exploit in the following is that if for one of the players all the contests have the same valuation, then for ev- ery two equal valuation contests for the adversary player, the equilibrium allocation for each player in the two contests are equal. 4 xA,j = γ2κ2vD,j (1 + κ2vD,j)2 . (23) If there exist k, k′ ∈ {1, . . . , n} such that vD,k = vD,k′ ≡ w, then from eq. (23), xA,k = γ2κ2w (1 + κ2w)2 = xA,k′ . From eq. (20), we also obtain xD,k = κ2 γ2κ2w2 (1 + κ2w)2 = xD,k′ . (24) (25) In Proposition 3, we proved that a scaling fac- tor between the valuations of the players does not change their equilibrium strategies. However, we will see in the following proposition that this situ- ation is unusual. Actually, even in the case of two communities within the social network, where the valuations for the attacker are the same and the valuations for the defender are different for each community, the players have very different strate- gies than the previously considered. Proposition 5. Assume n is even, so there ex- ists m ∈ N \ {0} such that n = 2m. Assume that vA,ℓ = v ∀1 ≤ ℓ ≤ n, vD,k = αv ∀1 ≤ k ≤ m and vD,k′ = βv ∀m + 1 ≤ k′ ≤ n, for α, β > 0. Then the Nash equilibrium is given by xA,1 = . . . = xA,m = x∗A, xA,m+1 = . . . = xA,n = (BA/m − x∗A), xD,1 = . . . = xD,m = αx∗A , αx∗A + β(BD/m − x∗A) . β(BD/m − x∗A) BD m BD m xD,m+1 = . . . = xD,n = αx∗A + β(BD/m − x∗A) where x∗A is unique (its expression is not important and thus it is given in the Appendix). Replacing eq. (30) and eq. (31) in eq. (12), + BA + BD m √αx √αx + √βy . (32) αx BD m αx + βy x = − We know that Pn j=1 xA,j = BA, thus m(x + y) = BA. From eq. (32) and eq. (33), we obtain x = − BD m + BA+BD m αx (α−β)x+βBA/m √αx+√β(BA/m−x) √αx , (33) (34) (35) which corresponds to x∗A given in the Appendix. Proof. From Proposition 4, we have that 4 Stackelberg leadership xA,1 = xA,2 = . . . = xA,m ≡ x, xA,m+1 = xA,m+2 = . . . = xA,n ≡ y. From eq. (20), xD,j vD,jxA,j = κ2, (26) where κ does not depend on j. Therefore for all k, k′ ∈ {1, . . . , n}, xD,k vD,kxA,k = xD,k′ vD,k′ xA,k′ . (27) Let us consider k ∈ {1, . . . , m} and k′ ∈ {m + 1, . . . , n}, then from the previous equation xD,k = αx βy xD,k′ . j=1 xD,j = BD, thus + 1(cid:19) xD,k′ = BD. We know that Pn m(cid:18) αx βy (28) (29) Then xD,m+1 = xD,m+2 = . . . = xD,n = BD m βy αx + βy , (30) and from eq. (28), xD,1 = xD,2 = . . . = xD,m = BD m αx αx + βy . (31) model For the case when there is an incumbent hold- ing the market and there is a challenger entering the market, we consider the Stackelberg leader- ship model. The Stackelberg leadership model is a strategic game in which the leader firm moves first and then the follower firm moves afterwards. To solve the Stackelberg model we need to find the subgame perfect Nash equilibrium (SPNE) for each player sequentially. In our case, the defender is the leader who dominates the market and the attacker is the follower who wants to enter the market. From Proposition 2, the subgame perfect Nash equilibrium for the attacker is given by eq. (12). Given this information, the leader solves its own SPNE. The Lagrangian for the incumbent is given by L(xD) = vD,k n Xk=1 xD,k xA,k + xD,k −µ(cid:16) n Xℓ=1 xD,ℓ−BD(cid:17), (36) where µ is the Lagrange multiplier. Since the de- fender already knows the optimal allocation of re- sources for the challenger, it incorporates this in- formation into its Lagrangian, xD,k BA + BD n Xℓ=1 √vA,ℓxD,ℓ n vD,k Xk=1 − µ(cid:16) √vA,kxD,k Xℓ=1 n xD,ℓ − BD(cid:17), L(xD) = 5 vD,k√xD,k √vA,k n Xk=1 Proposition 7. Assume that n is even, so there exists m ∈ N \ {0} such that n = 2m. Assume that vA,ℓ = v ∀1 ≤ ℓ ≤ n, vD,k = αv ∀1 ≤ k ≤ m and vD,k′ = βv ∀m + 1 ≤ k′ ≤ n, for α, β > 0. Then the Stackelberg equilibrium is given by xD,k = xD,k′ = BD 4m(cid:16)2 ± 4m(cid:16)2 ± BD √2(β − α) pα2 + β2(cid:17) ∀1 ≤ k ≤ m, √2(α − β) pα2 + β2(cid:17) ∀m + 1 ≤ k′ ≤ n. Proof. From eq. (37), for 1 ≤ k ≤ m, 2µ(BA + BD) = √v √xD,k α √v √xD,k √vxD,ℓ + β n Xℓ=m+1 m √vxD,ℓ+ Xℓ=1 √v √xD,k α n Xℓ=1 (39) √vxD,ℓ! . (37) √vA,ℓxD,ℓ. Equivalently, or equivalently, L(xD) = 1 BA + BD − µ(cid:16) n Xℓ=1 n √vA,ℓxD,ℓ Xℓ=1 xD,ℓ − BD(cid:17), The necessary conditions for optimality are given by the equations 1 = ∂L(xD) ∂xD,k BA + BD(cid:16) BA + BD(cid:16) vD,k √vA,k 1 n √vA,k 2√xD,k(cid:17)(cid:16) Xℓ=1 vD,ℓ√xD,ℓ √vA,ℓ (cid:17)+ Xℓ=1 √vA,ℓxD,ℓ(cid:17) − µ = 0. n 1 2√xD,k Reordering terms, n 2µ(BA + BD) = √vA,k √xD,k(cid:16) Xℓ=1 vD,ℓ√xD,ℓ √vA,ℓ (cid:17) + vD,k √vA,k 1 √xD,k n Xℓ=1 We will use this equation to compute the following cases. Proposition 6. If vi,j = αv−i,j ∀j ∈ {1, . . . , n}, i ∈ {A, D}, with α > 0, then the Stackelberg equi- librium of the game is xi,j = Bi vi,j Vi , (38) where Vi =Pn k=j vi,j . Proof. Following the proof of Proposition 4, when the valuations of the defender are proportional to the valuations of the attacker, the objective func- tion for player i is given by Fi(xi, x−i, v−i) = αFi(xi, x−i, v−i). Therefore, player i has an objec- tive function equivalent to Fi(xi, x−i, v−i). In that case, the game is equivalent to a two-player zero- sum game and thus there is no difference between the Stackelberg equilibrium and the Nash equilib- rium given by Proposition 4. Contrary to the previous proposition, in the sce- nario considered in Proposition 5, the strategies of the Stackelberg equilibrium are very different from the strategies of the Nash equilibrium given by Proposition 5 and different than the strategies previously considered. 6 m √xD,k = 2µ(BA + BD) 2α v We have the previous expression for every k ∈ {1, . . . , m}, therefore xD,1 = xD,2 = . . . = xD,m ≡ x. √xD,ℓ + (α + β) Xℓ=m+1 Xℓ=1 n Similarly, from eq. (37), for m + 1 ≤ k′ ≤ n, √xD,ℓ! . 2µ(BA + BD) = + √v √xD,k′ α √v √xD,k′ β m n Xℓ=1 Xℓ=1 √vxD,ℓ + β √vxD,ℓ! n Xℓ=m+1 √vxD,ℓ! (40) n m Xℓ=1 √xD,ℓ + 2β Equivalently, √xD,k = 2µ(BA + BD) (α + β) v We have the previous expression for every k ∈ {m+1, . . . , n}, therefore xD,m+1 = xD,m+2 = . . . = xD,n ≡ y. From the difference between eq. (40) and eq. (39), (cid:18) α + β √y − √x(cid:19) m√x =(cid:18) α + β √x − √y(cid:19) m√y. Xℓ=m+1 2α 2β (41) √xD,ℓ! . The solutions of the previous equation are given by x = BD 4m(cid:16)2 ± √2(α − β) pα2 + β2(cid:17). √2(α − β) pα2 + β2(cid:17). Since x + y = BD/m, then y = BD 4m(cid:16)2 ∓ (42) (43) t n e b m u c n I e h t f o s t i f o r P 600000 580000 560000 540000 520000 500000 480000 460000 Stackelberg Nash 0 0.1 0.2 0.4 0.3 0.6 Difference of Valuations 0.5 0.7 0.8 0.9 From eq. (12), we obtain xA,k for both 1 ≤ k ≤ m and xA,k′ for m + 1 ≤ k ≤ n. 5 Simulations In this section, we compare through numerical sim- ulations the Nash equilibrium and the Stackel- berg equilibrium for the allocation game described above. Consider that the number of potential cus- tomers n = 100, 000 and that within these poten- tial customers we have two communities of equal size m = 50, 000. We consider that the budget al- located to capture the market by the attacker is BA = 200, 000, and we consider three different sce- narios for the budget of the defender: i) the de- fender has half the budget of the attacker BD = BA/2 = 100, 000, ii) the defender and the attacker have the same budget BD = BA = 200, 000, iii) the defender has two times the budget of the at- tacker BD = 2BA = 400, 000. Assume that the network value of each customer for the challenger (attacker) is the same vA,ℓ = v = 10 ∀1 ≤ ℓ ≤ n. However, for the incum- bent (challenger), each community has a different network value vD,C1 = v(1 − δ) = 10(1 − δ) for the customers of the first community and vD,C2 = v(1 + δ) = 10(1 + δ) for the customers of the second community, where δ is a given parameter. The Nash equilibrium (NE) was computed through Proposition 5 and the Stackelberg equi- librium (SE) was computed through Proposition 7. The percentage increase in profits was computed as 100 ∗ (SE − N E)/N E. The results are given in Figure 1 and Figure 2. In Figure 1, we observe that for small difference of valuations Stackelberg and Nash equilibria give roughly the same profit. However, when the differ- ence of valuations increases we have that while the Figure 1: Profits for the incumbent (defender) vs the difference of valuations between communities (δ) for equal budgets. s t i f o r P n i e s a e r c n I t e g a n e c r e P 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 0 BD=BA/2 BD=BA BD=2BA 0 0.1 0.2 0.4 0.3 0.6 Difference of Valuations 0.5 0.7 0.8 0.9 Figure 2: Percentage increase in profits for the incumbent (defender) vs the difference of valua- tions between communities (δ) by committing to the Stackelberg leadership model versus Nash equi- librium. profit obtained by Stackelberg increases, the profit of the Nash equilibrium after a threshold decreases. In Figure 2, we notice that for a small difference of valuations between communities, both models give roughly the same profits, however when the dif- ference of valuations between communities grows, the Stackelberg equilibrium gives much higher prof- its than the Nash equilibrium. Another interesting observations is that in the case when the defender has smaller budget com- pared with the attacker, the difference in profits 7 from both equilibria is much higher compared with the scenario when the defender has higher budget. 6 Conclusions We have studied the case of two marketing cam- paigns competing to maximize their profit from the network value of the potential customers. We have analyzed the following situations: (a) when the de- cision of how many resources to allocate to mar- ket to potential customers is made simultaneously, and (b) when the decision is sequential and the in- cumbent foreseeing the arrival of the challenger can commit to a strategy before its arrival. Acknowledgments The work of A. Silva was partially done in the con- text of the ADR "Network Science" of the Joint Alcatel-Lucent Inria Lab. The work of A. Silva was partially carried out at LINCS (www.lincs.fr). References [1] P. Domingos and M. Richardson, "Mining the network value of customers," in Proceed- ings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, (New York), pp. 57 -- 66, ACM Press, Aug. 26 -- 29 2001. [2] M. Richardson and P. Domingos, "Mining knowledge-sharing sites for viral marketing," in Proceedings of the 8th ACM SIGKDD In- ternational Conference on Knowledge Discov- ery and Data Mining, (New York), pp. 61 -- 70, ACM Press, July 23-26 2002. SIGKDD International Conference on Knowl- edge Discovery and Data Mining, (New York), pp. 137 -- 146, ACM Press, Aug. 24 -- 27 2003. [5] D. Kempe, J. Kleinberg, and ´E. Tardos, "In- fluential nodes in a diffusion model for social networks," in ICALP: Annual International Colloquium on Automata, Languages and Pro- gramming, 2005. [6] Mossel and Roch, "On the submodularity of influence in social networks," in STOC: ACM Symposium on Theory of Computing (STOC), 2007. [7] P. Clifford and A. Sudbury, "A model for spatial conflict," Biometrika, vol. 60, no. 3, pp. 581 -- 588, 1973. [8] R. A. Holley and T. M. Liggett, "Ergodic the- orems for weakly interacting infinite systems and the voter model," The Annals of Proba- bility, vol. 3, no. 4, pp. 643 -- 663, 1975. [9] E. Even-Dar and A. Shapira, "A note on maximizing the spread of influence in social networks," in Proceedings of the 3rd Inter- national Conference on Internet and Network Economics (WINE'07), (Berlin, Heidelberg), pp. 281 -- 286, Springer-Verlag, 2007. [10] S. Bharathi, D. Kempe, and M. Salek, "Com- petitive influence maximization in social net- works," in Internet and Network Economics (X. Deng and F. Graham, eds.), vol. 4858 of Lecture Notes in Computer Science, pp. 306 -- 311, Springer Berlin Heidelberg, 2007. [11] J. Goldenberg, B. Libai, and E. Muller, "Talk of the network: A complex systems look at the underlying process of word-of-mouth," Mar- keting Letters, vol. 12, no. 3, pp. 211 -- 223, 2001. [3] G. Nemhauser, L. Wolsey, and M. Fisher, "An analysis of approximations for maximiz- ing submodular set functions I," Mathemati- cal Programming, vol. 14, no. 1, pp. 265 -- 294, 1978. [12] S. Goyal and M. Kearns, "Competitive conta- gion in networks," in Proceedings of the 44th Symposium on Theory of Computing, STOC '12, (New York, NY, USA), pp. 759 -- 774, ACM, 2012. [4] D. Kempe, J. Kleinberg, and ´E. Tardos, "Max- imizing the spread of influence through a so- cial network," in Proceedings of the 9th ACM [13] A. Borodin, Y. Filmus, and J. Oren, "Thresh- old models for competitive influence in so- cial networks," in Proceedings of the 6th In- 8 ternational Conference on Internet and Net- work Economics, WINE'10, (Berlin, Heidel- berg), pp. 539 -- 550, Springer-Verlag, 2010. [14] G. C. Chasparis and J. Shamma, "Control of preferences in social networks," in Proceedings of the 49th IEEE Conference on Decision and Control (CDC), pp. 6651 -- 6656, Dec 2010. [15] O. Gross and R. Wagner, "A continuous colonel blotto game," in RAND Corporation RM-408, 1950. [16] B. Roberson, "The colonel blotto game.," Eco- nomic Theory, vol. 29, no. 1, pp. 1 -- 24, 2006. [17] A. M. Masucci and A. Silva, "Strategic Re- source Allocation for Competitive Influence in Social Networks," in Annual Allerton Confer- ence on Communication, Control, and Com- puting, (Monticello, Illinois, United States), Oct. 1 -- 3 2014. [18] G. Schwartz, P. Loiseau, and S. Sastry, "The heterogeneous Colonel Blotto Game," in NET- GCOOP 2014, International Conference on Network Games, Control and Optimization, October 29-31, 2014,, (Trento, Italy), 2014. [19] R. Powell, "Sequential, nonzero-sum blotto: Allocating defensive resources prior to attack," Games and Economic Behavior, vol. 67, no. 2, pp. 611 -- 615, 2009. [20] L. Friedman, "Game-theory models in the allocation of advertising expenditures," Opera- tions Research, vol. 6, no. 5, pp. 699 -- 709, 1958, http://pubsonline.informs.org/doi/pdf/10.1287/opre.6.5.699. 9 Appendix The term x∗A was computed through Matlab Symbolic Toolbox from the equation: x = − BD m αx (α − β)x + βBA/m + and it is given by BA + BD m √αx , √αx +pβ(BA/m − x) ABDα4 − 8B3 ABDα3β + 72B3 Dα2 + B2 Aα4 + 8B4 AB2 Dαβ3 + 4B4 Dα3β + 8B4 AB2 Dαβ3 − B2 AB2 Dβ4 − 16BAB3 Dα8β2(4B4 AB2 Dα4 − 24B2 Dαβ))/(6m3(α + β)2(α − β)3) Aα2β2 + 4B4 Dα3β + 146B2 Dα2β2 + 4B4 ABDα2β2 − 8B3 ABDαβ3 Dα3β + 96BAB3 D Aβ4 + 4B3 AB2 Dα2β2 − 24B2 Dαβ3))/(m6(α2 − β2)4))(1/2))/18 − (α3(2BAβ2 − BAα2 + 3BAαβ x∗A = (((3(1/2)((B2 + 4B3 ABDβ4 − B2 α2β2 − 16BAB3 + 4BDαβ)3)/(27m3(α + β)3(α − β)3) + (α3β(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ)(3B2 − 2BABDα2 + 6BABDαβ + B2 + (BAα4β2(BA + BD)2)/(2m3(α + β)(α − β)2))(1/3) − (α(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ))/(3m(α2 − β2)) + (α2(B2 − 3B2 Dαβ3))/(9m2(α2 − β2)2((3(1/2)((B2 Aα4 + 4B4 − B2 AB2 Dα4 − B2 Aα2β2 + 8B4 AB2 − 8B3 ABDα3β + 96BAB3 AB2 Dα3β + 72B3 − (α3(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ)3)/(27m3(α + β)3(α − β)3) + (α3β(2BAβ2 − BAα2 + 3BAαβ + 4BDαβ)(B2 3B2 Aβ4 − 2BABDα3β + 12BABDα2β2 − 2BABDαβ3 − 3B2 ABDα4 + 4B3 Dαβ + 6BABDαβ))/(6m3(α + β)2(α − β)3) + (BAα4β2(BA + BD)2)/(2m3(α + β)(α − β)2))(1/3)))/α. Dα8β2(4B4 Dα2β2 + 146B2 Dαβ3 − 24B2 AB2 Dα3β + 10B2 ABDβ4 + 4B4 Dα2β2 Dαβ3 + 4B4 ABDα2β2))/(m6(α2 − β2)4))(1/2))/18 Aβ4 + 4B3 Dα2β2 − 16BAB3 Dαβ3 − 16BAB3 Dα3β − 8B3 Aβ2 − 2B2 Aα2 + B2 Dα2 − 2BABDα2+ Aαβ − 2B2 Aα2 + B2 Aβ2 Dα3β ABDαβ3 Aα4 + 2B2 Aα2β2 + B2 Dα2β2 − 24B2 AB2 Dβ4 + 8B4 Aαβ + B2 10
1508.05617
1
1508
2015-08-23T15:04:59
The message does not matter: the influence of the network on information diffusion
[ "cs.SI", "physics.soc-ph" ]
How an information spreads throughout a social network is a valuable knowledge sought by many groups such as marketing enterprises and political parties. If they can somehow predict the impact of a given message or manipulate it in order to amplify how long it will spread, it would give them a huge advantage over their competitors. Intuitively, it is expected that two factors contribute to make an information becoming viral: how influential the person who spreads is inside its network and the content of the message. The former should have a more important role, since people will not just blindly share any content, or will they? In this work it is found that the degree of a node alone is capable of accurately predicting how many followers of the seed user will spread the information through a simple linear regression. The analysis was performed with five different messages from Twitter network that was shared with different degrees along the users. The results show evidences that no matter the content, the number of affected neighbors is predictable. The role of the content of the messages of a user is likely to influence the network formation and the path the message will follow through the network.
cs.SI
cs
The message does not matter: the influence of the network on information diffusion 5 1 0 2 g u A 3 2 ] I S . s c [ 1 v 7 1 6 5 0 . 8 0 5 1 : v i X r a Fabr´ıcio Olivetti de Franca, Member, IEEE Universidade Federal do ABC (UFABC) Center of Mathematics, Computing and Cognition (CMCC) R. Santa Ad´elia 166, CEP 09210-170, Santo Andr´e, Brazil Email: [email protected] Claudio Luis de Camargo Penteado Universidade Federal do ABC (UFABC) Center of Engineering and Social Sciences (CECS) Denise Hideko Goya Universidade Federal do ABC (UFABC) Center of Mathematics, Computing and Cognition (CMCC) Abstract -- How an information spreads throughout a social network is a valuable knowledge sought by many groups such as marketing enterprises and political parties. If they can somehow predict the impact of a given message or manipulate it in order to amplify how long it will spread, it would give them a huge advantage over their competitors. Intuitively, it is expected that two factors contribute to make an information becoming viral: how influential the person who spreads is inside its network and the content of the message. The former should have a more important role, since people will not just blindly share any content, or will they? In this work it is found that the degree of a node alone is capable of accurately predicting how many followers of the seed user will spread the information through a simple linear regression. The analysis was performed with five different messages from Twitter network that was shared with different degrees along the users. The results show evidences that no matter the content, the number of affected neighbors is predictable. The role of the content of the messages of a user is likely to influence the network formation and the path the message will follow through the network. Keywords -- complex networks, information diffusion, diffusion model. I. INTRODUCTION The influence of a Social Network over an individual behavior can help us understand how a given information is spread. The meaning of information in this context is anything that can be passed from one individual to another, such as, viral diseases [1], political opinion [2], innovation adoption [3], news and ideas [4]. in order to prevent By understanding the mechanisms of information diffusion, we can act the spread of contagious diseases, accelerate the adoption of healthier behavior, and even disseminate an opinion throughout the network. So, an accurate model that can predict such behavior is sought by many researchers from different fields. A diffusion model [5] for a network tries to find the probability that a node spreads a given information to a neighbor node and the probability that a given node absorbs such information from one of its neighbors. For example, in a disease diffusion model, the first probability is related to how infectious a disease is, and the second probability relates to how strong an individual immune system is. In most cases, these probabilities are assumed to be the same for every node throughout the network, thus reducing the task to estimate only two values per model. This simplification is necessary for many models since the data acquisition is unfeasible. With these values, it is possible to estimate the expected coverage of spread of a given information through a Monte Carlo method. But, in reality, each individual has its own probabilities on a diffusion model. These probabilities depends on its network position and the content of the message being spread. In a social context of opinion adoption, a person who has contact with many other persons is more likely to spread its opinion through the network, likewise, depending on the opinion being transmitted, a person may be more or less susceptible to retransmit it. With the appearance of Online Social Networks, it became possible to acquire the data needed for a more thorough investigation of the diffusion model on social networks. One of such networks, named Twitter 1, is a network specifically created to spread opinions and informations [6]. This is a directed network where each user may have two possible relationships with another user: follower, when user A listens to what user B says; and friendship, when user A is listened by user B. Every user can publish short messages (140 characters), called tweets, that will show up in its followers pages. The followers are capable of sharing any tweet by means of a retweet. A retweet will show a message created by someone else into the followers pages of the user who retweeted. The data generated by these interactions is publicly avail- able through the use of developers API with some limitations. So, by knowing the social network where the message is being spread and the content of such message it may be possible to predict how far the information will reach and how many individual nodes will adopt such information. In this work we will propose a simple model to estimate the rate that 1https://www.twitter.com any Twitter user spreads any given information based solely on the characteristics of his ego-centric network. Surprisingly, the number of connections alone is capable of accurately predict the average number of followers that will share a given user message. Following these hypothesis, the simplest rule to decide from which user a message was retweeted is to create an edge with the friend who retweeted the message last, thus appearing at the top of the user webpage interface. This will be named RULE 1 for further reference. The remainder of this paper is organized as follows: in Section II we will explain how to generate the retweet diffusion network given the API limitations. Section III elaborates the contagion model proposed and the methods to find the spread- ing rate. Section IV follows through a series of experiments in order to determine the best parameters to use for the proposed model. Finally, Section V concludes this papers with some insights for future work. II. RETWEET DIFFUSION NETWORK The Retweet Diffusion Network (RDN) is a directed net- work modeled after the dynamics of the sharing mechanism of a tweet message. In this network, the first node is the seed user that originally created the message. Subsequent nodes are created representing the users that shared such message. Each edge from this network represents that a given user A shared the message from another user B, not necessarily the seed user. In Twitter public API 2, every tweet is associated with a given user. Whenever someone retweet a message, a new tweet is created with the same content associated with the user who retweeted it. This new message will have a flag indicating this is a retweet (RT) and, additionally, who originally tweeted such message. This information alone is insufficient to build the correct RDN, since every user who retweeted a given message will be connected with the original user. So, the generation of the RDN must be estimated through the relationships between the users who retweeted the original message. The first step is to collected the set of users who retweeted the original message, these will be the nodes of the RDN. After retrieving nodes, it is necessary to retrieve the friends list of each node in order to verify from whom they retweeted the message. If a node has only one friend inside the RDN, an edge connecting these nodes will be created. Otherwise, it must be decided from who of his friends the message was retweeted. In order to estimate the most likely friend from which a given user retweeted, we must hypothesize how the average user reads its Twitter messages. Whenever you open the Twitter website or any of its Smartphone Apps, a list of tweets is shown sorted by the most recent to the least recent. Sometimes, in between these tweets, Twitter shows a trending tweet from the past that might interested the user. So, the user may have the following behaviors: read a few tweets starting at the most recent and retweet those that it found interesting, read a few tweets from the least recent 3, retweet one of the trending tweets that appear among the most recents. 2https://dev.twitter.com/ 3in this case the user first scroll down the webpage and then slowly scrolls up to the top, while reading the tweets. Another possible rule is to create an edge to the user with most followers, that retweeted the message within a time frame. This rule makes two suppositions: i) Twitter will give preference to show tweets from the user's more popular friends and, ii) Twitter will not show messages older than a certain amount of time. This rule will be known as RULE 2 from now on. Finally, the last rule is to create an edge to the user with the least number of followers, that retweeted the message within a time frame. This is the opposite of the previous rule, stating that Twitter will prefer to show the least popular friend. This rule will be named RULE 3. So, two other hypothesis are created to test such cases. The first hypothesis is that the user will retweet from the user with the most followers given that it was tweeted within a given timeframe (RULE 2). Finally, the last hypothesis is that the user will retweet from its friend with the least followers within a timeframe (RULE 3). The algorithm used to build the RDN, given the set of users who participated together with the list of their friends who also belong to the RDN and the time of retweet is depicted in Alg. 1. Algorithm 1: RDN building algorithm input : list of nodes nodes, associative array of friends for each node f riends, associative array of time of the retweet for each node timeRT , empty graph G. output: Retweet Dynamics Network G RDN(nodes,friends,timeRT,G) sortedU sers ← Sort(nodes).by(timeRT ) for node ∈ sortedU sers do if node /∈ G then f riend ← Rule(f riends[node], timeRT, timeRT [node]) G.add edge(node, f riend) RDN (nodes, f riends, timeRT, G) The algorithm is a simple recursive depth-first search that starts with an empty graph G and, starting from the first tweet, apply one of the aforementioned rules to choose which friend will connected to the current user. The three possible rules are given in Algs. 2, 3, 4. The first rule is straightforward and just retrieves the friends which tweeted last. The other two rules, first filter those friends who tweeted within a time limit thr and then retrieve the friend with more and less followers, respectively. In the following Sections such rules will be tested for different values of thr. An illustration of a RDN when applying the first rule is depicted in 1 with its corresponding degree distribution in 2. The degree relationship of this network assumes a power law distribution regarding the number of friends that retweeted Algorithm 2: Rule 1 of retweet dynamics input : list of possible connections f riends, associative array of time of the retweet for each node timeRT , time of tweeting for current node timeU ser. output: Chosen friend f riend f riend ← M ininum(f riends).by(timeRT − timeU ser) Algorithm 3: Rule 2 of retweet dynamics input : list of possible connections f riends, associative array of time of the retweet for each node timeRT , time of tweeting for current node timeU ser. output: Chosen friend f riend F iltered ← F ilter(SortedF riends).by(timeRT − timeU ser ≤ thr) f riend ← M ax(F iltered).by(N umberOf F riends) Fig. 1. An example of a RDN using Rule 1. from a given node. This indicates that the number of potential retweets each user is capable of generating is predictable by Algorithm 4: Rule 3 of retweet dynamics input : list of possible connections f riends, associative array of time of the retweet for each node timeRT , time of tweeting for current node timeU ser. output: Chosen friend f riend F iltered ← F ilter(SortedF riends).by(timeRT − timeU ser ≤ thr) f riend ← M in(F iltered).by(N umberOf F riends) 103 102 101 s e d o n f o r e b m u n 100 100 101 degree 102 Fig. 2. Degree distribution in log-log scale. a simple linear regression as we will show in the following Sections. III. CONTAGION MODEL After the construction of the RDN, the next step is trying to predict how the tweets are shared. In this paper we will use a simple contagion model known as Susceptible-Infected (SI) [7]. In our context, this model says that initially every node, except for the seed node is on a susceptible state, the seed node is on an infected state, being capable of transmitting the information to its neighbor. At every time step, the message will spread from every infected node to a fraction β of their neighbors: nRT = βF (i), (1) where nRT is the number of retweets the user i will receive and F (.) is the number of followers a given user has. In most contagion models the transmission rate is the same for the entire network, in our case each user will have a different transmission rate since different users have a different potential to spread a given message. So, Eq. 1 must be changed to: nRT = β(i)F (i), (2) The estimation of β(i) may depend on different attributes from the user, such as: number of followers, number of friends, number of posts, how long the message has been sent, and the content of the message itself. Many related work [8], [9], [10], [11] focused on the content of the message with the objective of predicting how much a message will spread. But, due to the power-law distribution nature of the nodes degrees, we will try create a linear regression model based on the logarithm of the values of such attributes, except for the textual message: log β(i) = w1 logF (i)+w2 logF r(i)+w3 logP (i)+w4 logT (i), (3) where F (i) is the number of followers of user i, F r(i) is the number of friends of user i, P (i) is the number of posts made by user i, T (i) represents how much seconds have passed since the original tweet was posted and wj is the weigh associated to each feature. In the next section we will make different experiments that will show that just a subset of these parameters are enough to predict the β rate for any Twitter user with high accuracy. IV. EXPERIMENTAL METHODS AND RESULTS This Section will first describe the data acquisition process and the datasets used for the experiments. After that, a series of experiments will be performed in order to find the best model that we can obtain using as few information about the tweet as possible. Finally, the results will be reported together with a brief reporting of related work. A. Data Acquisition In order to verify our assumptions some data were acquired from Twitter through its developer API. This API has several limitations that impedes a thorough experiment. One limitation is the number of requests per 15 minutes time frame that slows down the data collection process. In pratice this limitation makes unfeasible to collect datasets with more than a few thousands of retweets. Another limitation concerns the age of the tweet being retrieved, the API allows only to search for the tweets being posted during the last week, which limits the dataset collection possibilities. Because of these limitations, we have collected the infor- mation regarding the users, their friends, timestamp, number of friends, number of followers and number posts from 5 different messages involving 4 different users. The collection was perform from april 20 to april 29 and corresponds to highly retweeted messages from popular users. Additionally, for one of the users, we acquired a message with a smaller number of retweets in order to test the generality of the proposed model. A brief description of each dataset is given in Table I. B. Linear Regression In our model, the value of the retweet rate β will be estimated by means of a Least Squares Linear Regression algorithm. The regression was performed using the Scikit- Learn 0.16 library with Python 3.3.5. In order to assess the accuracy of the regression, for every experiment, one dataset was chosen as the training data to be fitted, and the remaining datasets were used as a test set. The quality of the obtained solutions was measured by means of the coefficient of determination (R2), the Mean Absolute Error (MAE) and the Mean Squared Error (MSE) of the output. Notice that the errors were calculated regarding the exponential of the output and compared with the measured β for each case. TABLE II. RESULTS OBTAINED FOR EACH HYPOTHESIS RULE. R2 MAE MSE R1 R2 15 R2 30 R2 60 R3 15 R3 30 R3 60 0.846579 0.832880 0.580089 0.570107 0.851444 0.854654 0.863555 0.001292 0.001168 0.006751 0.007283 0.001328 0.001305 0.001277 0.000018 0.000008 0.003070 0.003457 0.000016 0.000015 0.000014 TABLE III. RESULTS OBTAINED FOR EACH TRAINING SET. R2 MAE MSE RT1 RT2 RT3 RT4 RT5 0.894002 0.891166 0.872202 0.801393 0.859011 0.001209 0.001128 0.001362 0.001627 0.001059 0.000016 0.000011 0.000018 0.000017 0.000007 C. Rule of Diffusion The first test will verify what hypothesis for creating the RDN gives the most accurate results. For this purpose, a series of experiments were performed in which we create a regression model using different rules as described in Section II. The tested rules were: Rule 1 (R1), Rule 2 with 15 minutes time frame (R2 15), with 30 minutes time frame (R2 30) and with 60 minutes time frame (R2 60), and Rule 3 with 15, 30 and 60 minutes time frames (R3 15, R3 30, R3 60). Table II shows the average result obtained by every rule by training the model with each dataset and testing with the remaining data. In this Table we can see that the rule R2 15 is the most accurate regarding the average error metrics, but R3 60 obtained a much better value for R2 while still maintaining low values for MAE and MSE. For this purpose the R3 60 rule will be used for the next set of experiments. These results indicate that it is more probable that a user retweet from its less connected friend during this timeframe. One possible explanation for these results is that this illustrates a Retweet-Follow behavior. During the retweeting event, the user originally did not follow the most popular user from its current network. But, when the user retweeted the message, it decided to follow the twitter account that originally tweeted the message. D. The Training Set For the next set of experiments, by fixing the use of the R3 60 rule to generate the RDN, it will be verified which dataset renders the best results when used as the training set. The same set of experiments is performed by varying the dataset used for training while using the remaining as the test data. As depicted in Table III, the RT1 and RT2 datasets obtained the best values for R2, while RT5 had the best values for the average error metrics, probably caused by the reduced number of samples. Based on these results, RT2 will be chosen as the training set for the remaining experiments. It might be a surprise that the dataset with larger dataset obtained one of the a highest coefficient of determination. Intuitively, smaller datasets is expected to be easier to fit into TABLE I. DATASET DESCRIPTION. Tweet From "Liam is our batman" Exactly 1 WEEK 'til @ShawnMendes takes over #VH1Buzz for 5 days! #ShawnOnBUZZ Using Direct Messages to take public conversations private is now easier than ever. Learn about today's updates: Are you ready for #XenobladeChroniclesX? Heres a handy #XenobladeChronicles3D checklist to prepare you. Kit and Krysta take on the "Whisper Challenge" in the latest #NintendoMinute http://Ninten.do/6017fv2Z Name RT1 RT2 RT3 RT4 RT5 Seed User @zaynbaabe @BigMorningBuzz @twitter @NintendoAmerica @NintendoAmerica # of RTs. 821 2,704 921 309 32 TABLE IV. RESULTS OBTAINED FOR EACH FEATURES SUBSET. R2 MAE MSE (time) (friends) (followers) (posts) (time,friends) (time,followers) (time,posts) (friends,followers) (friends,posts) (followers,posts) (time,friends,followers) (time,friends,posts) (time,followers,posts) (friends,followers,posts) (time,friends,followers,posts) -0.274353 0.376648 0.849871 -0.059239 0.377421 0.856084 -0.059073 0.880330 0.382251 0.869515 0.883551 0.381019 0.876833 0.885927 0.891166 0.004399 0.003237 0.000984 0.004003 0.003240 0.000984 0.003999 0.000982 0.003182 0.001275 0.001056 0.003174 0.001164 0.001225 0.001128 0.000134 0.000081 0.000009 0.000104 0.000081 0.000008 0.000104 0.000009 0.000088 0.000014 0.000007 0.000088 0.000012 0.000013 0.000011 a linear regression in comparison with larger datasets, that contain lots of noise. But, in this case, a smaller number of samples might mean that we could not acquire the complete set or that the tweet is still being retweeted along the network, thus increasing the noise. E. The best feature set The final set of experiment will verify which combination of the features set gives the best results. For this purpose all combinations of the features message time (time), number of friends (friends), number of followers (followers) and number of posts (posts) were tested using the RT2 dataset as the training data and all of the datasets as the test set. Table IV does not give us a clear winner on this com- bination, but we can see that the time and posts features do not seem to be discriminative regarding our data, while the followers attribute alone could achieve a very accurate result. By further inspection, the combination (friends, followers) was capable of obtaining a minimum error with a high coefficient of determination. As such, this will be the chosen attributes for the final model. It is interesting to notice that the time of the retweet is not an important factor to predict the retweet rate of a given user, suggesting that the retweet rate does not attenuate through time. So, in this model, the tweet will only stop being retweeted when it reaches users with a small number of followers. RT2 RT1 100 10−1 10−2 10−3 10−4 T R 10−1 10−2 10−3 10−4 10−5 T R 10−5 100 101 102 103 104 105 10−6 101 102 103 104 105 Friends RT3 Friends RT4 100 10−1 T R 10−2 10−3 10−1 10−2 10−3 10−4 10−5 T R 10−6 101 102 103 104 105 106 10−4 101 Friends 102 103 104 105 Friends Fig. 3. Correlation of Number of Friends with the measured β. RT1 100 10−1 10−2 10−3 10−4 T R RT2 10−1 10−2 10−3 10−4 10−5 T R 10−5 101 102 103 104 105 10−6 101 102 103 104 105 106 107 Followers RT3 Followers RT4 100 10−1 T R 10−2 10−3 10−1 10−2 10−3 10−4 10−5 T R The correlation of each feature with the measured β in log-scale is depicted in Figs. 3, 4, 5, 6. 10−6 101 102 103 104 105 106 107 108 10−4 101 102 103 104 105 106 107 Followers Followers From these figures we can confirm that the number of followers has the most well behaved correlation with the measured β followed by the number of friends. The number of posts has some correlation on the larger datasets and the time of retweet does not seem to have any correlation at all. Fig. 4. Correlation of Number of Followers with the measured β. RT1 100 10−1 T R 10−2 10−3 10−4 10−1 10−2 10−3 10−4 10−5 T R RT2 TABLE V. FINAL RESULTS OBTAINED FOR EACH DATASET. R2 MAE MSE RT1 RT2 RT3 RT4 RT5 0.852532 0.869640 0.919541 0.784082 0.975856 0.000872 0.000844 0.000452 0.002535 0.000208 0.000007 0.000004 0.000001 0.000030 0.000000 10−5 101 102 103 104 105 106 10−6 102 103 104 105 106 10−1 10−2 10−3 10−4 10−5 T R Posts RT3 Posts RT4 100 10−1 T R 10−2 10−3 10−6 102 103 104 105 106 10−4 102 103 104 105 106 Posts Posts Fig. 5. Correlation of Number of Posts with the measured β. RT2 β 0.12 0.10 0.08 β 0.06 0.04 0.02 0.00 0.07 0.06 0.05 0.04 0.03 0.02 0.01 0.00 True Predicted True Predicted RT1 User RT2 User RT1 100 10−1 10−2 10−3 10−4 T R 10−1 10−2 10−3 10−4 10−5 T R 10−5 100 101 102 103 104 105 10−6 100 101 102 103 104 105 106 10−1 10−2 10−3 10−4 10−5 T R Time RT3 Time RT4 100 10−1 T R 10−2 10−3 10−6 100 101 102 103 104 105 106 10−4 100 101 102 103 104 105 Time Time Fig. 6. Correlation of Time of Retweet with the measured β. F. The Diffusion Model Finally, by fitting the linear regression model with the selected subset of features, the rule to generate the RDN and the largest training set, we get the results in Table V. As we can see the goodness of fit is very high giving us a high confidence on the predictions. This can be verified by the low values of MAE and MSE. Fig. 7. True and predicted β for RT1 and RT2 datasets. True Predicted True Predicted β β 0.05 0.04 0.03 0.02 0.01 0.00 0.14 0.12 0.10 0.08 0.06 0.04 0.02 0.00 RT3 User RT4 User Fig. 8. True and predicted β for RT3 and RT4 datasets. A visual depiction of the model accuracy can also be seen in Figs. 7 and 8. As we can see from these plots, the fitted line is very close to the measured values, but underestimates some of the higher TABLE VI. DEPTH AND AVERAGE PATH LENGTH FOR EACH NETWORK. -- E -- REPRESENTS THE NUMBER OF EDGES. -- E -- Depth avg. path length RT1 RT2 RT3 RT4 RT5 821 2, 704 921 309 32 45 87 40 19 5 18.52 26.23 9.21 3.79 2.26 impact rates. The fitted line, after converted back from the log-scale, give us the following equation for β: β = F ollowers−0.77 × F riends−0.12. (4) This equation shows that the number of followers plays an important role to how much retweets a given user will get on average. With less impact, but still important, the number of friends also helps to measure the influence of such user. At this moment, the reader should have already notice that this model, although highly accurate, does not take into account the message being transmitted. So, in the Twitter Network, the messages are being spread regardless of their contents. One possible explanation can be found in the user behavior to choose its friends. A certain user will choose to follow someone who: is its friend in real life or tweets contents of interest. So the content of the message might play an important role on the network formation. Additionally, even though we can use this model to de- termine the fraction of the followers that will retweet your message, we still cannot state which users will most likely do so. This can be important in order to detect the path that a tweet will walk through the RDN and to estimate the depth of such network. The diameter and the average path length for every tree of our proposed model is reported in Tab. VI. From this table we can see that the depth of the information diffusion network is closely related to the number of retweets it received. In Fig. 9 we have plotted the estimated Pagerank of the seed user on the RDN and the depth of the obtained network in log-log scale. This graphic corroborate with our intuition that the pagerank of the seed user is related to the impact of the message diffusion. G. Related Work Although we cannot compare these results directly with different models, we can verify how successful other models were through the coefficient of determination. The most related work was done in [10] where the authors tracked the diffusion of a message through the mention of a particular user. The network was built by connecting two users, A and B, if user A has mentioned B on a similar topic that B tweeted about. After that, they ran a regression analysis trying to correlate the number of posts, number of mentions a user make, number of mentions an user receive, and some other related information. With these variables, the authors tried to predict when one user would mention another one, the number of connections a user will have in their netwrok and 102 101 h t p e D 100 10−2 10−1 Pagerank 100 Fig. 9. Correlation between pagerank of the seed user and the depth of the RDN. the diameter of the generated network. For the diameter and the time of mention they obtained a coefficient of determination below 0.1, while for the number of connections, closely related to our RT rate, obtained an R2 in the range of 0.15 to 0.41. In [8] they use a Passive-Agressive algorithm to classify whether a message will be retweeted or not. This algorithm that tries to learn a linear boundary between two classes. For this purpose, they used the following variables: number of friends, number of followers, number of posts, favorites, number of times the user was listed, whether the user is verified by Twitter, and if the user's language was English. Additionally, the added the number of hashtags of the tweet, number of mentions, trending words, length of tweet, novelty, if the tweet was a reply and the bag-of-words of the tweet. They measured the quality of their approach through the F1 score that calcu- lates the harmonic mean between the correct and incorrect classification. Their results cannot be compared directly with our approach, but their numerical results (F1 = 46.6) suggest that they still have a large margin of incorrect classification, while our approach is close to the true value (see Figs. 7 and8). Another related work was performed recently in [11] where the authors apply linear and non-linear regression models to predict a user impact score. The user impact was measured as the logarithm of the number of followers multiplied by the number of lists and divided by the number of friends. Then, they tried to predict this impact measure with different regression models using textual and non-textual attributes. The maximum obtained coefficient of determination for the non- linear regression was 0.78, lower then our average results. Also, closely related, in [12] the authors created a similar diffusion network by following three different rules: create and edge between the user who retweeted to the friend that tweeted last, create an edge between the user who retweeted REFERENCES [1] P. S. Dodds and D. J. Watts, "A generalized model of social and biological contagion," Journal of Theoretical Biology, vol. 232, no. 4, pp. 587 -- 604, 2005. [2] B. Pang and L. Lee, "Opinion mining and sentiment analysis," Foun- dations and trends in information retrieval, vol. 2, no. 1-2, pp. 1 -- 135, 2008. [3] E. M. Rogers, U. E. Medina, M. A. Rivera, and C. J. Wiley, "Complex adaptive systems and the diffusion of innovations," The Innovation Journal: The Public Sector Innovation Journal, vol. 10, no. 3, pp. 1 -- 26, 2005. [4] E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic, "The role of social networks in information diffusion," in Proceedings of the 21st international conference on World Wide Web. ACM, 2012, pp. 519 -- 528. [5] T. W. Valente, Network models of the diffusion of innovations. Hampton Press Cresskill, NJ, 1995, vol. 2, no. 2. [6] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social network or a news media?" in Proceedings of the 19th international conference on World wide web. ACM, 2010, pp. 591 -- 600. [7] W.-J. Bai, T. Zhou, and B.-H. Wang, "Immunization of susceptible -- infected model on scale-free networks," Physica A: Statistical Mechan- ics and its Applications, vol. 384, no. 2, pp. 656 -- 662, 2007. [8] S. Petrovic, M. Osborne, and V. Lavrenko, "Rt to win! predicting [9] message propagation in twitter." in ICWSM, 2011. J. B. Walther and K. P. DAddario, "The impacts of emoticons on message interpretation in computer-mediated communication," Social science computer review, vol. 19, no. 3, pp. 324 -- 347, 2001. J. Yang and S. Counts, "Predicting the speed, scale, and range of information diffusion in twitter." ICWSM, vol. 10, pp. 355 -- 358, 2010. [11] V. Lampos, N. Aletras, D. Preot¸iuc-Pietro, and T. Cohn, "Predicting and characterising user impact on twitter." Association for Computational Linguistics, 2014. [10] [12] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts, "Everyone's an influencer: quantifying influence on twitter," in Proceedings of the fourth ACM international conference on Web search and data mining. ACM, 2011, pp. 65 -- 74. and the friend that tweeted first, create an edge from the user who retweeted to every friend that tweeted that message, distributing the weight evenly. They reported the results just for the first rule, since they found that there was no significant difference among them. Then, they fitted their data with a Regression Tree Model using the same attributes described here combined with the average, minimum and maximum local and global influences. Local influence in this paper is the number of friends that retweeted a message, while global influence is the number of users of Twitter that retweeted such message. The measured output in this work was the global influence. They obtained a R2 of 0.98 regarding the most influent users and R2 of 0.34 when fitting just the least influent users. V. CONCLUSION In this paper we proposed a diffusion model for the retweet behavior of the Twitter network. This model is capable of predicting the rate of the followers of a given user that will retweet its messages. At first, a Retweet Diffusion Network was created by connecting the users with a relationship of who retweeted from who. Some edges of such network had to be estimated because of the lack of information provided by the Twitter application interface. Three proposals of estimation was evaluated and the most plausible was that a user will retweet a message from his friend with the smaller number of connections. After generating such network, the impact of each user was measured by the fraction of its followers that retweeted its message. This impact was fitted through a series of different linear regression models by using the user social network information such as: number of followers, number of friends, number of posts and time of the post. Since a power-law fit was observed regarding the degree distribution of the Diffusion Network, the regression model was performed on the logarithm of the parameters value and the desired output value. Some experiments were performed on 5 different networks with a varying number of nodes and edges starting from different seed users. The results showed that the combination of the number of followers and number of friends is capable of predicting the expected fraction of followers that will retweet a message from any given user. These results indicate that the content of the message has no influence on the immediate impact. The content must have a central role during the network formation (who follows who) and the path the message will take (who from the fraction of users will spread the message). The next steps of this research will try to evaluate the decision process that drives any given user to retweet a message, hopefully finding a model to predict the path a message will go through. If successful, it will be possible to predict the global impact of a tweet message and how to build a network to influence the desired audience. ACKNOWLEDGMENT This research was funded by FAPESP process number 2014/06331-1.
1610.08217
2
1610
2017-02-18T15:36:31
Assessing Percolation Threshold Based on High-Order Non-Backtracking Matrices
[ "cs.SI", "cond-mat.stat-mech", "physics.soc-ph" ]
Percolation threshold of a network is the critical value such that when nodes or edges are randomly selected with probability below the value, the network is fragmented but when the probability is above the value, a giant component connecting large portion of the network would emerge. Assessing the percolation threshold of networks has wide applications in network reliability, information spread, epidemic control, etc. The theoretical approach so far to assess the percolation threshold is mainly based on spectral radius of adjacency matrix or non-backtracking matrix, which is limited to dense graphs or locally treelike graphs, and is less effective for sparse networks with non-negligible amount of triangles and loops. In this paper, we study high-order non-backtracking matrices and their application to assessing percolation threshold. We first define high-order non-backtracking matrices and study the properties of their spectral radii. Then we focus on 2nd-order non-backtracking matrix and demonstrate analytically that the reciprocal of its spectral radius gives a tighter lower bound than those of adjacency and standard non-backtracking matrices. We further build a smaller size matrix with the same largest eigenvalue as the 2nd-order non-backtracking matrix to improve computation efficiency. Finally, we use both synthetic networks and 42 real networks to illustrate that the use of 2nd-order non-backtracking matrix does give better lower bound for assessing percolation threshold than adjacency and standard non-backtracking matrices.
cs.SI
cs
Assessing Percolation Threshold Based on High-Order Non-Backtracking Matrices Yuan Lin†‡, Wei Chen§, and Zhongzhi Zhang†‡ †School of Computer Science, Fudan University, Shanghai, China ‡Shanghai Key Laboratory of Intelligent Information Processing, Fudan University, Shanghai, China [email protected], [email protected], [email protected] §Microsoft Research, Beijing, China 7 1 0 2 b e F 8 1 ] I S . s c [ 2 v 7 1 2 8 0 . 0 1 6 1 : v i X r a ABSTRACT Percolation threshold of a network is the critical value such that when nodes or edges are randomly selected with prob- ability below the value, the network is fragmented but when the probability is above the value, a giant component con- necting a large portion of the network would emerge. As- sessing the percolation threshold of networks has wide appli- cations in network reliability, information spread, epidemic control, etc. The theoretical approach so far to assess the percolation threshold is mainly based on spectral radius of adjacency matrix or non-backtracking matrix, which is lim- ited to dense graphs or locally treelike graphs, and is less effective for sparse networks with non-negligible amount of triangles and loops. In this paper, we study high-order non-backtracking matrices and their application to assess- ing percolation threshold. We first define high-order non- backtracking matrices and study the properties of their spec- tral radii. Then we focus on the 2nd-order non-backtracking matrix and demonstrate analytically that the reciprocal of its spectral radius gives a tighter lower bound than those of adjacency and standard non-backtracking matrices. We fur- ther build a smaller size matrix with the same largest eigen- value as the 2nd-order non-backtracking matrix to improve computation efficiency. Finally, we use both synthetic net- works and 42 real networks to illustrate that the use of the 2nd-order non-backtracking matrix does give better lower bound for assessing percolation threshold than adjacency and standard non-backtracking matrices. Keywords percolation theory; percolation threshold; non-backtracking matrix; high-order non-backtracking matrix; information and influence diffusion 1. INTRODUCTION Percolation theory is a powerful statistical physics tool to describe information and viral spreading in social environ- ment [29, 16, 14], robustness and fragility of infrastructural or technological networks [5, 11, 8], among other things, and thus its impact spreads well beyond statistical physics and reaches computer science, network science and related ar- eas. Percolation is a random process independently occupy- ing sites (a.k.a. nodes) or bonds (a.k.a. edges) in a network with probability p (with probability 1− p the site or bond is removed). In particular, the bond percolation can be identi- fied to a special case of independent cascade model [23, 16]. In this paper, our discussion focuses on bond percolation, al- though similar approach applies to site percolation as well. As probability p increases from 0 to 1, the network is ex- pected to experience a phase transition from a large number of small connected components to the emergence of a gi- ant connected component, with the size proportional to the size of the network. The value p at this transition point is referred to as the percolation threshold. The percolation threshold can be used to assess the spreading power of a network from a topological point of view. For example, in studying epidemics in a social net- work, a small percolation threshold means that a virus is easy to spread in the network and infects a large portion of the network. Thus, many applications rely on the concept of percolation threshold, such as finding influential nodes in a social network [21, 18], facilitating or curbing propaga- tions [7, 6], and determining transmission rates in wireless networking [10, 1]. Therefore, it is crucial to have an accu- rate understanding of the percolation threshold in networks. However, since the exact percolation threshold for a gen- eral network is analytically difficult to obtain, these appli- cations rely on some theoretical estimates of the actual per- colation threshold. A commonly used theoretical estimate is the reciprocal of the largest eigenvalue λA (same as the spectral radius) of the network's adjacency matrix A (e.g. in [28, 3, 7, 6]). In particular, Bollob´as et al. show that this estimate is accurate for dense networks [3]. However, in sparse networks, it could be far off. For example, in a ring network (Fig. 1a), the real percolation threshold is 1, but its adjacency matrix has the largest eigenvalue 2, predicting the percolation threshold is 0.5. Recently, the reciprocal of the largest eigenvalue of the network's non-backtracking matrix [15, 12] is introduced as a better theoretical estimate of the percolation threshold. We defer its technical definition to Section 2, and give an intuitive explanation on the issue of the adjacency matrix that is addressed by the non-backtracking matrix. Let π be a vector, with πi representing the probability that node i is in the giant connected component, when every edge has a probability of p to be occupied. Let A be the adjacency matrix of the graph, and Ni be the set of neighbors of i. pπj, which approximately represents that i could connect to the giant component through one of its neighbors j (with probabil- ity pπj). Thus it should be the same as πi, and in matrix form, we have pAπ = π. This suggests that 1/p should be at most λA, i.e. 1/λA is a lower bound of the percolation threshold. However, for every edge (i, j) in the network, the above approximation considers both that i may rely on j to The i-th entry of pAπ satisfies [pAπ]i =(cid:80) j∈Ni (cid:104)d(cid:105)) [9, 5]. Here, (cid:104)d(cid:105) and (cid:104)d2(cid:105) are separately the first and the second moments of the degree distribution. This estimation is less predictive for real networks where degree correlations appear. Bollob´as et al. [3] show that the percolation threshold of dense graph is reciprocal of the largest eigenvalue of the ad- jacency matrix. However, the conclusion requires restrictive conditions for the networks. Especially for sparse networks, this estimation can be only regarded as providing a lower bound for the true percolation threshold. [15] and Hamilton et al. Since a lot of realistic networks are sparse, Karrer et al. [12] simultaneously propose that the reciprocal of the largest eigenvalue of the non- backtracking matrix is a tighter lower bound for bond and site percolation threshold, respectively, on sparse networks. This prediction is based on a message passing technique and obtained by heuristic equations and approximations on lo- cally treelike structures. Radicchi [25] further presents a mapping between the site and bond percolation to math- ematically verify the predicted bond and site percolation thresholds are identical in this method. Although the esti- mation based on the non-backtracking matrix is more pre- cise than that based on the adjacency matrix, it is still not close enough to the true percolation threshold on many real networks [26], since it suffers from the limitation of the tree- like assumption. Radicchi et al. [27] also derives an alterna- tive matrix of the non-backtracking matrix based on triangle elimination to improve the estimate for the site percolation threshold. However, this alternative matrix would overshoot on bond percolation. That means this estimate may over- estimate the percolation threshold, leading it no longer pro- vides a lower bound for the bond percolation threshold. 2. PRELIMINARIES We consider a finite connected undirected graph G = (V,E) with N nodes and E edges, where V = {1, 2,··· , N} is the set of N nodes and E = {(i, j) i, j ∈ V} is the set of E edges. The connectivity between nodes in G is described by an adjacency matrix A, in which the element aij = 1 if (i, j) ∈ E, and aij = 0 otherwise. We assume that G has no self-loops, i.e. aii = 0 for all i ∈ V. Henceforth, the ad- jacency and non-backtracking matrices are all refer to this graph G, when the context is clear. The bond percolation model is only controlled by one pa- rameter, bond occupation probability p. That means, in a network G, each edge is independently occupied with proba- bility p. The percolation clusters are sets of nodes connected only by occupied edges. For p = 0, no edge is occupied so that there are N isolated clusters of size one. For p = 1, all edges are occupied and all nodes compose a single cluster of size N . At intermediate values of p, the network undergoes two different phases: the non-percolating phase, where all clusters have microscopic size; the percolating phase, where a single macroscopic cluster (the giant component), whose size is comparable to the entire network, is present. The percolation threshold pc is the value above which the giant cluster appears; below pc there are only small clusters. The transition can be monitored through two primary quantities of interest, the relative sizes of the first and sec- ond largest clusters with respect to the size of the network, denoted by S1(p) and S2(p), respectively. In order to evalu- ate percolation threshold numerically, there are many differ- ent estimates for pc being proposed, such as the occupation (a) ring network (b) triangle ring network Figure 1: Illustrations of the ring network and the triangle ring network. connect to the giant component and j may rely on i, but the two cases should not jointly occur. Therefore, the esti- mate by 1/λA inflates the probability that a giant compo- nent emerges and underestimates the percolation threshold. The non-backtracking matrix addresses this issue by disal- lowing such directed circular dependency between a pair of nodes on an edge. In non-treelike graphs, However, non-backtracking matrix only works well in lo- cally treelike graphs. it provides a lower bound, bot not as close as the true percolation threshold. As suggested by the famous small-world network study [30], a significant amount of triangles exist in many real networks. The non-backtracking matrix does not elimi- nate the circular dependency through triangles or other local structures, and thus it may still underestimate the percola- tion threshold. For example, in the triangle ring network in Fig. 1b, the real percolation threshold is 1, but the the- oretical estimates by the adjacency and non-backtracking matrices are 0.3333 and 0.5523, respectively. In this paper, we extend the idea of the non-backtracking matrix to define high-order non-backtracking matrices. We first define the high-order non-backtracking matrices and study the evolution of their largest eigenvalue with respect to order (Section 3). Then, we propose that the reciprocal of the largest eigenvalue of the 2nd-order non-backtracking matrix can provide a better estimate for the percolation threshold in an arbitrary network, because it eliminates the circular dependency from triangles (Section 3). We further provide an alternative matrix sharing the same largest eigen- value but with substantially smaller size to improve com- putation efficiency. Finally, we conduct extensively experi- ments on both the forest fire model and 42 real networks to demonstrate the effectiveness of our method (Section 5). To summarize, our contributions include: (i) proposing the high-order non-backtracking matrices and studying their eigenvalue properties; (ii) establishing a more precise theo- retical estimation for bond percolation threshold and find- ing a faster approach to evaluate it; and (iii) supporting our analysis by empirical evaluations on synthetic and real networks. 1.1 Related Work For random degree-uncorrelated network models, the per- colation threshold can be approximated as (cid:104)d(cid:105)/((cid:104)d2(cid:105) − probability corresponding to the maximal value of S2(p), the peak position of the empirical variance of S1(p) and the average size of clusters except the largest one [26]. In this paper, we determine the best empirical estimate for perco- lation threshold as the value of p where the second largest cluster reaches its maximum, namely pc = arg{max p S2(p)}. (1) In the following, we will compare it with theoretical ap- proaches to check their validity. The first theoretical estimate is based on the adjacency matrix. Bollob´as et al. [3] show that for percolation on dense networks, the percolation threshold can be given by pc = 1 λA , where λA is the largest eigenvalue of matrix A, which is also the spectral radius of A.1 Although this estimate provides a good prediction for percolation threshold on networks with high density of connections, it becomes less precise on sparse networks. Since a lot of realistic networks are sparse, a new estimate based on non-backtracking matrix [13, 17] is proposed to give a better prediction. For any undirected network G, we can transform it to a directed one through replacing each undirected edge (i, j) by two directed ones i → j and j → i. The non-backtracking matrix, denoted by B, is a 2E × 2E matrix with rows and columns indexed by directed edges i → j and entries are given by Bi→j,k→l = δjk(1 − δil), where δij is the Kronecker Delta Function (δij = 1 if i = j, and 0 if i (cid:54)= j). In other words, for any two directed edges i → j, j → k, Bi→j,j→k = 1 if k (cid:54)= i, and thus Bi→j,j→k records the walk from i to j and continuing to k but not backtracking to i. Under the locally treelike assumption, which means that the local neighborhood of a node is close to a tree without redundant paths, the reciprocal of the largest eigenvalue of B provides a close lower bound for sparse net- works [15, 12], namely pc ≥ 1 λB , and pc ≈ 1 λB . As already mentioned in the introduction, the non- backtracking matrix relies on the approximation of the lo- cally treelike structure and it does not eliminate triangle dependency, and thus it may not give a tight lower bound of the bond percolation threshold. In the following, we propose a more powerful tool, high-order non-backtracking matrices, to better estimate bond percolation threshold. 3. HIGH-ORDER NON-BACKTRACKING MATRICES In this section, we first introduce the definition of high- order non-backtracking matrices, and then investigate their properties. 1In this paper, every matrix we consider is non-negative, and thus by the Perron-Frobenius Theorem [20], its largest eigenvalue is a non-negative real number, in which case it is the same as its spectral radius, which is defined as the largest modulus of the (possibly complex) eigenvalues. In a network G, let i1 → i2 → ··· → ig+1 stand for a length-g directed path composed by g + 1 different nodes i1, i2,··· , ig+1, obeying aikik+1 = 1 (1 ≤ k ≤ g). For the sake of saving space, we use i1i2 ··· ig+1 to stand for length- g directed path in place of i1 → i2 → ··· → ig+1. Let Pg be the number of length-g directed paths in G. Then, we define the g-th-order non-backtracking matrix as follows: Definition 1. The g-th-order non-backtracking matrix B(g) is a Pg × Pg matrix with rows and columns indexed by length-g directed paths. The elements in B(g) are g+1(cid:89) k=2 B(g) i1i2···ig+1,j1j2···jg+1 = ai1j1 (1 − δi1jg+1 ) δikjk−1 . (2) 123,234 = 1, while B(2) i1i2···ig+1,i2i3···ig+2 for each length-(g + 1) directed path, = 1; and all other In other words, i1i2 ··· ig+2, we have B(g) entries of B(g) have value 0. For example, if 123, 234, 345, and 231 are all length-2 directed paths in a graph, then B(2) = 0. We can regard matrix B(g) as encoding the relations between length-g directed paths in G. It also describes a kind of non- backtracking walks with memory, avoiding going back to a node visited in the recent g steps. It is easy to verify that the standard non-backtracking matrix is B = B(1), and ad- jacency matrix A = B(0) (ai1j1 in Eq. (2) is explicitly for the case of g = 0). = B(2) 123,345 123,231 Let λ(g) B be the largest eigenvalue of B(g). By the Perron- Frobenius Theorem [20], λ(g) B is real and non-negative, and it is zero only when the directed graph with the adjacency matrix equal to B(g) is a directed acyclic graph (DAG). We now study the properties of λ(g) B as g changes. A simple cycle in graph G is a closed path with no repetitions of nodes and directed edges allowed, except the repetition of the starting and ending nodes. To maintain a consistent terminology, henceforth, all cycle means a simple cycle. The result is given in the following theorem: Theorem 1. The g-th-order non-backtracking matrix (i) The largest eigenvalue of B(g) is non-increasing with B(g) satisfies the following properties: respect to g, i.e., for every g = 1, 2, 3,··· , λ(g−1) G. Then λ(g) (cid:96) in G, then λ((cid:96)−2) (ii) Let (cid:96) be the length of the longest simple cycle in graph (iii) For any (cid:96) ≥ 3, if there is no simple cycle with length B = 0 for all g ≥ (cid:96) − 1. = λ((cid:96)−1) ≥ λ(g) B . B . B B In order to prove Theorem 1, we first present some related notations and lemmata. The g-th-order non-backtracking matrix B(g) of network G can be regarded as the adja- cency matrix of a directed network G(g) = (V (g),E (g)), where V (g) = {u u is a length-g directed path}, and E (g) = {u → v u, v are two length-g directed paths and B(g) u,v = 1}. Note that when g = 0, G(0) = G (considering G as a symmetric di- rected graph). The line graph of G(g) is ¯G(g) = ( ¯V (g), ¯E (g)), where ¯V (g) = E (g) and ¯E (g) = {α → β α = (u, v) and β = (v, w) are two different edges u → v and v → w in E (g).}. Let ¯B(g) denote the adjacency matrix of the line graph ¯G(g), with elements ¯B(g) u→v,p→q = δvp, where u, v, p and q are length-g directed paths with u → v, p → q ∈ E (g). In other words, we can recast definition of ¯B(g) as g+2(cid:89) k=2 ¯B(g) i1i2···ig+2,j1j2···jg+2 = δikjk−1 . Lemma 1. G(g) can be obtained by deleting all edges in all length-(g + 1) cycles in ¯G(g−1). Proof. For each edge u → v (u = i1i2 ··· ig and v = i2 ··· igig+1) in G(g−1), it must correspond to a length- g directed path i1 ··· igig+1 in G. On the other hand, each length-g directed path also corresponds to an edge in G(g−1). Thus, V (g) = E (g−1) = ¯V (g−1) if we identify i1i2 ··· ig → i2 ··· igig+1 with i1 ··· igig+1, i.e., the node set of ¯G(g−1) is identical to the node set of G(g). More- over, for every edge in G(g), i1i2 ··· ig+1 → i2 ··· ig+1ig+2, it is also an edge in ¯G(g−1), implying E (g) ⊆ ¯E (g−1). For an arbitrary edge in ¯E (g−1) \ E (g), it must have a form as i1i2 ··· ig+1 → i2 ··· ig+1i1, and there must be g other edges with the same form together composing a length-(g + 1) cy- cle in ¯G(g−1), namely i1i2 ··· ig+1 → i2 ··· ig+1i1 → ··· → ig+1i1 ··· ig → i1i2 ··· ig+1. Moreover, for any length-(g + 1) cycle in ¯G(g−1), it must be of the above form. If not, then it involves an edge of form i1i2 ··· ig+1 → i2 ··· ig+1ig+2 with ig+2 (cid:54)= i1, the cycle must be of length at least g + 2, because we have g + 2 different original nodes i1, . . . , ig+2 in the cy- cle, and each edge in the cycle only removes one head node and adds one tail node, and thus it needs at least g + 2 edges to go through every original node once and comes back to i1i2 ··· ig+1. Together, we know that by exactly removing all edges in all length-(g + 1) cycles in ¯G(g−1), we obtain G(g). The next lemma is a known result saying that when we remove edges from a graph, the largest eigenvalue of the adjacency matrix will not increase. Lemma 2 (Proposition 3.1.1 of [4]). For the adja- cency matrix A of a graph G, if A(cid:48) is a matrix obtained by replacing some of the 1's in A with 0, then we have (3) where λA(cid:48) and λA are the largest eigenvalue of A(cid:48) and A, respectively. λA(cid:48) ≤ λA, For convenience, we give an independent proof of Lemma 2 in Appendix ??. We are now ready to prove Theorem 1. Proof of Theorem 1. (i) For a directed graph G and its line graph, Pako´nski et al. [24] show that their spectra excluding the possible eigenvalue zero are exactly the same. Therefore, we have λ(g−1) B = ¯λ(g−1) B , B is the largest eigenvalue of matrix ¯B(g−1). where ¯λ(g−1) According to Lemma 1, G(g) have the same node set as ¯G(g−1), and G(g) can be obtained by removing edges in length-(g + 1) cycles in ¯G(g−1). Thus, applying Lemma 2, we attain the conclusion that λ(g−1) B = ¯λ(g−1) B ≥ λ(g) B . (ii) We first claim that, G(g) is a DAG for all g ≥ (cid:96) − 1. If not, there are k (k ≥ g + 2) length-g directed paths in G(g), i1i2 ··· ig+1, i2i3 ··· ig+2, . . . , iki1 ··· ig, constituting a cycle in G(g). Then there must be a length-k cycle composed by i1, i2,··· , ik in G. Since g ≥ (cid:96)−1, we have k ≥ (cid:96)+1, implying that there is at least one cycle in G with length larger than (cid:96), which contradicts to the assumption that the length of the largest cycle in G is (cid:96). Thus, network G(g) is a DAG. It is easy to verify that the adjacency matrix of a DAG has the normal form where all block matrices on the diagonal are one-dimensional matrices with value 0, and thus all its eigenvalues are 0. Therefore λ(g) By Lemma 1, graph G((cid:96)−1) is obtained by removing all length- (cid:96) cycles in ¯G((cid:96)−2). Similar to the argument in the proof of Lemma 1, every length-(cid:96) cycle in ¯G((cid:96)−2) has the form i1i2 ··· i(cid:96) → i2 ··· i(cid:96)i1 → ··· i(cid:96)i1 ··· i(cid:96)−1 → i1i2 ··· i(cid:96). Then every such cycle corresponds to a length-(cid:96) simple cycle in the original graph G, i1 → i2 → ··· i(cid:96) → i1. By assumption G has no length-(cid:96) simple cycles, thus it implies that ¯G((cid:96)−2) is the same as G((cid:96)−1). Since the line graph shares the same non-zero eigenvalues as the original graph [24], we know that λ((cid:96)−1) = λ((cid:96)−2). B = 0 for all g ≥ (cid:96) − 1. (iii) Consider the line graph of G((cid:96)−2), ¯G((cid:96)−2). 4. ESTIMATING PERCOLATION THRESHOLD BY 2ND-ORDER NON- BACKTRACKING MATRIX In this section, we show that the reciprocal of the largest eigenvalue of the 2nd-order non-backtracking matrix gives a lower bound on the bond percolation threshold. According to Theorem 1, it implies that this lower bound is tighter than the previous proposed analytical lower bounds using the reciprocal of the adjacency matrix or the standard non- backtracking matrix. We then show that we can replace the 2nd-order non-backtracking matrix with a substantially smaller matrix sharing the same largest eigenvalue to im- prove computation efficiency. 4.1 Derivation of Lower Bound Our derivation follows the message passing techniques proposed in [15, 12], which involves first-order analysis (ig- noring higher-order terms) and heuristic equations on locally treelike graphs. Henceforth, we denote percolation threshold predicted by the adjacency matrix, non-backtracking matrix and 2nd-order non-backtracking matrix as p(0) c and p(2) c , respectively. c , p(1) Let πi be the probability that node i belongs to the giant connected component, where the random events are that each edge in G is independently occupied with probability p.2 Let θi→j→k be the probability that node i connects to the giant component following path i → j → k, where i, j, k are all different nodes. Then, we can construct the following 2Technically, a giant connected component is a component of size Θ(n), where n is the size of the graph, and thus Θ(n) is only meaningful when we have a series of graphs with n goes to infinity. The argument in this section does not take this techical route, and instead it follows the heuristic argument approach as in [15, 12]. relation for bond percolation: πi = 1 − (cid:89) j→k j∈Ni,k(cid:54)=i (1 − θi→j→k), (4) Then, the expected size of the giant component can be given by N(cid:88) S1(p) = πi. i=1 In a finite-size network, there is a drastic change for S1(p) at the percolation threshold pc. Next, we focus on predicting the value of pc. According to the definition of quantity θi→j→k, we can construct recursive relations, which is appropriate for locally treelike structures with triangles: θi→j→k = 1 − (cid:89) (cid:96)∈Nk\{i,j} (1 − p · θj→k→(cid:96)). (5) The above heuristic equation intuitively means that, node i connects to the giant component through at least one of the paths j → k → (cid:96), and i connects to j with probabil- ity p while j connects to the giant component through path j → k → (cid:96) with probability θj→k→(cid:96). The equation is ap- proximately accurate when the local neighborhood of i is close to a tree without redundant paths, except that we al- low triangles such as i → j → k → i, since the equation requires (cid:96) (cid:54)= i, excluding such triangles. When we ignore p2 and higher order terms in Eq. (5), we obtain (cid:88) θi→j→k = p θj→k→(cid:96), (cid:96)∈Nk\{i,j} which can be recast in matrix notation as θ = pB(2)θ, where θ is a vector in which elements indexed by length-2 directed paths. When p ≥ pc, percolation happens, and θ should be a non-negative vector with some strictly positive entries. (It holds when length of the largest cycle is at least 4.) But if pc < 1/λ(2) B , it means we could have an eigenvalue of 1/pc > λ(2) B . Therefore, we have B , violating the definition of λ(2) pc ≥ p(2) c = 1 λ(2) B . c ≥ p(1) Theorem 1 theoretically guarantees p(2) c ≥ p(0) c , so that p(2) c provides a tighter lower bound for percolation threshold than the ones provided by the adjacency and stan- dard non-backtracking matrices. Moreover, consider the ex- ample of triangle ring network shown in Figure 1b, it is easy to obtain λ(2) B = 1, which is consistent with the true percolation threshold. Compared with esti- mates p(0) exhibits remarkable improvement in precision. B = 1 and p(2) c = 1/λ(2) c and p(1) c , p(2) c The reason why p(2) can be heuristically explained as follows. c provides better prediction of pc than p(1) In the esti- c mation based on non-backtracking matrix, it only consid- ers the probability node i connects to the giant component through node j, which can be denoted as θi→j. If there is a triangle composed by nodes i, j and k in the network, θi→j grows as θj→k increases. Similarly, θj→k increases with θk→i, and θk→i increases with θi→j. This creates a triangu- lar dependency which artificially inflates the values of θi→j, θj→k, and θk→i, leading to a higher estimate of the probabil- ity of giant component emergence and a lower estimate on the percolation threshold. When triangles are abundant, as evidenced by the small-world research on many real-world networks [30], using the standard non-backtracking matrix may still significantly underestimate the percolation thresh- old. By using the 2nd-order non-backtracking matrix, we avoid the triangular dependency, so that p(2) is more precise than p(1) c . c c Although p(2) is a tighter lower bound, the size of B(2) is usually larger than B, leading to higher computation com- plexity. In the following we provide a further technique to tackle this problem. 4.2 Improving Computation Efficiency In this subsection, we illustrate that we can transfer the task of computing eigenvalues of B(2) to calculating eigen- values of a new matrix M , defined as  B(1) −∆B2 D∆ − I B(1) − ∆B1  . M = (6) I 0 0 0 I 0 0 0 I 0 0 0 Here, M is a square matrix of dimension 8E × 8E composed of 16 2E × 2E blocks, whose size is evidently smaller than B(2). Matrix ∆B1 and ∆B2 have identical size with B(1) and their elements are defined as (cid:40) (cid:40) (∆B1)i→j,k→(cid:96) = and (∆B2)i→j,k→(cid:96) = 1, 0, 1, 0, i→j,k→(cid:96) = 1, ai(cid:96)B(1) otherwise. δi(cid:96)aijajkak(cid:96) = 1, otherwise, respectively. The matrix D∆ is a 2E × 2E diagonal matrix and its element (D∆)i→j,i→j equals the number of triangles containing edge (i, j). Theorem 2. The set of non-zero eigenvalues of matrix M defined in Eq. (6) consists of all non-zero eigenvalues of the 2nd-order non-backtracking matrix B(2) and possibly eigenvalues −1, (1 + 3i)/2 and (1 − √ √ 3i)/2. Proof. The proof will include two parts. First, we prove that every non-zero eigenvalue of B(2) corresponds to an eigenvalue of M . Second, we elaborate that every non-zero eigenvalue of M equals to one of eigenvalues of B(2), except possible eigenvalues −1, (1 + 3i)/2 and (1 − √ 3i)/2. √ (i) Let λ be an arbitrary non-zero eigenvalue of B(2) and ψ be its corresponding eigenvector. According to the definition of the 2nd-order non-backtracking matrix, we have λψi→j→k = B(1) j→k,k→lψj→k→(cid:96). (7) (cid:96)∈Nk\{i,j} In order to show each non-zero eigenvalue of B(2) is also an eigenvalue of M , we first introduce two related quantities: (cid:88) (cid:88) xi→j = B(1) i→j,j→kψi→j→k (8) k∈Nj\{i} and (cid:88) k∈Nj\{i} yi→j = Here, Eq. (8) is used. Utilizing Eq. (7) again, the second term of r.h.s of Eq. (14) can be represented as B(1) i→j,j→kB(1) j→k,k→iψi→j→k. (9) 1 λ B(1) i→j,j→kB(1) j→k,k→iψj→k→i Let x and y be vectors with elements xi→j and yi→j, re- spectively. We claim that x and y satisfies the following two relations: x = 1 λ B(1)x − 1 λ2 ∆B2x + 1 λ3 D∆x − 1 λ3 y (10) = = and y = 1 λ ∆B1x − 1 λ2 ∆B2x + 1 λ3 D∆x − 1 λ3 y, (11) k∈Nj∩Ni k∈Nj∩Ni k∈Nj∩Ni (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) (cid:88) k∈Nj∩Ni k∈Nj∩Ni 1 λ2 − 1 λ2 1 λ2 − 1 λ3 + 1 λ3 k∈Nj∩Ni (cid:88) (cid:96)∈Ni\{k} (cid:88) (cid:96)∈Nj\{i} B(1) i→j,j→kB(1) j→k,k→i B(1) k→i,i→(cid:96)ψk→i→(cid:96) B(1) i→j,j→kB(1) j→k,k→iB(1) k→i,i→jψk→i→j B(1) i→j,j→kB(1) j→k,k→ixk→i B(1) i→j,j→kB(1) j→k,k→i B(1) i→j,j→(cid:96)ψi→j→(cid:96) B(1) i→j,j→kB(1) j→k,k→iψi→j→k which will be proved latter. Combining Eq. (10) and Eq. (11), we can obtain x − y = 1 λ (B(1) − ∆B1)x, which indicates y = (cid:18) I − 1 λ B(1) + 1 λ (cid:19) ∆B1 x. (12) = 1 λ2 k∈Nj∩Ni B(1) i→j,j→kB(1) j→k,k→ixk→i − ∆i→j λ3 xi→j + 1 λ3 yi→j, (16) where ∆i→j is the number of length-3 loops starting from edge i → j. Inserting Eq. (15) and Eq. (16) into Eq. (14), we have Plugging Eq. (12) into Eq. (10) yields xi→j = 1 λ B(1) i→j,j→kxj→k (cid:88) (cid:88) k∈Nj\{i} − 1 λ2 B(1) i→j,j→kB(1) j→k,k→ixk→i k∈Nj∩Ni λ3 xi→j − 1 ∆i→j + λ3 yi→j. x = 1 λ + B(1)x − 1 λ2 ∆B2x + λ4 (B(1) − ∆B1)x. 1 1 λ3 (D∆ − I) x (13) Based on Eq. (13), we establish M z = λz, Recasting Eq. (17) in matrix notation, we can obtain Eq. (10). Proof of Eq. (11). Analogously, substituting Eq. (7) into where z = (x(cid:62), 1 eigenvalue of B(2) corresponds to an eigenvalue of M . λ3 x(cid:62))(cid:62). Thus, every non-zero λ2 x(cid:62), 1 Proof of Eq. (10). Plugging Eq. (7) into Eq. (8), we have xi→j = 1 λ B(1) i→j,j→k B(1) j→k,k→(cid:96)ψj→k→(cid:96) λ x(cid:62), 1 (cid:88) (cid:88) k∈Nj\{i} k∈Nj∩Ni − 1 λ B(1) i→j,j→kB(1) j→k,k→iψj→k→i. (14) Eq. (9), yi→j can be represented as yi→j = 1 λ B(1) i→j,j→kB(1) j→k,k→i B(1) j→k,k→(cid:96)ψj→k→(cid:96) (cid:88) (cid:88) k∈Nj\{i} (cid:88) (cid:96)∈Nk\{j} − 1 λ k∈Nj\{i} B(1) i→j,j→kB(1) j→k,k→iψj→k→i.(17) In the r.h.s of Eq. (14), the first term can be rewritten as The first term in r.h.s of Eq. (17) can be further expressed as (cid:88) (cid:96)∈Nk\{j} (cid:88) (cid:88) (cid:88) k∈Nj\{i} 1 λ 1 λ = B(1) i→j,j→k B(1) j→k,k→(cid:96)ψj→k→(cid:96) k∈Nj\{i} (cid:96)∈Nk\{j} B(1) i→j,j→kB(1) j→k,k→i B(1) i→j,j→kxj→k. (15) = B(1) i→j,j→kB(1) j→k,k→ixj→k. (cid:88) (cid:88) k∈Nj\{i} k∈Nj\{i} 1 λ 1 λ (cid:88) (cid:96)∈Nk\{j} B(1) j→k,k→(cid:96)ψj→k→(cid:96) (18) Instituting Eq. (16) and Eq. (18) into Eq. (17), one has yi→j = 1 λ B(1) i→j,j→kB(1) j→k,k→ixj→k (cid:88) (cid:88) k∈Nj\{i} − 1 λ2 B(1) i→j,j→kB(1) j→k,k→ixk→i k∈Nj\{i} λ3 xi→j − 1 ∆i→j + λ3 yi→j, which can be recast in matrix form to obtain Eq. (11). √ 3i)/2 and (1 − √ (ii) Now, we prove that every non-zero eigenvalue of M equals to one of eigenvalues of B(2), except possible eigenval- ues −1, (1 + 3i)/2. Let λ be an arbitrary non-zero eigenvalue of M and z = (x(cid:62), 1 λ3 x(cid:62))(cid:62) be its corresponding eigenvector. According to Eq. (7) and Eq. (8), we have λ2 x(cid:62), 1 λ x(cid:62), 1 λψi→j→k = xj→k − ψj→k→i, i ∈ Nk xj→k, i /∈ Nk. (19) (cid:40) (a) burning probability 0.01 (b) 5000 nodes Figure 2: Empirical and theoretical estimates of the percolation threshold on the forest fire model. √ 3i)/2 or (1 − √ (a) scatter plot (b) cumulative distribution of rel- ative errors 3i)/2, Figure 3: Test results of empirical and theoretical percolation thresholds on 42 real-world networks. . (20) We use the peak value of the second largest component (Eq. (1)) as the ground truth of the bond percolation thresh- old pc. For each network, the value of the empirical ground truth pc is computed by 1000 independent Monte Carlo sim- ulations of the percolation process as proposed by Newman and Ziff [22]. (λ2xj→k − λxk→i + xi→j), i ∈ Nk . (21) 5.1 Forest Fire Model Thus, for the case of nodes i, j and k constituting a triangle, we can establish the following equations:  λψi→j→k + ψj→k→i = xj→k λψj→k→i + ψk→i→j = xk→i λψk→i→j + ψi→j→k = xi→j . When λ3 + 1 (cid:54)= 0, i.e. λ (cid:54)= −1, (1 + we have solutions as 1 ψi→j→k = (λ2xj→k − λxk→i + xi→j) (λ2xk→i − λxi→j + xj→k) (λ2xi→j − λxj→k + xk→i) λ3 + 1 1 λ3 + 1 1 λ3 + 1 ψj→k→i = ψk→i→j =  Combining Eq. (19) and Eq. (20), we have  1 λ3 + 1 xj→k, i /∈ Nk 1 λ ψi→j→k = Thus, for any non-zero eigenvalue λ of M except −1, (1 + √ 3i)/2 and (1 − √ 3i)/2, it satisfies B(2)ψ = λψ, and the values of elements in ψ can be determined by Eq. (21). Exploiting Theorem 2, we give an approach to save time and space cost for computing p(2) c . In particular, the num- bers of edges and length-2 directed paths in a network G i=1 di(di − 1), respec- are E = 1 2 tively, where di is the degree of node i. Thus, we re- duce the size of the matrix to be computed by a factor of (cid:80)N i=1 di and P2 = (cid:80)N i=1 di)/(4(cid:80)N i −(cid:80)N i=1 di) ≈ (cid:104)d2(cid:105)/(4(cid:104)d(cid:105)). ((cid:80)N i=1 d2 5. EXPERIMENTS In this section, we empirically investigate the validity of our theoretical estimate for bond percolation threshold. First, we compare p(2) c with other theoretical indicators p(1) and p(0) on a class of synthetic networks generated by the forest fire model [19]. Next, we perform extensive experi- ments on 42 real networks to further explore the performance of these estimations. c c The forest fire model [19] is a family of evolutionary net- works, controlled by burning probability q. We denote the network at time t as Gt. Initially (t = 1), there is only one node in G1. At time t > 1, there is a new node u joining the network Gt−1 and generating Gt. The node u establishes connections with other existing nodes through the following process: (1) Node u first selects an ambassador node v in Gt−1 uniformly at random and connects to it. (2) We sample a random number a ∈ (0, 1]. If a ≤ q, node u randomly chooses a neighbor of v, which is not connected to u yet, and forms a link to it. Then repeat this step. If a > q, this step ends and we label all nodes linking to u at this step as w1, w2,··· , wk; (3) Let w1, w2,··· , wk sequentially be the ambassador of node u and apply step (2) for each of them recursively. A node in the process should not be visited a second time. The generation process of the forest fire model describes new nodes joining social networks with an epidemic fashion. In addition, forest fire model shares a number of remarkable structural features with real networks, such as densification and shrinking diameters [19]. Thus, studying percolation on the forest fire model can enhance our understanding of spreading in realistic systems. 02000400060008000100000.00.20.40.60.81.0 p(0)c p(1)c p(2)c pcPercolation ThresholdNumber of Nodes0.000.020.040.060.080.100.00.20.40.60.81.0 p(0)c p(1)c p(2)c pcPercolation ThresholdBurning Probability0.010.110.010.11 p(0)c p(1)c p(2)cPredicted Percolation ThresholdSimulated Percolation Threshold0.00.20.40.60.81.00.00.20.40.60.81.0Cumulative DistributionRelative Error p(0)c, AUC=0.6854 p(1)c, AUC=0.7685 p(2)c, AUC=0.7969 (a) relative errors vs. empirical estimates (b) relative errors vs. average degrees (c) relative errors vs. categories Figure 4: Relative errors of theoretical percolation thresholds on 42 real-world networks. We first consider a case that the burning probability is very small, so that the network Gt is sparse. In Figure 2a, we plot bond percolation threshold estimated by different approaches during the evolution of a forest fire model with q = 0.01. It shows that along with the growth of the net- work, the empirical estimate tends to 0.901. The predicted percolation thresholds based on the adjacency and non- backtracking matrices tend to 0.210 and 0.495, respectively, which are far from the empirical estimate. Although p(1) performs better than p(0) in sparse networks, the appearance of triangle structures largely weakens its effectiveness. The estimation based on the 2nd-order non-backtracking matrix shows remarkable improvement. At the end of the evolution, p(2) tends to 0.778, which corresponds to an improvement c of roughly 30% from p(1) is evidently more precise than p(1) for sparse networks with triangles. c . It indicates p(2) c c c c Next we test the impact of burning probability on our in- dicator. In Figure 2b, we show the percolation threshold given by the theoretical and simulated estimations versus burning probability on forest fire model with 5000 nodes. Each value is the average of 100 networks. We observe that, along with the growth of the burning probability, the empir- ical percolation threshold decreases, because of the increase of the number of edges. For the theoretical indicators, it is not surprising that p(2) always performs better than p(1) and p(0) c , especially in the regime of small burning probabil- ity. However, as burning probability becomes large, the pre- cision of p(2) c ,p(1) c decreases. In addition, the values of p(0) and p(2) are getting close. This is because the growth of the burning probability introduces more and more simple cycles with length larger than 3, which would lead to over- estimating probability θi→j→k for i → j → k in such a cycle. Thus, p(2) c becomes less effective in predicting the percola- tion threshold. 5.2 Real Networks c c c c c For the purpose of better understanding the predictive power of different theoretical estimations in real networks, we evaluate bond percolation threshold predicted by p(0) c , p(1) c , p(2) and simulations on 42 real networks. The dataset includes social, infrastructural, animal and biological net- works, which exhibit various topological properties, with size from 23 to 4941. In Table 1, we report the theoreti- cal and empirical estimations for bond percolation threshold on the 42 real networks. All networks are treated as undi- rected unweighted networks. We only consider the largest connected component in each network. All datasets are from the Koblenz Network Collection (http://konect.uni- koblenz.de/). In Appendix ??, we display the structural information and c c c , p(1) and p(2) detailed results for each network. Figure 3a reports values of p(0) is always closer to the empirical estimate than p(1) as functions of the empirical estimate for all 42 networks. It shows that p(2) and c p(0) c , which is in agreement with our theoretical analysis. In addition, we observe that there are some networks on which p(2) is not c always close enough to the empirical estimate, especially on networks in the regime of large percolation threshold. can attain the empirical estimate. However, p(2) c c Next, we continue to quantitatively analyze how much im- provement our proposed method attains. We define relative error of the theoretical estimate as (pc − p(α) )/pc (α = 0, 1 or 2). Then, we plot cumulative distribution of relative er- rors of p(2) in the collection of 42 networks, as shown in Figure 3b. We adopt the area under the curve (AUC) as a measurement for global performance. The re- sults is that there is an improvement of 8% from p(0) to p(1) c , and 3% from p(1) and p(0) c , p(1) to p(2) c . c c c c c In order to further understand the influence of the true percolation threshold on our theoretical prediction, we first divide the range of possible values of the empirical estimate in eight bins. Then, we calculate the average of the empir- ical estimate and relative errors, respectively, in each bin. Figure 4a reports the average of relative error with respect to the average of the empirical estimate. It implies that p(2) works well on the networks in the range of small true perco- lation threshold; while it become less predictive on networks with large true percolation threshold. c We also analyze the impact of density of networks on our theoretical prediction. Analogously, we divide the range of possible values of average degree in seven bins and sepa- rately calculate the means of average degree and relative errors in each bin. In Figure 4b, we plot the relative error as a function of average degree for all three theoretical es- timates. There are two main conclusions from this figure. First, for all three theoretical predictions, they are more precise on networks with large average degree than on net- works with small average degree. Second, on networks in the regime of small average degree, p(2) in general has a bet- ter improvement from p(1) than on networks with relatively c c 0.010.110.10.20.30.40.50.60.7 p(0)c p(1)c p(2)cRelative ErrorSimulated Percolation Threshold100.10.20.30.40.50.60.7 p(0)c p(1)c p(2)cRelative ErrorAverage DegreeAnimalSocialInfrastructureBiology0.20.40.6 p(0)c p(1)cp(2)cRelative ErrorCategory Table 1: Percolation threshold for 42 real networks. Network Zebra Bison Cattle Sheep Dolphins Macaques Nodes Edges p(0) c Animal Networks 23 26 28 28 62 62 105 222 160 235 159 1167 0.0814 0.0544 0.0729 0.0548 0.1390 0.0256 Social Networks Seventh Graders Dutch College Zachary Karate Club Windsurfers Train bombing Hypertext 2009 Physicians Manufacturing Emails Jazz Musicians Residence Hall Haggle Network Science Infectious Crime Email Hamsterster Friendships Hamsterster Full Facebook Contiguous USA Euroroad Air Traffic Open Flights US Power PDZBase Caenorhabditis Elegans Protein Human Protein Protein Figeys Protein Vidal Corporate Leadership Florida Ecosystem Dry Florida ecosystem Wet Little Rock Lake Unicode Languages Blogs Bible 29 32 34 43 64 113 117 167 198 217 274 379 410 829 1133 1788 2000 2888 250 422 78 336 243 2196 465 3250 2742 1839 2124 914 2765 1473 5451 12476 16098 2981 0.0532 0.0367 0.1487 0.0552 0.0739 0.0214 0.0994 0.0165 0.0250 0.0464 0.0193 0.0964 0.0428 0.1565 0.0482 0.0217 0.0200 0.0360 Infrastructural Networks 0.1880 0.2493 0.1086 0.0159 0.1336 107 1305 2408 15645 6594 1039 1226 2905 4941 49 Biological Networks 161 453 1458 1615 2217 2783 209 2025 1948 3106 6418 6007 0.1712 0.0380 0.1327 0.0571 0.0317 0.0628 Other Networks 24 128 128 183 614 1222 1773 86 2106 2075 2434 1245 16714 7105 0.1167 0.0249 0.0252 0.0242 0.0637 0.0135 0.0198 p(1) c p(2) c pc 0.0889 0.0577 0.0796 0.0581 0.1668 0.0263 0.0564 0.0381 0.1889 0.0588 0.0815 0.0219 0.1138 0.0168 0.0258 0.0492 0.0198 0.1148 0.0450 0.2198 0.0519 0.0226 0.0207 0.1339 0.2400 0.3906 0.1336 0.0163 0.1606 0.2483 0.0426 0.1980 0.0648 0.0359 0.0761 0.1339 0.0257 0.0260 0.0250 0.0811 0.0138 0.0247 0.0969 0.0608 0.0847 0.0609 0.1791 0.0268 0.0592 0.0395 0.2097 0.0614 0.0878 0.0222 0.1176 0.0171 0.0263 0.0503 0.0202 0.1294 0.0465 0.2220 0.0529 0.0228 0.0210 0.1456 0.2723 0.4050 0.1387 0.0165 0.1766 0.2484 0.0442 0.2154 0.0649 0.0360 0.0770 0.1430 0.0260 0.0264 0.0253 0.0853 0.0139 0.0257 0.1146 0.0651 0.0875 0.0656 0.2717 0.0308 0.0633 0.0432 0.2310 0.0712 0.1330 0.0262 0.1421 0.0200 0.0335 0.0629 0.0246 0.3862 0.0807 0.2628 0.0642 0.0266 0.0258 0.2885 0.3610 0.5908 0.2022 0.0193 0.6518 0.5237 0.0533 0.3094 0.0876 0.0474 0.0975 0.1512 0.0308 0.0315 0.0313 0.1059 0.0167 0.0268 large average degree. It can be accounted as on dense net- works, p(0) is already a good approximation for percolation threshold, and under such case p(0) c would be very close to each other. and p(2) c , p(1) c c At last, we discover the performance of theoretical pre- dictions in different categories of networks. In Figure 4c, we give the average of relative errors in each group of networks for all three theoretical estimations. It can be found that theoretical predictions are closer to true percolation thresh- old in animal and social networks than in infrastructural and biological networks. 6. DISCUSSION AND FUTURE WORK c Although p(2) outperforms other theoretical estimations for bond percolation threshold, it is still not sufficiently pre- cise on some real networks, due to the appearance of cycles larger than 3. A direct idea to further improve the preci- sion is to use the reciprocal of the largest eigenvalue of higher order non-backtracking matrices as the predictor for the per- colation threshold. According to a similar deduction as in Section 4.1, applying a g-th-order non-backtracking matrix Figure 5: Bond percolation on a Barab´asi-Albert network with 50 nodes and mean degree 4. The empirical estimate is pc = 0.2834. should avoid overestimating probability that node i connect- ing to the giant component following a length-g path. More- over, Theorem 1 also theoretically guarantees percolation threshold estimated by g-th-order non-backtracking matrix is non-decreasing with respect to g. In order to elaborate it empirically, we consider bond percolation on a small net- work with only 50 nodes, generated by the Barab´asi-Albert network model [2]. In Figure 5, we give the expected rel- ative sizes of the first and second largest cluster as a func- tion of probability p. In addition, we derive theoretical esti- mations for percolation threshold based on g-th-order non- backtracking matrix (0 ≤ g ≤ 5), denoted separately as p(g) . We can observe p(3) c is a better approximation than p(2) c . c c However, theoretical estimation based on high-order non- backtracking matrices still suffers the following two draw- backs. First, along with the increase of g, the size of the g-th- order non-backtracking matrix grows dramatically. It would lead to a prohibitive cost for computing the largest eigen- value for large-scale networks. Second, with a sufficiently large g, p(g) could be larger than the true percolation thresh- old. As shown in Figure 5, p(4) are already slightly larger than the peak position of S2(p). It may be because the heuristic analysis in Section 4.1 will be no longer hold for high-order non-backtracking matrices. Thus, possible direc- tions of future work include finding efficient techniques for generating and analyzing high-order non-backtracking ma- trices, and determining at which order p(g) is the closest to but still smaller than the true percolation threshold. It is also possible that we can depart from non-backtracking matrices and use some brand-new techniques to develop the theoretical assessment of the percolation threshold. and p(5) c c c In addition, the current lower bound derivation is based on heuristic equations. A more mathematically sound technique to show the effectiveness of high-order non- backtracking matrices and the exact conditions that support this effectiveness is also a future direction. 7. ACKNOWLEDGMENTS The authors thank anonymous reviewers for their valuable comments and helpful suggestions. Yuan Lin and Zhongzhi Zhang are supported by the National Natural Science Foun- dation of China (Grant No. 11275049). Wei Chen is par- tially supported by the National Natural Science Foundation of China (Grant No. 61433014). 0.00.10.20.30.40.50.60.70.80.91.00.00.20.40.60.81.0 S1(p) S2(p)Relative Sizepp(0)c=0.1700p(1)c=0.2347p(2)c=0.2530p(3)c=0.2696p(4)c=0.2849p(5)c=0.3005 References [1] J. Andrews, S. Shakkottai, R. Heath, N. Jindal, M. Haenggi, R. Berry, D. Guo, M. Neely, S. Weber, S. Jafar, and A. Yener. Rethinking information theory for mobile ad hoc networks. IEEE Communications Magazine, 46(12):94–101, 2008. [2] A.-L. Barab´asi and R. Albert. Emergence of scaling in random networks. Science, 286(5439):509–512, 1999. [3] B. Bollob´as, C. Borgs, J. Chayes, and O. Riordan. Per- colation on dense graph sequences. The Annals of Prob- ability, 38(1):150–183, 2010. [4] A. E. Brouwer and W. H. Haemers. Spectra of graphs. Springer Science & Business Media, 2011. [16] D. Kempe, J. Kleinberg, and ´E. Tardos. Maximiz- ing the spread of influence through a social network. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 137–146. ACM, 2003. [17] F. Krzakala, C. Moore, E. Mossel, J. Neeman, A. Sly, L. Zdeborov´a, and P. Zhang. Spectral redemption in clustering sparse networks. Proceedings of the National Academy of Sciences, 110(52):20935–20940, 2013. [18] R. Lemonnier, K. Scaman, and N. Vayatis. Tight bounds for influence in diffusion networks and applica- tion to bond percolation and epidemiology. In Advances in Neural Information Processing Systems, pages 846– 854, 2014. [5] D. S. Callaway, M. E. Newman, S. H. Strogatz, and D. J. Watts. Network robustness and fragility: Per- colation on random graphs. Physical Review Letters, 85(25):5468, 2000. [19] J. Leskovec, J. Kleinberg, and C. Faloutsos. Graph evolution: Densification and shrinking diameters. ACM Transactions on Knowledge Discovery from Data, 1(1):2, 2007. [6] C. Chen, H. Tong, B. A. Prakash, T. Eliassi-Rad, M. Faloutsos, and C. Faloutsos. Eigen-optimization on large graphs by edge manipulation. ACM Transactions on Knowledge Discovery from Data, 10(4):49, 2016. [7] C. Chen, H. Tong, B. A. Prakash, C. E. Tsourakakis, T. Eliassi-Rad, C. Faloutsos, and D. H. Chau. Node immunization on large graphs: Theory and algorithms. IEEE Transactions on Knowledge and Data Engineer- ing, 28(1):113–126, 2016. [8] P.-Y. Chen, S.-M. Cheng, and K.-C. Chen. Smart at- IEEE tacks in smart grid communication networks. Communications Magazine, 50(8):24–29, 2012. [9] R. Cohen, K. Erez, D. Ben-Avraham, and S. Havlin. Resilience of the internet to random breakdowns. Phys- ical Review Letters, 85(21):4626, 2000. [10] M. Franceschetti, O. Dousse, N. David, and P. Thiran. Closing the gap in the capacity of wireless networks via percolation theory. IEEE Transactions on Information Theory, 53(3):1009–1018, 2007. [11] S. Galli, A. Scaglione, and Z. Wang. For the grid and through the grid: The role of power line communi- cations in the smart grid. Proceedings of the IEEE, 99(6):998–1027, 2011. [12] K. E. Hamilton and L. P. Pryadko. Tight lower bound for percolation threshold on an infinite graph. Physical Review Letters, 113(20):208701, 2014. [13] K. Hashimoto. Zeta functions of finite graphs and rep- resentations of p-adic groups. Advanced Studies in Pure Mathematics, 15:211–280, 1989. [14] L. Jiang, Y. Miao, Y. Yang, Z. Lan, and A. G. Haupt- mann. Viral video style: a closer look at viral videos on youtube. In Proceedings of International Conference on Multimedia Retrieval, page 193. ACM, 2014. [15] B. Karrer, M. E. Newman, and L. Zdeborov´a. Per- colation on sparse networks. Physical Review Letters, 113(20):208702, 2014. [20] C. D. Meyer. Matrix analysis and applied linear al- gebra, volume 2. Society for Industrial and Applied Mathematics, Philadelphia, 2000. [21] F. Morone and H. A. Makse. Influence maximization in complex networks through optimal percolation. Nature, 524:65–68, 2015. [22] M. Newman and R. Ziff. Efficient monte carlo algorithm and high-precision results for percolation. Physical Re- view Letters, 85(19):4104, 2000. [23] M. E. Newman. Spread of epidemic disease on networks. Physical Review E, 66(1):016128, 2002. [24] P. Pako´nski, G. Tanner, and K. Zyczkowski. Families of line-graphs and their quantization. Journal of Sta- tistical Physics, 111(5-6):1331–1352, 2003. [25] F. Radicchi. Percolation in real interdependent net- works. Nature Physics, 11(7):597–602, 2015. [26] F. Radicchi. Predicting percolation thresholds in net- works. Physical Review E, 91(1):010801, 2015. [27] F. Radicchi and C. Castellano. Beyond the locally tree- like approximation for percolation on real networks. Physical Review E, 93(3):030302, 2016. [28] Y. Wang, D. Chakrabarti, C. Wang, and C. Falout- sos. Epidemic spreading in real networks: An eigen- value viewpoint. In Proceedings of 22nd International Symposium on Reliable Distributed Systems, pages 25– 34. IEEE, 2003. [29] D. J. Watts. A simple model of global cascades on random networks. Proceedings of the National Academy of Sciences, 99(9):5766–5771, 2002. [30] D. J. Watts and S. H. Strogatz. Collective dynamics of small-world networks. Nature, 393(6684):440–442, 1998.
1507.06380
1
1507
2015-07-23T04:01:26
Information Spread Over an Internet-mediated Social Network: Phases, Speed, Width, and Effects of Promotion
[ "cs.SI", "physics.soc-ph" ]
In this study, we looked at the effect of promotion in the speed and width of spread of information on the Internet by tracking the diffusion of news articles over a social network. Speed of spread means the number of readers that the news has reached in a given time, while width of spread means how far the story has travelled from the news originator within the social network. After analyzing six stories in a 30-hour time span, we found out that the lifetime of a story's popularity among the members of the social network has three phases: Expansion, Front-page, and Saturation. Expansion phase starts when a story is published and the article spreads from a source node to nodes within a connected component of the social network. Front-page phase happens when a news aggregator promotes the story in its front page resulting to the story's faster rate of spread among the connected nodes while at the same time spreading the article to nodes outside the original connected component of the social network. Saturation phase is when the story ages and its rate of spread within the social network slows down, suggesting popularity saturation among the nodes. Within these three phases, we observed minimal changes on the width of information spread as suggested by relatively low increase of the width of the spread's diameter within the social network. We see that this paper provides the various stakeholders a first-hand empirical data for modeling, designing, and improving the current web-based services, specifically the IT educators for designing and improving academic curricula, and for improving the current web-enabled deployment of knowledge and online evaluation of skills.
cs.SI
cs
Information Spread Over an Internet-mediated Social Network: Phases, Speed, Width, and Effects of Promotion ∗ Abigail C. Salvania and Jaderick P. Pabico Institute of Computer Science University of the Philippines Los Baños College 4031, Laguna ABSTRACT In this study, we looked at the effect of promotion in the speed and width of spread of information on the Internet by tracking the diffusion of news articles over a social network. Speed of spread means the number of readers that the news has reached in a given time, while width of spread means how far the story has travelled from the news originator within the social network. After analyzing six stories in a 30-hour time span, we found out that the lifetime of a story’s pop- ularity among the members of the social network has three phases: Expansion, Front-page, and Saturation. Expansion phase starts when a story is published and the article spreads from a source node to nodes within a connected component of the social network. Front-page phase happens when a news aggregator promotes the story in its front page resulting to the story’s faster rate of spread among the connected nodes while at the same time spreading the article to nodes outside the original connected component of the social network. Saturation phase is when the story ages and its rate of spread within the social network slows down, sug- gesting popularity saturation among the nodes. Within these three phases, we observed minimal changes on the width of information spread as suggested by rela- tively low increase of the width of the spread’s diameter within the social network. We see that this paper provides the various stakeholders a first-hand empirical data for modeling, designing, and improving the cur- rent web-based services, specifically the IT educators for designing and improving academic curricula, and for improving the current web-enabled deployment of knowledge and online evaluation of skills. ∗Author contributions: A.C.S. implemented the compu- tational solution, conducted the computational experi- ments, and prepared and edited the final paper. J.P.P. formulated the computational solution, conducted the statistical analysis, and wrote the final paper. INTRODUCTION 1. News articles are an important form of social commu- nications because they provide records of recent history that affected the community, as well as forecasts of future events (e.g., weather and business forecasts) that could potentially affect the members. Even before the information age, and more so during the information age, news articles have become an integral part of human’s daily lives that more and more people have become dependent on these type of information for proper and timely decision-making processes. Since news have become an indispensible tool for humans, their spreading across the social network also plays a sig- nificant role in a variety of human affairs. For example, they can shape the public opinion in a country [14], greatly impact financial markets [18], cause citizens to take actions on some issues [5], effect the spread of technological innovations [24, 25], and speed up word-of-mouth effects in marketing [11, 17, 21]. The information content of news articles can range from simple reporting of an event containing basic infor- mation, to advanced propaganda and marketing of various stakeholders, such as that of private citizens who selectively edit news items and then broadcasts them via their own news conferences to further their cause, or the goverment which filters information for national security reasons. Mechanisms for spreading information form the basis of the Internet which have become, in recent years, the playground for testing and evaluating an important class of digital commu- nication protocols. Measuring the speed and width of information spread over an Internet-mediated social network, as well as quantifying the effect of promotion on these measures, may provide various scientists and engineers a first-hand empirical result to aid them in modeling, designing, and improving the current Internet services. Likewise, this will aid IT technical trainors and academic educators in designing innovative cur- ricula, as well as use and improve tools for web-enabled deployment and evaluation of knowledge and skills. Researchers in the study of information spread have assumed that information I diffuses over a social net- work SN from a person v0 ∈ SN to another person vj ∈ SN following an epidemic-like dynamics [10], and spreading to other person-members of SN in a short number of steps according to the small-world princi- ples [26, 27]. Despite the numerous studies in the past years under this scientific domain, the process of doc- umenting, and thereby tracing, the dissemination of a single piece of news article among the members of SN , particularly for nationally and globally-sized SN s, has been rather difficult, not only due to the sheer size of the study subject, but moreso due to the inherrent dynamism of the subject SN . Thus, researchers have not yet agreed whether the spread of I over a very large and dynamic SN really follows a rapid, epidemic-like fanning out, or it follows another process that could be simpler or more complex than that of the epidemics model. In this effort, to characterize the spread of I over an Internet-mediated SN , we followed the spread of I through a social web over its perceived lifetime while measuring its speed V and width W of spread, as well as the effect of the promotion of I on these metrics. We found out that the lifetime of the popularity of I among the members of SN undergoes three phases, namely, expansion, front-page, and saturation. We measured the respective V and W of each phase and found out the following: 1. Expansion Phase is when an I is published by a member v0 ∈ SN and it spreads to other members vi ∈ SN , ∀i > 0, who are directly related in one way to v0. The speed of spread ranges from 1% to 12% of the total size of SN per hour. 2. Front-page Phase is when a news aggregator promotes I resulting in faster V among the con- nected members of SN , and at the same time spreading I to members outside of this connected members, which is rather contrary to previously developed models [22]. During this time, V ranges from 3% to 23% of the total size of SN per hour. 3. Saturation Phase happens when I ages and V slows down suggesting saturation among the mem- bers of SN . This time, V ranges from an hourly 1% to 4% of the total size of SN . 2. CONCEPTUAL FRAMEWORK The social network SN is abstractly represented as a graph G(V, E) composed of social members, such as humans, represented as a set V of n vertices v0, v1, . . . , vn−1. The relationship of a member vi to any other member vj , ∀i 6= j, is represented as an edge (i, j). The relationship of all members with the other members is a set E of edges, and can be mathe- matically represented as an n × n adjacency matrix M. The matrix element Mi,j = 1 if vi is related in someway to vj . Otherwise, Mi,j = 0. We note here that the relationship is symmetric such that vi having a rela- tionship with vj also means vj having a relationship with vi. Thus, Mi,j = Mj,i. Without loss of generality, we set Mi,i = 0, ∀i. For relationships whose degrees r can be quantified, the edge (i, j) is labeled by r, while 0 ≤ Mi,j ≤ 1, where Mi,j = r > 0 if vi is related to vj to some degree, otherwise Mi,j = 0. In this case, the relationship is no longer symmetric. Under these degreed relationships, however, measuring r is quite difficult to achieve objectively for most real world SN s. In this paper, we assumed that Mi,j is binary, while we will consider the more general 0 ≤ Mi,j ≤ 1 in the future. The degree ∆i of a vertex vi counts the number of humans that member vi has a relationship with. Thus, ∆i = Pn j=1 Mi,j . Recently, the frequency distribution ρ(∆) of the degree in SN has been found by various researchers [1–3] to asymptotically follow the power law distribution of the form ρ(∆) = α × ∆ϕ. For social networks, and all other biological networks, the power usually takes the value −3 ≤ ϕ ≤ −2. Having ρ(∆) ∼ α × ∆ϕ makes SN scale-free [1]. An information I, usually in the form of a news article, spreads through SN in the following manner. Let S(vi) be a function that represents the state S of a vertex vi ∈ V . The state S(vi) = 0 if vi has no knowledge yet of the presence of I. This, intuitively, means that I has not reached vi yet. However, S(vi) = 1 if I has reached vi. Note here that S only changes from 0 to 1 and not the other way around. At time t0, I originates from a source member v0 ∈ SN , at which time S(v0) = 1 while all the others have S(vk) = 0, ∀k > 0. During the succeeding time periods, t1, t2, . . . , tk, k > 0, I spreads through SN via some of the edges that are connected to v0. In turn, I spreads through members vi, for some i > 0, and Mi,0 = 1, during which S(vi) = 1. The sum Pi S(vi) within a time interval δt is the rate of spread V of I in SN . For the connected components of SN , there exists a vertex vi ∈ SN whose state S(vi) = 1. From v0, we can find a shortest path D0,i out of potentially many paths from v0 to vi whose intermediate vertices vj , 0, i 6= j, have S(vj ) = 1. The path distance can be computed as D0,i = P S(vj ). Note that D0,i = Di,0. The longest among all the shortest paths from v0 to vi is the radius of spread of I through the connected components of SN . Using the all-pairs shortest paths algorithms by Floyd [13] and by Johnson [16], we can approximate the W by computing for the longest shortest path of the connected component within SN , but considering only those paths that will traverse v0. With this scenario, we may quantify the spread of I over SN in two ways. First is the speed V at which the information has reached the members of the com- munity over a time period (Equation 1), and second is the diameter width W of the component of SN at which the information has spread from the source v0. V = i=0 S(vi) Pn−1 δt (1) 2.1 Internet-mediated social networks In its early history, the Internet primarily served a worldwide research community while its developers worked on improving communication protocols and inventing new ones to support emerging services. Even though the growth of Internet eased as a result of the bursting of the dot-com bubble in the early 2000’s, it still has become an integral part of everyday life for ordinary people [4] due to many reasons brought about by the effect of technology in people’s lives. One among the many reasons is that it has become an obiquitous tool to meeting, communicating and collaborating with other people resulting in the formation of the Social Web. The Social Web is a label that includes both the social networking sites such as MySpace and Facebook, and the social media sites such as Digg and Flickr. Figure 1 shows one of the many visualizations of the conceptual framework of the social web. The social web, in its many forms, has been tagged as one of the many forces in changing the way content is created and distributed in the Internet. This change was further expidiated through the proliferation of web-based authoring tools that enable users to rapidly publish content, such as sto- ries, opinion pieces on weblogs, photographs and videos on Flickr and YouTube, advices on Yahoo Answers, and web discoveries on Del.icio.us and Furl. In effect, user- generated content has fueled the rapid expansion of the Web, accounting for much of the new Web content in the Internet. In addition to allowing users to share content, social web sites also include a social networking compo- nent which allows users to mark other users as friends or contacts. They also provide an interface to track their friends’ activities [4]. These components have a signifi- cant impact on the Internet traffic distribution. Under- standing the feature and characteristics of these sites is crucial to network traffic engineering and to sustain the development of this new generation of service [23]. Figure 1: A popular visualization of the concep- tual framework of the Social Web by Hayes [15] out of the many visualizations that exist. 2.2 Recent studies in information spread Different studies have been conducted in the past to trace how I spreads on the Internet. In one of their recent studies, Liben-Nowell and Keilberg. [22] found out that the path followed by I was narrow and is characterized by a very deep tree-like pattern rather than fanning out like the small world principle sug- gests. They observed this particular behavior after reconstructing the paths followed by I in a global-scale Internet chain letter data. They reconstructed the paths by tracing the signatories of the chain letter data. In similar studies conducted by Lerman and Galstyan [20] and Cheng et al. [6], where they independently observed the spread of I on different social news aggre- gators, they found out that SN play a significant role in the promotion of I among the members of SN . In fact, Cheng et al. [6] even found that the networks of related I are characterized by a short path length linking two similar Is together. This suggests that the inferred SN in social news aggregators follow the small-world principle. 2.3 Case study: digg.com To characterize the spread of I over an Internet- mediated SN , we followed the spread of I through a social web called digg.com over a period of time. We were able to measure the respective V and W of spread of six stories {I1, I2, . . . , I6}, as well as the effect of the promotion of the stories on V and W of these. The social website digg.com is a digital media democracy that allows its members to submit I in the form of news stories that they discovered from the Internet. When a member v0 ∈ SN submits a news article, digg.com will list I under the submitter’s name, as well as put I to a repository web page called “Upcoming Stories,” where other members vi ∈ SN , ∀i > 0, can find I and, if they like it, add a “digg” to it. Adding a “digg” to an I is synonymous to “voting” for it. When a member vi diggs an I, that I is saved to vi’s history. At the same time, a so-called digg.com number is shown next to each I’s title. This number simply counts how many members have digged I in the past. Most diggs come from the network neighbors of v0. New diggs might also attract additional diggs from the neighbors of the diggers, and so on. If a submission fails to receive enough diggs within a certain time period, it eventually falls out of the “Upcoming” section. However, if it earns a critical mass of diggs in a short span of time, it becomes popular and is promoted to the digg.com ’s front page. Most mem- bers read only the front page stories, thus, getting on the front page greatly increases a specific I’s visibility. Promoted I is selected by digg.com ’s algorithms to be displayed on the front page, but the exact formula for how a story is selected is kept secret and changes peri- odically (Figure 2). This prevents users from “gaming the system,” a systematic crack by black hat hackers for the sole purpose of promoting advertisement or spam. However, it appears that the algorithm takes into account, among other things, the number of votes received by I [19]. 3. METHODOLOGY Instead of obtaining the data from the social web oper- ator, we crawled our target SN by accessing the public web interface provided by the digg.com API. Our crawler was developed using Perl scripts and utilizes the Linux command line programs grep and wget. The public interface provided by the digg.com API outputs an array of p pages containing n accounts. Each of the first p − 1 pages lists 100 unique accounts while the last page lists (n mod 100) accounts. The default account the time of digging to accurately construct the evolution graph of diggers. We crawled the digg.com SN every hour to get a snap- shot of the structure of the SN . For each reading, we measured the number of diggers and network diameter of the inferred SN . We considered the speed V of the information spread as the number of diggers nt at a certain time t, while the width W of information spread is the network diameter of the connected component of the graph, modified according to our needs. This means that we only considered those nodes whose S(vi) = 1 and those paths which will travese v0. 4. RESULTS AND DISCUSSION 4.1 Stories traced We set our crawler to trace the information spread of six stories between January and February 2010. Spe- cific information about the stories, its diggers and the list of their friends were saved in a database. These sto- ries are listed in Table 1, together with some statistics that we gathered after the trace of our crawler. Story I3 (Figure 3) had the most number of diggers and the largest network diameter, while Story I2 had the least number of diggers and Story I1 had the smallest net- work diameter. Story I3 had the fastest rate and widest width of information spread after 30 hours. Story I2 had the slowest rate of information spread after 30 hours and Story I1 had the least width of information spread after 30 hours. Figure 3: The front page of story I3 (a) as seen in digg.com on 27 February 2010, and (b) as seen in its original news website Thomson Reuters Foundation. 4.2 Phases in the life of a news article Figure 4 shows the respective traces of Ii, ∀i = 1, . . . , 6 in terms of the percentage of the population of SN . From the figures, we see three prominent patterns: The Figure 2: Users have speculated how digg.com promotes I into its front page because the exact algorithm has been kept secret in an effort to protect it from systematic cracking by malware software writers. This figure by Finch [12] is one of those speculations. per page is 10 but the maximum allowed is 100, which can be set by assigning the proper variable in the URL. We automatically crawled the p pages by changing the proper parameters in each URL, a method that we adopted from the work done by Pabico and Arevalo [23]. Our crawler first extracts the diggers or voters of a given I. For each vi ∈ SN , our crawler then extracts the list of vi’s friends. To be able to view the diggers of a story, the digg.com API provided the URL that shows the list of diggers of a certain story, including the digg date, story id, digger’s user id and name, and the status of the story [7]. To be able to view the list of friends of the diggers of a story, digg.com API also pro- vided the URL which contains the friends’ user name, number of profile views, and registration date of user [8]. We stored these information in separate database tables named “digger” and “friends,” respectively. The “digger” table includes the user name, user id, story id, and digg date as attributes. At the end of the crawl, for each I, the “digger” table will contain n unique records corre- sponding to each digger discovered by the crawler. The “friends” table takes the user name of the diggers as well as the user name of his friends. The digger’s user name in the “digger” table is used as a foreign key for the other table containing his friends. The crawler dis- regards inactive users, which is already flagged by the digg.com API. The trace for each story is stored in a Information about the I, like its different database. title, story id, name of submitter, date the story was submitted, and date the story was promoted were also taken into account and stored. All of these information can be viewed on the URL provided by the digg.com API [9]. In representing the SN of digg.com users, we treated the diggers as vertices while the relationships between them as edges. We considered the first vertex v0 ∈ SN as the submitter of I, while the succeeding other vertices vi, ∀i > 0, were the diggers of I. Our crawler checks for the succeeding digger’s user name if it has a relationship with the previous diggers. If the succeeding digger vk ∈ SN is a friend of the previous diggers vi, ∀i < k, we connect vk to those previous diggers. We also considered Table 1: The six stories that we traced in this study: Story title, date submitted, name of the submitter (v0), size n of SN and the W after 30 hours. Story Title I1 I2 I3 I4 I5 I6 Haterade Power Rankings Super Bowl Edition NSAC Manny Pacquiao’s Drug Test results are Negative A massive magnitude 8.3 earthquake struck Chile China warns Obama not to meet Dalai Lama 2 Please Help The People of Haiti Ohno’s Wins 7th Medal and Sets US Record Date Submitted 10 Feb 2010 16 Jan 2010 27 Feb 2010 02 Feb 2010 16 Jan 2010 21 Feb 2010 v0 n W racheljtm lovelezz alanocu divinediva jayadelson robinbal 181 147 1,378 989 661 177 4 7 10 9 7 5 behavior of the plot before the promotion, after promo- tion, and an ageing pattern. We termed these phases as follows: 1. Expansion Phase: This phase starts when I is published and the article spreads from v0 to other members of SN who are at least separated from v0 by at least ∆ = 3. 2. Front-Page Phase: This phase happens for some I wherein a news aggregator at time t promotes I into its front page. This gives boost to the spread of the article outside of the connected component of v0 at t resulting to faster speed of spread. 3. Saturation Phase: This phase is considered when the I ages and its popularity among the members of the SN died down, that is δS/δt < 0.5. From the figure, this usually happens when about 90% of the population have already read about I. Stories I1 and I6 seemed to follow the same pattern, which is characterized by an upward slope δS/δt > 0.5 during the early hours of its life, and then leveling off with δS/δt < 0.5. It seemed that these two stories have two phases because there is not much break on the spead of spread of I before and after the promotion. However, we note here that these two news articles are both sports-related, both talk about the sports in the US where most of the digg.com members reside, and that the news articles were published when the respec- tive sports are being talked about by the mainstream media. This means that even though without the benefit of the front-page promotion, we expected that these two news items will have δS/δt > 0.5 because the respective topics have already been promoted elsewhere. Stories I2 through I5 show a more pronounced break between the phases before and after promotion. For example, I2 which been promoted about 28 hours after its publication seemed to follow a natural ageing phase after about the 9th hour of its life (Figure 4b). Notice, however, that there was a considerable “jump” after it has been promoted to the front-page. Likewise, I3 through I5 exhibit the same jump, after their promo- tions on the 3rd, 7th, and 15th hours, respectively. 4.3 Speed, width, and effects of promotion Figure 5 shows the plot of instantaneous speed V of spread of each story during the 30-hour trace. Except for I1 and I6, all other stories exhibit a tremendous rise in V after their respective promotions to digg.com front- page. Stories I1 and I6 did not show this pattern due to the same characteristics enumerated above. Before the promotion, the spread of a story loses speed as clearly shown in the respective behaviours of I2, I4, and I5. A single peak lasting about one hour is observed just after promotion. Some others have multiple peaks, such as I3 and I4, but the height of the peaks is no greter than the peak just after promotion. The V suffered a downward patterns right after every peak, following the downward path just before the second peak (see for example that of I4 which has a more pronounced pattern than the others), suggesting saturation of the population. Figure 6 shows the various plots of the evolution of the width W of spread of each story during the 30-hour trace. The most notable value among the plots is that the minimum W = 3. The physical implication of this minimum W value is that at this width, I has only reached the immediate neighbors of v0, wherein at least one neighbor vi is not directly connected to the other neighbors of v0. One notable story is I2, wherein it spread only to the immediate neighbors of the submitter v0 during the first 28 hours of the story’s life. However, after the story’s promotion to the front-page, the width of spread expanded up to seven members within a two- hour span. Only I2 and I6 experienced an immediate expansion of the width of spread after promotion, width inf o2 expanding by one member and I6 by two. All the other stories continued on with their respective widths until at least one hour after the front-page promotion. The physical implication of a decreasing W is that I has reached a member that caused the longest shortest path to shorten. 4.4 Evolution of information spread Figures 7 and 8 show the respective evolution graphs of I1 and I5 during the three phases. During the expan- sion phase (Figures 7a–b and 8a–b), I1 is visible from the upcoming queue. Most of the first few diggers are direct friends of the submitter v0, thus the visualization shows a connected graph. During the front-page phase (Figure 7c–d and 8c–d), I1 became more visible to the other member of SN causing it to accumulate votes at a faster rate. Some of the diggers are disconnected from the largest connected component. During the saturation phase (Figure 7e–f and 8e–f), I1 ages. This is charac- terized by the slow down of the accumulation of votes. Figure 4: Percentage of population reached by various stories within the 30-hour trace: (a) I1; (a) I2; (b) I3; (c) I4; (d) I5; and (e) I6. Each red vertical line marks the time when the story was promoted to the front-page. The respective evolution graphs for I3, I4, and I6 are shown in Figure 9. 5. CONCLUSION AND RECOMMEN- DATIONS We looked at the effect of promotion in the speed and width of spread of information on the Internet by tracking the diffusion of news articles over a social network. We defined the speed V of spread as the number of readers that the news has reached in a given time, while width of spread means how far the story has travelled from the news originator within the social network. After analyzing six stories in a 30-hour time span, we found out that the lifetime of a story’s pop- ularity among the members of the social network has three phases, namely, the expansion, the front-page, and the saturation phases. The expansion phase starts when a story is published and the article spreads from a source node to nodes within a connected component of the social network. The front-page phase happens when a news aggregator promotes the story in its front page resulting to the story’s faster rate of spread among the connected nodes, while at the same time spreading the article to nodes outside the original connected compo- nent of the social network. Saturation phase happens when the story ages and its rate of spread within the social network slows down suggesting popularity satu- ration among the social members. Within these three phases, we observed minimal changes on the width of information spread as suggested by relatively low increase of the width of the spread’s diameter within the social network. The contribution of this paper is that this provides various stakeholders, such as the scientists and engineers, a first-hand empirical data to help them in modeling, designing, and improving the current web-based services. Similarly, the IT trainors and educators may find the information here useful for designing and improving curricula, as well as in Figure 5: Various plots of instantaneous speed V of spread of the stories during the 30-hour trace: (a) I1; (a) I2; (b) I3; (c) I4; (d) I5; and (e) I6. Each red vertical line marks the time when the story was promoted to the front-page. improving the web-enabled deployment of knowledge and online evaluation of skills. [5] D. Carr. Why Twitter will endure?, 2010. New York Times. 6. ACKNOWLEDGMENTS This research effort is funded by the Institute of Com- puter Science, University of the Philippines Los Banos. References [1] R. Albert and A.L. Barabasi. Statistical mechanics of complex networks. Reviews of Modern Physics, 74:47–97, 2002. [6] Xu Cheng, Cameron Dale, and Jiangchuan Liu. Understanding the characteristics of Internet short video sharing: Youtube as a case study. CoRR, abs/0707.3670, 2007. [7] digg.com . Digg API story.getDiggs, 2009. http://services.digg.com. [8] digg.com . Digg API friend.getAll, 2009. [2] A.L. Barabasi. Scale-free networks. Scientific http://services.digg.com. American, 288:60–69, 2003. [3] A.L. Barabasi and R. Albert. Emergence of scaling in random networks. Science, 286:509–512, 1999. [4] N. Brownlee and K. Claffy. Internet measure- IEEE Internet Computing, 30:1089–7801, ment. September/October 2004. [9] digg.com . Digg API story.getInfo, 2009. http://services.digg.com. [10] P.S. Dodds and D.J. Watts. Universal behavior in a generalized model of contagion. Physical Review Letters, 92(21):218701, 2004. Figure 6: Various plots of width W of spread of the stories during the 30-hour trace: (a) I1; (a) I2; (b) I3; (c) I4; (d) I5; and (e) I6. Each red vertical line marks the time when the story was promoted to the front-page. [11] P. Domingos and M. Richardson. Mining the net- work value of customers. In F. Provost, R. Srikant, M. Schkolnick, and D. Lee, editors, Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pages 57–66, New York, 2001. Association for Computing Machinery. [12] S. Finch. The great digg.com promotion algo- http://crenk.com/great- rithm flowchart, 2009. digg-promotion-algorithm-flow-chart/. [13] R.W. Floyd. Algorithm 97: Shortest path. Com- munications of the ACM, 5(6):345, 1962. [14] S. Galam. Modeling rumors: The no plane pen- tagon French hoax case. Physica A, 320:571–580, 2003. doi:10.1016/s0378-4371(02)01582-0. [15] G. Hayes. The social media campaign, 2008. http://www.personalizemedia.com/. [16] D.B. Johnson. Efficient algorithms for shortest paths in sparse networks. Journal of the ACM, 24 (1):1–13, 1977. [17] D. Kempe, J. Klienberg, and E. Tardos. Maxi- mizing the spread of influence through a social net- work. In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2003. [18] M. Kosfeld. Rumours and markets. Journal of Mathematical Economics, 41(6):646–664, 2005. doi:10.1016/j.jmateco.2004.05.001. [19] Kristina Lerman. Social information processing in social news aggregation. CoRR, abs/cs/0703087, 2007. [20] Kristina Lerman and Aram Galstyan. Anal- ysis of social voting patterns on digg. CoRR, abs/0806.1918, 2008. Figure 7: The evolution graph for I1 during: (a) Hour 1; (b) Hour 2; (c) Hour 4; (d) Hour 5; (e) Hour 29; and (f ) Hour 30. [21] J. Leskovec, L.A. Adamic, and B.A Huberman. The dynamic of viral marketing. In Proceedings of the 7th ACM Conference on Electronic Commerce, pages 228–237, 2006. [22] D. Liben-Nowell and J. Keilberg. Tracing infor- mation flow on a global scale using internet chain letter data. Proceedings of the National Academy of Sciences of the United States of America, 105(12): 4633–4638, 2008. [23] J.P. Pabico and C.C.P. Arevalo. Patterns of Internet-based friendship among residents of Los Banos, Laguna: The Friendster case. Transac- tions of the National Academy of Science and Tech- nology, Philippines, 30(1):220, 2008. [24] E.M. Rogers. Diffusion of Innovations. Free Press, New York, 4 edition, 1995. [25] D. Strang and S.A. Soule. Diffusion in organiza- tions and social movements: From hybrid corn to poison pills. Annual Review of Sociology, 24:265– 290, 1998. [26] J. Travers and S. Milgram. An experimental study of the small world problem. Sociometry, 32(4):425– 443, 1969. [27] D.J. Watts and S.H. Strogatz. Collective dynamics of ´small world´networks. Nature, 393:440–442, 1998. Figure 8: The evolution graph for I5 during: (a) Hour 1; (b) Hour 2; (c) Hour 15; (d) Hour 16; (e) Hour 29; and (f ) Hour 30. Figure 9: The respective evolution graphs of (a) I3, (b) I4, and (c) I6 showing only Hour 1 and Hour 30.
1503.06652
1
1503
2015-03-23T14:29:15
Evolutionary Dynamics of Complex Networks: Theory, Methods and Applications
[ "cs.SI", "physics.soc-ph" ]
We propose new direction to understanding evolutionary dynamics of complex networks using two different types of collaboration networks: academic collaboration networks; and, disaster collaboration networks. The results show that academic collaboration network has all properties of small-world networks and can be considered a real small-world network with the result of its structural analysis maybe being extendable for other real-networks who share the common grounds of small-world properties.
cs.SI
cs
Evolutionary Dynamics of Complex Networks: Theory, Methods and Applications Alireza Abbasi School of Engineering & IT, University of New South Wales Canberra ACT 2600, Australia Liaquat Hossain (Corresponding Author) Liaquat Hossain Professor, Information Management Division of Information and Technology Studies The University of Hong Kong [email protected] Honorary Professor, Complex Systems School of Civil Engineering Faculty of Engineering and IT The University of Sydney, Australia [email protected] Rolf T Wigand Maulden-Entergy Chair & Distinguished Professor Departments of Information Science & Management UALR, 548 EIT Building 2801 South University Avenue Little Rock, AR 72204-1099, USA Evolutionary Dynamics of Complex Networks: Theory, Methods and Applications Abstract We propose a new direction to understanding evolutionary dynamics of complex networks. We focus on two different types of collaboration networks—(i) academic collaboration networks (co- authorship); and, (ii) disaster collaboration networks. Some studies used collaboration networks to study network dynamics (Barabási & Albert, 1999; Barabási et al., 2002; Newman, 2001) to reveal the existence of specific network topologies (structure) and preferential attachment as a structuring factor (Milojevi 2010). The academic co-authorship network represents a prototype of complex evolving networks (Barabási et al., 2002). Moreover, a disaster collaboration network presents a highly dynamic complex network, which evolves over time during the response and recovery phases of a disaster. We have chosen these two networks even though they are different in terms of complexity and domain but have common properties: open-based communication platform (self- organized system); geographically disperse actors (locational and cultural diversity of actors); autonomous behavior systems (non- hierarchy structure). The results show that the academic collaboration network has all the properties of small-world networks and can be considered a real small-world network with the result of its structural analysis maybe being extendable for other real- networks who share the common grounds of small-world properties. Our results further illustrate that the networks‟ clustering coefficients remain almost static over the evolution of both networks while the network is expanding over time through adding new actors and links to the networks. Keywords: Evolutionary Dynamics; Complex Networks; self-organized systems; autonomous behavior; network theory; social networks analysis; collaborative systems. Evolutionary Dynamics of Complex Networks: Theory, Methods and Applications Introduction Collaboration is one of the defining features of modern science (Milojevi 2010). It is defined as “working together for a common goal and sharing of knowledge” (Hara, Solomon, Kim, & Sonnenwald, 2003) (p. 853). Therefore, collaboration can be regarded as a social process which enables the collective shared intelligence of a group (Bordons & Gómez, 2000; Milojevi 2010; Shrum, Genuth, & Chompalov, 2007). As Milojevic (2010, p. 1410) formulated, “The most commonly used methods for studying collaboration networks have been: bibliometrics (Bordons & Gómez, 2000); social network analysis/network science (Barabási et al., 2002; Kretschmer, 1997; Newman, 2001c, 2004a; Wagner, 2008; Wagner & Leydesdorff, 2005); qualitative methods of observation and interviews (Hara et al., 2003; Shrum et al., 2007); and surveys. Currently, however, it is not clear which collaboration data is useful for evaluating the academic community. Although there is a large set of potential collaboration data (e.g., joined conference organization, joined research proposal submissions, joined publications, joined conference attendance, and teacher-student relationships) (Abbasi, Altmann, & Hossain, 2011), which qualifies for being analyzed through appropriate network measures but co-authorship is the most visible indicator of scientific collaboration and has thus been frequently used to measure collaborative activity, especially in bibliometric and network analysis studies. Bibliometric studies of co- authorship have emphasized the effects of collaboration on scientific activity as well as on organizational and institutional aspects of collaboration applying different units of analysis (i.e., authors, institutions, and countries) (Milojevi 2010). Since previous reports showed, worldwide, losses from disasters related to natural hazards had risen dramatically (Munich Re Group, 2005; Swiss Reinsurance Company, 2006) and that trend was growing due to human-induced climate change (Crompton & McAneney, 2008); so it is expected to grow exponentially now and in the future. A disaster is defined as a destructive event creating negative social and economic conditions that interrupt the day-to-day activities of a society (Abbasi, Hossain, Hamra, & Owen, 2010; Hossain & Kuti, 2010; Kapucu, 2005; Waugh, 2003). In such special events, as the situations become more severe and complex, a coordination network consisting of different organizations and agencies is needed to manage and respond to the events optimally. Therefore, it is important for organizations to form cooperative information exchanges in order to respond to disasters effectively and efficiently to achieve a common goal (Abbasi & Kapucu, 2012). Poor coordination is a fundamental problem for an emergency response, and is primarily due to lack of good communication between and among organizations; a lack of up-to- date and relevant information circulating through the emergency response network; and, insufficient access to data and action plans (Hossain & Kuti, 2010; Van Borkulo, Scholten, Zllatanova, & van den Brink, 2005). Coordinating activities or tasks in a complex system during a disaster for effective response is one of the most important issues to protect human, natural lives as well as protecting these from infrastructure damage. In any system and especially disasters, if the situation becomes more complex, by increasing interactions and interdependency among actors (e.g., individuals and organisations), the need for coordination increases in order to achieve a common goal. It has been documented in previous studies that the efficiency of disaster response is influenced by the severity of disaster, type and amount of resources available, number of jurisdictions involved, and complexity of the response strategies (Comfort, Ko, & Zagorecki, 2004). On the other hand, flexibility gives the involved participants and organizations ability to respond to unanticipated events. During an emergency situation, flexibility will support organizations to be properly prepared and improvise to fit the requirements of the current situation (Mendonça, Beroggi, & Wallace, 2001). Thus, flexibility and adaptation of the coordinating networks in uncertain and dynamic conditions (e.g., disasters) needs to be seen pivotal to effective response and recovery efforts (Dwyer & Owen, 2009). Complex adaptive systems exhibit coherence and persistence in the face of change and dependence on extensive interaction (Holland, 1993). Crisis environments are complex, dynamic and place lives, property, and continuity of operations in our communities at risk. Concepts from the emerging science of complex adaptive systems (CAS) help us to understand these environments better and offer fresh insight into the challenging problems of inter-organizational coordination (Comfort, 1999). Modern organizational environments are becoming more complex at an increasing rate, largely through networks (Kauffman, 1993; Scott, 1998; Waldrop, 1992; Weick, 2001). “The interactions of organizations in a large system can generate greater complexity than the organizations themselves. Today‟s organizations have become too interconnected and too complex to be managed by traditional top-down and hierarchical means” (Kapucu, 2004). The science of complex adaptive systems offers a new mind-set and a scientific basis for managing complex partnerships using the principles of self-adaptive systems (Clippinger, 1999). Common properties of the two networks Open-based communication platform (self-organized system) Disaster collaboration networks resemble open-based communication platforms. Although usually there is a systematic hierarchy for response to disasters, they follow a bottom-up perspective. A disaster collaboration network is a self-organized system meaning that individual agents (e.g., personnel, agencies and organizations) organize their communication with other involved actors as an incident (disaster) evolves. Similarly, an academic collaboration (co-authorship) network does not have a hierarchical structure and individual agents (i.e. authors) organize whole network topology and state through their collaboration with others. In disaster collaboration networks, bottom up information could be used at the top down command and control in ensuring adequacy in situation awareness of the affected communities. In these networks, in order to transmit the local knowledge of the affected areas/communities to central command and control so that a realistic disaster response and recovery effort should become deliverable. Geographically dispersed groups (locational and cultural diversity of actors) During response to a complex disaster, several agents from different organizational cultures and locations cooperate with each other for a common goal. For instance, in order to respond to a large bushfire several agencies from different organizational cultures (such as fire services, police, ambulance) and usually from different jurisdictions come together. Similarly, scholars from different locations around the world and diverse disciplines collaborate with each other to have a joint publication. Autonomous behaviour systems (non-hierarchical structure) There is no hierarchical structure (command and control) among authors in an academic co- authorship collaboration network meaning that often the authors are not forced to collaboration with another author. It is usually the same in disaster collaboration networks too. Although most emergency response organizations plan their general tasks and probable contacts, but as the disaster circumstances are very dynamic their links shape autonomously. In addition, academic collaboration networks can be referred to as stable networks while disaster collaboration networks are more complex and dependent on the environment. Analysis of these two types of networks would provide us with new insights about the effects of complexity on the behavior of network dynamics and evolution. Towards a Complex Adaptive Systems Cycle Model In our proposed model presented in Figure 1, the co-evolution of local dynamics versus global dynamics of networks over time has been explored. To study dynamics on networks, the nodes‟ local structure correlation to networks topology in each time slot (static analysis) has been examined. On the other hand, as networks evolve over time represents that new nodes and links add to the network and both nodes and the whole network (locally and globally) structure changes due to different link attachment rules over the evolution of the network. To study dynamics of network over time, the dynamics of both node‟s local structure and network‟s topology compare to its immediate previous time slot has been further explored. Using different dimensions of our model framework discussed above, we propose the following research questions in order to investigate collaboration networks‟ co-evolutionary adaptive behaviour formulated by (Gross & Blasius, 2008): dynamics of networks (the topology of the network changes in time according to specific, often local, rules); and dynamics on networks (the topology of the network remains static while the states of the nodes change dynamically).  Do positions (roles) of existing actors in their collaboration network associate with their future attachment behavior?  If so, what is the most favorable position to attract more partners?  Does this phenomenon differ between a stable collaboration network and a dynamic complex collaboration network? s k r o w t e N n o s c i m a n y D Node Structure (t1) Node Structure (t2) Node Structure (tn) attachment rules attachment rules attachment rules Network Topology (t1) Network Topology (t2) Dynamics of Networks Network Topology (tn) Figure 1: A co-evolutionary dynamic model Providing answers for these questions helps us to understand the selection mechanisms of network evolution during the evolution of networks. Such understanding can help researchers, decision makers and practitioners to reach their goals. In particular the findings could help to identify the behavioral attachment patterns particularly identifying which characteristic(s) of existing actors more attract new actors or cause new actors attach to them (to evaluate the selection mechanism). Thus the following questions arise:  What are the logics of actors for their attachment behavior during the evolution of a network? (How do actors choose links during their collaboration network evolution?)  Do the complexity and dynamicity of the collaboration networks affect the actors‟ logics of attachment?  Which attachment logic is the best driver of network evolution in each case of (stable or dynamic) the collaboration network? Answering these questions helps us to check if different attachment logics (e.g., homophily, preferential attachment, embedding, and multi-connectivity) change network topologies. And if they do, what is the effect of each one on the network structural change. The findings help to determine how the topology of the network changes in time according to actors‟ attachment logics, which is useful in investigating the retention mechanism by analyzing dynamics of networks. It further assists in finding attributes of the network topology which remains static while the states of the actors change over time representative by evaluating the variation mechanism by investigating dynamics on networks. Social Networks Research Design, Data Collection and Analysis In order to answer these research questions, we extract two types of collaboration networks (academic and disaster) from the datasets, which have been normalized or our analysis. Then, we apply social network analysis metrics to explore each and all network properties. Social network metrics also help us to identify the parameters of our model. Subsequently, we use statistical analysis to examine our hypotheses. Network data is most commonly collected on relationships linking a set of social units on a single type of relationship and is most often represented in a matrix X={xi,j} where xi,j is the strength from unit i to unit j (Papachristos, 2006; Wigand, 1988). Data on social networks can be collected for all links (whole network data) or for the sets of links surrounding a specified social entity (ego-network data) (Marsden, 1990). The socio-centric network approach identifies structural patterns of interaction in a network but the ego-centric network approach helps to understand the social structure of the ego (Abbasi, Chung, & Hossain, 2012; Chung, 2009). Network data can come from “questionnaires, archives, observations, diaries, electronic traces and experiments” (Marsden, 1990). Survey and questionnaires are the most widely used method followed by archival resources (Marsden, 1990). In surveys (questionnaires) respondents are usually asked to identify their contacts for a specific type of relationship. Thus respondents self-report their network. Archive resources could from social network systems (e.g., Facebook, Linkedin, google+), online games, forums in which the people‟s interaction log shows who is connecting to whom. Also, text reports of interactions especially during an emergency response event such as newspaper reports on the responding organizations to disasters (e.g., Hurricanes in USA, Fire in Australia) are other types of archival resources for which some text mining techniques are needed to extract network data. Academic Collaboration Network Data In an academic collaboration network, nodes are referred as authors and ties (links) are co- authorship relations among them. A tie exists between each two authors (scholars) if they have at least one co-authored publication. In general, scientific collaboration (co-authorship) networks can be represented as a graph. The nodes (actors, vertices) of the graph represent authors and the links (ties, edges) between each two nodes indicate a co-authorship relationship between them. The weights of links denote the number of publications that two authors (co-authors) have jointly published. Academic collaboration networks are complex types of social networks since both the numbers of authors (nodes) and co-authorship links among them are growing over time. Additionally, the structure of the network (the way the authors are connected) and the positions of authors in the network may vary over time. Analysis of the attachment behaviour of authors (as nodes) in terms of the nodes‟ positional properties may help to explore the dynamics of structural change and evolutionary behaviour in scientific collaboration networks. Scopus1 is one of the main widely used and authorized sources (in addition to ISI Web of Knowledge2) which store bibliometric data. It has an advanced search engine to look for publications based on a variety of combinations of fields. In the search results, it shows the number citations each publication has received. To construct our database, we extract publications which “information science” phrase has been used in their titles or keywords or abstracts by restricting to only the journal publications written in English. Indeed, the publications extracted cannot be considered as representing the world production in the field of “information science” but it illustrates a good portion of publications in this field that do not have limitation to a specific sub-field, conference, journal, institutions and country. After extracting the publications meta-data, we used an application program, AcaSoNet, (Abbasi & Altmann, 2010) for extracting publication information (i.e. title, publication date, author names, affiliations, publisher, number of citations, etc.). It also extracts relationships (e.g., co-authorships) between authors and finally stores the data in the format of tables in its local database. Different types of information were extracted from each publication meta-data: publications information (i.e. title, publication date, journal name, etc.); and authors‟ names and affiliations (including country and institution names). As we are interested in different macro and micro level analysis (i.e. country and institution), affiliation data is so important for our research. Exploring our originally extracted data, we found affiliation information messy, as there were several fields missing for some of the 1 www.scopus.com. 2 apps.isiknowledge.com publications and also differently written names for the country of origin and institutions. Thus, in our second step, we did some manual checking (using Google) to fill some missing fields (e.g., country) using other existing fields mainly the institution's name. We also tried to manually merge the institutions which had different written formats in our originally extracted dataset. After the cleansing of the publication data, the resulting database contained 4,579 publications reflecting the contributions of 10,130 authors and 22,962 co-authorships from 3,196 different institutions (i.e. universities and private companies) from 99 countries. All publications together received 49,154 citations. Disaster Coordination Network Data During emergency and disaster situations individuals from different agencies cooperate to properly respond to the incident collectively. Inevitably, participants need to interact, communicate and cooperate with each other through the use of sharing information and experience, reporting and briefings, requesting resources and so on. Therefore, coordination network shapes, including agencies or participants from different organizations (agencies) as actors and their communication (interaction), represent the links or ties among actors in order to respond to the emergency. Coordinating activities or tasks in a complex system during a disaster for effective response is one of the most important issues to protect human, natural lives as well as from infrastructure damage. Therefore, a deep understanding of inter-organizational response network structure and the process of locating information flow and exchange is necessary in optimizing the response networks. This helps emergency managers and policy makers in making better informed decisions. In 2009, the State of Victoria (Australia) experienced severe bush fires during February 2009. Although several agencies warned of the continuing fire threat and the forecast of extreme conditions for 6 and 7 February but “Conditions prevailing in the State on 7 February were unparalleled in Australia‟s history” (Clelland, Livermore, & Button, 2009). The 2009 Victorian Bushfires Royal Commission was established on 16 February 2009 to investigate the causes and responses to the bushfires which swept through parts of Victoria in late January and February 2009. The data used in this research comes from content analysis by reviewing Victorian Bushfires Royal Commission situation reports after the February 7, 2009 (Black Saturday). Royal Commission situation reports were made available to the public and are retrievable from http://www.royalcommission.vic.gov.au. The Kilmore East Fire (which was actually a group of separate fires) started on February 7. The Kilmore East Fire that ignited on 7 February 2009 was extraordinary and unprecedented. It was the fire with the most severe damages and fatalities. In all Kilmore East Fires, “119 people died and 1,242 homes were destroyed. The combined area burnt by the Murrindindi and Kilmore East fires, which later merged, was 168,542 hectares. The Kilmore East Fire alone burnt 125,383 hectares” (Government, 2009). During the data collection process, we first reviewed the brief reports on the Kilmore East Fire. Then, identifying key participants mainly in the Incident Management Teams (IMTs) such as Incident Controller (IC) and its deputy (DIC), Planning Officers (PO), etc. involved in the emergency response network, we looked for these individuals‟ statements in the Royal Commission dataset. From the result of the content analyses of the 2009 Kilmore East Fire, we identified the main key actors involved in the response, and the support management mainly in the incident management team. Then, the statements of each key actor were extracted again searching the Royal Commission dataset. Applying content analyses on the key players‟ statements, their interactions were documented. Finally, 104 distinct actors and 286 interactions among them were extracted. We have used UCINET (Borgatti, Everett, & Freeman, 2002), a social network analysis software program, to analyze the coordination network and its actors. UCINET is a comprehensive, well- accepted and long-standing program for the analysis of social networks. The program contains several network analysis routines (e.g., centrality measures, cohesion measures, positional analysis algorithms, and cliques), and general statistical and multivariate analysis tools (Borgatti et al., 2002). Testing and Evaluation Preliminary analysis of the data related to its distribution and potential relationships amongst variables needs to be considered. This can be done using descriptive statistics, histograms, normality tests and scatter plots. For normally distributed data, statistical tests examining relationships amongst variables such as Pearson‟s correlations can be used. However, if the data distribution is not normal, then non-parametric tests such as Spearman‟s rank correlation test should be applied. In order to answer the research hypotheses, the collaboration network data should be transferred to a matrix format such that we can apply mathematical analysis and metrics. Therefore, the social network analysis measures (e.g., individual centrality measures, network centralizations, network density, and network clustering coefficient) can be used in order to quantify individuals (actors) and networks properties and structural attributes. Characteristics of the Collaboration Networks Data Figure 2 below depicts the number of actors (authors) and their respective collaborations‟ frequency for academic collaboration networks (e.g., co-authorship networks of the Information Science research community) between 2001 and 2010. Therefore, the academic collaboration network can be regarded as a complex network in which the number of nodes and links in the networks is growing rapidly over time. This may lead to rapid change of the network structure. Figure 3 llustrates an increasing trend of collaborations count, which is much faster than the increment of the number of actors especially during the last periods. This highlights the existence of redundant links among already connected actors during the evolution of the collaboration networks. Figure 2: Academic collaboration network’s actors and collaboration cumulative frequency over time Figure 3 presents the number of actors and their collaborations‟ frequency for the Kilmore Fire disaster collaboration networks evolution over time. It shows that the disaster collaboration network is a complex network with the number of nodes and links in the networks growing over time, which leads to a change in the network structure. The disaster collaboration network growth over time shows an increasing trend of collaborations count, which is much faster than the increment of number of actors especially during the last periods. This highlights the existence of redundant links among already connected actors during the evolution of the collaboration networks. Figure 3: Disaster collaboration networks actors and collaboration cumulative frequency over time Small-World Properties of the Collaboration Networks It has been discussed earlier that most of the real-worlds networks have common properties (i.e. low density, high clustering, small diameter, and scale-free structure), which have also been called „small-word properties‟ (Watts & Strogatz, 1998). In order to test the common properties of academic collaboration networks, these properties have been measured over ten years between 2001 and 2010. Cumulative numbers of authors (nodes) and links over time are used. For instance, the 2005 academic collaboration network statistics reported in Table 1 consist of all the authors (and their links) of the papers published between 2001 and 2005. Table 1 indicates the small-world property measures for each year. The results show that the academic collaboration network‟s density is very low for each period and is decreasing over time from 0.5% in 2001 to 0% in 2006, which remain unchanged over time. In addition, the results indicate that the academic collaboration network‟s clustering coefficient is high and remains almost constant with very small fluctuations between minimum of 0.72 at 2003 and maximum of 0.79 in the first year. Table 1: Academic collaboration network statistics and measures over time # of Actors # of Links 2001 2002 2003 2004 2005 2006 2007 2008 2009 20010 818 1466 2168 3220 4005 5320 6623 7992 9021 10130 1571 2859 3792 6409 8307 10852 14334 17435 20259 22962 Sum of Links 1580 2903 3849 6513 8476 11040 14568 17735 20985 23730 Density (%) Clustering Coefficient Diameter 0.5 .79 3 0.3 .75 3 0.1 .72 3 0.1 .74 3 0.1 .74 3 0 0 0 0 0 .74 .74 .75 .76 .76 4 5 8 8 9 Average Distance 1.08 1.06 1.08 1.10 1.10 1.16 1.21 1.32 1.33 1.44 Degree Dist. Power-law λ 1.53 1.42 1.79 1.70 1.75 1.83 1.78 2.04 1.89 2.06 To examine the network diameter, the distance between each pair of nodes in the giant component (the largest connected component) has been explored. As shown in Table 1, the academic collaboration network‟s diameter is also very low but increases slowly over time (from 3 in 2001 to 9 in 2010) as the network grows. To consider a much-related concept, average distance between all pairs of nodes is measured. The result indicates a very low distance among each pair of nodes that is increasing slightly over time (from 1.08 in 2001 to 1.44 in 2010). Furthermore, the nodes degree distributions are also calculated over time. Figure 4 depicts the academic collaboration networks‟ degree distributions for four points in time (i.e. 2000, 2005, 2007, and 2010). The result of degree distributions implies that there are a few nodes with high degree but so many with low-degree nodes. Thus, the degree distributions follow a power-law distribution especially when the networks are larger (having more nodes and links). T1 T1-T5 T1-T7 T1-T10 Figure 4: Academic collaboration network’s degree distribution In order to find the power-law coefficient (λ) of the network, the log-log distribution of degree and frequency for each year is drawn. Figure 5 depicts the academic collaboration networks‟ log-log degree distributions of the same years depicted in Figure 4, including the power-law coefficient and the explained variance R2. The R2 shows to what extent the linear function (the straight line) is fitted, the higher the R2 values (i.e. those closer to one) the fitter the model. The power-law coefficient of the academic collaboration network is calculated for all years and shown in Table 1. The result implies that it is increasing over time (by growth of the network) from 1.43 in 2001 to 2.06 in 2010 (1.43 < λ < 2.06), with a few small fluctuations, respectively. T1 T1-T5 T1-T7 T1-T10 Figure 5: Academic collaboration network’s log-log degree distribution over time In conclusion, the academic collaboration networks of the Information Science research community has all the properties of small-world networks and can be considered a real small-world network with the result of its structural analysis maybe being extendable for other real-networks who share the common grounds of small-world properties. Disaster Collaboration Networks’ Small-World Properties Similar to academic collaboration networks, the common properties of disaster collaboration networks (i.e. Kilmore Fire collaboration network) have been tested by measuring the properties of the disaster collaboration network. During the first day of the Kilmore Fire incident (February 7, 2009), 286 interactions among 104 distinct actors, individual people indicating the inter-personal cooperation (collaboration) network in response to the incident, is extracted. The extracted interactions are mainly the ones for the day of the incident (7 February 2009) up to midnight in addition to some interaction prior to the incident day, during the preparedness phase, as the fire was forecasted due to hot weather and lack of humidity. To transfer the interaction data to longitudinal data for investigating the evolution of the network over time and to evaluate dynamic structural changes of the network, four important time points are used to make four consecutive periods (durations) expressing the evolution of the network during the disaster. The first point in time is at 11:50 (7 February) that the fire ignited. So, the first period (duration) contains any day before starting the fire (preparedness phase). The second point in time is 13:05 (7 February), when the Kilmore Fire station became the Incident Control Center (ICC). The third point in time is about 16:00 (7 February) that the Kilmore Incident Controller (IC) was replaced with a new IC. The last point in time is around mid-night (00:00, 8 February) as most of the logs and reports were available up to midnight). Table 2 shows the Kilmore Fire disaster interpersonal collaboration network statistics over time including a distinct number of actors (nodes), the number of interactions (number of links) and network properties (density, clustering coefficients, diameter, average path, degree distribution‟s power-law coefficient average degree and network centralization measures) for each period. Table 2: Disaster collaboration network statistics and measures # of Actors # of Links Sum of Links Density (%) Clustering Coefficient Diameter Average Distance Degree Dist. Power-law λ T1 43 46 73 8.08 .07 5 2.60 1.12 T1-T2 T1-T3 T1-T4 58 86 153 9.26 .20 5 2.77 1.17 76 115 213 98 153 286 7.47 6.02 .17 5 2.94 1.07 .17 5 2.93 1.11 The results show that the disaster collaboration network‟s density is very low for each period. This means that the interpersonal response networks in all durations are rather sparse. The second duration network has the densest structure but the density of the network structure is decreasing over time. In addition, these results indicate that the disaster collaboration network clustering coefficient is also low but contrary to network density, which shows increase over time from 0.07 to 0.17. This demonstrates the lack of many clusters (group of highly connected actors) in the disaster collaboration network and its growth during the response phase to the incident. As shown in Table 2, the disaster collaboration network‟s diameter is also very low and fixed at five for all periods. Moreover, average distance between all pairs of nodes is measured. The results show a very low distance among each pair of nodes (on average) which is increasing very slightly over time from 2.60 at T1 to 2.93 at T1-T4. Figure 6 depicts the disaster collaboration networks‟ degree distributions of four time periods. As shown, disaster collaboration networks follow a power-law distribution especially when the networks are larger. This means that there are few actors (nodes) having many connections (high degree) and there are many low-degree actors. T1 T1-T3 T1-T2 T1-T4 Figure 6: Kilmore Fire disaster collaboration network degree distribution over time The log-log distribution of degree and frequency of each network is drawn for each period to calculate the power-law coefficient of the networks‟ degree distribution. Figure 7 depicts the disaster collaboration networks‟ log-log degree distributions of four time periods. The power-law coefficients of all periods are also reported in Table 2. The results indicate that the disaster collaboration degree distribution power-law coefficients show a moderate increase for the second period (T1-T2) and then decreasing over time during the third and fourth period. The disaster collaboration power-law coefficient is between 1.07 and 1.17 (1.07 < λ < 1.17). T1 T1-T2 T1-T3 T1-T4 Figure 7: Kilmore Fire disaster collaboration network log-log degree distribution In conclusion, the results demonstrate that the Kilmore Fire disaster collaboration networks represent a very sparse scale-free network structure with low diameter, although their clustering coefficient is very low. Therefore, based on the literature, the Kilmore Fire disaster collaboration network cannot be considered as a small-world network and the results for analyzing its structure and evolution may not be applicable in other cases. Conclusions This study synthesized different theories and approaches on the evolution and adaptation of complex networks from various fields for exploring the attachment behavior of actors in the networks. The adaptation behavior of complex networks over time in spite of dynamic changes of network structure, due to entrance of new actors and links to the network over time, are also examined. First, the common properties of small-world networks are examined on the two sample collaboration networks used in this study. The results show that the academic collaboration network (i.e. co-authorship networks of scholars in the field of Information Science) is very sparse and highly clustered with low diameter and actors‟ degree distribution has a scale-free structure. Therefore, the results of its networks analysis may be applicable to other complex networks which have similar common properties (Watts & Strogatz 1998). But the Kilmore Fire disaster collaboration network, as a representation of a network in a dynamic and complex environment, cannot be considered as small-world networks as its clustering is low. Then, in light of the analyzing mechanism of (network) evolution (i.e. selection, retention and variation), the attachment behavior of actors are investigated to find whether attributes of actors attract more actors to attach to them. In other words, the attributes of actors which impact on the fitness function that other actors use to select them for attachment (in the selection process) is evaluated. To do this, actors‟ different logics of attachment are examined on two sample collaboration networks. The results of the longitudinal analysis supported the existence of at least three of them for both collaboration networks. Multi-connectivity (having divers partners), homophily (having partners with similar connectivity) and preferential attachment (having tendency to authors who have high betweenness centrality (Abbasi, Hossain, & Leydesdorff, 2012)) have been found having impact on the link formation (attachment) of authors in the academic collaboration network over time. On the other hand, multi-connectivity, preferential attachment and embedding (weakly) found to have effects on actors‟ attachment in the disaster collaboration network. Then to investigate the retention mechanism of the networks, the dynamic of networks is tested to see how the topology of the network changes in time according to actors‟ attachment logics. Actors‟ log-log degree distribution‟s exponent (λ), Pearson degree correlation, average strength, and actors‟ average neighbors‟ degree are used as proxies for preferential attachment, homophily, embedding and multi-connectivity, respectively. Correlation tests between the networks topology (measured by network centralization) and the actors‟ attachment logics are applied to identify which attachment logic leads to higher network topology change. The result of the correlation test for the academic collaboration network indicates actors‟ preferential attachment as the most influential driver of network topology changes. But multi-connectivity is detected as the most effective driver of network topology changes in the disaster collaboration network although other logics of attachment were found effective as well for both networks. Finally, to evaluate the variation mechanism of networks, the dynamic on networks is examined to see what attributes of the network topology remains static while the states of the actors change over time. The results illustrate that the networks‟ clustering coefficients remain almost static over the evolution of both networks while the network is expanding over time through adding new actors and links to the networks. References 1. Abbasi, A., & Altmann, J. 2010. A Social Network System for Analyzing Publication Activities of Researchers. In T. J. Bastiaens, U. Baumol, & B. J. Kramer (Eds.), On Collective Intelligence, Vol. 76: 49-61. Berlin: Springer-Verlag Berlin. 2. Abbasi, A., Altmann, J., & Hossain, L. 2011. Identifying the Effects of Co-Authorship Networks on the Performance of Scholars: A Correlation and Regression Analysis of Performance Measures and Social Network Analysis Measures. Journal of Informetrics, 5(4): 594-607. 3. Abbasi, A., Chung, K. S. K., & Hossain, L. 2012. Egocentric Analysis of Co-authorship Network Structure, Position and Performance. Information Processing & Management, 48(4): 671-679. 4. Abbasi, A., Hossain, L., Hamra, J., & Owen, C. 2010. Social Networks Perspective of Firefighters' Adaptive Behaviour and Coordination among Them. Paper presented at the IEEE/ACM Int'l Conference on & Int'l Conference on Cyber, Physical and Social Computing (CPSCom), China. 5. Abbasi, A., Hossain, L., & Leydesdorff, L. 2012. Betweenness Centrality as a Driver of Preferential Attachment in the Evolution of Research Collaboration Networks. Journal of Informetrics, 6(1): 403-412. 6. Abbasi, A., & Kapucu, N. 2012. Structural Dynamics of Organizations during the Evolution of Interorganizational Networks in Disaster Response. Journal of Homeland Security and Emergency Management, 9(1). 7. Barabási, A. L., & Albert, R. 1999. Emergence of scaling in random networks. Science, 286(5439): 509. 8. Barabási, A. L., Jeong, H., Néda, Z., Ravasz, E., Schubert, A., & Vicsek, T. 2002. Evolution of the social network of scientific collaborations. Physica A: Statistical Mechanics and its Applications, 311(3-4): 590-614. 9. Bordons, M., & Gómez, I. 2000. Collaboration networks in science. In B. Cronin, & H. B. Atkins (Eds.), The web of knowledge: A Festschrift in honor of Eugene Garfield: 197-213. Medford, NJ: Information Today. 10. Borgatti, S., Everett, M., & Freeman, L. 2002. Ucinet for windows: Software for social network analysis (version 6). Harvard, MA: Analytic Technologies. 11. Chung, K. K. S. 2009. Understanding Attitudes towards Performance in Knowledge- intensive Work: The Influence of Social Networks and ICT Use: University of Sydney. 12. Clelland, N., Livermore, G., & Button, C. 2009. Victorian Bushfires Royal Commission Final Report: Submission on the Kilmore East Fire. Parliament of Victoria, Government Printer for the State of Victoria. 13. Clippinger, J. H. 1999. Order form the Bottom Up: Complex Adaptive Systems and Their Management. San Francisco: Jossey-Bass Publishers. 14. Comfort, L. K. 1999. Shared risk: Complex systems in seismic response: Pergamon. 15. Comfort, L. K., Ko, K., & Zagorecki, A. 2004. Coordination in rapidly evolving disaster response systems. American Behavioral Scientist, 48(3): 295. 16. Crompton, R. P., & McAneney, K. J. 2008. Normalised Australian insured losses from meteorological hazards: 1967-2006. Environmental Science & Policy, 11(5): 371-378. 17. Dwyer, I., & Owen, C. 2009. Emergency incident management: an evolving incident control system framework. Journal of Pacific Rim Psychology, 3(2): 66-75. 18. Government, V. 2009. The Kilmore East Fire, Victorian Bushfires Royal Commission Final Report, Vol. 1. 19. Gross, T., & Blasius, B. 2008. Adaptive coevolutionary networks: a review. Journal of the Royal Society Interface, 5(20): 259. 20. Hara, N., Solomon, P., Kim, S. L., & Sonnenwald, D. H. 2003. An emerging view of scientific collaboration: Scientists' perspectives on collaboration and factors that impact collaboration. Journal of the American Society for Information Science and Technology, 54(10): 952-965. 21. Holland, J. H. 1993. Innovation in complex adaptive systems: Some mathematical sketches: Working Paper 93-10-062, Santa Fe Institute, Santa Fe, NM. 22. Hossain, L., & Kuti, M. 2010. Disaster response preparedness coordination through social networks. Disasters: 755-786. 23. Kapucu, N. 2004. Coordinating without hierarchy: Public-nonprofit partnerships. Journal of China National School of Administration, 1. 24. Kapucu, N. 2005. Interorganizational coordination in dynamic context: Networks in emergency response management. Connections, 26(2): 33-48. 25. Kauffman, S. A. 1993. The origins of order: Self organization and selection in evolution: Oxford University Press, USA. 26. Marsden, P. V. 1990. Network data and measurement. Annual review of sociology: 435- 463. 27. Mendonça, D., Beroggi, G. E. G., & Wallace, W. A. 2001. Decision support for improvisation during emergency response operations. Int. J. Emergency Management, 1(1). 28. Milojevi , S. 2010. Modes of collaboration in modern science: Beyond power laws and preferential attachment. Journal of the American Society for Information Science and Technology, 61(7): 1410-1423. 29. Munich Re Group. 2005. Annual review: natural catastrophes 2004. 30. Newman, M. E. J. 2001. Clustering and preferential attachment in growing networks. Physical review E, 64(2): 025102. 31. Papachristos, A. V. 2006. Social network analysis and gang research: Theory and methods. Studying youth gangs: 99-116. 32. Scott, W. R. 1998. Organizations: Rational, natural, and open systems: Prentice hall Upper Saddle River, NJ. 33. Shrum, W., Genuth, J., & Chompalov, I. 2007. Structures of scientific collaboration: the mIt Press. 34. Swiss Reinsurance Company. 2006. Natural catastrophes and man-made disasters 2005: high earthquake casualties, new dimension in windstorm losses., Vol. Sigma No. 2, Zurich. 35. Van Borkulo, E., Scholten, H., Zllatanova, S., & van den Brink, A. 2005. Decision making in response and relief phases. 36. Waldrop, M. M. 1992. Complexity: The emerging science at the edge of order and chaos. New York. 37. Watts, D., & Strogatz, S. 1998. Small world. Nature, 393: 440-442. 38. Waugh, W. 2003. Terrorism, homeland security and the national emergency management network. Public Organization Review, 3(4): 373-385. 39. Weick, K. E. 2001. Making sense of the organization: Wiley-Blackwell. 40. Wigand, R. T. (1988). Communication Network Analysis: A History and Overview. In (eds.), Handbook of Organizational Gerald Goldhaber and George Barnett Communication. Norwood, NJ: Ablex, 319 358.
1702.01452
1
1702
2017-02-05T21:09:25
Towards Optimal Strategy for Adaptive Probing in Incomplete Networks
[ "cs.SI", "physics.soc-ph" ]
We investigate a graph probing problem in which an agent has only an incomplete view $G' \subsetneq G$ of the network and wishes to explore the network with least effort. In each step, the agent selects a node $u$ in $G'$ to probe. After probing $u$, the agent gains the information about $u$ and its neighbors. All the neighbors of $u$ become \emph{observed} and are \emph{probable} in the subsequent steps (if they have not been probed). What is the best probing strategy to maximize the number of nodes explored in $k$ probes? This problem serves as a fundamental component for other decision-making problems in incomplete networks such as information harvesting in social networks, network crawling, network security, and viral marketing with incomplete information. While there are a few methods proposed for the problem, none can perform consistently well across different network types. In this paper, we establish a strong (in)approximability for the problem, proving that no algorithm can guarantees finite approximation ratio unless P=NP. On the bright side, we design learning frameworks to capture the best probing strategies for individual network. Our extensive experiments suggest that our framework can learn efficient probing strategies that \emph{consistently} outperform previous heuristics and metric-based approaches.
cs.SI
cs
Towards Optimal Strategy for Adaptive Probing in Incomplete Networks Tri P. Nguyen, Hung T. Nguyen and Thang N. Dinh∗ probed, all neighbors v ∈ G of u will be observed and can be probed in the following steps. Given a budget k, the agent wishes to identify k nodes from G(cid:48) to probe to maximize the number of newly observed nodes. 7 1 0 2 b e F 5 ] I S . s c [ 1 v 2 5 4 1 0 . 2 0 7 1 : v i X r a Abstract We investigate a graph probing problem in which an agent has only an incomplete view G(cid:48) (cid:40) G of the network and wishes to explore the network with least effort. In each step, the agent selects a node u in G(cid:48) to probe. After probing u, the agent gains the information about u and its neighbors. All the neighbors of u become observed and are probable in the subsequent steps (if they have not been probed). What is the best probing strategy to maximize the number of nodes explored in k probes? This problem serves as a fundamental component for other decision-making problems in incomplete networks such as information harvesting in social networks, network crawling, network security, and viral marketing with incomplete information. While there are a few methods proposed for the problem, none can perform consistently well across different network types. In this paper, we establish a strong (in)approximability for the problem, proving that no algorithm can guarantees finite approximation ratio unless P=NP. On the bright side, we design learning frameworks to capture the best probing strategies for individual network. Our ex- tensive experiments suggest that our framework can learn efficient probing strategies that consistently outperform previous heuristics and metric-based approaches. 1 Introduction In many real-world networks, complete network topology is almost intractable to acquire, thus, most decisions are made based on incomplete networks. The impossibility to obtain complete network may stem from various sources: 1) the extreme size of the networks, e.g., Facebook, Twitter with billions of users and connections or the Internet spanning the whole planet, 2) privacy or security concerns, e.g., in Online social networks, we may not be able to see users' connections due to their own privacy settings to protect them from unwelcoming guests, 3) being hidden or undercover, e.g., terrorist networks in which only a small fraction is exposed and the rest is anonymous. To support decision making processes based on local view and expand our observations of the networks, we inves- tigate a network exploring problem, called Graph Probing Maximization (GPM). In GPM, an agent is provided with an incomplete network G(cid:48) which is a subnetwork of an un- derlying real-world network G (cid:41) G(cid:48) and wants to explore G swiftly through node probing. Once a node u ∈ G(cid:48) is ∗Computer Science Department, Virginia Commonwealth University. Email: {trinpm,hungnt,tndinh}@vcu.edu Real-world applications of GPM includes exploring ter- rorist networks to help in the planning of dismantling the network. Given an incomplete adversarial network, each sus- pect node can be "probed", e.g., getting court orders for com- munication record, to reveal further suspects. In cybersecu- rity on Online social networks (OSNs), intelligent attackers can gather users' information by sending friend requests to users [1]. Understanding the attacker strategies is critical in coming up with effective hardening policies. Another ex- ample is in viral marketing, from a partial observation of the network, a good probing strategy for new customers can lead to exploration of potential product sales. While several heuristics are proposed for GPM [2, 3, 4, 5], they share two main drawbacks. First, they all consider selecting nodes in one batch. We argue that this strategy is ineffective as the information gained from probing nodes is not used in making the selection as shown recently [6, 7]. Secondly, they are metric-based methods which use a single measure to make decisions. However, real-world networks have diverse characteristics, such as different power-law de- gree distributions and a wide range of clustering coefficients. Thus, the proposed heuristics may be effective for particular classes of networks, but perform poorly for the others. In this paper, we first formulate the Graph Probing Max- imization and theoretically prove the strong inapproximabil- ity result that finding the optimal strategy based on local in- complete network cannot be approximated within any finite factor. That means no polynomial time algorithm to approx- imate the optimal strategy within any finite multiplicative er- ror. On the bright side, we design a novel machine learn- ing framework that takes the local information, e.g., node centric indicators, as input and predict the best sequence of k node probing to maximize the observed augmented net- work. We take into account a common scenario that there is available a reference network, e.g., past exposed terrorist networks when investigating an emerging one, with similar characteristics. Our framework learns a probing strategy by simulating many subnetwork scenarios from reference graph and learning the best strategy from those simulated samples. The most difficulty in our machine learning framework is that of find the best probing strategy in sampled subnet- work scenarios from the reference network. That is how to characterize the potential gain of a probable node in long-term (into future probing). We term this subproblem Topology-aware GPM (Tada-GPM) since both subnetwork scenario and underlying reference network are available. r+1 )-approximation algorithm Therefore, we propose an ( 1 for this problem where r is the radius of the optimal solu- tion. Here, the radius of a solution is defined to be the largest distance from a selected node to the subnetwork. Our algo- rithm looks far away to the future gain of selecting a node and thus provides a nontrivial approximation guarantee. We further propose an effective heuristic improvement and study the optimal strategy by Integer Linear Programming. Compared with metric-based methods with inconsistent performance, our learning framework can easily adapt to net- works in different traits. As a result, our experiments on real- world networks in diverse disciplines confirm the superiority of our methods through consistently outperforming around 20% the state-of-the-art methods. Our contributions can be summarized as follows: • We first formulate the Graph Probing Maximization (GPM) and show that none of existing metric-based methods consistently work well on different networks. Indeed, we rigorously prove a strong hardness result of GPM problem: inapproximable within any finite factor. • We propose a novel machine learning framework which looks into the future potential benefit of probing a node to make the best decision. • We experimentally show that our new approach signif- icantly and consistently improves the performance of the probing task compared to the current state-of-the-art methods on a large set of diverse real-world networks. Related works. Our work has a connection to the early network crawling literature [8, 9, 10, 11]. The website crawlers collect the public data and aim at finding the least effort strategy to gain as much information as possible. The common method to gather relevant and usable information is following the hyperlinks and expanding the domain. Later, with the creation and explosive growth of OSNs, the attention was largely shifted to harvesting public infor- mation on these networks [12, 13, 14]. Chau et al. [12] were able to crawl approximately 11 million auction users on Ebay by a parallel crawler. The record of successful crawling be- longs to Kwak et al. [14] who gathered 41.7 million public user profiles, 1.47 billion social relations and 106 million tweets. However, these crawlers are limited to user public information due to the privacy setting feature on OSNs that protects private/updated data from unwelcoming users. More recently, the new crawling technique of using socialbots [15, 16, 17, 18, 19, 1] to friend the users and be able to see their private information. Boshmaf et al. [15] proposed to build a large scale Socialbots system to infiltrate Facebook. The outcomes of their work are many-fold: they were able to infiltrate Facebook with success rate of 80%; there is a possibility of privacy breaches and the security defense systems are not effective enough to prevent/stop Socialbots. The works in [16, 17] focus on targeting a specific organization on Online social networks by using Socialbots to friend the organization's employees. As the results, they succeed in discovering hidden nodes/edges and achieving an acceptance rate of 50% to 70%. Graph sampling and its applications have been widely studied in literature. For instance, Kim and Leskovec [20] study problem of inferring the unobserved parts of the net- work. They address network completion problem: Given a network with missing nodes and edges, how can ones com- plete the missing part? Maiya and Berger-Wolf [21] propose sampling method that can effectively be used to infer and approximate community affiliation in the large network. Most similar to our work, Soundarajan et al. propose MaxOutProbe [3] probing method. MaxOutProbe estimates degrees of nodes to decide which nodes should be probed in partially observed network. This model shows better performance as compared with probing approaches based on node centralities (selecting nodes that have high degree or low local clustering). However, through experiments, we observe that MaxOutProbe's performance is still worst than the one that ranks nodes based on PageRank or Betweeness. The probing process can be seen as a diffusion of deception in the network. Thus, it is related to the vast literature in cascading processes in the network [22, 23, 24, 25]. Organization: The rest of this paper is divided into five main sections. Section 2 presents the studied problem and the hardness results. We propose our approximation algorithm and machine learning model in Section 3. Our comprehensive experiments are presented in Section 4 and followed by conclusion in Section 5. 2 Problem Definitions and Hardness We abstract the underlying network using an undirected graph G = (V, E) where V and E are the sets of nodes and edges. G is not completely observed, instead a subgraph G(cid:48) = (V (cid:48), E(cid:48)) of G is seen with V (cid:48) ⊆ V , E(cid:48) ⊆ E. Nodes in G can be divided into three disjoint sets: V f , V p and V u as illustrated in Fig. 1. • Black/Fully observed nodes: V f contains fully ob- served nodes (probed) meaning all of their connections are revealed. That is if u ∈ V f and (u, v) ∈ E then (u, v) ∈ E(cid:48). • Gray/Partially observed nodes: V p contains partially observed nodes u that are adjacent to at least one fully probed node in V f and u /∈ V f . Only the connections Figure 1: Incomplete view G(cid:48) (shaded region) of an underly- ing network G. Nodes in G(cid:48) are partitioned into two disjoint subsets: black nodes in V f which are fully observed and the gray nodes in V p which are only partially observed. Nodes outside of G(cid:48) are colored white between u ∈ V p and nodes in V f are observed while the others to unobserved nodes are hidden. Therefore, those nodes u ∈ V p become the only candidates for discovering unobserved nodes. Note that V (cid:48) = V f ∪ V p. • White/Unobserved nodes: V u = V \ V (cid:48) consists of unobserved nodes. The nodes in V u have no connection to any node in V f but may be connected with nodes in V p. Node probing: At each step, we select a candidate gray node u ∈ V p to probe. Once probed, all the neighbors of u in G and the corresponding edges are revealed. That is u becomes a fully observed black node and each white neighbor node v ∈ V u of u becomes gray and is also available to probe in the subsequent steps. We call the resulted graph after probing augmented graph and use the same notation G(cid:48) when the context is clear. The main goal of ada-GPM is to increase the size of G(cid:48) as much as possible. Probing budget k: In addition to the subgraph G(cid:48), a budget k is given as the number of nodes we can probe. This budget k may resemble the effort/cost that can be spent on probing. Given this budget k, our probing problem becomes selecting at most connected k nodes that maximizes the size of augmented G(cid:48). Alternatively, we want to maximize the number of newly observed nodes. We call our problem Graph Probing Maximization (GPM). There is a crucial consideration at this point: Should we select k node at once or we should distribute the allowed budget in multiple steps? The answer to this question leads to two different interesting versions: Non-Adaptive and Adap- tive. We focus on the adaptive problem. DEFINITION 2.1. (ADAPTIVE GPM (ADA-GPM)) Given an incomplete subnetwork G(cid:48) of G and a budget k, the Adaptive Graph Probing Maximization problem asks for k partially probed nodes in k consecutive steps that maximizes the number of newly observed nodes in G(cid:48) at the end. In our ada-GPM problem, at each step, a node is selected subject to observing the outcomes of all previous probing. This is in contrast to the non-adaptive version which asks to make k selections from the initial V p at once. Thus, the adaptive probing manner is intuitively more effective than the non-adaptive counterparts. However, it is also considerably more challenging compared to non- adaptivity due to the vastly expanded search space. Table 1: Highest performance (Perf.) metric-based methods. GnuTella Top 5 Perf. Collaboration Perf. Top 5 Road Top 5 Perf. CLC BC CC PR DEG 2471 2341 1999 1994 1958 BC PR CC CLC DEG 2937 2108 2085 2061 2048 CLC DEG BC PR CC 358 346 346 342 326 2.1 Hardness and Inapproximability. 2.1.1 Empirical Observations. We show the inconsis- tency in terms of probing performance of metric-based meth- ods, i.e., clustering coefficient (CLC), betweenness cen- trality (BC), closeness centrality (CC), Pagerank (PR), lo- cal degree (DEG), MaxOutProbe [3] and random (RAND), through experiments on 3 real-world networks, i.e., Gnutella, Co-authorship and Road networks (see Sec. 4 for a detailed description). Our results are shown in Fig. 1. From the fig- ure, we see that the performance of metric-based methods varies significantly on different networks and none of them is consistently better than the others. For example, clustering coefficient-based method exhibits best results on Gnutella but very bad in Collaboration networks. On road networks, all methods seem to be comparable in performance. Inapproximability Result. Here, we provide the 2.1.2 hardness results of the ada-GPM problem. Our stronger result of inapproximability is shown in the following. THEOREM 1. ada-GPM problem on a partially observed network cannot be approximated within any finite factor. Here, the inapproximability is with respect to the optimal solution obtained when the underlying network is known. To see this, we construct classes of instances of the problems that there is no approximation algorithm with finite factor. Figure 2: Hardness illustration. We construct a class of instances of the probing prob- lems as illustrated in Figure 7a. Each instance in this class has: a single fully probed node in black b1, n observed nodes in gray each of which has an edge from b1 and one of the observed nodes, namely g∗ varying between differ- ent instances, having m connections to m unknown nodes in white. Thus, the partially observed graph contains n + 1 nodes, one fully probed and n observed nodes which are se- lectable, while the underlying graph has in total of n + m + 1 nodes. Each instance of the family has a different g∗ that m unknown nodes are connected to. We now prove that in this class, no algorithm can give a finite approximate solution for the two problem. First, we observe that for any k ≥ 1, the optimal solu- tion which probes the nodes with connections to unknown nodes has the optimal value of m newly explore nodes, de- noted by OP T = m. Since any algorithm will not be aware of the number of connections that each gray node has, it does not know that g∗ leads to m unobserved nodes. Thus, the chance that an algorithm selects g∗ is small and thus, can perform arbitrarily bad. Our complete proof is presented in the supplementary material. 3 Learning the Best Probing Strategy Due to the hardness of ada-GPM that no polynomial time al- gorithm with any finite approximation factor can be devised unless P = N P , an efficient algorithm that provides good guarantee on the solution quality in general case is unlikely to be achievable. This section proposes our machine learn- ing based framework to tackle the ada-GPM problem. Our approach considers the cases that in addition to the probed network, there is a reference network with similar character- istics and can be used to derive a good strategy. Designing such a machine learning framework is chal- lenging due to three main reasons: 1) what should be selected as learning samples, e.g., (incomplete) subgraphs or (gray) nodes and how to generate them? (Subsec. 3.1); 2) what fea- tures from incomplete subnetwork are useful for learning? (Subsec. 3.2) and 3) how to assign labels to learning samples to indicate the benefit of selecting that node in long-term, i.e., to account for future probes?(Subsec. 3.2). Figure 3: Learning Framework Overview. The general framework, which is depicted in Figure 3, contains four steps: 1) Graph sampling which gen- erates many subnetworks from Gr where each subnetwork is a sampled incomplete network with black, gray and white nodes; each candidate gray node in each sampled subnet- work creates a data point in our training data; 2) Data label- ing which labels each gray node with their long-term probing benefit; 3) Training a model to learn the probing benefit of nodes from the features and 4) Probing the targeted network guided by the trained machine learning model. 1, G(cid:48) 2, ...G(cid:48) 3.1 Building Training Dataset. Given the reference net- work Gr = (V r, Er), where V r is the set of n nodes and Er is set of m edges. Let G = {G(cid:48) K} be a collection of subnetwork sampled from Gr. The size of sampled sub- graph G(cid:48) i is randomly drawn between 0.5% to 10% of the ref- erence graph Gr following a power-law distribution. Given a subnetwork size, the sample can be generated using different mechanisms, e.g., Breadth-First-Search, Depth-First-Search or Random Walk [21]. We use G to construct a training data where each data point is a feature vector representing a can- i, (1 ≤ i ≤ K), in didate gray node. For each sample G(cid:48) G, let V p i, we compute all G(cid:48) the features for each node u ∈ V p to form a data point. G(cid:48) i creates V p training data points. As such, each sample G(cid:48) G(cid:48) For assigning the label for each data point, we use our pro- posed algorithm Tada-Probe, the heuristic improvement or the ILP algorithm (presented in Subsec. 3.3). be the set of gray nodes in G(cid:48) i i i 3.2 Features for Learning. We select a rich set of intrin- sic node features that only depend on the incomplete subnet- work and will be embedded in our learning model. Table 2 shows a complete list of node features that we use in our machine learning model. Table 2: Set of features for learning Factor Description Betweenness centrality score [26] of u in G(cid:48) Closeness centrality score [26] of u in G(cid:48) Eigenvalue centrality score [26] of u in G(cid:48) Pagerank centrality score [26] of u in G(cid:48) Katz centrality score [26] of u in G(cid:48) Clustering coefficient score of u in G(cid:48) Degree of u in G(cid:48) BC CC EIG P R Katz CLC DEG BN um Number of black nodes in G(cid:48) GN um Number of gray nodes in G(cid:48) BDeg BEdg Total degree of black nodes in G(cid:48) Number of edges between black nodes in G(cid:48) 1 r+1-Approximation Algorithm for Tada-GPM. 3.3 An 1 r+1-optimal strategy for Tada-GPM We first propose an to probe a sampled subnetwork of the reference network, where r, called radius, is the largest distance from a node in the optimal solution to the initially observed network. This algorithm assigns labels for the training data. An intuitive strategy, called Naive Greedy, is to select node with highest number of connections to unseen nodes. Training Data…𝑮𝒓𝑮𝟏′𝑮𝟐′𝑮𝑲′Graph SamplingData LabelingTraining𝑮′ProbingTrained Model Unfortunately, this strategy can be shown to perform arbi- trarily bad by a simple example. The example includes a fully probed node having a connection to a degree-2 node, which is a bridge to a huge component which is not reach- able from the other nodes, and many other connections to higher degree nodes. Thus, the Naive Greedy will not select the degree-2 node and never reach the huge component. Our algorithm is inspired by a recent theoretical result for solving the Connected Maximum Coverage (Connected Max-Cover) problem in [27]. The Connected Max-Cover assumes a set of elements I, a graph G = (V, E) and a budget k. Each node v ∈ V associates with a subset Pv ⊆ I. The problem asks for a connected subgraph g with at most k nodes of G that maximizes ∪v∈gPv. The proposed algorithm in [27] sequentially selects nodes with highest ratio of newly covered nodes to the length of the shortest path from observed nodes and is proved to obtain an e−1 (2e−1)r -approximation factor. Algorithm 1 Tada-Probe Approximation Algorithm Input: The reference network G = (V, E), a sampled subnetwork G(cid:48) = (V (cid:48), E(cid:48)) and a budget k. Output: Augmented graph of G(cid:48). 1: Collapse all fully observed nodes to a single root node R 2: i = 0 3: while i < k do 4: 5: 6: 7: 8: end while 9: return G(cid:48) = (V (cid:48), E(cid:48)) O(v)\V (cid:48) vmax ← maxv∈V \V f ,P V f (v)≤k−i V f (v) P Probe all the nodes v ∈ PV f (vmax) Update V (cid:48), V f , V p, V u and E(cid:48) accordingly i = i + PV f (vmax) Each node in a network can be viewed as associated with a set of connected nodes. We desire to select k connected nodes to maximize the union of k associated sets. However, different from Connected Max-Cover in which any connected subgraph is a feasible solution, Tada- GPM requires the k selected nodes to be connected from the fully observed nodes V f . Thus, we analogously put another constraint of connectivity to a fixed set of nodes on the returned solution and that adds a layer of difficulty. Interestingly, we show that rooting from observed nodes and greedily adding nodes in the same manner as [27] gives an r+1-approximate solution. Additionally, our analysis leads to a better approximation result for Connected Max-Cover e−1 since (2e−1)r < 1 Let denote O(v) to be the set of nodes that v is con- nected to, i.e., O(v) = {u(v, u) ∈ E} and PV f (v) be the set of nodes on the shortest path from nodes in V f to v. For a set of nodes S, we call f (S) the number of newly discov- ered nodes by probing S. Hence, f (S) is our objective func- tion. Our approximation algorithm, namely Topology-aware Adaptive Probing (Tada-Probe), is described in Alg. 1. 2.58·r < 1 r+1. 1 The algorithm starts by collapsing all fully observed nodes in G(cid:48) into a single root node R which serves as the starting point. It iterates till all k alloted budget have been exhausted into selecting nodes (Line 3). In each iteration, it selects a node vmax ∈ V \V f within distance k − i having maximum ratio of the number of unobserved nodes O(v)\V (cid:48) to the length of shortest path from nodes in V f to v (Line 4). Afterwards, all the nodes on the shortest path from V f to vmax are probed (Line 5) and the incomplete graph is updated accordingly (Line 6). The approximation guarantee of Tada-Probe is stated in the following theorem. THEOREM 2. Tada-Probe returns an r+1 -approximate probing strategy for Tada-GPM problem where r is the ra- dius of the optimal solution. 1 1, v∗ 2, . . . , v∗ Proof. Let denote the solution returned by Tada-Probe S and an optimal solution S∗ = {v∗ k} which results in the maximum number of newly discovered nodes, denoted by OP T . We assume that both S and S∗ contain exactly k nodes since adding more nodes never gives worse solutions. We call the number of additional unobserved nodes discovered by S(cid:48) in addition to that of S, denoted by ∆S(S(cid:48)), the marginal benefit of S(cid:48) with respect to S. For a single node v, ∆S(v) = ∆S({v}). In addition, the ratio of the marginal benefit to the distance from the set S to a node v, called benefit ratio, is denoted by δS(v) = ∆S (v) PS (v). Since in each iteration of Tada-Probe, we add all the nodes along the shortest path connecting V f to vmax, we assume that t ≤ k iterations are performed. In iteration i ≥ 0, node vi max is selected to probe and, up to that iteration, Si nodes have been selected so far. Due to the greedy selection, we have, ∀i ≥ 1,∀v ∈ Si\Si−1,∀v∗ ∈ S∗, (3.1) δSi−1 (vi (3.4) δSi−1(v∗ j ) The left hand side is actually f ( S) which is sum of marginal benefit over all iterations. The other is the sum of benefit ratios over all the nodes in the optimal solution S∗ with respect to sets Si−1, where 0 ≤ i ≤ k − 1, which are subsets of S. Thus, ∀i, j, max) ≥ δSi−1 (v∗) Si(cid:88) (3.2) Thus, we obtain, PSi−1 (vi or, equivalently, (3.3) ∆Si−1(vi max) ≥ max) · δSi−1 (vi max) ≥ Si(cid:88) max) ≥ t(cid:88) j=Si−1 ∆Si−1(vi Si(cid:88) t(cid:88) i=1 i=1 j=Si−1 Adding Eq. 3.3 over all iterations gives, δSi−1(v∗ j ) j=Si−1 δSi−1 (v∗ j ) r j ) (3.5) (3.6) t(cid:88) δSi−1 (v∗ j ) ≥ δ S(v∗ Si(cid:88) Then, the right hand side is, Notice that ∆ S(v∗ j ) is the marginal benefit of node v∗ t(cid:88) respect to set S, hence, the summation itself becomes, j ) ≥ ∆ S(v∗ j ) ≥ ∆ S(v∗ j ) P S(v∗ j ) ≥ t(cid:88) Si(cid:88) ∆ S(v∗ j ) r k(cid:88) δSi−1 (v∗ Si(cid:88) j=Si−1 j=Si−1 i=1 i=1 ∆ S(v∗ j ) = ∆ S(v∗ i=1 j=Si−1 j=1 j ) = f (S∗) − f ( S) = OP T − f ( S) j with Thus, Eq. 3.4 is reduced to, f ( S) ≥ OP T − f ( S) (3.7) Rearranging the above equation, we get, r (3.8) which completes our proof. f ( S) ≥ OP T r + 1 1 the Heuristic. Despite 3.3.1 Improved r+1- approximation guarantee, Tada-Probe algorithm only considers the gain of ending node in a shortest path and completely ignores the on-the-way benefit. That is the newly observed nodes discovered when probing the inter- mediate nodes on the shortest paths are neglected in making decisions. Thus, we can improve Tada-Probe by counting all the newly observed nodes along the connecting paths which are not necessarily the shortest paths and the selection criteria of taking the path with largest benefit ratio is applied. Since the selected path of nodes has the benefit ratio of at least as high as that of considering only the ending nodes, the 1 r+1-approximation factor is preserved. Following that idea, we propose a Dijkstra based algo- rithm to select the path with maximum benefit ratio. We as- sign for each node u a benefit ratio δ(u), a distance measure d(u) and a benefit value ∆(u). Our algorithm iteratively se- lects a node u with highest benefit ratio and propagates the distance and benefit to its neighbors: if neighbor node v ob- serves that by going through v, u's benefit ratio gets higher, v will update its variables to have u as the direct predecessor. Our algorithm finds the path with highest benefit ratio. Note that extra care needs to be taken in our algorithm to avoid having loops in the computed paths. The loops normally do not appear since closing a loop only increases the distance by one while having the same benefit of the path. However, in extreme cases where a path passes through a node with exceptionally high number of connections to unobserved nodes, loops may happen. To void having loops, we check whether updating a new path will close a loop by storing the predecessor of each node and traverse back until reaching a fully observed node. 3.3.2 Optimal ILP Algorithm. To study the optimal so- lution for our Tada-GPM problem when topology is avail- able, we present our Integer Linear Programming formula- tion. Hence, We can use a convenient off-the-shelf solver, e.g., Cplex, Gurobi, to find an optimal solution. Unfor- tunately, Integer Linear Programming is not polynomially solvable and thus, extremely time-consuming. In the prior step, we also collapse all fully probed nodes into a single node r and have connections from r to partially observed nodes. Assume that there are n nodes including r, for each u ∈ V , we define yu ∈ {0, 1},∀u ∈ V such that, (cid:40) yu = 1 0 if node u is observed, otherwise. (cid:40) Since at most k nodes are selected adaptively, we can view the solution as a tree with at most k layers. Thus, we define xuj ∈ {0, 1},∀u ∈ V, j = 1..k such that, 1 0 xuj = if node u is selected at layer j or earlier, otherwise. The Tada-GPM problem selects at most k nodes, i.e., u∈V xuk ≤ k to maximize the number of newly observed u∈V yu. A node is observed if at least one of v∈N (u) xvk where N (u) denotes the set of u's neighbors. Since r is the initially fully observed nodes, we have xr0 = 1. Furthermore, u can be selected at layer j if at least one of its neighbors has been (cid:80) nodes, i.e.,(cid:80) its neighbors is selected meaning yu ≤(cid:80) probed and thus, xuj ≤(cid:80) (cid:88) Our formulation is summarized as follows, v∈N (u) xv(j−1). yu − N (r) − 1 u ∈ V, u (cid:54)= r (3.9) s.t. max u∈V xr0 = 1, xu0 = 0, (cid:88) yu ≤ (cid:88) u∈V xuk ≤ k v∈N (u) xvk, ∀u ∈ V, (cid:88) ∀u ∈ V, j = 0..k − 1, xuj ≤ xu(j+1), xuj ≤ xu(j−1) + xuj, yu ∈ {0, 1},∀u ∈ V, j = 0..k. v∈N (u) xv(j−1), ∀u ∈ V, j = 1..k, From the solution of the above ILP program, we obtain the solution for our Tada-GPM instance by simply selecting nodes u that xuk = 1. Note that the layering scheme in our formulation guarantees both the connectivity of the returned solution and containing root node r and thus, the returned solution is feasible and optimal. THEOREM 3. The solution of the ILP program in Eq. 3.9 infers the optimal solution of our Tada-GPM. Table 3: Statistics for the networks used in our experiments. ACC stands for Average Clustering Coefficient. Bold and underlined networks are used for training. Name Network Type Roadnw-CA Road 21k Roadnw-OL Road 6k Roadnw-TG Road 18k p2p (GnuTella) GnuTella04 11k GnuTella05 p2p 9k GnuTella09 p2p 8k Collaboration (CA) 5k Ca-GrQc Collaboration Ca-HepPh 12k Ca-HepTh Collaboration 10k Ca-CondMat Collaboration 23k Ca-AstroPh Collaboration 18k #Node #Edges ACC 7.10−5 0.01 0.018 0.006 0.007 0.009 0.529 0.611 0.471 0.633 0.630 21k 7k 23k 40k 32k 26k 14k 118k 26k 93k 198k network includes several snapshots of GnuTella network with nodes represent hosts in GnuTella network topology and edges represent connections between hosts. In the third type, we use five collaboration networks that cover scientific collaborations between authors papers in which nodes represent scientists, edges represent collaborations. The last type of network models metabolic pathways which are linked series of chemical reactions occurring in cell. Table 4: Number of new explored nodes at budget k = 300 from all implemented probing methods in all datasets. XXXXXXXXX Methods Dataset GnuTella Net. CA Net. Road Net. CLC BC DEG CC PR RAND MaxOutProbe 2471 2341 1958 1999 1994 2381 1820 3098 5052 3471 3547 3639 2911 902 358 346 346 326 342 329 28 Sampling Methods. We adopt the Breadth-First Search sampling [21] to generate subgraphs for our experiments. In our regression model, for each network that is marked for training in Table 3, we generate samples with number of nodes varies from 0.5% to 10% number of nodes in G. The size distribution of the subgraphs follows a power law distribution with power-exponent γ = −1/4. The size of subgraphs used in validation is kept to be roughly 5% of the network size. Probing Methods. We compare performance of our linear regression (LinReg) and logistic regression (LogReg) probing method with MaxOutProbe[3], RAND (probe a random gray node), and centrality-based methods DEG, Figure 4: Performance of different algorithms 3.3.3 Empirical Evaluation. Here, we compare the prob- ing performance in terms of the number of newly probed nodes that different algorithms deliver on a Facebook ego network1 with 347 nodes and 5029 edges. The results are presented in Fig. 4. The figure shows that our Heuristic im- provement very often meets the optimal performance of the ILP algorithm while Tada-Probe is just below the former two methods. However, the naive Greedy algorithm performs badly due to having no guarantee on solution quality. 3.4 Training Models. We consider two classes of well- studied machine learning models. First, linear regression model is applied to learn a linear combination of features characterized by coefficients. These coefficients learn a linear representation of the dependence of labels on the features. The output of training phase of linear regression model is a function fLin(.) which will be used to estimate u of probing a node u in subgraph G(cid:48). It is noted the gain wo that we learn fLin(.) from sampled graph G(cid:48) i of the reference graph Gr and use fLin(.) to probe the incomplete G(cid:48). u, wo Secondly, we consider logistic regression to our problem v be the gain of probing the two nodes as follow: Let wo u and v respectively. Given a pair of nodes < u, v > in V p , our logistic model fLog(.) learns to predict whether wo G(cid:48) u i in G, we compute node is larger than wo features of each node u ∈ V p G(cid:48) nodes for each subgraph G(cid:48) i and then concatenate features of two nodes in a pair to form a single data point. Each data point < u, v > is labeled by binary value (1 or 0): . We generate(cid:0)V p (cid:1) pairs of v. Thus, for each G(cid:48) Gi 2 i i (cid:40) if wo if wo u ≥ wo v; u < wo v. 1 0 (3.10) l = 4 Experiments In this section, we perform experiments on real-world net- works to evaluate performance of the proposed methods. Datasets. Table 3 describes three types of real-world networks used in our experiments. The road network [28, 29] includes edges connecting different points of interest (gas stations, restaurants) in cites. The second type of 1http://snap.stanford.edu/data/egonets-Facebook.html 0 100 200 300 0 2 4 6 8 10# Newly Probed NodesBudget (k)Optimal ILPTada-HeuristicTada-ProbeGreedy (a) GnuTella Network (b) Collaboration Network (c) Road Network Figure 5: Performance Comparison of Base Case Machine Learning (h = 1) with Metric-based and Heuristic Approaches. (a) GnuTella Network (b) Collaboration Network (c) Road Network Figure 6: Performance of Machine Learning Method with Further Looking Ahead and Other Probing Methods. BC, CC, PR, CLC (see table 2) that probe the node with the highest centrality value in each step. Each considered method has different objective function for selecting nodes to probe. Sharing the same idea, all of these methods rank nodes in set V p of G(cid:48), and select the nodes with highest ranking to probe first. Performance Metrics. For each probing method, we conduct probing at budgets k ∈ {1, 100, 200, 300}. During probing process, we compare performance among probing methods using newly explored nodes, i.e., the increase in the number of nodes in G(cid:48) after k probes. For each of the network used in the validation, we report the average results over 50 subgraphs. For obvious reason, we do not use the training network for validation. We use statistical programming language R to imple- ment MaxOutProbe and use C++ with igraph framework to implement LinReg, LogReg and metric-based probing methods. All of our experiments are run on a Linux server with a 2.30GHz Intel(R) Xeon(R) CPU and 64GB memory. In Fig. 5, we take top 3 metric-based methods in each type of network and compare their performance with Lin- Reg and LogReg. Here, both machine learning methods are trained by using the benefit of node in only 1-step ahead (h = 1, i.e., setting k = 1 in Alg. 1). Their probing perfor- mance outperforms metric-based methods in GnuTella net- work 20% on average. They match performance of other methods in Road network and are 7% worse than BC in Col- laboration network. The experiment with MaxOutProbe in Road network faces the problem of non-adaptive behavior of MaxOutProbe: V p of Road network's samples is smaller than maximal budget k, besides, due to the very low density property of Road network, after probing V p nodes in sam- pled networks MaxOutProbe explores only few new nodes in underlying network; these factors lead to very poor per- formance of MaxOutProbe. MaxOutProbe also performs poorly as compared with adaptive implementation of metric based methods: It is 67%, and 36% worse than LinReg in Collaboration, GnuTella network respectively. 4.1 Comparison between Machine Learning Methods and Metric-based Probing Methods. Table 4 presents probing performance of metric-based methods in each group of networks with the best one is highlighted. Reported re- sult is the number of explored nodes at the end of probing process (k = 300). 4.2 Benefits of Looking Into Future Gain. For LinReg and LogReg, we use different functions trained by different labels (marked as h = 1, h = 2, h = 3, h = 4 , which indicates regression functions are trained with benefits of node in 1-step, 2-step, 3-step or 4-step ahead). In Fig. 6, we evaluate LinReg and LogReg with RAND and the best 0 1000 2000 30001100200300#Newly Explored NodesBudget (k)LinRegLogRegCLCBCCCMax. 0 1000 2000 30001100200300#Newly Explored NodesBudget (k)BCLinRegLogRegPRCCMax. 0 150 300 4501100200300#Newly Explored NodesBudget (k)CLCLogRegBCLinRegDEGMax.119102126100145146147132137137138134121h=1h=2h=3h=4h=1h=2h=3h=4100125150BCCCCLCDEGLinRegLinRegLinRegLinRegLogRegLogRegLogRegLogRegRANDProportion to Node Degree Centrality (%)14310210310013315215413812312012011894.9h=1h=2h=3h=4h=1h=2h=3h=4100125150BCCCCLCDEGLinRegLinRegLinRegLinRegLogRegLogRegLogRegLogRegRANDProportion to Node Degree Centrality (%)10010310010099105106951021021019795h=1h=2h=3h=4h=1h=2h=3h=49095100105110BCCCCLCDEGLinRegLinRegLinRegLinRegLogRegLogRegLogRegLogRegRANDProportion to Node Degree Centrality (%) metric-based methods for each type of network reported in Table 4. We use of DEG as baseline for our performance comparison. Specifically, we take the ratio of number of newly explored nodes of each probing method to number of newly explored nodes of DEG at the end of probing process. We omit result of MaxOutProbe due to its poor performance observed from previous subsection. LinReg shows consecutive improvement in probing per- formance with h = 1, h = 2, h = 3 as it ranks candidate nodes in set V p based on their predicted gain at increasing number of hops far away from them. Overall, LinReg has better performance than LogReg. The h = 3 of LinReg and LogReg outperforms DEG from 12% to 15% in Collabo- ration and GnuTella network. The result observed for Road network is from 1% to 5%. LinReg with h = 3 outperforms the best metric-based method in GnuTella network 11.6%; the improvement for Collaboration and Road network are 7.5%, 2.2% respectively. The h = 4 of LinReg and Lo- gReg starts decreasing compared with h = 1, h = 2 and h = 3. This indicates the benefit of looking further benefits of selecting a node is true within specific number of hops far away from nodes. Among metric-based methods, while BC consistently performs well, the best method varies across the networks. It indicates the underlying network structure impacts perfor- mance of metric-based method and it is hard to determine which node centrality method is the best for which type of network. Interestingly, performance of random probing matches or even outperforms BC, DEG, CC in GnuTella networks. It is because GnuTella networks have low aver- age clustering coefficient that makes BFS-based samples of these networks have star structure. Consequently, metric- based methods tend to rank candidate nodes in sampled net- work with same score. This helps random probing performs better than metric-based methods in this type of network. 5 Conclusion This paper studies the Graph Probing Maximization problem which serves as a fundamental component in many decision making problems. We first prove that the problem is not only NP-hard but also cannot be approximated within any finite factor. We then propose a novel machine learning framework to adaptively learn the best probing strategy in any individual network. The superior performance of our method over metric-based algorithms is shown by a set of comprehensive experiments on many real-world networks. References [1] H. T. Nguyen and T. N. Dinh, "Targeted cyber-attacks: Un- veiling target reconnaissance strategy via social networks," in INFOCOM WKSHPS, pp. -- , IEEE, 2016. [2] K. Avrachenkov, P. Basu, G. Neglia, B. Ribeiro, and D. Towsley, "Pay few, influence most: Online myopic net- work covering," in INFOCOM WKSHPS, pp. 813 -- 818, IEEE, 2014. [3] S. Soundarajan, T. Eliassi-Rad, B. Gallagher, and A. Pinar, "Maxoutprobe: An algorithm for increasing the size of par- tially observed networks," NIPS, 2015. [4] S. Hanneke and E. P. Xing, "Network completion and survey sampling.," in AISTATS, pp. 209 -- 215, 2009. [5] F. Masrour, I. Barjesteh, R. Forsati, A. Esfahanian, and H. Radha, "Network completion with node similarity: A matrix completion approach with provable guarantees," in ASONAM, pp. 302 -- 307, IEEE, 2015. [6] D. Golovin and A. Krause, "Adaptive submodularity: A new approach to active learning and stochastic optimization.," in COLT, pp. 333 -- 345, 2010. [7] L. Seeman and Y. Singer, "Adaptive seeding in social net- works," in FOCS, pp. 459 -- 468, IEEE, 2013. [8] J. Cho, H. Garcia-Molina, and L. Page, "Efficient crawling through url ordering," 1998. [9] S. Chakrabarti, Mining the Web: Discovering knowledge from hypertext data. Elsevier, 2002. [10] M. Ester, H.-P. Kriegel, and M. Schubert, "Accurate and efficient crawling for relevant websites," in VLDB, pp. 396 -- 407, VLDB Endowment, 2004. [11] S. Chakrabarti, M. Van den Berg, and B. Dom, "Focused crawling: a new approach to topic-specific web resource discovery," Computer Networks, vol. 31, no. 11, pp. 1623 -- 1640, 1999. [12] D. H. Chau, S. Pandit, S. Wang, and C. Faloutsos, "Parallel crawling for online social networks," in WWW, pp. 1283 -- 1284, ACM, 2007. [13] A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks," in SIGCOMM, pp. 29 -- 42, ACM, 2007. [14] H. Kwak, C. Lee, H. Park, and S. Moon, "What is twitter, a social network or a news media?," in WWW, pp. 591 -- 600, ACM, 2010. [15] Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, "Key challenges in defending against malicious socialbots," in USENIX, 2012. [16] A. Elishar, M. Fire, D. Kagan, and Y. Elovici, "Organizational intrusion: Organization mining using socialbots," in SocialIn- formatics, pp. 7 -- 12, IEEE, 2012. [17] A. Elyashar, M. Fire, D. Kagan, and Y. Elovici, "Homing socialbots: intrusion on a specific organization's employee using socialbots," in ASONAM, pp. 1358 -- 1365, ACM, 2013. [18] M. Fire, R. Goldschmidt, and Y. Elovici, "Online social networks: Threats and solutions," Communications Surveys & Tutorials, IEEE, vol. 16, no. 4, pp. 2019 -- 2036, 2014. [19] A. Paradise, A. Shabtai, and R. Puzis, "Hunting organization- targeted socialbots," in ASONAM, pp. 537 -- 540, ACM, 2015. [20] M. Kim and J. Leskovec, "The network completion problem: Inferring missing nodes and edges in networks.," in SDM, vol. 11, pp. 47 -- 58, SIAM, 2011. [21] A. S. Maiya and T. Y. Berger-Wolf, "Sampling community structure," in WWW, pp. 701 -- 710, ACM, 2010. [22] N. P. Nguyen, Y. Xuan, and M. T. Thai, "A novel method for worm containment on dynamic social networks," in Military Communications Conference, 2010-MILCOM 2010, pp. 2180 -- 2185, IEEE, 2010. [23] T. N. Dinh, D. T. Nguyen, and M. T. Thai, "Cheap, easy, and massively effective viral marketing in social networks: truth or fiction?," in Proceedings of the 23rd ACM conference on Hypertext and social media, pp. 165 -- 174, ACM, 2012. [24] N. P. Nguyen, T. N. Dinh, D. T. Nguyen, and M. T. Thai, "Overlapping community structures and their detection on social networks," in Privacy, Security, Risk and Trust (PAS- SAT) and 2011 IEEE Third Inernational Conference on So- cial Computing (SocialCom), 2011 IEEE Third International Conference on, pp. 35 -- 40, IEEE, 2011. [25] T. N. Dinh, H. Zhang, D. T. Nguyen, and M. T. Thai, "Cost-effective viral marketing for time-critical campaigns in large-scale social networks," IEEE/ACM Transactions on Networking, vol. 22, no. 6, pp. 2001 -- 2011, 2014. [26] M. Newman, Networks: an introduction. OUP Oxford, 2010. [27] F. Vandin, E. Upfal, and B. J. Raphael, "Algorithms for detecting significantly mutated pathways in cancer," J. Comp. Biol., vol. 18, no. 3, pp. 507 -- 522, 2011. [28] F. Li, D. Cheng, M. Hadjieleftheriou, G. Kollios, and S.- H. Teng, "On trip planning queries in spatial databases," in SSTD, pp. 273 -- 290, Springer, 2005. [29] T. Brinkhoff, "A framework for generating network-based moving objects," GeoInformatica, vol. 6, no. 2, pp. 153 -- 180, 2002. Supplementary Material for 'Towards Optimal Strategy for Adaptive Probing in Incomplete Networks' Complete proof of Theorem 1 Proof. To prove Theorem 1, we construct classes of in- stances of the problems that there is no approximation al- gorithm with finite factor. (a) Without global degrees (b) With global degrees Figure 7: Hardness illustration on global node degrees. We construct a class of instances of the probing prob- lems as illustrated in Figure 7a. Each instance in this class has: a single fully probed node in black b1, n observed nodes in gray each of which has an edge from b1 and one of the observed nodes, namely g∗ varying between differ- ent instances, having m connections to m unknown nodes in white. Thus, the partially observed graph contains n + 1 nodes, one fully probed and n observed nodes which are se- lectable, while the underlying graph has in total of n + m + 1 nodes. Each instance of the family has a different g∗ that m unknown nodes are connected to. We now prove that in this class, no algorithm can give a finite approximate solution for the two problem. First, we observe that for any k ≥ 1, the optimal solu- tion which probes the nodes with connections to unknown nodes has the optimal value of m newly explore nodes, de- noted by OP T = m. We sequentially examine two possible cases of algorithms, i.e., deterministic and randomized. • Consider a deterministic algorithm A, since the A is unaware of the connections from gray to unknown nodes, given a budget 1 ≤ k (cid:28) n, the lists or sequences of nodes that A selects are exactly the same for different instances of problems in the class. Thus, there are instances that g∗ is not in the fixed list/sequence of nodes selected by A. In such cases, the number of unknown nodes explored by A is 0. Compared to the OP T = m, A is not a finite factor approximation algorithm. • Consider a randomized algorithm B, similarly to the de- terministic algorithm A, B does not know the connec- tions from the partially observed nodes to white ones. Thus, the randomized algorithm B essentially selects at random k nodes out of n observed nodes. However, this randomized scheme does not guarantee to select g∗ as one of its selected nodes and thus, in many situations, the number of unknown nodes discovered is 0 that inval- idates B to be a finite factor approximation algorithm. In average, B has k n chance of selecting g∗ which leads to an optimal solutions with OP T = m. Hence, the n and the ratio with optimal value objective value is km n. Since k (cid:28) n, we can say that the ratio is O( 1 is k n ) which is not finite in the average case for randomized algorithm B. In both cases of deterministic and randomized algorithms, there is no finite factor approximation algorithm for ada- GPM or batch-GPM.
1608.00142
1
1608
2016-07-30T16:41:58
Identifying vital edges in Chinese air route network via memetic algorithm
[ "cs.SI", "physics.soc-ph" ]
Due to its rapid development in the past decade, air transportation system has attracted considerable research attention from diverse communities. While most of the previous studies focused on airline networks, here we systematically explore the robustness of the Chinese air route network, and identify the vital edges which form the backbone of Chinese air transportation system. Specifically, we employ a memetic algorithm to minimize the network robustness after removing certain edges hence the solution of this model is the set of vital edges. Counterintuitively, our results show that the most vital edges are not necessarily the edges of highest topological importance, for which we provide an extensive explanation from the microscope of view. Our findings also offer new insights to understanding and optimizing other real-world network systems.
cs.SI
cs
Identifying vital edges in Chinese air route network via memetic algorithm Wen-Bo Dua,b, Bo-Yuan Lianga,b, Gang Yanc, Oriol Lordand, Xian-Bin Caoa,b* aSchool of Electronic and Information Engineering, BeihangUniversity, Beijing 100191, P.R.China bBeijing Key Laboratory for Network-based Cooperative Air Traffic Management, Beijing 100191, c School of Physics Science and Engineering, Tongji University, Shanghai 200092, P. R. China dUniversitat Politècnica de Catalunya-BarcelonaTech, C/Colom no. 11, Terrassa 08222, Spain P.R.China Abstract Due to its rapid development in the past decade, air transportation system has attracted considerable research attention from diverse communities. While most of the previous studies focused on airline networks, here we systematically explore the robustness of the Chinese air route network, and identify the vital edges which form the backbone of Chinese air transportation system. Specifically, we employ a memetic algorithm to minimize the network robustness after removing certain edges hence the solution of this model is the set of vital edges. Counterintuitively, our results show that the most vital edges are not necessarily the edges of highest topological importance, for which we provide an extensive explanation from the microscope of view. Our findings also offer new insights to understanding and optimizing other real-world network systems. Keywords: vital edges; air route network; memetic optimization. 1. Introduction1 With the increasing people and goods transport demand during the accelerating globalization process, the air transportation system plays a more and more important role than ever before due to its high-speed and high-security advantages. For example, the air transport volume of China grows at an average annual speed of over 10% in the past decades, and now it possesses over one seventh of the total comprehensive transport volume (including roadways, railways, shipping and air transport), which was only 7.9% in 2000. Hence the air transportation system has been drawing much attention from different research communities. One of the most interesting directions is to analyze the structure and function of air transportation systems within the framework of complex network theory. The air transportation system can be represented as a network, in which nodes denote airport and an edge will be created if there is a direct flight between two airports. In the vast majority of previous literature, the air transport network (ATN) was primarily classified into two scales: worldwide and national. For the worldwide scale, Amaral et al. firstly found worldwide ATN is a small-world network with a power-law degree distribution, and the highest-degree airport is not necessarily the most central node, prompting them to propose a network model where both geographical and political factors are taken into account[1-2]. Barrat et al. investigated the worldwide ATN from a perspective of complex weighted networks and found the nonlinear positive correlation between flight flow and topology properties[3-4]. They proposed a weighted network model, enlightening the understanding of weighted feature of complex systems. Verma et al. decomposed the worldwide ATN into three distinct layers via k-core decomposition and found that this network is robust to the removal of long distance edges, but fragile to the disconnectivity of short and apparently insignificant edges[5-6]. For the national scale, ATNs of several major nations, such as US, Brazil, India and China, are extensively studied[3, 7-11], and the national ATNs usually exhibit different features from the worldwide ATN. Gautreau et al. studied US ATN during 1990–2000[3]. A remarkable result they presented is that although most statistical properties are stationary, an intense activity takes place at the local level. Fleurquin et al. proposed a delay propagation model via quantifying the network congestion for US ATN, revealing that even under normal operating condition the systemic instability risk is *Corresponding author. Tel.: +86-10-82314318 E-mail address: [email protected] non-negligible[11]. Rocha investigated the Brazilian ATN during 1995-2006, and found that it shrank in topology but grew in traffic volume [7]. Bagler et al. studied the Indian ATN, and found its signature of hierarchy feature[12]. As the most active economy, the Chinese aviation industry ranks second to US in the past decade and keeps a high increase rate. Consequently, Chinese ATN attracts continuous attention in different aspects, from topology to dynamics and evolution [8-10, 13-14], one of which is to investigate the backbone of ATN, the air route network (ARN). ATN is actually a logic network with Origin-Destination (OD) relationships. In real air traffic operation, a flight does not straightly fly from departure airport to landing airport, but along some air route waypoints. ARN consists of air route waypoints and connections between them. In 2012, Cai et al. firstly investigated the Chinese ARN[15] and found that the degree distribution of Chinese ARN is homogeneous but the traffic flow on it is rather heterogeneous. Vitali et al then investigated the horizontal deviation and delays in Italian ARN[16]. The analysis of ARN is quite a novelty in the literature. However, the network robustness, which is an important issue for infrastructure systems[17] and has been extensively studied in ATN [18-21] ,is still rare in ARN. In the typical network robustness model, edges are removed by different targeted attack strategies and the size of giant component estimates the robustness of the network[30]. When a small amount of edges are removed, the size of giant component is of a very small change. In this paper, we focus on identifying the vital edges in Chinese ARN by examining the robustness of the new network after removing an edge set via memetic optimization. Remarkably, we find that the most vital edges are not necessarily the edges of highest topological importance. The rest of paper is organized as follows. In the next section we demonstrate Chinese air route network and its basic properties. Section 3 describes the optimization model and the memetic algorithm. Section 4 presents the simulation results and corresponding analysis. Finally, the paper is concluded in Section 5. 2. Chinese air route network The latest data of the Chinese air route network are provided by the Air Traffic Management Bureau (ATMB) of China. In the Chinese ARN, airports or air route waypoints are nodes and edges are represented by the air route segments. An air route waypoint is a navigation marker which keeps the pilots informed about the desired track. In the air transportation system, the flights will fly along the air route waypoints, but not directly fly from one airport to another (Fig.1). Figure 1 is an illustration of ARN, where airlines are depicted by the dotted line and air route segments are denoted by the solid line. Figure 2 shows the structure of the Chinese ARN, which contains 𝑁 = 1,499 nodes and 𝑀 = 2,242 edges. In ref. [15], the authors found that the topology structure of the Chinese ARN is homogeneous, yet its distribution of flight flow is quite heterogeneous. If we compare the Chinese ATN with the Chinese ARN we found significant differences. On one hand, the Chinese ATN is a typical small-world with low average shortest path length and large clustering coefficient. On the other hand, the Chinese ARN is not a small-world network due its low clustering coefficient, large average shortest path length and exponential spatial distance distribution. Fig. 1 An illustration of ARN. Air route waypointAir route segmentAirlineAirport AAirport B Fig.2 The structure of the Chinese ARN. Here the Chinese ARN contains 𝑁 = 1,499 nodes and 𝑀 = 2,242 edges. 3. Model 3.1. Optimization Model The static robustness of complex networks has been extensively studied in the past decades. In ref [22], it is quantified by the relative size of the largest connected component 𝑮 = 𝑵′/𝑵, where 𝑵 is the total number of nodes in initial network and 𝑵′ is the number of nodes in largest component after attack. The larger value of 𝑮 represents a more robust network. Based on the largest connected component, Schneider et al. proposed a measure 𝑹 to evaluate the robustness against targeted attack on nodes[17]. 𝑅 = 1 𝑁 𝑁 ∑ 𝑠(𝑄) 𝑄=1 where 𝒔(𝑸) is the fraction of nodes in largest component after removing 𝑸 nodes. For calculating the robustness of a network we will follow a degree adaptive strategy: the highest degree nodes will be systematically remove one by one. It is a more comprehensive measure of network robustness. Obviously, a network with higher R has a stronger resistance to targeted attacks. In the Chinese ARN, the closure of air route segment will decrease the connectivity of the whole network. It is of great significance to identify vital edges that lead to the vulnerability of ARN. In ref [23], Freeman proposed a global metric edge-betweenness to measure the importance of an edge, which can identify influential edges effectively. It is defined as follows, 𝐵𝐸(𝑖) = ∑ 𝑗,𝑘∈𝑉,𝑗≠𝑘 𝑛𝑗𝑘(𝑖) 𝑛𝑗𝑘 where V is the set of nodes, and 𝒏𝒋𝒌(𝒊) denotes the number of shortest paths from j to k. 𝒏𝒋𝒌(𝒊) denotes the number of shortest paths from j to k that via edge i. In this work, we formulate a combinational optimization problem to identify the vital edges within network robust model in the Chinese ARN. The objective is to minimize the network robustness after removing certain edges, i.e. closing certain air route segments. Therefore, these edges play an important role in maintaining network robustness. The optimization model is formulated as follows, min 𝑅′(𝑥) 𝑥 = [𝑒(1), 𝑒(2), … , 𝑒(𝑉)] 𝑉 s. t. ∑ 𝑥𝑖 = 𝑐𝑜𝑠𝑡 where V is the total number of edges in the network and x is a V dimensional binary variable, 𝒆(𝒌) ∈ {𝟎, 𝟏} (𝒆(𝒌) represents the kth edge in the network). 𝒆(𝒌) = 𝟏 represents the edge 𝒆(𝒌) is removed, 𝑖=1 otherwise it remains in the network. The total number of removed edges is certain and denoted as cost (C). So, we can identify critical edges in the network minimizing its robustness. 3.2. Memetic Algorithm For solving this optimization model we will use the memetic algorithm (MA), a useful tool for dealing with large-scale combinational problem[24-27]. Coming from the concept of meme, MA is defined as a part of local improvement in the process of cultural evolution. It is a hybrid metaheuristic of global search and heuristic local search with three operations: crossover, local search and tournament selection. Initialization In MA, the population is composed of 𝑿𝒏 individuals. Each individual x represents a scheme of removing edges in the network and was generated randomly. Crossover The crossover operator works on two parent individuals and can search in a large area. Suppose that 𝒙𝒑𝟏 and 𝒙𝒑𝟐 are two parent individuals, and 𝒙𝒄𝟏 and 𝒙𝒄𝟐 are two child individuals. First, we assign 𝒙𝒑𝟏 to 𝒙𝒄𝟏 and 𝒙𝒑𝟐 to 𝒙𝒄𝟐 and obtain the following sets of edges. 𝐸𝑐 = {𝑒𝑒 ∈ 𝑥𝑐1, 𝑒 ∈ 𝑥𝑐2} 𝐸𝑐1 = 𝑥𝑐1 − 𝐸𝑐 𝐸𝑐2 = 𝑥𝑐2 − 𝐸𝑐 In fact, 𝐸𝑐 is the set of common edges of 𝑥𝑐1 and 𝑥𝑐2. 𝐸𝑐1 and 𝐸𝑐2 are the set of edges of the network after removing the common edges of 𝑥𝑐1 and 𝑥𝑐2. That is, 𝐸𝑐1 and 𝐸𝑐2 have the same number of edges but completely different. Then, for each pair of edges in 𝐸𝑐1 and 𝐸𝑐2 we conduct the following operations with the probability Pc. 𝑥𝑐1 = 𝑥𝑐1 − 𝐸𝑐1[𝑖] + 𝐸𝑐2[𝑖] 𝑥𝑐2 = 𝑥𝑐2 − 𝐸𝑐2[𝑖] + 𝐸𝑐1[𝑖] Fig.3 An illustration of crossover process. In summary, only the set of non-common edges we want to remove will be swapped between 𝒙𝒄𝟏 and 𝒙𝒄𝟐 (Fig. 3). Local Search The local search operator is an important part in MA that can accelerate the convergence speed. Based on previous edge importance evaluations[28-29], we adopted a local search in the direction of removing more important edges. We first select an individual from parent and child population using the roulette wheel selection based on their fitness. Then for each edge of the selected individual we conduct a local search with probability Pl. For example, edge 𝑒𝑖𝑗 (𝑒𝑖𝑗 represents the edge between node i and node j) will mutate to a randomly selected existing edge 𝑒𝑙𝑚 but not in its individual. This mutation will be accepted when the following formula is satisfied. 𝜇 ∙ 𝑘𝑙 − 𝑘𝑚 − 𝑘𝑖 − 𝑘𝑗 > 0 where 𝜇 is a formula parameter in the range [0,1] and 𝑘𝑙, 𝑘𝑚, 𝑘𝑖 and 𝑘𝑗 represents the degree of nodes l, m, i and j respectively. Tournament selection Commone(i)e(i+1)... ...e(C-1)e(C)xc1Commone(i)e(i+1)... ...e(C-1)e(C)xc2swap with Pc In this part, two individuals are respectively chosen from parent population and child population to run a tournament for the tournament selection. The population with the best fitness is selected for the next generation, and the total number of generation is 𝑃𝑚. To conclude, the pseudocode of MA proposed is presented as follows. Table 1 The pseudocode of MA Randomly selected two individual 𝑥𝑝𝑖 and 𝑥𝑝𝑗 that have not been selected. If rd < 𝑝𝑐 end if Assign parent 𝑥𝑝𝑖 and 𝑥𝑝𝑗 to child 𝑥𝑐𝑖 and 𝑥𝑐𝑗. (𝑥𝑐𝑖, 𝑥𝑐𝑗) ←Crossover (𝑥𝑝𝑖, 𝑥𝑝𝑗). Begin Initialize 𝑃𝑛 individuals with randomly selected existing edges in network. While g < 𝑃𝑚 Repeat Until (all individuals have been selected) For i = 1 to 2𝑃𝑛 Calculate the robustness of each individual in parent and child. Pnext ← 2-Tournament Selection (Pparent, Pchild); end while; End select an individual 𝑥𝑙 using the roulette wheel selection based on the fitness. For each edge 𝑒𝑖𝑗 in individual 𝑥𝑙 end for mutate with a new randomly selected edge 𝑒𝑙𝑚 but not in 𝑥𝑙. if 𝜇 ∙ 𝑘𝑙 − 𝑘𝑚 − 𝑘𝑖 − 𝑘𝑗 > 0 end if if rd < 𝑝𝑙 end if Accept the local search. 4. Result Here, in order to identify the vital edges, we examine the robustness of the new networks after removing edges via memetic algorithm (MA), and compare it with the highest edge-betweenness adaptive strategy (BEAS). To demonstrate the universality of our method, the experiments are carried out on both Chinese ARN and the general Barabási- Albert (BA) scale-free network. The Chinese ARN has 1,499 nodes and 2,242 edges. The BA scale-free network is generated with 𝑚0 nodes and a new node is added with m edges at each time step, which connect the new node with m different existing nodes. Here, it is set that 𝑚0 = 2 and 𝑚 = 2 and the BA network is of 1,000 nodes and 2,000 edges. The cost denoting total number of removing edges is set from 0 to 300 and the network without edges removed represents the initial network. Table 2 shows the configurations of the memetic algorithm parameters used on the optimization model. 𝑋𝑛 20 Table 2 The parameters of the memetic algorithm. 𝑃𝑐 0.8 𝑃𝑙 5/𝐶 μ 0.7 𝑃𝑚 500 Figure 4 shows the simulation results of the memetic algorithm (MA) and edge-betweenness adaptive strategy (BEAS) of identifying the vital edges for the BA network and Chinese ARN. Looking at both networks via MA, we can see that the robustness R decreases and the cost C increases when removing edges. It can also be noticed that the MA is significantly better than the BEAS. The difference between the two methods is especially high. It is obvious that the critical edges in the network are not extremely related with the edge-betweenness. Moreover, the memetic algorithm works better in the Chinese ARN decreasing its robustness R faster when a few edges are removed. That is because of the Chinese ARN is not a small-world network. And the Chinese ARN is vulnerable because of its small clustering coefficient and large average shortest path length. Fig. 4 The robustness R as a function of the cost C of removing edges for (a) the Chinese ARN and (b) the BA network. We have seen that the memetic algorithm works on both Chinese ARN and BA network. In order to reveal the underlying mechanism clearly, we examine a toy model with a network containing 10 nodes and 17 edges (Figure 5). In figure 5, the blue lines are the existing edges and gray dotted lines are edges removed in that step. In the same way, the gray nodes mean that these nodes are removed and yellow nodes still exist. When no edge is removed from the network as shown in Fig. 5(a), the robustness of the initial network is 0.35. Here, three edges are removed to measure the criticality of these edges using the MA and BEAS methods. Since edges 𝑒1,4, 𝑒2,7 and 𝑒4,9 have the highest edge -betweenness in the network, they are removed in the BEAS (Fig.5(b)) and now we have a new network named A. Similarly, edges 𝑒1,3, 𝑒4,9 and 𝑒7,9 are identified as the most important in the MA, and we now have a new network B (Fig. 5(f)). For estimating which group of edges is critical, we compare the robustness of network A and B (see Fig. 5(c-e) and Fig. 5(g-i)). Figure 6 illustrates the corresponding solutions and the robustness of the solution for both methods. In network A (BEAS) we first remove node 2 with the highest-degree together with all edges connected with it: 𝑒2,3, 𝑒2,4, 𝑒2,5, 𝑒2,8 and 𝑒2,10. s(Q=1) of the new network is 0.9, which is the fraction of nodes in the giant component after removing 1 node (fig.5(c)). However in network B (MA), 0501001502002503000.100.120.140.160501001502002503000.100.120.140.16 RC MA BEAS(a) RC MA BEAS(b) the value of s(Q=1) quickly decrease to 0.7 (fig.5(g)). Then, after the second nodes are removed, s(Q=2) in both networks A and B are 0.4 and 0.3 respectively (fig.5(d) and fig.(h)), which is reduced to 0.4 and 0.2 after the third node is removed (fig.5(e) and fig.5(i)). At the end, all nodes are removed from the network and the robustness of network A and B is 0.37 and 0.29 respectively. Thus, as previous results pointed, the critical edges in the network are not extremely related to the edge-betweenness, which apparently contradicts common intuitions. Fig.5 An illustration of malicious attack process of the toy model with 10 nodes via MA and strategy. Here in the network after removing Q nodes and the edges connected with them, N is the number of nodes, M is the number of edges, s(Q) is the fraction of nodes in largest component. Table 3 illustrates the corresponding solutions and the robustness of the solution to both methods of the toy model in Fig.5. The results demonstrate that the most vital edges are not necessarily the edge with highest topological importance. Thus these edges identified by MA are important for the network robustness and should be protected to ensure the survivability of the network. Table 3 An illustration of the vital edges identified by MA and BEAS. N=10M=141245678910312456789103124567891031245678910314567891031456789103156789103156789103N=9M=9s(Q)=0.9Q=1N=8M=6s(Q)=0.4Q=2N=7M=4s(Q)=0.4Q=3N=7M=2s(Q)=0.2Q=3N=8M=4s(Q)=0.3Q=2N=9M=8s(Q)=0.7Q=1N=10M=14N=10M=1712456789103(a)(b)(f)(c)(g)(d)(h)(e)(i) MA 𝑒1,10 𝑒4,6, 𝑒5,6 𝑒1,3, 𝑒4,9, 𝑒7,9 𝑒2,5, 𝑒2,7, 𝑒7,9, 𝑒8,10 𝑒1,10, 𝑒4,9, 𝑒5,7, 𝑒7,9, 𝑒8,10 𝑒1,3, 𝑒1,10, 𝑒2,3, 𝑒2,5, 𝑒2,7, 𝑒7,9 R 0.33 0.32 0.29 0.27 0.24 0.24 BEAS 𝑒4,9 𝑒4,9, 𝑒1,4 𝑒4,9, 𝑒1,4, 𝑒2,7 𝑒4,9, 𝑒1,4, 𝑒2,7, 𝑒4,6 𝑒4,9, 𝑒1,4, 𝑒2,7, 𝑒4,6, 𝑒2,3 𝑒4,9, 𝑒1,4, 𝑒2,7, 𝑒4,6, 𝑒2,3, 𝑒4,8 R 0.35 0.35 0.37 0.36 0.35 0.34 C 1 2 3 4 5 6 5. Conclusion It is of great importance to improve the robustness of real networks. In this paper, we identified the vital edges in Chinese air route network, which lead to fast breakdown after targeted attacks. Our results revealed that the edge-betweenness, an index to measure the importance of edges in short paths, is of little relevance to this problem. Furthermore, we demonstrated that the memetic algorithm is able to pinpoint the edges that have been proven more important than edges of high edge-betweenness. We also confirmed these findings in scale-free model networks, hence offering novel insights of edge essentiality in various real networks. Thus, we think the vital edges identified by memetic algorithm should be especially protected to ensure a good performance of a network. In Chinese ARN this means that air traffic managers should foresight complex solutions when considering the closure of one vital air route segment. Acknowledgement This paper is supported by the National Natural Science Foundation of China (Grant Nos. 91538204, 61425014, 61521091), National Key Research and Development Program of China (Grant No. 2016YFB1200100), and National Key Technology R&D Program of China (Grant No. 2015BAG15B01). References 1. Amaral LAN, Scala A, Barthélémy M, Stanley HE. Classes of small-world networks. Proc Natl Acad Sci. USA. 2000;97:11149-11152. 2. Guimerà R, Mossa S, Turtschi A, Amaral LAN. The worldwide air transportation network: Anomalous centrality, community structure, and cities' global roles. Proc Natl Acad Sci. USA.2005;102:7794-7799. 3. Barrat A, Barthélemy M, Pastor-Satorras R, Vespignani A. The architecture of complex weighted networks. Proc Natl Acad Sci. USA.2004;101:3747-3752. 4. Gautreau A, Barrat A, Barthélemy M. Microdynamics in stationary complex networks. Proc Natl Acad Sci. USA.2009;106:8847-8852. 5. Verma T, Araújo NAM, Herrmann HJ. Revealing the structure of the world airline network. Scientific reports. 2014;4:5638. 6. Verma T, Russmann F, Araújo NAM, Nagler J, Herrmann HJ. Emergence of core–peripheries in networks. Nature Commu. 2016;7:10441. 7. da Rocha LEC. Structural evolution of the Brazilian airport network. J. Stat Mech. 2009; P04020. 8. Wang JE, Mo HH, Wang FH. Evolution of air transport network of China 1930–2012. Journal of Trans Geo. 2014;40:145-158. 9. Zhang J, Cao XB, Du WB, Cai KQ. Evolution of Chinese airport network. Phys A. 2010;389:3922-3981. 10. Li W, Cai X. Statistical analysis of airport network of China. Phys Rev E. 2004;69:046106. 11. Fleurquin P, Ramasco JJ, Eguiluz VM, Victor M. Characterization of Delay Propagation in the US Air-Transportation Network. Trans Journal. 2014;53:330-344. 12. Bagler G. Analysis of the airport network of India as a complex weighted network. Phys A. 2008;387:2972-2980. 13. Du WB, Zhou XL, Lordan O, Wang Z, Zhao C, Zhu YB. Analysis of the Chinese Airline Network as multi-layer networks. Trans Research Part E. 2016;89:108-116. 14. Liu HK, Zhou T. A review of transport network. Prog Natural Sci. 2008;18:601. 15. Cai KQ, Zhang J, Du WB, Cao XB. Analysis of the Chinese air route network as a complex network. Chin Phys B. 2012;21:028903. 16. Vitali S, Cipolla M, Gurtner G, Lillo F, Beato V, Pozzi S. Statistical Regularities in ATM: network properties, trajectory deviations and delays. Second SESAR Innovation Days. 2012 November 27-29. 17. Schneider CM, Moreira AA, Andrade JS, Jr., Havlin S, Herrmann HJ. Mitigation of malicious attacks on networks. Proc Natl Acad Sci. 2011;108:3838-3841. 18. Lordan O, Sallan JM, Simo P, Gonzalez-Prieto D. Robustness of airline alliance route networks. Commu Nonlin Sci Numer Simu. 2015;22:587-595. 19. Lordan O, Sallan JM, Escorihuela N, Gonzalez-Prieto D. Robustness of airline route networks. Phys A. 2016;445:18-26. 20. Lordan O, Sallan JM, Simo P, Gonzalez-Prieto D. Robustness of the air transport network. Trans Research Part E. 2014;68:155-163. 21. Lordan O, Sallan JM, Simo P. Study of the topology and robustness of airline route networks from the complex network approach: a survey and research agenda. Journal of Trans Geo. 2014;37:112-120. 22. Motter AE, Lai YC. Cascade-based attacks on complex networks. Phys Rev E. 2002;66:065102. 23. Freeman L. Set of Measures of Centrality Based on Betweenness. Sociometry. 1977;40:35–41. 24. Mencía R, Sierra MR, Mencía C, Varela R. Memetic algorithms for the job shop scheduling problem with operators. Appl Soft Comput. 2015;34:94–105. 25. Gong MG, Cai Q, Li YY, Ma JJ. An improved memetic algorithm for community detection in complex networks. WCCI 2012 IEEE World Cong Comput Intel; 2012 June 10-15, Brisbane, Australia. 26. Neri F, Cotta C. Memetic algorithms and memetic computing optimization: a literature review. Swarm Evol Comput. 2012;2:1–14. 27. Bhuvana J, Aravindan C. Memetic algorithm with Preferential Local Search using adaptive weights for multi-objective optimization problems. Soft Comput. 2016;20:1365–1388. 28. F. Tan, Y.X. Xia, W.P. Zhang, X.Y. Jin. Cascading failures of loads in interconnected networks under intentional attack, EPL. 2013; 102:28009. 29. X.Z. Peng, H. Yao, J. Du. Load-induced cascading failures in interconnected networks, Nonlin Dyna. 2015;82: 97–105. 30. Zeng A, Liu WP. Enhancing network robustness against malicious attacks. Phys Rev E. 2012;85:066130.
1701.05225
1
1701
2017-01-18T20:29:06
A Warm Welcome Matters! The Link Between Social Feedback and Weight Loss in /r/loseit
[ "cs.SI" ]
Social feedback has long been recognized as an important element of successful health-related behavior change. However, most of the existing studies look at the effect that offline social feedback has. This paper fills gaps in the literature by proposing a framework to study the causal effect that receiving social support in the form of comments in an online weight loss community has on (i) the probability of the user to return to the forum, and, more importantly, on (ii) the weight loss reported by the user. Using a matching approach for causal inference we observe a difference of 9 lbs lost between users who do or do not receive comments. Surprisingly, this effect is mediated by neither an increase in lifetime in the community nor by an increased activity level of the user. Our results show the importance that a "warm welcome" has when using online support forums to achieve health outcomes.
cs.SI
cs
A Warm Welcome Matters! The Link Between Social Feedback and Weight Loss in /r/loseit∗ Tiago O. Cunha,1,2 Ingmar Weber,1 Gisele L. Pappa2 1Qatar Computing Research Institute, HBKU, Qatar 2Federal University of Minas Gerais, Brazil [email protected], [email protected], [email protected] 7 1 0 2 n a J 8 1 ] I S . s c [ 1 v 5 2 2 5 0 . 1 0 7 1 : v i X r a ABSTRACT Social feedback has long been recognized as an important element of successful health-related behavior change. However, most of the existing studies look at the effect that offline social feedback has. This paper fills gaps in the literature by proposing a framework to study the causal effect that receiving social support in the form of comments in an online weight loss community has on (i) the prob- ability of the user to return to the forum, and, more importantly, on (ii) the weight loss reported by the user. Using a matching approach for causal inference we observe a difference of 9 lbs lost between users who do or do not receive comments. Surprisingly, this effect is mediated by neither an increase in lifetime in the community nor by an increased activity level of the user. Our results show the im- portance that a "warm welcome" has when using online support forums to achieve health outcomes. 1. INTRODUCTION Over the last decades, obesity rates have increased in many coun- tries around the world, making the condition a major public health problem. Obesity is associated with significantly increased risk of more than 20 chronic diseases and health conditions [39], and di- rectly affects quality of life. In the U.S. 68.8% of adults are over- weight or obese1. Financially, health issues related to obesity and life style diseases impose an ever-increasing burden with medical costs linked to obesity estimated at USD 147 billion in 20082. Though the percentage of U.S. adults self-reporting to be on a diet in any given week has fallen from 31% in 1991, 20% are still trying to lose weight through dieting at any point in time3. Previ- ous studies have tied successful weight loss as well as other positive health outcomes to the presences of social support. In particular for long-term behavioral changes required for achieving and maintain- ing weight loss, user engagement is essential [38]. Previous studies showed that users who stay longer in these programs have greater success in achieving their goals [30]. Through the internet and social media it has become easier for users to find virtual support groups for anything from weight loss to drug addiction or depression. Though there are a number of studies looking at the effect of receiving social support on sustained engagement with an online community [7, 10, 2], the effect of such support on health outcomes has not been thoroughly studied. In particular, it is not clear how large one would expect the effect of receiving online comments on observed health outcomes to be as, ∗This is a preprint of an article appearing at WWW 2017 1http://www.niddk.nih.gov/health-information/health-statistics/ Pages/overweight-obesity-statistics.aspx 2http://www.cdc.gov/chronicdisease/overview/#sec3 3http://goo.gl/0naf5U arguably, many other effects from one's social environment should dominate the benefits of receiving encouragement from potential strangers online. To study the importance of online support, one would, ideally, set up a proper experiment with a randomized control and treatment group. The treatment group would then receive encouragement while the control group remains ignored. However, such studies both require access to an appropriate platform and they also come with certain ethical concerns [34]. Pushed to the limit it would, for example, be unethical to withhold online social support from a sui- cidal person wanting to chat. Even not offering support to a person trying to lose weight could be questionable. In this work, we propose a framework for conducting causation studies on weight loss from social media data. We make use of a growing collection of methods for causal inference from obser- vational data. Though not without their limitations, such methods allow to go beyond arguing about correlations, attempting to rule out as many confounding factors as possible. In this study we look at the effect of receiving social support in a popular weight loss community, the /r/loseit subreddit, on users' self-reported weight loss. Specifically, we look at whether users who receive a certain number of comments on their first post in the community are more likely than those who do not to (i) return for another activity in the community, and to (ii) later report a higher weight loss, as mea- sured to the community's badge system. To correct for content dif- ferences in users' posts, which are linked to receiving more or less support, we apply a matching approach: a post receiving a number of comments bigger than a cutoff is paired with a post very simi- lar in content that received a number of comments smaller than the cutoff. Here similarity is defined in terms of posts exhibiting sim- ilar features derived via a statistical model using LDA topics [5], Linguistic Inquiry and Word Count (LIWC) 4 features, sentiment analysis [19], question-centric words and posts length. Similar to previous work [10, 2], we observe an increase in return probability to the community for those users receiving feedback. We then extend previous work by showing that, among returning users, those who had previously received comments on their post report higher weight loss than the matched control group who did not (46 lb vs. 37 lb). These findings are statistically significant. To see if, for those users returning to the community, the differ- ence in reported weight loss is mediated by a difference in (i) future lifetime in the community, or (ii) an increased engagement with the community we applied a so-called Sobel. Somewhat surprisingly, only about 5% of the difference in reported weight loss appears to be mediated by an increased lifespan in the community, and this is not statistically significant even at p = .1. Instead, the rate of weight loss is the main difference between the two groups. 4http://www.liwc.net Our main contributions are as follows. • We propose a framework to study the effect of receiving comments on a user's first post in a weight loss community on later reported weight loss. • Confirming prior work, we observed an increased return prob- ability for those users who receive comments vs. those who do not. • Among those users who return and report weight loss through their badges, there is a 9 lbs difference between those who had previously received comments and those who had not. • We show that the difference in reported weight loss is not mediated by (i) a longer lifetime in the community or (ii) an increased activity level in the community. • We provide a detailed discussion of limitations, design im- plications and potential extensions. We hope that the insights derived from our study lead to mech- anisms further strengthening the social support online forums pro- vide, especially to new users. 2. RELATED WORKS On the importance of social support for positive health out- comes. Prior research has extensively examined the role of social support in enhancing mental and physical health. It has been ar- gued that receiving social support may reduce the rate at which individuals engage in risky behaviors, prevent negative appraisals, and increase treatment adherence [15]. Research has shown that conditions such as smoking [26], depression [16], and coronary dis- ease [25] may be controlled with social support. Also, face-to-face support groups are positively correlated with desirable outcomes, such as lower blood pressure, and lower blood sugar levels, result- ing indirectly from adaptive coping skills and responses [36]. In the context of obesity, improvements in healthy eating and physical activity, as well more successful outcomes in weight re- duction programs, have been demonstrated in studies considering offline support groups [43]. Online support forums. The main implication of these studies is that developing social support networks may help people man- age their health conditions. Online health communities can be used to develop large social support networks, to understand and to promote health behavior. People have always tried to answer health related questions by themselves, now the Internet has be- come an important resource. Previous studies suggest that 30% of U.S. Internet users have participated in medical or health-related groups. Advantages of online communities include access to many peers with the same health concerns, and convenient communica- tion spanning geographic distances. These communities present an interesting contrast to similar offline groups, as they provide an en- vironment where people are more likely to discuss problems that they do not feel comfortable discussing face-to-face . In addition such online health communities are known to foster well-being, a sense of control, self-confidence and social interactions [22]. Still, little is known about how the support provided in these communities can help enhance positive health outcomes, such as weight loss. The literature offers little information about how mem- bers of large online health communities experience social support for weight loss. Most works concentrate on showing that social support exists in online weight-management communities, and qual- ify the types of support present online [41, 3]. For example, the presence of support was shown in popular weight-loss communi- ties, including SparkPeople [20] and FatSecret [4]. Based on the fact that support exists, a few studies have tried to correlate online engagement and support with the effectiveness of weight loss [41], or to show that a network of engaged users is linked to persistent sharing of fitness related information [29]. The latter is of great importance as self-monitoring is one of the factors already shown to be associated with increased weight loss [18]. However, none of these studies were able to isolate the effects of online social support on weight loss, as there are many other underlying factors and real-world variables difficult to account for. The main goal of our work is to move from detecting correlation and towards demonstrating causation. For that, we need to ade- quately control for covariates that affect the probability of receiving social support. For example, different types of people might differ in their ability to elicit social support because of differences in their personality, their mood, or their writing style. Similarly, mediation mechanisms that may underlie the observed relationship between social support and weight loss, and which are not typically investi- gated, need to be considered. We proposed to improve the ability to explain the effect of the support received by (i) applying a match- ing approach to reduce the bias in estimating the effect of receiving social support, and (ii) applying Sobel Tests to test for the existence of mediating effects. Studies of health communities in Reddit. Reddit has been used to study different health conditions under different perspectives, in- cluding social support. For instance, Cunha et al. [10] study the r/loseit subreddit and observe that social support seems to be linked to an increase in return probability, a finding our analysis confirms. Nevertheless, the great majority of Reddit health community stud- ies perform more exploratory analysis of users behavior or deter- mine correlations between language and health outcomes, with the few studies looking at causality mentioned in the next subsection. In the first category, Eschler et al. [14] perform a content analysis in the posts of patients in different cancer stages in the subreddit r/cancer, showing that patients and survivor participants show dif- ferent types of emotional needs according to their illness phase. In the second category, Tamersoy et al. [37] performed an analysis to identify key linguistic and interaction characteristics of short-term and long-term abstainers, focusing on tobacco or alcohol. Causal inference from user-generated observational data. A common methodology for causal inference from observational data was borrowed from the domain of medicine and applies propensity score matching [21]. This methodology is used by Choudhury et al. [11] to identify suicidal ideation in Reddit mental health commu- nities, Tsapeli and Musolesi [40] to investigate the causal impact of several factors on stress level using smartphone data, Dos Reis and Cullota [13] to study the effect of exercise on mental health, and Cheng et al. [8] to understand whether community feedback regulates the quality and quantity of a user's future contributions in a way that benefits the community. Olteanu et al. [28] present a more general framework for applying the methodology to social media timelines. However, we did not find any studies looking at causality be- tween online variables and weight loss in online communities. Cunha et al. [10] apply a similar matching framework to the one proposed here to study the effect of social support on a change in return prob- ability in the subreddit r/loseit. They do not, however, study the ultimately more important issue of weight loss, and do not consider mediating effects. They also fail to report on formal measures of the quality of the matching, such as whether the covariates are in- deed balanced in the control and the treatment group. Here, we apply this well-known methodology to study causality in weight loss, accounting for balance checking and mediation analysis. Our matching occurs directly on the variables and not on the propensity scores which, as shown in [24], is preferable. 3. DATA Reddit5 is a social news website and forum. Its content is or- ganized in communities by areas of interest called subreddits. In 2015 it had 8.7 million users from 186 countries writing 73.2 mil- lion posts and 725.9 million comments in 88,700 active subreddits6. For our study we look at the popular weight loss subreddit loseit7. The data used in our analysis covers five years (August 2010 to October 2014) and was crawled from Reddit using PRAW (Python Reddit API Wrapper), a Python package that allows simple access to Reddit's official API in November 2014. In Reddit users can submit content, such as textual posts or direct links to other sites, both collectively referred to as posts. The community can then vote posted submissions up (upvotes) or down (downvotes) to organize the posts and determine their position on the site's pages. Infor- mation on downvotes and upvotes is, however, not exposed via the API, instead they expose the aggregated number of votes, referred to as score (number of upvotes minus number of downvotes). Users can also reply to posts with comments. The data we collected include posts, comments and other meta- data (i.e., timestamp, user name, score). In total, we obtained 70,949 posts and 922,245 comments. These data were generated by 107,886 unique users, of which 38,981 (36.1%) wrote at least one post and 101,003 (93.6%) at least one comment. Table 1 shows the mean, median and standard deviation (SD) for basic statistics of the dataset, including the length of posts and comments and the number of daily messages. Posts per day Comments per day Score per post Score per comments Words per posts Words per comments Mean Median 45.5 586.6 35.7 3.1 89.3 25.5 45 599 6 2 64 14 SD 22.7 264.3 126.7 11.4 95.8 35.3 Table 1: Basic statistics of loseit dataset. A participating user can add a "badge" (the icon which appears next to usernames, see Figure 1) to their profile that indicates self- reported information about their weight loss progress in pounds and kilograms. The badges can be updated by the users at any time. (link post). This gave us a set of 25,647 users who had no pub- lic activity in the community prior to their post. We use this user set to study the effect of receiving comments on this post on the probability to return later. Group 2 (G2). For users in Group 1, we extracted the list of unique users that both (i) returned again to the community later to comment or post and (ii) also had badge information indicating weight loss. This left us with a set of 6,143 users. Figure 2 shows the weight loss distribution displayed in the badges. We use this set of returning users to study the effect of receiving comments on their initial post on the weight loss they achieve. Figure 2: Users' weight loss distribution displayed in the badges. 4. METHODS In this section, we discuss our matching methodology to investi- gate a potential causal effect of receiving social support in the Red- dit loseit community. First we present the steps of our matching approach (see Figure 3), later we explain the mediation test. Figure 1: Examples of the users' weight loss badges on loseit. The weight loss value is displayed in pounds and kilograms. To answer our research questions we created two sets of users. Group 1 (G1). We extracted the list of unique users whose first recorded activity in the community was a textual post (self post), rather than a comment or a post consisting exclusively of a URL 5https://www.reddit.com 6"Active" is determined by having 5 or more posts and comments during at least one week in 2015. 7loseit - Lose the Fat, https://www.reddit.com/r/loseit/. Figure 3: Matching approach diagram. Step 1 - Treatment and control definition - The first step of our matching approach is to choose the appropriate definition of treat- ment. Given the fact that 96% of the first posts received at least one comment, we experimented with different definitions of treat- ment to avoid that the number of remaining matched observations becomes too small to draw any statistically significant conclusions. After running the experiments, we defined the treatment group as those users who received at least 4 comments on their first post in loseit. The control group consists of all users who received 3 or less comments on their first post. With this definition, we can guarantee (i) statistical significance of our findings, and (ii) the balance (see Step 4) between the two groups after performing matching. Step 2 - Statistical method for covariates selection - Choosing appropriate confounding variables is an important step in match- ing methods. Ideally, conditional on the observed covariates, there should be no observed differences between the treatment and con- trol groups. To satisfy the assumption of ignorable treatment as- signment, it is important to include in the matching procedure all variables known to be related to the treatment assignment. Gener- ally poor performance is found by methods using a relatively small set of "predictors of convenience", such as gender only. Oppo- sitely, including variables that are actually unassociated with the outcome can yield slight increases in variance. Commonly the con- foundings' choice is based on previous research and scientific un- derstanding, which can yield researcher discretion and bias [35]. Here instead, we propose to use a statistical model to select the most important covariates. We first examine whether attributes of the content of posts, are predictive of receiving treatment. We model a prediction task with the data being split into two cate- gories, the ones that received treatment and the ones that did not. Then we use the variables that remained in the final model as the confoundings in the matching approach (see Step 3). In our case, the definition of the predictive variables was moti- vated by the hypothesis that posts with similar content have a sim- ilar probability of receiving feedback. Since user attributes like demographics or profile images are not available in Reddit, and hence the sole focus on the post's content is natural. We used a topical representation of the first post's content (title + body) ex- tracted by Latent Dirichlet Allocation (LDA) [5], the various se- mantic categories of words extracted from LIWC, sentiment anal- ysis computed with Valence Aware Dictionary for sEntiment Rea- soning (VADER) [19], counts of question-centric words (what, where, when, which, who, whose, why, how) and the length of a post (number of whitespace delimited words), a total of 78 variables. The required parameters for LDA – number of topics, number of iterations, α and β – were empirically defined as 20, 2,000, 0.4 and 0.1. The rationale to get question words is to understand to what extent posts on weight loss seek explicit feedback or suggestions from the Reddit community. We used a logistic regression with LASSO as our prediction method. Logistic regression is well-suited to handle binary de- pendent variables, while LASSO is a method that performs both variable selection and regularization in order to enhance the pre- diction accuracy and interpretability of the statistical model. To assess the quality of the model produced, we (i) computed the mean AUC (Area Under the Curve) over the 10-fold cross vali- dation setting, and (ii) performed a qualitative analysis using the features that remained in the model to compute the similarity be- tween posts. As the goal of the matching is to pair posts that "look similar to a human reader", this qualitative analysis is important to understand whether features have succeeded to adequately identify similar texts. The highest cross-validated AUC of 0.62 was obtained for 37 variables. However, in order to further reduce the dimensionality of the space used for matching, we chose features from a model with slightly lower AUC (0.61) but which used only 20 variables. In terms of qualitative analysis, both models fared similarly without any noticeable difference. The 20 variables that "survived" the shrinkage were: 5 LIWC categories (negative emotions, anger, sexual, reward and work), sentiment and 14 LDA topics. Additionally we use the coefficient values as covariates "weights" in the similarity computation in Step 3. This choice was motivated by the fact that the regression coef- ficients have two desirable properties. The first one is a scale nor- malization property, where something measured in, say, kilometers would have a larger coefficient than the same property measured in meters. This normalization is crucial for computing meaningful similarities in a metric space. Second, they reflect an importance of the predictive variable in relation to the response variable. This means that variables with more effect on receiving feedback will be given more importance on the post similarity. Step 3 - Matching approach - Matching is a nonparametric method of controlling for the confounding influence of pretreat- ment control variables (also known as confounding or covariates) in observational data. The key goal of matching is to prune obser- vations from the data so that the remaining data have better balance between the treated and control groups, meaning that the empirical distributions of the covariates in the groups are more similar and model dependency is reduced [23]. Without matching we may have imbalance, for example, a gen- erally optimistic user might write a first post with a more positive tone than a more pessimistic counterpart. Let us imagine that, in response to their posts, the former user receives lots of support and the latter receives none. Now let us further imagine that the for- mer user returns for more activity on the subreddit later, whereas the latter user is never to be seen again. The question then arises whether the support received "caused" the former user to return or, rather, whether that user was at a higher disposition to return any- way and the social support received was a mere correlate. Here the tone of the posts, an important covariate, is imbalanced and is generally more positive in the treated group (= those with social support) than in the control group (= those without social support). Matching approaches are applied in such scenarios to remove the relationship between the covariates and the supposed causal vari- able by reducing the imbalance. In the simplest case, matching is applied to settings of a depen- dent outcome variable Yi, a treatment variable Ti(1 = treated, 0 = control) and a set of pretreatment covariates Xi [32]. We want to observe the treatment effect for the treated observation i (T Ei), which is define as the value of i when i receives the treatment minus the value of i when it does not receive the treatment. T Ei = Yi(1) − Yi(0) = observed − unobserved (1) Obviously if i is treated, we can not also observe i when it does not receive the treatment. Hence, matching estimates Yi(0) with a Y j(0), where j is similar to i. In the best case, each i is matched to a j with the exact same values for all the control variables. In practice, "similar enough" observations are being matched. Matching can be viewed as trying to find hidden randomized experiments inside observational data. The most commonly used matching method is Propensity Score Matching (PSM) [24], which aims to approximate a complete random experiment. PSM first builds a model to predict the probability of a particular user to receive the treatment. Users are then matched according to their probability of receiving the treatment. However, recently King and Nielsen [24] showed that this method is suboptimal and that PSM can, under certain circumstances, even increase the bias in the data. Here, we apply a matching distance approach (MDA) [31], which aims to approximate a fully blocked experiment [21]. For this we measure the cosine distance among the observations based on their covariates. Treated units are matched to their nearest control, as- suming they pass a predefined similarity threshold, a.k.a. caliper. Ideally this similarity threshold should be as close as possible to 1, barring constraints related to data sparsity. To find an appropri- ate value, we gradually increase the value, starting from 0.9, until we are able to observe three conditions: (i) the matched posts are similar enough (based on a qualitative analysis), (ii) treatment and control groups are balanced (see Step 4), and (iii) results are statis- tically significant. We allow one-to-many matches, i.e., we match with replacement. Pruning the unmatched observations makes the control variables matter less. In other words, it breaks the link between the con- founding and the treatment variable, consequently reducing the im- balance, model dependence, research discretion and bias. Step 4 - Balance check - One necessary condition for a success- ful application of a matching methodology is a balance of the co- variates. If, say, one LDA topic was more strongly pronounced in the treatment group than in the control group then this imbalance, rather than any causal effect, could lead to an apparent treatment effect. To assess if the treatment and control groups are sufficiently balanced after the matching, we check the standardized mean dif- ference [1] for each confounding variable c. For a continuous co- variate, the standardized mean difference is defined as: dc = (cid:113) ( ¯xtreatment − ¯xcontrol) s2 treatment +s2 control 2 (2) (cid:80)N where ¯xtreatment and ¯xcontrol denote the mean of the covariate in control the treatment and control groups, respectively. s2 denote the corresponding sample variances. treatment and s2 The standardized difference compares the difference in means in units of the pooled standard deviation. It is not influenced by sample size and allows for the comparison of the relative balance. The remaining bias from a confounding variable c is considered to be insignificant if dc is smaller than 0.1 [27]. Step 5 - Effect size estimation - After showing that any con- founding bias has been sufficiently eliminated, we can estimate the effect of treatment on the matched treated and control units. Here for a given matching of treated and control units, we compute the estimated average treatment effect (EATE). EAT E = i=1, j=1 (Yi(1)−Y j(0))∗100 Y j(0) N (3) Mediation test - Though matching methods can shed light on whether a change in the treatment condition T likely causes a change in the dependent variable Y, matching methods do not provide in- sights into whether (i) this causal relationship is "direct", or whether (ii) it is being mediated by another variable M. In our case, receiv- ing social support might lead to an increased engagement with the community which, in turn, is responsible for an increase in weight loss success. Thus the weight loss success would be mediated by an increased engagement with the community. Mediation analysis is the process of determining whether or not variables acting as an in-between step, called mediators, are present when looking at the relationship between an independent variable T (here the treatment confidtion) and a dependent outcome variable Y. As a result, when the mediator is included in an analysis model with the independent variable, the effect of the independent variable is reduced and the effect of the mediator remains significant [6]. To verify if any variable plays the role of a mediator and its sig- nificance in the relationship of social support and weight loss, we apply the Sobel test [33]. The Sobel test assesses the statistical significance of the indirect effect. Note that such analysis works naturally with matching as a pre- processing step: the matching reduces imbalance between the treated and control groups in terms of the covariates used for matching. Hence, the remaining unpruned observations are similar except for the treatment condition, and the treatment condition can be used as an independent variable in the Sobel test. 5. RESULTS In this section we present the results of the causal inference anal- ysis we conducted to measure the effect of receiving social support for the first post a user shares with the community. In Figure 5 the stars indicate the significance levels for a permutation test, with the number of asterisks corresponding to the p-values, *** for 0.1%, ** for 1%, and * for 5%. In a permutation test, the labels (C)ontrol and (T)reatment are repeatedly randomly shuffled and for each (fake) control-treatment assignment the effect size is measured. The sig- nificance level indicates the fraction of permutations that lead to an effect size bigger than the one actually observed.[17]. User engagement We start by analyzing the effect of receiving social support on the probability of a user to return to the community to comment or post again. For this analysis we used the 25,647 users present in Group 1 (see Section 3). Among those users, 18,000 received the treatment (at least 4 comments) and 7,647 did not (control). We applied our one-to-many matching approach with a similar- ity threshold of 0.965 to ensure that for Group 1 our method was matching similar enough posts and balancing the groups (see Fig- ure 4). The matching produced 14,570 similar pairs (14,570 unique treatment and 5,279 unique control users). Our results indicate that receiving social support increases the relative probability of a user returning to the community by roughly 66% (see Figure 5, red bar). This analysis is statistically significant at 0.1%. These results pro- vide evidence for how important social support is to increase user engagement, which is associated with better chances of obtain suc- cess in weight loss programs [30]. Note that this effect sizes is big- ger than the one reported in a similar study [10]. There the authors used a different definition of control and treatment group based on ranking the posts by the number of comments received than getting "top 40%" vs. "bottom 40%" comments, rather than our "at least 4" vs. "at most 3". Figure 4: Standardized difference of means for each confounding variable (Group 1). Note that after the matching all the values are below 0.1, thus the groups are balanced. Figure 5: The effect size for the factors analyzed. To show that the matching approach indeed matches similar posts, we present in Table 2 parts of a pair of posts matched according to our approach, this pair had a cosine similarity of 0.97. Treatment: Hi guys, new here, I'm on a low carb and dairy (pale) diet, but recently i just went on a vacation, I ate..- Wrap with grilled chicken, lettuce, and a small amount of buffalo sauce, on whole grain wrap,Banana, Apple, Orange, and plain oatmeal - Tossed salad with grilled chicken. Is this healthy eating on the pale diet? I also did not exercise, but we did some walking around... Control: Hey everyone, I'm new to loseit. I'm starting my first workout/diet routine ever. My doctor says I need to get my cholesterol under control. So far, I've been doing 30 minutes of cardio and taking care of my diet. I've cut out soda, beer, and red meat. I've switched to skim milk, olive oil, whole grain, and brown rice... Table 2: Parts of similar posts matched. Weight loss Next we investigated the effect of receiving social support on weight loss. For this analysis we used the set of 6,143 users in Group 2 (see Section 3), among those users 4,657 received at least 4 com- ments (treatment group) and 1,486 did not (control group). Here, to ensure similar enough posts and balanced groups in the match- ing for Group 2, we used a similarity threshold of 0.955. Figure 5 (green bar) shows that receiving social support in the first post leads to a relative increase in the achieved weight loss of 26%, or an ab- solute mean difference of 9 lbs. The observed effect size is statisti- cally significant and after applying the balance check (see Figure 6) we confirmed that all covariates were balanced between the control and treatment groups. However, note that the frequency with which people update their badges may interfere in this analysis. Maybe users who do not get comments do not update their badges as often, even if they lose as much weight as others. In other worse, receiving social feedback might simply lead to more active "profile management" than to more weight loss. To test this alternative explanation, we computed the number of badge updates (every change in the badge informa- tion) for users in the treatment and control groups. Afterwards, we ran a permutation test to check if the two groups' badge updating Figure 6: Standardized difference of means for each confounding variable (Group 2). Note that after the matching all the values are below 0.1, thus the groups are balanced. behaviors were similar. The groups presented a mean number of updates of 1.75 ± 3.93 (treatment) and 1.60 ± 2.70 (control), but this difference was not statistically significant, (p=0.16). As the two groups' badge updating behaviors are similar and it does not seem to effect our analysis. We also experimented with different definitions for the treatment cutoff to see if there is an effect of "diminishing returns": receiv- ing at least one comment (vs. none) could have a bigger impact than receiving 10 (vs. 9 or less). Figure 7 presents the effect size for different treatment definitions, although we can not guarantee the balance property for all the cutoffs, these results show that as expected when we increase the cutoff the effect size drops. Figure 7: Effect size for different treatment definitions. Mediation test After estimating the causal effect of receiving social support on weight loss, we focus on checking if certain variables that were not included in the set of covariates could act as a mediator, explaining part of the observed effect of social support on weight loss. Con- ceptually and based on prior work, receiving social feedback could cause the effected user to (i) show a higher activity level in the community, and (ii) remain longer in the community. Therefore we first check if, indeed, receiving a comment on a user's first post has an effect on these variables and, if yes, if this effect mediates the observed effect on the reported weight loss. Figure 5 shows that receiving social support also has an effect over the users' lifespan (i.e., the difference in days between the date of their last and first activity observed in the community) and the of number activities (i.e., the sum of the number of comments and posts). The effect size for lifeSpan is 6% (see Figure 5; blue bar), but this effect was not statistically significant, for the number of activities the effect size was 43% (see Figure 5; yellow bar). Since the observed effect on the lifespan is small, we estimated if the social support has an effect on the users' weight loss rate (i.e., the weight loss in lb divided by the lifespan). As the rate is an unstable estimate for users who are only active for one or two days in the community, we chose to look at the median rather than the average effect. Concretely, we computed the median of the individual paired ratios of (weight loss rate treated individual / weight loss rate control individual). We then use the median of these medians as an estimate of the effect size. As expected there is an effect on the weight loss rate, where users that received at least 4 comments (treatment) lose weight roughly 35% faster than the ones that did not received (0.48 lb/day vs. 0.35 lb/day). Finally, we applied a Sobel test to verify if lifespan and number of activities act as mediator in the relationship of the social support and weight loss, i.e., if they explain a significant part of the causal effect of social support on weight loss. The results of the Sobel test showed that the proportion of the effect of social support over weight loss due to lifespan and the number of activity is small – 5.6% and 3.4% respectively. However, these results were not sta- tistically significant even at p = 0.1. Surprisingly, among the users that return to post again, the difference in achieved weight loss does not seem to be linked to either lifespan or engagement in the com- munity. Rather, the rate of weight loss seems to be effected for those users returning to the community. 6. DISCUSSION Does weight loss equal success? Our analysis crucially assumes that members of the loseit community want to lose weight. If that was not the case then talking about "weight loss success" would be meaningless. However, results from a recent survey of the loseit community [12] indicate that 91% of the respondents were cur- rently trying to lose weight, with another 7% trying to maintain their weight. Therefore, it seems adequate to consider a higher level of weight loss as a desirable outcome. Qualitative evidence. Though our analysis is deliberately using quantitative methods, there is also qualitative evidence to further support the claim that social support received in the community ef- fects weight loss. The aforementioned community survey [12] in- cludes the question "What do you like about /r/loseit?". The topics most emphasized by the survey participants were related to terms such as "community", "people", "supportive" and "support". Sim- ilarly, one can easily find posts explicitly acknowledging the per- ceived importance of the social support such as: "I have visited this page almost daily over the past 15 months, and it was really helpful in keeping my motivation. I hope this may provide similar motivation to those just starting! " . Designs implications. Our findings suggest that whether or not a user receives feedback on their initial post affects (i) their proba- bility to return to the community, and (ii) given that they return, the amount of weight loss they report. Therefore mechanisms that in- crease the likelihood to receive a "warm welcome" are expected to lead to more engagement with the community and to better health outcomes. Fortunately, the vast majority of initial posts (96%) al- ready receive at least one comment. It could be worth considering a mechanism where posts that do not are brought to the modera- tors' attention so that they can provide an adequate reply. It could also be worthwhile to construct a "positivity bot" which provides non-generic positive feedback on posts overlooked by the commu- nity[42]. Other researchers are exploring the creation of a frame- work to allow formal testing of theories of different moderation styles.8 Our research contributes by providing a theory to test. Ethical considerations. For our study, we used only publicly available data that users chose to post online. All analysis is done in aggregate and we do not post results for any individual. How- ever, as is often the case with such data collection, users might not be aware of the fact that they are being studied by researchers. To at least partly alleviate such concerns, we reached out the moderators to inform them about our study. Their reaction was very positive ("Wow, I'm really looking forward to it") and they also pointed us to the community survey [12] that we had previously been un- aware of. Once finalized, we will share our findings with the loseit community to encourage a positive atmosphere and, in particular, ensure a warm welcome of new members. What type of social support matters? One could also try and extract the topics or tone from the comments on a given post to see if particular types of comments have a larger effect on the reported weight loss. This, however, comes with endogeneity problems as the type of comments received is likely correlate with the subject matter of the post. Given large enough data sets one could hope to correct for this using our matching framework where the treatment is no longer binary – receiving a comment or not – but is multi- variate. We chose not to explore this route due to sparsity concerns. We did, however, experiment with using another type of social feedback based on votes: Reddit has a voting system with up- and down-votes and an aggregate "score" combining these two types of votes, positive - negative, can be obtained via the API. In our data set, this score was never negative. Using the same matching setup (see Section 4), this gave an effect size of 16% to users to return to the community and 45% to weight loss (p < 0.01) . The balance condition also held for this experiment. Though most of the limitations discussed below also apply to this setup, the fact that a "similar" effect is observed for a different definition of social feedback indicates that our results might hold more general. Who benefits most from social support? All of our results are aggregates indicating that, on average, users seem to benefit from receiving social support in the form of comments. For future work it would be interesting to look into what type of users are most or least likely to benefit from such support, for example looking for gender-specific effects. Though gender is not an attribute of a user's profile, it can sometimes be inferred from their posts ("I'm a mother of two ...") or from shared progress pictures. In some cases a user's chosen screen name such as "john123" or "mary456" also provide hints. Similarly, one could look for cases of users indicating their starting weight, rather than just the weight loss, to study whether the effect of social support is tied to a user's initial weight. Impact of pruning on effect size. We started our analysis with the assumption that, as we had previously observed for the effect on return-to-post probability [10], pruning via matching would lead to a lower estimate of the effect of social feedback on weight loss when compared to the unmatched analysis. Intuitively, matching, and hence pruning, should reduce the effect of confounding user variables such as "positive outlook on life" which might affect writ- https://civic.mit.edu/blog/natematias/ 8See reddit-moderators-lets-test-theories-of-moderation-together for thoughts by Nathan Matias' and https://np.reddit.com/r/ TheoryOfReddit/comments/456503/want_to_test_your_theories_ of_moderation_lets/ for a subreddit on the topic. ing style and have a positive effect on both return-to-post behavior as well as on weight loss success. However, we observed the oppo- site: the raw effect size for the unmatched data was 22% (treatment cutoff of 4 comments) whereas it was 26% for the matched analysis (treatment cutoff of 4 comments and similarity threshold of 0.955). In particular, users who were treated and who, eventually, lost less than the median weight loss were pruned more often (27%) than their treated counter-parts who lost a lot of weight (23%). At the same time for the untreated users the differences in pruning rates for less-than-median (28%) and more-than-median (28%) weight loss were small. Though this is surprising, it actually helps to make the overall claim, i.e., that social feedback supports weight loss in an online community, more robust. 7. LIMITATIONS Limitations of using badges to track weight loss. To infer a user's weight loss success or failure we are currently relying on the badges used in the loseit community. These badges only cap- ture self-reported weight loss progress. The first issue imposes an important limitation as, one could imagine, receiving social feed- back leads to a heightened sense of self-awareness and a feeling of "being watched" in the community. Though this could lead to positive peer pressure, it could also increase the probability of over- reporting weight loss progress. Badges are also always visibly dis- played next to a user's screen name, increasing the likelihood of social signaling effecting their use. One solution to this issue could be to perform a similar analysis using auto-generated weight up- dates from smart scales as used by Wang et al. [44]. Such data sources are less likely to be prone to misreporting errors. To avoid at least some of the limitations introduced by using the badges to infer a user's weight loss, we also performed analysis on a different, smaller set of users who explicitly report their weight loss progress in their posts. This can be either by using the community conventions of "SW/CW/GW" for starting/current/goal weight, or through posting things such as "I've lost 10lbs". In this analysis the treatment group had 1,421 users and the control group 36 users. Due to data sparsity, we only applied the threshold of 0.7. Though prone to other limitations, this alternative way of inferring weight loss led to qualitatively similar effect sizes of 9.5%. Limitations to determining the start date of weight loss jour- ney. Our analysis, especially that related to the rate of weight loss (Section 5), assumes that a user's weight loss journey starts the day they first announce themselves to the community in the form of a post. However, in practice, users might well first observe the com- munity before deciding to post. This means that the actual rate of weight loss is likely to be lower, as the time period over which the weight loss is achieved is longer. A more subtle issue related to this passive use of the support community is that it could af- fect the writing style. Put simply, users who have been following the community for a while might (i) have a "head start" as far as weight loss is concerned, and (ii) they might write in a style more in tune with the community which, in turn, could lead to more social feedback. If these stylistic differences are not represented in the extracted covariates, this could lead to an overestimate of the effect size. Though we cannot completely rule out this possibility, we be- lieve that the effect sizes are large enough to make it unlikely that they are fully explained by this hidden adaption to the community. Limitations of our matching approach. When applying a match- ing approach, there are a number of choice one needs to make such as (i) the selection of covariates, (ii) how to normalize and poten- tially weight different covariates, (iii) which distance metric to use and whether to use "blocking", and (iv) which similarity thresh- old to choose. Of these, any choices for (ii), (iii) and (iv) should asymptotically converge to the same result as the matched pairs be- come more and more similar, being identical on all the covariates in the limiting case. We therefore did not include experiments with higher similarity thresholds because of issues of data sparsity. Concerning the covariates used, we believe our statistical method is a reasonable choice. Introducing too many additional covariates can lead to problems of high dimensionality when attempting to match similar posts along, say, hundreds of dimensions. In such settings it becomes difficult to balance all the covariates considered. Furthermore, many other potential covariates should be balanced at least "on average", if they are correlated with the covariates in the final model. Still, the exclusion of unknown but potentially crucial covariates is always a concern when applying a matching methodology. We hope that other researchers will validate – or invalidate – our analysis using their own set of covariates. Limitations of observability of returning users. Our main analysis relies on users returning to the loseit community to post or comment again after their initial post. Assuming the user also has badge information, then this second data point provides an esti- mate of both the absolute weight loss (in the badge) and the weight loss rate (in the difference of time stamps). This means that we cannot make any statements concerning weight loss for users who do return to the community for a second, public activity. Though our main results are conditional on users returning, we also observe social feedback leading to an increase in return probability (see Fig- ure 5). However, the issue of predicting who will or will not return to an online community has been studied before [10, 9] and so we did not analyze this further. 8. CONCLUSIONS We presented an analysis of the effect of receiving social feed- back in the form of comments on the reported weight loss in the /r/loseit community on Reddit. Correcting for confounding fac- tors through a matching methodology, users who receive at least 4 comments on their first post in the community were (i) 66% more likely to return for a future activity in the community, and (ii) con- ditional on the user returning, those who had previously received feedback end up reporting on average 9 lb more in weight loss. For these returning users, this effect is not mediated by neither (i) an increased level of activity in the community, nor by (ii) a longer lifespan in the community. Though observational studies have in- herent limitations on causal inference, our work helps to illustrate the importance of receiving feedback in online support forums, in particular for users new to the community. 9. REFERENCES [1] P. C. Austin. An introduction to propensity score methods for reducing the effects of confounding in observational studies. Multivariate behavioral research, 46(3):399–424, 2011. [2] L. Backstrom, R. Kumar, C. Marlow, J. Novak, and A. Tomkins. Preferential behavior in online groups. In Proceedings of the 2008 International Conference on Web Search and Data Mining, pages 117–128. ACM, 2008. [3] P. Ballantine and R. Stephenson. Help me, I'm fat! Social support in online weight loss networks. J. of Consumer Behaviour, 2011. [4] L. Black, J. Bute, and L. Russell. Cases on Online Discussion and Interaction: Experiences and Outcomes, chapter "The Secret Is Out!": Supporting Weight Loss through Online Interaction. 2010. [5] D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. J. Mach. Learn. Res., 3, 2003. [6] B. Boone. Mediation analysis: Expanding from one mediator to multiple mediators. 2012. [7] M. Burke, C. Marlow, and T. Lento. Feed me: Motivating newcomer contribution in social network sites. In CHI, 2009. [8] J. Cheng, C. Danescu-Niculescu-Mizil, and J. Leskovec. How community feedback shapes user behavior. arXiv preprint arXiv:1405.1429, 2014. [9] M. D. Choudhury and S. De. Mental health discourse on reddit: Self-disclosure, social support, and anonymity. In ICWSM, 2014. [10] T. Cunha, I. Weber, and et al. The effect of social feedback in a reddit weight loss community. In DigitalHealth, 2016. [11] M. De Choudhury, E. Kiciman, and et al. Discovering shifts to suicidal ideation from mental health content in social media. In CHI, 2016. [12] denovosibi. [results] winter/spring 2016 user survey, 2016. https://www.reddit.com/r/loseit/comments/4acxxn/results_ winterspring_2016_user_survey/. [13] V. L. Dos Reis and A. Culotta. Using matched samples to estimate the effects of exercise on mental health from twitter. In Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, pages 182–188, 2015. [14] J. Eschler, Z. Dehlawi, and W. Pratt. Self-characterized illness phase and information needs of participants in an online cancer forum. In ICWSM, 2015. [15] A. F. Fontana, R. D. Kerns, and et al. Support, stress, and recovery from coronary heart disease: a longitudinal causal model. Health Psychol, 8(2):175–193, 1989. [16] S. Grav, O. Hellzèn, and et al. Association between social support and depression in the general population: the hunt study, a cross-sectional survey. J. of clinical nursing, 2012. [17] T. Hesterberg, D. S. Moore, S. Monaghan, A. Clipson, and R. Epstein. Bootstrap methods and permutation tests. Introduction to the Practice of Statistics, 5:1–70, 2005. [18] J. M. Hutchesson, Y. C. Tan, and et al. Enhancement of self-monitoring in a web-based weight loss program by extra individualized feedback and reminders: Randomized trial. J Med Internet Res, 18(4):e82, Apr 2016. [19] C. J. Hutto and E. Gilbert. VADER: A parsimonious rule-based model for sentiment analysis of social media text. In ICWSM, 2014. [20] K. O. Hwang, A. J. Ottenbacher, and et al. Social support in an internet weight loss community. International journal of medical informatics, 79(1):5–13, 2010. [21] K. Imai, G. King, and E. A. Stuart. Misunderstandings between experimentalists and observationalists about causal inference. Journal of the royal statistical society, 2008. [22] G. J. Johnson and P. J. Ambrose. Neo-tribes: The power and potential of online communities in health care. Communications of the ACM, 49(1):107–113, 2006. [23] G. King, C. Lucas, and R. Nielsen. The balance-sample size frontier in matching methods for causal inference. PS: Political Science and Politics, 42:S11–S22, 2014. [24] G. King and R. Nielsen. Why propensity scores should not be used for matching. http://j.mp/1sexgVw, 2015. [25] H. Lett, J. Blumenthal, and et al. Social support and coronary heart disease: epidemiologic evidence and implications for treatment. Psychosomatic medicine, 2005. [26] R. Mermelstein, S. Cohen, and et al. Social support and smoking cessation and maintenance. Journal of consulting and clinical psychology, 54(4):447, 1986. [27] D. Mimno, H. M. Wallach, E. Talley, M. Leenders, and A. McCallum. Optimizing semantic coherence in topic models. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 2011. [28] A. Olteanu, O. Varol, and E. Kıcıman. Towards an open-domain framework for distilling the outcomes of personal experiences from social media timelines. In ICWSM, 2016. [29] K. Park, I. Weber, and et al. Persistent sharing of fitness app status on twitter. In CSCW, pages 184–194, 2016. [30] K. Patrick, K. Calfas, and et al. Outcomes of a 12-month web-based intervention for overweight and obese men. Ann Behav Med, 2011. [31] D. Rubin and E. Stuart. Affinely invariant matching methods with discriminant mixtures of proportional ellipsoidally symmetric distributions. Statistics, 2006. [32] D. B. Rubin. Multivariate matching methods that are equal percent bias reducing, i: Some examples. Biometrics, 1976. [33] M. E. Sobel. Some new results on indirect effects and their standard errors in covariance structure models. Sociological methodology, 16:159–186, 1986. [34] J. Song and K. Chung. Observational studies: cohort and case-control studies. Plastic and reconstructive surgery, 2010. [35] E. A. Stuart. Matching methods for causal inference: A review and a look forward. Statistical science: a review journal of the Institute of Mathematical Statistics, 2010. [36] C. F. Sullivan. Gendered cybersupport: A thematic analysis of two online cancer support groups. Journal of health psychology, 8(1):83–104, 2003. [37] A. Tamersoy, M. De Choudhury, and D. H. Chau. Characterizing smoking and drinking abstinence from social media. In Hypertext, 2015. [38] P. J. Teixeira, E. V. Carraça, and et al. Successful behavior change in obesity interventions in adults: a systematic review of self-regulation mediators. BMC medicine, 13(1):1, 2015. [39] M. Thiese, G. Moffitt, R. Hanowski, and et al. Commercial Driver Medical Examinations: Prevalence of Obesity, Comorbidities, and Certification Outcomes. J. Occup. Environ. Med., 2015. [40] F. Tsapeli and M. Musolesi. Investigating causality in human behavior from smartphone sensor data: a quasi-experimental approach. EPJ Data Science, 4(1):1–15, 2015. [41] G. M. Turner-McGrievy and D. F. Tate. Weight loss social support in 140 characters or less: use of an online social network in a remotely delivered weight loss intervention. Translational Behavioral Medicine, 3(3):287–294, 2013. [42] J. van der Zwaan, V. Dignum, and et al. A conversation model enabling intelligent agents to give emotional support. In Modern Advances in Intelligent Systems and Tools. 2012. [43] M. Wang, L. Pbert, and S. Lemon. Influence of family, friend and coworker social support and social undermining on weight gain prevention among adults. Obesity, 2014. [44] Y. Wang, I. Weber, and P. Mitra. Quantified self meets social media: Sharing of weight updates on twitter. In DH, 2016.
1904.05327
1
1904
2019-03-25T13:03:14
Endogenous Coalition Formation in Policy Debates
[ "cs.SI", "stat.AP" ]
Political actors form coalitions around their joint policy beliefs in order to influence the policy process on contentious issues such as climate change or population aging. The present article explains the formation and maintenance of coalitions by focusing on the ways that actors adopt policy beliefs from other actors. A policy debate is a complex system that exhibits network dependencies both in cross-sectional and longitudinal ways when actors contribute ideological statements to the debate. In such a temporal network, learning of policy beliefs matters in three complementary ways: positive reciprocity through bonding relationships within coalitions, innovation across coalitions through bridging relationships, and negative reciprocity through repulsion, or polarization, of adversarial coalitions by reinforcement of conflictual relationships. We test this theory of endogenous coalition formation in policy debates using a novel inferential technique combining network and event history analysis and find systematic evidence for the interplay of the three coalition formation mechanisms.
cs.SI
cs
Endogenous Coalition Formation in Policy Debates Philip Leifeld∗1 and Laurence Brandenberger2 1Department of Government, University of Essex, UK 2Chair of Systems Design, ETH Zurich, Switzerland Abstract Political actors form coalitions around their joint policy beliefs in order to influ- ence the policy process on contentious issues such as climate change or population aging. The present article explains the formation and maintenance of coalitions by focusing on the ways that actors adopt policy beliefs from other actors. A policy debate is a complex system that exhibits network dependencies both in cross- sectional and longitudinal ways when actors contribute ideological statements to the debate. In such a temporal network, learning of policy beliefs matters in three complementary ways: positive reciprocity through bonding relationships within coalitions, innovation across coalitions through bridging relationships, and negative reciprocity through repulsion, or polarization, of adversarial coalitions by reinforcement of conflictual relationships. We test this theory of endogenous coalition formation in policy debates using a novel inferential technique combining network and event history analysis and find systematic evidence for the interplay of the three coalition formation mechanisms. ∗Corresponding author at Department of Government, University of Essex, Wivenhoe Park, Colch- ester CO4 3SQ, UK. E-mail address: [email protected] 1 Introduction Policy process theory suggests that political actors form coalitions around their joint be- liefs in order to influence the policy process (Sabatier and Jenkins-Smith 1993; Sabatier and Weible 2014; Hajer 1995; Henry, Lubell and McCoy 2011; Weible, Sabatier and McQueen 2009; Leifeld and Haunss 2012; Leifeld 2013, 2016, 2017; Fisher, Leifeld and Iwaki 2013). Despite a plethora of contributions on the existence and significance of "advocacy coalitions" and "discourse coalitions," little systematic evidence has yet been gathered on how coalitions are formed and maintained around joint policy beliefs. The existing literature argues that learning plays a key role for the formation and main- tenance of coalitions (Sabatier and Jenkins-Smith 1993), but how exactly learning is causally connected to coalition structure largely remains a black box. Instead, recent work focused on belief coalitions as an independent variable and coordination between actors as an explanandum (e. g., Henry, Lubell and McCoy 2011). While this develop- ment helps explaining the structure of policy networks as a function of actors' policy beliefs, the original puzzle of belief formation and thereby coalition formation around shared beliefs persists. Therefore we unpack the notion of learning in advocacy or dis- course coalitions and explain coalition formation and maintenance in policy debates as a complex network phenomenon. Our contribution explains the formation and maintenance of coalitions by focusing on the ways that actors adopt policy beliefs from other actors in a policy process. We argue that learning within and across coalitions matters in three different ways. First, as actors in a complex policy process face substantial uncertainty and risk, they learn from other actors by utilizing bonding relationships (Berardo and Scholz 2010; Berardo 2014; Berardo and Lubell 2016). Coalitions are formed and maintained by learning policy beliefs from actors who demonstrated a very similar profile of policy beliefs in the past. This extends the "risk hypothesis" from the literature on collabora- 1 tive governance (Berardo and Scholz 2010; Berardo 2014; Berardo and Lubell 2016) to the case of belief formation and coalition formation. Actors infer their adjacent coalition members by observing the policy debate and learn from actors with strongly similar beliefs. We call this mechanism positive reciprocity and provide micro-level evidence for its strong role in shaping coalition formation. Second, in addition to these strong belief ties, actors learn beliefs through weak ties. For this to happen, two conditions must be satisfied: if an actor observes that many other actors expressed a certain policy belief and if many of these other actors had at least a minimal degree of belief congruence with the focal actor around other issues, this signals to the actor that the policy belief in question is ideologically compatible and worth adopting. Thus, actors not only seek bonding relationships through positive reciprocity; actors also actively seek to adopt innovative beliefs that are compatible with their remaining preference profile through bridging relationships (Berardo and Scholz 2010). Coalition formation therefore builds on trust in familiar actors on the one hand and on trust in the congruence of their own belief system coupled with the transitivity of other actors' belief systems on the other hand. However, bridging across coalitions is contingent on minimizing the risk of adopting incompatible policy beliefs by only considering actors with a minimal level of trust through previous belief congruence. We call this second mechanism innovation learning. Third, learning entails drawing experiences from negative examples. Actors consider with whom they had substantive conflicts in the past, and they tend to oppose the current policy beliefs of these actors. This reinforcement of conflictual relationships leads to a repulsion between different coalitions and therefore complements positive reciprocity, which serves to increase the congruence within coalitions. We call this mechanism negative reciprocity. 2 The three mechanisms together are complementary. They serve to increase congru- ence within coalitions through mutual reinforcement of positive relationships, learning of belief innovations across coalitions, and repulsion between coalitions through rein- forcement of conflictual relationships. We test this theory of coalition formation and belief learning using state-of-the-art dynamic network analysis and an empirical policy process over the course of nine years at a daily time resolution and find compelling micro-level evidence that supports our three-pronged theory of endogenous coalition formation. 2 Policy Debates as Networks Politics is about "who gets what, when, how" (Lasswell 1950). This extends far beyond institutional arenas like Congress or the executive. How political issues are understood and why some solutions to political problems make it onto the parliamentary and ex- ecutive agendas while others are weeded out during public debate is at least of equal importance, but lacks any systematic understanding (Downs 1972). Research on these early stages of the policy process (Sabatier and Weible 2014) has been struggling to provide convincing answers to one of the most pressing questions on agenda setting: how do political actors, such as interest groups or legislators, decide to contribute nor- mative statements about their desired policy outcomes to the public debate? In other words, how do policy debates operate at the micro-level? Most newspaper articles on the politics of the day are full of quotes by political actors advocating or rejecting certain policies or policy instruments. Often they are in direct support or contradiction of previous statements by other political actors. Lay readers, journalists, and political analysts try to make sense of these statements by inferring "camps," "advocacy coalitions," or "discourse coalitions" from a policy debate 3 (Sabatier and Jenkins-Smith 1993; Hajer 1995). In many cases, the cleavage lines seem clear either because interest groups have vested interests or because policies appeal in obvious ways to partisan ideologies of actors who run for office or a seat. More often, however, it is unclear why an actor adopts a specific issue stance and why this happens at the specific time it is observed. Indeed, the prevailing view in the literature is that policy preferences are fixed and allow only for minor modifications through policy learning (Sabatier and Jenkins-Smith 1993; Hajer 1995). Yet, the mechanisms through which learning occurs are opaque and need to be unpacked and tested. Students of political processes are often content with describing macro-level varia- tion, such as the presence of multiple advocacy or discourse coalitions in policy processes (as an example of variation across actors and within a time unit), or issue attention cycles with varying levels of salience of issues over time (as an example of temporal variation without any cross-sectional differentiation). We argue that such macro-level phenomena can be traced back to micro-level mechanisms in a theoretically meaningful way. These mechanisms can be disentangled by considering and explaining individual statements of political actors and their timing. However, individual statements about actors' policy beliefs or stances are rarely independent of each other. Actors do not argue in isolation. The very essence of a po- litical debate is that actors interact with each other in order to "influence the political discourse of their day" (Hall 1993), both collaboratively and in conflict. To see this, consider the counterfactual that no political discussion would be going on among polit- ical actors if it were impossible to influence other actors by raising one's voice through the media and other outlets -- possibly by altering public opinion ("issue campaigning") or convincing other actors more directly ("policy learning"). Hence, while useful for some purposes, we must overcome the prevailing view that policy preferences are fixed and instead devise empirical strategies to analyze how learning takes place. We need 4 to understand how these interdependencies shape the complex topology of political debates that ultimately leads to the emergence of coalitions in the policy process. Our contribution therefore proposes a set of theoretical mechanisms at the micro- level that lead endogenously to the formation and maintenance of coalitions in policy debates. We introduce a new statistical modeling framework that allows us to test the significance of these learning mechanisms in an empirical case study of a policy debate observed over the course of nine years. We cast the debate as a signed bipartite graph of actors and policy beliefs with date-stamped edges and apply our methodological innovation. Due to their inherent dependencies, policy debates can (and should) be modeled as networks. One way to do so is to model a specific discourse, such as the debate on climate change or the debate on population aging, by assuming that elements from a set of actor vertices A = {a, i1, . . . , im−1} (where a denotes the focal actor and i1, . . . , im−1 denote other actors) is connected to elements from a set of policy belief vertices B = {b, j1, . . . , jn−1} (where b is the focal belief and j1, . . . , jn−1 are other policy beliefs) by positive or negative edges γ± t (a, b) (where t is the focal time point, the first element in parentheses is the incident actor vertex and the second element in parentheses the t ∈ Γ has a value of 1 if the actor states the incident policy belief vertex). An edge γ± t ) or negative belief at time point t and 0 otherwise. Each edge has either positive (γ+ (γ− belief (γ− t ) valence, indicating that an actor supports a policy belief (γ+ t ). γ± t denotes either of the two. t ) or rejects a policy A includes various interest groups, legislators, and other actors who have a potential interest in expressing their opinion on the policy topic of the debate. B includes concrete policy instruments or proposals. For example, in the policy debate on climate change, policy beliefs can be the various policy proposals used in the debate, such as "cap and trade," "carbon tax," or "voluntary reduction of emissions," among others. They are 5 specific and cannot be reduced to more fine-grained sub-beliefs other than on an ordinal scale, as in more or less of a specific instrument. At any point in time t, any actor can observe the network of actors and beliefs he or she is embedded in up to time t − 1. This is called the network of past events, Gt = (A; B; Γt). From the perspective of actors at the current time point t, an edge weight w± t (1) is a function that is applied to each event γ before time t and that reflects how long ago a statement was made. It resembles the event's loss in signal strength between the time point the event happened and the current time point, or the decay in memory, when an actor considers the network of past events in making decisions about whether and what to contribute to a policy debate. More formally, and in line with Lerner et al. (2013) and Brandes, Lerner and Snijders (2009), the temporally sensitive edge weight of any statement in the network, in relation to the current time point t, is w± t (i, j) = te(i, j) · e γ± −(t−te)· ln(2) T1/2 (cid:88) te<t (cid:18) (cid:19) · ln(2) T1/2 , (2) where te is a prior time point in the network of past events, e is Euler's number, and T1/2 represents a so-called half-life parameter. The half-life parameter specifies at which rate the weight of past events should diminish. A theoretical model about coalition formation in policy debates (Leifeld 2014) sug- gested a number of potentially suitable micro-level mechanisms that might play a role in coalition formation, simulated policy debates over time, and compared the resulting topologies to stylized facts from empirical studies. While this approach reveals which mechanisms lead to which topologies per se, an agent-based simulation model alone cannot ascertain whether a theoretically and numerically plausible theory is indeed 6 causally related to the real-world topologies because other theories or combinations of mechanisms could potentially explain coalition formation equally well. Fitting a the- ory on coalition formation to a policy debate at the micro level in a temporal analysis, rather than comparing it with stylized facts at the macro level, will permit a more cred- ible analysis of coalition formation in policy debates that moves the state of knowledge closer to a causal understanding. Therefore the present research fits an endogenous theory on coalition formation to an empirical policy debate at the micro-level using new techniques in inferential network analysis. 3 Coalitions in the Policy Process "Coalitions" are a central element in theories of the policy process (Sabatier and Weible 2014). The Advocacy Coalition Framework (ACF) attributes a central role to clusters of actors with congruent policy beliefs (Sabatier and Jenkins-Smith 1993). According to proponents of the ACF, there are usually between two and five coalitions in any given policy process. Advocacy coalitions emerge because of overlapping functional roles of actors (Zafonte and Sabatier 1998) and, primarily, because of mutually reinforcing policy learning within coalitions (Sabatier and Jenkins-Smith 1993), thus leading to a remarkable stability of coalitions over multiple decades. In a policy network of various actors with partly compatible and partly incompatible policy preferences, actors with similar institutional roles will stick together and mutually reinforce and complement each other's position. For example, in an environmental -- industrial conflict, two envi- ronmental NGOs may hold only partly congruent policy beliefs initially, but they are more likely to adopt each other's policy instrument claims than their political oppo- nents' claims in order to gain or maintain a powerful position in the policy network through the operation of a cohesive coalition with coherent policy beliefs. 7 However, coalitions need not rely on institutional cues for policy instrument learn- ing. Coalitions can also emerge as the result of previous states of the network, as in a Markov process. For example, if actors A and B demonstrated relatively congruent policy preferences in the recent past, and actor C demonstrated a relatively incon- gruent preference profile, then policy beliefs may diffuse from A to B or vice-versa. Such a diffusion of policy beliefs among actors is the result of perceived joint coalition membership -- without the actual need for a formal shared institutional role. Learning is rather the result of each actor's observation of the other actors' stated beliefs. This leads to increasing homogeneity of policy beliefs within coalitions over time (Leifeld 2014). We call coalition formation dynamics that do not involve exogenous covariates, such as an actor's institutional role, endogenous mechanisms of coalition formation. Both types of coalition formation, endogenous and exogenous, can interact in a single policy debate. The literature on opinion dynamics has explored similar dynamics of endogenous coalition formation (e. g., Altafini 2012; Antal, Krapivsky and Redner 2005; Marvel et al. 2011; Quattrociocchi, Caldarelli and Scala 2014), where nodes in a network strive for a structural balance in opinions in their local network environment (Cartwright and Harary 1956). An actor with friends who hold similar opinions as the focal actor will be reinforced in his or her views while different opinions in the network neighborhood may lead to a tipping of the actor's opinion. The extreme outcome of a completely balanced system, in which the network breaks apart into two entirely separate but internally homogenous coalitions, is known as a monotone dynamical system (Altafini 2012). Empirical networks, however, usually feature a mix of balanced and unbalanced triads because the endogenous coalition formation mechanism through learning and reinforcement within coalitions is complemented by other theoretical mechanisms. 8 The popular notion of "discourse coalitions" in the literature on argumentative discourse analysis (Hajer 1995) captures essentially the same dynamic as posited by the ACF. The basic premise is that actors try to manipulate other actors' view of reality through the articulation of arguments in a policy debate. The success of a discourse coalition in manipulating a debate is a function of the coherence of the coalition's set of arguments (Leifeld and Haunss 2012). Therefore, like in the Advocacy Coalition Framework, actors with already similar positions have an incentive to further mutually reinforce and adopt each other's statements in a policy debate in order to appear more convincing and exercise greater power. In other words, actors learn from other actors in a policy debate, and the outcome of these learning processes are coalitions. This learning of policy beliefs can occur through multiple plausible mechanisms. In the following paragraphs, we seek to unpack these mechanisms, which contribute to the formation and maintenance of coalitions in a policy debate: positive reciprocity, innovation learning, and negative reciprocity. 3.1 Positive Reciprocity First, we operationalize mutual learning and reinforcement through the notion of pos- itive reciprocity in a signed bipartite graph. Positive reciprocity means that an actor tends to make statements in a policy debate that are compatible with the recently ob- served statements of other actors in the policy debate if the actor identifies these other actors as compatible in terms of their policy beliefs. In line with the risk hypothesis, which explains policy network formation (Berardo and Scholz 2010; Berardo 2014; Berardo and Lubell 2016), actors face uncertainty and risk when they reveal their policy beliefs to other actors. They reduce this risk by bonding, which is the act of learning predominantly from those actors who already share very similar revealed policy belief profiles with the focal actor. Learning from these 9 actors serves to minimize uncertainty and risk by relying on trustworthy information. The odds of being criticized strongly are low if other actors with a similar coalition position advanced similar claims in the past. This strong bonding behavior is not just a building block of policy network formation; it also explains belief system formation and coalitions. In network terms, positive reciprocity is operationalized through balanced four- cycles: in a signed bipartite graph, an actor a will tend to make a positive statement about policy belief b if other actors i also referred to b in a positive way and these other actors already shared other positive beliefs j with a (first panel of Figure 1). Similarly, a will tend to make a negative statement b if a had negative shared statements j with other actors i in the past and if these other actors i also refer to b in a negative way (second panel of Figure 1). Positive reciprocity can also mean that a makes a positive statement b if a had congruent negative statements together with many i and actors i made a positive statement about b (third panel of Figure 1) or that a makes a negative statement b if a had congruent positive statements together with many i and actors i made a negative statement about b (fourth panel of Figure 1). All of these cases reflect the tendency that an actor adopts a policy belief from other actors who are proximate with regard to their policy beliefs. [Figure 1 about here.] At the same time, it matters for policy learning within coalitions when these prior statements were observed by focal actor a. If they all occurred in the recent past, the mutual support and learning is stronger because the focal actor has a good memory of the structure of the debate and these earlier statements therefore act as a stronger signal to a. Conversely, trigger statements in the distant past, say, five years ago, may have a weak influence on a's discursive activity. 10 Therefore, the extent to which actor a has an incentive to contribute policy belief b to the debate at any point in time can be expressed by a positive reciprocity network statistic, which sums the first four cases of Figure 1 over the past network of events and weights the statements by their temporal distance: positive reciprocity ±(Gt, a, b) = 3 (cid:115) (cid:88) (cid:115) (cid:88) i∈A,j∈B + 3 i∈A,j∈B t (a, j) · w± w+ t (i, b) · w+ t (i, j) t (a, j) · w± w− t (i, b) · w− t (i, j) (3) We posit that positive reciprocity is a foundational element of endogenous coalition formation in policy debates, i. e., actors adopt beliefs from congruent other actors in their effort to exercise discursive power via coalition building. We expect that this mechanism plays a role in actors' decisions to contribute statements to a debate: Hypothesis 1 The stronger positive reciprocity is from the perspective of actor a at time t with regard to policy belief b, the more likely a will adopt b at time t. 3.2 Innovation Learning Positive reciprocity alone, however, would lead to a compartmentalization of the net- work over time, where two coalitions with one distinct policy belief each would prevail (Leifeld 2014; Altafini 2012). Reality is more complex: coalitions are composed of more than one policy belief; more than two coalitions can exist empirically; and there can be actors who do not associate perfectly with one coalition or another (Leifeld 2013, 2016). Moreover, positive reciprocity, while useful and plausible, does not discriminate between cases where many other actors stated the same few policy beliefs in the same 11 way in the past (i. e., many actors, few beliefs) and cases where few other actors stated many beliefs in the same way in the past (i. e., few actors, many beliefs). For example, an actor a may be particularly inclined to learn belief concept b from another actor i1 if the two actors exhibited congruent policy beliefs before. This would indicate a strong case of bonding and trust between these two actors (Berardo and Scholz 2010; Berardo 2014; Berardo and Lubell 2016; Henry, Lubell and McCoy 2011), as hypothesized in the previous case. The first two panels of Figure 2 provide an illustration of this bonding strategy. At the same time, however, an actor a may be inclined to learn a policy belief concept not just because of strong incentives by imitating an ideologically very close other actor i1, but also by observing that many other actors i -- even if otherwise not particularly close -- stated another policy belief j1 with the same stance as the focal actor a and if they are all congruent in their use of the focal belief b. This corresponds to bridging behavior in policy networks (Berardo and Scholz 2010; Berardo 2014; Berardo and Lubell 2016; Henry, Lubell and McCoy 2011): when the risk of adopting information from other actors is low -- as ascertained by counting how many minimally compatible actors have stated a policy belief before -- , actors reach out and adopt information from ideologically relatively remote peers. The third and fourth panel of Figure 2 illustrate this bridging strategy. [Figure 2 about here.] The positive reciprocity statistic captures both, bonding and bridging. Therefore we need to control for this bridging behavior in order to be able to interpret the positive reciprocity statistic as the tendency for learning through bonding. Hence we need to devise a separate test, which captures specifically the many-actors -- few-beliefs case of bridging. We call this case innovation learning. Innovation learning is an important building block of coalition formation and main- tenance because it introduces innovation into coalitions. The ACF argues that learning 12 takes place predominantly within coalitions, but to a certain extent also between coali- tions, in order to ensure that coalitions adjust to innovative information. For example, if an external event, such as a scientific report or a natural catastrophe, leads to some new beliefs among a number of actors, the innovation learning mechanism serves to diffuse these innovations to other actors. However, actors will only adopt these policy beliefs if they are held by credible sources. Actors only adopt policy beliefs from other actors if these other actors have a minimum degree of belief congruence with the focal actor. The innovation learning mechanism tests precisely for this kind of innovative learning from minimally congruent source actors by counting how many other actors stated a focal belief in the same way in the past, conditional on these other actors sharing at least one other policy belief with the focal actor, thus closing a balanced four-cycle. Innovation learning can be formalized as follows. First, count how many other actors i have previously mentioned b. Let ζ±(a, b) := (cid:34) t−1(cid:88) (cid:88) i∈A\{a} k=1 (cid:35) γ± k (i, b) > 0 . (4) Then, define η± as the number of actors who have previously mentioned b -- unless the count is 0, in which case η± = 1, in order to avoid division by 0 in the statistic. Let ζ±(a, b) 1 η±(a, b) := if ζ±(a, b) > 0 otherwise. (5) This enables us to define the innovation learning statistic, which is the temporally weighted share of other actors i who referred to policy belief b and who had at least 13 one other positively or negatively congruent belief j with the focal actor a: innovation learning 3 (cid:113)(cid:80) i∈A\{a}(cid:80) (cid:113)(cid:80) i∈A\{a}(cid:80) 3 = + j∈B\{b} j∈B\{b} k=1 γ+ ±(Gt, a, b) (cid:2)(cid:80)t−1 (cid:2)(cid:80)t−1 k=1 γ− k (a, j) > 0(cid:3) · w± k (a, j) > 0(cid:3) · w± t (i, b) ·(cid:2)(cid:80)t−1 t (i, b) ·(cid:2)(cid:80)t−1 η+ k=1 γ+ k=1 γ− k (i, j) > 0(cid:3) k (i, j) > 0(cid:3) , η− (6) where square brackets denote an indicator function that yields 1 if the condition con- tained in the brackets is true and 0 otherwise. We expect that the innovation learning mechanism contributes strongly to the topology of the policy debate: Hypothesis 2 The stronger innovation learning is from the perspective of actor a at time t with regard to policy belief b, the more likely a will adopt b at time t. 3.3 Negative Reciprocity Coalitions, or groups more generally, form not just by learning and reinforcement, but also by repulsion between different coalitions or groups (Skvoretz 2013). For example, the literature on advocacy coalitions stresses how members of coalitions distrust op- ponents in policy processes (Fischer et al. 2016). Once coalitions become entrenched through positive reciprocity, they stress dissimilarities with other coalitions. At the micro level, what we call negative reciprocity is an important factor in the repulsion between coalitions. Negative reciprocity means that existing disagreement between two actors is reinforced by the perception of being in different coalitions. If actors a and i had previous disagreements over policy beliefs j, then it is likely that these conflicts are carried forward through new disagreements over other policy beliefs. For example, if actor a stated policy belief j1 in a positive way while actor i1 stated j1 in a negative way and if i1 stated belief b in a negative way as well, then a will tend 14 to reinforce the interpersonal or interorganizational conflict by stating b in a positive way (fifth panel in Figure 1). If i1 stated b in a positive way, a will state b in a negative way, given their prior conflict (eighth panel in Figure 1). Alternatively, if a stated j1 in a negative way and i1 stated it in a positive way, a and i1 will also disagree over b one way or the other (panels six and seven in Figure 1). These cases are all summarized in a negative reciprocity network statistic over the network of past events, from the perspective of actor a when considering policy belief b, summed over all previous four- cycles, and taking into account the timing of events: negative reciprocity ±(Gt, a, b) = 3 (cid:115) (cid:88) (cid:115) (cid:88) i∈A,j∈B + 3 i∈A,j∈B t (a, j) · w± w+ t (i, b) · w− t (i, j) t (a, j) · w± w− t (i, b) · w+ t (i, j) (7) Negative reciprocity can be interpreted from an actor perspective or from an issue conflict perspective. In the former view, actors learn from past conflicts and extend their existing conflicts to other issues. In the latter view, there can be fundamental differences between sets of issues; for instance, policies j1 and j2 may be intrinsically linked because they belong to some coherent ideology I1, and, similarly, policies j3 and j4 may be linked by some other overarching ideology I2. In that case, it is natural for actors adhering to ideology I1 to support j1 and j2 but to reject j3 and j4. In this view, negative reciprocity is a function of what the Advocacy Coalition Framework calls "deep core beliefs" (Sabatier and Jenkins-Smith 1993). However, both perspectives can be reconciled: even if these fundamental predeter- mined cleavage lines exist across coalitions of actors, actors will still learn from the past behavior of their opponents as well as their overall position in the network what their stance on policy belief b should be, given the overarching ideologies. For example, if a knows their positive view on j1 and recognizes i1's opposing, negative position on j1, 15 then a can learn from i1's negative recent mention of b that j1 and b are in the same compatible ideological package and that they should mention it in a positive way to maintain ideological congruence, thereby distancing themselves further from i1. In line with these considerations along the lines of structural balance and learning, we expect negative reciprocity to play a strong role in shaping the topology of the policy debate through repulsion between coalitions: Hypothesis 3 The stronger negative reciprocity is from the perspective of actor a at time t with regard to policy belief b, the more likely will a adopt b at time t. 4 Data and Methods 4.1 Data We test our theory of endogenous coalition formation in policy debates in an empirical case study. Using the software Discourse Network Analyzer (Leifeld 2016), we content- analyzed 1,842 newspaper articles from Frankfurter Allgemeine Zeitung, a German news outlet with center -- right news coverage of politics, about the policy debate on the German pension system. Articles were selected using a general search phrase, and false positives were manually weeded out. 6,704 statements of 245 political actors over nine years (1993 -- 2001) were coded by two expert coders, and intercoder reliability was checked post-hoc by two separate coders and was found to be consistently high. The coding scheme consisted of four variables: the person who made a statement, the organization the person belonged to, the policy belief stated by the person or organization, and a dummy variable indicating support or rejection of the belief by the actor. In the analysis, organizations were used as actors, in line with previous analyses of policy networks (Laumann and Knoke 1987; Berardo and Scholz 2010). A total of 69 beliefs were coded. These were policy instruments that reflected normative 16 stances on what to do about the imminent financing problem of the pension system. Examples include "install fertility incentives to create more contributors," "incentivize private savings to complement the state pension," or "increase pension age," among many others. In May 2001, a major policy reform introduced privatization measures; thus this marks the end of the observation period. The start of the observation period was January 1993. We use the first 657 statements from January 1993 to March 1996 to calibrate the endogenous network statistics. The number of excluded events in an ordinal event sequence depends on the number of days on which a statement was made and the specified half-life parameter in Equation 2. The 657 statements were issued over the course of 200 event days. With a chosen half-life parameter of 20 event days, the network of past events Gt is sufficiently large for all events issued after March 1996 to ensure unbiased statistics. Therefore we define March 1996 as the start of the analysis period. This time period also covers the national election at the end of September 1998 and the election campaign that started in March 1998. The pension debate was one of the key topics in the election campaign. Figure 3 shows the frequency of statements per week over the analysis period with the shaded area representing the duration of the election campaign. [Figure 3 about here.] The policy debate on the German pension system in the wake of population aging is an ideal case study for several reasons. First, Germany does not have a journalistic norm of balanced reporting as, for example, in the U.S., which would bias the measurement of coalition formation through newspaper data (Boykoff and Boykoff 2004). We do acknowledge that the process by which an actor gets to speak in the newspaper is still affected by agenda setting through the media, but actors have a high degree of 17 autonomy in what they say, and we can control for activity and popularity effects in the statistical model. Second, the debate featured a high amount of uncertainty among actors over how to solve the policy problem. The debate is situated in a historical setting where population aging was for the first time put on the national political agenda. This ensures a lively debate, where a number of very different arguments and positions are exchanged. Third, the topic of public pensions is broad enough that the debate is multi-dimensional rather than two-dimensional and that more than two coalitions can be observed at some time points (Leifeld 2013, 2016). 4.2 Methodology We estimate two statistical models to test our theory on endogenous coalition forma- tion. The first model is a stratified Cox proportional hazard model estimated through conditional logit maximum likelihood estimation. This models the incidence of a state- ment of a specific actor a about a specific policy belief b. The risk set is defined as the set of statements that have not yet been issued but would eventually come to pass. Alternatively, the risk set could have been defined to include all possible combi- nations of actors, beliefs, and stances for every event day. However, this specification would result in an event sequence containing 38,678,640 (245 actors × 69 beliefs × 2 stances × 1144 unique event days) true and null events. Due to the computational burden of such an event sequence, we chose to define the risk set in accordance with conditional logistic regression models, resulting in 883,855 events in the event sequence. Hence, each day on which at least one statement is made forms a stratum and is filled with statements that are made on this day (treatment or true events, = 1) as well as all potential statements that could have been issued but were not (control or null events, = 0). Where statements from the same actors and with the same stance are issued 18 repeatedly over the course of the debate, these statements are repeatedly at risk until the combination is issued for the last time. The use of sufficient network statistics to capture dependencies between observations in a survival model is known as a relational event model and was first proposed by Butts (2008). Here, we extend this idea to accommodate custom network statistics formed over a two-mode network. The network statistics are calculated for both true events as well as null events. The second model is a logistic regression model. The dependent variable is the sign of an actor -- belief statement (support or rejection; + or −) conditional on the existence of the statement and the past network of events (de Nooy and Kleinnijenhuis 2013; Lerner et al. 2013). While the survival model explains the timing and existence of statements, this second model explains the stance of the statement as a function of prior interactions (similar to de Nooy and Kleinnijenhuis 2013). Lerner et al. (2013), Lerner (2016), and Brandes, Lerner and Snijders (2009) show that the likelihood of both models can be added to form the overall likelihood of the temporal topology of the policy debate. We extend the combined approach of Lerner et al. (2013) by applying their relational event model for signed graphs to the bipartite case using custom network statistics. The statistics we employ to operationalize our theory are identical across the two models we estimate, including the use of positive and negative signs on the dyads and the half-life parameter of 20 for Equation 2. 4.3 Control Variables We include further control variables as sufficient statistics. Section ?? in the SI Online contains further information on the specification of these model terms. We include an interaction between each of the three main terms and a dummy variable indicating whether the focal actor a is a government actor, such as a federal 19 ministry or agency. We expect these actors to behave differently and act in a neutral way because they have an official mandate. The interaction should have a negative sign as policy belief learning should be less pronounced in government actors than in other types of actors. The main effect for this dummy variable should be positive because government actors are often in charge of issuing statements about policy making and should therefore have a relative high statement density. Furthermore, a model term called inertia controls for the repetition of statements by the same actor. Actor activity serves a similar purpose as a random effect in cross- sectional analyses; it controls for the propensity of each actor to make statements in the debate. Belief concept popularity controls for issue attention cycles, i. e., swings in the number of times a specific belief was recently stated. We control for a seasonal effect of the week day Monday. News usually accumulate over the weekend, so more activity can be expected on Mondays. Section ?? of the SI Online contains specifications with additional control variables for the logistic model. We control for actor type homophily, which is the tendency of actors to agree with another actor on the stance of a policy belief if both actors are of the same type (e. g., both are trade unions or social interest groups). This operationalizes functional interdependencies as posited by Zafonte and Sabatier (1998). We also control for expected conflict lines between trade unions/social interest groups on the one hand and liberal actors/employers' associations and financial market actors, such as banks and insurance companies, on the other hand. These heterophily model terms control for exogenously defined cleavage lines. The inclusion of both the homophily and heterophily terms does not change the substantive results. 20 5 Results Table 1 shows the results of the survival model (the so-called rate function), and Table 2 shows the results of the logistic regression model (the so-called type function). Section ?? in the SI Online presents details on the standardization of the endogenous network variables. [Table 1 about here.] [Table 2 about here.] The results in Table 1 show strongly positive regression coefficients for all three types of policy belief learning: positive reciprocity has a coefficient of 0.39, which means that a one-unit increase in this statistic corresponds to an increase in the odds of event occurrence by 48 percent for all non-governmental actors. All endogenous network statistics are standardized. A one-unit increase in the statistic corresponds to one standard deviation of positive reciprocity (sd = 0.065, min = 0, max = 0.584). This increase represents approximately 11 additional shared beliefs between focal actor a and i1, with a using j three days ago, i1 using j ten days ago, and i1 using b one day ago (see Table ?? in the SI Online for additional scenarios on what an increase in one standard deviation entails in network event terms). The effect of positive reciprocity is significantly smaller for governmental actors. An increase of the innovation learning statistic by one standard deviation increases the odds that non-governmental actor a makes statement b at time t by 22 percent. For the innovation learning statistic to increase by one standard deviation, a would have to share two policy beliefs j with each actor i that stated b eight days ago (as one possible scenario). Here, too, government actors have a lower propensity to pick up policy belief concepts that were used by minimally congruent other actors than non-government actors. 21 There is a strong positive effect for negative reciprocity, with an increase in the odds of a statement by 19 percent. The standard deviation for negative reciprocity represents, for instance, an additional joint usage of three beliefs j in the recent past (i1 stated b one day ago, a stated j three days ago, and i1 stated j ten days ago). As such, this effect is more than three times as powerful as positive reciprocity (with one standard deviation increase amounting to 11 additional shared beliefs j, given i1 stated b one day ago, a stated j three days ago, and i1 stated j ten days ago). Actors have a strong tendency to reject statements made by actors i with whom they disagreed over other beliefs in the past. Both government and non-government actors exhibit this behavior, i. e., the interaction effect is not significant. Substantively, this lends strong support to hypotheses 1 -- 3. In line with our model of endogenous coalition formation, actors adopt policy beliefs from structurally proxi- mate actors in an act of bonding, leading to cohesive coalitions ("positive reciprocity"); they reinforce past experiences by learning which policy beliefs not to adopt as a func- tion of past disagreements with actors, leading to a repulsion of coalitions ("negative reciprocity"); and they learn from structurally more distant actors across coalitions, provided that there is at least minimal agreement with those other actors and that these minimally trusted other actors agree with each other on the policy belief concept to be learned ("innovation learning"). Together, these mechanisms shape a topology of the policy debate in which there are multiple cohesive advocacy or discourse coali- tions which are, however, not completely separated due to the bridging aspect of policy learning (in line with theoretical predictions by Leifeld 2014). Figure 4 shows the values of the three statistics of main interest over time vis-`a-vis the null events. Null events for each time point t include all statements that were issued after t and, as such, were at risk of being issued at the focal time t. At each point in time, the null events represent all future events that have not yet been issued. 22 They form the control group to the group of statements that were issued at time t. The conditional logistic model then evaluates which factors increase the probability of an event occurring now, given it has not occurred before. The 95 percent confidence interval around the blue curves indicates consistent significance at all time points. The shape of the blue curves also indicates a change in the data-generating process. Ad- ditional model specifications with a temporal dummy variable for the election period and interactions with the variables of interest were tested and did not change the main results significantly. [Figure 4 about here.] Model 2 is a variant of Model 1 that demonstrates that the substantive results do not change when the interaction effects between the main variables of interest and government activity are omitted. As for the control variables, actors show a tendency to repeat themselves and jump on the bandwagon of recently widely-stated policy beliefs. There is a small effect of statement occurrence on Mondays, and government actors are more active than other actor types. The explained variance (according to McFadden 1978) is moderate at 0.14. Table 2 demonstrates similar effects for the type function. While the rate function models the rate of the occurrence of a statement by actor a on belief b, the type function explains the stance of the statement, conditional on the fact that the statement occurs and conditional on the past network. In this model, a positive statement of the belief concept is modeled as 1 and negative use as 0. Due to the nature of the dependent variable, the statistics of primary interest need to be subdivided into their constituent parts for positive and negative (i1, b) relations (panels 1 and 3 in Figure 1 and panels 2 and 4 go together, respectively, for positive reciprocity and panels 6 and 8 and panels 5 and 7, respectively, for negative reciprocity). 23 The results indicate that, as expected, positive reciprocity holds such that balanced open four-cycles with a positive (i1, b) relation tend to be closed by a positive (a, b) statement (the odds of a positive statement increase by 225 percent) and that balanced open four-cycles with a negative (i1, b) relation prompt a negative (a, b) statement (the odds of a positive statement decrease by 67 percent). This indicates that bonding increases the incentives for further structural balance. The increase of one standard deviation in positive reciprocity for positively (or negatively) stated policy beliefs b by a represents an additional 13 (or seven) events actors a and i1 shared in the recent past (a stated j three days ago, i1 stated j ten days ago, and i1 stated b one day ago) (see Table ?? in the SI Online). Conversely, as expected, negative reciprocity yields a reverse pattern. Past conflicts are carried forward such that a positive statement on b by i1 prompts a negative one by a and vice-versa if previous discursive alignments were conflictual. The odds of a positive statement are increased by 129 percent if a has disagreed with another actor i1 on three more beliefs j in the past (a stated j three days ago, and i1 stated j ten days ago) and i1 opposed policy belief b one day ago. Similarly, the odds of a positive statement decrease by 61 percent if a previous actor i1 agreed with policy belief b one day ago and a and i1 contradicted each other on seven more beliefs in the past (a stated j three days ago, and i1 stated j ten days ago). There are mixed results for innovation learning in the type function, with one coeffi- cient significant and the other one insignificant. If we interpret this result together with the significant coefficient for innovation learning in the rate function, actors do learn policy beliefs from minimally congruent actors (e. g., across coalitions), but this does not generally mean that actors also agree on the issue stances (e. g., across coalitions) once they have adopted a belief. They rather learn the policy belief concept, but not the stance. 24 In the type model, one does not need to control for actor activity because whether an actor supports or rejects a belief is not theoretically linked to how often the actor made statements in the past. However, one can see that past positive statements of policy beliefs increases the odds of current positive use of the same belief concepts, and the same is true for negative uses of these policy belief concepts, as indicated by the belief concept popularity coefficients. Moreover, if an actor stated a specific belief predominantly in a positive (negative) way in the recent past, the actor tends to state the policy belief concept in the same way now, as shown by the inertia coefficients. Figures 5 and 6 assess the goodness of fit of the rate model using simulations. Figure 5 shows that our theory has some predictive value and greatly improves upon the prediction of a random null model, for different difficulty levels of prediction. Only exact time matches are counted as positive predictions in Figure 5. Since exact time matches impose too strict a test on temporal predictions of events, we report the differences in the timing of simulated versus random events vis-`a-vis true events in Figure 6. The simulated sequence based on the fitted model predicts the timing of true events much better than a random null model, i. e., the mean temporal prediction error is much smaller. On average, the time difference between simulated and true event is 27 days (sd = 28.9, min = 0, max = 188, median = 23), whereas the average time difference between random and true events is 194 days (sd = 156.5, min = 0, max = 523, median = 167). [Figure 5 about here.] [Figure 6 about here.] 25 6 Conclusion Overall, these results provide overwhelming empirical evidence for the three mechanisms of learning that lead to endogenous coalition formation and maintenance. The evidence is robust at two levels: the waiting time or probability per time unit that a statement by a specific actor about a specific policy belief is made, and the stance of the statement. This provides us with an understanding of how and why advocacy or discourse coalitions are formed and maintained and, more broadly, how policy debates operate. An assessment of the model fit also showed that there is room left for theoretical improvement for the explanation of this complex dynamical system. However, it should be noted that similarly complex dynamical systems, such as militarized interstate dis- putes, regularly yield levels of explained variance below ten percent. While the poor theoretical understanding of other systems by no means improves the value of our the- oretical explanation in the present case, this indicates more generally that the social sciences have a long way to go if we are to understand complex and often erratic social behavior to a satisfactory degree. The research presented here is an important step in this direction as we have pre- sented innovative evidence for the structure and dynamics of how policy debates oper- ate. We first presented a theory of coalition formation, maintenance, and repulsion in policy processes based on policy beliefs and learning. This theory provides an innova- tive understanding of the micro-level dynamics that underpin advocacy and discourse coalitions and makes a contribution to this vast literature, which is all too often fo- cused on the empirical identification, rather than explanation, of topological features like coalitions. More generally, we have laid the foundation for a theoretical as well as empirical understanding of how policy debates work. Previous research on policy debates tended to be more descriptive and one-dimensional. Our approach fully acknowledges the 26 multi-dimensional nature of policy debates as complex dynamical systems and offers a theoretically informed lens that can be readily operationalized through the empirical toolbox of inferential network analysis. Work in this direction may ultimately enable us to forecast how policy debates will develop, at least at a short range like a weather forecast. Such results can then be used to evaluate scenarios for devising more efficient media campaigning strategies by interest groups or political parties, or they could be employed for comparing styles of deliberation across countries, or they could be used for the benefit of humanity, e. g., by avoiding polarization and political stalemate when the prediction points into this direction. The work in this contribution is an important step into this direction, but much more work needs to be done. Several research areas can be readily identified. First, data collection needs to be made more efficient. Recent developments in natural language processing and machine learning may soon help us to identify given policy be- liefs in unstructured newspaper articles and connect them with the actors who sponsor them, as identified through named entity recognition. Right now, the level of detail required for a meaningful analysis of this kind still makes manual annotation of text materials necessary, but important research is underway in several disciplines. Second, a much better understanding needs to be developed about dynamic network models for complex data structures, such as the relational event models for signed bipartite graphs with a rate and type function and temporal decay used here. Little is known about possible extensions; there are no simulation results that would verify the validity of these extensions; there is no systematic way to ascertain that the sufficient statistics are really sufficient etc. Right now, we are avoiding some of these potential problems by verifying our results through evidence of predictive fit, but a better theoretical under- standing of these kinds of network models would be important for their widespread use. Third, a better understanding of how temporal dynamics should be modeled would be 27 important. For example, we employed a half-life parameter of 20 days in our models and verified the robustness of this parameter through simulations. Yet, in principle, arbi- trary combinations of different half-life parameters could be used for the different model terms, and inclusion of these parameters in the likelihood function might potentially cause statistical identification problems. Future research therefore needs to establish best practices or at least a larger set of experiences to draw from when parameterizing network dynamics. Finally, we would like to point out that the policy debate analyzed here was selected carefully, but may deviate from policy debates in other political systems, arenas, data sources, policy domains, or contexts more generally. This opens the door to an excit- ing research area where debates in different contexts can be compared to the baseline findings established here. References Altafini, Claudio. 2012. "Dynamics of Opinion Forming in Structurally Balanced Social Networks." PLOS ONE 7(6):e38135. URL: http://dx.doi.org/10.1371/journal.pone.0038135 Antal, Tibor, Paul L. Krapivsky and Sidney Redner. 2005. "Dynamics of Social Balance on Networks." Physical Review E 72(3):036121. Berardo, Ramiro. 2014. "Bridging and Bonding Capital in Two-Mode Collaboration Networks." Policy Studies Journal 42(2):197 -- 225. Berardo, Ramiro and John T. Scholz. 2010. "Self-Organizing Policy Networks: Risk, Partner Selection, and Cooperation in Estuaries." American Journal of Political Sci- ence 54(3):632 -- 649. 28 Berardo, Ramiro and Mark Lubell. 2016. "Understanding What Shapes a Polycentric Governance System." Public Administration Review 76(5):738 -- 751. Boykoff, Maxwell T. and Jules M. Boykoff. 2004. "Balance as Bias: Global Warming and the US Prestige Press." Global Environmental Change 14(2):125 -- 136. Brandes, Ulrik, Jurgen Lerner and Tom A. B. Snijders. 2009. Networks Evolving Step by Step: Statistical Analysis of Dyadic Event Data. In Social Network Analysis and Min- ing, ASONAM'09. International Conference on Advances in Social Network Analysis and Mining. IEEE pp. 200 -- 205. Butts, Carter T. 2008. "A Relational Event Framework for Social Action." Sociological Methodology 38(1):155 -- 200. Cartwright, Dorwin and Frank Harary. 1956. "Structural Balance: A Generalization of Heider's Theory." Psychological Review 63(5):277 -- 293. de Nooy, Wouter and Jan Kleinnijenhuis. 2013. "Polarization in the Media During an Election Campaign: A Dynamic Network Model Predicting Support and Attack among Political Actors." Political Communication 30(1):117 -- 138. Downs, Anthony. 1972. "Up and Down with Ecology: The Issue Attention Cycle." Public Interest 28(1):38 -- 50. Fischer, Manuel, Karin Ingold, Pascal Sciarini and Fr´ed´eric Varone. 2016. "Dealing with Bad Guys: Actor- and Process-level Determinants of the 'Devil Shift' in Policy Making." Journal of Public Policy 36(2):309 -- 334. Fisher, Dana R., Philip Leifeld and Yoko Iwaki. 2013. "Mapping the Ideological Net- works of American Climate Politics." Climatic Change 116(3):523 -- 545. 29 Hajer, Maarten A. 1995. The Politics of Environmental Discourse: Ecological Modern- ization and the Policy Process. Oxford: Clarendon Press. Hall, Peter A. 1993. "Policy Paradigms, Social Learning, and the State: The Case of Economic Policymaking in Britain." Comparative Politics 25(3):275 -- 296. Henry, Adam Douglas, Mark Lubell and Michael McCoy. 2011. "Belief Systems and So- cial Capital as Drivers of Policy Network Structure: The Case of California Regional Planning." Journal of Public Administration Research and Theory 21(3):419 -- 444. Lasswell, Harold Dwight. 1950. Politics: Who Gets What, When, How. New York: P. Smith. Laumann, Edward O. and David Knoke. 1987. The Organizational State: Social Choice in National Policy Domains. Madison: University of Wisconsin Press. Leifeld, Philip. 2013. "Reconceptualizing Major Policy Change in the Advocacy Coali- tion Framework: A Discourse Network Analysis of German Pension Politics." Policy Studies Journal 41(1):169 -- 198. Leifeld, Philip. 2014. "Polarization of Coalitions in an Agent-Based Model of Political Discourse." Computational Social Networks 1(1):7. URL: http://dx.doi.org/10.1186/s40649-014-0007-y Leifeld, Philip. 2016. Policy Debates as Dynamic Networks: German Pension Politics and Privatization Discourse. Frankfurt am Main: Campus. Distributed through the University of Chicago Press. Leifeld, Philip. 2017. Discourse Network Analysis: Policy Debates as Dynamic Net- works. In Oxford Handbook of Political Networks, ed. Jennifer Nicoll Victor, Alexan- 30 der H. Montgomery and Mark N. Lubell. chapter 25. URL: http://dx.doi.org/10.1093/oxfordhb/9780190228217.013.25 Leifeld, Philip and Sebastian Haunss. 2012. "Political Discourse Networks and the Conflict over Software Patents in Europe." European Journal of Political Research 51(3):382 -- 409. Lerner, Jurgen. 2016. "Structural Balance in Signed Networks: Separating the Proba- bility to Interact from the Tendency to Fight." Social Networks 45:66 -- 77. Lerner, Jurgen, Margit Bussmann, Tom A. B. Snijders and Ulrik Brandes. 2013. "Mod- eling Frequency and Type of Interaction in Event Networks." Corvinus Journal of Sociology and Social Policy (1):3 -- 32. Marvel, Seth A., Jon Kleinberg, Robert D. Kleinberg and Steven H. Strogatz. 2011. "Continuous-time Model of Structural Balance." Proceedings of the National Academy of Sciences 108(5):1771 -- 1776. McFadden, Daniel. 1978. Quantitative Methods for Analysing Travel Behaviour of Indi- viduals: Some Recent Developments. In Behavioural Travel Modelling, ed. David A. Hensher and Peter R. Stopher. London: Groom Helm chapter 13, pp. 279 -- 318. Quattrociocchi, Walter, Guido Caldarelli and Antonio Scala. 2014. "Opinion Dynamics on Interacting Networks: Media Competition and Social Influence." Scientific Reports 4(4938). Sabatier, Paul A. and Christopher Weible. 2014. Theories of the Policy Process. Boul- der, CO: Westview Press. Sabatier, Paul A. and Hank C. Jenkins-Smith. 1993. Policy Change and Learning: An Advocacy Coalition Approach. Boulder, CO: Westview Press. 31 Skvoretz, John. 2013. "Diversity, Integration, and Social Ties: Attraction versus Repul- sion as Drivers of Intra- and Intergroup Relations." American Journal of Sociology 119(2):486 -- 517. Weible, Christopher M., Paul A. Sabatier and Kelly McQueen. 2009. "Themes and Variations: Taking Stock of the Advocacy Coalition Framework." Policy Studies Journal 37(1):121 -- 140. Zafonte, Matthew and Paul A. Sabatier. 1998. "Shared Beliefs and Imposed Interde- pendencies as Determinants of Ally Networks in Overlapping Subsystems." Journal of Theoretical Politics 10(4):473 -- 505. 32 a i1 a i1 b j1 b j1 a i1 a i1 pro con b j1 b j1 a i1 a i1 b j1 b j1 a i1 a i1 b j1 b j1 Figure 1: Positive reciprocity (first row) and negative reciprocity (second row). 33 a i1 a i1 b j1 j2 j3 b j1 j2 j3 a i1 i2 i3 pro con b j1 b j1 a i1 i2 i3 Figure 2: Bonding (first and second panel) and bridging (third and fourth panel). 34 Figure 3: Frequency of statements per week. 35 0255075100199619971998199920002001number of statements per week Figure 4: Value of the positive reciprocity, innovation learning, and negative reciprocity statistics over time (blue curves from top to bottom) vis-`a-vis the null events (green curves). The results are significant at all time points. 36 Negative reciprocityInnovation learningPositive reciprocity1996199719981999200020011996199719981999200020011996199719981999200020010.000.050.100.150.200.000.050.100.000.040.080.12null eventstrue events Figure 5: Goodness-of-fit assessment through prediction. The barchart shows how much the rate model improves the prediction of actors, beliefs, stances, or combinations of these variables vis-`a-vis a null model. Only exact timing matches are counted. Predictions were made within-sample over 50 event days between September 28, 1998 and December 16, 1998 (with a total of 391 statements). The risk set includes all statements issued after September 28, 1998 (excluding duplicates). Standard errors are based on 13 simulated sequences. 37 correct eventcorrect actorand policy beliefcorrect policy beliefand stancecorrect policy beliefcorrect actor0%10%20%30%40%percentage of correctly predicted events (+se)simulationrandom Figure 6: Goodness-of-fit assessment through prediction. The two histograms show the timing error of the simulated or random events. Predictions were made within-sample over 50 event days between September 28, 1998 and December 16, 1998 (with a total of 391 statements). The histograms are based on one of the thirteen simulated and random sequences each. Horizontal dashed lines represent the mean difference between the timing of simulated (or random) and true events (i. e., the temporal prediction error). 38 02040600200400time between simulated and true event daysimulationrandom (1) (2) Main hypotheses 0.39 (0.03) Positive reciprocity −0.12 (0.03) Positive reciprocity × government org. 0.20 (0.03) Innovation learning −0.10 (0.03) Innovation learning × government org. 0.17 (0.02) Negative reciprocity Negative reciprocity × government org. −0.01 (0.03) Control Inertia Actor activity Belief concept popularity Monday (dummy) Government (dummy) ∗∗∗ ∗∗∗ ∗∗∗ ∗∗∗ ∗∗∗ ∗∗∗ 0.13 (0.01) −0.01 (0.02) 0.11 (0.01) 0.07 (0.04) 0.70 (0.04) ∗∗∗ ∗∗∗ AIC McFadden pseudo-R2 Num. events Num. obs. ∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05; Coefficients are reported as log-odds. 54032.32 0.14 6044 883855 0.31 (0.01) ∗∗∗ 0.11 (0.01) ∗∗∗ 0.18 (0.01) ∗∗∗ ∗∗∗ 0.12 (0.01) −0.02 (0.02) ∗∗∗ 0.12 (0.01) ∗ 0.08 (0.04) ∗∗∗ 0.47 (0.04) 54113.86 0.13 6044 883855 Table 1: Results of the conditional logistic regression on the event rate. 39 Main hypotheses Pos. reciprocity (γ+(i1, b)) Pos. reciprocity (γ−(i1, b)) Innovation learning (γ+(i1, b)) Innovation learning (γ−(i1, b)) Neg. reciprocity (γ+(i1, b)) Neg. reciprocity (γ−(i1, b)) Control Inertia (γ+(a, b)) Inertia (γ−(a, b)) Popularity (γ+(i, b)) Popularity (γ−(i, b)) Intercept (3) ∗∗∗ ∗∗∗ 1.18 (0.14) −1.12 (0.11) −0.03 (0.08) −0.16 (0.07) ∗ −0.96 (0.12) ∗∗∗ ∗∗∗ 0.83 (0.10) 1.48 (0.11) −1.51 (0.11) 0.60 (0.08) −0.68 (0.06) 1.09 (0.06) ∗∗∗ ∗∗∗ ∗∗∗ ∗∗∗ ∗∗∗ BIC McFadden pseudo-R2 Num. obs. ∗∗∗p < 0.001, ∗∗p < 0.01, ∗p < 0.05; Coefficients are reported as log-odds. 4850.22 0.37 6044 Table 2: Logistic regression on agreement with a given policy belief. 40
1612.05760
1
1612
2016-12-17T13:41:56
Kleinberg's Grid Reloaded
[ "cs.SI", "physics.soc-ph" ]
One of the key features of small-worlds is the ability to route messages with few hops only using local knowledge of the topology. In 2000, Kleinberg proposed a model based on an augmented grid that asymptotically exhibits such property. In this paper, we propose to revisit the original model from a simulation-based perspective. Our approach is fueled by a new algorithm that uses dynamic rejection sampling to draw augmenting links. The speed gain offered by the algorithm enables a detailed numerical evaluation. We show for example that in practice, the augmented scheme proposed by Kleinberg is more robust than predicted by the asymptotic behavior, even for very large finite grids. We also propose tighter bounds on the performance of Kleinberg's routing algorithm. At last, we show that fed with realistic parameters, the model gives results in line with real-life experiments.
cs.SI
cs
Kleinberg's Grid Reloaded Fabien Mathieu1 1 Nokia Bell Labs, route de Villejust, 91620 Nozay [email protected] Abstract One of the key features of small-worlds is the ability to route messages with few hops only using local knowledge of the topology. In 2000, Kleinberg proposed a model based on an augmented grid that asymptotically exhibits such property. In this paper, we propose to revisit the original model from a simulation-based perspective. Our approach is fueled by a new algorithm that uses dynamic rejection sampling to draw aug- menting links. The speed gain offered by the algorithm enables a detailed numerical evaluation. We show for example that in practice, the augmented scheme proposed by Kleinberg is more ro- bust than predicted by the asymptotic behavior, even for very large finite grids. We also propose tighter bounds on the performance of Kleinberg's routing algorithm. At last, we show that fed with realistic parameters, the model gives results in line with real-life experiments. 1998 ACM Subject Classification C.2.2 Routing Protocols; C.2.4 Distributed Systems Keywords and phrases Small-World Routing; Kleinberg's Grid; Simulation; Rejection Sampling Digital Object Identifier 10.4230/LIPIcs.OPODIS.2016.21 1 Introduction In a prescient 1929 novel called Láncszemek (in English, Chains), Karinthy imagines that any two people can be connected by a small chain of personal links, using no more than five intermediaries [10]. Years later, Milgram validates the concept by conducting real-life experiments. He asks volunteers to transmit a letter to an acquaintance with the objective to reach a target destination across the United States [17, 20]. While not all messages arrive, successful attempts reach destination after six hops in average, popularizing the notion of six degrees of separation. Yet, for a long time, no theoretical model could explain why and how this kind of small- world routing works. One of the first and most famous attempts to provide such a model is due to Jon Kleinberg [12]. He proposes to abstract the social network by a grid augmented with shortcuts. If the shortcuts follow a heavy tail distribution with a specific exponent, then a simple greedy routing can reach any destination in a short time (O(log2(n)) hops). On the other hand, if the exponent is wrong, then the time to reach destination becomes Ω(nα) for some α. This seminal work has led to multiple studies from both the theoretical and empirical social systems communities. Contribution In this paper, we propose a new way to numerically benchmark the greedy routing algorithm in the original model introduced by Kleinberg. Our approach uses dynamic rejection sam- pling, which gives a substantial speed improvement compared to previous attempts, without © Fabien Mathieu; licensed under Creative Commons License CC-BY 20th International Conference on Principles of Distributed Systems (OPODIS 2016). Editors: Panagiota Fatourou, Ernesto Jiménez and Fernando Pedone; Article No. 21; pp. 21:1 -- 21:16 Leibniz International Proceedings in Informatics Schloss Dagstuhl -- Leibniz-Zentrum für Informatik, Dagstuhl Publishing, Germany 21:2 Kleinberg's Grid Reloaded making any concession about the assumptions made in the original model, which is kept untouched. Fueled by the capacity to obtain quick and accurate results even for very large grids, we give a fresh look on Kleinberg's grid, through three independent small studies. First, we show that the model is in practice more robust than expected: for grids of given size there is quite a large range of exponents that grant short routing paths. Then we observe that the lower bounds proposed by Kleinberg in [12] are not tight and suggest new bounds. Finally, we compare Kleinberg's grid to Milgram's experiment, and observe that when the grid parameters are correctly tuned, the performance of greedy routing is consistent with the six degrees of separation phenomenon. Roadmap Section 2 presents the original augmented grid model introduced by Kleinberg and the greedy routing algorithm. A brief overview of the main existing theoretical and experimental studies is provided, with a strong emphasis on the techniques that can be used for the numerical evaluation of Kleinberg's model. In Section 3, we give our algorithm for estimating the performance of greedy routing. We explain the principle of dynamic rejection sampling and detail why it allows to perfectly emulate Kleinberg's grid with the same speed that can be achieved by toroidal approxima- tions. We also give a performance evaluation of the simulator based on our solution. For readers interested in looking under the hood, a fully working code (written in Julia) is given in Appendix A. To show the algorithm benefits, we propose in Section 4 three small studies that investi- gate Kleinberg's model from three distinct perspectives: robustness of greedy routing with respect to the shortcut distribution (Section 4.1); tightness of the existing theoretical bounds (Section 4.2); emulation of Milgram's experiment within Kleinberg's model (Section 4.3). 2 Model and Related Work We present here the model and notation introduced by Kleinberg in [12, 11], some key results, and a brief overview of the subsequent work on the matter. 2.1 Kleinberg's Grid In [12], Kleinberg considers a model of directed random graph G(n, r, p, q), where n, p, q are positive integers and r is a non-negative real number. A graph instance is built from a square lattice of n × n nodes with Manhattan distance d: if u = (i, j) and v = (k, l), then d(u, v) = i − j + k − l. d represents some natural proximity (geographic, social, . . . ) between nodes. Each node has some local neighbors and q long range neighbors. The local neighbors of a node u are the nodes v such that d(u, v) ≤ p. The q long range neighbors of u, also called shortcuts, are drawn independently and identically as follows: the probability that a given long edge starting from u arrives in v is proportional to (d(u, v))−r. The problem of decentralized routing in a G(n, r, p, q) instance consists in delivering a message from node u to node v in a hop-by-hop basis. At each step, the message bearer needs to choose the next hop among its neighbors. The decision can only use the lattice coordinates of the neighbors and destination. The main example of decentralized algorithm is the greedy routing, where at each step, the current node chooses the neighbor that is closest to destination based on d (in case of ties, an arbitrary breaking rule is used). Fabien Mathieu 21:3 The main metric to analyze the performance of a decentralized algorithm is the expected delivery time, which is the expected number of hops to transmit a message between two nodes chosen uniformly at random in the graph. This paper focuses on studying the performance of the greedy algorithm. Unless stated otherwise, we assume p = q = 1 (each node has up to four local neighbors and one shortcut). Let er(n) be the expected delivery time of the greedy algorithm in G(n, r, 1, 1). 2.2 Theoretical Results The main theoretical results for the genuine model are provided in the original papers [11, 12], where Kleinberg proves the following: e2(n) = O(log2(n)); for 0 ≤ r < 2, the expected delivery time of any decentralized algorithm is Ω(n(2−r)/3); for r > 2, the expected delivery time of any decentralized algorithm is Ω(n(r−2)/(r−1)). Kleinberg's results are often interpreted as follows: short paths are easy to find only in the case r = 2. The fact that only one value of r asymptotically works is sometimes seen as the sign that Kleinberg's model is not robust enough to explain the small-world routing proposed by Karinthy and experimented by Milgram. However, as briefly discussed by Kleinberg in [5], there is in fact some margin if one considers a grid of given n. This tolerance will be investigated in more details in Section 4.1. While we focus here on the original model, let us give a brief, non-exhaustive, overview of the subsequent extensions that have been proposed since. Most proposals refine the model by considering other graph models or other decentralized routing algorithms. New graph models are for example variants of the original model (studying grid dimension or the number of shortcuts per node [2, 5, 9]), graphs inspired by peer-to-peer overlay networks [14], or arbitrary graphs augmented with shortcuts [6, 8]. Other proposals of routing algorithms usually try to enhance the performance of the greedy one by granting the current node additional knowledge of the topology [7, 14, 15]. A large part of the work above aims at improving the O(log2(n)) bound of the greedy routing. For example, in the small-world percolation model, a variant of Kleinberg's grid with O(log(n)) shortcuts per node, greedy routing performs in O(log(n)) [14]. 2.3 Experimental Studies Many empirical studies have been made to study how routing works in real-life social net- works and the possible relation with Kleinberg's model (see for example [13, 5] and the references within). On the other hand, numerical evaluations of the theoretical models are more limited to the best of our knowledge. Such evaluations are usually performed by averaging R runs of the routing algorithm considered. In [11], Kleinberg computes er(n) for n = 20, 000 and r ∈ [0, 2.5], using 1,000 runs per estimate. However, he uses a torus instead of a regular grid (this will be discussed later in the paper). In [14], networks of size up to 224 (corresponding to n = 212 in the grid) are investigated using 150 runs per estimate. Closer to our work, Athanassopoulos et al. propose a study centered on numerical evaluation that looks on Kleinberg's model and some variants [1]. For the former, they differ from the original model by having fixed source and destination nodes. They compute er(n) for values of n up to 3,000 and r ∈ {0, 1, 2, 3}, using 900 runs per estimate. To compare with, in the present paper, we consider values of n up to 224 ≈ 16, 000, 000 and r ∈ [0, 3], with at least 10,000 runs per estimate. To explain such a gain, we first need O P O D I S 2 0 1 6 21:4 Kleinberg's Grid Reloaded to introduce the issue of shortcuts computation. 2.3.1 Drawing shortcuts As stated in [1], the main computational bottleneck for simulating Kleinberg's model comes from the shortcuts. There are n2 shortcuts in the grid (assuming q = 1); When one wants to a shortcut, any of the n2 − 1 other nodes can be chosen with non-null probability. This can be made by inverse transform sampling, with a cost Ω(n2); The shortcut distribution depends on the node u considered, even if one uses relative coordinates. For example, a corner node will have i + 1 neighbors at distance i for 1 ≤ i < n, against 4i neighbors for inner nodes (as long as the ball of radius i stays inside the grid). This means that, up to symmetry, each node has a unique shortcut distribution1. This prevents from mutualising shortcuts drawings between nodes. In the end, building shortcuts as described above for each of the R runs has a time complexity Ω(Rn4), which is unacceptable if one wants to evaluate er(n) on large grids. The first issue is easy to address: as observed in [12, 14, 1], we can use the Principle of deferred decision [18] and compute the shortcuts on-the-fly as the path is built, because they are drawn independently and a node is never used twice in a given path. This reduces the complexity to Ω(Rn2er(n)). 2.3.2 Torus approximation To lower the complexity even more, one can approximate the grid by the torus. This is the approach adopted in [11, 14]. The toroidal topology brings two major features compared to a flat grid: The distribution of the relative position of the shortcut does not depend on the originat- ing node. This enables to draw shortcuts in advance (in bulk); There is a strong radial symmetry, allowing to draw a "radius" and an "angle" separately. To illustrate the gain of using a torus instead of a grid, consider the drawing of k shortcuts from k distinct nodes. In a grid, if one uses inverse transform sampling for each corresponding distribution, the cost is Ω(n2k). In the torus, one can compute the probabilities to be at distance i for i between 1 and n (the maximal distance in the torus), draw k radii, then choose for each drawn radius i a node uniformly chosen among those at distance i. Assuming drawing a float uniformly distributed over [0, 1) can be made in O(1), the main bottleneck is the drawing of radii. Using bulk inverse transform sampling, it can be performed in O(n + k log(k)), by sorting k random floats, matching then against the cumulative distribution of radii and reverse sorting the result. 3 Fast Estimation of Expected Delivery Time We now describe our approach for computing er(n) in the flat grid with the same complexity than for the torus approximation. 1 To take advantage of symmetry, one can consider the isometric group of a square grid, which can be built with the quarter-turn and flip operations. However, its size is 8, so even using symmetry, there 2 are at least n 8 distinct (non-isomorphic) distributions. Fabien Mathieu 21:5 #3 #1 u #2 Figure 1 Main idea of the dynamic rejection sampling approach (n = 4). 3.1 Dynamic rejection sampling for drawing shortcuts In order to keep low computational complexity without making any approximation of the model, we propose to draw a shortcut of a node u as follows: 1. We embed the actual grid G (we use here G to refer to the lattice nodes of G(n, r, p, q)) in a virtual lattice Bu made of points inside a ball of radius 2(n − 1). Note that the radius chosen ensures that G is included in Bu no matter the location of u. 2. We draw a node inside Bu such that the probability to pick up a node v is proportional to (d(u, v))−r. This can be done in two steps (radius and angle): For the radius, we notice that the probability to draw a node at distance i is propor- tional to i1−r, so we pick an integer between 1 and 2(n − 1) such that the probability to draw i is to i1−r/ P2(n−2) For the angle, pick an integer uniformly chosen between 1 and 4i k1−r. k=1 3. This determines a unique point v among the 4i points at distance i from u in the virtual lattice, chosen with a probability proportional to (d(u, v))−r. If v belongs to the actual grid, it becomes the shortcut, otherwise we try again (back to step #2). This technique, illustrated in Figure 1, is inspired by the rejection sampling method [21]. By construction, it gives the correct distribution: the node v that it eventually returns is in the actual grid and has been drawn with a probability proportional to (d(u, v))−r. We call this dynamic rejection sampling because the sampled distribution changes with the current node u. Considering u as a relative center, the actual grid G moves with u and acts like an acceptance mask. On the other hand, the distribution over the virtual lattice Bu remains constant. This enables to draw batches of relative shortcuts that can be used over multiple runs, exactly like for the torus approximation. The only possible drawback of this approach is the number of attempts required to draw a correct shortcut. Luckily, this number is contained. O P O D I S 2 0 1 6 ✗ ✗ ✓ 21:6 Kleinberg's Grid Reloaded u u u G Gc Hu Figure 2 Graphical representation of G, Gc and Hu (n = 4). The sub-lattices used to built a bijection between G and Gc (cf proof of Lemma 1) are represented with distinct shapes and gray levels. ◮ Lemma 1. The probability that a node drawn in Bu belongs to G is at least 1 8 . Proof. We will prove that Pv∈G\{u} Pv∈Bu\{u} (d(u, v))−r (d(u, v))−r > 1 8 . We use the fact that the probability decreases with the distance combined with some geometric arguments. Let Gc be a n × n lattice that has u as one of its corner. Let Hu the (2n − 1) × (2n − 1) lattice centered in u. In terms of probability of drawing a node in G \ {u}, the worst case is when u is at some corner: there is a bijection f from G to Gc such that for all v ∈ G \ {u}, d(u, f (v)) ≥ d(u, v). Such a bijection can be obtained by splitting G into G ∩ Gc and three other sub-lattices that are flipped over G ∩ Gc (see Figure 2). This gives X (d(u, v))−r ≥ X (d(u, f (v)))−r = X (d(u, v))−r. v∈G\{u} v∈G\{u} v∈Gc\{u} Then we observe that the four possible lattices Gc obtained depending on the corner occupied by u fully cover Hu. In fact, axis nodes are covered redundantly. This gives X (d(u, v))−r < 4 X (d(u, v))−r. v∈Hu\{u} v∈Gc\{u} Lastly, if one folds Bu \ Hu back into Hu like the corners of a sheet of paper, we get a strict injection g from Bu \ Hu to Hu \ {u} (the diagonal nodes of Hu are not covered). Moreover, for all v ∈ Bu \ Hu, d(u, v) ≥ d(u, h(v)). This gives X (d(u, v))−r ≤ X (d(u, h(v)))−r < X (d(u, v))−r. v∈Bu\Hu v∈Bu\Hu v∈Hu\{u} This concludes the proof, as we get Pv∈G\{u} Pv∈Bu\{u} (d(u, v))−r (d(u, v))−r ≥ (d(u, v))−r Pv∈Gc\{u} (d(u, v))−r + Pv∈Bu\Hu (d(u, v))−r > 1 8 . Pv∈Hu\{u} ◭ Fabien Mathieu 21:7 r = 2.5 r = 1 r = 2 ) s d n o c e s ( e m i t g n i n n u R 101 100 10−1 103 104 105 106 107 n Figure 3 Computing er(n) using R = 10, 000 runs Remarks n2−1 4(n−1)(2n−1) −→ n→+∞ When r = 0 (uniform shortcut distribution), the bound 1 8 is asymptotically tight: the success probability is exactly the ratio between the number of nodes in G \ {u} and 1 8 . On the other hand, as r grows, the probability Bu \ {u}, which is mass gets more and more concentrated around u (hence in G), so we should expect better performance (cf Section 3.2). The dynamic rejection sampling approach can be used in other variants of Kleinberg's model, like for other dimensions or when the number of shortcuts per node is a random variable (like in [9]). The only requirement is the existence of some root distribution (like the distribution over Bu here) that can be carved to match any of the possible distributions with a simple acceptance test. Only the nodes from Hu may belong to G, so nodes from Bu \ G are always sampled for nothing. For example, in Figure 1, this represents 36 nodes over 84. By drawing shortcuts in Hu \ {u} instead of Bu \ {u}, we could increase the success rate lower bound to 1/4. However, this would make the algorithm implementation more complex (the number of nodes at distance i is not always 4i), which is in practice not worth the factor 2 improvement of the lower bound. This may not be true for a higher dimension β. Adapting the proof from Lemma 1, we observe that using a ball of radius β(n − 1) will lead to a bound β!(2β)−β, while a grid of side 2n − 1 will lead to 2−β. The two bounds are asymptotically tight for r = 0. In that case the grid approach is ββ β! more efficient than the ball approach (this grows exponentially with β). 3.2 Performance Evaluation We implemented our algorithm in Julia 0.4.5. A working code example is provided in Appendix A. Simulations were executed on a low end device (a Dell tablet with 4 Gb RAM and Intel M-5Y10 processor), which was largely sufficient for getting fast and accurate results on very large grids, thanks to the dynamic rejection sampling. Unless said otherwise, er(n) is obtained by averaging R = 10, 000 runs. For n, we mainly O P O D I S 2 0 1 6 21:8 Kleinberg's Grid Reloaded 1 0.8 0.6 0.4 0.2 e t a r s s e c c u S 0 0 0.5 1 1.5 r 2 2.5 3 Figure 4 Frequency of shortcuts drawn in Bu that belongs to G observed during a computation of er(n) (n = 214) consider powers of two ranging from 27 (about 16,000 nodes) to 224 (about 280 trillions nodes). We focus on r ∈ [0, 3]. Regarding the choice of the bulk size k (we assume here the use of bulk inverse transform sampling), the average number of shortcuts to draw over the R runs is Rer(n). This leads to an average total cost for drawing shortcuts in O(⌈ Rer (n) ⌉(n+k log(n))). k can be optimized if er(n) is known, but this requires bootstrapping the estimation of er(n). Yet, we can remark that for n fixed and R large enough, we should choose k of the same order of magnitude than n, which ensures an average cost per shortcut in O(log(n)). This is the choice we made in our code, which gives a complexity in O(max(Rer(n), n) log(n)). This is not efficient for n ≫ Rer(n) (the bulk is then over-sized, so lot of unused shortcuts are drawn), but this seldom happens with our settings. k Figure 3 presents the time needed to compute er(n) as a function of n for r ∈ {1, 2, 5 2 }. We observe running times ranging from seconds to a few minutes. To compare with, in [1], which is to the best of our knowledge the only work disclosing computation times, one single run takes about 4 seconds for n = 400. With a similar time budget, our implementation averages 10,000 runs for n = 217 ≈ 130, 000 (r = 1 or r = 2.5), or up to n = 224 ≈ 16, 000, 000 for the optimal exponent r = 2. In other words, we are several orders of magnitude faster. We also looked at the cost of the dynamic rejection sampling approach in terms of shortcuts drawn outside of G. Figure 4 shows the success frequency of the sampling as a function of r for n = 214 (the actual value of n has no significant impact as long as it is large enough). We verify Lemma 1: the success rate is always at least 1/8 = 0.125, which is a tight bound for r = 0. For r = 1, the rate is about 0.29, and it climbs to 0.86 for r = 2. Failed shortcuts become negligible (rate greater than 0.99) for r ≥ 2.5. Overall, Figure 4 shows that the cost of drawing some shortcuts outside G is a small compared to the benefits offered by drawing shortcuts from a unique distribution. Fabien Mathieu 21:9 103 ) 0 0 0 , 0 2 ( r e 102 0 0.5 1 1.5 r 2 2.5 3 Figure 5 Expected delivery time for n = 20, 000 Remark In terms of success rate, Figure 4 shows that r = 2.5 is much more efficient than r = 1, but running times tend to be slightly longer for r = 2.5 (cf Figure 3). The reason is that e1(n) is lower than e2.5(n), which overcompensates the success rate difference. 4 Applications Given the tremendous amount of strong theoretical results on small-world routing, one can question the interest of proposing a simulator (even a fast one!). In this Section, we prove the interest of numerical evaluation through three (almost) independent small studies. 4.1 Efficient enough exponents In [11], Kleinberg gives an estimation of er(20, 000) using a torus approximation (cf Section 2.3.2). A few years later, he discussed in more details the results, observing that [5]: er(n) stays quite similar for r ∈ [1.5, 2]; the best value of r is actually slightly lower than 2. We believe that these observations are very important as they show that routing in Kleinberg's grid is more robust than predicted by theory: it is efficient as long as r is close enough to 2. Using our simulator, we can perform the same experiment. As shown by Figure 5, the results are quite similar to the ones observed in [11]. Yet, there is a small but essential difference between the two experiments: Kleinberg approximated his grid by a torus while we stay true to the original model. Why do we use the word essential? Both shapes have the same asymptotic behavior (proofs in [11] are straightforward to adapt), so why should we care? It seems to us that practical robustness is an essential feature if one wants to accept Kleinberg's grid as a reasonable model for routing in social networks. To the best of our knowledge, no theoretical work gives quantitative O P O D I S 2 0 1 6 21:10 Kleinberg's Grid Reloaded 2.5 2 1.5 r 1 0.5 0 rmax(2e2(n)) ropt(n) rmin(e2(n)) rmin(2e2(n)) 103 104 105 106 107 n Figure 6 Reasonable values of r results on this robustness, so we need to rely on numerical evaluation. But when Kleinberg uses a torus approximation, we can not rule out that the observed robustness is a by-side effect of the toroidal topology. The observation of a similar phenomenon on a flat grid discards this hypothesis. In fact, it suggests (without proving) that the robustness with respect to the exponent for grids of finite size may be a general phenomenon. We propose now to investigate this robustness in deeper details. We have evaluated the following values, which outline, for a given n, the values of r that can be considered reasonable for performing greedy routing: The value of r that minimizes er(n), denoted ropt; The smallest value of r such that er(n) ≤ e2(n), denoted rmin(e2(n)); The smallest and largest values of r such that er(n) ≤ 2e2(n), denoted rmin(2e2(n)) and rmax(2e2(n)) respectively. The results are displayed in Figure 6. All values but ropt are computed by bisection. For ropt, we use a Golden section search [19]. Finding a minimum requires more accuracy, so the search of ropt is set to use R = 1, 000, 000 runs per estimation. Luckily, as the computation operates by design through near-optimal values, we can increase the accuracy with reasonable running times. Besides confirming that r = 2 is asymptotically the optimal value, Figure 6 shows that the range of reasonable values for finite grids is quite comfortable. For example, considering the range of values where er(n) is less than twice e2(n), we observe that: For n ≤ 211 (less than four million nodes), any r between 0 and 2.35 works; For n ≤ 214 (less than 270 million nodes), the range is between 0.85 and 2.26. Even for n = 224 (about 280 trillions nodes), all values of r between 1.58 and 2.16 can still be considered efficient enough. 4.2 Asymptotic Behavior Our simulator can be used to verify the theoretical bounds proposed in [12]. For example, Figure 7 shows er(n) for r equal to 1, 2, and 5 2 . Fabien Mathieu 21:11 r = 1 r = 2 r = 5 2 103 102 102.5 102 101.5 e1(n) 2√n 104 103 102 e2(n) log2(n)−10 2 e2.5(n) 7√n 103 105 n 107 103 105 n 107 103 105 n 107 Figure 7 Expected delivery time for different values of r α1 α2 2−r 3−r r − 2 Lower bound ([12]) 1 0.8 0.6 0.4 0.2 α 0 0 0.5 1 1.5 2.5 3 3.5 4 2 r Figure 8 Estimates of the exponent α As predicted, er(n) seems to behave like log2(n) for r = 2 and like nα for the two other cases. Yet, the exponents found differ from the ones proposed in [12]. For both r = 1 and r = 2.5, we observe α = 1 3 . Intrigued by the difference, we want to compute α as a function of r. 2 , while the lower bound is 1 However, we see in Figure 7 that a log2(n) curve appears to have a positive slope in a logarithmic scale, even for large values of n. This may distort our estimations. To control the possible impact of this distortion, we estimate the exponent at two distinct scales: n ∈ [215, 220], using the estimation α1 := log2(er (220))−log2(er (215)) n ∈ [220, 224], using the estimation α2 := log2(er (224))−log2(er (220)) 5 4 ; . The Results are displayed in Figure 8. The range of r was extended to [0, 4] due to the observation of a new transition for r = 3 As feared, our estimations do not indicate 0 for r = 2, but the fact that α2 is closer to 0 than α1 confirms that this is likely caused by the log2(n) factor. Moreover, we observe that α1 and α2 only differ for r ≈ 2 and r ≈ 3, suggesting that both estimates should be accurate except for these critical values. Based on Figures 7 and 8, it seems that the bounds proposed by Kleinberg in [12] are only tight for r = 0 and r = 2. Formally proving more accurate bounds is beyond the scope O P O D I S 2 0 1 6 21:12 Kleinberg's Grid Reloaded and spirit of this paper, but we can conjecture new bounds hinted by our simulations: 3−r ); For 0 ≤ r < 2, we have er(n) = Θ(n For 2 < r < 3, we have er(n) = Θ(nr−2); For r > 3, we have er(n) = Θ(n). 2−r This conjectured bounds are consistent with the one proposed in [2], where it is proved that for the 1-dimensional ring, we have: 1−r 2−r ); For 0 ≤ r < 1, er(n) = Ω(n For r = 1, er(n) = Θ(log2(n)) For 1 < r < 2, er(n) = O(nr−1); For r = 2, er(n) = O(n log(log(n)) For r > 2, er(n) = O(n). log(n) ) It is likely that the proofs in [2] can be adapted to the 2-dimensional grid, but some additional work may be necessary to demonstrate the bounds' tightness. Moreover, our estimates may have missed some slower-than-polynomial variations. For example, the log- arithms in the bounds for r = 2 in [2] may have a counterpart in the grid for r = 3. This would explain why the estimates are not sharp around that critical value (like for the case r = 2 and the term in log2(n)). Remark For r ≥ 3.5, we have observed that er(n) ≈ 2 3 n, which is the expected delivery path in absence of shortcuts: for these high values of r, almost all shortcuts link to an immediate neighbor of the current node, which make them useless, and the rare exceptions are so short that they make no noticeable difference. 4.3 Six degrees of separation What makes Milgram's experiments [17, 20] so famous is the surprising observation that only a few hops are required to transmit messages in social networks, a phenomenon called six degrees of separation in popular culture. Yet, the values of er(n) observed until now are quite far for the magic number six. For example, in Figure 5, the lowest value is 140. In addition to the asymptotic lack of robustness with respect to the exponent (discussed in Section 4.1), this may partially motivate the amount of work accomplished to increase the realism of the model and the performance of the routing algorithm. In our opinion, a good model should be as simple as possible while being able to accurately predict the phenomenon that needs to be explained. We propose here to answer a simple question: is the genuine model of greedy routing in G(n, r, p, q) a good model? Sure, it is quite simple. To discuss its accuracy, we need to tune the four parameters n, r, p and q to fit the conditions of Milgram's experiments as honestly as we can. Size The experiments of Milgram were conducted in the United States, with a population of about 200,000,000 at the late sixties. All inhabitants were not susceptible to participate to the experiments: under-aged, undergraduate or disadvantaged people may be con- sidered as de facto excluded from the experiments. Taking that into consideration, the correct n is probably somewhere in the range [5000, 14000]. We propose to set n = 8, 500, which corresponds to about 72,000,000 potential subjects. Fabien Mathieu 21:13 20 15 10 5 ) 0 0 5 , 8 = n ( i e m T y r e v i l e D d e t c e p x E p = 1, q = 600 p = 10, q = 380 p = 15, q = 120 0 0 0.5 1 1.5 r 2 2.5 3 Figure 9 Performance of greedy routing for parameters inspired by Milgram's experiments. Exponent In [5], Kleinberg investigates how to relate the r-harmonic distribution with real- life observations. He surveys multiple social experiments and discusses the correspon- dence with the exponent of his model, which gives estimates of r between 1.75 and 2.2. Neighborhood The default value p = q = 1 means that there are no more than five "ac- quaintances" per node. This is quite small compared to what is observed in real-life social networks. For example, the famous Dunbar's number, which estimates the num- ber of active relationships, is 150 [4]. More recent studies seem to indicate that the average number of acquaintances is larger, ranging from 250 to 1500 (see [3, 16, 22] and references within). We propose to set p and q so that the neighborhood size 2p(p + 1) + q is about 600, the value reported in [16]. Regarding the partition between local links (p) and shortcuts (q), we consider three typical scenarios: p = 1, q = 600 (shortcut scenario: the neighborhood is almost exclusively made of shortcuts, and local links are only here to ensure the termination of greedy routing). p = 10, q = 380 (balanced scenario). p = 15, q = 120 (local scenario, with a value of q not too far from Dunbar's number). Having set all parameters, we can evaluate the performance of greedy routing. The results are displayed in Figure 9. We observe that the expected delivery time roughly stands between five and six for a wide range of exponents. r ∈ [1.4, 2.3] for the shortcut scenario. r ∈ [1.3, 2.3] for the balanced scenario. r ∈ [1.3, 2] for the local scenario. Except for the local scenario, which leads to slightly higher routing times for r > 2, the six degrees of separation are achieved for all values of r that are consistent with the observa- tions surveyed in [5]. This allows to answer our question: the augmented grid proposed by Kleinberg is indeed a good model to explain the six degrees of separation phenomenon. O P O D I S 2 0 1 6 21:14 Kleinberg's Grid Reloaded 5 Conclusion We proposed an algorithm to evaluate the performance of greedy routing in Kleinberg's grid. Fueled by a dynamic rejection sampling approach, the simulator based on our solution per- forms several orders of magnitude faster than previous attempts. It allowed us to investigate greedy routing under multiple perspective. We noted that the performance of greedy routing is less sensitive to the choice of the exponent r than predicted by the asymptotic behavior, even for very large grids. We observed that the bounds proposed in [12] are not tight except for r = 0 and r = 2. We conjectured that the tight bounds are the 2-dimensional equivalent of bounds proposed in [2] for the 1-dimensional ring. We claimed that the model proposed by Kleinberg in [12, 11] is a good model for the six degrees of separation, in the sense that it is very simple and accurate. Our simulator is intended as a tool to suggest and evaluate theoretical results, and possibly to build another bridge between theoretical and empirical study of social systems. We hope that it will be useful for researchers from both communities. In a future work, we plan to make our simulator more generic so it can handle other types of graph and augmenting schemes. References 1 2 3 Stavros Athanassopoulos, Christos Kaklamanis, Ilias Laftsidis, and Evi Papaioannou. An experimental study of greedy routing algorithms. In High Performance Computing and Simulation (HPCS), 2010 International Conference on, pages 150 -- 156, June 2010. Lali Barrière, Pierre Fraigniaud, Evangelos Kranakis, and Danny Krizanc. Efficient routing in networks with long range contacts. In Proceedings of the 15th International Conference on Distributed Computing, DISC '01, pages 270 -- 284, London, UK, 2001. Ithiel de Sola Pool and Manfred Kochen. Contacts and influence. Social Networks, 1:5 -- 51, 1978. 4 R. I. M. Dunbar. Neocortex size as a constraint on group size in primates. Journal of Human Evolution, 22(6):469 -- 493, June 1992. 8 5 David Easley and Jon Kleinberg. The small-world phenomenon. In Networks, Crowds, and Markets: Reasoning About a Highly Connected World, chapter 20, pages 611 -- 644. Cam- bridge University Press, 2010. Pierre Fraigniaud, Cyril Gavoille, Adrian Kosowski, Emmanuelle Lebhar, and Zvi Lotker. Universal Augmentation Schemes for Network Navigability: Overcoming the p(n)-Barrier. Theoretical Computer Science, 410(21-23):1970 -- 1981, 2009. Pierre Fraigniaud, Cyril Gavoille, and Christophe Paul. Eclecticism shrinks even small worlds. Distributed Computing, 18(4):279 -- 291, 2006. Pierre Fraigniaud and George Giakkoupis. On the searchability of small-world networks with arbitrary underlying structure. In Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC), pages 389 -- 398, June 6 -- 8 2010. Pierre Fraigniaud and George Giakkoupis. Greedy routing in small-world networks with power-law degrees. Distributed Computing, 27(4):231 -- 253, 2014. Frigyes Karinthy. Láncszemek, 1929. Jon Kleinberg. Navigation in a small world. Nature, August 2000. Jon Kleinberg. The small-world phenomenon: An algorithmic perspective. In in Proceedings of the 32nd ACM Symposium on Theory of Computing, pages 163 -- 170, 2000. 9 6 7 10 11 12 Fabien Mathieu 21:15 13 David Liben-Nowell, Jasmine Novak, Ravi Kumar, Prabhakar Raghavan, and Andrew Tomkins. Geographic routing in social networks. Proceedings of the National Academy of Sciences of the United States of America, 102(33):11623 -- 11628, 2005. 14 Gurmeet Singh Manku, Moni Naor, and Udi Wieder. Know thy neighbor's neighbor: The power of lookahead in randomized P2P networks. In Proceedings of the Thirty-sixth Annual ACM Symposium on Theory of Computing (STOC), pages 54 -- 63. ACM, 2004. 15 Chip Martel and Van Nguyen. Analyzing kleinberg's (and other) small-world models. In Proceedings of the Twenty-third Annual ACM Symposium on Principles of Distributed Com- puting, PODC '04, pages 179 -- 188, New York, NY, USA, 2004. ACM. 16 Tyler H. McCormick, Matthew J. Salganik, and Tian Zheng. How many people do you know?: Efficiently estimating personal network size. Journal of the American Statistical Association, 105(489):59 -- 70, 2010. Stanley Milgram. The small world problem. Psychology Today, 67(1):61 -- 67, 1967. 17 18 Michael Mitzenmacher and Eli Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, New York, NY, USA, 2005. 19 William H. Press, Saul A. Teukolsky, William T. Vetterling, and Brian P. Flannery. Min- imization or maximization of functions. In Numerical Recipes 3rd Edition: The Art of Scientific Computing, chapter 10. Cambridge University Press, New York, NY, USA, 3 edition, 2007. Jeffrey Travers and Stanley Milgram. An experimental study of the small world problem. Sociometry, 32:425 -- 443, 1969. John von Neumann. Various techniques used in connection with random digits. Nat. Bureau Standards, 12:36 -- 38, 1951. 21 20 22 Barry Wellman. Is Dunbar's number up? British Journal of Psychology, 2011. O P O D I S 2 0 1 6 21:16 Kleinberg's Grid Reloaded A Code for Expected Delivery Time (tested on Julia Version 0.4.5) using S t a t s B a s e # For u s i n g J u l i a b u i l t −i n sample f u n c t i o n function s h o r t c u t s _ b u l k ( n , probas , b u l k _ s i z e ) r a d i i = sample ( 1 : ( 2 ∗ n −2) , probas , b u l k _ s i z e ) s h o r t c u t s = Tuple { Int , f o r i = 1 : b u l k _ s i z e r a d i u s = r a d i i [ i ] a n g l e = f l o o r (4∗ r a d i u s ∗ rand ()) −2∗ r a d i u s push ! ( s h o r t c u t s , ( ( r a d i u s −abs ( a n g l e ) ) , I n t } [ ] ( s i g n ( a n g l e ) ∗ ( r a d i u s −abs ( r a d i u s −abs ( a n g l e ) ) ) ) ) ) end return s h o r t c u t s end r , p , q , R) the Expected D e l i v e r y Time f o r G( n , # E s t i m a t e s function edt ( n , b u l k _ s i z e = n probas = w e i g h t s ( 1 . / ( 1 : ( 2 ∗ n − 2 ) ) . ^ ( r −1)) s h o r t c u t s = s h o r t c u t s _ b u l k ( n , probas , b u l k _ s i z e ) s t e p s = 0 f o r i = 1 :R r , p , q ) o v e r R runs s t a r t / c u r r e n t node ; a : # s : s_x , s_y , a_x , a_y = t u p l e ( rand ( 0 : ( n −1) , 4 ) . . . ) d = abs ( s_x − a_x ) + abs ( s_y − a_y ) while d>0 t a r g e t node ; d : d i s t a n c e t o t a r g e t sh_y = −1, −1 # sh w i l l be b e s t sh_x , d_s = 2∗n # d_s w i l l be d i s t a n c e from sh t o a f o r j = 1 : q # Draw q s h o r t c u t s s h o r t c u t node ch_x , ch_y = −1, −1 # ch w i l l be c u r r e n t c_s = 2∗n # c_s w i l l be d i s t a n c e from ch t o a # Dynamic r e j e c t i o n s ampling while ( ch_x < 0 ch_x >= n ch_y < 0 ch_y >= n ) s h o r t c u t r_x , r_y = pop ! ( s h o r t c u t s ) ch_x , ch_y = s_x + r_x , i f is empty ( s h o r t c u t s ) s_y + r_y s h o r t c u t s = s h o r t c u t s _ b u l k ( n , probas , b u l k _ s i z e ) end end c_s = abs ( a_x − ch_x ) + abs ( a_y − ch_y ) i f c_s < d_s # maintain b e s t s h o r t c u t found d_s = c_s sh_x , sh_y = ch_x , ch_y end end i f d_s < d−p # Follow s h o r t c u t i f e f f i c i e n t s_y = sh_x , sh_y s_x , d = d_s e l s e # Follow l o c a l l i n k s d = d − p delta_x = min ( p , abs ( a_x − s_x ) ) delta_y = p − delta_x s_x += delta_x ∗ s i g n ( a_x − s_x ) s_y += delta_y ∗ s i g n ( a_y − s_y ) end s t e p s += 1 end end s t e p s /= R return s t e p s end
1207.0017
1
1207
2012-06-29T20:42:21
Identifying Topical Twitter Communities via User List Aggregation
[ "cs.SI", "physics.soc-ph" ]
A particular challenge in the area of social media analysis is how to find communities within a larger network of social interactions. Here a community may be a group of microblogging users who post content on a coherent topic, or who are associated with a specific event or news story. Twitter provides the ability to curate users into lists, corresponding to meaningful topics or themes. Here we describe an approach for crowdsourcing the list building efforts of many different Twitter users, in order to identify topical communities. This approach involves the use of ensemble community finding to produce stable groupings of user lists, and by extension, individual Twitter users. We examine this approach in the context of a case study surrounding the detection of communities on Twitter relating to the London 2012 Olympics.
cs.SI
cs
Identifying Topical Twitter Communities via User List Aggregation Derek Greene, Derek O'Callaghan, P´adraig Cunningham School of Computer Science & Informatics, University College Dublin {derek.greene,derek.ocallaghan,padraig.cunningham}@ucd.ie Abstract. A particular challenge in the area of social media analysis is how to find communities within a larger network of social interactions. Here a community may be a group of microblogging users who post con- tent on a coherent topic, or who are associated with a specific event or news story. Twitter provides the ability to curate users into lists, corre- sponding to meaningful topics or themes. Here we describe an approach for crowdsourcing the list building efforts of many different Twitter users, in order to identify topical communities. This approach involves the use of ensemble community finding to produce stable groupings of user lists, and by extension, individual Twitter users. We examine this approach in the context of a case study surrounding the detection of communities on Twitter relating to the London 2012 Olympics. 1 Introduction A wide variety of community finding techniques have been proposed in the liter- ature, with recent research focusing on the challenge of identifying overlapping communities [1]. In the case of microblogging data, researchers have been in- terested in the identification of communities of users on Twitter, who produce tweets on a common topic, who belong to the same demographic, or who share a common ideological viewpoint [2]. These approaches have generally relied on explicit views of the Twitter network, such as follower relations or retweets. Twitter users can organise the accounts that they follow into Twitter user lists, as shown in Fig. 1. These lists are used in a variety of ways. In some cases they may correspond to personal lists of a given user's friends and families, but frequently lists are employed to group together Twitter accounts based on a common topic or theme. In this way, every Twitter user can effectively become a community curator. Notably, journalists from news organisations such as The Telegraph and Storyful curate lists relevant to a given news story or event, as a means of monitoring breaking news. Recently, Kim et al. and Garc´ıa-Silva et al. [3, 4] both discussed the potential of user lists to provide latent annotations for Twitter user profiles, while Wu et al. [5] suggested user lists as a means of harnessing the "wisdom of the crowds" on Twitter. Our primary goal here is to demonstrate that topical communities can be identified by harnessing the "crowd-sourced" list building efforts of a large base of Twitter users. In Section 3, we show that this can be done by constructing Fig. 1. User list, curated by The Telegraph, covering athletes, journalists, and organi- sations involved in the London 2012 Summer Olympics. a graph based on the similarity of user list memberships, and then using an ensemble community finding approach to find robust, overlapping groups of lists within this graph, from which user communities can be derived. We use stabil- ity information derived from the ensemble as a proxy for the reliability of the communities. In Section 4, we evaluate the proposed techniques on a case study relating to coverage of the London 2012 Olympics on Twitter. 2 Related Work 2.1 Microblogging Analysis Many researchers have become interested in exploring the network structure within the Twitter network, given the potential for Twitter to facilitate the rapid spread of information. Java et al. [2] provided an initial analysis of the early growth of the network, and also performed a small-scale evaluation that indicated the presence of distinct Twitter user communities, where the mem- bers share common interests as reflected by the terms appearing in their tweets. Kwak et al. [6] performed an evaluation based on a sample of 41.7 million users and 106 million tweets from a network mining perspective. The authors studied aspects such as: identifying influential users, information diffusion, and trending topics. Shamma et al. [7] performed an analysis on microblogging activity dur- ing the 2008 US presidential debates. The authors demonstrated that frequent terms reflected the topics being discussed, but the use of informal vocabulary complicated topic identification. Typically researchers have focused either on Twitter users from the perspec- tive of the content that they produce, or in terms of explicit network representa- tions based on follower relations or retweeting activity [6]. However, preliminary work by Kim et al. [3] suggested that latent groups and relations in Twitter data could be extracted by examining user list data. Wu et al. [5] suggested that user list memberships could be used to organise users into a pre-defined set of categories: celebrities, media, organisations, and blogs. Having classified the users, important or "elite" users within each category were identified based on the number of lists to which each user was assigned. Garc´ıa-Silva et al. [4] described approaches for extracting semantic relations from user lists, by con- structing relations between co-occurring keywords taken from list names. In the context of list curation, Greene et al. [8] showed that co-listed links could be used as one potential way to recommend users who may belong to the "community" surrounding a breaking news story. 2.2 Community Finding Many different algorithms have been proposed to identify communities in graphs, based on different combinations of objective functions and search strategies [1]. Recently, considerable focus has been given to identifying communities in highly- overlapping, weighted networks. A widely-employed algorithm in this area is OSLOM (Order Statistics Local Optimization Method), introduced by Lan- cichinetti et al. [9]. Kwak et al. [10] observed that many community detection algorithms can produce inconsistent results, due to stochastic elements in their optimisation process. Lancichinetti & Fortunato [11] demonstrated that this also applied to OSLOM, and proposed an ensemble approach to generate stable re- sults out of a set of multiple partitions. In the more general cluster analysis literature, ensemble clustering methods have been previously developed to address such issues. These methods typically involve generating a diverse set of "base clusterings", which are then aggregated to produce a consensus solution [12 -- 14]. The most popular aggregation strategy has been to use information derived from different clusterings to determine the level of association between each pair of items in a dataset [12, 13]. This strategy was motivated by the observation that pairwise co-assignments, averaged over a sufficiently large number of clusterings, may be used to induce a new, more robust measure of similarity on the data. 3 Methods In this section, we introduce an approach that aggregates user list information to generate communities. Firstly, we describe the construction of a graph repre- sentation of user lists, based on their membership overlaps. Then in Section 3.2 we describe an ensemble approach to identify overlapping groups of user lists. The stability of these groups is assessed as described in Section 3.3, and the selection of community labels is discussed in Section 3.4. Finally, the derivation of corresponding communities for individual users is discussed in Section 3.5. 3.1 User List Graph Construction We construct a graph G of l nodes, where each node represents a distinct Twitter user list Lx. A weighted edge exists between a pair of lists if they share users in common. Rather than using the raw intersection size between a pair, we make allowance for the significance of the intersection size relative to the size of the two lists, and the total number of users assigned to lists n. For a pair (Lx, Ly), we compute a p-value to indicate the significance of the probability of observing at least Lx ∩ Ly users from Lx within another list of size Ly: (cid:0)Lx (cid:1)(cid:0)n−Lx (cid:1) (cid:0) nLy (cid:1) Lx∩Ly−1(cid:88) P V (Lx, Ly) = 1 − j=0 j Ly−j (1) To improve interpretability, we compute the associated log p-value: LP V (Lx, Ly) = −log (P V (Lx, Ly)) (2) where a larger value is more significant. We consider Eqn. 2 as a measure of the similarity between a pair of user lists, corrected for chance. To further increase the sparseness of the graph, we remove edges with weights LP V < ρ for a weight threshold ρ. Increasing the value of ρ will result in an increasingly sparse graph. 3.2 Combining Overlapping Communities We will naturally expect that different topical communities will potentially over- lap with one another. To identify communities of lists, we apply the OSLOM algorithm which has been shown to out-perform other community finding ap- proaches [9]. However, as noted in [11], OSLOM can produce unstable results. Following the CSPA ensemble aggregation approach [13], and the method for combining network partitions [11], we now describe an approach for generating and combining an ensemble of overlapping community sets. Given an initial user list graph G, we construct a symmetric l × l consensus matrix M. For the purpose of generating a collection of r base community sets, we apply the OSLOM algorithm [9] using a different initial random seed for each run. Motivated by the notion an ensemble of weak clusterings [14], we use the "fast" configuration of OSLOM, which uses a minimal number of optimisation iterations. After generating a base community set, for each unique pair of nodes (Lx, Ly) in network, we compute the Jaccard similarity between the sets of community labels assigned to those nodes by OSLOM. If the pair are not both co-assigned to any community, the score is 0. If the pair are present in all communities together, the score is 1. However, unlike the binary approach of [11], if the pair are present in some but not all communities together, the Jaccard score will reflect this. See Fig. 2 for examples. In the case of non-overlapping partitions, the score will reduce to the binary scoring used in [11]. After computing all Jaccard scores, we increment the corresponding matrix entries in M. Note that, by definition, singleton communities are ignored during this aggregation process. Fig. 2. Four different cases of computing the Jaccard similarity between the sets of community labels assigned to two nodes Lx and Ly. The Jaccard scores respectively are: (a) 0.0, (b) 1.0, (c) 1.0, (d) 0.5. Once all r base community sets have been generated, M is normalised by 1/r to give a matrix with entries ∈ [0, 1]. To find the consensus communities, we follow a similar approach to that used by [11]. We construct a new undirected weighted graph such that, for every unique pair of nodes (Lx, Ly), we create an edge with weight Mxy if Mxy ≥ τ . The threshold parameter τ ∈ [0, 1] controls the sparsity of the graph. We then apply OSLOM to this graph for a large number of iterations (≈ 50) to produce a final grouping of the user lists in G. 3.3 Evaluating Community Stability When applying community detection, often we may wish to examine the most reliable or robust communities with the strongest signals in the network. Here, we rank the consensus communities generated as described in Section 3.2, based on the cohesion of their members with respect to the consensus matrix M. A more stable consensus community will consist of user lists which were frequently co-assigned to one or more communities across all r base community sets. For a given consensus community C of size c, we compute the mean of the values Mxy for all unique pairs (Lx, Ly) assigned to C; this value has the range ∈ [0, 1]. We then compute the mean expected value for a community of size c as follows: randomly select c unique nodes from G, and compute their mean pairwise score from the corresponding entries in M. This process is repeated over a large number of randomised runs, yielding an approximation of the expected stability value. We then employ the widely-used adjustment technique introduced by [15] to correct stability for chance agreement: CorrectedStability(C) = Stability(C) − ExpectedStability(C) 1 − ExpectedStability(C) (3) A value close to 1 indicates a highly-stable community, while a value closer to 0 is indicative of a weak community that appeared intermittently over the r runs. We rank all consensus communities based on their values for Eqn. 3. (a)(b)(c)(d)LxLyLxLyLyLxLxLy 3.4 Selecting Community Labels To summarise the content of a consensus community, we aggregate the meta- information associated with all lists assigned to that community. Specifically, we construct a bag-of-words model, where each user list is represented by unigrams and bigrams tokenised from the list's name and description. Single stop-words are removed, and terms are weighted using log-based TF-IDF. For each community, we then compute the centroid vector corresponding to the mean vector of all lists assigned to that community. To generate descriptive labels for the community, we subtract the mean vector of all user list vectors from the community centroid vector, and rank terms in descending order based on the resulting weights. The top ranked terms are used as community labels. 3.5 Deriving User Memberships The consensus communities generated using the method proposed in Section 3.2 can potentially provide us with an insight into the overall topics in a Twitter corpus. However, it will often be useful to assign community memberships to individual users. We can readily produce this by using the list groupings in conjunction with the original user list membership information. For a given consensus community C of size c, we examine the memberships of all lists in the community. We consider the assignment of a user ui to each Lx ∈ C as being a vote with weight 1/c for ui belonging to the overall community. The total membership weight for ui is therefore given by the fraction of lists Lx ∈ C containing ui. Membership weights for all communities are computed in this way. We can also rank the importance of users in a given community by sorting users by weight in descending order. To produce a final set of user communities, we only include a user in a community for which the user has a membership weight ≥ µ, based on a membership threshold µ ∈ [0, 1]. 4 Evaluation 4.1 Data Collection To evaluate the proposed community finding methods, we constructed a dataset based on a list of 499 users curated by The Telegraph, which covers athletes, journalists, and organisations involved in the London 2012 Summer Olympics1. Initially, for each user we retrieved up to their 200 most recent user list assign- ments. From this initial pool of lists, we then retrieved list memberships for 10,000 randomly selected lists of size ≥ 5 and containing at least 2 core list users. This yielded a dataset containing a total of 44,484 individual list mem- bership records, where the average number of lists per user was 89. The most frequently-listed user was @andy murray, assigned to 1,931 different lists. 1 http://twitter.com/#!/Telegraph2012/london2012 4.2 Community Detection Using the approach described in Section 3.1, we constructed a user list graph based on membership information for the 499 users. To limit the density of the graph, we use a weight significance threshold of ρ = 6 (i.e. user list overlaps are considered as significant for LP ≤ 1−6). This resulted in a graph containing 4,948 nodes representing user lists, with 749,062 weighted edges between them. To generate an ensemble of base community sets, we apply OSLOM as de- scribed in Section 3.2 for 100 random runs, selecting the lowest level of the hierarchy as the solution for each run. The average number of non-singleton communities in each run was 157. Combining the base community sets yielded a consensus matrix containing ≈ 11.8m non-zero values. We examined a range of threshold values τ ∈ [0.1, 0.5], and selected a threshold τ = 0.2 to generate consensus communities in order to maximise coverage over user lists, while also reducing the density of the consensus graph. Applying OSLOM to the sparse graph of ≈ 1.5m values produced a total of 94 consensus communities, consid- erably lower than the average base community count. Finally, user communities were derived using a low membership threshold µ = 0.1 to maximise the number of core users assigned to communities. In total, 416 core users were assigned to at least one community, representing 83% of the overall total. Of these, 362 users were assigned to multiple communities. Table 1 shows the top 15 communities, arranged in descending order by their stability score, as defined in Eqn. 3. The table shows the size of each community (in terms of both number of lists and users assigned), the top text labels selected Table 1. Top 15 user list communities, arranged in descending order by stability score. Score Lists Users Top Labels 1.00 17 1.00 5 14 5 badminton, badminton players, badders bmx, bmx racing, bmx atleti 1.00 1.00 1.00 1.00 1.00 0.98 0.98 0.97 0.96 0.96 32 19 6 5 22 5 48 14 36 12 0.93 5 0.92 0.87 27 6 11 sailing, sailors, olympic 24 5 fencing, fencers, individuele scherm- ers triathlon, machines, swim run 21 scots, red sky, 2014 4 wielrennen, ciclismo, cycling 7 19 track, field, track field rowing, rowers, gb rowing 22 diving, tuffi, olympic diving Top Users @Jennywallwork, @Nath Robertson, @ChrisAdcock1 @ShanazeReade, @liamPHILLIPS65, @bloomy181 @SkandiaTeamGBR, @AinslieBen, @matchracegirls @britishfencing, @CBennettGBR, @LaurenceHalsted @AliBrownleetri, @jodieswallow, @MarkCavendish @mj88live, @RobbieRenwick, @Euan Burton @GeraintThomas86, @UCI cycling, @MarkCavendish @allysonfelix, @TysonLGay, @tiffofili @andrewthodge, @ZacPurchase, @MarkHunterGB @PeterWaterfield, @matthew mitcham, @toniacouch 44 21 5 13 7 hockey, hockey players, field hockey @AlexDanson15, @RichM6, @jfair25 canoe, canoeing, canoe slalom actors athletes, internet stars, athletes tmz judo, judo clubs, judo related runners, hardlopen, runners world @Mo Farah, @paulajradcliffe, @GBcanoeing, @PlanetCanoe, @edmckeever @usainbolt, @ShawnJohnson, @MichaelPhelps @BritishJudo, @USAJudo, @IntJudoFed @KenenisaBekele for each community, and the three highest-weighted users. We observe that the most stable communities generally correspond to communities of users involved in specific, "niche" sports (e.g. badminton, BMX racing, fencing). In these cases, the top-weighted users correspond to either British Olympic athletes competing in these sports, or accounts of the official British organisations for these sports. Interestingly, we also see some unexpected communities with high stability - a community around the Glasgow 2014 Commonwealth Games, and a commu- nity of celebrities which includes "elite" user accounts with hundreds of thou- sands of followers (e.g. @usainbolt, @MichaelPhelps). As stability decreases, we observed that communities become less homogeneous, covering highly-popular sports (e.g. football, basketball), or containing users and lists related to several sports. This suggests that the proposed stability provides a useful measure of the homogeneity of topical content for Twitter communities. Many of the top labels selected for communities are multi-lingual. For in- stance, the label for the "cycling" community in Table 1 contains terms in Dutch, Italian, and English. Unlike in certain textual analyses of tweets, the use of list membership information allows us to identify groups of users in a language-agnostic manner. 4.3 External Validation To validate the consensus user communities that were identified by aggregating list information, we use a set of fine-grained Olympics lists also produced by The Telegraph2, consisting of Twitter users associated with individual sports (e.g. "archery", "equestrianism"). This provided us with 18 external "ground truth" categories, covering 423 of the 499 users in the dataset. We computed precision, recall, and F1 scores for all communities, and sub- sequently matched categories to communities based on precision. Table 2 shows Table 2. Validation scores achieved relative to 18 "ground truth" categories. Category Name judo basketball rowing athletics cycling hockey diving equestrianism fencing sailing gymnastics canoeing beach-volleyball boxing swimming-syncrho weightlifting archery waterpolo Category Size Precision Recall 20 26 44 50 28 47 23 18 23 16 24 22 12 22 16 6 17 22 1.00 1.00 1.00 1.00 1.00 0.98 0.95 0.94 0.88 0.82 0.77 0.76 0.55 0.55 0.33 0.20 0.20 0.05 0.65 0.50 0.43 0.22 0.14 0.91 0.91 0.83 0.91 0.56 0.42 0.73 1.00 0.55 0.13 0.17 0.06 0.05 F1 0.79 0.67 0.60 0.36 0.25 0.95 0.93 0.88 0.89 0.67 0.54 0.74 0.71 0.55 0.18 0.18 0.09 0.05 2 http://twitter.com/#!/Telegraph2012/lists the resulting scores for all categories, arranged in descending order by precision. Communities produced by user list aggregation allowed us to identify eight cat- egories with precision ≥ 0.9, while generally maintaining high recall. Only in the case of four categories did the proposed approach lead to precision and re- call scores of both ≤ 0.5. Subsequent examination of the data suggests that list information was relatively sparse for these categories, and that the users were generally assigned to more generic lists (e.g. "aquatics" for "waterpolo"). In the case of the "cycling" category, which received high precision but low recall, we note that many of the lists we collected related to road racing, whereas many of the users in the category are associated with Olympic velodrome racing. 5 Conclusions In this paper, we have presented initial work on the idea of identifying topical communities on Twitter by aggregating the "wisdom of the crowds", as encoded in the form of user lists. We show that this information can be mined to detect and label coherent overlapping clusters of both lists and users. While the evaluation in this paper used a fixed network of users, a similar approach could be applied to identify topical sub-communities around trending terms or hashtags, by compiling a network of users frequently mentioning these terms. Also, in some cases, not all users will have been assigned to any user lists. We suggest that a classification process, using an alternative network view (e.g. follower links) could be used to assign such users to communities. Acknowledgements. This research was supported by Science Foundation Ireland Grant 08/SRC/I1407 (Clique: Graph and Network Analysis Cluster). References 1. Fortunato, S.: Community detection in graphs. Phy. Rep. 486(3-5) (2010) 75 -- 174 2. Java, A., Song, X., Finin, T., Tseng, B.: Why we Twitter: understanding mi- croblogging usage and communities. In: Proc. 9th WebKDD and 1st SNA-KDD Workshop on Web Mining and Social Network Analysis. (2007) 56 -- 65 3. Kim, D., Jo, Y., Moon, I.C., Oh, A.: Analysis of Twitter lists as a potential source for discovering latent characteristics of users. In: Workshop on Microblogging at the ACM Conference on Human Factors in Computer Systems (CHI'10). (2010) 4. Garc´ıa-Silva, A., Kang, J., Lerman, K., Corcho, O.: Characterising emergent se- mantics in Twitter lists. The Semantic Web: Research and Applications (2012) 530 -- 544 5. Wu, S., Hofman, J., Mason, W., Watts, D.: Who says what to whom on Twitter. In: Proc. 20th International Conference on World Wide Web, ACM (2011) 705 -- 714 6. Kwak, H., Lee, C., Park, H., Moon, S.: What is Twitter, a social network or a news media? In: Proc. 19th Int. Conf. on World Wide Web. (2010) 591 -- 600 7. Shamma, D., Kennedy, L., Churchill, E.: Tweet the debates: Understanding com- In: Proc. 1st SIGMM Workshop on munity annotation of uncollected sources. Social media, ACM (2009) 3 -- 10 8. Greene, D., Reid, F., Sheridan, G., Cunningham, P.: Supporting the curation of In: 2nd Workshop on Computational Social Science and the twitter user lists. Wisdom of Crowds at NIPS 2011. (2011) 9. Lancichinetti, A., Radicchi, F., Ramasco, J., Fortunato, S., Ben-Jacob, E.: Finding statistically significant communities in networks. PLoS ONE 6(4) (2011) e18961 10. Kwak, H., Eom, Y.H., Choi, Y., Jeong, H., Moon, S.: Consistent Community Identification in Complex Networks. ArXiv e-prints (October 2009) 11. Lancichinetti, A., Fortunato, S.: Consensus clustering in complex networks. Sci. Rep. 2 (03 2012) 12. Fred, A.: Finding consistent clusters in data partitions. In: Proc. 2nd Interna- tional Workshop on Multiple Classifier Systems (MCS'01). Volume 2096., Springer (January 2001) 309 -- 318 13. Strehl, A., Ghosh, J.: Cluster ensembles - a knowledge reuse framework for com- In: Proc. Conference on Artificial Intelligence (AAAI'02), bining partitionings. AAAI/MIT Press (2002) 93 -- 98 14. Topchy, A., Jain, A., Punch, W.: Combining multiple weak clusterings. In: Proc. 3rd IEEE International Conference on Data Mining (ICDM'03). (2003) 331 -- 338 15. Hubert, L., Arabie, P.: Comparing partitions. J. Classification (1985) 193 -- 218
1608.04862
2
1608
2016-08-29T20:25:15
Feature Driven and Point Process Approaches for Popularity Prediction
[ "cs.SI", "physics.soc-ph" ]
Predicting popularity, or the total volume of information outbreaks, is an important subproblem for understanding collective behavior in networks. Each of the two main types of recent approaches to the problem, feature-driven and generative models, have desired qualities and clear limitations. This paper bridges the gap between these solutions with a new hybrid approach and a new performance benchmark. We model each social cascade with a marked Hawkes self-exciting point process, and estimate the content virality, memory decay, and user influence. We then learn a predictive layer for popularity prediction using a collection of cascade history. To our surprise, Hawkes process with a predictive overlay outperform recent feature-driven and generative approaches on existing tweet data [43] and a new public benchmark on news tweets. We also found that a basic set of user features and event time summary statistics performs competitively in both classification and regression tasks, and that adding point process information to the feature set further improves predictions. From these observations, we argue that future work on popularity prediction should compare across feature-driven and generative modeling approaches in both classification and regression tasks.
cs.SI
cs
Feature Driven and Point Process Approaches for Popularity Prediction Swapnil Mishra Marian-Andrei Rizoiu Lexing Xie The Australian National University, Data 61, CSIRO, Australia {swapnil.mishra,marian-andrei.rizoiu,lexing.xie}@anu.edu.au 6 1 0 2 g u A 9 2 ] I S . s c [ 2 v 2 6 8 4 0 . 8 0 6 1 : v i X r a ABSTRACT Predicting popularity, or the total volume of information outbreaks, is an important subproblem for understanding collective behavior in networks. Each of the two main types of recent approaches to the problem, feature-driven and gen- erative models, have desired qualities and clear limitations. This paper bridges the gap between these solutions with a new hybrid approach and a new performance benchmark. We model each social cascade with a marked Hawkes self- exciting point process, and estimate the content virality, memory decay, and user influence. We then learn a pre- dictive layer for popularity prediction using a collection of cascade history. To our surprise, Hawkes process with a predictive overlay outperform recent feature-driven and gen- erative approaches on existing tweet data [44] and a new public benchmark on news tweets. We also found that a basic set of user features and event time summary statistics performs competitively in both classification and regression tasks, and that adding point process information to the fea- ture set further improves predictions. From these observa- tions, we argue that future work on popularity prediction should compare across feature-driven and generative model- ing approaches in both classification and regression tasks. Keywords social media; self-exciting point process; infor- mation diffusion; cascade prediction. 1. INTRODUCTION Popularity prediction, especially in the context of online media, has seen increased attention, as successful solutions would help both content consumers to cope with informa- tion overload, and content producers to disseminate infor- mation within limited resources. Accurate models will help producers to identify the trends, discover useful content and decimate it faster to improve the content delivery of the network. Furthermore, this would provide with more in- sights into understanding collective behaviour by compiling Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full cita- tion on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or re- publish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. CIKM'16 , October 24-28, 2016, Indianapolis, IN, USA c(cid:13) 2016 ACM. ISBN 978-1-4503-4073-1/16/10. . . $15.00 DOI: http://dx.doi.org/10.1145/2983323.2983812 seemingly incoherent individual responses to a single piece of information. When presented with the task of predicting popularity, a clear gap appears between the two main classes of ap- proaches: the feature-driven approaches and the generative approaches. Feature-driven approaches [3, 7, 25, 29] sum- marize network, user, and event history information into an extensive set of features, and they use machine learning approaches to predict future popularity. Generative meth- ods [12, 34, 43, 44] leverage fine-grained timing information in the event series, however they make stronger assump- tions about the diffusion process. A thorough understanding of strengths and weaknesses of the two classes is currently missing, especially since the generative methods are usually designed for explaining the mechanisms that generate atten- tion, and not optimized for prediction. Another gap arises between the different problem settings. Prior work has ad- dress problems like predicting the volume of attention [34, 44], predicting if a cascade will double in size [7], whether an item will have 10 million views [33], or be among the top 5% most popular [42]. However, the understanding of how the different approaches and the different features generalize over the various problem settings is incomplete. In addition, a practical bottleneck is the availability of certain types of these features, such as network data and corresponding fea- tures – for example the number of users exposed in the dif- fusion up to a time t or potential number of reachable users. A third gap in the current available work is the consensus and understanding about which features are informative for feature-driven models and the lack of benchmark datasets on which new methods can be devised. In this paper, we address the above challenges in the con- text of predicting the final size of retweet cascades. We build two predictive approaches, one generative and one feature- driven, and we show how to combine them into a hybrid predictor to further increase performances. The genera- tive method is a two-layered approach, built on the intu- itive Hawkes self-exciting process [15] model. Self-exciting point processes are a class of stochastic processes, in which the occurrence of past events makes the occurrence of fu- ture events more probable. Three key factors in information diffusion are built into the proposed model: the social influ- ence of users, the length of "social memory" and the inherent tweet quality. We use a predictive layer on top of the gen- erative model to make final predictions. This helps us to take into account other cascades and mitigate limitations of model assumptions and parameter estimation. Our sec- ond proposed approach, the feature-based method, uses only (feature-based vs. generative) and the generalization of the features across feature-driven approaches. • Comparative understanding of feature-driven and generative models: we propose a generative method, based on Hawkes self-exciting processes, which features the advantages of generative methods – e.g. interpretable results – and which is adapted for predicting the final cas- cade popularity by using an additional predictive layer; we compare approaches to popularity prediction from the two main classes, i.e. feature-based and generative, and we show that combining them into a hybrid approach increases performances. • Dataset: we identify a set of features that generalize over different settings and can be constructed with only message content and basic user features; we curate a large, domain-specific dataset of retweet diffusion cas- cades, which can be used by both feature-driven and gen- erative models for prediction. Dataset along with code is publicly available for download.1 This new dataset al- lows comprehensive performance benchmarks on features about users and temporal activity. The rest of this paper is structured as follows. Sec. 2 presents related work. Sec. 3 details the proposed genera- tive model and fitting methods, while Sec. 4 presents how the popularity prediction is performed, based on the fitted model parameters. The dataset and feature construction for the feature-driven approach are detailed in Sec. 5 and the experiments are outlined in Sec. 6. We conclude in Sec. 7. 2. RELATED WORK We structure the discussion of related work onto the two broad previously mentioned categories: feature-driven ap- proaches and generative approaches. For generative models, being somewhat recent, we discuss their application in pop- ularity prediction as well as their use in other social media settings. Predicting popularity with feature-driven models. Data-driven approaches [11, 19] treat popularity as a non- decomposable process and take a bottom-up approach. They rely on machine learning algorithms to make the connection between item popularity and an extensive set of features. Most often the main contributions of such approaches are collecting large-scale datasets and constructing informative features. Bakshy et al. [4] and later Martin et al. [25] pre- dict tweet popularity, defined as the total size of its retweet cascade. Both studies construct features relating to the user having posted the tweet and posted content. User features, particularly past user success – the ability of a user to start large cascades – are shown more informative, however pre- diction performances are limited. Martin et al. make the hypothesis of an inherent popularity randomness, which sets limits to its predictability. The situation is different when part of the diffusion cascade is observable, as early activ- ity has been shown predictive for total popularity [29, 37]. When predicting whether a Facebook cascade will double in size, Cheng et al. [7] found that temporal features – like the resharing rate or the acquired volume of views – are the most informative features. Prediction performances are further improved when adding features which account for specific contexts of the information diffusion. For exam- ple, Li et al. [22] add propagation network measurements, 1Download data and code here: https://git.io/v6rIN. Figure 1: Two retweet cascades announcing the death of "Mr. Spock". The underlying diffusion processes of tw1 and tw2 are very different: tw1 lasts for 2.5 hours. It attracts the attention of highly influential users, especially music re- lated channels, however the generative kernel of tw2 ampli- fies more than that of tw1. tw2 diffuses faster and ends in just 12 minutes, but the final sizes for the two cascades are similar (224 retweets for tw1 and 219 for tw2). We model and interpret these cascades using our generative model in Sec. 3.4. x-axis: time in seconds; y-axis: number of follow- ers each tweet can reach; φm(τ ): memory kernel of Eq. (2) plotted with m = 1000. features which can be computed on data containing solely the message content and basic user profiles, and which were highlighted as most predictive by recent studies: user re- lated features [25] and temporal activity features [7]. This results in a competitive feature-based predictor, which con- sistently outperforms the current state-of-the-art popularity prediction model [44] – reducing the mean absolute relative error by more than 200% when compared to the latter, after observing the retweet series for 10 minutes. We show that the same set of features can be employed in both regression and classification tasks. We further experiment with a hy- brid predictor, which uses both data features and measures issued from the generative model, and we show additional performance improvement. We conduct experiments on a large dataset, containing 49.7 million tweets containing links to top 10 news sites in English, gathered using the public API over a period of 4 months, in 2015. Fig. 1 illustrates two of the retweet cascades in this dataset, relating the passing of the actor for "Mr. Spock". Even though the two cascades achieve similar popularities, our generative model is capa- ble of differentiating between their very different diffusion dynamics. For example, the memory kernel φm(τ ) of tw2 – i.e. the contribution of each event to the spawning of future events – amplifies more (shown by a larger area under the φm(τ )), but is forgotten faster (the entire diffusion ends in just 12 minutes). There are three main contributions of this paper: • Bridging the popularity prediction problem space: we address three types of gaps: problem settings and task (e.g. regression vs. classification), type of approach tw1●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●User Influence101102103104105●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●0s60s120s180s240s300s360s420s480s540s600s660s720s780s840s900s●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●User Influence100100.5101101.5102102.5●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●0s60s120s180s240s300s360s420s480s540s600s660s720s780s840s900stw2Memory kernelφm(τ)over time00.511.522.530s100s200s300s400s500sRetweet count over time0501001502000s150s330s510s690s870s1080s1290s1500stw2tw1tw2end oftw1tw2 Chang et al. [6] add sophisticated features relating to audi- ence behavior when predicting the popularity of serials and Vallet et al. [38] construct features relating to two social networks: Youtube and Twitter. Many proposed features cannot be used outside of the proposed context, being ei- ther data-source specific or relying on information that is not publicly accessible. The feature-driven methods that we propose use only the best-performing features shown in pre- vious studies and which can be extracted from public data. Generative models in social media. Generative mod- els start by modeling a set of phenomena into a paramet- ric model and fitting the parameters of the model to ob- served data. Such approaches have been successfully used in neuro-biology to model neuronal spiking activity [20], in economics to model the evolution of stock prices [14], in physics to model earthquake aftershocks occurrence [35, 17, 36] and in criminology to model crime patterns [27]. In social media such approaches have been used extensively [18, 30, 31], mainly due to their capability to model phenomena like user interactions and diffusion susceptibility. Hidden net- work properties, such as connexions between individuals [23, 24] or the evolution of the diffusion network topology [13], have been uncovered using generative methods, such as self- exciting point processes. The main difficulty with such ap- proaches is scalability, since each social phenomenon must be accounted manually in the model. Modeling and predicting popularity using genera- tive models. Popularity modeling [9, 12, 43] and predic- tion [34, 44] has been a particularly fertile field for point- process based generative models. In their seminal work, Crane and Sornette [9] showed how a Hawkes point-process can account for popularity bursts and decays. Afterwards, more sophisticated models have been proposed to model and simulate popularity in microblogs [43] and videos [12]. These approaches successfully account for the social phenomena which modulate online diffusion: the "rich-get-richer" phe- nomenon and social contagion. Certain models can output an estimate for the total size of a retweet cascade. Shen et al. [34] employ reinforced Poisson processes, modeling three phenomena: fitness of an item, a temporal relaxation func- tion and a reinforcement mechanism. Zhao et al. [44] pro- pose SEISMIC, which employs a double stochastic process, one accounting for infectiousness and the other one for the arrival time of events. It is the current state of the art in popularity prediction and, throughout this paper, we com- pare against it. Our proposed generative model uses the same information as SEISMIC – tweet timestamps and the number of followers of the user posting the tweet –, but uses a simpler, more intuitive modeling of the diffusion cascade. Generative models are typically designed to explain popu- larity, not predict it. Most of the methods presented earlier introduce multiple regularization and correction factors in order to make meaningful predictions. This is sub-optimal both for prediction and for interpretation. By contrast, our Hawkes predictive model separates modeling from prediction accounting directly for the most important three factors at individual cascade level: user influence, decaying social at- tention and content quality, followed by a predictive layer tuned from historical data. 3. RETWEETING AS A POINT PROCESS We first introduce the Hawkes self-exciting point process, a stochastic event model for describing retweeting cascades. We then describe a procedure for maximum-likelihood esti- mation of model parameters from an observed cascade. We present observations of the Hawkes model on individual and collections cascades, illustrating the interplay of individual memory kernel and user influence in diffusion dynamics. 3.1 A self-exciting point processes In self-exciting processes the occurrences of past events make future events more probable. In particular, we model each retweet as a stochastic event, and model three key in- tuitions in a social network: magnitude of influence, tweets by users with many followers tend to get retweeted more; memory over time, that most retweeting happens when the content is fresh [41]; and content quality. The marked Hawkes process [15] is a well-known self- Its event exciting process that captures these properties. rate is written as: λ(t) =(cid:88)ti<t φmi (t − ti) , (1) where λ(t) is the arrival rate of new events. It depends on each previously occurred event (mi, ti) of magnitude mi at time ti through the triggering kernel φm(τ ). For the problem of estimating the size of a retweet cascade, there are no exogenously generated events (as in a general Hawkes process [16]) apart from the initial tweet, which is accounted for with magnitude m0 at time t0 = 0. The effects of mi and ti are separable in our triggering kernel: φm(τ ) = κmβ(τ + c)−(1+θ) . (2) κ describes the virality – or quality – of the tweet content and it scales the subsequent retweet rate; β introduces a warping effect for the user influence and it is related to the observed long-tail distribution of user influence in social networks; and 1 + θ (θ > 0) is the power-law exponent, describing how fast an event is forgotten, parameter c > 0 is a temporal shift term to keep φm(τ ) bounded when τ (cid:39) 0 ; Here κmβ accounts for the magnitude of influence, and the power-law kernel (τ + c)−(1+θ) models the memory over time. We ap- proximate user influence m using the number of followers obtained from Twitter API. Table 1 summarizes the param- eters of the model, along with their interpretations. Throughout literature, three families of functions have been mainly used to model temporal decay with Hawkes point-processes [32]: power-law functions φp(τ ) = (τ +c)−(1+θ), used in geophysics [17] and social networks [9] ; exponential functions φe(τ ) = e−θτ , used in financial data [14]; Reyleigh functions φr(τ ) = e− 1 , used in epidemiology [40]. We ex- perimented with all three kernels with the setting in Sec. 6, and found that the power-law kernel consistently outper- form the other two. Consequently, we only discuss detailed results from the power law kernel in the rest of this paper. 3.2 The branching factor 2 θτ 2 One of the key quantities that describe a Hawkes process is the branching factor n∗, defined as the expected number of children events directly spawned by an event. Note that the total number of expected events from one initial event is the sum of a geometric series(cid:80)∞k=1(n∗)k. For n∗ < 1, the process in a subcritical regime: the total number of retweets is bounded, the event rate λ(t) decays to zero over time and the retweet cascade dies out. When n∗ > 1, the process is in a so-called supercritical regime with the total number Table 1: Summary of notations. Top: Quantities for esti- mating popularity using point processes. Bottom: Parame- ters of the marked Hawkes process. Notation Interpretation mi ti λ(t) φm(τ ) n∗ T n N∞ Nreal ω N∞ event magnitude. Social influence of the user emit- ting the tweet. event time. Tweet timestamp. conditional intensity – or event rate – of a non- homogeneous Poisson Process. triggering kernel. Contribution of event the (m, t) to the total event rate, calculated at time t + τ . branching factor, mean number of children events spawned by a parent event. For n∗ < 1 the cascade dies out (subcritical regime), for n∗ > 1 the cas- cade explodes exponentially (supercritical regime). time extent of the observed series of events in the beginning of a retweet cascade. T = max(ti). number of events in the observed series of events in the beginning of a retweet cascade. n = max(i). expected total number of events in a given retweet cascade, derived from the generative model. the real number of events in a given retweet cas- cade, or total popularity. predictive factor learned using a Random Forest regressor. total popularity prediction made using the output of the predictive layer. Parameter Interpretation θ κ c β α the power-law exponent, describing how fast an event is forgotten. θ > 0. tweet quality. High quality tweets are more likely to generate more retweets. κ > 0. temporal shift cutoff term so that φm(τ ) stays bounded when τ (cid:39) 0. c > 0. user influence power-law warping effect in b(m). β > 0. 0 < β < α − 1 for having a defined branch- ing factor n∗. exponent of the user influence power-law distri- bution. Fitted to the #followers distribution: α = 2.016. of retweets being unbounded. We compute the branching factor by integrating over time and event magnitudes. n∗ =(cid:90) ∞ 1 (cid:90) ∞ 0 P (m)φm(τ )dτ dm . (3) Here we assume mi are i.i.d. samples from a power law dis- tribution of social influence [21]: P (m) = (α− 1) m−α. Here α is an exponent which controls the heavy tail of the distri- bution. We extract the number of followers m for a large sample of users from our dataset described in Sec. 5.1 and fit it to a power-law distribution following the method detailed in [8]. We obtain α = 2.016 and we use it throughout the experiments. Substituting Eq. (2) and P (m) into (3), we obtain the closed-form expression of the branching factor: n∗ = κ α − 1 α − β − 1 1 θcθ , for β < α − 1 and θ > 0 . (4) Not only the branching factor n∗ is an intuitive descriptor of the virality of a cascade, it is also used for predicting the total popularity in Sec 4 and as a constraint in model estimation in Sec 3.3. 3.3 Estimating the Hawkes process The log-likelihood function. Our marked Hawkes pro- cess is completely defined by the four parameters {κ, β, c, θ}. We now describe a maximum-likelihood estimation proce- dure of the model from a set of observed events, consisting of {(mi, ti), i = 0, . . . , n} for time t < T . The log-likelihood function of a point-process described by Eq. (1) and (2) is written as ([10], Ch. 7.2): L(κ, β, c, θ) = log P ({(mi, ti), i = 1, . . . , n}) λ(τ )dτ = n(cid:88)i=1 n(cid:88)i=2 − κ 0 log (λ (ti)) −(cid:90) T log(cid:88)tj <ti n(cid:88)i=2 (mi)β(cid:34) 1 θcθ − log κ + n(cid:88)i=1 (mj)β (ti − tj + c)1+θ (cid:35) . (5) (T + c − ti)−θ θ cf. (1)&(2) = The first two terms in Eq. 5 are from the likelihood com- puted using the event rate λ(t), the last term is a normalizing factor from integrating the event rate over the observation window [0, T ]. Finding the maximum-likelihood solution. Eq. 5 is a non-linear objective that we optimize to find the set of parameters that maximizes data likelihood. Directly max- imizing this objective is more efficient than expectation- maximization approaches [12] that try to estimate the branch- ing structure (of which event triggers which) and that have a quadratic number of latent variables. There are a few natu- ral constraints for each of model parameter, namely: θ > 0, κ > 0, c > 0, and 0 < β < α − 1 for the branching factor to be meaningful (and positive). Furthermore, while the super- critical regimes n∗ > 1 are mathematically valid, they will not lead to a finite cascade size prediction. We note that in reality no retweet cascade can grow indefinitely, due to finite network sizes. We further incorporate n∗ < 1 as a non-linear constraint for the maximum likelihood estimation. We use the Ipopt [39], the large-scale interior point solver that han- dles both non-linear objectives and non-linear constraints, with pre-programmed gradient functions to find the solu- tion. Details of the gradient computation and optimization can be found in an online supplement [1]. 3.4 Interpreting the generative model Individual cascades: fast vs slow. We first exam- ine the model parameters for the two cascades illustrated in Fig. 1. These two cascades are about the same event and have similar observed popularities (224 vs. 219) through very different diffusion speeds at a complex interplay be- tween power-law memory (τ + c)−(1+θ) and user influences. For tw1, the maximum-likelihood estimate of parameters are {κ = 0.75, β = 0.27, c = 58.46, θ = 0.64} with a correspond- ing n∗ = 0.12; for tw2, {κ = 1, β = 0.42, c = 27.77, θ = 0.77}, and n∗ = 0.16 (also shown in Fig. 2). The two dif- fusions unfold in different ways: tw1 has lower value of κ and higher waiting time c, hence its memory kernel φ(τ ) has lower values than that of tw2 and a slower decay. How- ever, tw1 attracts the attention of some very well-followed music accounts. The original poster (@screencrushnews) has 12,122 followers, and among the retweeters @TasteOf- Country (country music) has 193,081 followers, @Loudwire (a) (b) Figure 2: Density distribution of model parameters κ (a) and θ (b), on a sample of 17,146 cascades from the News dataset. The dashed vertical lines show fitted parameter values for the two retweet cascades illustrated in Fig. 1: tw1 in red and tw2 in blue. We note that Seismic [44] uses a fixed value of θ = 0.242 for all cascades (denoted in green). The distributions for c, β and n∗ are shown in the supplement [1]. (rock) had 110,824 followers, @UltClassicRock (classic rock) has 99,074 followers and @PopCrush (pop music) has 114,050 followers. The resulting cascade reached 1/4 its size after half an hour, and the final tweet was sent after 4 days. In contrast, tw2's memory kernel has higher values, but faster decay. The most influential user in tw2 has 412 followers, and the entire diffusion lasted for only 12.5 minutes. Interpreting a collection of cascades. We construct a large subset of 17,146 cascades of the News dataset, de- scribed in Sec. 5.1. For each cascade we fit the parameters of its generative model {κ, β, c, θ}. Fig. 2 shows the density distribution of parameters θ and κ. As one would expect, most cascades have a low value of κ, and reflect the long- tailed distribution of content quality. n∗ – descriptor of the virality of a cascade – is distributed very similarly to κ, with most cascades showing low n∗ values (shown in the supple- ment [1]). Parameter θ – which controls for the speed of the decay of the memory kernel φm(τ ) – has a more surpris- ing distribution. Recent work [44] on point processes with power-law kernels argued that a unique value of θ = 0.242 is sufficient to explain the general behavior cascades. We find θ to vary in the interval (0, 2.8] and showing two maxima at 0.01 and 0.34. This observation indicates that learning indi- vidual memory exponents θ allows us to better describe the diffusion dynamics of each cascade. The distributions of the other parameters are shown in the supplement: c follows a long-tail distribution; β shows a maximum of density around 0.08 and a smaller peak around β ∼ α − 1 resulting from the optimizer terminating at the boundary of the non-linear constraint n∗ = 1. 4. PREDICTING POPULARITY In this section, we first derive the number of expected future events in a cascade, we then describe a predictive layer tuned for estimating the total size, using information from other cascades in history. 4.1 The expected number of future events Having observed a retweet cascade until time T and fit- ted the parameters of the point process, one can simulate a possible continuation of the cascade, until it dies out – assuming n∗ < 1. In this section, we derive the expected number of events in the cascade, over all possible continu- ations. We group events based on the generation of their parents (i.e. the preceding event they are triggered by), and Figure 3: Illustration of the rationale behind popularity pre- diction. The model parameters are estimated starting from a series of observed events (mi, ti). Part of one possible unfolding of the diffusion cascade is simulated, using the event rate defined by Eq. (2) and simulated by thinning [28]. The event generations are shown: events in Generation1 are shown in red color, Generation2 in green and Generationk in blue. Note there is no theoretical limit to the number of generations or to the extent of time until the cascade dies out. Some of the parent-child relations between events in consecutive generations are shown. estimate the number of events in each generation. We de- note as Generation1 the set of simulated events spawned by the observed events (shown in red in Fig. 3). Similarly, Generation2 (in green in Fig. 3) groups events spawned by events in Generation1, and so on. Let Ai be the expected number of events in Generationi. The expected number of total events in the cascade, N∞, is defined as: N∞ = n + Ai , (6) ∞(cid:88)i=1 where n is the number of observed events. For generations after the first one, the best estimate about Ai, i ≥ 2 is con- structed using the average number of children events n∗ and the number of events in the previous generation, i.e. Ai = Ai−1n∗. Assuming A1 known, we derive: Ai = Ai−1 n∗ = Ai−2 (n∗)2 = . . . = A1 (n∗)i−1 , i > 1 (7) Therefore, the second term in (6) is the sum of a converging geometric progression (assuming n∗ < 1): ∞(cid:88)i=1 Ai = A1 1 − n∗ where n∗ < 1 (8) A1 could also be calculated in a fashion similar to Eq. (7). However, a more precise estimation can be obtained, given that magnitudes of the observed events – parents for events in Generation1 – are known: φmi (t − ti) dt (9) β T mi = κ λ(τ )dτ =(cid:90) ∞ A1 =(cid:90) ∞ T (cid:88)t>ti n(cid:88)i=1 θ (T + c − ti)θ (1 − n∗)(cid:32) n(cid:88)i=1 κ N∞ = n + We obtain the estimate of the total number of events in the cascade by introducing (9) and (8) into (6): β mi θ (T + c − ti)θ(cid:33) , n∗ < 1 (10) 0.00.20.40.60.81.0051015202530Density distribution for κDensity0.7561.000.00.51.01.52.02.50.00.51.01.52.0Density distribution for θDensity0.6420.7750.242tt1t2t3tim1m2m3miGeneration1Generation2GenerationkObservedPredictedT.................. the ARE prediction error, measured as detailed in Sec. 6.1. Fig 4 illustrates this reduction on a subset of the cascades in the News dataset – described in Sec. 5.1 – and its relation with A1 and n∗. The length of the arrows is proportional with the error reduction. The range the errors made without the predictive layer increases linearly with A1. Consequently the error reduction when using N∞ is generally higher when A1 is higher (Fig. 4a). The relation between n∗ and the prediction error is non-linear, therefore in Fig. 4b the hori- zontal axis shows the percentile values of n∗. The variation of the error reduction has two maxima, one around 40% and another one around 95%. Fig. 4 can be summarized as follows: the error reduction increases linearly with the ex- pected number of events in Generation1, but exhibits two maxima in relation with the expected number of events in Generationi, i ≥ 2. Another interesting observation is that N∞ tends to over-estimate cascade sizes, in other words cas- cades tend to achieve less popularity than expected when observed in isolation. This aligns with the hypothesis that content items compete with each other for a finite amount of human attention [26]. 5. DATA AND FEATURES FOR PREDICTION In this section we describe the two datasets, Tweet-1Mo and News, used in our experiments. Next, we describe the set of features constructed for our feature-driven approach. 5.1 Datasets Tweet-1Mo: Zhao et al. [44] made publicly available the dataset they used to predict retweet cascade sizes. It con- tains a sample of all tweets during a month (i.e. using the firehose Twitter API restricted access), further filtered so that the length of each cascade is greater than 50. For each cascade, the dataset contains information about the origi- nal tweet id and start time and, for each of the retweets in the cascade, the time offset of the retweet and the number of followers of the user posting the retweet. We randomly sample the cascades in the original dataset and we construct Tweet-1Mo to contain 30,463 cascades of length between 50 and 5000. The resulting dataset has a mean cascade length of 160 and a median of 95. News: We construct a domain specific dataset of tweets dealing with news articles, by collecting data using the free Twitter Streaming API2, over a period of four moths from April 2015 to July 2015. We track the official twitter handles of ten popular news outlets, namely NewYork Times, Asso- ciated Press, CNN, Washington Post, Reuters, Yahoo News, The Guardian, BBC, Huffington Post and Google News. We also capture all tweets containing either i) user mentions of the above users or ii) a commonly used shortened url to- wards any of the ten news websites. This leads to a collec- tion of 49,735,271 tweets. Most of the cascades in the News dataset are of length one or two and, for compatibility with the Tweet-1Mo, we present the statistics for cascades of length over 50: 110,954 cascades, mean cascade length is 158 and median length is 90. Difference between datasets. The News dataset con- tains several additional information, when compared to Tweet- 1Mo: for each user in a retweet cascade, we record her num- ber of friends, number of posted statuses and the account creation time (these information are recorded in every tweet 2https://dev.twitter.com/streaming/overview (a) (b) Figure 4: Reduction of prediction error for a subset of cas- cades. For each cascade, the error made when predicting final popularity using the theoretical N∞ is shown using red circles, and with blue squares the error made when using the predictive layer N∞. Each gray arrow shows the reduction of error for a single cascade, and pairs together a red circle with a blue square. The error reduction is show in relation to A1 (a) and n∗ (b). 4.2 Predicting total popularity Using generative models for prediction is often sub-optimal, often due to simplifying assumptions of the generative pro- cess. Point processes in general, are optimized for explain- ing observed event history and not optimized for prediction. Zhao et al. [44], for example, recently deployed a number of heuristic correction factors to discount the initial burst and account for a long-term decay. We consider that the Hawkes point process can benefit from systematically learning a pre- dictor, to better account for data noise and limiting model assumptions. First, it is well know that using the number of followers as user influences mi is at best an approxima- tion [5] and often does not scale with retweeting propensity. Second, the network in which cascades happen can be inho- mogenous over the lifetime of the diffusion, e.g. users who respond early may have a inherently shorter memory than those responding late. Last, point processes cannot gener- ate a meaningful prediction for supercritical cascades, and the model estimation can be prone to local minima. In this section, we leverage a collection of previously observed cas- cade histories to fine tune popularity prediction. This pre- dictive layer accounts for the limitations above, and places point process estimates in a comparable framework as the feature-driven approaches. Prediction setup. Each retweet cascade is described using four features {c, θ, A1, n∗}. These four features were found to be the most correlated with  = (Nreal − N∞)2, the error made when predicting popularity using N∞. Further- more, n∗ and θ are expressed as percentiles over the range observed in the training set, to account for their non-linear relation with . Note that parameters κ and β are not used: the information in κ is already included in A1, whereas β was found non-correlated with . In the classification task detailed in Sec. 6.3, the Random Forest is trained to output the selected class. In the popular- ity prediction task – Sec. 6.1 and 6.2 – we train the Random Forest to output a scaling factor ω for the expected num- ber of future events in a given retweet cascade. The final corrected popularity prediction is computed as: N∞ = n + ω(cid:18) A1 1 − n∗(cid:19) . (11) Effects of the predictive layer. The immediate ef- fect of introducing the predictive layer is the reduction of 0200400600800020406080100Prediction error reduction vs. A1A1Prediction error●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●HawkesHawkes + RF0.00.20.40.60.81.0020406080100Prediction error reduction vs. n*●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●●HawkesHawkes + RFn*percentile we capture through the API). This additional information is required by the feature-driven method described in Sec- tion 5.2, therefore in the experiments in Sec. 6, feature-based methods cannot run on Tweet-1Mo. An open-access, domain-specific dataset. Many of the datasets used by prior work for popularity prediction were not made public because of user agreement terms and they are difficult to replicate. The barriers for having an open benchmark include proprietary insider information (e.g. complete Facebook network measurements [7]), privileged API access (e.g., Twitter firehose [44]) or contain restricted data from non-English sources [12, 43]. Furthermore, we argue that predicting popularity on a topic- or domain- spe- cific dataset is as relevant as that on the firehose feed – con- tent producers and consumers are often interested in content within a source (e.g. NYTimes) or a topic (e.g. technology). Therefore, we chose to construct News, our domain-specific dataset, using only free access APIs. We present a strong basis for future benchmarking by combining the descrip- tive power of Feature-Driven and modeling capabilities of Hawkes in Sec. 6. 5.2 Features for popularity prediction Our feature-driven predictor describes each cascade us- ing four types of features: a) basic user features, b) tem- poral features, c) volume features and d) past user success. They are chosen as being the most informative in recent literature [4, 7, 25, 29, 37] and require only free access to the Twitter data source. In particular, Martin et al. [25] compare a wide range of features, including user, content and user-content interplay features, and they show that ba- sic user features together with past user success features account for 87% of the prediction performance. Cheng et al. [7] showed that temporal features relating to the unfold- ing of the observed part of the diffusion account for the bulk of the total classification performances. They report only 0.025 additional accuracy when using all the other features combined in addition to temporal features. Lastly, Szabo et al. [37] and later Pinto et al. [29] show that early popularity is predictive for total popularity. Basic User Features [4, 7, 25]. Basic user statistics capture the social influence of a user. When observing the prefix of a cascade, we use the five point summary (min, median, max, 25-th and 75-th percentile) to represent the distribution for a feature: • Number of Followers: count of user followers; • Number of Friends: count of friends for a user; • Number of Status: count of statuses posted by user; • User Time: Time when user account was created. Temporal Features [7]. We capture the temporal dy- namics of a cascade using the following features: during the first half of the observed cascade; during the second half of the observed cascade; • First Half Rate: mean waiting time between retweets, • Second Half Rate: mean waiting time between retweets, • Waiting Time Distribution: five point summary of wait- ing times between retweets, in the observed cascade; • Exposure Distribution: five point summary of the dis- tribution of number of followers for all users before the last retweet, in the observed cascade. Used only in the classification task in Sec. 6.3. Figure 5: Distribution of Absolute Relative Error (ARE) on the Tweet-1Mo dataset (top row) and on the News (bot- tom row), for Seismic and Hawkes. A part of the diffusion cascade is observed before making the predictions: 5 min (left column), 10 min (middle column) and 1 hour (right column). The red line and the numeric annotations denotes the median values of the distributions. Volume [29, 37]. Number of retweets in the observed part of the cascade, which captures early popularity. Past User Success [4, 25]. Average size of the cascades started by a given user in past. For an observed cascade, we use the five point summary of the distribution of past user success for all previously known users who participate in the cascade. This feature requires a large volume of historical data and can be computed only for users that have started cascades in the past. We detail its construction in Sec. 6.1. 6. EXPERIMENTS We first present in Sec. 6.1 a thorough comparison be- tween the Hawkes model and Seismic, the state-of-the-art generative model on popularity prediction, using two datasets. In Sec. 6.2 and Sec. 6.3 we compare the feature-driven clas- sifier to generative approaches. Sec. 6.1 and Sec. 6.2 tackle regression tasks, i.e., predicting total cascade size after ob- serving it for a certain time, while Sec. 6.3 tackles classifica- tion tasks, i.e., whether or not the cascade size will double from what has been observed. 6.1 Cascade size: two generative methods We compare our point processes model, Hawkes, with Seismic on two datasets, Tweet-1Mo and News. Note that Tweet-1Mo is the dataset on which Zhao et al. [44] reported results, while News dataset supports extracting a richer set of features that is not available in Tweet-1Mo. In addition, Zhao et al. [44] showed that Seismic compared fa- vorably against a number of baselines: from auto-regressive and generative models such as dynamic Poisson model [2, 9] and reinforced Poisson model [34], to linear regression and it's variants [37]. Experimental setup. We run our experiments on the Tweet-1Mo dataset and a subset of News: 20,093 cas- cades from the month of July, which have the total length of at least 50. Both algorithms observe the initial part of each cascade for a limited extent of time and predict its final pop- ularity. We estimate separate sets of parameters for Hawkes and Seismic after observing the cascades for 5 minutes, 10 minutes and 1 hour, respectively. After the fitting is finished, we train the Random Forest regressor in the predictive layer of the Hawkes model. Performance of this regression layer SEISMICHawkes0.20.71.21.72.22.73.23.7ARE0.750.215 MinutesSEISMICHawkes0.00.20.40.60.81.01.21.4ARE0.350.2010 MinutesSEISMICHawkes0.00.20.40.60.81.01.2ARE0.250.181 HourSEISMICHawkes02468101214ARE1.190.195 MinutesSEISMICHawkes0.00.20.40.60.81.01.21.41.6ARE0.410.1710 MinutesSEISMICHawkes0.00.20.40.60.81.0ARE0.240.131 Hour Table 2: (left hand side) Mean Average Relative Error (ARE) ± standard deviation obtained using Hawkes and Seismic on the Tweet-1Mo and News datasets. (right hand side) Number of cascades for which prediction failed. Dataset Approach Tweet-1Mo News Seismic Hawkes Seismic Hawkes Prediction error: different time lengths 5 minutes 1 hour 2.61 ±55.80 0.36 ±0.52 11.13 ±282.96 0.42 ±6.83 10 minutes 0.70 ±15.58 0.33 ±0.41 0.84 ±11.77 0.25 ±0.60 0.51 ±10.81 0.30 ±0.38 0.33 ±0.92 0.22 ±1.16 Number of failed cascades 5 minutes 10 minutes 1 hour 507 302 1022 149 164 105 155 45 71 58 123 37 Table 3: Mean ARE ± standard deviation for Seismic, Hawkes, Feature-Driven and Hybrid models for the News July'15 dataset. Approach 5 minutes Seismic Feat.-Driven Hawkes Hybrid 15.16 ±375.08 0.25 ±0.18 0.27 ±1.83 0.17 ±0.16 10 minutes 0.71 ±4.89 0.22 ±0.17 0.22 ±0.80 0.15 ±0.14 1 hour 0.32 ±0.40 0.17 ±0.14 0.17 ±0.36 0.11 ±0.12 is reported using ten fold cross-validation. 40% of cascades are used for training, 60% for testing. All experimental pro- tocol choices – minimum cascade length threshold, random training/testing split and length of time prefixes – are made to mimic closely the original experimental setup [44]. We use the Absolute Relative Error (ARE) to measure prediction performance on a given cascade w: AREw = (cid:12)(cid:12)(cid:12) N w ∞ − N w N w real real(cid:12)(cid:12)(cid:12) , where N∞ and Nreal are the predicted and observed popu- larities of cascade w. Results. The prediction results are summarized in Fig. 5 as boxplots of ARE for each combination (dataset, approach, observed time), while Table 2 shows the mean ARE ± stan- dard deviation. Note that generative models do not output a prediction for all cascades. For example, when branching factor n∗ ≥ 1 for Hawkes the estimate for cascade size is infinite, similar failures also occur with Seismic when the in- fectiousness parameter p ≥ 1 n∗ ([44] Eq(7)). Here we report the number of "failed" cascades in Table 2, and only report the average ARE on cascades that both approach produce a prediction. As shown in right hand side of the Table 2, we observe that Hawkes is able to produce meaningful pre- dictions for more cascades than Seismic. For example, on News data with 5 minutes, we output prediction for 873 (or 0.7%) more cascades than Seismic. We can see that Hawkes consistently outperforms Seis- mic, as it achieves lower average ARE on both datasets. Mean ARE for Hawkes is at least 40% better than Seismic on Tweet-1Mo and 33% on News. We observe that News dataset after 5 minutes of observation seems the most dif- ficult to predict: Hawkes produces a mean ARE of 0.42, while the mean ARE for Seismic is 11.13. Fig. 5 (top row) shows that the median of Hawkes is at least 25% better than Seismic for any time prefix, suggesting that our ap- proach predicts better for most of the cascades in Tweet- 1Mo. Similar conclusions can be drawn from the bottom (a) (b) Figure 6: Distribution of ARE on the News dataset, split in time for July, for Seismic, Feature-Driven, Hawkes and Hybrid, after observing 10 minutes (a) and 1 hour (b). The red line and the numeric annotations denote median value. row of Fig. 5 (News data): the median ARE of Hawkes is at most 0.19 at 5 minutes, while the best of Seismic models is a median ARE of .24 at 1 hour. We are glad to see that the Hawkes model achieves bet- ter predictive performance than Seismic, by exploiting full flexibility in its non-linear parameters, and a predictive layer that systematically optimizes for future prediction using in- formation from other cascades. 6.2 Cascade size: generative vs. feature-driven In this section we compare the performances of feature- driven and generative approaches on the News dataset only, as the Tweet-1Mo does not contain the necessary data to construct the features detailed in Sec. 5.2. Experimental setup. Similar to the setup in the previ- ous Sec 6.1, we observe cascades for 5 minutes, 10 minutes and 1 hour and fit the Hawkes and Seismic models for each cascade. The train-test split is different, in order to repli- cate closer the experimental setup in Martin et al. [25]: the data from first half of July (1-15) is used for training and the data from second half of July (16-31) for testing. We use the News historical data from April to June to con- struct the past user success feature for the feature-driven approach. We consider only those users who initiated at least 2 cascades in the past as active users. Non-active users have a past user success of 0. We also construct a Hybrid approach, which leverages the features of the Hawkes model – i.e. {c, θ, A1, n∗} – together with the features detailed in Sec. 5.2. We use a Random Forest regressor for predict- ing the final volume size after tuning the predictor on the training set with 10 fold cross-validation. Results. Similar to the previous subsection, we report in Table 3 the mean ARE ± standard deviation and in Fig. 6 the box plots of ARE for 10 minutes and 1 hour. In accord- ing with the results of Sec. 6.1, Hawkes surpasses Seismic SEISMICFDHawkesHybrid0.10.40.71.01.31.6ARE0.4080.1920.1290.11010 MinutesSEISMICFDHawkesHybrid0.00.20.40.60.81.0ARE0.2420.1250.0990.0721 Hour Figure 7: ARE distribution over popularity percentiles, on News dataset, after observing cascades for 10 minutes. The blue line denotes the overall median ARE shown in Figure 6a. Note that the y-axes are not on the same scale for all three graphs. Table 4: Accuracy ± standard deviation when predicting whether a cascade will double its size or not. Approach 25 tweets 50 tweets 0.52 Random Guess 0.66 ±0.013 HawkesC Feature-Driven 0.79 ±0.009 0.79 ±0.008 Hybrid 0.53 0.70 ±0.009 0.81 ±0.011 0.82 ±0.013 for all considered setups. Note that these results are numer- ically different from those in Sec 6.1, because the underlying test dataset consist only the subset from second half (16- 31) of July 2015. Surprisingly, even the Feature-Driven model outperforms Seismic for all time prefixes, by at least 40%. In both cases, the differences are statistically signif- icant (p − val < 0.001) for 10 minutes and 1 hour. The Hawkes model exhibits similar mean ARE as Feature- Driven and higher standard deviation. However, its box- plot in Fig. 6 shows lower median and quartiles. This in- dicates that Hawkes predict better than Feature-Driven for most cascades, but the error distribution of Hawkes is skewed by outliers. Hybrid performs the best, with similar boxplot summarization as Hawkes, but with a 42% better mean APE – 0.17 to 0.11 for 1 hour. The differences between Hybrid and all the other approaches are statistically signif- icant (details in the supplement [1]). This result shows that Hawkes and Feature-Driven approaches are complimen- tary, likely because they summarize the cascade information differently, and the errors are uncorrelated. ARE distribution over cascade popularity. Fig- ure 7 presents the ARE distribution over cascade popularity as boxplots for each popularity decile. Both Hawkes and Feature-Driven predict better for most of the cascades with the middle popularity. For the extreme ends, perfor- mance is affected, because for lower popularity percentiles even a small error is amplified to a large ARE and cascades in higher popularity bins are inherently more difficult to pre- dict. The prediction performance of Seismic seems consis- tent across popularity bins, but always worse than Hawkes or Feature-Driven, as already showed by the aggregated results in Fig. 6a. We also tried to explain prediction per- formance breaking down by News sources, but we did not see any notable patterns. 6.3 Will this cascade double The learning problem in this section is to classify whether an observed cascade will double its volume or not. The ex- perimental setup follows that of Cheng et al. [7], in which cascades are observed for a fixed number of retweets, instead of for a fixed extend of time in Sec. 6.1 and 6.2. The pro- posed Hawkes model outputs directly the total popularity as a cascade size and uses the predictive layer to correct the theoretical estimate. As a consequence, it cannot be used in a classification setup. Instead, we construct a classifier HawkesC, in which a Random Forest Classifier is trained on the same features as the predictive layer of Hawkes and used to output a binary decision. Experimental setup. We use the July subset of the News dataset, filtering to only cascades of length greater than or equal to 25. We observe the cascades for two 25 retweets and 50 retweets, and we predict whether they will reach 50 and 100 retweets, respectively. We perform a 40%- 60% stratified train-test split. Feature-Driven approach uses the features mentioned in Section 5.2, except for volume which is constant for all cascades. Hybrid approach com- bines features from both Hawkes and Feature-Driven. The random train-test split is repeated 10 times and we re- port mean accuracy and standard deviation. Results. Table 4 summarizes the classification perfor- mances. A random guess (majority class) would output an accuracy of 52% and 53% for an observed length of 25 and 50 respectively. The generative-based classifier HawkesC im- proves substantially over the baseline of random guess, how- ever Feature-Driven has the best prediction accuracy. In- terestingly, combining the generative features with the data- driven features did not lead to a significant improvement, likely due to Feature-Driven already has stronger results than HawkesC. Admittedly, predicting whether a cascade will double in size is an easier problem than forecasting its final volume. Overall, the results suggests that the predic- tions are robust, and the performance are comparable to earlier results reported by Cheng et al. [7] (0.81 accuracy after seeing the first 50 shares). 7. CONCLUSION This paper establishes a common benchmark that allows researchers and practitioners to compare feature-driven and generative approaches on different variants of popularity prediction problems. Existing feature-based approaches em- ploy either proprietary insider information, or global net- work information that is impossible to retrieve with the lim- ited access that are openly available. In this work, we bridge the problem space by first selecting a small set of features which can be obtained by using only free access services and constructing the Feature-Driven method. We fur- ther propose a Hawkes self-exciting model, which intuitively aligns with the social factors responsible for diffusion of cas- cades: social influence of users, social memory and inherent content quality. We systematically construct a predictive layer, which helps optimize predict from other cascades. We perform extensive evaluation on two large datasets: a bench- mark dataset constructed by Zhao et al. [44] and a domain- 102030405060708090100%0.00.20.40.60.81.01.21.41.6ARE0.360.430.430.410.420.400.370.420.380.35SEISMIC102030405060708090100%0.00.20.40.60.80.360.300.230.160.120.100.130.170.200.26Feature Driven102030405060708090100%0.00.20.40.60.80.250.220.150.120.090.070.090.100.140.17HAWKES specific dataset curated on news tweets. We compare the feature-driven approaches and generative approaches in two tasks: i) predicting the total size of retweeting cascades and ii) predicting whether cascades will double their size. Both our proposed generative Hawkes method and our Feature- Driven method outperform the current state of the art pre- dictor. Performances are further improved when combin- ing both approaches into Hybrid, which makes us argue that popularity modeling should leverage the best that both worlds have to provide. We plan to extend this work by including additional fac- tors such as, different network behaviour for particular types of content, user influence distributions that are varying over time, and explicit modeling of the interplay between the un- folding of related cascades. Acknowledgments This material is based on research sponsored by the Air Force Research Laboratory, under agreement number FA2386-15-1-4018. We thank the National Computational Infras- tructure (NCI) for providing computational resources, supported by the Australian Government. 8. REFERENCES [1] Supplemental material – feature driven and point process approaches for popularity prediction, 2016. http://arxiv.org/pdf/1608.04862.pdf#page=11. [2] D. Agarwal, B.-C. Chen, and P. Elango. Spatio-temporal models for estimating click-through rate. In WWW '09, pages 21–30, 2009. [3] S. Asur and B. A. Huberman. Predicting the future with social media. In WI-IAT '10, volume 1, pages 492–499, 2010. [4] E. Bakshy, J. M. Hofman, W. A. Mason, and D. J. Watts. Everyone's an influencer. In WSDM '11, page 65, feb 2011. [5] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user influence in twitter: The million follower fallacy. In ICWSM '10, May 2010. [6] B. Chang, H. Zhu, Y. Ge, E. Chen, H. Xiong, and C. Tan. Predicting the Popularity of Online Serials with Autoregressive Models. In CIKM '14, pages 1339–1348, nov 2014. [7] J. Cheng, L. Adamic, P. A. Dow, J. M. Kleinberg, and J. Leskovec. Can cascades be predicted? In WWW '14, pages 925–936, 2014. [8] A. Clauset, C. R. Shalizi, and M. E. J. Newman. Power-Law Distributions in Empirical Data. SIAM Review, 51(4):661–703, nov 2009. [9] R. Crane and D. Sornette. Robust dynamic classes revealed by measuring the response function of a social system. PNAS '08, 105(41):15649–15653, oct 2008. [10] D. J. Daley and D. Vere-Jones. An introduction to the theory of point processes. Vol. I, volume I. 2008. [11] F. Davletov, A. S. Aydin, and A. Cakmak. High Impact Academic Paper Prediction Using Temporal and Topological Features. In CIKM '14, pages 491–498, nov 2014. [12] W. Ding, Y. Shang, L. Guo, X. Hu, R. Yan, and T. He. Video Popularity Prediction by Sentiment Propagation via Implicit Network. In CIKM '15, pages 1621–1630, oct 2015. [13] M. Farajtabar, Y. Wang, M. Rodriguez, S. Li, H. Zha, and L. Song. Coevolve: A joint point process model for information diffusion and network co-evolution. In NIPS '15, pages 1945–1953, 2015. [14] V. Filimonov and D. Sornette. Apparent criticality and calibration issues in the Hawkes self-excited point process model: application to high-frequency financial data. arXiv preprint, aug 2013. [15] A. G. Hawkes. Spectra of some self-exciting and mutually exciting point processes. Biometrika, 58(1):83–90, apr 1971. [16] A. G. Hawkes and D. Oakes. A Cluster Process Representation of a Self-Exciting Process. J. Appl. Probab. '74, 11(3):493, sep 1974. [17] A. Helmstetter and D. Sornette. Subcritical and supercritical regimes in epidemic models of earthquake aftershocks. J GEOPHYS RES-SOL EA '02, 107(B10):ESE 10–1--ESE 10–21, 2002. [18] A. Johansen and D. Sornette. Download relaxation dynamics on the WWW following newspaper publication of URL. PhysA '00, 276(1-2):338–345, 2000. [19] K. Y. Kamath and J. Caverlee. Spatio-temporal meme prediction. In CIKM '13, pages 1341–1350, oct 2013. [20] S. Kim, D. Putrino, S. Ghosh, and E. N. Brown. A Granger causality measure for point process models of ensemble neural spiking activity. PLoS Comput. Biol. '11, 7(3):e1001110, mar 2011. [21] H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a social network or a news media? In WWW '10, pages 591–600, 2010. [22] H. Li, X. Ma, F. Wang, J. Liu, and K. Xu. On popularity prediction of videos shared in online social networks. In CIKM '13, pages 169–178, oct 2013. [23] L. Li and H. Zha. Dyadic event attribution in social networks with mixtures of Hawkes processes. In CIKM '13, pages 1667–1672, 2013. [24] L. Li and H. Zha. Learning parametric models for social infectivity in multi-dimensional hawkes processes. In AAAI '14, 2014. [25] T. Martin, J. M. Hofman, A. Sharma, A. Anderson, and D. J. Watts. Exploring limits to prediction in complex social systems. In WWW '16, pages 683–694, 2016. [26] G. Miritello, R. Lara, M. Cebrian, and E. Moro. Limited communication capacity unveils strategies for human interaction. Sci. Rep. '13, 3, 2013. [27] G. O. Mohler, M. B. Short, P. J. Brantingham, F. P. Schoenberg, and G. E. Tita. Self-Exciting Point Process Modeling of Crime. J. Amer. Statist. Assoc. '11, 106(493):100–108, mar 2011. [28] Y. Ogata. Seismicity Analysis through Point-process Modeling: A Review. PURE APPL GEOPHYS '99, 155(2-4):471–507, 1999. [29] H. Pinto, J. M. Almeida, and M. A. Gon¸calves. Using early view patterns to predict the popularity of youtube videos. In WSDM '13, page 365. ACM Press, feb 2013. [30] J. C. L. Pinto, T. Chahed, and E. Altman. Trend detection in social networks using hawkes processes. In ASONAM '15, pages 1441–1448, 2015. [31] V. Raghavan, G. V. Steeg, A. Galstyan, and A. G. Tartakovsky. Modeling temporal activity patterns in dynamic social networks. IEEE CSS '14, 1(1):89–107, 2014. [32] M. G. Rodriguez, D. Balduzzi, and B. Scholkopf. Uncovering the Temporal Dynamics of Diffusion Networks. In ICML'11, pages 561–568, 2011. [33] D. A. Shamma, J. Yew, L. Kennedy, and E. F. Churchill. Viral actions: Predicting video view counts using synchronous sharing behaviors. In ICWSM '11, 2011. [34] H.-W. Shen, D. Wang, C. Song, and A.-L. Barab´asi. Modeling and Predicting Popularity Dynamics via Reinforced Poisson Processes. In AAAI '14, pages 291–297, Canada, 2014. [35] A. Sornette and D. Sornette. Renormalization of earthquake aftershocks. Geophys. Res. Lett. '99, 26(13):1981–1984, 1999. [36] D. Sornette and A. Helmstetter. Endogenous versus exogenous shocks in systems with memory. PhysA'03, 318(3-4):577–591, 2003. [37] G. Szabo and B. A. Huberman. Predicting the popularity of online content. Communicat. of the ACM, 53(8):80–88, 2010. [38] D. Vallet, S. Berkovsky, S. Ardon, A. Mahanti, and M. A. Kafaar. Characterizing and Predicting Viral-and-Popular Video Content. In CIKM '15, pages 1591–1600, oct 2015. [39] A. Wachter and L. T. Biegler. On the implementation of a primal-dual interior point filter line search algorithm for large-scale nonlinear programming. Mathematical Programming, 106(1):25–57, 2006. [40] J. Wallinga and P. Teunis. Different epidemic curves for severe acute respiratory syndrome reveal similar impacts of control measures. Am J Epidemiol '04, 160(6):509–16, sep 2004. [41] F. Wu and B. A. Huberman. Novelty and collective attention. PNAS '07, 104(45):17599–601, nov 2007. [42] H. Yu, L. Xie, and S. Sanner. Twitter-driven youtube views: Beyond individual influencers. In MM '14, pages 869–872, 2014. [43] L. Yu, P. Cui, F. Wang, C. Song, and S. Yang. Uncovering and predicting the dynamic process of information cascades with survival model. Know. and Inf. Syst., page 10, 2016. [44] Q. Zhao, M. A. Erdogdu, H. Y. He, A. Rajaraman, and J. Leskovec. SEISMIC: A Self-Exciting Point Process Model for Predicting Tweet Popularity. In KDD '15, 2015. ii"CIKM2016SI"-2016/8/30-5:56-page1-#1iiiiiiSupportingInformation"FeatureDrivenandPointProcessApproachesforPopularityPrediction"SwapnilMishra,Marian-AndreiRizoiuandLexingXieDOI:http://dx.doi.org/10.1145/2983323.2983812Contents1Technicaldetailsabouttheoptimizationproce-dure11.1Derivationoflog-likelihoodfortheHawkespro-cess........................11.2Computationofpartialderivativesforopti-mization......................12Additionaldensitydistributiongraphics23GoodnessofFit24MoreResults31Technicaldetailsabouttheoptimizationprocedure1.1Derivationoflog-likelihoodfortheHawkesprocess.Wedetailthederivationofthelog-likelihoodinEq.[5]inthemaintext:L(κ,β,c,θ)=logP({(mi,ti),i=1,...,n})=nXi=1log(λ(ti))−ZT0λ(τ)dτ[13]WestartbycomputingtheintegralontherighthandsideofEq.[13],denotedbyΛ:Λ=ZT0λ(τ)dτcf.[1]=Zt10=0z}{0Xt=0φmi(t−ti)dt+Zt2t1φm0(t−t0)dt+Zt2t1φm1(t−t1)dt+Zt3t2φm0(t−t0)dt+Zt3t2φm1(t−t1)dt+Zt3t2φm2(t−t2)dt+...⇒Λ=nXi=1ZTtiφmi(t−ti)dt[14]IntroducingEq.[2]intoEq.[14],weobtain:Λ=nXi=1ZTtiκ(mi)β1(t−ti+c)1+θdt=nXi=1−κ(mi)β(t+c−ti)−θθ(cid:12)(cid:12)(cid:12)(cid:12)Tti⇒Λ=κnXi=1(mi)β"1θcθ−(T+c−ti)−θθ#[15]HenceEquation[13]canbewrittenas,L(κ,β,c,θ)=1z}{nXi=2logκ+2z}{nXi=2logXti>tj(mj)β(ti−tj+c)1+θ−−κnXi=1(mi)β"1θcθ−(T+c−ti)−θθ#{z}3[16]1.2Computationofpartialderivativesforoptimization.WepresentthepartialderivativescalculationforEquation16,usedbytheIpoptfunctionoptimizationprocedureforfittingtheparametersoftheHawkesself-excitingmodeltoagivencascade.DifferentiatingEq.[16]w.r.tκweobtain:∂L∂κ=n−1κ−nXi=1(mi)β"1θcθ−1(T+c−ti)θθ#[17]FordifferentiatingL(κ,β,c,θ)w.r.tβ,candθ,wefirstcon-siderthe2ndsecondtermintherighthandsideofEq.[16]:nXi=2logXti>tj(mj)β(ti−tj+c)1+θ=nXi=2logh(mi−1)β(ti−ti−1+c)−(1+θ)+...+(m1)β(ti−t1+c)−(1+θ)i[18]UsingthelogarithmicderivationruleandEq.[18]inEq[16],weobtainthepartialderivativew.r.tβ:∂L∂β=nXi=2Pti>tj(ti−tj+c)−(1+θ)(mj)βlog(mj)Pti>tj(ti−tj+c)−(1+θ)(mj)β−κnXi=1(mi)βlog(mi)"1θcθ−1(T+c−ti)θθ#[19]Similarly,wecomputethepartialderivativesw.r.tcandθ:∂L∂c=nXi=2Pti>tj−(1+θ)(mj)β(ti−tj+c)−(2+θ)Pti>tj(ti−tj+c)−(1+θ)(mj)β−κnXi=1(mi)β"1(T+c−ti)1+θ−1c1+θ#[20]Supportinginformation1–4 ii"CIKM2016SI"-2016/8/30-5:56-page2-#2iiiiii0.00.20.40.60.81.00.00.51.01.52.02.5Density distribution for βDensity0.430.279(a)0.00.20.40.60.801234Density distribution for n*Density0.170.12(b)2e+035e+031e+042e+045e+041e+052e+055e+051e+061e−241e−181e−121e−061e+00Density distribution for cDensity(c)2e+035e+031e+042e+045e+041e+052e+055e+051e+064.74.84.95.05.15.2Cumulative density distribution for cDensity(d)Figure8:Distributionofparameterβ(a),n∗(b),cinlog-logscale(c)andcumulativedistributionofcinlog-log(d),onasampleof17,146cascadesfromtheNewsdataset.ThedashedverticallinesshowfittedparametervaluesforthetworetweetcascadesillustratedinthemaintextFig.1:tw1inredandtw2inblue.∂L∂θ=nXi=2Pti>tj−log(ti−tj+c)(ti−tj+c)−(1+θ)(mj)βPti>tj(ti−tj+c)−(1+θ)(mj)β−κnXi=1(mi)βθ2h(θlog(T+c−ti)+1)(T+c−ti)−θ−(θlog(c)+1)c−θi[21]2AdditionaldensitydistributiongraphicsFigure8showsthedensitydistributionofparametersβandc,alongwithbranchingfactorn∗.Thedensityofβshowstwolocalmaxima:amaximumofdensityaround0.079andasmallerpeakaroundβ∼α−1resultingfromtheoptimizerter-minatingattheboundaryofthenon-linearconstraintn∗=1.Parametern∗representstheexpectednumberofeventsspawnedbyasingleeventintheHawkesprocess.Itsdis-tributionshowsamaximumaroundn=0.022andasmallerlocalmaximumaround1,resultedfromthesameprocessin-volvingthenon-linearconstraintn∗=1.Thelowvalueofn∗Table5:MeanandMedianvaluesoflog-likelihoodofunseendataonasubsampleofNewsdatasetwith100cascadesforSeismicandunconstrainedversionofHawkes.ApproachMeanMedianSeismic-6.620-4.3964Hawkes-7.050-6.620pointtowardsafastdecayingself-excitingprocess,resultinginsmallcascadeswithshortlifespans.Parametercisacutoffparameter,itspurposeistokeepthekernelfunctionφm(τ)boundedwhenτ∼0.Itcontrolsthereactivityoftheinitialdiffusion:smallvaluesleadtothefirstretweetsbeingpostedearlyaftertheinitialtweet;largevaluesintroducelongwaitingtimesbetweenthefirsttweetandsubsequentretweets.Fig.8(c)showsitslong-taildensitydistributioninlog-logscaleandFig8(d)showsitscumulativedensitydistribution.Thelargemajorityofcascadesareveryreactive,withamedianvalueofc=111seconds.3GoodnessofFitAswehaveagenerativemodelthatpredictsfinalsizeofacascadebetterthanthecurrentstateoftheart[1],weset2Mishraet.al. ii"CIKM2016SI"-2016/8/30-5:56-page3-#3iiiiiioutthetasktoevaluatehowgoodourmodelfitstheunseendata.InordertoachievethiswefirstfitamodeltoalldataseentillsometimetNforacascadeandthenestimatethelog-likelihoodoftheunseendatatillit'sendtimetM.Wecangetthelog-likelihoodoftheunseendatabysub-tractingthelog-likelihoodoftheseencascadefromthelog-likelihoodofthewholecascadeafterfittingtheparametersontheseenpart,itisdefinedasfollows,L({(mi,ti),i=N+1,...,M})=L({(mi,ti),i=1,...,M})−L({(mi,ti),i=1,...,N})[22]ForHawkeswecaneasilycalculatethevalueinEquation22byusingEquation16forbothseenandfullcascade.ButforSeismictheevaluationisnotpossible,astheydonotderivethelog-likelihoodoftheirmodelexplicitly.ForSeismicthederivationoflog-likelihoodofunseendatacanbewrittenasfollows,L({(mi,ti),i=N+1,...,M})=Az}{MXi=N+1log(λ(ti))−ZtMtNλ(τ)dτ{z}B[23]NowwecancalculatethepartAofEquation23byusingEquation1in[1]andassumingthatinfectiousnessonceesti-matedattNremainsconstant,asfollows,A=MXi=N+1log(PtN)+MXi=N+1log iXj=1njφ(ti−tj)![24]NowforPartBinEquation23byusingEquation1in[1],wehave,B=ZtMtNPtNXti6τ(φ(τ−ti)nidτ)[25]NowusingthetrickusedinEquation14andkeepinginmindthefactthattihastwoparts,i∈[1,N]andi∈[N+1,M],wecanwriteEquation25as,B=PtN"NXi=1niZtMtNφ(τ−ti)dτ+MXi=N+1niZtMtiφ(τ−ti)dτ#[26]UsingEquation24andEquation26wecancalculatethedesiredlog-likelihoodoftheunseendataforSeismic.TopresentresultsforgoodnessoffitweuseunconstrainedoptimizationofparametersforHawkesandcompareitagainstSeismiconasubsampleofNewsdatasetwith100cascades.TheresultsarelaiddowninTable5.Asseenfromthetable,SeismicfitsslightlybettertotheunseendataHawkes,eventhoughthepredictivepowerofHawkesisbet-terasdemonstratedinmaintext.4MoreResultsInthissectionwepresenttheanalysisonstatisticalsignifi-canceofourresultspresentedinSection6.2ofmaintext.ResultsarepresentedinTable6forSeismic,Hawkes,Feature-DrivenandHybridmodelsfortheNewsdataset,weuseastrictcut-offp-value,0.01,asoursamplesizeisinorderofthousands.AsseenfromTable6Hybridmodelshowsstatisticalsignificantimprovementoverallotherapproachesalmosteverytime.TheresultsforHawkesandFeature-DrivenareingeneralbetterthanSeismic,butstatisticallyinsignificantamongeachother.Table6:StatisticaltestingresultsforSeismic,Hawkes,Feature-DrivenandHybridmodelsfortheNewsdataset,indicatingthealgorithmwithstatisticalsignificantbetterre-sults.Winisdecidedwhenanalgorithmhasmajorityoflowererrorvaluesthanthecompetingalgorithmandp-valuecon-firmstheresultsasstatisticallysignificant,elsewemarkitadrawincaseofnostatisticaldifference.Approach5minutes10minutes1hourSeismic-Feat.-DrivenDrawFeat.-DrivenFeat.-DrivenSeismic-HawkesDrawHawkesHawkesSeismic-HybridDrawHybridHybridFeat.-Driven-HawkesDrawDrawDrawFeat.-Driven-HybridHybridHybridHybridHawkes-HybridHybridHybridHybrid1.Q.Zhao,M.A.Erdogdu,H.Y.He,A.Rajaraman,andJ.Leskovec.SEISMIC:ASelf-ExcitingPointProcessModelforPredictingTweetPopularity.InKDD'15,2015.Mishraet.al.Supportinginformation3
1312.2159
2
1312
2013-12-19T21:24:28
Learning about social learning in MOOCs: From statistical analysis to generative model
[ "cs.SI" ]
We study user behavior in the courses offered by a major Massive Online Open Course (MOOC) provider during the summer of 2013. Since social learning is a key element of scalable education in MOOCs and is done via online discussion forums, our main focus is in understanding forum activities. Two salient features of MOOC forum activities drive our research: 1. High decline rate: for all courses studied, the volume of discussions in the forum declines continuously throughout the duration of the course. 2. High-volume, noisy discussions: at least 30% of the courses produce new discussion threads at rates that are infeasible for students or teaching staff to read through. Furthermore, a substantial portion of the discussions are not directly course-related. We investigate factors that correlate with the decline of activity in the online discussion forums and find effective strategies to classify threads and rank their relevance. Specifically, we use linear regression models to analyze the time series of the count data for the forum activities and make a number of observations, e.g., the teaching staff's active participation in the discussion increases the discussion volume but does not slow down the decline rate. We then propose a unified generative model for the discussion threads, which allows us both to choose efficient thread classifiers and design an effective algorithm for ranking thread relevance. Our ranking algorithm is further compared against two baseline algorithms, using human evaluation from Amazon Mechanical Turk. The authors on this paper are listed in alphabetical order. For media and press coverage, please refer to us collectively, as "researchers from the EDGE Lab at Princeton University, together with collaborators at Boston University and Microsoft Corporation."
cs.SI
cs
Learning about social learning in MOOCs: From statistical analysis to generative model Christopher G. Brinton Princeton University Princeton, NJ [email protected] Mung Chiang Princeton University Princeton, NJ [email protected] Shaili Jain Microsoft Bellevue, WA Henry Lam Boston University [email protected] Boston, MA Zhenming Liu Princeton University Princeton, NJ [email protected] Felix Ming Fai Wong Princeton University Princeton, NJ [email protected] [email protected] ABSTRACT We study user behavior in the courses offered by a ma- jor Massive Online Open Course (MOOC) provider during the summer of 2013. Since social learning is a key element of scalable education in MOOCs and is done via online discus- sion forums, our main focus is in understanding forum activ- ities. Two salient features of MOOC forum activities drive our research: 1. High decline rate: for all courses studied, the volume of discussions in the forum declines continuously throughout the duration of the course. 2. High-volume, noisy discussions: at least 30% of the courses produce new discussion threads at rates that are infeasible for students or teaching staff to read through. Furthermore, a substantial portion of the discussions are not directly course-related. We investigate factors that correlate with the decline of activity in the online discussion forums and find effec- tive strategies to classify threads and rank their relevance. Specifically, we use linear regression models to analyze the time series of the count data for the forum activities and make a number of observations, e.g., the teaching staff's active participation in the discussion increases the discus- sion volume but does not slow down the decline rate. We then propose a unified generative model for the discussion threads, which allows us both to choose efficient thread clas- sifiers and design an effective algorithm for ranking thread relevance. Our ranking algorithm is further compared against two baseline algorithms, using human evaluation from Ama- zon Mechanical Turk. The authors on this paper are listed in alphabetical order. For media and press coverage, please refer to us collectively, as "researchers from the EDGE Lab at Princeton University, together with collaborators at Boston University and Microsoft Corporation." Categories and Subject Descriptors G.1.6 [Mathematics of Computing]: Least squares meth- ods; I.2.6 [Computing Methodologies]: Concept Learn- ing 1. INTRODUCTION The recent rapid development of massive online open courses (MOOCs) offered through websites such as Cours- era, edX, and Udacity demonstrates the potential of using the Internet to scale higher education. Besides business models and potential impact, pedagogy is an often-debated subject as MOOCs try to make higher education available to a broader base. Low completion rates have often been cited to highlight a scale -- efficacy tradeoff [25, 18, 5, 26]. Social learning is a key part of MOOC platforms. It holds the promise of scalable peer-based learning and is often the dominant channel of teacher-student interactions. As MOOCs proliferate in 2013, a natural question is: How can we better understand MOOC forum activities through the large-scale, extensive data emerging in the recent months? It has been observed that such forums suffered from the following major problems [17, 23]: • Sharp decline rate: The amount of interaction in forums rapidly drops soon after a course is launched. • Information overload: As courses reach a larger au- dience, often the forum is flooded by discussions from many students; thus it quickly becomes infeasible for anyone to navigate the discussions to find relevant in- formation. This paper studies both problems through a comprehen- sive dataset we crawled from the Coursera discussion forums. By examining the online discussion forums of all courses that were offered during the summer of 2013, we quickly discovered that both problems are ubiquitous in Coursera (see Fig. 1 and 2). Thus, we believe it is natural to ask the following two questions: Question 1. How rapidly does the participation rate in the online discussion forums decline over time, and what behav- ioral factors maintain a robust participation rate? Question 2. Is there a way to codify the generative process of forum discussions into a simple model, and if so, can we also leverage our model to better facilitate users' navigation? Motivation of these questions. The goal of study- ing Q1 is twofold. First, because online discussion forums are the main venue for teacher-student interaction and the only venue for student-student peer help, understanding the dynamics of the online discussion forums is crucial in under- standing the quality of students' online learning experience. Second, we believe students' participation in online forums is also linked to the fundamental problem of having high dropout rates in online education [8]. Exactly when (and why) the students drop out of a course is not publicly acces- sible information. In fact, due to privacy concerns, this type (a) Number of posts per day (b) Difference in post counts between two consecutive days Figure 1: The decline of forum activities. Top: We randomly chose 5 courses out of the 73 courses we crawled and plot the number of posts over the days. A regression line with regressor on time is added. Bottom: Q-Q plot on the differences in counts between two consecutive days after removing 6% outliers (See Section 3). of information may not be available in the near future. Fur- thermore, given the demographics of MOOC students and the nature of distance learning, it is unlikely for a student to pass a course without any participation in the online forum discussion. The activeness of a course's online forum closely correlates with the volume of students that drop out of the course. Crystalizing the formation of discussion threads into a simple model as asked in Q2 allows us to address the infor- mation overload problem and hence improve students' online learning experience. Addressing information overload prob- lems traditionally falls into the area of information retrieval (IR). The primary goal here, however, is to highlight the unique characteristics of the dynamics of MOOCs' forums that are not seen in other online forums such as Yahoo! Q&A and Stackoverflow (or other social media such as Twitter and Facebook). The generative model we develop in Section 4 guides us in choosing classifiers to filter out "noise" in discus- sions and in designing ranking algorithms to find the most course-relevant discussions. Our goals in answering Q1 and Q2 are both to sustain forum activities and identify valuable discussions for indi- viduals. Our methodology. Our analysis consists of the following components. (1a) Statistical analysis. To address Q1, we carry out an in- depth analysis to understand the factors that are associated with students' participation in the online forums. Specifi- cally, we first use regression models to understand what vari- ables are significantly associated with the number of posts (or number of users) that appeared in the forum in each day for each course. One of the interesting discoveries, for example, is that the teaching staff's active participation in the discussion on average increases the discussion volume but does not slow down the decline rate. We also apply a standard t-test procedure to understand whether seeing too many new threads in a short time will reduce the depth of discussion in each thread. Along the way we also present some basic statistics of Coursera, such as the total number of students that participate in the forums, the distribution on the number of posts for each student, and the distribution on thread lengths. (1b) Identifying the information overflow problem. Based on the statistical analysis, one can see that users have different needs in different stages of the course. • In the first few days, the forum is often flooded with small-talk, such as self-introductions. The primary goal here is to classify these small-talk threads and filter them out. • After that, the small-talk often starts to drop. At this point, most of the threads are valuable, so it is impor- tant to be able to give a relevance rank of new threads over time. Thus, we need both a classifier for discussions and a relevance- ranking algorithm. But we would like to understand a more fundamental question described in Q2: Is there a principled and unified way to consider the design of both the classi- fiers and the ranking algorithms. This question is addressed next. (2) Generative models. We propose a unified generative model for thread discussions that simultaneously guides the (i) choice of classifiers, (ii) design of algorithms for extracting important topics in each forum, (iii) design of a relevance ranking algorithm based on the topic extraction algorithm from (ii). Our ranking algorithm is also compared with a number of baseline algorithms through human evaluation. Our simple model explains all the key experimental results we see. Related work. There has been a great deal of research in the areas of online social interaction and forum dynamics as well as a great deal of research devoted to online education. Here, we highlight a number of recent key works in these areas. MOOCs. Piech et al. [22] designed algorithms for a peer grading system to scale up evaluation of students. We are considering a different aspect of MOOC efficacy: attempt- 020406080100050100150200250Useful GeneticsPosts020406080050100150Drug Discoveries DevelopmentPosts0102030405050100150Audio and Music EngineeringPosts0102030405060700100200300Functional ProgrammingPosts01020304050600100030005000Sustainability of Food SystemsPosts−2−1012−50050100Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−400204060Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−400204060Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−150−50050Normal Q−Q PlotTheoretical QuantilesSample Quantiles−2−1012−600−2000200Normal Q−Q PlotTheoretical QuantilesSample Quantiles (a) Sampled portion small-talk by categories of (b) Moving averages on the portion of small-talk by categories. Left: Vocational; Mid: (Ap- plied) Sciences; Right: Humanities and Social Sciences . Figure 2: Statistics of small-talk by categories. Vocation: vocational courses. (Appl) Sci: Sciences and Applied Sciences. social-sci: Humanities and Social Sciences (Section 2). ing to foster engagement in discussion forums. Along these lines, Ahn et al. [2] used a longitudinal fixed-effects model to identify the influencing factors of student participation in peer-to-peer learning in a MOOC-type platform. Kizil- cec et al. [15] argued that student engagement in MOOCs should not be based solely on regular coursework comple- tion. Cheng et al. [7] designed tools to predict a student's risk of dropping out of the course. Compared to the above works, our study is different in that: (1) It is based on a much more comprehensive dataset, 73 courses (almost all of the courses in Coursera during the summer 2013) versus at most 7 in previous work, (2) We identify new factors influencing engagement, and (3) it crys- tallizes the discussion dynamics via a generative model. Studies on forums. There are two main lines of research on the dynamics of online forums: (1) finding high-quality information or high-quality users in question-and-answer fo- rums (see [27, 14, 1, 10, 3] and references therein), and (2) understanding social interactions in forums (e.g., [20, 6, 24]). On the theoretical side, Jain et al. [12] and Ghosh and Kleinberg [9] took a game-theoretic approach in under- standing user behavior in online forums. The work of Ghosh and Kleinberg is perhaps more relevant to our work, because they are interested in the optimal rate of instructor partici- pation that encourages student participation. The online discussion forums in MOOCs differ from other social media studied in the following ways: 1. Both social and technical discussions are encouraged. For exam- ple, in Stackoverflow [3], administrators aggressively remove low-quality threads, and in Twitter [6], very few technical discussions occur. 2. Each forum focuses on one course. Each course has one forum and only students in the course participate in the forum. A large portion of the students are also first-time users. While Yahoo! Q&A [1, 20] has both social and technical discussions, MOOC forums have weaker social interaction and more focused technical dis- cussions (and thus the techniques developed in [20] are not directly applicable). 2. PRELIMINARIES Collecting the dataset. We focused on all 80 courses that were available in the middle of July and that ended be- fore August 10, 2013. Seven of these 80 courses became in- accessible while we were crawling or coding the data. Thus, we have complete records on 73 courses in total, which we used for our data analysis. For developing the generative model, it is less important to have a complete forum data set, thus, we added four more courses that ended shortly af- ter August 10, 2013. The dataset consists of approximately 830K posts (Section 3 presents more details). The full paper gives the entire list of courses. We first manually calculated various course properties, such as the video length. Then, we crawled the forum con- tent, at a rate of 1 to 3 pages per second, from the Coursera server with Python and the Selenium library. Finally, we used Beautifulsoup to parse the data. Categorizing the courses. For the purpose of compari- son across course types in this paper, we categorize a course as quantitative or non-quantitative, and vocational or non- vocational. We adopt the following definitions: if a substan- tial portion of a course requires the students to carry out mathematical or statistical analysis, or to write computer programs, the course is a quantitative course. If a course's material is directly relevant to jobs that require high school or college degrees, or it is plausible to see the course offered in a typical university's continuing education division, then the course is considered a vocational course. Among these 73 courses, 37 of them are quantitative and 8 of them are vocational. There are 6 courses that are both quantitative and vocational. We partition the data in the following way for data summarization purposes: a course could be (1) vo- cational, (2) science or applied science (i.e., quantitative but not vocational) or (3) humanities and social sciences (neither quantitative nor vocational). In a course forum, the The structure of the forum. students may create a new thread or add new content to an existing thread. Each thread consists of one or more "posts," sorted in chronological order. The first post is always writ- ten by the creator of the thread. A user may respond to a thread (i.e., adding a new post) or respond to a post (i.e., adding a new comment). In our analysis, we do not dis- tinguish between posts and comments for the following two reasons: (1) There is only a small portion of comments in the forum. (2) The UI of the forums could be confusing like other forums, i.e., the student could be unaware whether he/she is making a comment or adding a post. Topics in a forum. The discussion threads can be roughly categorized into the following groups: (1) Small-talk conversations that are not course specific, such as a self- introduction or requests to form study groups. (2) Course logistics such as when to submit the homework, how to download the video lectures, etc.(3) Course-specific ques- vocation(app) scisocial−sci0.00.20.40.6020006000100000.00.40.8posts sorted by timeweighted moving average0500015000250000.00.40.8posts sorted by timeweighted moving average0200004000060000800000.00.40.8posts sorted by timeweighted moving average tions that could be either very specific or open-ended. Among these three categories, the last one is the most valuable to the students' learning process. The second cate- gory could be quite relevant, especially if a substantial por- tion of the threads are about homework and exams. The first one, however, can be quite disruptive to many students when the number of new threads is already excessive. Thus, we want to understand how many small-talk posts there are for each course and whether the portion of small-talk we see changes over time. We answer the first question with the help of Amazon Mechanical Turk (MTurk). Specifically, we randomly choose 30 threads from each course and hire workers from MTurk to label the threads. Each thread is labeled by 3 people and we take a majority vote to determine the labels. Figure 2a shows the distributions of the small-talk by category. We can see that a substantial portion of the courses have more than 10% of small-talk in the online discussion forums. Fur- thermore, the humanities and social sciences courses have a higher portion of small-talk. Temporal dynamics of small-talk. Now we study how the portion of small-talk changes over time. Since it is in- feasible (in time and cost) to label a significant portion of the threads, we use a machine learning approach (specifi- cally, a support vector machine, see Section 4) to classify the threads by using the training data labeled through MTurk. We put all threads under the same category together. Then we sort the threads by the time elapsed between the begin- ning of the course and the creation of the thread. Here we focus on only the threads created within 35 days after the class started. Then we compute the "moving average" as let h1, h2, ..., hm be the sorted threads within the follows: same course and ηi be an indicator variable that sets to 1 if and only if hi is classified as small-talk. Then we define our (cid:80) (cid:80) 1≤i≤t ηiαt−i 1≤i≤t αi moving average at time t as: st = . Figure 2 (α = .99) shows the results. We can see that at the be- ginning, the percentage of small-talk is high across different categories, and then it drops over time. However, for hu- manities and social sciences courses, on average more than 30% of the threads are classified as small-talk even long after a course is launched. We remark that these plots give just estimates on the volume of small-talk. There are two types of noise presented in these plots: (1) We are aggregating all the threads in the same category, so course-level information could be lost. (2) The support vector machine could have classification er- rors. Nevertheless, we may conclude that small-talk is a ma- jor source of information overload in the forums. Why the existing infrastructure is insufficient. We notice that the Coursera platform allows the instructors to categorize the threads. However these categories are cus- tomized by the teaching staff. Some categorizations are more effective than others. And there is no effective mech- anism to force the students to respect the categorization consistently. It would be infeasible for the staff to manu- ally correct the labels when the new threads flood into the forum. 3. STATISTICAL ANALYSIS This section examines the following two subquestions of Q1: (1a) What factors are associated with the decline rate of the online forum participation? (1b) Will having more discussion threads in a short period of time dilute students' attention? We use linear regression to answer 1a and student's t- test to answer 1b. 3.1 Analysis of forum activity decline This section studies what factors are associated with the decline rate of forum activities. Here, our dependent variables are yi,t and zi,t, where yi,t refers to the number of posts at the t-th day in the i-th course, and zi,t refers to the number of distinct users that participate in the discussion in the t-th day in the i-th course. Both variables are important to the students' online, social learning experience. The following variables could be relevant to yi,t and zi,t: Quantitative (Qi) is an indicator (boolean) variable that sets to 1 if and only if the i-th course is a quantitative course. Vocational (Vi) is an indicator variable that sets to 1 if and only if the i-th course is a vocational one. Total length of the videos (Li) is the sum of the length of all lecture videos in the i-th course (in hours). Total duration (Di) is the total length (in days) of the i-th course. Peer-graded (Pi) is an indicator variable that sets to 1 if and only if one or more assignments are reviewed/graded by peer students. Teaching staff 's activeness (Si) is the number of posts the teaching staff make throughout the i-th course. Graded homework (Hi) is the total number of homework assignments that are graded by the teaching staff. Intrinsic popularity (Mi, or M(cid:48) i ) is the volume of forum discussion in the beginning of the course, defined as Mi, the median number of posts (if our dependent variables are yi,t), or M(cid:48) i , the number of distinct users (if our dependent vari- ables are zi,t) in the first three days. Roughly speaking, this variable captures the "intrinsic popularity" of each course, e.g., it is likely that a course on public speaking is more popular than a typical course in electrical engineering. We start by walking through the behavior of the vari- ables above before we present and analyze our model. 3.1.1 Statistics of Coursera We now examine the key statistics for the 73 courses col- lected in Coursera, starting with our "dependent variable," the behavior of the students. Students in the forums. In these 73 courses, there are 171,197 threads, 831,576 posts, and 115,922 distinct stu- dents. Figure 3a shows the distribution of the number of posts each student made (in log-log scale). We may roughly classify the students in the forum as "active" and "inactive." Active students refer to those who make at least 2 posts in a course.1 Inactive students are ev- eryone else. Figure 4 shows the distribution of the number of students/active students across different courses by cate- gory. Overall, the average number of students per course is 1835.0 (sd = 1975.4) but this number reduces to significantly 1069.7 (sd = 1217.7) for active students. 1Choosing 2 as the threshold is quite arbitrary. The goal here is to show that many students make a small number of posts. (Intercept) Qit Vit Lit Dit Pit Sit Hit Mit (or M(cid:48) i t) Qi Vi Li Di Pi Si Hi Mi (or M(cid:48) i ) t R2 Adj. R2 Num. obs. On yi,t On zi,t 70.252∗∗∗ 18.276 0.847∗∗∗ 1.511∗∗∗ 1.463∗∗∗ 3.328∗∗∗ −0.071∗∗∗ −0.024∗∗∗ 0.034∗∗∗ 0.025∗∗∗ −0.631∗∗ −0.375∗∗∗ −0.168∗∗ −0.067∗∗ 0.000 −0.007∗∗∗ −0.005∗∗∗ −13.975 −135.567∗∗∗ −61.404∗∗∗ −0.153 On log(zi,t) 4.268∗∗∗ 0.014∗∗∗ 0.011∗∗ 0.001∗∗∗ 0.003 −0.001∗∗ −0.001 0.000∗∗ −23.737∗∗∗ −0.185∗∗ 1.960∗∗ −0.049 −0.624∗∗∗ −0.010∗∗∗ −0.561 32.005∗∗∗ 0.247∗∗∗ 88.289∗∗∗ 0.074∗∗∗ 3.249∗∗∗ 6.050∗∗ 1.398∗∗ 0.973∗∗∗ 0.360∗∗∗ 0.003∗∗∗ 0.481∗∗∗ −1.864∗∗∗ −1.980∗∗∗ −0.071∗∗∗ 0.555 0.554 0.467 0.465 0.530 0.526 5074 5074 1711 ***p < 0.01, **p < 0.05, *p < 0.1 Table 1: Models of forum activities Teaching staff activity. On average, there are 366.9 posts in each course made by the teaching staff (sd = 446.1). But there are two courses that have no posts from the teach- ing staff. j≤t N (µi, σi) = N (tµi, i.e., yi,t =(cid:80) Postulation of a model. Based on the evidence pre- sented above, we postulate the following linear model on the post counts: let yi,t be the number of posts on the t-th day in the i-th course. We assume yi,t+1 − yi,t ∼ N (µi, σi), √ √ tσi). The mean term grows linear in t while the "noise term" grows linear in t. When t is sufficiently large, the mean term dominates yi,t. In other words, we may model yi,t = Ait + Bi + i,t, where Ai and Bi only depend on the factors of the i-th course. Note that while serial dependency can be present, we believe this factor-adjusted, deterministic, linear trend is sufficient to explain the pattern; this is confirmed by our subsequent empirical results. 3.1.2 Regression model We now present our linear model. More concretely, yi,t is linearly related to the course factors, the variable t, and the interacting terms between t and the factors, as yi,t = At + B, (1) where A = β1Qi +β2Vi +β3Li +β4Di +β5Pi +β6Si +β7Hi + β8Mi + β16 and B = β0 + β9Qi + β10Vi + β11Li + β12Di + β13Pi + β14Si + β15Mi. Thus, we can view β1, ..., β8, and β16 as influencing the decline rate of forum participation whereas β0, β9, ..., β15 are influencing the initial participa- tion volume. The first column in Table 1 shows the results based on ordinary least-squares regression. We make a number of observations. First, it is evident that yi,t correlates well with the intrinsic popularity Mi, but the magnitude of im- pact of Mi on the decline rate in the long run appears very light. The coefficients of Qi, Vi, Qit, and Vit suggest that while being a quantitative/vocational course will initially re- duce the volume of forum participation, in the long run the course also experiences a lower decline rate (all the p-values (a) # of posts per student. (b) CDF of decline rate. Figure 3: Distribution of student posts and decline rates. Figure 4: Distribution of the number of students (left) and active students (right) per course. Distribution of decline rate. We next present how yi,t and zi,t change over time for different courses. Fig- ure 1a shows the variables {yi,t}t≥1 for five randomly se- lected courses. We also fit linear models on each of these datasets, where the regressors are the index of the day. All the courses presented here experienced decline in participa- tion. The rest of the courses also behaved similarly. Fig- ure 3b shows the distribution of the decline rate for all the courses (mean = −5.0 and sd = 8.7; 72 of 73 courses are negative2). The variables {zi,t}t≥1 are qualitatively similar. We next study the distribution on the count differences be- tween two consecutive days in the same course. It is not uncommon to see outliers due to large fluctuations in dis- cussions, especially in the beginning of the course or when homework/exams are due. But after we remove the top and bottom 3% outliers in each course, the count differences follow a Gaussian distribution for most of the courses (see Figure 1b for the Q-Q plots). These five courses all pass Shapiro's normality test (p-values ≥ 0.01). Overall, 51 of 73 courses have ≥ 0.01 p-value in Shapiro's test. Video length. Among these 73 courses, the mean video length is 12.71 hours (sd = 7.85). The distribution fits quite well with Gaussian. We do not see discrepancies in distri- butions across categories. Length of the courses. All the courses are between 4 and 14 weeks long. The mean is 58.8 days (sd = 15.3). Homework assignments. The mean number of staff- graded assignments per course is 10.13 (sd = 10.88).Out of the 73 courses, 6 of them do not have any staff-graded as- signments. As for peer-graded assignments, there are a to- tal number of 39 courses that have peer-graded homework. Among them 5 courses are vocational, 11 courses are quan- titative but not vocational, 23 of them are from the rest of the courses. 2The only positive one also has a negative decline rate when we count the # of distinct users. 155050011010010000Log−log Plotnumber of postsnumber of users−60−40−2000.00.20.40.60.81.0decline rateempirical cdfvocation(app) scisocial−sci20050020005000vocation(app) scisocial−sci1005002000 ≤ 10−6). The coefficients associated with Si also look quite sur- prising: while the teaching staff's active participation in the forum correlates with the increased volume of discussion (the addition of one post made by the teaching staff corresponds to an increase of 6.05 posts per day), in the long run their participation does not seem to reduce the decline rate. In fact, there is evidence that an increase in staff participation correlates with a higher decline rate (p-value = 0.021). The variable Pi (whether the course has peer-reviewed homework) behaves in a similar manner: while having peer- reviewed homework adds 88.29 posts per day on average, it also moderately increases the decline rate (p-value = 0.018). Finally, the p-value of the model is 2.2 × 10−16 , sug- gesting overall significance. We also diagnose the residuals, which do not seem to elicit any heteroscedastic pattern. We further check the differences between the slope of t, i.e., the quantity Ai, under our proposed regression model, and the counterpart for regression only on t for each course; we observe that these differences are also reasonably small in magnitude. We next move to the model for the variables zi,t. We use the same set of regressors except that we substitute Mi with M(cid:48) i . Specifically, we use the following model: zi,t = β0 + β1Qit + β2Vit + β3Lit + β4Dit + β5Pit +β6Sit + β7Hit + β8M(cid:48) +β12Di + β13Pi + β14Si + β15M(cid:48) i + β16t. i t + β9Qi + β10Vi + β11Li Our results are shown in the second column of Table 1. We can see that qualitatively, the variables correlate with zi,t's in a similar manner: (1) Quantitative and vocational courses attract a smaller volume of discussion in the begin- ning but they also correlate with smaller decline rates (all with p-value ≤ 10−6). (2) Si correlates with an increased number of distinct users (p-value = 0.00994) but there is evidence that it correlates with higher decline rates (p-value = 0.038). (3) Pi = 1 increases the total number of dis- tinct users (p-value = 5.94 × 10−10) and it also correlates with higher dropout rates (p-value = 0.0016). Finally, the p-value of the model is 2.2×10−16, suggesting again an over- all significance of the model, and the residuals do not show any obvious pattern. More robust linear model on a subset of courses. While the linear regressions are in general quite robust against noises, we would also like to restrict ourselves to those courses that have "nice" behavior so that the residuals exhibit nor- mality, and determine whether the conclusions are consis- tent. Specifically, we choose those 51 courses whose count differences in posts (after removing the top and bottom 3% outliers) pass the Shapiro test (with p-value ≥ 0.01; see dis- cussion in Section 2). We fit the data from these 51 courses with the following model: log(zi,t) = β0 + β1Qit + β2Vit + β3Dit + β4Pit + β5Sit (cid:48) i t + β7Qi + β8Vi + β9Di + β10Pi +β6M +β11Si + β12M (cid:48) i + β13t. The logarithmic transformation is performed because then we observe a higher significance of the model (but this is not strictly necessary and the result otherwise is similar). The variables Li, Lit, Hi, and Hit are not statistically significant (a) Log-log plot of thread length distribution (b) Threads' length by cat- egory Figure 5: Distribution of thread lengths. so they are removed from the model. The third column of Table 1 presents our results. We also tested the normality of the residuals. The p- value of the Shapiro test is 0.148, which indicates that our model fits quite well for these 51 courses. The conclusions we see here are mostly consistent with the conclusions made from the above linear models. 3.2 Attention to each thread Next, we investigate the following question: "Will hav- ing more threads created at the same time reduce the aver- age "attention" each thread receives on average?" Distribution of the thread length. Let us start with understanding the distribution of the length of the threads in the discussion forum. The mean of the length of all threads is 4.98 (median = 2 and sd = 8.65). Figure 5a gives the distribution of thread length in log-log scale. Figure 5b also gives the boxplots of the distribution of the threads' length by categories. Independent two-sample t-tests. We use a t-test to understand whether having more newly created threads will dilute the attention each thread receives. Let hi be a discus- sion thread in the forum and let (cid:96)i be the length of the thread (the total number of posts and comments in the thread). Also, let f (hi, t) be the total number of other threads that were created within t days before and after hi is created in the same course. For example, if hi was created on July 2nd 3pm, then f (hi, 1) is the number of threads other than hi that were created between July 1st 3pm and July 3rd 3pm. Figure 6a shows the plot of (cid:96)i against f (hi, 1). We could fit this data set with a linear model. But we find the linear model's explanatory power is quite low (i.e., R2 is below 0.02). Thus, we resort to two-sample procedures to analyze this group of data set. Specifically, we partition the threads into two groups. The first group G1 contains all the threads hi such that f (hi, 1) ≤ 140. The second group G2 contains the rest of them. The threshold is chosen in a way that both the size and (cid:96)i's variances are within a factor of 2 for both groups (size of G1 is 44971, Varhi∈G1 ((cid:96)i) = 103.94; size of G2 is 76890, Varhi∈G2 ((cid:96)i) = 62.14). We shall refer to G1 as the small group and G2 as the large group. Our goal is to test the following hypothesis: H0: the small group's thread length is no greater than the larger group's thread length. H1: the small group's thread length is larger than the larger group's thread length. The comparison above is understood to be with respect 12510205020011010010000Log−log Plotlength of the threadscountvocation(app) scisocial−sci1252050200 SVM (θ = −1.015) SVM (θ = −0.995) NB (aggregate) NB (separate) true positive rate false positve rate 93.3% 86.7 % 96.7% 96.7% 17.3% 5.9% 35.9% 76.8% Figure 7: Comparing the SVM and the NB classifier. classifier per course and test the classifier to the testing data in the same course. For SVM, we use the standard Kernel. We use the open source code SVM Light [13] software, with their default parameters. Results. Figure 7 compares the performance between the SVM and the NB classifiers. Here, it is more appropriate to measure true and false positive rates instead of preci- sion/recall (see [10] for a discussion). Both the true positive and false positive rates are very high in NB classifiers while SVM has a substantially better false positive rate when the true positive rate is similar (the first row in Fig. 7), which is further reduced when we allow the SVM to have a lower true positive rate (2nd row in Fig. 7). We also remark that an advantage of our classification process is that we do not need to use too many features to obtain sufficiently good results. 4.2 A unified topical model We now present a generative model for the discussion threads inspired by the above experimental results. Let C be the set of n words appearing in the discussion threads. Our model consists of the following distributions on C: • The background distribution B that is not topical-dependent. This refers to the set of commonly used words in the En- glish language (but not too common that would appear in the stopword list). • The topical distribution for small-talk and logistics T0: This models keywords that are more likely to appear in small-talk or logistics discussions. • The course-specific topical distribution Ti for the i-th course. This models keywords that are more likely to appear in the discussions that are relevant to the i-th course. Sampling a thread. A thread in the i-th course is sam- pled in the following way: • With probability pi that the thread is a logistic/smalltalk • Otherwise the thread is a course-specific thread. thread. Here pi can be different for different courses. When a thread is a logistic/smalltalk thread, the words are sampled i.i.d. from D0(i), which is defined as: with probability (1 − ) the word is sampled from B and otherwise the word is sampled from T0. Notice that D0(i)'s are the same for all i's. Similarly, when a thread is a course-specific thread, the words in the thread are i.i.d. samples from D1(i) defined as: with probability (1 − ) the word is from B and otherwise the word is from Ti. Furthermore, for exposition purposes, let us make the following assumptions (most of which can be relaxed): • Near-uniformity in B: for any w ∈ C, PrDi(j)(w) = Θ( 1 n ) for all i and j. Here, we shall imagine C represents the words that are outside a stopword list but cover important topics in different courses, e.g., the 200-th to 2000-th most frequent words. This assumption is justified by the heavy tail distribution of English words. • Distinguishability of the topics: Let Supp(D) be (a) Length of threads vs. # of new threads (b) Boxplots of two groups (≤ 140 new threads and otherwise) Figure 6: The length of discussion threads vs. the number of threads created around the same time. to some central tendency measure. Figure 6b also gives the boxplot of the log of thread lengths in both groups. Using a t-test, we get a t-statistic of 40.3 and the p-value is ≤ 2.2 × 10−16. We also carry out a Mann-Whitney U -test, which also yields a p-value ≤ 2.2×10−16. Both tests indicate that we can reject the null hypothesis with high confidence (one with respect to the mean, the other w.r.t. the median) and therefore, there is strong evidence that having more threads created at the same time correlates with a reduction in the attention each thread receives. 4. A GENERATIVE MODEL Now that we have explored Q1, we move on to Q2. Specifically, this section presents a generative model for thread discussions. We start with a motivating example: evaluation of standard classifier algorithms for filtering small-talk (re- call that this is important in the initial stage of a course; see Section 1). Specifically, it is well-known that both naive Bayes (NB) and support vector machine (SVM) classifiers are good in this type of classification problems. While the SVM classifier shows reasonable performance, the NB clas- sifier experiences excessively high false positive rates. We may leverage the clues from this discrepancy in performance to design a generative model. This generative model both explains the discrepancy and guides us in designing topic extraction and relevance-ranking algorithms (Section 5). 4.1 Understanding the classifiers. Getting the data. We used MTurk to label the threads. We randomly selected 30 threads for each course. We also chose an arbitrary subset of 40 courses and labelled the first 30 even-numbered threads. This allowed us to get more thread samples that fall into the small-talk category. We next split the data set into a training set and a test set: for each randomly sampled thread, with probability 0.85, we assign it as a training data point and otherwise a test data point. Since the test data set is smaller, the authors also made an extra pass on the test set to further reduce the errors in the labels. Also, the test size appears to be sufficiently large so we do not use k-fold cross validation here. Training the classifiers. The NB algorithm is imple- mented based on [21, 11]. We took two approaches to train the NB classifier: Approach 1: We train a single classifier on all of the training data. Approach 2: We train the NB 01000200030004000050100150number of new threadslength of the threads121251050200group number the support of a distribution D. For any i and j, we assume Supp(Ti) and Supp(Tj) do not overlap (but the supports of D1(i) and D1(j) can still overlap). Further- PrB(w) ≤ u, where more, for any w ∈ Supp(Ti), (cid:96) ≤ PrD1(i)(w) 1 < (cid:96) < u are two constants. We have the following theorem that explains the behav- ior of the classifiers: Theorem 4.1. Consider the generative model above. There exist s, , p1, ..., pm, and a sequence b1, ..., bm, such that if we get bi training samples for the i-th course, then 1. With constant probability over the training set, the NB classifier will have poor performance for some courses ( i.e., whp the classifier errs at the negative threads) re- gardless of whether the classifier is trained per course or across all courses. 2. There exists a good separation plane for SVM so that whp a discussion thread will be classified correctly. Here we briefly sketch the intuition for the first part of the theorem. The full paper presents the proof. We leverage a quite straightforward intuition to construct the negative examples: when we train the classifier per course, there is insufficient training data (e.g., ≈ 30 in our case) and thus with constant probability we overestimate the conditional probability. On the other hand, when we train the classifier against all the courses, the classifier cannot address the fact that pi are different for different courses. Thus, the NB classifier will use a wrong prior for some courses. In these courses, the classifier could perform badly. 5. TOPIC EXTRACTION AND RANKING. We now demonstrate how the generative model can be used to extract forum keywords and design relevance ranking algorithms. We shall start with a simple algorithm for ex- tracting Supp(Ti), i.e., the topical words for the i-th course. We first describe the need for this algorithm. Motivation. Knowing Supp(Ti) gives a forum user knowl- edge of the topics in the course. There are some other pos- sible approaches to extract the keywords, such as using the keywords in a course syllabus. We argue that these existing approaches are not suitable solutions here. First, while the keywords in the course syllabus appro- priately summarize the course lectures, they do not always summarize the course discussions. For instance, in a fresh- man English writing course, the instructors may focus on "high level" issues of writing, such as organizing essays or delivering effective arguments. The discussions in the forum may focus on "lower level" issues or other relevant questions, such as the usage of punctuation. Second, when the same course is offered multiple times, we expect the topics of the forum discussion would be different and thus Ti also changes. The topic extraction algorithm. Let i reference a par- ticular course. Our algorithm uses the following two parts of training data: • The background training data consists of forum dis- • The course-specific training data consists of forum discussions in the i-th course in the first few days (ap- proximately 10 days). Let n be the total number of words we see in the back- ground training data set, and let Dn be the empirical uni- gram distribution associated with both the background and cussions of k courses. (cid:112)p D(w)n p E (w)n = γ(w) = √ n (cid:112)p D(w) p E (w) course-specific training data. Let E be the empirical distri- bution associated with the course-specific training data. Let W = {w1, ..., w(cid:96)} be the support of E, and w be an arbitrary word in W . Let p D(w) be the probability mass of w under the distribution Dn; let p E (w) be the probability mass of w under E. We define the "surprise weight" of w as We next rank the words in W according to the γ(·) function, e.g., the first word w has the highest γ(w). Our summary of keywords is the top-k (ordered list of) words in the ranking. We have the following Corollary. Corollary 5.1. Under our generative model presented and assuming pi = Θ(1) and k = Supp(Ti) is known, our topical extraction algorithm will successfully identify Supp(Ti) when the training data is sufficiently large. Experiments. We now evaluate the efficacy of our topical algorithm. Here, the main discovery is that we need only approximately 10 days of course-specific training data for the algorithm to accurately identify Ti. We tested the algorithm on 10 random "large" courses. Specifically, we first identify the set of courses that have larger discussion volume: for each course, we count the num- ber of days, in which 15 or more new threads are created. Call this number di for the i-th course. We then find all courses with di ≥ 25. There are a total number of 24 such courses. Finally we randomly choose 10 courses for testing. We then choose 50 courses among the remaining courses as background training courses. Figure 8 shows the results of our topical algorithm for four courses (the rest of the results are in the full technical report). We can see that the topical model is quite effective in identifying the keywords across all test courses. We also remark that the terms with the highest idf score are mostly meaningless words. We would also like to understand the convergence rate of the algorithm. This corresponds with the time window for "warming up" the algorithm. The sets of top-50 keywords quickly stabilize for different courses (see full paper). Fig- ure 9 presents the normalized Kendall tau distance for ranks between two consecutive days for the same set of courses (the normalized Kendall tau distance is defined by the Kendall tau distance divided by the total number of distinct word pairs). We can see that the Kendal tau distance also quickly converges to below 2% after approximately 10 days. Ranking. We next leverage our topic-extraction algorithm to design a relevance-ranking algorithm. To begin, let us walk through a hypothetical scenario to set up the notation. Alice enrolled in a machine learning course and she used the forum on the 12th day. Then on the 15-th day, Alice logs in again. Here, our goal is to rank the new threads that are created between the 12th and the 15th day. We shall refer to the first 12 days as the warming period. The 12th - 15th days are the query period. Finally, these 15 days are referred to as the window of interest for the ranking algorithm. We next describe our algorithm. Roughly speaking, the algorithm puts more weight on the threads that contain more keywords from Supp(Ti). More specifically, the algo- rithm consists of two steps: Step 1. Assignment of weights. Course name Machine Learning Health for All Through Primary Health Care Pattern-Oriented Software Architectures Latin American Culture Keywords theta octave regression gradient descent matrix ex1 alpha machine vector function linear computecost gnuplot data health phc care primary healthcare community ata alma perry henry medical clinics services public communities doug vanderbilt patterns dre schmidt posa concurrent concurrency gof middleware corba frameworks pattern software singleton latin america culture indigenous american cultures democracy spanish imposed political cultural traditions countries democratic mexico Figure 8: Results of our algorithm for extracting the keywords (top 15 keywords.) Figure 9: Our algorithm's convergence rate for "Machine Learning", "Health for All Through Primary Health Care", "Pattern-Oriented Software Architectures", "Latin American Culture" (from left to right). Let w be an arbitrary keyword that appears in the thread. Let r(w) be the rank of w in the output of our topical algo- rithm. In case w is not in the top-50 most frequent keyword set, then r(w) = ∞. The weight of w, η(w), is αr(w), where α is a parameter between 0 and 1 (α = 0.96 in our experi- ments). Step 2. Assigment of scores. The score of a thread is simply the sum of the weight of each word (with repeti- tion) that appeared in the thread. While our algorithm is technically simple and shares similar spirit with tf-idf based algorithms [19], we emphasize the primary goal here is a proof-of-concept for the efficacy of our generative model. We next compare our algorithm with two natural base- line algorithms, a term-based one (tf-idf) and a "random walk" based one. The tf-idf based algorithm. In the tf-idf based algorithm, we treat each thread as a document and the ranking simply sorts the threads in descending order by the tf-idf scores. One possible random Kleinberg's HITS type algorithm. walk-based algorithm is a variation of the HITS algorithm [16], which is good at finding the "importance" of the nodes in a network and works as follows. First, we construct a bipartite graph: each node in the LHS represents a user and each node in the RHS represents a thread. A user node is connected with a thread node if and only if the user participates in that thread. Then we interpret the thread nodes as "authorities" and the user nodes as "hubs" and apply the standard HITS- type updates (see the full technical report). Finally, we give a rank on the threads by their authority scores. Comparisons. Before we present our experimental re- sults, we highlight the differences between our algorithm and the baseline ones. Comparing with tf-idf. (1) Our algorithm considers all the threads in a course while the tf-idf technique focuses on a single thread. Thus, the tf-idf technique could possibly pick up threads that contain low-frequency words which are ir- relevant to the course, including discussion in non-English languages, or students in a medical course soliciting a doc- tor's opinion on his/her sick acquaintance or other similar scenarios. (2) The tf-idf technique is incapable of finding important keywords for the forums because the terms with the highest idf scores are often those that appear exactly once, most of which do not have much meaning. So it has less "interpretability". Comparing with HITS. While HITS can find the "popular" threads, our goal here is to find the relevant ones. We do not expect graph-based algorithms work well without looking into discussions' content. Evaluation. We now validate the above claims by experi- ments. Specifically, our goal is to validate (1) the tf-idf based algorithm would have a higher probability mis-weighting the non-relevant threads, such as non-English discussions. (2) The HITS-based algorithm will also give more irrelevant threads because it ranks popularity instead of relevance. Testing and training courses. We test on the same 10 "large courses" as we did for the keyword extraction algorithm. Choosing the windows of interest. We randomly choose 5 days from the 10th to the 30th day to form a set D. And then we also add the 10th day to the set. For each d ∈ D, we create a test case with d days of warming period and 2 days of query period. Direct comparison. It is a major open problem to directly assess the quality of multiple ranks in an efficient manner in computational social choices (see [4] and references therein). Thus, we focus on understanding the differences between our algorithm and the baseline ones by comparing the number of irrelevant threads that are recommended by the algorithms. To do so, for each course and each window of interest, we pull out the set of the first 15 threads recommended by our algorithm S and the set of the first 15 threads recom- mended by the baseline algorithm Sb. Then we find the differences D1 = S − Sb and D2 = Sb − S. Next, we use MTurk to label whether the threads in D1 and D2 are rele- vant or not. This will give us difference in relevance counts between algorithms. Result 1. Comparing with tf-idf based algorithm. Here, D1 = D2 = 253 for the 10 courses and 6 days we examined. 64 were labeled as irrelevant in D1 and 104 were irrelevant in D2. Figure 10a shows the breakdown of the misclassified threads by days (full report also presents the plot by courses). The blue bar is the total size of the differences in each day for 0204060800.0000.0050.0100.0150.020daysnormalized kt distance0102030400.000.020.040.060.08daysnormalized kt distance02040600.000.010.020.030.04daysnormalized kt distance010203040500.000.020.040.06daysnormalized kt distance (a) Comparing wt tf-idf (b) Comparing wt HITS Figure 10: Evaluating our relevance-ranking algorithms. all courses. The red bar represents the number of irrelevant threads from our algorithm and the green bar represents the number of irrelevant threads from the tf-idf one. We can see that our algorithm is consistently better. While the improvement is not significant, this validates our intuition discussed above. Result 2. Comparing with HITS. In this case D1 = D2 = 522. 111 threads were irrelevant in D1 and 262 threads were irrelevant in D2. Figure 10b shows further breakdown by days (the full paper has the plot by courses). Our algorithm is again consistently better and the differ- ence is more substantial than result 1. This validates that the HITS-type algorithm is less effective in finding relevant threads. 6. CONCLUSION The larger goal behind our two main research questions is to improve the quality of learning via the online discussion forums, namely by (1) sustaining forum activities and (2) enhancing the personalized learning experience. This paper makes a step towards achieving these end-goals by relying on an extensive empirical dataset that allows us to under- stand current user behavior as well as factors that could potentially change the current user behavior. We showed, for example, that the teaching staff's active participation in the discussion increases the discussion volume but does not slow down the decline in participation. We also presented two proof-of-concept algorithms for keyword extraction and relevance-ranking to remedy the information overload prob- lem, both of which are demonstrated to be effective. Devis- ing effective strategies to reduce the decline of participation in the online discussion forums is the main open problem to be addressed next. 7. REFERENCES [1] L. A. Adamic, J. Zhang, E. Bakshy, and M. S. Ackerman. Knowledge sharing and yahoo answers: everyone knows something. WWW '08. ACM, 2008. [2] J. Ahn, C. Weng, and B. S. Butler. The dynamics of open, peer-to-peer learning: What factors influence participation in the p2p university? In Proceedings of the 2013 46th Hawaii International Conference on System Sciences. IEEE Computer Society, 2013. [3] A. Anderson, D. Huttenlocher, J. Kleinberg, and J. Leskovec. Discovering value from community activity on focused question answering sites: a case study of stack overflow. KDD '12. ACM, 2012. [4] H. Azari Soufiani, D. C. Parkes, and L. Xia. Preference Elicitation For General Random Utility Models. In UAI-13, 2013. [5] P. Bouchard. Some Factors to Consider when Designing Semi-Autonomous Learning Environments. Electronic Journal of e-Learning, 7(2):93 -- 100, 2009. [6] M. Cha, H. Haddadi, F. Benevenuto, and K. P. Gummadi. Measuring user influence in twitter: the million follower fallacy. In ICWSM, 2010. [7] J. Cheng, C. Kulkarni, and S. Klemmer. Tools for predicting drop-off in large online classes. CSCW '13. ACM, 2013. [8] I. de Waard, A. Koutropoulos, N. Ozdamar Keskin, S. C. Abajian, R. Hogue, O. C. Rodriquez, and M. S. Gallagher. Exploring the MOOC format as a pedagogical approach for mLearning. In 10th World Conference on Mobile and Contextual Learning, Beijing China, 2011. [9] A. Ghosh and J. Kleinberg. Incentivizing participation in online forums for education. EC '13. ACM. [10] F. M. Harper, D. Moy, and J. A. Konstan. Facts or friends?: distinguishing informational and conversational questions in social q&a sites. In CHI, pages 759 -- 768, 2009. [11] P. Harrington. Machine Learning in Action. Manning Publications Co., Greenwich, CT, USA, 2012. [12] S. Jain, Y. Chen, and D. C. Parkes. Designing incentives for online question and answer forums, 2012. [13] T. Joachims. Advances in kernel methods. chapter Making large-scale support vector machine learning practical, pages 169 -- 184. MIT Press, Cambridge, MA, USA, 1999. [14] P. Jurczyk and E. Agichtein. Discovering authorities in question answer communities by using link analysis. CIKM '07, pages 919 -- 922. ACM, 2007. [15] R. F. Kizilcec, C. Piech, and E. Schneider. Deconstructing disengagement: analyzing learner subpopulations in massive open online courses. LAK '13. ACM, 2013. [16] J. M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46(5), Sept. 1999. [17] R. Kop. The challenges to connectivist learning on open online networks: Learning experiences during a massive open online course. The International Review of Research in Open and Distance Learning, 12(3):19 -- 38, 2011. [18] G. D. Kuh. What Student Affairs Professionals Need to Know About Student Engagement. Journal of College Student Development, 50(6):683 -- 706, 2009. [19] C. D. Manning, P. Raghavan, and H. Schutze. Introduction to Information Retrieval. 2008. [20] E. Mendes Rodrigues and N. Milic-Frayling. Socializing or knowledge sharing?: characterizing social intent in community question answering. In Proceedings of the 18th ACM conference on Information and knowledge management, 2009. [21] T. M. Mitchell. Machine Learning. McGraw-Hill, Inc., New York, NY, USA, 1 edition, 1997. [22] C. Piech, J. Huang, Z. Chen, C. Do, A. Ng, and D. Koller. Tuned Models of Peer Assessment in MOOCs, July 2013. [23] M. Qiu, J. Hewitt, and C. Brett. Online class size, note reading, note writing and collaborative discourse. I. J. Computer-Supported Collaborative Learning, 0 20 40 60 10th 19th 20th 23rd 28th 30th total topical 4--‐idf 0 50 100 10th 19th 20th 23rd 28th 30th total topical HITS 7(3):423 -- 442, 2012. [24] T. Sun, W. Chen, Z. Liu, Y. Wang, X. Sun, M. Zhang, and C.-Y. Lin. Participation maximization based on social influence in online discussion forums. In ICWSM, 2011. [25] K. Swan. Building Learning Communities in Online Courses: the importance of interaction. Education, Communication & Information, 2(1):23 -- 49, 2002. [26] T. Valjataga, H. Poldoja, and M. Laanpere. Open online courses: Responding to design challenges. In Proceedings of the NBE, 2011. [27] J. Zhang, M. S. Ackerman, and L. Adamic. Expertise networks in online communities: structure and algorithms. WWW '07. ACM, 2007.
1609.05719
1
1609
2016-09-19T13:31:48
Straightness of rectilinear vs. radio-concentric networks: modeling simulation and comparison
[ "cs.SI", "physics.soc-ph" ]
This paper proposes a comparison between rectilinear and radio-concentric networks. Indeed, those networks are often observed in urban areas, in several cities all over the world. One of the interesting properties of such networks is described by the \textit{straightness} measure from graph theory, which assesses how much moving from one node to another along the network links departs from the network-independent straightforward path. We study this property in both rectilinear and radio-concentric networks, first by analyzing mathematically routes from the center to peripheral locations in a theoretical framework with perfect topology, then using simulations for multiple origin-destination paths. We show that in most of the cases, radio-concentric networks have a better straightness than rectilinear ones. How may this property be used in the future for urban networks?
cs.SI
cs
Straightness of rectilinear vs. radio-concentric networks: modeling, simulation and comparison Didier Josselin∗1,2, Vincent Labatut†2 and Dieter Mitsche‡3 1UMR ESPACE 7300, CNRS, Universit´e d'Avignon, France 2Laboratoire Informatique d'Avignon EA 4128, Universit´e d'Avignon, France 3Laboratoire de Math´ematiques Dieudonn´e, Universit´e de Nice, France Abstract This paper proposes a comparison between rec- tilinear and radio-concentric networks. Indeed, those networks are often observed in urban ar- eas, in several cities all over the world. One of the interesting properties of such networks is de- scribed by the straightness measure from graph theory, which assesses how much moving from one node to another along the network links de- parts from the network-independent straightfor- ward path. We study this property in both recti- linear and radio-concentric networks, first by ana- lyzing mathematically routes from the center to pe- ripheral locations in a theoretical framework with perfect topology, then using simulations for multi- ple origin-destination paths. We show that in most of the cases, radio-concentric networks have a bet- ter straightness than rectilinear ones. How may this property be used in the future for urban networks? 1 Introduction We propose to study and to compare the straight- ness of two very common networks: rectilinear and radio-concentric networks. This measure, also ∗[email protected][email protected][email protected] called directness, is related to another index called efficiency [24], and is the reciprocal of the tortu- osity (a.k.a. circuity) [14] – see section 2.1 for a formal definition. In a general meaning, a high straightness reflects the capacity of a network to enable the shortest routes. It is somehow an acces- sibility assessment: the higher the straightness, the shorter the distance (or moving time) on the net- work, due to reduced detours. First, we show a few pictures of old and current networks observed in the real-world, to highlight their peculiar structures [17]. Hippodamian or rec- tilinear (also called Manhattan) networks are made of rectangular polygons, while radio-concentric networks show a center location and a series of ra- dial and circular links. Second, we model theoretical rectilinear and radio-concentric networks. We introduce the math- ematical formula of the straightness for center-to- periphery routes, and we demonstrate that in most of the cases, even with a low number of rays, radio- concentric networks provide straighter paths. Third, we empirically process the straightness of all routes (any node to any node) using Dijkstra's shortest path algorithm [6]. The results confirm that for any type of routes, radio-concentric struc- ture has higher straightness. 1 1.1 Some Rectilinear Networks Rectilinear networks are very common all over the world. They are also called Hippodamian maps due to the Greek architect Hippodamos. These networks are characterized by road sections cross- ing at right angles. Built according to land reg- istry and road construction efficiency in a process of urban sprawl, they look like pure theoretical shapes: a grid of squares of identical surface and side length. Figure 1 shows an example of an old hippodamian urban structure in the antique Egyp- tian city of Kahun (pyramid of Sesostris). Figure 2: Chicago (USA) in 1848; Wikipedia. Figure 1: The antique Egyptian city of Kahun (pyramid of Sesostris); Wikipedia. More recent rectilinear networks are illustrated by the American cities of Chicago in 1848 (Fig- ure 2), New-York with Manhattan (Figure 3), Sacramento (Figure 4) and also the Asian city of Ho Chi Minh in Vietnam (Figure 5). Figure 3: The famous rectilinear network of Man- hattan (USA); Google Maps. 1.2 Radio-concentric Shapes Networks and The second type of network we study is also very common. It is very different in its shape, although it presents basic polygonal entities of various sizes, due to the radial structure. In these networks, the center is somehow a fuzzy location, that of- ten refers to the old part of the town. From this supposed center, radial roads are drawn, crossing a series of perpendicular ring roads, depending on the surface of the city. These shapes were already visible in old maps such as medieval Avignon (cf. Figure 6), espe- cially in its intramuros part, which is surrounded by battlements. In more recent urbanization, many urban areas reveal concentric shapes. Figures 7, 8, 9, 10, 11 and 12 are good examples of how much geometrical these shapes are. Indeed, as with rec- tilinear networks, there exist many degrees of spa- tial regularity in radio-concentric networks, from very symmetric structures like amphitheaters (Fig- ures 11 and 12, representing the European Parlia- ment and the antique theater of Orange, respec- 2 Figure 4: The very regular road network of Sacra- mento (USA); Google Maps. Figure 6: Medieval map of intramuros Avignon (France). Figure 7: Amsterdam (The Netherlands); Google Maps. Figure 8: Paris (France); Google Maps. Figure 5: Road network of Ho Chi Minh (Viet- nam); Google Maps. tively) or circular cities (Figure 10, which de- picts a series of connected perfectly circular vil- lages constituting SunCity), to more asymmet- ric urban shapes (Figure 7, showing the one-side radio-concentric shape of Amsterdam) or graphs with a more relaxed or degraded geometry (Fig- ures 8 and 9, presenting Paris and Sfax, respec- tively). 3 Figure 9: Sfax (Tunisia); Google Maps. Figure 10: Suncity in Arizona (USA); Google Maps. Figure 11: European Parliament in Strasbourg (France); Photo-alsace.com. 1.3 Geographical Models of Rectilinear or Radio-concentric Shapes Networks are often studied in geography because they depict the visible human mark of population 4 Figure 12: Ancient theater of Orange (France); Avignon-et-provence.com. life in their territories. Beyond monographs which describe particular places, there exist a few typolo- gies of urban networks and schemes generally ex- plored and measured via topological structure or functional dimensions of the cities [8, 9]. Concern- ing the types of urban networks and graphs, Blan- chard and Volchenkov [3] presented a simple-faced classification of different types of route schemes, including rectilinear networks (e.g. Manhattan), organic towns (e.g. city of Bielefeld, North Rhine- Westphalia in Germany), shapes of corals (e.g. Amsterdam or Venice). In his book, Marshall elab- orates different taxonomies of street patterns [18]. However, it is also possible to design very theo- retical networks in order to study their properties, other things being equal [22]. Nevertheless, there is no consensual classification of the urban net- works. Looking at the literature, it is interesting to notice that the publications about network de- sign are actually shared by different disciplines in- volved in the field: (spatial) econometrics of trans- portation [11], mathematical optimization [4], in- formation and communication technologies [7] or social networks [16]. These disciplines can be advantageously complemented by the domain of graph theory [2, 19, 1]. On the one hand, the main contribution of the Manhattan networks in the domain of spatial mod- eling and measuring is the rectilinear distance cal- culation, which is related to the mathematical L1- norm [10], compared to the Euclidian distance based on the L2-norm [13]. On the other hand, the radio-concentric framework generated several outstanding models. In 1924, E. Burgess proposed the concentric zone model to explain urban social structures [20], followed by Hoyt in 1939, who de- fined the sector model based on the urban devel- opment along centrifugal networks [12]. In paral- lel, W. Christaller [5] and A. Losch [15] designed the central places theory to understand how cities are organized in territory, according to the distri- bution of goods and services to the population. These models deal with access to facilities and are based on network design and costs. In 1974, Per- reur and Thisse defined the circum-radial distance based on such structures [21]. Toblers law [23] and the Newton gravity model also both indicate an in- verse relation between the strength of a force Fij and the distance dij separating two points i and j in geographical space, giving to the center(s) a par- ticular status in networks. All these spatial theo- ries participate in defining and emphasizing radio- concentric models and shapes; however they nei- ther refute nor contradict rectilinear webs that can also own centers in different ways. in 2 Straightness Theoreti- and Radio- cal Rectilinear concentric Networks for Center- to-Periphery Routes In this section, we focus on the straightness of center-to-periphery routes, for both rectilinear and radio-concentric theoretical networks. The results are purely analytic, i.e. no simulation is involved. The networks are theoretical and perfectly regular, with pure geometric shapes. The proposed meth- ods are specifically designed for these types of net- works. We call radius an edge starting at the center of a radio-concentric network. An edge connecting two radii is called a side. Unlike the rectilinear net- 5 work, the radio-concentric network is controlled by a parameter θ: the angle formed by two consec- utive radii. The constraint on θ is that there must exist an integer k such that k = 2π/θ. We suppose that k > 2, because with k = 1 the sides are not defined, and with k = 2, both radii are mingled. We call angular sector the part of the unit circle between two consecutive radii. A half-sector is the part of the unit circle between a radius and a neigh- boring bisector (cf. Figure 14). 2.1 Definition of the Straightness For a pair of nodes, the Straightness is the ratio of the spatial distance dS as the crow flies, to the geodesic distance dG obtained by following the shortest path on the network: S = dS dG (1) This measures ranges from 0 to 1, a high value indicating that the graph-based shortest path is nearly straight, and contains few detours. Coming from graph theory, this property is inter- esting in network assessment, because it measures a part (in a certain meaning) of the "accessibility" capacity of a network. It is a kind of relative effi- ciency to reach a point in a network. In our case, edges have neither impedance, nor direction. We do not consider any possible traffic jams in the flow propagation. In our assumption, speed is the same all over the graph and so time is proportional to distance. Let the center of the network be the origin of a Cartesian coordinate system. In the rest of the doc- ument, we characterize a center-to-periphery move by an angle α, formed by the x axis and the seg- ment going from the network center to the targeted peripheral node. The angle vertex is the network center, as represented in Figures 13 and 14. For the rectilinear network, we consequently note the straightness S(α) for the route of angle α. For the rectilinear network, due to the presence of the parameter θ (the angle between two consecutive radii), we denote the straightness by Sθ(α). 2.2 Simplifying Properties of the Consid- ered Networks 2.2.1 Rotation Both networks have certain rotation-related prop- erties, which allow some simplifications. As men- tioned before, in a radio-concentric network, two consecutive radial sections of the network are sep- arated by an angle θ. In a rectilinear network (see Figure 13), a cell is a square. The angle between two consecutive edges originating from the net- work center is therefore θ = π/2. So, we can dis- tinguish k = 4 angular sectors, corresponding to the quadrants of our Cartesian coordinate system. Figure 13: A perfect rectilinear network, with θ = π/2 and α in [0, π/4]. Both types of networks can be broken down to k angular sectors, which are all similar modulo a rotation centered at the network center. So, with- out loss of generality, we can restrict our analy- sis to the first angular sector, i.e. to the interval α ∈ [0; θ]. 2.2.2 Homothety An additional simplification comes from the ho- mothetic nature of both studied networks. Indeed, in these networks, a center-to-periphery route can go either through the edges originating from the network, or through those intersecting with these 6 Figure 14: A perfect radio-concentric network, with θ separating two radial sections, and α in [0, θ/2].. edges, as represented in Figures 15 and 16. Let us consider a move from p1 to p4. In both cases, h is parallel to H, so we can deduce that: l L = d D = h H d· H = D · h ; l · H = L· h Then we obtain: l · D = L· d ; We can set: l · D + l · H = L · d + L · h That is to say S is the same whether the destination point is located on the closest or the farthest edge to the network center, for both types of networks: S = l d + h = L D + H (2) Consequently, without any loss of generality, we can therefore restrict our analysis to the first mesh of the network, i.e. to the first square for the recti- linear network and to the first triangle for the radio- concentric network. 2.2.3 Symmetry The last simplification comes from a symmetry property present in both networks, as illustrated by Figure 17 for radio-concentric networks. Observe that when α is smaller than θ/2, the shortest paths which corresponds to an angle α < θ/2. We wish to calculate the shortest path to some other point p(cid:48) 4, corresponding to an angle α(cid:48) > θ/2, and such that the travelled distance is the same as for p4. We know that [p1; p3] and [p1; p(cid:48) 3] have the same length, so the distance to travel on the side is the same for both routes, i.e. H = H(cid:48). More- over, the angles formed by each radius and the side it is β. Let us now are equal by construction: consider the triangles (p1, p3, p4) and (p1, p(cid:48) 3, p(cid:48) 4). We have two pairs of equal consecutive sides and the angles they form are equal; they are both β. So, both triangles are congruent, and we have: (cid:92)p3, p1, p4 = (cid:92)p(cid:48) 3, p1, p(cid:48) 4. By definition, (cid:92)p3, p1, p4 = α and (cid:92)p(cid:48) 3, p1, p4 = θ − α(cid:48), so we get α = θ − α(cid:48), and finally α(cid:48) = θ − α. For the same reason (con- gruence), L = L(cid:48), meaning that the distances as the crow flies are identical for p4 and p(cid:48) 4. Since both distances (on and off the network) are the same for p4 and p(cid:48) 4, their straightness are also equal. In other words: Sθ(α) = Sθ(θ − α). We can conclude that, without any loss of generality, we can focus our study on the first half of the first angular sector, i.e. the interval α ∈ [0; θ/2]. The same proof can be applied to the rectilinear net- work, which displays the same type of symmetry. Consequently, the same simplification holds. 2.3 Analytic Expression of the Straight- ness In the previous section, we showed that, due to cer- tain properties of rotation, homothety and symme- try, we can restrict our analysis of the straightness to only the interval α ∈ [0; θ/2] for both networks. For the rectilinear network, note that θ = π/2. So, in this specific case, we consider the interval [0, π/4]. Let us now give the expression of the straightness for each type of network. For the rectilinear network, we have from Fig- ure 15: 7 sin α = h l ; cos α = d l Figure 15: Geometry of a rectilinear network. Figure 16: Geometry of a radio-concentric net- work. go through the first radius (p1p3), whereas as soon as α exceeds this threshold, they go through the second one (p1p(cid:48) 3). Also note that the line corre- sponding to this angle θ/2 is the bisector of the angle formed by both radii. Figure 17: Basic paths followed on a radio- concentric geometric network. Let us now consider the shortest path to p4, Then, from (2), we obtain: 2.4 Comparison of Networks S(α) = l d + h = 1 cos α + sin α (3) For the radio-concentric network, let us observe Figure 17. Note that p2 is the projection of p4 onto the first radius. We obtain two rectangular triangles containing p2: (p1; p2; p4) and (p4; p2; p3). This allows us to write the following equations: cos α = sin α = tan α = D L h L h D ; ; cos β = sin β = d H h H ; tan β = h d By removing h we get L · sin α = D · tan α = H · sin β = d · tan β, and hence we obtain: D = d = H = L · sin α tan α L · sin α tan β L · sin α sin β We substitute these values into (1), then simplify and obtain: Sθ(α) = = L D + d + H 1 cos α + sin α tan π−θ 2 + sin α sin π−θ 2 (4) (5) Note that these formulas are valid only for the interval α ∈ [0; θ/2]. The other values can be de- duced by symmetry and/or rotation, as explained earlier. With the analytic expression of the straightness for both types of networks, we can now compare their performance for center-to-periphery routes. Figure 18 represents the straightness obtained for the different network types and parameter values. The x- and y-axis represent the angle α and the straightness S calculated using the different previ- ous formula, respectively. The optimal straightness value is represented by the black dotted horizontal line f (α) = 1. The closer the graphical represen- tation of a network is to this line, the better the network is in terms of straightness. Figure 18: Straightness S of different networks de- pending on the angle α of motion: 1 rectilinear net- work and 4 radio-concentric networks from 3 to 16 radii ; α ∈(cid:2)0; π (cid:3). 4 For the radio-concentric network, we consider several values of the parameter θ, corresponding to k = 3, 4, 8, 16, represented in purple, blue, green, and cyan, respectively. The rectilinear network is represented in red. The x-axis ranges only from α = 0 to π/4, which is enough, regarding the sim- plifications we previously described: we know all the plotted lines have a periodic behavior, which directly depends on θ. 8 For all lines, we have S(0) = 1, which corre- sponds to a straightforward move on the first ra- dius (or horizontal edge, for the rectilinear net- work). Then, the straightness decreases when α gets larger, since the destination point gets farther from this radius, and therefore from an optimal route. This corresponds to the lower route, rep- resented in red in Figure 17. The decrease stops when α reaches θ/2 (i.e. the bisector): the straight- ness then starts increasing again, until it reaches 1. This is due to the fact that the shortest path is now the upper route, represented in blue in Figure 17. The maximal value is reached when α = θ, i.e. when the destination point lays on a radius, allow- ing for an optimal route. The same ripple pattern is then repeated again, and appears k times. As mentioned before, the periodicity directly de- pends on θ: the smaller the angle, the larger the number of radii, which means the number of rip- ples increases while their size decreases. In other words, and unsurprisingly, the straightness of a radio-concentric network increases when its num- ber of radii increases. More interesting is the fact that most of the time, 8 (a very small number) radii are sufficient to make radio-concentric networks better than rectilinear ones. 2.5 Boundary Condition Let us now consider a radio-concentric network with infinitely small θ. From the definition of k, we know this would result in an infinitely large num- ber of radii: lim θ→0 k = lim θ→0 = +∞ 2π θ The radii of such a network would cover the whole surface of a disk. Since we focus our study on the first angular half-sector, α is itself bounded from above by θ/2. So, if θ tends towards 0, α does too. From (5), we consequently get: lim θ→0 Sθ(α) = lim θ→0 1 cos α + sin α tan π−θ 2 + sin α 2 − θ sin π 2(6) We have: cos α = 1 sin α = 0 lim θ→0 cos α = lim α→0 π − θ = +∞ tan lim θ→0 lim θ→0 sin α = lim α→0 π − θ = 1 sin lim θ→0 2 2 We finally obtain the boundary for the straight- ness of a radio-concentric network with an infinite number of radii: lim θ→0 Sθ(α) = 1 This result is obvious and consistent with the case where the complete route goes along a radius. Indeed, with an infinite number of radii, we can al- ways find a radius to move directly from the center to the destination. Figure 18 confirms this result: increasing the number of radii reduces the period and the amplitude of the ripples, eventually leading to the optimal horizontal straight line of the equa- tion S = 1. Between the two extreme cases of 3 radii and an infinite number of radii, we should remind the reader that 8 radii are enough for the radio- concentric network to become better than the rec- tilinear one in terms of straightness of center-to- periphery routes. Let us see now how it goes for multi-directional moves. 3 Simulation of the Average Straightness for All Routes Studying analytically the straightness for all possi- ble moves (other than center-to-periphery) would be too time-consuming, so we switched to simu- lation. We used the statistical software R to sim- ulate the motions on both rectilinear and radio- concentric networks. The shortest paths are pro- cessed using Dijkstra's algorithm [6], for all pairs of nodes (see Figures 19 and 20). 9 Figure 19: A perfect rectilinear graph. Figure 21: Average straightness S (and standard deviation) for a rectilinear network, as a function of its size (expressed in number of squares by side). Figure 20: A perfect radio-concentric graph. make this observation: further inquiry will be nec- essary to provide some explanations. These results are very interesting and confirm our theoretical findings, as well as our observations regarding the good straightness of radio-concentric networks, thrifty in number of radii, compared to rectilinear networks. Figure 21 shows that, even when increasing the granularity of the grid form- ing a rectilinear network, the average straightness is constant, at a value lower than 0.8. This is con- sistent with our remark regarding the homothety property of this network. Regarding the radio-concentric network, Fig- ure 22 shows that the average straightness over- takes the rectilinear threshold (0.8) when the num- ber of radii is about 8 or 10. It is interesting to notice that the number of sides does not affect the straightness much. This was expected for center- to-periphery routes, as for the rectilinear network. However, the routes considered here are more gen- eral, going from anywhere to anywhere, and more- over, the radio-concentric network is not a tessel- lation like the rectilinear one, so it is surprising to Figure 22: Average straightness S (and standard deviation) for a radio-concentric network, as a function of its number of radii, and for different number of sides (see colors). 10 4 Conclusion References In this paper, we first presented a few urban net- works based on rectilinear versus radio-concentric structures. Then, in a theoretical framework, we showed the superiority of the radio-concentric net- work compared to the rectilinear network, in terms of straightness. It was first demonstrated analyti- cally in the particular case of center-periphery mo- tions and then simulated on paths with multiple origins and destinations, using the statistical soft- ware R. To our knowledge, these results are new and original. They show that, straightness-wise, whatever the density of rectilinear networks, those cannot efficiently compete with radio-concentric networks, because their straightness is bounded by construction, at least within a theoretical frame- work. However, this exploratory study does not take into account several factors that must be now stud- ied to complete these first results. It will be inter- esting to find exactly over which number of radii a radio-concentric network has a better straight- ness than a rectilinear one. Knowing this thresh- old, we shall then be able to calculate the to- tal length of both networks to fill an equivalent average straightness on similar surfaces to drain. What will be the most thrifty network in terms of length of "cables"? On another aspect, these cal- culations and simulations consider very theoreti- cal networks. Geographers, architects and town planners may be interested in understanding the real straightness of urban, rectilinear versus radio- concentric networks, in real conditions (popula- tion mobility, congestion). This is also one of the further researches developed in the U rbi&Orbi project. ACKNOWLEDGMENTS We would like to thank the CNRS (PEPS MoMIS) and the University of Avignon for supporting this research. [1] M. Barth´elemy. Spatial networks. Physics Reports, 499(1-3):1–101, 2011. [2] C. Berge. Th´eorie des graphes et ses appli- cations. Donod, 1958. [3] P. Blanchard and D. Volchenkov. Mathe- matical Analysis of Urban Spatial Networks. Springer, 2009. [4] G. Buttazzo, A. Pratelli, S. Solimini, and E. Stepanov. Optimal Urban Networks via Mass Transportation. Springer, 2009. [5] W. Christaller. Die Eine Suddeutschland. zentralen Orte okonomisch- in geographische Untersuchung die Gesetzmassigkeit der Verbreitung und En- twicklung der Siedlungen mit stadtischen Funktionen. Gustav Fischer, 1933. uber [6] E. W Dijkstra. A short introduction to the art of programming. Technical report, 1971. [7] A. El Gamal and Y.-H. Kim. Network Infor- mation Theory. Cambridge University Press, 2011. [8] J.-C. Foltete, C. Genre-Grandpierre, and Impacts of Road Networks on D. Josselin. Urban Mobility, in Modeling Urban Dynam- ics, pages 103–128. ISTE Ltd and John Wiley & Sons, 2010. [9] C. Genre-Grandpierre. Forme et fonction- nement des r´eseaux de transport : approche fractale et r´eflexions sur l'am´enagement des villes. Phd thesis, Universit´e de Franche- Comt´e, 2000. [10] S. L. Hakimi. Optimum locations of switch- ing center and the absolute center and me- dians of a graph. Operations Research, 12: 450–459, 1964. 11 [11] J. V. Henderson and J.-F. Thisse, editors. Handbook of Regional Urban Economics, volume 4 of Cities and Geography. Elsevier, 2004. [12] H. Hoyt. The structure and growth of res- idential neighborhoods in American cities. Federal Housing Administration, Washing- ton DC, 1939. [13] D. Josselin and M. Ciligot-Travain. Revis- iting the center optimal location. A spatial thinking based on robustness, sensitivity and influence analysis. Environment & Planning B, 40:923–941, 2013. [14] A. R. Kansal and S. Torquato. Globally and locally minimal weight spanning tree net- works. Physica A, 301(1-4):601–619, 2001. [15] A. Losch. Die raumliche Ordnung der Wirtschaft. Eine Untersuchung uber Stan- dort, Wirtschaftsgebiete und internationalen Handel. Gustav Fischer, 1940. [16] H. MacCarthy, P. Miller, and P. Skidmore. Network logic. Who governs in an intercon- nected world? Demos, 2004. [17] D. Mangin. Infrastructures et formes de la ville contemporaine. La ville franchis´ee. Number 157 in Dossiers du Certu. La doc- umentation francaise, 2004. [18] S. Marshall. Street patterns. Spon Press, 2005. [19] P. Mathis. Graphs and Networks. ISTE, 2007. [20] R. E. Park, E. W. Burgess, and R. D. McKen- zie. The City. The University of Chicago Press, Chicago, Illinois, 1925. [21] J. Perreur and J. Thisse. Central metrics and optimal location. Journal of Regional Sci- ence, 4(3):411–421, 1974. [22] I. Thomas. Transportation Network and the Optimal Location of Human Activities. A nu- merical geography approach. Edward Elgar Publishing ltd, 2002. [23] W. Tobler. A computer movie simulating ur- ban growth in the detroit region. Economic Geography, 46(2):234–240, 1970. [24] I. Vragovi, E. Louis, and A. Daz-Guilera. Ef- ficiency of informational transfer in regular and complex networks. Physical Review E, 71:036122, 2005. 12
1805.10712
2
1805
2018-05-29T06:52:33
NetLSD: Hearing the Shape of a Graph
[ "cs.SI" ]
Comparison among graphs is ubiquitous in graph analytics. However, it is a hard task in terms of the expressiveness of the employed similarity measure and the efficiency of its computation. Ideally, graph comparison should be invariant to the order of nodes and the sizes of compared graphs, adaptive to the scale of graph patterns, and scalable. Unfortunately, these properties have not been addressed together. Graph comparisons still rely on direct approaches, graph kernels, or representation-based methods, which are all inefficient and impractical for large graph collections. In this paper, we propose the Network Laplacian Spectral Descriptor (NetLSD): the first, to our knowledge, permutation- and size-invariant, scale-adaptive, and efficiently computable graph representation method that allows for straightforward comparisons of large graphs. NetLSD extracts a compact signature that inherits the formal properties of the Laplacian spectrum, specifically its heat or wave kernel; thus, it hears the shape of a graph. Our evaluation on a variety of real-world graphs demonstrates that it outperforms previous works in both expressiveness and efficiency.
cs.SI
cs
NetLSD: Hearing the Shape of a Graph Anton Tsitsulin Hasso Plattner Institute [email protected] Davide Mottin Hasso Plattner Institute [email protected] Panagiotis Karras Aarhus University [email protected] Alex Bronstein Technion [email protected] 8 1 0 2 y a M 9 2 ] I S . s c [ 2 v 2 1 7 0 1 . 5 0 8 1 : v i X r a ABSTRACT Comparison among graphs is ubiquitous in graph analytics. How- ever, it is a hard task in terms of the expressiveness of the employed similarity measure and the efficiency of its computation. Ideally, graph comparison should be invariant to the order of nodes and the sizes of compared graphs, adaptive to the scale of graph patterns, and scalable. Unfortunately, these properties have not been ad- dressed together. Graph comparisons still rely on direct approaches, graph kernels, or representation-based methods, which are all inef- ficient and impractical for large graph collections. In this paper, we propose the Network Laplacian Spectral De- scriptor (NetLSD): the first, to our knowledge, permutation- and size-invariant, scale-adaptive, and efficiently computable graph rep- resentation method that allows for straightforward comparisons of large graphs. NetLSD extracts a compact signature that inherits the formal properties of the Laplacian spectrum, specifically its heat or wave kernel; thus, it hears the shape of a graph. Our evaluation on a variety of real-world graphs demonstrates that it outperforms previous works in both expressiveness and efficiency. ACM Reference Format: Anton Tsitsulin, Davide Mottin, Panagiotis Karras, Alex Bronstein, and Em- manuel Müller. 2018. NetLSD: Hearing the Shape of a Graph. In KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, August 19–23, 2018, London, United Kingdom. ACM, New York, NY, USA, 10 pages. https://doi.org/10.1145/3219819.3219991 1 INTRODUCTION Graphs are widely used for modeling complex structures such as biological networks, chemical compounds, social interactions, and knowledge bases. Such applications require the means to efficiently and meaningfully compare one graph to others. Arguably, an ideal means for graph comparison should fulfill the following desiderata: First, it should be indifferent to the order in which nodes are presented; we call this property permutation- invariance. Second, it would enable graph comparisons both at a Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]. KDD '18, August 19–23, 2018, London, United Kingdom © 2018 Copyright held by the owner/author(s). Publication rights licensed to Associa- tion for Computing Machinery. ACM ISBN 978-1-4503-5552-0/18/08...$15.00 https://doi.org/10.1145/3219819.3219991 Emmanuel Müller Hasso Plattner Institute [email protected] local level (expressing, e.g., atomic bond differences among chemi- cal compounds) and at the global or community level (capturing, e.g., the different topologies of social networks); we call this facil- ity scale-adaptivity. Third, it would detect structural similarity regardless of network magnitude (discerning, e.g., the similarity of two criminal networks of different size); we call this aptitude size-invariance. Unfortunately, no existing means for graph com- parison satisfies all three of these requirements. Apart from these qualitative requirements, a viable means for graph comparison should be efficiently computable. Graph analytics tasks often require pairwise graph comparisons within a large col- lection of graphs, hence should be ideally done in constant time, after preprocessing. Unfortunately, existing methods fare even worse in this respect. A popular distance measure among graphs, graph edit distance (GED) [39], defined as the minimum number of edit operations required to turn one graph into another, is NP-hard and APX-hard to compute [28]; intensive research efforts in GED-based graph comparison [18, 27, 53–55] have not escaped this reality. Sim- ilarly, graph kernel methods [8, 17, 25, 33, 40, 52] lack an explicit graph representation and they do not scale well either. In this paper, we develop a permutation- and size-invariant, scale-adaptive, and scalable method for graph comparison. We propose an expressive graph representation, NetLSD, grounded on spectral graph theory (Sec. 4), that allows for constant-time similarity computations at several scales; NetLSD extracts compact graph signatures based on the heat or wave kernel of the Laplacian, which inherit the formal properties of the Laplacian spectrum. Figure 1 shows an example: at a small scale, a ring and a wheel are similar, as each node is connected to predecessor(s) and successor(s); at a large scale, they both appear as rings; at intermediate scales their local structures differ. (a) Ring 101 D S L t e N (b) Wheel 100 10−2 10−1 Figure 1: Comparison of similar graphs on multiple scales. Ring Wheel 101 102 100 scale Properties Complexity Perm.-invariance Scale-adaptivity Size-Invariance Precomputation Method GED [39] DeltaCon [26] FTD [4] SP [8] MLG [25] NetSimile [6] FGSD [47] NetLSD Table 1: Related work in terms of fulfilled (✔) and missing (✘) properties, complexity (n nodes, m edges, k eigenvalues). Type direct direct direct kernel kernel statistical representation statistical representation spectral representation O(km + k2n) O(n log n) O(n2) O(km + k2n) O(m) O(n2) O(n3) O(k3) O(1) O(1) O(1) Comparison NP-complete O(1) O(1) O(1) O(1) ✔ ✘ ✘ ✔ ✔ ✔ ✔ ✔ ✘ ✘ ✘ ✘ ✔ ✘ ✘ ✔ ✘ ✘ ✘ ✘ ✘ ✔ ✘ ✔ 2 RELATED WORK We distinguish methods for graph comparison into three categories: direct, kernel methods, and statistical representations. To the best of our knowledge, this is the first work employing a spectral represen- tation for graph comparison. 2.1 Direct Methods Graph edit distance (GED) [39] is the minimal number of edit op- erations needed to transform one graph into another; unfortu- nately, its calculation is NP-hard [16] and even hard to approximate (APX-hard) [28], as it implies determining a correspondence among the compared graphs' nodes, a computationally hard task to be- gin with [17, 25, 33, 40, 52]; some application-specific techniques (e.g., anomaly detection in time evolving graphs) impose assump- tions on that correspondence to alleviate the burden [4, 26, 35]; while GED admits heuristic approximation [14, 38] and indexing schemes [27, 54, 56], it is not applicable for generic comparison among large graph collections. Besides, GED treats all edit opera- tions as equal, without discerning the extent to which they may alter the graph topology. Thus, even if the computational obstacle were surmounted, GED would still be unsatisfactory as a measure for multi-scale and multi-size graph comparisons. In an effort to overcome GED's shortcomings, past works have resorted to more flexible distance definitions, based on vertex and path similarities [35] or propagation models [26]. While such mea- sures are less sensitive to local changes than GED, they usually require node to be aligned in advance, hence are limited to specific applications. An attempt to abandon this requirement relaxes the permutation matrix required to define a full node correspondence and considers a family of tractable distances (FTD) [4]. This relaxed matrix preserves local properties and is easy to compute, yet the ensuing measure is still sensitive to permutations. 2.2 Kernel Methods Graph kernels [8, 17, 25, 33, 40, 52] are similarity functions among graphs, which typically perform an implicit transformation of graph structure to compare two graphs (e.g. Shortest-path (SP) kernel [40]). While each kernel function has its own valuable properties, to our knowledge, no extent graph kernel achieves both scale-adaptive and size-invariant graph comparison. Besides, kernels require ex- pensive on-demand computations at comparison time, hence are inapplicable for large-scale graph comparisons. Recently, Kondor and Pan proposed the Multi-scale Laplacian Graph kernel (MLG) [25], which achieves scale-adaptivity by ex- ploiting the propagation of information in the graph and summing the information at each iteration. However, it also raises a compu- tational overhead cubic in Laplacian matrix eigenvalues. 2.3 Statistical Representations Representation-based methods generate an one-off graph signa- ture vector, based on statistical properties, and use it in subsequent inter-graph comparisons. Preliminary works in this area [6, 7, 9] handcraft features by aggregating local graph properties such as a node's and its neighbors' degrees. Such representations are easy to compute, yet focus on local characteristics, and are oblivious to global features. A more advanced approach, the Family of Spectral Distances (FSGD), [47] produces a high-dimensional sparse repre- sentation as a histogram on the dense biharmonic graph kernel; however, FGSD does not capture graph features at different scales of resolution or graph sizes, and is also inapplicable to reasonably large graphs, due to its quadratic time complexity. 2.4 Spectral Representations Spectral graph theory is effective in the comparison of 3D objects [9, 15, 34]. Bronstein et al. [10] proposed computing pairwise shape similarities by finding the minimum-distortion embedding of one shape into the other. This procedure is related to the computation of the Gromov-Hausdorff distance [31], which is suitable for shape comparison, yet hard to compute. Most relevant works consider filtering functions corresponding to known diffusion models, in- cluding heat [11, 42], wave [2] and commute time [11] distances. While it is known that hitting and commute times degenerate to a function of node degree on large graphs [49], it is unknown whether other filters designed for three-dimensional manifolds maintain their expressiveness on high-dimensional graphs. While 3D objects have a precise low-dimensional shape, graphs have no rigid form. Yet we can consider a graph as a geometrical object. Günthard and Primas first asked to what extent a graph (in general, a manifold) may be determined by its spectrum [19]; Kac expressed the same question eloquently: "Can one hear the shape of a drum?" [21]. Since then, investigations have shown that isospectral graphs tend to be isometric [51], and some graphs are determined by their spectrum [45]. Thus, spectral graph theory forms a solid ground for graph comparison. The Laplacian spectrum is used in graph mining [1, 41], yet, to our knowledge, no previous work has used it as a means for graph comparison. 2 3 PROBLEM STATEMENT An undirected graph is a pair G = (V, E), where V = (v1, . . . , vn), n = V is the set of vertices and E ⊆ (V ×V) the set of edges. We assume the graph is unweighted even though our method readily applies to the weighted case. A representation is a function σ : G → RN from any graph G in a collection of graphs G to an infinitely dimensional real-vector; the element j of the representation is denoted as σj(G). A representation-based distance is a function dσ : RN×RN → R+ 0 on the representations of two graphs G1, G2 ∈ G that returns a positive real number. We aim to devise a constant-time representation-based distance among any pair of graphs G1, G2. 3.1 Expressive Graph Comparison Our distance should support data mining tasks, such as clustering, nearest neighbor classification, distance-based anomaly detection. Therefore, we require our distance to be a pseudometric; namely, it should fulfill the following properties. • Symmetry, for any G1, G2 ∈ G: dσ(σ(G1), σ(G2)) = dσ(σ(G2), σ(G1)) • Triangle inequality, for any G1, G2, G3 ∈ G: dσ(σ(G1), σ(G3)) ≤ dσ(σ(G1), σ(G2)) + dσ(σ(G2), σ(G3)) These properties characterize a large family of distances, yet do not reflect their expressiveness. We require expressive distances to be permutation-invariant, scale-adaptive, and size-invariant. Permutation-invariance implies that if two graphs' structure are the same (i.e., if the two graphs are isomorphic) the distance of their representations is zero. A graph G1 = (V1, E1) is isomorphic to another graph G2 = (V2, E2), or G1 ≃ G2, if there exists a bijective function µ : V1 → V2 such that (µ(u), µ(v))∈E2 for each (u, v)∈E1. Property 1 (Permutation-invariance). A distance dσ on rep- resentation σ is permutation-invariant iff: ∀G1, G2, G1 ≃ G2 ⇒ dσ(σ(G1), σ(G2)) = 0 Scale-adaptivity implies that a representation accounts for both local (edge and node) and global (community) graph features. A global feature cannot be captured by any combination of features on nodes at distance r < D(G) − 1, where D(G) is the diameter (longest shortest-path length) of G. Let the set of all subgraphs of G be ξ(G) = {д ⊏ G : D(д) < D(G)}. We define scale-adaptivity as the property of a representation σ having at least one local feature (i.e., derived only from information encoded in subgraphs ξ(G)), and at least one global feature (i.e., derived by strictly more than the information encoded in any ξ(G)). Using local features only, a similarity measure would deem two graphs sharing local patterns to have near-zero distance although their global properties (such a page-rank features) may differ, and, in reverse, relying on global features only would miss local structures (such as edge distributions). We aim for a representation adaptive to both local and global structures on demand. Property 2 (Scale-adaptivity). A representation σ is scale- adaptive iff it contains both local features σi and global features σj : • Local Feature: ∀G ∃f (·) : σi = f (ξ(G)) • Global Feature: ∀G (cid:154)f (·) : σj = f (ξ(G)) 3 Size-invariance is the capacity to discern that two graphs rep- resent the same phenomenon at a different magnitudes (e.g., two criminal circles of similar structures but different sizes should have near-zero distance). We can think of a graph as a representation of a metric space (a manifold in particular) with a small intrinsic dimension. We would then like to abstract away the particular way of sampling that space. Size-invariance postulates that if two graphs originate from the sampling of the same domain M, they should be deemed similar. Property 3 (Size-invariance). A size-invariant distance dσ on representation σ fulfills: ∀M : G1, G2 sampled from M ⇒ dσ(σ(G1), σ(G2)) = 0 An expressive means of graph comparison should employ a representation fulfilling the above properties. NetLSD, presented in the sequel, is a graph representation that allows for easy and expressive graph comparison. 4 NETLSD: NETWORK LAPLACIAN SPECTRAL DESCRIPTOR Defining a representation fulfilling the requirements of permuta- tion-, scale-, size- invariance, and efficiency is tough; in general, structures are hard to compare. Thus, we transfer the problem to the spectral domain. A useful metaphor is that of heating the graph's nodes and observing the heat diffusion as time passes. Another useful metaphor is that of a system of masses corresponding to the graph's nodes and springs corresponding to its edges. The propa- gation of mechanical waves through the graph is another way to capture its structural invariants. In both cases, the overall process describes the graph in a permutation-invariant manner, and em- bodies more global information as time elapses. Our representation employs a trace signature encoding such a heat diffusion or wave propagation process over time. We compare two graphs via the L2 distance among trace signatures sampled at selected time scales. − 1 2 AD the degree of node i as entry Dii, i.e, Dii =n 4.1 Spectra as representations The adjacency matrix of a graph G is a n×n matrix A having Aij =1 if (i, j) ∈ E and Aij =0 otherwise. A graph's normalized Laplacian is − 1 the matrix L =I−D 2 , where D is the diagonal matrix with j=1 Aij. Since the Laplacian is a symmetric matrix, its eigenvectors ϕ1, . . . , ϕn, are real and orthogonal to each other. Thus, it is factorized as L = ΦΛΦ⊤, where Λ is a diagonal matrix on the sorted eigenvalues λ1 ≤ . . . ≤ λn of which ϕ1, . . . , ϕn are the corresponding eigenvectors, and Φ is an orthogonal matrix obtained by stacking the eigenvectors in columns Φ = [ϕ1ϕ2 . . . ϕn]. The set of eigenvalues {λ1, . . . , λn} is called the spectrum of a graph. The Normalized Laplacian, as opposed to the unnormalized version L = D−A, has a bounded spectrum, 0 ≤ λi ≤ 2. Belkin and Niyogi [3] showed that eigenvectors of the normal- ized Laplacian of a point cloud graph converge to the eigenfunction of the Laplace-Beltrami operator [5] on the underlying Riemannian manifold. In general, the normalized Laplacian has more attractive theoretical properties than its unnormalized counterparts [48]. The Laplacian spectrum encodes important graph properties, such as the normalized cut size [41] used in spectral clustering. Like- wise, the normalized Laplacian spectrum can determine whether a graph is bipartite, but not the number of its edges [13]. Rather than using the Laplacian spectrum per se, we consider an associated heat diffusion process on the graph, to obtain a more expressive repre- sentation, in a manner reminiscent of random walk models [12]. The heat equation associated with the Laplacian is = −Lut , ∂ut ∂t (1) where ut are scalar values on vertices representing the heat of each vertex at time t. The solution to the heat equation provides the heat at each vertex at time t, when the initial heat u0 is initialized with a fixed value on one of the vertices. Its closed-form solution is given by the n × n heat kernel matrix: −t L = (2) where (Ht)ij represents the amount of heat transferred from vertex vi to vertex vj at time t. We can also compute the heat kernel matrix directly by exponentiating the Laplacian eigenspectrum [13]: −t λj ϕjϕ n Ht = e ⊤ j , j=1 e −t ΛΦ ⊤ (3) As the heat kernel involves pairs of nodes, it is not directly usable to compare graphs. We rather consider the heat trace at time t: Ht = Φe ht = tr(Ht) = −t λj e (4) j Then our NetLSD representation consists of a heat trace sig- nature of graph G, i.e., a collection of heat traces at different time scales, h(G) = {ht }t >0. Alternative signatures. The heat kernel can be viewed as a family of low-pass filters, F(λ) = e−λt , parametrized by the scale parameter t, hence the heat trace signature contains low frequency (i.e., large- scale) information at every scale. Other kernels deemphasize the influence of low frequencies. For example, the wave equation, (5) which describes the amplitude ut of a wave propagating in a medium, has, in its turn, a solution given by the wave kernel: −it λj ϕjϕ ⊤ j (6) ∂2ut ∂t2 = −Lut , n wt = tr(Wt) = −it L = j=1 e e Wt = e (note the complex exponential) and a corresponding wave trace signature with t ∈ [0, 2π): −it λj (7) j 4.2 Scaling to large graphs The full eigendecomposition of the Laplacian L = ΦΛΦ⊤ takes O(n3) time and Θ(n2) memory. This allows to compute signatures of graphs with over a thousand nodes in less than a second on commodity hardware, yet renders direct computation impossible for larger graphs. Thus, we need to approximate heat trace signatures. We propose two different methods to that end. 4 Our first proposal is to use a Taylor expansion; while this mathematical tool provides a rather dubious approximation of a matrix exponential, as its convergence rate depends on the largest eigenvalue [32], it is useful on small time scales t, and allows for an inexpensive computation of its first two terms, ≈ n − t tr(L) + t2 tr((−tL)k) graphs, as tr(L) = n and tr(cid:0)L2(cid:1) = These first two terms are easily computed, even for very large 2 since L is self-adjoint. This way, we can compare two graphs locally in O(m). 2 tr(L2) ∞ ij Lij ht = k =0 (8) k! r o r r e . g v A 10−1 10−3 10−5 10−7 10−9 10−11 10−2 10−1 t 1 Taylor term 2 Taylor terms 100 Figure 2: Relative approximation error of normalized ht for Erdős-Rényi random graphs, varying time scale t. Figure 2 depicts the error in approximating the normalized heat trace by a Taylor expansion for random graphs of varying sizes; this error is independent of graph size, and stays low until time scale 1. At larger time scales, the influence of high frequencies (i.e., the higher part of the spectrum) on the heat trace decreases. Thus, one can approximate the heat trace signature using the lower part of the eigenspectrum, as in shape analysis [11, 29, 42, 46]. Thus, we may apply the low-order Taylor expansion for small t and the truncated spectrum approximation for large t. However, this approach misses out on the medium scale, as Figure 3 illustrates. Besides, this technique does not lend itself to comparing graphs with different numbers of computed eigenvalues, since the spectrum discretization ratio is not normalized across the networks. 4,000 3,000 t h 2,000 1,000 0 10−2 True ht Taylor + 100 eig. 10−1 100 t 101 102 Figure 3: Heat trace approximation by two Taylor terms and 100 eigenvalues on a random blockmodel [22] graph. (a) Small t (0.5) Figure 4: The diagonal of Ht at different scales on the Karate club graph; at a large scale, the field reflects node centrality. (b) Medium t (4.5) (c) Large t (55,555) vector used in spectral graph clustering [41], as it encodes global connectivity. Thus, the heat kernel localizes around its diagonal, and the degree of localization depends on the scale t; it can thereby be tuned to produce both local and global features. Figure 5 illustrates heat kernel locality, focusing on a single row of Ht corresponding to the node marked with a red arrow; the kernel is localized in the region marked with a dotted line. Size-invariance. While the normalized Laplacian alleviates the problem of different edge densities [13], the Taylor expansion in Equation 8 manifests that h(G) contains information about the number of nodes. Fortunately, we can employ neutral graphs for normalization, namely the empty and the complete graph with n nodes. Eigenvalues of the normalized Laplacian of an empty graph ¯Kn of size n are all zero; for a complete graph Kn, they are given by a vector of one zero and n−1 ones. Thus, the heat traces of these graphs are analytically computed as: ht( ¯Kn) = 1 ht(Kn) = 1 + (n − 1)e n −t . and their wave traces are: wt( ¯Kn) = 1 wt(Kn) = 1 + (n − 1) cos(t). n Either option can be used to normalize the heat or wave trace signatures. Such normalization can be interpreted as a modification of the corresponding diffusivity tensor (for the heat trace) or the elasticity tensor (for the wave trace). We provide more details in Section 5. 4.4 Connection to computational geometry Mémoli [30] suggests a spectral definition of the Gromov-Wasser- stein distance between Riemannian manifolds based on matching the heat kernels at all scales. The cost of matching a pair of points (x, x′) on manifold M to a pair of points (y, y′) on manifold N at scale t is given by Γ(x, y, x , t) = H ′) − H (x, x N t (y, y ′). M t ′ ′ , y The distance between the manifolds is then defined in terms of the infimal measure coupling d(M,N) = inf µ −2(t +t−1) ∥Γ∥L2(µ×µ), e sup t >0 Figure 5: Visualization of the diagonal in the heat kernel ma- trix Ht for the pointed vertex at scale t =0.3 We conclude that the Taylor expansion is useful on very large graphs, on which eigendecomposition is prohibitive. For manage- able graph sizes, we adopt a more accurate strategy [32] based on approximating the eigenvalue growth rate, as in [46]: we com- pute k eigenvalues on both ends of the spectrum, and interpolate a linear growth of the interloping eigenvalues. This strategy as- sumes that on the medium scale the manifold defining the graph is two-dimensional, as Weyl's law of asymptotic eigenvalue growth suggests [50]. Since we only need to compute extreme eigenval- ues, we use the block Krylov-Schur implementation in SLEPc [20]. Graph Laplacians always have a zero eigenvalue with eigenspace dimension equal to the number of connected components; we de- flate the search space for the eigensolver thanks to this property. In our experimental study, we employ this interpolation technique; In Section 5.1, we evaluate its approximation quality. 4.3 Properties of the heat trace Here, we discuss how the heat trace signatures achieves our target representation properties. Permutation-invariance. The permutation invariance of h(G) follows from the properties of the spectrum: isomorphic graphs are isospectral, hence their respective heat trace signatures are equal. Scale-adaptivity. The heat kernel can be seen as continuous-time random walk propagation, and its diagonal (sometimes referred to as the autodiffusivity function or the heat kernel signature) can be seen as a continuous-time PageRank [12]. Figure 4 shows the heat kernel signature with small (a), medium (b), and large (c) t; with large t, the heat tends to focus on central nodes. As t approaches zero, the Taylor expansion yields Ht ≃ I − Lt, meaning the heat kernel depicts local connectivity. On the other ⊤, where ϕ2 is the Fiedler hand, for large t, Ht ≃ I − e−λ2t ϕ2ϕ2 5 2 ∥ ) G 2 ( ∥ k ) h − ) ( h ∥ G G ( h ∥ 100 10−1 10−2 10−3 Bottom k, linear growth Top and bottom k/2, linear growth 2 ∥ ) G 2 ( ∥ k ) h − ) ( h ∥ G G ( h ∥ 100 200 300 400 500 k 100 10−1 10−2 10−3 10−4 10−5 10−6 10−7 Bottom 300, linear growth Top and bottom 150, linear growth 10−2 10−1 100 t 101 102 (a) Error vs. k (b) Error vs. t Figure 6: Relative error in spectrum computation of h(G), averaged across 2085 graphs. where the infimum is sought over all measures on M ×N marginal- izing to the standard measures on M and N. Mémoli [30] shows that this distance can be lower bounded by M −2(t +t−1) h t − h N t d(M,N) ≥ sup t >0 . e In other words, the lower bound is the scaled L∞ distance between the heat trace signatures h(M) and h(N). We effectively adopt this result mutatis mutandis to graphs, sub- stituting the Laplace-Beltrami operator of the manifold with the normalized graph Laplacian; we then sample the heat trace sig- nature at a finite number of scales, rendering it a versatile vector representation of a graph, as other works produce vector represen- tations of graph vertices [37, 44]. This lower bound implies that, if the distance between heat trace signatures is sufficiently large, the compared graphs cannot be similar. Unlike the spectral Gromov- Wasserstein distance, distances between heat trace signatures are easily indexable; thus, the derived bound allows for efficiently prun- ing of dissimilar graphs while working with the index alone, as with any lower-bounding scheme for high-dimensional search [23, 43]. dataset MUTAG PTC PROTEINS NCI1 NCI109 ENZYMES D&D COLLAB IMDB-B IMDB-M REDDIT-S REDDIT-M REDDIT-X REDDIT-L G 188 344 1113 4110 4127 600 1178 5000 1000 1500 9543 2000 2085 291 Y 2 2 2 2 2 6 2 3 2 3 2 2 - 2 vertices V min 10 2 4 3 4 2 30 32 12 7 100 6 1001 4445 avg 17.93 25.56 39.06 29.87 29.68 32.63 284.3 74.49 19.77 13.00 337.8 429.6 1447.2 97491 max 28 109 620 111 111 126 5748 492 136 89 999 3782 5242 1632141 Table 2: Dataset properties. 5 EXPERIMENTAL EVALUATION We evaluate1 NetLSD against NetSimile [6] and FGSD [47]. We run the experiments on a 20-core Intel Xeon CPU E5-2640v4, 3.20GHz 1Source code and data are available at https://github.com/xgfs/NetLSD 6 machine with 256Gb RAM. Each method is assessed on the best parameters through cross-validation. We require each method to complete within one day, or else an early termination is issued. We used graph-tool [36] for graph manipulation and synthetic graph generation. Benchmarks. We compare to the following comparison methods. NetSimile [6]: a representation using handcrafted features ob- tained by aggregating statistics on nodes and edges (e.g., average degree, standard deviation of the degree of the neighbors). For each graph, the resulting representation has 35 dimensions. As recom- mended in [6], we use the Canberra2 distance for comparison. FGSD [47]: a method that computes histograms on the biharmonic kernel of the graph. Such histograms typically bear large dimen- sionality (≥50.000) using the recommended bin-width 0.0001. Parameter settings. Unless otherwise stated, we repeat each ex- periment 100 times and report the average across all trials. NetLSD is instantiated to both heat h(G) and wave w(G) trace signature described Section 4.1. In addition, we evaluate our normalized ver- sions: the normalization with empty graph h(G)/h( ¯K), w(G)/w( ¯K) and the normalization with complete graph h(G)/h(K), w(G)/w(K). To build NetLSD signature vectors, we need to sample a number of traces, i.e., values of t. After experimentation, we settled for 250 val- ues evenly spaced on the logarithmic scale in the range [10−2, 102]; we attested this to be a good choice in terms of the quality-size tradeoff, hence use these settings in all experiments, with both heat and wave signatures. With small graphs, we employ the full eigendecomposition to produce the trace for each t value. With the larger REDDIT-L graph, we use 300 eigenvalues, 150 from each side of the eigenspectrum, by default, unless indicated otherwise; we validate these choices in Section 5.1 (cf. Figure 6). Datasets. We use six graph collections from bioinformatics [52] and three social networks. COLLAB, and IMDB-(B/M) graph collec- tions are obtained sampling neighborhoods of nodes in a collabora- tion and movie network, respectively. REDDIT-S, REDDIT-M, and REDDIT-L are selected among small (at most 1000 nodes), medium (at most 4000 nodes) and large (> 4000 nodes) subreddits3, respec- tively. We report their main characteristics in Table 2: number of graphs G, number of labels for classification Y, minimum, average, and maximum number of vertices. 2https://en.wikipedia.org/wiki/Canberra_distance 3https://dynamics.cs.washington.edu/data.html dataset MUTAG PTC PROTEINS NCI1 NCI109 ENZYMES COLLAB IMDB-B IMDB-M dataset MUTAG PTC PROTEINS NCI1 NCI109 ENZYMES D&D COLLAB IMDB-B IMDB-M REDDIT-M REDDIT-S h(G) 76.03 56.41 91.81 69.74 68.60 92.51 59.82 67.18 74.45 h(G) 86.47 55.30 64.89 66.49 65.89 31.99 69.86 68.00 68.04 40.51 43.12 83.67 h(G)/h( ¯K) h(G)/h(K) 79.12 62.53 94.90 74.55 73.76 95.20 65.85 70.58 75.51 78.22 63.11 95.31 69.89 69.48 95.70 69.74 69.22 75.54 w(G) 78.18 58.55 93.04 70.54 70.75 94.03 69.01 75.26 77.99 w(G)/w( ¯K) w(G)/w(K) 79.72 64.28 89.00 74.14 73.96 90.77 70.35 75.54 78.68 79.38 60.46 91.27 70.90 70.67 90.10 71.89 74.13 76.97 Table 3: ROC AUC in detecting whether a graph is real. h(G)/h( ¯K) h(G)/h(K) 85.32 52.76 65.73 67.44 66.93 33.31 68.38 69.42 70.17 40.34 40.62 81.77 84.66 51.16 65.36 64.82 64.78 37.19 67.09 69.70 69.45 40.10 39.08 83.73 w(G) 83.35 54.97 66.80 70.78 69.32 40.41 68.77 75.77 68.63 42.66 41.49 84.49 w(G)/w( ¯K) w(G)/w(K) 81.72 54.53 65.58 67.67 67.08 35.78 65.39 77.24 69.33 42.00 38.65 70.47 82.22 53.40 62.27 62.19 63.53 28.75 65.12 67.37 61.67 39.71 41.24 79.46 Table 4: Accuracy in 1-NN Classification. FGSD 77.79 54.75 60.11 64.08 64.28 53.93 55.18 56.23 56.31 FGSD 84.90 60.28 65.30 75.77 74.59 41.58 70.47 73.96 69.54 41.14 41.61 88.95 NetSimile 77.11 62.12 85.73 58.58 58.76 87.38 54.43 54.44 48.06 NetSimile 84.09 61.26 62.45 66.56 65.72 33.23 64.89 73.10 69.20 40.97 41.32 89.65 5.1 Approximation quality First, we study the quality of the approximation technique of Sec- tion 4.2. Figure 6 reports relative error results in terms of devia- tion from the exact version, averaged over 2085 REDDIT-X graphs. Specifically, Figure 6a shows the quality of the approximation vary- ing the number of eigenvalues k, using only the k-smallest (blue line) and the k/2-smallest and k/2-largest eigenvalues (green line). Using eigenvalues from the two ends of the spectrum achieves consistently better performance. Figure 6b shows the impact of t in the approximation. The prediction is easier at large t, as the spectrum converges to the constant value 1; at medium t values, the approximation is harder. Still, the use of the lowest and largest eigenvalues delivers almost an order of magnitude higher accuracy than using only one side of the spectrum, vindicating our choice of approximation. 5.2 Identifying real-world networks We devise a binary classification task of detecting whether a graph is real or synthetic. Such tasks are critical in anomaly detection and detecting bots and trolls in social networks. To render the task challenging enough, rather than generating purely random graphs (which are easy to detect), we produce synthetic graphs by rewiring real ones while preserving their degree distribution, using 10 iterations of shuffling all their edges via Metropolis-Hastings sampling [36]. We consider a label indicating whether the graph has been rewired. We label 80% of the dataset and test 20%, pre- dicting a graph's label as that of its Nearest Neighbor (1-NN) by each similarity measure, and report the average across 100 trials. Table 3 shows our results, in terms of ROC AUC, for all datasets and measures. These results confirm the effectiveness of NetLSD. Method h(G) h(G)/h( ¯K) h(G)/h(K) w(G) w(G)/w( ¯K) w(G)/w(K) Table 5: Accuracy in 1-NN Classification with REDDIT-L. 100 68.91 62.69 70.11 71.27 64.79 64.51 k 200 68.89 61.74 69.40 69.93 65.81 69.49 300 68.01 61.88 70.88 68.93 65.90 72.64 5.3 Graph classification We now assess NetLSD on a traditional task of 1-NN graph clas- sification, using labels as provided in the datasets in question and splitting training and testing as in the previous experiments. Table 4 reports the quality in terms of ROC AUC, averaged over 1000 trials. Again, NetLSD is on a par with other methods. We additionally report in Table 5 the quality results for the largest dataset at our disposal (REDDIT-L). NetSimile and FGSD cannot scale to such large graphs and therefore we do not report on them; on the other hand, NetLSD processes graphs with millions of nodes and attains good overall quality. 7 5.4 Discerning community structures Communities are set of vertices sharing common characteristics in terms of connectivity and attributes. Community detection [24, 41] is one of the prototypical, yet only partially solved, tasks in graphs. An expressive graph distance should discriminate graphs with community structure from those without. To evaluate the expressiveness of NetLSD in terms of communi- ties, we devise a graph classification experiment: We generate some graphs with community structure and some without, and the clas- sifier's task is to predict whether test set graphs have community structure. We employ a simple 1-NN classifier, as our goal is to test the representation's expressiveness rather than the performance of the classifier. We generate 1000 random graphs with Poisson degree distribution P(λ) with mean degree λ = 10 and fixed size. Then, we sample another 1000 graphs from the stochastic block model (SBM) [22] with 10 communities, following the same degree distribution. The stochastic block model produces graphs with clear community structure as opposed to random ones. We use 80% of the dataset for training, and 20% for testing, repeat the experiment with different training and testing sets, and report the average across trials. Table 6 reports the average quality for discerning SBM graphs by 1-NN classification in terms of ROC-AUC, as we vary the graph size in (64, 128, 256, 512, 1024). NetLSD significantly outperforms the competitors and improves in quality on larger graphs. While discriminating very small communities is intuitively harder than distinguishing large ones, the performance of both FGSD and Net- Simile drops with increasing size, suggesting that these methods only capture local, small-scale variations. This result verifies the capacity of NetLSD to capture global and local characteristics. 64 57.40 57.42 56.71 57.47 57.44 56.75 58.00 65.73 256 77.42 77.41 77.50 73.95 73.96 73.06 55.46 61.51 Number of nodes n 128 512 82.83 68.37 82.84 68.40 83.31 67.96 66.97 78.43 78.43 66.98 77.05 66.26 53.43 55.73 61.31 61.86 1024 Method h(G) 84.63 h(G)/h( ¯K) 84.63 h(G)/h(K) 85.12 w(G) 80.26 w(G)/w( ¯K) 80.25 w(G)/w(K) 78.76 51.57 FGSD 61.58 NetSimile Table 6: Accuracy in detecting graphs with communities. In the second experiment we evaluate the size-invariance of NetLSD: The task is to discriminate fixed-size communities in graphs of increasing size. Therefore, we sample the number of nodes n from a Poisson distribution P(λ = n) with variance λ, and then generate a network with n nodes. Again, we repeat the process 1000 times with purely random generated graphs and 1000 with ran- dom graphs with community structure, and perform a classification experiment as before. Table 7 reports the results, for increasing λ. Once again, NetLSD outperforms the competitors. This result con- firms that the normalization proposed in Section 4.3 is effective in detecting community structures in graphs of different size. Table 7 also indicates that, while both normalizations are similarly effective with the wave kernel, the complete-graph normalization produces worse, but still competitive, results with the heat kernel. n ∼ P(λ) 64 54.39 54.53 54.37 56.23 55.51 56.69 55.44 59.55 128 59.01 62.27 60.93 63.77 63.85 64.92 54.99 56.57 Method h(G) h(G)/h( ¯K) h(G)/h(K) w(G) w(G)/w( ¯K) w(G)/w(K) FGSD NetSimile Table 7: Accuracy in detecting graphs with communities, Poisson distribution of graph size. 1024 53.80 78.40 65.23 70.34 79.39 77.50 50.92 60.58 512 57.99 76.45 68.24 71.66 77.59 75.91 52.74 66.23 256 60.82 70.83 66.86 69.57 72.12 71.81 53.86 59.41 Last, we assess the size-invariance of NetLSD in a tough regime: discriminating communities in graphs with a number of nodes cho- sen uniformly at random. We sample the number of nodes n from the uniform distribution U(10, λ); other experimental settings re- main the same. Table 8 reports the results with growing λ. NetLSD outperforms the competitors once again, yet the results suggest that this task is more challenging. Complete-graph normalization for the wave kernel and empty-graph normalization for the heat kernel perform best. We conclude that, for fully size-agnostic comparisons, normalization should be chosen carefully. n ∼ U(10, λ) 64 51.16 51.19 51.69 52.38 51.61 52.63 57.92 63.63 Method h(G) h(G)/h( ¯K) h(G)/h(K) w(G) w(G)/w( ¯K) w(G)/w(K) FGSD NetSimile Table 8: Accuracy in detecting graphs with communities, Uniform distribution of graph size. 512 51.05 59.10 55.29 61.18 60.06 67.95 52.74 54.34 1024 50.08 59.71 53.43 59.13 61.01 71.19 52.15 53.11 256 51.62 56.63 55.43 59.81 57.83 62.85 54.94 55.75 128 51.98 53.36 53.67 55.89 54.67 57.48 55.62 58.31 5.5 Case Study Here, we visualize the discovery potential of using NetLSD as a similarity measure. We run a furthest pair query on all graphs in our collection bar those in the REDDIT-L dataset, which are harder to visualize readably; thereby, we discover the two graphs of lowest similarity, using the normalized heat kernel. Figure 7 shows those two graphs: a protein interaction network from the D&D dataset and an enzyme's tertiary structure from the ENZYMES dataset. These two graphs are conspicuously different across multiple scales, from local patterns to global structure. The interaction network in Fig- ure 7a is a small-world graph with large clustering coefficient (0.425) and small diameter (D = 9), whereas the tertiary structure in Fig- ure 7b is a connected collection of paths of big length with negligible clustering coefficient (0.006) and large (D = 32) diameter. 8 (a) Protein network. V = 190, E = 744, D = 9. (b) Enzyme. V = 125, E = 141, D = 32. Figure 7: Two most dissimilar graphs by h(G)/h( ¯K) across all small-size graphs in datasets used. Communities are colored. 103 ) s ( e m i t 102 101 104 105 106 n Figure 8: Time to compute 300 eigenvalues on both ends of the spectrum and the approximation of h(G). 5.6 Scalability Last, we corroborate the scalability of NetLSD. Figure 8 shows the time to compute 300 eigenvalues for the approximation of h(G) on graphs of increasing size from the REDDIT dataset. Our method computes the similarity on graphs of one million (106) nodes in only 16 minutes, while previous methods could not complete the process within one day. This result illustrates the fitness of NetLSD a scalable comparison method among real-size graphs. 6 CONCLUSIONS We proposed NetLSD, a representation for graph comparison rely- ing neither on (i) graph alignment operations, nor on (ii) computa- tionally-demanding kernel computations, nor on (iii) supervised representation learning. NetLSD is a multi-scale heat trace sig- nature of a graph Laplacian spectrum, which lower-bounds the Gromov-Wasserstein distance as it incorporates heat traces cov- ering all scales. We derived a novel approximation of heat traces, rendering NetLSD efficiently computable, and a normalization scheme, rendering it size-invariant. To our knowledge, this is the first graph representation that achieves these properties and allows for comparisons at multiple scales. Our experiments show that NetLSD outperforms NetSimile and FGSD, two state-of-the-art representation-based methods for graph comparison, on a variety of graph collections on community detection and graph classification. 9 REFERENCES [1] Leman Akoglu, Mary McGlohon, and Christos Faloutsos. 2010. Oddball: Spotting anomalies in weighted graphs. In PAKDD. 410–421. [2] Mathieu Aubry, Ulrich Schlickewei, and Daniel Cremers. 2011. The wave kernel signature: A quantum mechanical approach to shape analysis. In ICCV Workshops. IEEE, 1626–1633. [3] Mikhail Belkin and Partha Niyogi. 2007. Convergence of Laplacian eigenmaps. [4] Jose Bento and Stratis Ioannidis. 2018. A Family of Tractable Graph Distances. [5] Marcel Berger. 2012. A panoramic view of Riemannian geometry. Springer Science In NIPS. 129–136. In SDM. & Business Media. [6] Michele Berlingerio, Danai Koutra, Tina Eliassi-Rad, and Christos Faloutsos. 2013. Network similarity via multiple social theories. In ASONAM. 1439–1440. [7] Stephen Bonner, John Brennan, Ibad Kureshi, G Theodoropoulos, and AS Mc- Gough. 2016. Efficient Comparison of Massive Graphs Through The Use Of Graph Fingerprints. In Twelfth Workshop on Mining and Learning with Graphs (MLG) Workshop at KDD'16. [8] Karsten M Borgwardt and Hans-Peter Kriegel. 2005. Shortest-path kernels on graphs. In Data Mining, Fifth IEEE International Conference on. IEEE, 8–pp. [9] Alexander M Bronstein, Michael M Bronstein, Leonidas J Guibas, and Maks Ovsjanikov. 2011. Shape google: Geometric words and expressions for invariant shape retrieval. TOG 30, 1 (2011), 1. [10] Alexander M Bronstein, Michael M Bronstein, and Ron Kimmel. 2006. Efficient computation of isometry-invariant distances between surfaces. SIAM Journal on Scientific Computing 28, 5 (2006), 1812–1836. [11] Michael M Bronstein and Alexander M Bronstein. 2011. Shape recognition with spectral distances. IEEE Transactions on Pattern Analysis and Machine Intelligence 33, 5 (2011), 1065–1071. [12] Fan Chung. 2007. The heat kernel as the pagerank of a graph. Proceedings of the National Academy of Sciences 104, 50 (2007), 19735–19740. [13] Fan RK Chung. 1997. Spectral graph theory. Number 92. American Mathematical [14] Andreas Fischer, Ching Y Suen, Volkmar Frinken, Kaspar Riesen, and Horst Bunke. 2015. Approximation of graph edit distance based on Hausdorff matching. Pattern Recognition 48, 2 (2015), 331–343. [15] Ran Gal, Ariel Shamir, and Daniel Cohen-Or. 2007. Pose-oblivious shape signature. IEEE transactions on visualization and computer graphics 13, 2 (2007), 261–271. [16] Michael R Garey and David S Johnson. 2002. Computers and intractability. Vol. 29. wh freeman New York. [17] Thomas Gärtner, Peter Flach, and Stefan Wrobel. 2003. On graph kernels: Hard- ness results and efficient alternatives. In Learning Theory and Kernel Machines. Springer, 129–143. [18] Karam Gouda and Mosab Hassaan. 2016. CSI_GED: An efficient approach for graph edit similarity computation. In ICDE. 265–276. [19] Hans Heinrich Günthard and Hans Primas. 1956. Zusammenhang von Graphen- theorie und MO-Theorie von Molekeln mit Systemen konjugierter Bindungen. Helvetica Chimica Acta 39, 6 (1956), 1645–1653. [20] Vicente Hernandez, Jose E. Roman, and Vicente Vidal. 2005. SLEPc: A scalable and flexible toolkit for the solution of eigenvalue problems. ACM Trans. Math. Software 31, 3 (2005), 351–362. [21] Mark Kac. 1966. Can one hear the shape of a drum? The american mathematical monthly 73, 4 (1966), 1–23. Soc. [22] Brian Karrer and Mark EJ Newman. 2011. Stochastic blockmodels and community Cybernetics 13, 3 (1983), 353–362. structure in networks. Physical review E 83 (2011). [23] Shrikant Kashyap and Panagiotis Karras. 2011. Scalable kNN search on vertically stored time series. In KDD. 1334–1342. [24] Kyle Kloster and David F Gleich. 2014. Heat kernel based community detection. [40] Nino Shervashidze, Pascal Schweitzer, Erik Jan van Leeuwen, Kurt Mehlhorn, and Karsten M Borgwardt. 2011. Weisfeiler-lehman graph kernels. Journal of Machine Learning Research 12, Sep (2011), 2539–2561. [41] Jianbo Shi and Jitendra Malik. 2000. Normalized cuts and image segmentation. In KDD. 1386–1395. NIPS. 2990–2998. [25] Risi Kondor and Horace Pan. 2016. The multiscale laplacian graph kernel. In [26] Danai Koutra, Joshua T Vogelstein, and Christos Faloutsos. 2013. Deltacon: A principled massive-graph similarity function. In SDM. 162–170. [27] Yongjiang Liang and Peixiang Zhao. 2017. Similarity Search in Graph Databases: A Multi-Layered Indexing Approach. In ICDE. 783–794. [28] Chih-Long Lin. 1994. Hardness of Approximating Graph Transformation Problem. In ISAAC. 74–82. [29] Roee Litman and Alexander M. Bronstein. 2014. Learning Spectral Descriptors for Deformable Shape Correspondence. IEEE Trans. Pattern Anal. Mach. Intell. 36, 1 (2014), 171–180. [30] Facundo Mémoli. 2011. A spectral notion of Gromov–Wasserstein distance and related methods. Applied and Computational Harmonic Analysis 30, 3 (2011), 363–401. [31] Facundo Mémoli and Guillermo Sapiro. 2005. A theoretical and computational framework for isometry invariant recognition of point cloud data. Foundations of Computational Mathematics 5, 3 (2005), 313–347. [32] Cleve Moler and Charles Van Loan. 2003. Nineteen dubious ways to compute the exponential of a matrix, twenty-five years later. SIAM review 45, 1 (2003), 3–49. [33] Giannis Nikolentzos, Polykarpos Meladianos, and Michalis Vazirgiannis. 2017. Matching Node Embeddings for Graph Similarity.. In AAAI. 2429–2435. [34] Robert Osada, Thomas Funkhouser, Bernard Chazelle, and David Dobkin. 2002. Shape distributions. ACM Transactions on Graphics (TOG) 21, 4 (2002), 807–832. [35] Panagiotis Papadimitriou, Ali Dasdan, and Hector Garcia-Molina. 2010. Web graph similarity for anomaly detection. Journal of Internet Services and Applica- tions (2010), 19–30. [36] Tiago P. Peixoto. 2014. The graph-tool python library. figshare (2014). https: //doi.org/10.6084/m9.figshare.1164194 [37] Leonardo Filipe Rodrigues Ribeiro, Pedro H. P. Saverese, and Daniel R. Figueiredo. 2017. struc2vec: Learning Node Representations from Structural Identity. In KDD. 385–394. [38] Kaspar Riesen and Horst Bunke. 2009. Approximate graph edit distance compu- tation by means of bipartite graph matching. Image and Vision computing 27, 7 (2009), 950–959. [39] Alberto Sanfeliu and King-Sun Fu. 1983. A distance measure between attrib- uted relational graphs for pattern recognition. IEEE Trans. Systems, Man, and PAMI 22, 8 (2000), 888–905. [42] Jian Sun, Maks Ovsjanikov, and Leonidas Guibas. 2009. A concise and provably informative multi-scale signature based on heat diffusion. In Computer graphics forum, Vol. 28. Wiley Online Library, 1383–1392. [43] Yufei Tao, Ke Yi, Cheng Sheng, and Panos Kalnis. 2009. Quality and efficiency in high dimensional nearest neighbor search. In SIGMOD. 563–576. [44] Anton Tsitsulin, Davide Mottin, Panagiotis Karras, and Emmanuel Müller. 2018. VERSE: Versatile Graph Embeddings from Similarity Measures. In the 2018 Web Conference. 539–548. [45] Edwin R. van Dam and Willem H. Haemers. 2003. Which graphs are determined by their spectrum? Linear Algebra Appl. 373 (2003), 241 – 272. [46] Amir Vaxman, Mirela Ben-Chen, and Craig Gotsman. 2010. A multi-resolution approach to heat kernels on discrete surfaces. In TOG, Vol. 29. 121. [47] Saurabh Verma and Zhi-Li Zhang. 2017. Hunt For The Unique, Stable, Sparse And Fast Feature Learning On Graphs. In NIPS. 87–97. [48] Ulrike Von Luxburg, Mikhail Belkin, and Olivier Bousquet. 2008. Consistency of spectral clustering. The Annals of Statistics (2008), 555–586. [49] Ulrike Von Luxburg, Agnes Radl, and Matthias Hein. 2010. Hitting and commute times in large graphs are often misleading. arXiv preprint arXiv:1003.1266 (2010). [50] Hermann Weyl. 1911. Über die asymptotische Verteilung der Eigenwerte. Nachrichten von der Gesellschaft der Wissenschaften zu Göttingen, Mathematisch- Physikalische Klasse (1911), 110–117. [51] Richard C Wilson and Ping Zhu. 2008. A study of graph spectra for comparing graphs and trees. Pattern Recognition 41, 9 (2008), 2833–2841. [52] Pinar Yanardag and SVN Vishwanathan. 2015. Deep graph kernels. In KDD. [53] Ye Yuan, Guoren Wang, Lei Chen, and Haixun Wang. 2015. Graph similarity search on large uncertain graph databases. The VLDB Journal 24, 2 (2015), 271– 296. [54] Zhiping Zeng, Anthony K. H. Tung, Jianyong Wang, Jianhua Feng, and Lizhu Zhou. 2009. Comparing Stars: On Approximating Graph Edit Distance. PVLDB 2, 1 (2009), 25–36. [55] Weiguo Zheng, Lei Zou, Xiang Lian, Dong Wang, and Dongyan Zhao. 2015. Efficient graph similarity search over large graph databases. TKDE 27, 4 (2015), 964–978. [56] Yuanyuan Zhu, Lu Qin, Jeffrey Xu Yu, and Hong Cheng. 2012. Finding top-k similar graphs in graph databases. In EDBT. 456–467. 1365–1374. 10
1610.07090
1
1610
2016-10-22T19:41:44
STEPS: Predicting place attributes via spatio-temporal analysis
[ "cs.SI" ]
In recent years, a vast amount of research has been conducted on learning people's interests from their actions. Yet their collective actions also allow us to learn something about the world, in particular, infer attributes of places people visit or interact with. Imagine classifying whether a hotel has a gym or a swimming pool, or whether a restaurant has a romantic atmosphere without ever asking its patrons. Algorithms we present can do just that. Many web applications rely on knowing attributes of places, for instance, whether a particular restaurant has WiFi or offers outdoor seating. Such data can be used to support a range of user experiences, from explicit query-driven search to personalized place recommendations. However, obtaining these attributes is generally difficult, with existing approaches relying on crowdsourcing or parsing online reviews, both of which are noisy, biased, and have limited coverage. Here we present a novel approach to classifying place attributes, which learns from patrons' visit patterns based on anonymous observational data. Our method, STEPS, learns from aggregated sequences of place visits. For example, if many people visit the restaurant on a Saturday evening, coming from a luxury hotel or theater, and stay for a long time, then this restaurant is more likely to have a romantic atmosphere. On the other hand, if most people visit the restaurant on weekdays, coming from work or a grocery store, then the restaurant is less likely to be romantic. We show that such transition features are highly predictive of place attributes. In an extensive empirical evaluation, STEPS nearly doubled the coverage of a state of the art approach thanks to learning from observational location data, which allowed our method to reason about many more places.
cs.SI
cs
STEPS: Predicting place attributes via spatio-temporal analysis ∗ Shuxin Nie, Abhimanyu Das, Evgeniy Gabrilovich , Wei-Lwun Lu, Boris Mazniker, Chris Schilling Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043 {shnieabhidasgabrweilwunlumaznikercschill}@google.com 6 1 0 2 t c O 2 2 ] I S . s c [ 1 v 0 9 0 7 0 . 0 1 6 1 : v i X r a ABSTRACT In recent years, a vast amount of research has been con- ducted on learning people's interests from their actions. Yet their collective actions also allow us to learn something about the world, in particular, infer attributes of places people visit or interact with. Imagine classifying whether a hotel has a gym or a swimming pool without ever talking to the people who stayed there. Or imagine predicting whether a restau- rant has a happy hour or a romantic atmosphere without asking its patrons. Algorithms we present can do just that. Many web applications rely on knowing attributes of places, for instance, whether a particular restaurant has WiFi or of- fers outdoor seating. Such data can be used to support a range of user experiences, from explicit query-driven search to proactively recommending places the user might like. How- ever, obtaining these attributes is generally difficult, with ex- isting approaches relying on crowdsourcing or parsing online reviews, both of which are noisy, biased, and have limited coverage. Here we present a novel approach to classifying place attributes, which learns from patrons' visit patterns based on anonymous observational data. Our method, STEPS, learns from aggregated sequences of place visits. For example, if many people visit the restau- rant on a Saturday evening, coming from a luxury hotel or theater, and stay for a long time, then this restaurant is more likely to have a romantic atmosphere. On the other hand, if most people visit the restaurant on weekdays, com- ing from work or a grocery store, then the restaurant is less likely to be romantic. We show that such transition features are highly predictive of place attributes. We also introduce a variant of our method, STEPS-E, which builds a high- dimensional embedding model trained on co-visitation data, and completely eliminates the need for feature engineering. In an extensive empirical evaluation, STEPS nearly doubled the coverage of a state of the art approach thanks to learning ∗Corresponding author ISBN X-XXXXX-XX-X/XX/XX. DOI: from observational location data, which allowed our method to reason about many more places. 1. INTRODUCTION "You know my method. It is founded upon the observation of trifles." – Sherlock Holmes. In recent years, numerous web services and applications have been built to facilitate access to information about brick-and-mortar businesses and places such as restaurants, hotels, parks, or tourist sites. These include review sites and recommendation apps (TripAdvisor, Yelp, Zagat), on- line business directories (Urbanspoon, Yellowpages), map- ping services (Google Maps), travel sites (Hotels.com, Ex- pedia), and even web search. Many of these services rely on knowing attributes of places to help users narrow down their search. For example, recommendation web sites often categorize restaurants using a variety of attributes, such as whether a restaurant is a fine-dining or casual place, whether it offers free WiFi or outdoor seating, whether it takes reser- vations or offers take-out. Similarly, travel sites allow users to search for hotels based on attributes such as whether the hotel is frequented by business customers or leisure trav- ellers, and whether it has amenities such as a gym or swim- ming pool. Therefore, identifying these attributes is a criti- cal component in many user-facing applications. However, obtaining these attributes of places in a scalable manner is challenging. Existing approaches have tradition- ally taken one of two routes: (a) Crowdsourcing the task, or (b) Inferring attributes from text analysis of online re- views about the place. The former approach explicitly asks visitors to manually specify attributes of the place. This approach is hard to scale to a large number of places and their attributes, because people are often unwilling to spend time answering questions without any perceived near-term gain. Furthermore, it is difficult to ensure high quality of crowdsourced labels. More recently, several studies have fo- cused on mining customer reviews to extract key attributes of a place, along with customer opinions about these at- tributes [14]. While this approach does not require manual labor (beyond developing a classifier), it also suffers from a number of weaknesses. Reviews are often noisy, verbose and ambiguous, and it is difficult to reliably parse review text to extract information about specific attributes. Reviews also have a major coverage problem. New places have few or no reviews, and even for older places the review text often cov- ers only a few main attributes. For example, many restau- rant reviews talk about the cuisine type, prices or ambience, but only a few (if at all) may explicitly mention whether the restaurant requires reservations, offers take-out, or has out- door seating (see Table 2 for the long list of attributes we predict). Finally, reviews are biased because only a handful of people choose to write them, and usually they were either extremely happy or unhappy with the service. We take a fundamentally different approach, and study the movement of people to infer attributes of places they visit. As a motivating example, imagine you stumbled upon a coffee shop you have never visited before. Over two dozen people are waiting in line. The coffee must be good, you say to yourself, because all those people waiting patiently must know what they are doing. At that very moment you have inferred an attribute of a physical place by observing how people act around it. In this paper, we present algorithms that do just that. We introduce STEPS, Spacio-TEmporal analysis of Place attributeS, which learns from trajectory patterns of patrons' visits to the place. STEPS derives spatial and temporal features from anonymous aggregated Location History data that our users have proactively chosen to share with us.1 The data comes in the form of aggregated visit sequences (before/after visiting a given place), along with place cate- gories (e.g., restaurant or grocery store), binned arrival time, and duration. Similar data is available in the form of place check-ins on Foursquare, Facebook or Yelp, or geo-coded tweets on Twitter. However, the anonymous visit data has much higher coverage (as it does not require explicit check- in) and temporal resolution (we can compute visit durations and arrival times). It is also much less biased than reviews because no effort is required from the visitor. In this paper, we show how this micro-scale visit data allows us to learn new macro-scale facts about the world (place attributes). STEPS uses features based on sequences of other places visited by patrons of a given place, which are often predictive of place attributes. For example, if many people visit a particular restaurant soon after visiting a park or a beach, then the restaurant is more likely to have outdoor seating because it appeals to patrons who like to be outdoors. If a restaurant is often visited for short periods of time in the afternoon, after visiting another restaurant and before going home, then it is likely to offer good desserts. On the other hand, if many people go to a restaurant directly from home or work and stay there for a long time, it is probably good for meals rather than desserts. (See Section 5 for additional examples of visit patterns we use as prediction signals.) One might think that many of these patterns are only weakly correlated with the attribute we are trying to predict. A key insight of this paper is that when we aggregate multiple weak signals over a large population, we can classify many place attributes with high accuracy and coverage. We formulate the problem of attribute classification in a supervised learning setting, and use manually labeled train- ing data. STEPS employs a semi-automatic approach to feature generation, which constructs a large number of fea- tures based on several simple (hand-chosen) properties of co-visited places, for example, their categories (e.g., grocery store or park) and the durations of visits. We then use these features to train a binary classifier for each attribute. 1Users can switch it off at any time via My Account. This is essentially the same data we use in Google Now to notify users about the best time to visit their favorite museum. [3] We also introduce a variant of STEPS called STEPS-E, which completely automates feature construction and learn features directly from the data. STEPS-E performs collab- orative filtering on the co-visitation patterns of people and places to create a high-dimensional embedding (hence "-E") of each place in an underlying latent space. The dimen- sions of the latent space are then treated as automatically- constructed features for training binary classifiers for each attribute. STEPS-E uses low-rank matrix factorization [8] to automatically create 1000-dimensional feature vectors for each place. The latent features in STEPS-E are much fewer than the fine-grained features created in STEPS. However, as evident from the experiments in Section 4, they are rich enough to capture many of the spatio-temporal visit pat- terns useful for attribute classification. The contributions of this paper are threefold. First, we proposed a novel approach to classifying attributes of a place based on other places frequently visited by its patrons. Sec- ond, we employed the richness of aggregated anonymous lo- cation data to automatically construct features that char- acterize nearby locations visited and the time spent there. It should be emphasized that this data is entirely observa- tional, hence no extra effort is required to collect it. Third, we performed a comprehensive evaluation of our approach using real world data spanning several dozen different at- tributes of thousands of places (restaurants and hotels). We compared our results to a state of the art baseline that mines the text of online reviews to infer attributes. We showed that our approach significantly increases the coverage of the baseline method, while exhibiting competitive classification accuracy. Since reviews are not always available and may not mention all the relevant attributes, relying on reviews is a major limitation, which our proposed approach alleviates and nearly doubles the classifier coverage. We also note that the nature of the location data is orthogonal to that of the review text. As a result, when we combine features from the two data sources (reviews + place visits), we observe a further improvement in classification performance. Finally, we present a qualitative study that explains in depth how our method works on several attributes. 2. BACKGROUND With the rapid increase in location-aware applications, there has been a large body of work on location data min- ing and its various use-cases. Several papers have focused on collecting and modeling location data for personalized Point-of-Interest (POI) recommendation. Ye et al. [19] mod- eled users' check-in behavior in location based social net- works, and proposed a collaborative POI recommendation algorithm using Naive Bayes methods. Lian et al. [11] pro- posed a matrix-factorization approach for POI recommenda- tion, by jointly modeling users' geographic preferences and their place-visit data from location based social networks. Zheng et al. [21] mined a large scale GPS dataset to extract correlations between user locations for personalized recom- mendations. Zheng et al. [20] used GPS data along with user text comments to create a location-activity matrix for col- laborative location and activity recommendations. Cheng et al. [1] considered temporal and sequence information to pre- dict a user's next-POI by incorporating personalized Markov Chain information during matrix factorization. Another direction in location data mining deals with mod- eling user trajectories and visit distribution patterns to pre- dict a user's next destination or activity. Li et al. [10] pre- dicted user trajectories using a probabilistic motion model trained on anonymized GPS-snippets. Cheng et al. [2] used check-in data from location based social networks, and learnt a Hidden Markov Model to predict a user's activity and lo- cation at the next step. Lichman et al. [13] modelled a user's spatial distribution using a mixture of Kernel Density Es- timates. Kirmse et al. [7] used location histories obtained from GPS and WiFi signals to infer users' frequently visit places and commute patterns. Laio et al. [12] modeled raw GPS traces using relational Markov networks to simultane- ously infer a user's significant locations and activities. Somewhat related to our work is the recent paper by Zhong et al [22] who used location check-in records to create spatial and temporal location features of users for predicting various user demographics such as age, gender, educational background, etc. However, the focus of our paper is different from [22] (and indeed, from most of the above papers on in- ference using location data) in that we model location data not to predict user attributes, but rather place attributes, and hence our location features are aggregate, population level features, instead of per-user features. While we are not aware of prior work on using location data for extracting place attributes, there has been a large body of work on inferring attributes of products, places and other entities from text mining of online content. In par- ticular, there exists a rich line of work in the area of opin- ion mining [14], which performs text analysis of documents, customer reviews or online discussion forums to identify at- tributes of an entity and extract customer opinions and sen- timents for these attributes. Several of these papers use a notion of frequent noun phrases to identify important at- tributes from reviews [9, 5, 4, 16, 15]. Another class of opin- ion mining papers involves leveraging relationships between potential attributes and sentiment-bearing words (usually adjectives) to discover relevant attributes, and their senti- ment scores. Hu et al. [5] extracted low-frequency attributes by identifying the nearest noun phrases to sentiment-bearing words. Qui et al. [17] used a double propogation method to jointly extract attributes and sentiment words. Zhuang et al. [23] mined relationships between attributes and senti- ment words using a dependency grammer graph, and ex- tracted valid attribute-sentiment pairs for movie reviews. Jakob et al. [6] proposed a supervised CRF-based sequence modeling approach to extract attributes, using features such as the part of speech tags, string tokens, dependency-parse- tree distances, and distance to sentiment words. Wang et al. [18] addresssed the problem of teasing out users' latent ratings on different topical attributes of hotel reviews from users' overall review scores and their review text. 3. METHOD In this section, we provide a detailed description of the STEPS method, which learns from anonymous aggregated observational data about people's place visits. STEPS con- structs spatio-temporal features by mining historical data about sequences of place visits corresponding to a large group of people. Each place visit instance corresponds to a single visit by an anonymous person to a place, and also includes the category of the place (e.g., restaurant, hotel, or park), and discretized arrival time and visit duration. We use a taxonomy of several thousand place categories. The key intuition here is that the sequence of places peo- ple visited before and after a given place, can reveal patterns that are correlated with attributes of the place. Admittedly, this correlation might be quite weak for any individual pat- tern. However, our experimental results suggest that aggre- gating such patterns over a large population of place visitors leads to surprisingly strong prediction of place attributes. We construct a large set of spatio-temporal features us- ing aggregated data for an entire population of visitors to a place. The features can be logically grouped as follows. • Duration features: These features capture the distribu- tion of time people stay at a place. Intuitively, such features are useful for predicting attributes of restaurants such as availability of WiFi, or whether it has fast service. For ex- ample, patrons may stay longer in a cafe with WiFi available, and they may stay less in a fast-food restaurant. • Arrival time features: These features capture the dis- tribution of peoples' arrival times to a place. Specifically, we create a set of real-valued features for each hour of the week, where the feature value corresponds to the fraction of people that visit the place at that hour. There are sev- eral attributes for which this temporal signal is useful. For example, if a restaurant is frequented by patrons in the af- ternoon, it is more likely to offer good desserts. Similarly, if a restaurant is popular on Sunday mornings, it is likely that it serves a good brunch menu. • Occupancy features: These features capture the occu- pancy distribution of a place (measured in terms of the frac- tion of people who visit the place at different hours of the week). For example, a restaurant offering brunch menu may be crowded between breakfast and lunch hours on Sundays. Note that while the arrival and duration features character- ize people's visits, the occupancy features characterize the busyness of a place. Occupancy features essentially define the occupancy histogram of a place, by the hour of the week. • Transition features (previous visit) characterize places visited before the current place. We compute the distribu- tion of peoples' visits to other places within a time window (1, 4, 8, 16 and 24 hours). To ensure that such features generalize well, this distribution is computed not over the specific places people visit, but over place categories (e.g., restaurant, grocery store, hotel). The value of each feature reflects the fraction of people who visited that place cate- gory in a given time window before the target place visit (e.g., 2% of visitors to the given restaurant have visited a grocery store in the previous hour). Several place attributes can be predicted better using such features. For example, if a cafe is frequented by people who visit another restau- rant beforehand, then this cafe is more likely to offer good desserts. If a restaurant is popular among patrons who visit parks or beaches prior to it, then the restaurant is likely to have outdoor seating (as it appeals to people who like to be outdoors). • Transition features (next visit): Analogous to the previous-visit features described above, we also compute the distribution of people's visits (to other places) after visiting a given place, within a particular time window. For example, if many people visit surf shops after a hotel, then the hotel is likely to have beach access. If many people visit a cafe in the morning after staying at a hotel, then it is likely that the hotel does not provide breakfast. The above groups of features are instantiated for different place categories and time intervals, hence the total number of features we generate for each place is quite large (about ∼ 100K). This process is semi-automatic, because the only manual part is compiling the lexicon of place categories and the choice of time intervals. Cf. Section 5 for examples of features we use for predicting different attributes. We use supervised learning to train models for predict- ing individual place attributes. We have a multi-labeled setting whereas each restaurant (or hotel) has multiple at- tributes, and we predict each one independently by train- ing a dedicated binary classifier. Note that our feature set is comprehensive enough to be predictive of all attributes, and is not specific to any particular attribute. We per- form per-attribute feature selection (using a standard Mu- tual Information-based method), and retain up to 10,000 fea- tures per attribute. All the attributes we predict are binary, hence we use binary classification models (however, STEPS is applicable to predicting multi-class attributes too). Specifically, for each attribute we collect a ground-truth set of positive and negative labels corresponding to places that have this attribute and places that do not have it. The labels are obtained from third-party aggregator sites as well as via crowdsourcing, as described in Section 4.1. In the experiments described in Section 4, we used linear Sup- port Vector Machines for classification, however, our STEPS method can work with any binary classifier. Automating feature generation with embeddings The STEPS method described in the previous section re- lies on human engineered features. We now propose a vari- ant of STEPS called STEPS-E, which performs automated feature generation for attribute classification, with only a small penalty in accuracy compared to using manual fea- ture engineering. At a high level, STEPS-E generates a feature vector for each place using collaborative filtering on the (anonymous) person-place visit data. We use low-rank matrix factorization [8] on the person-place co-visit matrix (normalized to factor out location bias [11], as described be- low) to compute an embedding vector for each place in a latent low-dimensional space. The dimensions of this vector are then used as features for representing the place. Specifically, we first construct a person-place matrix L with rows representing people and columns representing pla- ces. Note that the data in this matrix is completely anony- mous. Every cell in the matrix contains a boolean value rep- resenting whether the person has visited the place or not, and has an associated weight corresponding to the number of times the person visits the place, capped by a maximum threshold. The weight represents a confidence score, and captures the relative contribution of the cell to the matrix- factorization objective function. A well-known issue in ge- ographical matrix factorization (see [11]) is the tendency of people to have location bias. For example, people are more likely to visit restaurants in a small set of locations they are familiar with, and less likely to visit restaurants in un- familiar areas. Thus, not visiting a restaurant in a familiar area should carry a stronger negative signal, and visiting a restaurant in new areas should carry stronger positive rein- forcement. Several approaches have been proposed to cor- rect this location bias [11]. We used a simple yet effective normalization heuristic, which divides the weight of each cell in the matrix (counting the person's visits to a place) by the number of other places this person has visited in a 2 km ra- dius. Given this weighted co-visit matrix, we use standard low-rank matrix factorization to compute a low dimensional person embedding U and place embedding V, by optimizing the following loss function (using Weighted Alternate Least Squares [8]): (cid:17)2 (cid:88) (cid:88) (cid:88) (cid:16) minU,V Wij Lij − U T i Vj + λ( Ui2 + Vj2), i,j i j where W is the weighting matrix, and λ is the L2-norm regularization constant. Each place embedding is then used as a feature vector of the place to train binary classifiers for various attributes, as described in the previous section. Since we use low-rank matrix factorization, the number of embedding dimensions is small enough that we do not need to use feature selection. 4. EMPIRICAL EVALUATION We describe the datasets and the baseline, and then re- port the performance of our methods.We also present ab- lation studies that explore the utility of the different fea- ture groups. All the results were obtained via 10-fold cross- validation. We evaluated the performance of place attribute predictions using the area under the ROC curve (AUC). 4.1 Datasets We evaluated our methodology on 2 large datasets with labeled data about attributes of restaurants and hotels. The restaurant dataset included 29 restaurant attributes (all binary) listed in Table 1. Admittedly, these attributes are somewhat subjective (e.g., whether the restaurant is in- expensive), and are partly overlapping (e.g., cozy / quiet / romantic atmosphere). However, from a user perspective, these attributes are deemed useful for making restaurant rec- ommendations, and we had ample human-labeled data for them, hence we used them to evaluate our method. Labeled examples corresponded to actual restaurants that had or did not have a given attribute (positive / negative, respectively). The human labels were obtained from third-party aggrega- tor sites, such that each label was confirmed by at least two sites (there were no label contradictions, resulting in essen- tially 100% inter-rater agreement). Owing to lack of space, we do not show the exact numbers of examples for each at- tribute, but the average number of positive examples per attribute was 34K (median 24K) and the average number of negative examples was 54K (median 34K). These examples represent a sample of restaurants across several countries. The second dataset included 16 binary hotel attributes such as whether the hotel has a golf course, airport shuttle, beach access, free breakfast, laundry service, fitness center (the full list of attributes is given in the first column of Ta- ble 3). Labeled examples corresponded to hotels that had or did not have a given attribute. We obtained the labels from an in-house crowdsourcing project, using at least two raters per hotel. The average number of positive examples per at- tribute was 68K (median 65K) and the average number of negative examples was 91K (median 87K). These examples represent a sample of hotels across several countries. 4.2 Baseline We compared the performance of our method, STEPS, with that of a baseline classifier trained on a corpus of text reviews. The reviews were crawled from public Google+ web pages for the respective restaurants and hotels. We pooled Attribute Wine Takeout Brunch Happy hour Upscale Hip WiFi Romantic Outdoor seating Features Breakfast Lunch Dinner Food Attrib type Description Good for wine Notable Meal type Food takeout available Serves brunch Meal type Has happy hour Meal type Formal attire Formality Attracts hip crowd Crowd Features WiFi available Romantic atmosphere Atmosphere Has outdoor seating Serves breakfast Serves lunch Serves dinner Mainly visited for food (as opposed to drinks) Main visit: drinks Inexpensive Cozy atmosphere Lively atmosphere Quiet atmosphere Good for groups Reserv. not required Longer wait time Meal type Meal type Meal type Intent Intent Price Atmosphere Atmosphere Atmosphere Company Drink Low price Cozy Lively Quiet Groups No reservations Ease of entry Ease of entry Usually a wait Entertainment Has live music Live music Restaur. type Fast food Features Delivery Casual Formality Notable Dessert Notable Tea Food type Healthy Vegetarian Food type Serves fast food Delivers food Casual attire Good for desserts Good for tea Serves healthy food Good veg. selection Table 1: Restaurant attributes. together all the reviews posted for each business, and rep- resented each training instance with a bag of words. We did not use stemming, but removed stop words as well as words that occurred in reviews of only one place. The aver- age number of reviews per restaurant was 23.2 (median 5), and the average review length was 65.1 words (median 43). The average number of reviews per hotel was 112.4 (median 16), and the average review length was 74.8 words (median 59). We used linear SVM to build the baseline classifier. The performance of the baseline classifier is reported in the second column of Table 2 (restaurants) and Table 3 (hotels). 4.3 Main findings We built the STEPS model using linear SVM over the features introduced in Section 3. In addition to linear SVM, we also experimented with a logistic regression classifier for both STEPS and the baseline, and the results were substan- tially similar (for both restaurants and hotels), hence we do not show them here owing to lack of space. Table 2 shows the performance of the review baseline, our STEPS method, and the combination of both, for the restaurant dataset (cf. Section 4.1). Each row in the table shows classifier performance for one attribute, and the sum- mary row reports overall performance macro-averaged over all the attributes (i.e., averaging the AUC values from the individual rows). We computed the gain in the summary row by comparing the macro-averaged AUC values for the method and the baseline. As we can readily see, STEPS shows superior results on average, and demonstrates slightly inferior performance for only 6 out of 29 attributes. However, the true importance of these results stems from the dramatically increased classification coverage due to our method. Of all the restaurants in our database, re- views are only available for 30.4% of restaurants, but STEPS features2 can be computed for 59.6% of restaurants - a relative coverage gain of 95.8% ! This happens because online reviews are not available for all businesses (especially for the newer ones), and even when they are available, they might not mention the attributes we are interested in. Peo- ple often write reviews to express a strong opinion (positive or negative) about the restaurant, but do not mention all the numerous applicable attributes of the business. Therefore, the coverage of the review-based (baseline) classifier is lim- ited. However, simply using observational data about how people get in and out of the restaurant, allows us to sub- stantially increase the classification coverage, and reliably predict attributes for almost twice as many restaurants. As we see in Table 2 (column Reviews + STEPS), com- bining the review-based and the STEPS features leads to superior classification performance for all the attributes. We assessed the statistical significance of our results using the standard t-test. For all 23 attributes where STEPS performance is higher than the baseline, the improvement is significant (p < 0.01). For the remaining 6 attributes, only 4 losses are significant (except Delivery and Casual), and all the losses are small in absolute terms. Importantly, the improvements shown by Reviews+STEPS are significant for all attributes (p < 0.01). Similarly, Table 3 shows the classification performance of our method for hotel attributes (due to space constraints, we do not report individual, per-attribute results). We compare the performance of STEPS with that of the review baseline, as well as report the performance of their combination. Here, STEPS shows slightly inferior results on average (with im- provements for 3 out of 16 attributes). However, this is more than compensated by substantial improvements in coverage. Of all the hotels in our database, reviews are only available for 43.3% of hotels, but STEPS features can be computed for 80% of hotels - a relative cover- age improvement of 94.8% ! If we combine both sources of features (review-based and STEPS features), we observe superior classification performance for all the attributes. 4.4 The effect of different groups of features Our STEPS method uses several groups of spatio-temporal features defined in Section 3. We now explore the relative utility of these different groups (owing to lack of space, we combined the previous-visit and next-visit features into one group of transition features). We show the ablation results in the four rightmost columns of Tables 2 and 3, where each column corresponds to using a different group of features. For restaurants (Table 2), each of the 3 temporal groups of features performs fairly well by itself, resulting in 11%–12% lower AUC than the full STEPS model. The combination of the 3 groups of temporal features yields macro-averaged AUC of 0.833 (6% lower than STEPS; not shown in the table for lack of space). Interestingly, the spatial features alone 2To maintain the anonymous aggregated nature of the data, we computed STEPS features only for restaurants (hotels) that have been visited by at least 10 people. Attribute Reviews STEPS Gain Reviews Gain Ablation study: + STEPS Individual STEPS feature groups Duration Arrival Occupancy Transition Wine Takeout Brunch Happy hour Upscale Hip WiFi Romantic Outdoor seating Breakfast Lunch Dinner Food Drink Low price Cozy Lively Quiet Groups No reservations Usually a wait Live music Fast food Delivery Casual Dessert Tea Healthy Vegetarian Macro-average 0.941 0.831 0.875 0.928 0.916 0.921 0.812 0.79 0.846 0.909 0.849 0.904 0.884 0.916 0.968 0.75 0.737 0.755 0.728 0.917 0.702 0.723 0.918 0.891 0.844 0.818 0.896 0.764 0.852 0.848 0.945 0.916 0.887 0.891 0.95 0.869 0.923 0.891 0.845 0.961 0.906 0.953 0.928 0.946 0.969 0.805 0.733 0.817 0.817 0.946 0.734 0.863 0.945 0.888 0.839 0.912 0.938 0.801 0.861 0.885 0.4% 10.2% 1.4% -4% 3.7% -5.6% 13.7% 12.8% -0.1% 5.7% 6.7% 5.4% 5% 3.3% 0.1% 7.3% -0.5% 8.2% 12.2% 3.2% 4.6% 19.4% 2.9% -0.3% -0.6% 11.5% 4.7% 4.8% 1.1% 4.4% 0.968 0.929 0.921 0.943 0.963 0.939 0.931 0.892 0.912 0.972 0.926 0.967 0.946 0.967 0.992 0.84 0.796 0.855 0.841 0.968 0.798 0.902 0.976 0.93 0.89 0.942 0.959 0.837 0.914 0.918 2.9% 11.8% 5.3% 1.6% 5.1% 2% 14.7% 12.9% 7.8% 6.9% 9.1% 7% 7% 5.6% 2.5% 12% 8% 13.2% 15.5% 5.6% 13.7% 24.8% 6.3% 4.4% 5.5% 15.2% 7% 9.6% 7.3% 8.3% 0.876 0.842 0.771 0.774 0.826 0.747 0.86 0.816 0.725 0.889 0.829 0.87 0.81 0.838 0.951 0.7 0.632 0.696 0.757 0.918 0.623 0.639 0.945 0.726 0.648 0.892 0.891 0.644 0.661 0.786 0.841 0.773 0.8 0.83 0.835 0.728 0.823 0.759 0.69 0.958 0.863 0.918 0.86 0.863 0.896 0.678 0.644 0.722 0.737 0.861 0.629 0.714 0.856 0.717 0.628 0.867 0.897 0.662 0.681 0.784 0.846 0.801 0.776 0.81 0.815 0.724 0.834 0.785 0.697 0.948 0.863 0.916 0.84 0.853 0.918 0.684 0.643 0.715 0.747 0.887 0.621 0.696 0.851 0.712 0.587 0.854 0.904 0.648 0.662 0.781 0.909 0.893 0.827 0.847 0.898 0.852 0.905 0.855 0.832 0.921 0.832 0.899 0.886 0.923 0.965 0.777 0.702 0.793 0.791 0.915 0.691 0.798 0.962 0.856 0.803 0.907 0.917 0.751 0.787 0.852 Table 2: Classifying restaurant attributes. Performance is reported as Area Under the Curve (AUC). Note that STEPS increases the coverage by 95.8% compared to only using Reviews (cf. Section 4.3). Attribute Reviews STEPS Gain Reviews Gain Ablation study: + STEPS Individual STEPS feature groups Duration Arrival Occupancy Transition Air conditioned All inclusive Golf coures Airport shuttle Bar or lounge Beach access Business center Fitness center Free breakfast Hot tub available Laundry service Restaurant Room service Spa available Pets allowed Smoke free Macro-average 0.953 0.702 0.782 0.788 0.919 0.919 0.869 0.949 0.892 0.895 0.824 0.947 0.867 0.915 0.843 0.778 0.865 0.934 0.735 0.821 0.79 0.873 0.916 0.855 0.899 0.839 0.83 0.795 0.912 0.831 0.846 0.818 0.773 0.842 -2% 4.7% 5% 0.3% -5% -0.3% -1.6% -5.3% -5.9% -7.3% -3.5% -3.7% -4.2% -7.5% -3% -0.6% -2.7% 0.956 0.756 0.848 0.82 0.92 0.935 0.879 0.954 0.896 0.9 0.829 0.95 0.871 0.92 0.864 0.79 0.881 0.3% 7.7% 8.4% 4.1% 0.1% 1.7% 1.2% 0.5% 0.4% 0.6% 0.6% 0.3% 0.5% 0.5% 2.5% 1.5% 1.8% 0.813 0.583 0.632 0.6 0.752 0.829 0.718 0.718 0.612 0.685 0.645 0.781 0.706 0.741 0.639 0.652 0.694 0.802 0.606 0.657 0.666 0.745 0.805 0.736 0.716 0.616 0.698 0.656 0.777 0.697 0.73 0.633 0.668 0.701 0.816 0.632 0.634 0.661 0.771 0.824 0.751 0.728 0.603 0.718 0.663 0.814 0.713 0.743 0.669 0.681 0.714 0.932 0.719 0.812 0.788 0.847 0.911 0.842 0.861 0.823 0.817 0.785 0.88 0.809 0.816 0.813 0.774 0.827 Table 3: Classifying hotel attributes. Performance is reported as Area Under the Curve (AUC). Note that STEPS increases the coverage by 94.8% compared to only using Reviews (cf. Section 4.3). (Transition) have strong predictive power, achieving AUC that is only 4% lower than that of STEPS. We could not show the full results for the two individual groups of tran- sition features owing to lack of space. However, we found the next-visit features to be slightly more predictive, as they alone achieve macro-averaged AUC of 0.829, just 6% lower than STEPS; the macro-averaged AUC of the previous-visit features alone is 0.816 (8% lower than STEPS). It is insightful to consider the performance of the dif- ferent feature groups for several sample attributes. Dura- tion features are highly informative for predicting low-price, no-reservation, fast-food, and dessert restaurants, because customers tend to spend less time in those (for these at- tributes, the performance of duration features is within 5% of STEPS). Similarly, both the Arrival time and Occupancy groups of features are (individually) highly predictive of breakfast, lunch, dinner, and tea attributes, because each of these kinds of meals have characteristic hours. Interestingly, for hotels (Table 3), the 3 groups of temporal features are less powerful. Individually, each group exhibits 15%-18% lower performance than STEPS, and even taken together their performance is 11% lower. Thus, most of the STEPS performance is due to the spatial features (Transi- tion), whose performance is on average within 2% of the full STEPS feature set. We hypothesize this happens because people stay much longer in hotels than in restaurants (on the scale of days as opposed to hours), hence the variability in their temporal patterns is greater, and it is more difficult to find consistently predictive patterns. On the other hand, there are stronger patterns in the kinds of places that are co-visited with hotels, which explains the predictive power of the Transition features. For example, if hotel guests visit sports or recreational facilities (such as hiking trails or yoga studios), then the hotel likely appeals to fitness enthusiasts and therefore likely has a fitness center. 4.5 The evaluation of place embeddings In this section, we report the performance of the embeddings- based method, STEPS-E, introduced in Section 3. The re- sults were computed using 1000 embedding dimensions (we used grid search to determine the optimal number of dimen- sions that maximized cross-validated performance). Due to lack of space, we only report aggregate results across all the restaurant attributes and do not show per-attribute results. The classification performance of the embedding-based STEPS-E method is 6.2% lower than the baseline, but com- pletely eliminates the need for manual feature construction required for STEPS. At the same time, the improvement in classifier coverage of the STEPS-E method is 94.8%, the same as for STEPS, as reported in Section 4.3. We be- lieve that in most practical situations, sacrificing 6.2% in prediction accuracy is a reasonable tradeoff for doubling the coverage and eliminating the need to craft features manually. 5. QUALITATIVE STUDY To get a more intuitive understanding of the classification models obtained using STEPS, we now study the top pos- itive and negative spatio-temporal features learned by the trained STEPS model for some of the restaurant and ho- tel attributes. We also plot the actual distribution of these feature values for the positive and negative classes of the at- tributes (owing to lack of space, we show distribution plots for only some of the attributes). For identifying "romantic" restaurants, the top positive features are those corresponding to people's visiting the restau- rant on weekends, arriving at the restaurant between 8– 10PM, staying for more than 90 minutes, and coming to the restaurant from a luxury hotel, museum, or performing arts theater. The top negative features correspond to people's visiting the restaurant on Mondays and Tuesdays, staying for less than 60 minutes, and arriving at the restaurant be- fore or after visiting a grocery store or gas station. These features capture our intuition about romantic restaurants as places that people often go to for a long, leisurely meal on a weekend, often preceded by a visit to a museum, theater or concert (but presumably not often preceded by a grocery store or gas station visit). To understand these features better, in Figures 1(a) and 1(b) we show the distributions of visit time duration and days of week of people's visits to romantic restaurants, and to restaurants not labeled as "romantic". The duration time distributions are clearly discriminative - the positive class has a peak at 80 minutes, compared to the negative class that peaks at around 60 minutes. The differences in the day-of-week distribution between the positive and negative classes are less pronounced, but one can still see that this difference is largest on Saturdays(positive difference) and Mondays (negative difference). These small differences in the distributions are significant enough for the model to use as discriminative features. Figure 1(c) plots the percentage of restaurant patrons visiting the above mentioned charac- teristic places before the restaurant, and confirms the utility of transition features in the model. The figure clearly shows that patrons of romantic restaurants are much more likely to have previously visited museums, theaters and luxury ho- tels, compared to gas stations and supermarkets. For identifying restaurants offering "breakfast", temporal features are, not surprisingly, the most informative features in the classification model. The top positive features include arriving at the restaurant between 8–11AM, and staying at the restaurant (occupancy) from 9–11AM. The top negative features include arrival times between 12–2PM, indicating that the restaurant is more likely to be popular for lunch than for breakfast. Figures 2(a) and 2(b) plot the distri- bution of these features for the "breakfast" attribute, and highlight the slightly earlier arrival and occupancy times for the positive class that are picked up by the model. For identifying restaurants or cafes that offer WiFi, the top positive features correspond to people staying at the place between 4–7PM or between 10–11PM, visiting the place on weekdays, and visit duration times between 30 to 80 minutes. Other positive features include visiting a work location shortly before or after the cafe. Indeed, these fea- tures match our expectations of cafes that offer WiFi - they are usually busy late afternoons and late evenings on week- days, and are frequented by people who use WiFi to work and therefore stay longer at the place. The top negative features include those corresponding to people's visiting the place on Fridays and Saturdays, and staying at the place for less than 30 minutes. For predicting restaurants that offer "takeout", the top positive features are again related to duration - a large fraction of people stay at such places for less than 20 min- utes. However, some of the top features are not so obvious, such as visiting a work location immediately before or after (a) Duration Time Distribution (a) Arrival Time Distribution (b) Day of week distribution (b) Occupancy distribution Figure 2: Features for restaurants offering breakfast. (c) Previous place visit transition features Figure 1: Features for romantic restaurants. Figure 3: Transition features for hotel beach access the restaurant (positive feature), and visiting a shopping center or bar after the restaurant (negative feature). Another attribute where the predictive power of STEPS is, at first glance, rather unexpected is "healthy" restau- rants. The top positive features correspond to visiting the restaurant in the middle of the week (Tuesdays, Wednes- days and Thursdays) and going to work immediately after the restaurant. The top negative features correspond to vis- its on weekends, and visiting a bar immediately before or after the restaurant. This hints at some interesting socio- cultural trends; for example, people are more likely to fre- quent healthier restaurants in the middle of the week than during the weekend, and people visiting healthy restaurants are less likely to visit bars before or afterwards. We also observe interesting trends when studying the top positive and negative features for some of the hotel attributes. In contrast to predicting restaurant attributes, duration and occupancy features are less important here than transition features, which capture the types of places visited by the hotel guests. For example, to identify hotels with "beach access", the top features correspond to visits to surf shops, swimwear stores and beaches, while the top negative features include visits to water parks and ski resorts. Figure 3 shows the proportion of hotel guests visiting these places from the hotel. On average, guests at hotels with beach-access are 10 times more likely to visit surf shops, swimwear stores and beaches, 3 times less likely to visit ski resorts, and 2 times less likely to visit department stores. 6. CONCLUSIONS Many online services recommend brick-and-mortar busi- nesses such as restaurants or hotels based on their attributes. These attributes are often difficult to obtain, and previous approaches based on crowdsourcing and mining review text were challenging to scale, and hence had limited coverage. We presented an approach to predict numerous place at- tributes using spatio-temporal features, which characterize how large populations of people go in and out of these places. Our method, STEPS, uses several groups of spatial and tem- poral features, and its variant, STEPS-E, uses embeddings to completely eliminate the need for manual feature con- struction. The key idea is to derive signals from anonymous aggregated observational data. This allows us to reliably predict dozens of attributes of businesses without ever vis- iting them or talking to people who did. [15] Long, C., Zhang, J., and Zhut, X. A review selection approach for accurate feature rating estimation. In COLING (2010). [16] Popescu, A.-M., and Etzioni, O. Extracting product features and opinions from reviews. In Natural language processing and text mining. Springer, 2007, pp. 9–28. [17] Qiu, G., Liu, B., Bu, J., and Chen, C. Opinion word expansion and target extraction through double propagation. Comput. Linguist. 37, 1 (Mar. 2011). [18] Wang, H., Lu, Y., and Zhai, C. Latent aspect rating analysis on review text data: A rating regression approach. In KDD (2010). [19] Ye, M., Yin, P., Lee, W.-C., and Lee, D.-L. Exploiting geographical influence for collaborative point-of-interest recommendation. In SIGIR (2011). [20] Zheng, V. W., Zheng, Y., Xie, X., and Yang, Q. Collaborative location and activity recommendations with gps history data. In WWW (2010). [21] Zheng, Y., Zhang, L., Xie, X., and Ma, W.-Y. Mining correlation between locations using human location history. In GIS (2009). [22] Zhong, Y., Yuan, N. J., Zhong, W., Zhang, F., and Xie, X. You are where you go: Inferring demographic attributes from location check-ins. In WSDM (2015). [23] Zhuang, L., Jing, F., and Zhu, X.-Y. Movie review mining and summarization. In CIKM (2006). In an extensive empirical evaluation, we compared our methods to a baseline that uses web reviews for restaurants and hotels. Our STEPS method was able to reliably classify numerous place attributes while nearly doubling the cov- erage of the baseline (review-based) classifier, and offered comparable or superior performance. In our future work, we plan to explore joint modeling of attributes, as well as experiment with cross-products of STEPS features. Acknowledgments We would like to thank John Giannandrea and Chandu Thota for making this work possible. We would also like to thank Ravi Kumar, Bo Pang, Finnegan Southey, Mukund Sundararajan, and Andrew Tomkins for stimulating discus- sions that helped greatly improve this paper. 7. REFERENCES [1] Cheng, C., Yang, H., Lyu, M. R., and King, I. Where you like to go next: Successive point-of-interest recommendation. In IJCAI (2013). [2] Cheng, H., Ye, J., and Zhu, Z. What's your next move: User activity prediction in location-based social networks. In SIAM (2013). [3] Eland, A. Tackling urban mobility with technology, http://googlepolicyeurope.blogspot.com/2015/11/ tackling-urban-mobility-with-technology.html. Google Europe Blog, 2015. Visited on January 29, 2016. [4] Hu, M., and Liu, B. Mining and summarizing customer reviews. In KDD (2004). [5] Hu, M., and Liu, B. Mining opinion features in customer reviews. In AAAI (2004). [6] Jakob, N., and Gurevych, I. Extracting opinion targets in a single-and cross-domain setting with conditional random fields. In EMNLP (2010). [7] Kirmse, A., Udeshi, T., Bellver, P., and Shuma, J. Extracting patterns from location history. In GIS (2011). [8] Koren, Y., Bell, R., and Volinsky, C. Matrix factorization techniques for recommender systems. IEEE Computer 42, 8 (Aug. 2009), 30–37. [9] Ku, L.-W., Liang, Y.-T., and Chen, H.-H. Opinion extraction, summarization and tracking in news and blog corpora. In AAAI Spring Symp.: Computational Approaches to Analyzing Weblogs (2006). [10] Li, M., Ahmed, A., and Smola, A. J. Inferring movement trajectories from gps snippets. In WSDM (2015). [11] Lian, D., Zhao, C., Xie, X., Sun, G., Chen, E., and Rui, Y. GeoMF: Joint geographical modeling and matrix factorization for point-of-interest recommendation. In KDD (2014). [12] Liao, L., Fox, D., and Kautz, H. Location-based activity recognition. In NIPS (2005). [13] Lichman, M., and Smyth, P. Modeling human location data with mixtures of kernel densities. In KDD (2014). [14] Liu, B. Sentiment analysis and opinion mining, vol. 5 of Synthesis Lectures on Human Language Technologies. Morgan & Claypool Publishers, 2012.
1910.01445
1
1910
2019-09-09T18:43:11
Analyzing the Spotify Top 200 Through a Point Process Lens
[ "cs.SI", "stat.AP" ]
Every generation throws a hero up the pop charts. For the current generation, one of the most relevant pop charts is the Spotify Top 200. Spotify is the world's largest music streaming service and the Top 200 is a daily list of the platform's 200 most streamed songs. In this paper, we analyze a data set collected from over 20 months of these rankings. Via exploratory data analysis, we investigate the popularity, rarity, and longevity of songs on the Top 200 and we construct a stochastic process model for the daily streaming counts that draws upon ideas from stochastic intensity point processes and marked point processes. Using the parameters of this model as estimated from the Top 200 data, we apply a clustering algorithm to identify songs with similar features and performance.
cs.SI
cs
Analyzing the Spotify Top 200 Through a Point Process Lens Michelangelo Harris, Brian Liu, Cean Park, Ravi Ramireddy, Gloria Ren, Max Ren, Shangdi Yu, Andrew Daw, and Jamol Pender∗ School of Operations Research & Information Engineering Cornell University, Ithaca, NY October 4, 2019 Abstract Every generation throws a hero up the pop charts. For the current generation, one of the most relevant pop charts is the Spotify Top 200. Spotify is the world's largest music streaming service and the Top 200 is a daily list of the platform's 200 most streamed songs. In this paper, we analyze a data set collected from over 20 months of these rankings. Via exploratory data analysis, we investigate the popularity, rarity, and longevity of songs on the Top 200 and we construct a stochastic process model for the daily streaming counts that draws upon ideas from stochastic intensity point processes and marked point processes. Using the parameters of this model as estimated from the Top 200 data, we apply a clustering algorithm to identify songs with similar features and performance. Keywords: Spotify, Music Streaming, Data Analytics, Stochastic Processes, Generalized Pois- son Processes, Marked Point Processes, Hawkes Process, k-Means Clustering 1 Introduction Streaming music, or more accurately streaming audio, is a way of delivering sound without requir- ing you to download files from the internet. Spotify is the world's largest music streaming service, currently available as both desktop and mobile applications. Spotify provides free streaming of music to its users, with an option for a paid premium membership with added benefits such as no advertisements and the ability to listen to music offline. As of April 2019, Spotify had 217 million monthly active users worldwide, 100 million of which are paid subscribers [3]. On top of Spotify itself growing, streaming has become increasingly central to the music industry. In 2018, streaming accounted for 77% of all music consumption relative to 23% combined for physical and digital sales, compared to 66.1% and 33.9%, respectively, in 2017 per the industry report provided by BuzzAngle Music [8]. Streaming's music industry dominance is already influencing the structure of new releases, such as in the influx of very short (e.g. ≤ 2.5 min.) singles [18, 15] or in the recent popularity of extra long playing (e.g. ≥ 80 min.) albums [17]. As these trends ∗Correspondence: [email protected]; 228 Rhodes Hall, Cornell University, Ithaca, NY, 14853. 1 continue to manifest themselves throughout popular music, it is both increasingly relevant and increasingly valuable to understand how music evolves through the streaming ecosystem. This paper aims to begin that expedition through an analysis of the Spotify Top 200, a chart of the 200 most frequently streamed songs each day on Spotify. This investigation is built on a data set scraped from over 20 months of the United States based edition of these rankings, spanning from 2017 to 2018. To put this time capsule in a pop music context, this is a particular period of dominance for Drake that may eventually be viewed as his peak, at least commercially. He has claim to 6 of the 32 number one songs in this data set and this includes the three highest recorded daily play counts, each of which is over 4.5 million streams. Moreover, on the day his 2018 album Scorpion was released, all 25 tracks were in the top 27 most streamed songs, including places 1 through 23. Hip hop is known to be the most popular genre currently on streaming services in the U.S. [8], and that fact is reflected throughout this data and the songs discussed herein. One key insight we make from this data is that a song's daily stream count can be modeled as discrete observations of a non-stationary point process, specifically a marked or stochastic intensity point process [22]. While this construction is entirely motivated from data, we can note that there are conceptual similarities between music streaming services and the theoretical details of several well-known point processes of this type. For example, an oft-recurring theme of this data analysis is the influence that an external happenings can have on the streams a particular song receives. As we will demonstrate, events like album releases, music video release, and public performances can lead to significant surges in the song's stream count. This type of exogenous excitement closely resembles the type of jumps in the stochastic intensities of Cox processes [9]. Additionally, the fact that the Spotify Top 200 chart is also a playlist available to all users on the service means that as a song climbs higher and higher in rank it becomes more and more visible. Hence a song that is heavily streamed one day may be more likely to again be heavily streamed again the next day, yielding a discrete time form of self-excitement, see [16, 21]. This also captures the social contagion of a song's popularity, and this epidemic-like information sharing has recently been formally connected to self-exciting processes as well [19, 11]. Thus we can see that streaming services should experience a combination of both externally driven and self-excited behavior. Processes of this sort have been studied in the literature as dynamic contagion processes [10]. Using the point process model for this streaming system, we will uncover connections between songs through a clustering analysis, thus generating further insight into the Top 200 data. A quick look at the current pop charts shows that these dynamics are not unique to the time of this data set. Rather, recent pop music storylines seem to indicate that public events are becoming even more important for commercial success. Perhaps this is most obviously championed by Lil Nas X and his masterful manipulation of publicity in the record-breaking 19 weeks "Old Town Road" spent atop the Billboard Hot 100 chart, all of which occurred after this data set concludes. Beyond just catching lightning in a bottle, music critics have noted that sustained success of "Old Town Road" can be at least partially traced to the expertly timed sequence of remixes, videos, and even internet memes that maintained public interest [7]. And while "Old Town Road" is of course the most dominant example of these strategies so far, it is not the only one. For example, Billie Eilish buoyed her eventual number one hit "bad guy" by releasing a remix featuring Justin Bieber. As an example of the effect of an external event not directly controlled by the artist, consider Lizzo's Billboard topping song "Truth Hurts." Originally released in 2017, the Minnesotan singer/rapper/flutist's sleeper hit surged in popularity after being featured in the 2019 Netflix film Someone Great. It is also worth noting that both "Truth Hurts" and "Old Town Road" experienced an initial viral growth through use in videos shared on the app TikTok, which then led to success on music streaming 2 platforms like Spotify. Based on observations like these, the goal of this paper is to explore, model, and understand the dynamics of a pop song on streaming platforms, and this investigation is centered around the Spotify Top 200 data set. 1.1 Description of Data The data used in this paper is a daily record of the Top 200 playlist on Spotify, which contains the top 200 most streamed songs on that day. As defined by Spotify, one day spans from 3:00 PM UTC through 2:59 PM UTC on the next. We have scraped this data set from the publicly available Spotify Top 200 charts, specifically from the U.S. based rankings. The code to do so is derived from open source code used to form a Kaggle data set containing the worldwide Top 200 rankings for all of 2017 [2]. We have collected the streaming data from this source over the date range January 1, 2017 to September 12, 2018, but the code used to scrape the data can easily by recompiled to acquire up to current records. The fields contained in this data are date, position (rank), song name, artist, and the number of streams of that song on that date. Spotify counts a "stream" for a song after a user has listened for 30 seconds [1]. The daily stream count is then the total count of these events across the time period. 1.2 Contributions & Organization The questions we have answered about this data set are focused around how stream counts vary by position in the Top 200 and over time for particular songs. This data set motivates a point process model of a song's jump and decay in streams, which in turn enables further model-based analysis. This investigation is organized throughout the remainder of this paper as follows: • In Section 2, we perform an exploratory data analysis for the Spotify Top 200. Our analysis include the exclusivity of each ranking position, the duration of a song's time on the charts, and close inspection of the behavior of songs at the highest and lowest positions of the rankings. • In Section 3, we take these findings as motivations to construct a stochastic model for a song's daily streaming totals. This stochastic process model is a generalized Poisson process, and we describe how to obtain its parameters from data via maximum likelihood estimation. We also explain how to use linear regression to estimate the single parameter in a special, parsimonious sub-case of the model. • In Section 4, we use the model from Section 3 to obtain additional insights into the Top 200 data set. We inspect both the strengths and weaknesses of this model in representing this data set. Based on these observations, we perform a clustering analysis on the songs contained in this data set using only the estimated model parameters and an empirical measure of their fit. This leads us to insights that appear to transcend both the model parameters and the data itself, recognizing connections that were not obvious until after the data's time range. 2 Exploratory Analysis of the Spotify Top 200 We begin our analysis by exploring this Spotify data set and examining the relationships between streams, songs, and positions on the Top 200 chart. In Subsection 2.1 we take a position-based perspective and investigate the popularity and the rarity associated with each spot on the Top 200 chart. These leads us to consider the lifespan of each song, and in Subsection 2.2 we measure the frequency and duration of the songs that made it on this list. Then in the final two subsections 3 Figure 2.1: The average number of daily streams received at each position in the Spotify Top 200, plus and minus one standard deviation. we contrast the biggest hits with those that barely made the cut, with Subsection 2.3 devoted to the number ones and Subsection 2.4 focused on the last place of the Top 200. 2.1 The Prestige and Intrigue of the Top 200 In viewing the Spotify Top 200 data set as a daily recording of a list of 200 tracks and their associated play counts, it is natural to wonder how the places in these rankings compare to one another as measured in terms of these songs and streams. For example, by definition the first- placed song in the Top 200 is played more often than the second-placed song (or any other), but how much more? In Figure 2.1, we plot the average across time of the number of daily streams received in each of the 200 ranks. The shaded gray area represents a standard deviation above and below the average (red) line. One can observe that the decrease in the number of streams is most extreme for the top positions, meaning that the difference in streams between the top song and the runner-up is much larger than the difference between streams in the 199th and 200th positions. This effect can perhaps be even more easily observed when comparing the difference between ranks 1 and 10 with the difference ranks 191 and 200. One can see that the top spot averages over 2 million streams each day whereas the tenth spot receives approximately 900K listens, yet the change from 191 to 200 is hardly noticeable. This observation can be formalized, as fitting a power law curve of the form f (x) = ax−b to the data yields coefficients a = 2.3689 × 106 and b = 0.5426 with an R2 value of 0.9805. The power law tail of the average streams chart may point to a connection between Spotify and other social platforms, since the power law distribution is 4 Figure 2.2: The number of unique songs observed in the data at each position in the Top 200. closely associated with connectivity in human social networks, see e.g. Chapter 18 of Easley and Kleinberg [12] for an overview. Furthermore, this power law structure confirms the observed "diminishing returns" effect for song rank, since this function dictates that a song would need exponentially more streams to move from rank 2 to 1 than from 200 to 199. Reasoning about this chart leads us to two intuitive explanations for this behavior. First, the prestige associated with the highest rankings naturally suggests that only the biggest hits can achieve the massive number of daily streams needed to make it to the top of the list, as it is certainly more impressive to be the #1 song than it is to be #10 song. By comparison, the 191st ranking does not feel particularly more commendable than the 200th. Second, one can also observe a natural intrigue associated with the top of the list: listeners looking for a new hit song may be much more likely to look at the top of the list than at the bottom. This yields a self-excitement effect, as the Top 200 is both a reflection of popularity and a conductor of it. That is, a song receiving a large number of streams suggests that it is likely to receive even more as a consequence of its increased exposure on the Top 200 playlist. This power-law structure also leads us to interesting observations on the behavior of the bottom end of the rankings. The slow decay of streams between the lower ranked songs hints at the idea of the long tail first written about in Anderson [5]. As songs decrease in the rank of their popularity their actual play-count does not as noticeably taper offer. Anderson [5] predicted that this would be a hallmark of the more niche-based entertainment offerings the internet could provide. Thus, as a potential direction of future study given additional access to data, it would be interesting to see how this extends beyond the inherent popular Top 200 into the worlds of independent and experimental music. In addition to considering the number of streams associated with each position in the Spotify Top 200, we are also interested in the number of songs connected to each of these ranks. Hence, in Figure 2.2 we plot the number of distinct songs observed at each rank in this chart over the course of this data set, which spans 620 days from January 1, 2017 to September 12, 2018. As one might expect based on the dramatic decrease in popularity at each position in Figure 2.1, we can observe in Figure 2.2 that it is also increasingly rare to see a song achieve a higher and higher rank. For example, less than 50 songs ever reached the top, whereas there were approximately 400 unique songs observed at each of the bottom 50 positions. 5 Figure 2.3: Histogram of the first duration of each song appeared in the data set. The increased rarity of the top of these charts naturally leads one to wonder about the life span of songs in this data set. In the next subsection, we will investigate both how long a song stays on the Top 200 after it first appears and how this duration changes based on the position the songs achieves. 2.2 15 Seconds of Fame? Quantifying the Duration of a Pop Hit In order to obtain a better understanding of the life cycle of a song within the Spotify Top 200, let us define the first life of a given song as the number of consecutive days from when a song first entered the Top 200 until it no long appears on the charts. Before proceeding with the analysis, it is important to note that by the nature of this data set some songs have longer first lives than what we can calculate because they may have initially appeared in the charts before January 1, 2017. Nevertheless, this investigation still gives us an idea of the duration of a song on the Top 200. In Figure 2.3 we first plot the frequency histogram of the length of the first lives of all songs in the data. That is, we define the first life of a given song as the number of consecutive days from when a song first entered the Top 200 until it no long appears on the charts. As can be observed, the largest collection is for the shortest duration: nearly 1,500 songs have a duration of less than 25 days. Still, there are 9 songs that have durations for over 500 days in this 620 day data set. For reference, the titles of these songs and their recorded durations are given below in Table 2.1. To further specify the observed duration of songs, we also provide the percentage of songs in the data that lasted no more than a day, week, month, and year in Table 2.2. As one can see, just less than a third of the songs that appeared on the Top 200 chart only lasted a day and moreover more than two thirds of the songs did not stay on the chart for more than a week after their first appearance. The existence and rarity of the tail of the distribution in Figure 2.3 is also demonstrated in Table 2.2, as less than 16% of songs remained 6 in the Top 200 for over a month, and less than 0.8% lasted for over a year, yet from Table 2.1 we know that 5 songs appeared in well over 18 months of this data set. By comparison, the mean first life duration is approximately three weeks. This shows a heavy-tailed phenomenon appearing in these durations, as extreme outliers are known to occur. Name of Song First Life Goosebumps Congratulations Location Shape of You Believer XO TOUR Lif3 HUMBLE. Young Dumb & Broke LOVE. FEAT. ZACARI 617 617 616 603 585 535 528 519 512 Table 2.1: The 9 songs with first life duration longer than 500 days in this data set. Percentage of Songs First Life Duration 31.80% 68.67% 84.04% 99.23% ≤ 1 day ≤ 1 week ≤ 1 month ≤ 1 year Table 2.2: Percentage of songs that have durations bounded by a day, week, month, and year. When considering the first life duration of a given song, it seems natural to wonder how this is effected by the rank of the song. In Figure 2.4 we plot the empirical conditional expectation of the duration of the song given the highest ranking it achieved in the chart. Additionally, this plot contains an exponential decay curve fitted to the data. This figure shows what one might reasonably expect: the more popular songs also last longer on the charts. In particular, we can see that songs that achieved the top rank averaged a duration of nearly 250 days, whereas the songs that never cracked 190 stay for a very brief time. In the following two subsections we further contrast the top and bottom ranks of the Top 200, beginning now with a closer look at the biggest hits of all in Subsection 2.3. 2.3 Far From the Shallow Now: Examining #1 Ranked Songs From Subsection 2.1, we know that it is very rare for a song to become the number one track on the Spotify Top 200. Figure 2.2 showed us that only 32 songs ever reach the ultimate rank in the 620 days recorded in this data set. This matches with what he have seen in Subsection 2.2, as Figure 2.4 revealed that top ranked songs have a significantly longer life span than the average song does. In this subsection we will explore these 32 hits in more detail through Figure 2.5. This plot shows the number of streams received by the number on song throughout the full time range of the data. As the number one song changes, so does the color of the shaded curve. We can make several interesting observations from Figure 2.5. First, we can see that in most cases a change of the guard at the top of the Top 200 occurs when a new song jumps up to a higher number of streams. This isn't exclusive, such as the more passive takeovers seen in August 7 Figure 2.4: Average first life durations given the highest position achieved in the Top 200. 2017, but it does seem to be the primary type of transition. We can also see that the number one song's daily stream count primarily just decays after its debut at the top spot. A notable pattern of exceptions to this are subsequent jumps in streams, such as what is seen in late April 2017. Looking closer at this specific example can give us insight into the source of these dynamics. The song occupying the number one spot for April and May 2017 is "HUMBLE." by Kendrick Lamar. This hit was the advance single for Lamar's 2017 album DAMN. and was released to much fanfare and attention along with its accompanying music video, which was released simultaneously on March 30, 2017. As a single, "HUMBLE." catalyzed the feverish anticipation for Lamar's third official studio recording. When the full album was then released two weeks later on April 14 the song received even more listens, which is reflected in the approximately 2 million streams added to its play count on this date. A similar pattern can be seen in January and February 2018 for Drake's hit single "God's Plan," which eventually appeared on his June 2019 album Scorpion. This song was first made available to stream on January 19, 2018, at which point we can see that it jumps up to an unprecedented height in the streaming data. There is then a second, smaller jump in streams around a month later. Rather than being the eventual June album-release jump, this increase in streams coincides with the release of the music video for "God's Plan," a viral visual in which Drake gave away large amounts of cash to strangers in Miami, FL. These examples give us intuition for the jump-and-decay dynamics seen in Figure 2.5. By the nature of streaming's instant access, new songs or songs with new events can draw a rush of new listens, but this attention can fade over time, possibly in favor of newer options. 2.4 Barely Famous: The 200th Song on the Top 200 By comparison to the number one song, we have seen that the 200th ranked track receives far fewer streams (see Figure 2.1) and remains on the chart for much less time (see Figure 2.4). However from Figure 2.1, we know that there isn't such a substantial difference in streams between the 200th song and the other tracks on the tail of the Top 200. Thus, by inspecting the behavior of the songs in the last ranked spot we can get an impression of songs that achieve modest popularity on Spotify. From Figure 2.2, we also know that this represents a much larger 8 Figure 2.5: Top Spotify Songs from January 1 2017 to September 12 2018. population of music than the top hits. First, in Figure 2.6 we plot the number of streams received by the rank 200 song across each of the 620 days in the data set. While there may be some mild long-term seasonality, the most striking features are the short-term periodicity and the overall upward trend in streams. Let us first discuss the latter. One can observe that at the beginning of 2017 the daily stream count is oscillating around 140,000 plays while at the start of September 2018 the center is closer to 200,000 streams. This appears to be a quite accurate reflection of the growth of the music streaming in the U.S. as a whole, which is reported to have increased 42% from 2017 to 2018, per the annual industry report from BuzzAngle Music [8]. Returning to short-term periodicity, let us now look closer at the first month of daily stream data in Figure 2.7. On this time scale, the pattern becomes evident: there is clearly a weekly structure to the number of streams. Recalling that New Years Day fell on a Sunday in 2017, we can see that the number of streams peaks each week on Saturday and mostly increases throughout the week from Sunday onward. We can note multiple explanations for this. As a simple first observation, it seems natural for the weekend to be a popular time to listen to music as a form of relaxation outside of the work week. Furthermore, in a reasoning fundamentally based on the music industry, since 2015 there has been a globally recognized standard of releasing new music on Fridays. As noted in Flanagan [13], this was an eventual consequence of Beyonc´e's surprise release self- titled album in 2013. Beyonc´e debuted online on a Friday without any advance notice, a then- unprecedented concept for a major pop release, and was massively successful. In her own words, Beyonc´e "changed the game with that digital drop."1 Previously, the weekly release date varied by country and shaped each nation's weekly sales and streaming measurements accordingly. The new global standard of a Friday release date is thought to be better catered to the culture of instant music access foreshadowed Beyonc´e and now associated with online streaming platforms, and Figure 2.7 shows how this has been manifested on Spotify. It is worth noting that despite 1From "Feeling Myself" by Nicki Minaj feat. Beyonc´e, see https://genius.com/4532100. 9 Figure 2.6: Number of daily streams received by the 200th ranked song across the full data set. Figure 2.7: Number of daily streams received by the 200th ranked song in January 2017. this influence her music has had, Beyonc´e the artist is almost entirely absent from our data exploration. This is most likely due to the fact that at the time her most recently released album Lemonade was only available on the competing platform TIDAL, of which she is a partial owner. 3 Modeling Streaming through Stochastic Processes Following the observations we have made throughout our exploratory data analysis in Section 2, we now propose a stochastic process model for the times that a given song is streamed. To motivate our construction, we now plot sample paths of both the daily streams and chart positions of 12 different songs in Figure 3.1. In a way that is similar to the plot of all top-ranked songs in Figure 2.5, we can notice that two of the most striking features of these sample paths are jumps upward and decay downward. While some songs also have periods of relatively gradual growth, the increase of daily stream count appears to happen much more rapidly than the decrease does. 10 Figure 3.1: Sample paths for 12 example songs in the Spotify Top 200 data set. When a song does lose listens from day to day, it appears to happen slowly. There do not appear to be downward jumps like the surges in new listens that can be seen in some form in each of the sample paths. We will thus take upward jumps and downward decay as the salient features we want to capture in a model of a song's streams. 3.1 Defining the Point Process Model Let us now define the model. For a given track, we let {N (t) t ≥ 0} be the point process for the number of times the song has been played up to time t ≥ 0. Without loss of generality we will suppose that the song debuts at time 0 and that there were no previous streams, i.e. N (0) = 0. We will furthermore suppose that N (t) is a non-stationary Poisson process with rate λ(t) defined λ(t) = λ + β0θ0e−β0t + β1θ1e−β1(t−a)1t≥a, (3.1) where λ ≥ 0, θ0 > 0, θ1 > 0, β0 > 0, β1 > 0, and a ≥ 0. For an introductory overview of probability models of this type, see e.g. Section 5.4 of Ross [20]. This non-stationary arrival rate is precisely how we replicate the jump-and-decay structure we see, which can be seen by inspecting the parameters. First, λ can be thought of as a baseline streaming rate, meaning the rate at which the song is played long into its life time once its hype has essentially ended. Then, because λ(0) = λ + βθ0, β0θ0 is the jump in streaming rate that a song gets from the initial excitement at its debut. As time progresses this jump size decays exponentially at rate β0, which mimics the gradual decrease seen in Figure 3.1. Then, β1θ1 captures the size of the jump in streams that are brought to the song due to some later, external event that occurs at time a, and this affect then decays exponentially at rate β1. In Subsection 2.3 we saw that these subsequent jumps could be caused by releases of the song's music video or of the album containing the single, but these need not be the only reasons a song's stream count could jump. In fact, the song "Bad and Boujee", shown in the second panel of Figure 3.1 is an excellent example of this, as it is known to have jump up by 243% of its previous daily stream totals following mention of the song by Donald Glover in his January 8, 2017 Golden Globes acceptance speech, per Weiner [25]. This affect was then further amplified when Culture, the album containing "Bad and Boujee", was released on January 27, 2017. We note that this model could be easily generalized to feature multiple subsequent jumps by adding additional terms to the definition in Equation 3.1. Furthermore, let us note this is an intentionally simple model. While pure jumps and exponential decay may apply to many 11 scenarios, sample paths with gradual growth or non-exponential decay are not represented by this model. Additionally, other observed dynamics such as the weekly periodicity are not addressed. While properly modeling these features presents an intriguing direction of future research, in this work we will adhere to the simple model and use both it and its fit as tools to further analyze this data. As we will see in Section 4, by also including the fit of the model in our analysis, we are able to implicitly address dynamics seen in the data that are not included in the model. We can also note that the model we have described is a continuous time stochastic process, yet this data set is recorded over discrete time intervals. This is not an issue; we can easily align the model and data as follows. Let ∆ be the length of a day as measured in the time units upon which N (t) is defined. Then, we define Ni as the number of streams on the ith day, i.e. ∆(i−1) λ(t)dt). Using this Ni = N (∆i) − N (∆(i − 1)) for i ∈ Z+. By consequence, Ni ∼ Pois((cid:82) ∆i definition, we now the resulting maximum likelihood estimation procedure in Subsection 3.2. 3.2 Fitting the Model to Data To fit the data, let us now describe the maximum likelihood estimate procedure for this stochastic process model. For a given song, we let ni for i ∈ {1, . . . , T} be the number of streams received on the song's ith day, where T ∈ Z+ is the total number of days observed. We will assume that the time of the subsequent jump a is known and that it is a multiple of ∆. Then, the parameters we want to estimate are the decay rates β0 and β1, the jump size coefficients θ0 and θ1, and the baseline stream rate λ. For simplicity, we will denote this full parameter set as Π. Then, if these parameters were known, we could express the probability of observing the song's full streaming data sequence as (cid:32)(cid:90) ∆i (cid:33)ni −(cid:82) ∆i (cid:32) T(cid:91) i=1 P (cid:12)(cid:12)(cid:12)(cid:12)(cid:12) Π (cid:33) T(cid:89) i=1 = {Ni = ni} P (Ni = ni Π) = 1 ni! ∆(i−1) λ(t)dt e ∆(i−1) λ(t)dt, where we have used the independent increments property of Poisson processes to separate the probability of the full sequence into the product of individual observation probabilities. We can likewise express the likelihood of the parameters L(Π) = L(β0, β1, θ0, θ1, λ) as a product of indi- i=1 Li(Π) where Li(Π) = Li(β0, β1, θ0, θ1, λ) = P (Ni = ni Π). Recalling the definition of λ(t) from Equation 3.1, we can see that e−β0∆(i−1) − e−β0∆i(cid:17) + θ1 (cid:16) e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17) , vidual likelihoods, i.e. L(Π) =(cid:81)T (cid:16) (cid:90) ∆i λ(t)dt = λ∆ + θ0 ∆(i−1) where (x)+ = max(x, 0) is the positive part of x. Following standard techniques we will leverage the fact that the natural logarithm is a non-decreasing function and maximize the log-likelihood instead of the likelihood. For L(Π) = log (L(Π)), we have (cid:16) (cid:16) ni log λ∆ + θ0 − log (ni!) − λ∆ − θ0 ni log λ∆ + θ0 L(Π) = = (cid:32) T(cid:88) i=1 T(cid:88) − T(cid:88) i=1 + θ1 (cid:16) e−β0∆(i−1) − e−β0∆i(cid:17) (cid:16) e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)(cid:17) e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)(cid:33) (cid:16) e−β0∆(i−1) − e−β0∆i(cid:17) − θ1 (cid:16) e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)(cid:17) e−β0∆(i−1) − e−β0∆i(cid:17) (cid:16) 1 − e−β1(∆T−a)(cid:17) (cid:16) 1 − e−β0∆T(cid:17) − θ1 (cid:16) + θ1 . (cid:16) log (ni!) − λ∆T − θ0 i=1 12 = = i=1 niθ1 Di niθ0 Di ∆ie−β0∆i − ∆(i − 1)e−β0∆(i−1)(cid:17) − θ0∆T e−β0∆T , (cid:16) (∆i − a)+e−β1(∆i−a)+ − (∆(i − 1) − a)+e−β1(∆(i−1)−a)+(cid:17) − θ1(∆T − a)e−β1(∆T−a), (cid:16) e−β0∆(i−1) − e−β0∆i(cid:17) −(cid:16) 1 − e−β0∆T(cid:17) e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17) −(cid:16) Then, the partial derivatives of the log-likelihood with respect to each of the parameters are given by ∂L ∂β0 ∂L ∂β1 ∂L ∂θ0 ∂L ∂θ1 ∂L ∂λ 1 − e−β1(∆T−a)(cid:17) T(cid:88) T(cid:88) T(cid:88) T(cid:88) T(cid:88) − ∆T, (cid:16) (cid:16) ni Di ni Di i=1 i=1 i=1 = = = , , ni∆ Di i=1 where Di = λ∆ + θ0(e−β0∆(i−1) − e−β0∆i) + θ1(e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+). Likewise, the second derivatives are given by ∂2L ∂β2 0 ∆2i2e−β0∆i − ∆2(i − 1)2e−β0∆(i−1)(cid:17) niθ0 Di (cid:16) i=1 ∆ie−β0∆i − ∆(i − 1)e−β0∆(i−1)(cid:17)2 , (cid:16)(cid:0)(∆i − a)+(cid:1)2 e−β1(∆i−a)+ −(cid:0)(∆(i − 1) − a)+(cid:1)2 e−β1(∆(i−1)−a)+(cid:17) niθ1 Di i=1 (cid:16) ∂L ∂β1 niθ2 0 D2 i = θ0∆2T 2e−β0∆T − T(cid:88) − T(cid:88) = θ1(∆T − a)2e−β1(∆T−a) − T(cid:88) − T(cid:88) = − T(cid:88) = − T(cid:88) ∂λ2 = − T(cid:88) ∂2L ∂θ2 0 ∂2L ∂θ2 1 ∂2L niθ2 1 D2 i ni D2 i ni D2 i ni∆2 D2 i i=1 i=1 i=1 i=1 , i=1 (cid:16) (∆i − a)+e−β1(∆i−a)+ − (∆(i − 1) − a)+e−β1(∆(i−1)−a)+(cid:17)2 e−β0∆(i−1) − e−β0∆i(cid:17)2 (cid:16) (cid:16) e−β1(∆(i−1)−a)+ − e−β1(∆i−a)+(cid:17)2 , , , and it can be observed that each of these is negative. Thus, deriving the maximum likelihood estimate is a convex maximization problem and can be solved using the convex optimization software of one's choosing, such as Grant and Boyd [14]. We can also note that in the special sub-case when the song's streaming decay rates are the only quantities to be estimated and are furthermore assumed to be equal, i.e. β ≡ β0 = β1, then one can leverage linear regression to produce a simple estimation technique. By taking the logarithm of the daily streaming data, the resulting linear trend is then equal to the true decay rate according to the non-stationary Poisson process model. Hence by the Gauss-Markov theorem, the slope of the resulting trend line is the best linear unbiased estimate of the decay 13 rate β, see e.g. Chapter 14 of Barreto and Howland [6]. It is worth noting that this although this special case of estimating β only may actually be quite informative, and this decay rate is arguably the most relevant parameter in practical application. Because this parameter represents the rate at which the song's streams decrease from day to day, β captures an inherent notion of long-term popularity and longevity of the song, and these are significant drivers of its success in terms of both commercial earnings and cultural relevance. For these reasons, the streaming decay rate will be central to the model-based analysis we perform in Section 4, in which we find insights for the songs contained in this data set. 4 Data Insights via the Stochastic Process Model In this section, we apply the point process model that we have defined in Section 3 to the Spotify Top 200 data set. Through fitting this model to the data, we are able to uncover relationships between different songs in the Top 200. As a way of comparing songs, our analysis focuses on the decay rate of the daily streaming count. We will use the assumption that there is a single decay rate, i.e. β = β0 = β1. In the course of our analysis we find that this simple case still delivers powerful insights. In Subsection 4.1 we inspect the fit of this parameter to the data and investigate the strengths and weaknesses of the model. Then, in Subsection 4.2 we use both the decay rate and its fit to group similar songs together through use of the k-means clustering algorithm. In reviewing these clusters we find that the algorithm identifies songs with explainable similarities, including connections that extend beyond the scope of this data set. 4.1 Evaluating the Fit of the Model To begin our inspection of the decay rate parameter fit to each song in this data, let us first look at how it relates to the rank of the song in the Top 200. In Figure 4.1, we have two scatter plots comparing the decay rate and the highest rank the song reached in the charts. On the left of Figure 4.1, we take the average of the parameters of all the songs that peaked at the given rank, and on the right of Figure 4.1 we calculate the variance of the parameters across these songs. In this chart the negative value of the decay rate parameter corresponds to true negative decay, i.e. β > 0 in e−βt. Figure 4.1 shows that the middle ranks of 30 to 130 have the largest decay rates on average. The top ten ranks and ranks 150-200 have mean rate parameter close to 0. Interestingly, we also see that variance in rate parameter is greatest also for the middle ranks and lower for the top ten ranks and the bottom 50 ranks. In the case of the bottom 50 positions, we can recall that Figure 2.4 showed us that these songs do not remain on the chart for very long. Thus, there could be a missing data issue here as we are not able to observe the decay of the songs streams over many days. Regardless, we are able to observe that the decay rates of middle ranks are appear both larger and less stable in comparison to the decay of the top ranked songs. This matches the intuition provided by Figure 2.4, as bigger hits are known to last longer on the charts. In addition to inspecting the fitted decay rates across the whole data set, it is important that we also investigate the fit on individual songs and see if the model matches the data. As we will now show, this simple model works relatively well for many songs; however, some characteristics of certain songs cannot be captured by such simplicity. In particular, in some cases the decay rate of the streams is significantly slower than an exponential function. This will be especially apparent in the log-scale graph. It is worth noting that there are also songs that do not exhibit this decay slow down behavior and appear to be well represented by exponential function. Let us begin our individual song model inspection by reviewing examples of the latter. In Figure 4.2, we plot the daily streaming data and the fit decay rates for three example songs, 14 Figure 4.1: Comparison of each song's estimated decay rate and the highest rank it achieved. "Bank Account" by 21 Savage, "XO TOUR Llif3" by Lil Uzi Vert, and "rockstar" by Post Malone feat. 21 Savage. On the top row of plots we compare the data and the model on a linear-scale y-axis, and on the bottom row we plot the same curves in log-scale. In each of the figures, we plot the exponential decay from the time of the song's final peak onwards. From reviewing these, we can see that each estimated curve closely resembles the data from the Spotify Top 200. Now in Figure 4.3 we plot the same comparisons in both linear- and log-scale for three more songs, "Look What You Made Me Do" by Taylor Swift, "Mask Off" by Future, and "Passionfruit" by Drake. As is particularly noticeable in the log-scale plots, the tails of these streaming data examples are certainly heavier than the exponential curves shown. This shows one potential pitfall of the simplicity of this model and of only considering the decay rate of the song within it. For example for "Mask Off," it seems as if this data may simply be better fit by a function with a tail heavier than e−βt. In the case of "Passionfruit," it appears that the streams may be leveling off to an underlying baseline streaming rate, which can be modeled as the constant λ in Equation 3.1. This raises the concern that it could be possible that the better fits in Figure 4.2 could simply be a result of having observed too few data points. However, both "XO TOUR Llif3" and "Bank Account" have been observed as having stable decay rates for more than 400 days, before which each of the examples in Figure 4.3. While seeing these less accurate estimates is certainly a prompt for the future development of more sophisticated stochastic process models of streaming data, this need not be a barrier to finding deeper insights from the simple exponential models. In fact, in Subsection 4.2 we find that we actually use inaccuracy as a tool. By including a measure of the model fit with the decay rate for use of a clustering algorithm, we are able to recognize interesting similarities between songs. 4.2 Finding Similar Songs through k-Means Clustering Analysis As our final analysis in this paper, we now apply the well-known k-means clustering algorithm to the Spotify Top 200 data set. We base this clustering approach on the point process model defined in Section 3. Specifically, the two quantities we use are the estimated decay rates and the accuracies. We will use the simple estimation approach based on obtain the best linear unbiased estimate via linear regression, as described at the end of Subsection 3.2, and thus we will take 15 Figure 4.2: Comparison of data and estimated model for three songs with visually good fit. Figure 4.3: Comparison of data and estimated model for three songs with visually inaccurate fit. the resulting R2 value as the measurement of the fit. Moreover, we estimate these exponential decay rates through the full data and disregard and jumps beyond time 0. Because knowing that an exponential curve doesn't nicely fit the data still tells us something about the data, we actually use the potential over-simplicity of this exponential model as a feature. In this way, this clustering procedure still yields insightful results despite the simplicity of the estimation procedure. It is also worth noting that the practical relevance of similarity among the songs' exponential decay rates can be motivated from the context of Spotify's streaming service. We believe that the similarity of streaming behaviors of two songs could be from similarity of audiences, i.e. the same types of songs are listened to by the same groups of people. Because these fans may exhibit the same listening habits across multiple songs, the recorded daily stream data may follow similar patterns. As we will see in three example clusters produced by this algorithm shown in Figures 4.4, 4.6, and 4.7, there are observable commonalities between these songs that transcend the calculated β and R2 values used to group them. 16 Figure 4.4: A cluster containing major hit songs, including 5 Billboard #1 hits. In our first example cluster, shown in Figure 4.4, we find nine songs that include five of the twelve 2018 Billboard number one singles - "God's Plan," "Nice for What," "This is America," "Psycho," and "Sicko Mode." Fascinatingly, "Sicko Mode" wouldn't top the charts until three months after this data set ended, a powerful connection identified by this clustering algorithm and this model. It is also worth recalling that the Billboard Hot 100 rankings draw on much more than just the Spotify streaming data, including radio play, physical sales, and digital sales. The remaining four songs feature two of the most popular eventual singles from Drake's Scorpion, "Mob Ties" and "Nonstop," a song from J. Cole that broke the Spotify opening day U.S. streams record, "KOD," and the Kendrick Lamar and Rihanna hit, "LOYALTY." Thus, in this cluster the algorithm has recognized songs of extreme popularity simply from the estimates of their streaming decay rates and the overall empirical fit of those estimates, but not the actual daily streaming counts themselves. By comparison to the collection of mega-hits in Figure 4.4, Figure 4.5 contains a more modest collection of songs. This cluster contains fifteen songs from five recent smash hit hip-hop albums that weren't quite the records' top hits but were still generally popular. In this way, this group can be thought of as the legacy cluster, as these songs are likely listened to because of the prestige of the albums containing them and the larger singles neighboring them. To demonstrate this point, five of these songs are from Travis Scott's Billboard topping ASTROWORLD, but that album's number one single "Sicko Mode" isn't on this list; it is instead with the hits in Figure 4.4. Since subsets of these songs were likely listened to in unison, Figure 4.5 motivates the idea of the similar decay rates capturing similar groups of listeners. This idea is re-enforced by the fact that all these songs share a genre, which again suggests a potential overlap in fans. 17 Figure 4.5: A cluster containing major hit songs, including 5 Billboard #1 hits. Figure 4.6 contains what could be affectionately deemed the Christmas music cluster. Perhaps most notable among these is Mariah Carey's classic "All I Want for Christmas Is You," which is actually also a Spotify Top 200 number one hit and can be seen as brief blip in the middle of Figure 2.5. These holidays songs all have an interesting behavior pattern. Unlike most songs, they trend upwards as the user base feels increasingly festive, followed by an immediate crash back down on December 26 once the listeners are taking down the tree. Hence, the estimated exponential parameters for this group are actually for exponential growth rather than exponential decay. The two exceptions to the yuletide theme of this group are each notable, and both would 18 Figure 4.6: A cluster containing primarily popular Christmas songs, as well as 2 notable outliers. likely experience a steady decline in the weeks following the end of this data set that would distinguish them from the holiday music. The first, "I Love It" by Kanye West and Lil Pump, is in the early stages of a viral hit in this date range, being a surprise, unorthodox single that became a top hit. The second, "Self Care," is a sadder story, as the artist Mac Miller died from an overdose in September 2018. The activity seen in this data set was the song being revisited by fans following his passing. As a demonstration of the interpretative power of clustering using the measure of fit, Fig- ure 4.7 can be seen as a collection of the late bloomers. This cluster captured several songs that steadily accumulated hype until they became major hits, like "Bad and Boujee" by Migos feat. Lil Uzi Vert, "Bank Account" by 21 Savage, "Bodak Yellow" by Cardi B, "Bounce Back" by Big Sean, and "Caroline" by Amin´e, or experienced significant jumps long after their release, such as "1-800-273-8255" by Logic feat. Alessia Cara and Khalid and "Fake Love" by Drake. As a side note, it is worth pointing out that the large jump visible in the sample path for "1-800-273-8255" came after Logic's August 27, 2017 MTV Video Music Awards show performance, motivating public performances as another type of event that can drive new listens. 19 Figure 4.7: A cluster largely comprised of songs with steady and gradual initial growth. 5 Conclusion In this work, we have analyzed the dynamics of the Spotify Top 200 rankings through data. We have performed an exploratory investigation of the ranks, durations, and behaviors of the songs contained in this list. In doing so we have seen that the average number of daily streams is power-law function of the song's rank, that the highest ranks are rarely achieved, and that the more popular songs have a greater longevity than their lower ranked counterparts. Additionally, we have seen a jump and decay structure to a song's daily stream count, in which jumps are often caused by an external event bringing the song more attention. This exploration led us to define a non-stationary point process model of a song receiving streams. This model is a time-varying Poisson process with intensity designed to mimic the jumps and decays seen in the data. After defining the model we described how to estimate its parameters using the streaming data. Once we have fit this model to data, we used it to further analyze the rankings and identify similarities between the songs seen in the Spotify Top 200. In particular, we have identified groups of related songs through a k-means clustering approach that relies only on the estimated parameters and measures of their empirical error. In examples of this cluster, we saw that this information was enough to not only identify songs that achieved high levels of streaming on Spotify, but also to recognize songs of similar success beyond just the Spotify platform, even when that was achieved after the time range of this data set. As an example application resulting from this work, artists, labels, and other strategic man- agement groups could evaluate whether songs have stream count decay rates similar to other historical hits as a way of determining which songs would be good candidates for the next single 20 off of an album. Upon this evaluation, the song could then be further promoted via an event such as a music video release, which we have seen to be capable of creating a jump in daily streams. In addition to applications of this work, there are also many opportunities for future research, both empirical and theoretical. For example, one direction we are interested in pursuing is modeling random jump sizes in the point process and determining how to estimate them on one sample path when only a handful will be observed for each song. Another data-based direction would be to study songs not on the Top 200 but rather on the long tail, thus requiring additional data. This may be particularly relevant for local and/or independent music such as what is the subject of recent research [24, 23, 4] and the associated local music recommendation service Localify2. As predicted by Anderson [5], the total of these more niche offerings likely comprise a large portion of the overall streaming consumption, and are thus important for artists, fans, and platforms alike. For a final example of future research directions, we can note that this paper gives rise to a new decision problem in operations research, in which one seeks to optimally time the release of albums or music videos in support of a single's commercial success. This idea likely also extends to remixes of the single. In this context it appears that Lil Nas X may have already perfected the technique. Billie Eilish also recently used similar strategies, releasing a remix to "Bad Guy" with Justin Bieber that helped propel her song to the number one spot. Hence we propose studying the Old Town Road Problem, deriving an optimal external event strategy, and comparing it with the observed techniques that led to the all-time longest streak atop the Billboard Hot 100. References [1] Spotify FAQ. https://artists.spotify.com/faq/stats. Accessed: 2019-09-05. [2] Spotify's worldwide daily song ranking. https://www.kaggle.com/edumucelli/ spotifys-worldwide-daily-song-ranking. Accessed: 2019-09-05. [3] Spotify first quarter 2019 earnings. https://newsroom.spotify.com/2019-04-29/ spotify-reports-first-quarter-2019-earnings/. Accessed: 2019-09-05. [4] Daniel Akimchuk, Timothy Clerico, and Douglas Turnbull. Evaluating recommender system algorithms for generating local music playlists. arXiv preprint arXiv:1907.08687, 2019. [5] Chris Anderson. The long tail. Wired, October 2004. [6] Humberto Barreto and Frank Howland. Introductory econometrics: using Monte Carlo simulation with Microsoft excel. Cambridge University Press, 2005. [7] Tom Breihan. "Old Town Road" breaks record for most weeks at #1. Stereogum, July 2019. [8] BuzzAngle Music. 2018 year-end report, January 2019. [9] Daryl J Daley and David Vere-Jones. An introduction to the theory of point processes: Volume I: Elementary Theory and Methods. Springer Science & Business Media, 2003. [10] Angelos Dassios and Hongbiao Zhao. A dynamic contagion process. Advances in applied probability, 43(3):814 -- 846, 2011. [11] Andrew Daw and Jamol Pender. The Queue-Hawkes process: Ephemeral self-excitement. arXiv preprint arXiv:1811.04282, 2019. 2See: https://www.localify.org/ 21 [12] David Easley and Jon Kleinberg. Networks, Crowds, and Markets, volume 8. Cambridge University Press Cambridge, 2010. [13] Andrew Flanagan. Industry sets Friday as global record release day. Billboard, February 2015. [14] Michael Grant and Stephen Boyd. Cvx: Matlab software for disciplined convex program- ming. [15] Aisha Hassan and Dan Kopf. The reason why your favorite pop songs are getting shorter. Quartzy, October 2018. [16] Alan G Hawkes. Spectra of some self-exciting and mutually exciting point processes. Biometrika, 58(1):83 -- 90, 1971. [17] Jillian Mapes. Against the extra long pop album. Pitchfork, December 2016. [18] Sheldon Pearce. Considering the rise of the super short rap song. Pitchfork, March 2018. [19] Marian-Andrei Rizoiu, Swapnil Mishra, Quyu Kong, Mark Carman, and Lexing Xie. SIR- Hawkes: Linking epidemic models and Hawkes processes to model diffusions in finite pop- ulations. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, pages 419 -- 428. International World Wide Web Conferences Steering Committee, 2018. [20] Sheldon M Ross. Introduction to probability models. Academic press, 2014. [21] Youngsoo Seol. Limit theorems for discrete hawkes processes. Statistics & Probability Letters, 99:223 -- 229, 2015. [22] Karl Sigman and Ward Whitt. Marked point processes in discrete time. Queueing Systems, 92(1-2):47 -- 81, 2019. [23] Douglas Turnbull and Luke Waldner. Local music event recommendation with long tail artists. arXiv preprint arXiv:1809.02277, 2018. [24] Douglas R Turnbull, Justin A Zupnick, Kristofer B Stensland, Andrew R Horwitz, Alexan- der J Wolf, Alexander E Spirgel, Stephen P Meyerhofer, and Thorsten Joachims. Using personalized radio to enhance local music discovery. In CHI'14 Extended Abstracts on Hu- man Factors in Computing Systems, pages 2023 -- 2028. ACM, 2014. [25] Natalie Weiner. Donald Glover's Golden Globes shout-out spurs 243% increase in Spotify streams for Migos' 'Bad and Boujee'. Billboard, January 2017. 22
1407.1425
4
1407
2015-01-27T11:34:49
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms
[ "cs.SI", "physics.soc-ph" ]
The problem of community detection receives great attention in recent years. Many methods have been proposed to discover communities in networks. In this paper, we propose a Gaussian stochastic blockmodel that uses Gaussian distributions to fit weight of edges in networks for non-overlapping community detection. The maximum likelihood estimation of this model has the same objective function as general label propagation with node preference. The node preference of a specific vertex turns out to be a value proportional to the intra-community eigenvector centrality (the corresponding entry in principal eigenvector of the adjacency matrix of the subgraph inside that vertex's community) under maximum likelihood estimation. Additionally, the maximum likelihood estimation of a constrained version of our model is highly related to another extension of label propagation algorithm, namely, the label propagation algorithm under constraint. Experiments show that the proposed Gaussian stochastic blockmodel performs well on various benchmark networks.
cs.SI
cs
On the relationship between Gaussian stochastic blockmodels and label propagation algorithms Junhao Zhang1‡, Tongfei Chen2§, Junfeng Hu1k 1 Key Laboratory of Computational Linguistics (Ministry of Education), Peking University, Beijing, P. R. China 2 Center for Language and Speech Processing, Johns Hopkins University, Baltimore, MD, USA E-mail: [email protected], [email protected], [email protected] Abstract. The problem of community detection receives great attention in recent years. Many methods have been proposed to discover communities in networks. In this paper, we propose a Gaussian stochastic blockmodel that uses Gaussian distributions to fit weight of edges in networks for non-overlapping community detection. The maximum likelihood estimation of this model has the same objective function as general label propagation with node preference. The node preference of a specific vertex turns out to be a value proportional to the intra-community eigenvector centrality (the corresponding entry in principal eigenvector of the adjacency matrix of the subgraph inside that vertex's community) under maximum likelihood estimation. Additionally, the maximum likelihood estimation of a constrained version of our model is highly related to another extension of label propagation algorithm, namely, the label propagation algorithm under constraint. Experiments show that the proposed Gaussian stochastic blockmodel performs well on various benchmark networks. PACS numbers: 89.75.Hc, 02.50.-r Keywords: random graphs, networks, clustering techniques, analysis of algorithms 1. Introduction In complex networks, communities [1] are considered as groups of vertices whose intra- connections are dense and inter-connections are sparse. Many real-world networks contain community structures. Detection of communities in networks has been developed a lot in recent years. Since the proposal of modularity [2] as a quality function of a community partition, many algorithms were proposed to maximize modularity. Meanwhile, label propagation algorithms [3] are much simpler and more scalable for very large networks. ‡ Co-corresponding author. § Performed while studied at Peking University. k Corresponding author. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms2 Label propagation algorithm has many extensions, such as balanced label propagation algorithm [4], label propagation under constraint [5] and label propagation with hop attenuation and node preference [6, 7]. Barber and Clark [5] showed that modularity can be viewed as a special case of label propagation under constraint. Liu and Murata [8] introduced multi-step greedy agglomeration [9] to the label propagation approach used by Barber and Clark [5], which helps to escape from poor local optimum. Leung et al. [6] first introduced hop attenuation and node preference to label propagation algorithm. Subelj and Bajec [7] used a formulation similar to PageRank [10] inside each community as the node preference and use the defensive diffusion and attenuation label propagation algorithm to extract the cores of communities. Recent years also see the popularity of stochastic blockmodels [11 -- 16] in both non- overlapping and overlapping community detection. Stochastic blockmodels assume that vertices in a network are partitioned into blocks, and edges of two vertices are sampled from a distribution parameterized by block indicators of two vertices. Stochastic blockmodels are flexible and can not only handle community detection, but also group vertices with similar behaviors, that is, vertices from one block have similar connectivity patterns with vertices from another block. For community detection problem, it implies dense intra-community connections and sparse inter-community connections. Karrer and Newman [13] proposed degree-corrected stochastic blockmodel which incorporates vertex degree into stochastic blockmodels and found that degree-corrected stochastic blockmodels perform better than standard stochastic blockmodels in networks with substantial heterogeneous degrees. Aicher et al. [17] and Aicher et al. [15] proposed the weighted stochastic blockmodel to model weighted networks. However, in community detection literature, there is little work on the nature of label propagation algorithm and label propagation with node preference. Tib´ely et al. [18] proposed that the objective function of label propagation algorithm [3] is equivalent to a ferromagnetic Potts model. Barber and Clark [5] extended the objective function to a constrained one. For label propagation with node preference [6, 7], the definition of node preference is still heuristic. In this paper, we establish a connection between stochastic blockmodels and label propagation and some of its extensions, so that new node preference parameters are derived in a mathematically rigorous framework, namely, through maximum likelihood estimation. We propose the Gaussian stochastic blockmodel with node preference (GSBM-P) for non-overlapping community detection. Our model can be viewed as a constrained version of degree corrected version of the weighted stochastic blockmodel [17]. GSBM- P uses Gaussian distributions to model the weight of edges with the same global variance shared across all communities. It is assumed that the expected weight of edges between two different communities should be zero. GSBM-P assumes that the weight of an edge inside a community is determined by the node preference of its two vertices. The maximum likelihood estimation of GSBM-P turns out to have the same objective function as general label propagation with node preference. The vector whose entries are node preferences of vertices inside a community is proportional to the On the relationship between Gaussian stochastic blockmodels and label propagation algorithms3 L2-normalized principal eigenvector of the adjacency submatrix computed inside the community. Additionally, the norm of this vector turns out to be the square root of the principal eigenvalue of this adjacency submatrix. This node preference as a local metric (i.e., a value proportional to intra-community eigenvector centrality [19]) has never been proposed before. We show that the objective function of our model is equivalent to the sum of the squares of the principal eigenvalues of the adjacency matrices of all communities. Also, we show that the objective function of label propagation under constraint [5] is a special case of the objective function of the maximum likelihood estimation of a constrained version of our model. A coordinate ascent algorithm is developed to optimize the objective function of our model. We experimented on two real-world networks and also synthetic networks, and illustrated that our method performs better than label propagation with leading eigenvector of intra-community random walk matrix as node preference [7] and the variational Bayes method for weighted stochastic blockmodel [15] in community detection. Our method is also compared with label propagation algorithm (LPA) [3] and order statistics local optimization method (OSLOM) [20]. In synthetic networks, our method achieves a performance superior or comparable to that of LPA. In unweighted synthetic networks, the performance of our method is close to that of OSLOM. The rest of the paper is organized as follows: Section 2 reviews related work; Section 3 introduces our model and the maximum likelihood estimation of our model; Section 4 presents our experiments and the last section concludes this paper. 2. Related Work 2.1. Label Propagation Algorithm Label propagation algorithm [3] seeks to discover communities by propagating vertices' labels. It iteratively updates a vertex's label by choosing the label possessed most by its neighbors. If we denote the label of vertex i as zi, then the update step of zi can be formulated as zi = arg max z Xj6=i Wijδzj z, (1) where W is the adjacency matrix, and δab = 1 iff a = b is the Kronecker delta function. When the iteration process terminates, all vertices with the same labels are considered as a community. Tib´ely et al. [18], and also Barber and Clark [5] showed that the objective function of label propagation algorithm can be formulated as QLPA = Xi,j Wijδzizj = Xz Xi,j Wijδzizδzj z . (2) This objective function is the total weight of the intra-community edges. It is shown that label propagation algorithm aims to maximize QLPA through a zero-temperature kinetics. It can be seen that this objective function encourages large communities. Thus, On the relationship between Gaussian stochastic blockmodels and label propagation algorithms4 label propagation algorithm sometimes gets a trivial solution where all vertices are in one community and the objective function reaches its maximum. 2.2. Label Propagation with Node Preference Leung et al. [6] introduced hop attenuation and node preference to label propagation algorithm. We leave out the introduction of hop attenuation regularization which prevents the formation of very large communities. They proposed a label update strategy zi = arg max z Xj6=i f m j Wijδzj z , (3) where fj is the propagation strength (a.k.a. node preference) of node j, m is a parameter which controls the influence of fj. Subelj and Bajec [7] proposed the defensive diffusion and attenuation label They define the of node i in community zi as the probability of a random propagation algorithm to accurately detect community cores. propagation strength f m i walker inside the community labeled with zi visits vertex i, i.e., pzi i = Xj∈N (i) pzj j kzi j δzizj , (4) where N(i) denotes the set of vertices which are the neighbors of vertex i, and kzi j denotes the total weight of edges which connect vertex j and vertices from community zi. Note that this definition of node preference is leading eigenvector of random walk matrix inside the community zi and can be easily extended to weighted networks. In the following part of this paper, we shall call this value as intra-community RandomWalk or local RandomWalk. Then, defensive diffusion applies preference to the core of each community, zi = arg max z Xj6=i pzj j Wijδzj z . (5) However, the label propagation with intra-community RandomWalk as node preference prefers small communities, and normally discovers much more communities than what is expected. Generally, the objective function that label propagation with node preference tries to maximize can be formulated as QLPA−P = Xz Xi,j pipjWijδzizδzj z , (6) where pi is the node preference associated with vertex i, and it can be node degree or other centrality not depending on vertex's label. We propose the Gaussian stochastic blockmodel with node preference (GSBM- P), whose maximum likelihood estimation results to the same objective function as general label propagation with node preference, where the node preference of a vertex is proportional to local eigenvector centrality computed inside its community rather than the local RandomWalk score. In other words, label propagation with intra-community On the relationship between Gaussian stochastic blockmodels and label propagation algorithms5 RandomWalk as node preference does not have this objective function since the objective function may decrease once node preference is re-estimated. An alternative measure for eigenvector centrality [19] in directed network is the authority score and hub score in HITS [21]. In the field of ontology learning, He et al. [22] used an HITS based community detection algorithm to produce a concept hierarchy. In this paper, we focus on undirected networks, and the proportion of intra- community eigenvector centrality is derived from maximum likelihood estimation. 2.3. Weighted Stochastic Blockmodel [17] and Aicher et al. Aicher et al. [15] applied stochastic blockmodel to weighted networks. For dense networks, they claimed that Gaussian distributions can be used to generate the weights of the edges between each pair of vertices. That is, Wij ∼ N (µzizj , σ2 zizj ) . (7) For sparse networks, they claimed that absent edges are different from edges with zero weight. Therefore, they modelled the edge existence and edge weights separately. Exponential family distribution such as Gaussian distribution is adopted only for weighted edges. They further showed that degree-corrected stochastic blockmodel [13] can be adopted to model the existence of edges in the following manner: log P (Wz, p, θ, µ, σ) = αXij logP(Aijpipjθzi,zj ) + (1 − α) X(i,j)∈E log N (Wijµzizj , σ2 zizj ) , (8) where P denotes the distribution for modeling edge existence, Aij is 1 when vertex i and j is connected and 0 otherwise, (i, j) ∈ E denotes a pair of linked vertices, pi is the parameter associated with vertex i and pipjθzi,zj is the expectation of Aij, and α is between 0 and 1. Note that the authors did not propose a degree-corrected version of weighted stochastic blockmodel for modeling edge weights. However, the maximum likelihood estimation of σ2 i,j will be zero if the weights of all the edges between group i and group j are the same, which creates a degeneracy in the likelihood calculation. Therefore, a Bayesian approach is adopted. Prior distributions are introduced to all parameters and variable z as well. We propose a Gaussian stochastic blockmodel that can be viewed as a constrained version of degree-corrected version of weighted stochastic blockmodel. It assumes blocks are assortative in the way that it explicitly assumes sparse inter-block connections, so that it is more suitable for community detection. 3. Model In our model, namely Gaussian stochastic blockmodel with node preference(GSBM-P), it is assumed that the graph is generated by • Assigning block indicators to each vertex; On the relationship between Gaussian stochastic blockmodels and label propagation algorithms6 • Then drawing edge weights from a Gaussian distribution for each edge (including non-existing edges with weight equal to zero) between each pair of vertices. The Gaussian distribution for the weight of the edge between each pair of vertices is defined as follows: Wij ∼ N (pipjδzizj , σ2) . (9) where pi is the node preference of vertex i, zi is the block indicator for vertex i, and σ2 is the variance of Gaussian distributions. This model assumes that the expected value of the weights of inter-community edges is 0; the expected value of the weights of the intra-community edges is a product of the node preference of the two vertices associated with the edges. Our model can be viewed as a constrained version of the degree corrected version of weighted stochastic blockmodel(WSBM) proposed by Aicher et al. [17]. We extend the WSBM [17] to be degree corrected when explaining edge weights, rather than incorporate the degree corrected SBM [13] to explaining edge existence, which is proposed in [15]. The degree correction should make our model fit better than WSBM in networks with substantial heterogeneous degrees (or sum of linked edge weights). Meanwhile, our model can be applied in assortative networks. By explicitly assuming the connection between blocks should be sparse, our model can discover community structures accurately. 3.1. The Maximum Likelihood Estimation of GSBM-P In this section, we adopt the maximum likelihood estimation to fit our model, and show its objective function is the same as general label propagation with node preference. Since our model does not introduce priors over block indicators z, we treat the block indicators as parameters, and use coordinate ascent method to estimate both the block indicators and node preference p. The adopted coordinate ascent method estimates a parameter to maximize the likelihood when fixing all other parameters. The likelihood function of our model is σ√2π where pi is node preference of vertex i. P (Wz, p, σ) = Yi,j 1 exp −(cid:16)Wij − pipjδzizj(cid:17)2 2σ2 , (10) Maximizing the likelihood function is equivalent to minimizing σ for Gaussian models. Maximum likelihood estimation of σ2 yields σ2 = Pi,j(cid:16)Wij − pipjδzi,zj(cid:17)2 n2 . where n is the total number of vertices. Minimizing σ2 is equivalent to maximizing the following objective function: QGSBM−P = 2Xi,j = 2Xz Xi,j pipjWijδzizj −Xi,j (pipjδzizj )2 pipjWijδzizδzj z −Xz Xi,j (pipjδzizδzj z)2 . (11) (12) On the relationship between Gaussian stochastic blockmodels and label propagation algorithms7 The maximum-likelihood estimated value of pi can be expressed in the following iterative updating manner: p(t+1) i j Wijδzj zi = Pj p(t) j (cid:17)2 Pj(cid:16)p(t) or in vector and matrix notation: δzj zi , (13) (14) p(t+1) z = Wzp(t) z p(t) 2 , (cid:13)(cid:13)(cid:13) z (cid:13)(cid:13)(cid:13) where pz is a vector whose entries consist of the node preferences of the vertices inside community z; Wz is the adjacency matrix of community z, that is, Wz describes how vertices inside community z connected to each other while ignores the links outside community z. Vector pz converges to the principal eigenvector of Wz. It can be shown that the norm of pz is the square root of the principal eigenvalue of Wz, denoted as √λz. Thus, these node preferences are the product of √λz and the L2-normalized local eigenvector centrality computed inside the community z. Noticing that for a specific community z, pipjWijδzizδzj z = pT z Wzpz = λ2 z , (pipjδzizδzj z)2 = λ2 z , Xi,j Xi,j the aforementioned objective function (Eq. (12)) can be expressed as follows: (15) (16) (17) QGSBM−P = Xz λ2 z . Therefore, the maximum likelihood estimation of GSBM-P is equivalent to maximizing the sum of the squares of the principal eigenvalues of the adjacency matrices of all communities. Intuitively, a community z with higher λz is better intra-connected. Thus, the maximum likelihood estimation of GSBM-P aims to find communities that are densely intra-connected. 3.1.1. Relationship with Label Propagation Algorithm with node preference Rewriting the objective function according to Eq. (15) and Eq. (16) yields QGSBM−P = Xz Xi,j pipjWijδzizδzj z , (18) which is the same as the objective function of general label propagation with node preference (i.e., Eq. (6)). We describe the adopted coordinate ascent method here in detail. This method optimizes the objective function in a similar way to label propagation algorithm. Coordinate ascent method aims to maximize an objective function f (X), where X is the collection of all parameters. Coordinate ascent method adjusts the value of one On the relationship between Gaussian stochastic blockmodels and label propagation algorithms8 parameter to maximize objective function while fixed all other parameters. Different parameters are adjusted cyclically. It is guaranteed that objective function is non- decreasing during this process and the method converges to a local optimum where objective function no longer increases. To optimize the objective function of our model, our coordinate ascent method labels of vertices) and node preference p as treats both the block indicators (i.e., parameters. To adjust node preference, we prefer to adjust the node preference pz of all vertices inside one community z, by approximating the product of √λz and the L2-normalized local eigenvector centrality computed inside the community z. To adjust label of one vertex given all other vertices' labels and p, the coordinate ascent method updates label of vertex i as follows: zi = arg max z Xj6=i pjWijδzj z , (19) which is exactly the update rule of label propagation with node preference without considering the hop attenuation regularization. Note that assigning a new label for vertex i will not increase the objective function given all other vertices' labels and p. The difference between our method and general label propagation with node preference is that the node preference in Eq. (13) is derived in a statistically-grounded way rather than heuristically defined. The update rule has a clear explanation. Each vertex has a similarity with each community, which is the weighted sum of linked edge weights connected to this community, with more representative (higher local eigenvector centrality) vertex in the community owning higher weight. Then, each vertex joins in the most similar community. In this sense, the node preferences of vertices inside two communities should be updated immediately when a vertex joins in a new community, though it is not required by the coordinate ascent method. The objective function in Eq. (18) is non-decreasing during the process of estimating labels and node preference of vertices. The coordinate ascent method is terminated when no vertex changes label or the objective function no longer increases after several iterations. The number of communities is determined as the number of different labels in the converged state. 3.2. A Constrained Version of GSBM-P In this section, we examine a constrained version of our model and show its relation to label propagation under constraint. The constrained version assumes that each vertex i inside the community z owns the same node preference √µz, and hence is not degree corrected. That is, Wij ∼ N (µziδzizj , σ2) , (20) where the expected edge weight between vertex i and j is µziδzizj or equivalently √µzi√µzj δzizj . µzi is a parameter associated with each community. This simplified model assumes that the expected value of the weights of the inter-community edges is On the relationship between Gaussian stochastic blockmodels and label propagation algorithms9 0; the expected value of the weights of the edges inside community z is a uniform value µz. The likelihood function of a graph under this constrained model is P (Wz, µ, σ) = Yi,j 1 σ√2π exp −(cid:16)Wij − µziδzizj(cid:17)2 2σ2 . (21) Maximizing the likelihood function is equivalent to minimizing σ for Gaussian models. The maximum likelihood estimation of σ2 can be expressed as σ2 = Pi,j(Wij − µziδzizj )2 n2 = −2Pi,j µziWijδzizj +Pi,j(µziδzizj )2 n2 + const . Hence, minimizing σ2 is equivalent to maximizing the following objective function: Q = 2Xi,j µziWijδzizj −Xi,j (µziδzizj )2 = 2Xz Xi,j µzWijδzizδzj z −Xz µ2 zn2 z , (22) (23) where nz denotes the number of vertices inside community z. In this constrained version of our model, if we specify µz = µ for all communities, then this simplified quality function can be viewed as the objective function of label propagation algorithm under constraint, since Q = µ 2Xz Xi,j Wijδzizδzj z − µXz = µ 2QLPA − µXz n2 z! , n2 z  (24) where Pz n2 z is the penalty term, which is maximized when all vertices are in a community, and prevents the large communities from growing. µ can be viewed as a resolution parameter, which controls the community size. In comparison with the first model of label propagation algorithm under constraint [5] (a.k.a. constant Potts model [23]), leaving µ tunable makes two objective functions equivalent. Therefore, the maximum likelihood estimation of the block indicators in the constrained version of our model while leaving µz tunable results to an objective function which is a generalization of the objective function of label propagation algorithm proposed by Barber and Clark [5] with a penalty term 1 The constrained version of our model has its disadvantages, especially that the expected weight of edges inside each community is equal. It may not fit well in real networks. By incorporating node preference, the expected weight of edges may vary according the the node preference assigned for each vertex. This renders our model more expressive and robust against modelling complex real-world networks. We show in next section that our proposed Gaussian stochastic blockmodel with node preference performs well. z. 2 Pz n2 On the relationship between Gaussian stochastic blockmodels and label propagation algorithms10 4. Experiments In this section, the coordinate ascent method for GSBM-P is tested on both real- world networks and synthetic networks. We also compare it with label propagation algorithm (LPA), label propagation algorithm with intra-community RandomWalk (LPA-P) as the node preference and OSLOM [20] on various synthetic networks, and the variational Bayes method for weight stochastic blockmodel (WSBM) on weighted synthetic networks. Two real-world networks, namely the karate club [24] and political blogs [25] are chosen as test data. For synthetic networks, unweighted benchmark networks proposed by Lancichinetti et al. [26] and weighted benchmark networks proposed by Lancichinetti and Fortunato [27] are chosen. Erdos-R´enyi random graphs [28] are chosen for checking overfitting. Gaussian distribution is not suitable to fit binary data (unweighted networks). However, in the literature, label propagation algorithms are often applied in unweighted networks. Due to the same objective function as label propagation with node preference and similar optimization method to label propagation with node preference, we also test our coordinate ascent method for GSBM-P in unweighted networks and show its good performance. Normalized mutual information (NMI, a.k.a. symmetric uncertainty, introduced by Witten and Frank [29]) is often adopted to reflect the similarity between the obtained partition and the planted partition. However, as is shown in [30], NMI sometimes has systematic bias in finite-size networks. This phenomena is also observed in our experiments on both synthetic unweighted networks with no intra-community edge in planted partitions and synthetic weighted networks with total intra-community edge weights close to zero in planted partitions. Algorithms that are designed only to find densely intra-connected communities can not find similar partitions to the planted partitions on these networks. However, for LPA-P and the coordinate ascent method for GSBM-P, the values of NMI are much larger than 0 between obtained partitions and the planted partitions on these networks (the presentation of results is omitted). Zhang [30] proposed relative normalized mutual information (rNMI) to fix this systematic bias. rNMI is defined as follows: rN M I (A, B) = N M I (A, B) − hN M I (A, C)i , (25) where A is the planted partition, B is partition obtained by algorithm, C is a random partition with the same group-size distribution with partition B, and hN M I (A, C)i is the expected N M I (A, C) over different realizations of random partition C. In our experiments, we observe that the value of rNMI is slightly smaller than zero for LPA- P and the coordinate ascent method for GSBM-P on these benchmark networks with no intra-community edge or with total intra-community edge weights close to zero in planted partitions. For synthetic networks, to reflect the similarity between the obtained partition B and the planted partition A, we will use the ratio of relative normalized mutual On the relationship between Gaussian stochastic blockmodels and label propagation algorithms11 information (rrNMI) as defined below: rrN M I (A, B) = rN M I (A, B) rN M I (A, A) , (26) such that it is up-bounded by 1 and equals 1 when partition B is identical to partition A. Note that rN M I (A, A) is not zero for all the planted partitions in our experiment, such that this equation will not suffer from divide-by-zero problem. The expectation in rNMI is estimated over 100 realizations of random partition C. OSLOM [20] may produce overlapping communities. Both NMI and rrNMI can not be directly applied. An adjusted NMI [31] is used to measure the similarity between the obtained covering by OSLOM and the planted partition. The adjusted NMI equals 1 when obtained covering and planted partition are identical. In all of the following experiments, LPA-P is terminated after 50 iterations. The coordinate ascent method for GSBM-P starts from the initialization where each vertex has its unique label. The iterative order of the vertices for the coordinate ascent method is random, and the node preferences inside two communities are updated immediately when a vertex moves from one community to another. Our method is terminated when no vertex changes label or the objective function no longer increases. We observe that the actual number of iterations of our method is generally less than 10 in tested networks. The time complexity of our method should be O((d + td1C)n) in each iteration, where d denotes the average degree, t denotes the average iterative times for computing intra- community eigenvector centrality, d1 denotes the average intra-community degree, and C denotes the average size of communities. In very large networks, the node preferences can be updated everytime all vertices are traversed for saving time. Then, the time complexity should be O(dn + td1n) in each iteration, which is scalable for very large networks. 4.1. Empirical networks Karate club data set [24] is a social network of friendships between 34 members of a karate club at a U.S. university in the 1970s. The network has 34 nodes and 78 edges with weight 1. In reality, the karate club finally splits into 2 groups. The true partition of this network is known. The coordinate ascent method for GSBM-P is run several times and the partition with the highest quality function value is chosen. Fig. 1 demonstrates the result of our method in the karate club network. The result of our method is a more fine-grained partition of the true partition. In fact, this result has a slightly higher quality function value than the true partition. Note that modularity maximization method in [32] and the non-parametric Bayesian mixed membership stochastic blockmodel [33] favor the partition with four communities. The true partition is a local optimum of our method which is frequently reached. We notice that the vertex 10 is misidentified by degree corrected stochastic blockmodel in [13] and modularity maximization method in [32]. We verify that the On the relationship between Gaussian stochastic blockmodels and label propagation algorithms12 17 7 6 5 11 12 22 18 1 13 2 20 9 8 14 3 4 31 10 29 15 23 33 34 16 19 21 27 30 32 28 24 26 25 Figure 1. Partitions of karate club network by GSBM-P. The size of each vertex is proportional to its degree and the color reflects the group membership. Figure 2. Partition of political blogs network by GSBM-P. The size of each vertex is proportional to its degree and the color reflects the group membership. objective function value (i.e., Eq. (17) or Eq. (18)) of the true partition is higher than that of the partition with misidentification of vertex 10. Thus GSBM-P performs better in karate club network. For GSBM-P, we observed that vertices with higher degree have generally higher node preference inside one community, and in karate club network, the pair of vertices with higher degree inside one community are more likely to be connected. It is the same as expected by the model, which expects the weight of edge linked to pair of vertices with higher node preference should be larger. We then show how our method performs in a larger network. political blogs data set [25] is a network of directed hyperlinks between political blogs whose largest connected component contains 1222 nodes. In this paper, we use the undirected form. Fig. 2 shows the result of our method in the larget connected component of political blog network. GSBM-P discovers 9 communities with 7 tiny communities and 2 major communities that are roughly two political tendencies. The normalized mutual information of obtained partition is 0.678. If we merge small communities to one of the two major communities, normalized mutual information increases to 0.724. The On the relationship between Gaussian stochastic blockmodels and label propagation algorithms13 performance is very close to that of the degree corrected stochastic blockmodel [13] with given cluster number. 4.2. Synthetic networks 4.2.1. Unweighted synthetic networks Since our model treats the block indicators as parameters, the maximum likelihood estimation of the block indicators of vertices may be bias especially when these vertices have very small degree. To check overfitting, the coordinate ascent method for GSBM-P is tested on Erdos-R´enyi random graphs [28] where no community structures exist. Analogous to [34], the network sizes are fixed to 1000 nodes, and the average degrees in all random graphs range from 10 to 100. Our method is run 10 times on each random graph and the results with highest objective function value are chosen. The number of discovered communities in each random graph is illustrated in Fig. 3(a). It shows that the coordinate ascent method is not overfitting when the average degree is not too small. In Erdos-R´enyi random graphs with network size equal to 1000, our method begins to identify the whole network as a community when the average degree is 40, though it fails in some generated Erdos-R´enyi random graphs with average degree equal to 40. We also show how number of communities found by our method varies with respect to the network size of Erdos-R´enyi random graphs in Fig .3(b). It can be observed that when the system size of Erdos-R´enyi random graphs increases, our method demands larger average degree to find only one community in Erdos-R´enyi random graphs. It implies that our method may overfit in networks with large communities when the intra- community degree of vertices remains the same, in that it may not recognize planted community as only one community. To deal with this situation, one can evaluate the significance of obtained communities and merge the less significant communities into other communities. This process will decrease the number of communities. One property of our method and label propagation algorithms is that the number of communities will not increase in the iterations. Thus, it is reasonable to apply our method again after the mergence procedure. Our method is also tested on resolution limit test benchmark networks [35]. Analogous to [36], the networks are composed by cliques with 4 vertices and each clique is linked to the next clique with an edge to form a ring. Both of our method and label propagation algorithm [3] are run 10 times on each network and the average number of discovered communities is shown in Fig. 4. Each time, our method discovers the correct communities. Hence, in Fig. 4, the red line covers the green dashed line which represents the number of planted communities. Thus, our method tends not to suffer from resolution limit. However, the blue error bars in Fig. 4 imply that LPA algorithm is not stable. The average number of discovered communities of LPA is less than the planted, because LPA sometimes identifies several cliques as one community. We then test the algorithms in the unweighted benchmark networks proposed by [26]. Experiments show that the coordinate ascent method for Lancichinetti et al. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms14 (a) (b) Figure 3. Overfitting checking on Erdos-R´enyi random graphs [28]. Each data point is an average over 30 graphs. In (a), we show the discovered number of communities with respect to the average degree. The number of vertices in each graph is fixed to 1000. In (b), we show the discovered number of communities with respect to the system size. Figure 4. Resolution limit test on benchmark networks [35]. The networks are composed by cliques with 4 vertices and each clique is linked to the next clique with an edge to form a ring. We show the number of discovered communities in networks composed by different number of cliques varying from 8 to 24. Each data point is an average over 10 runs. GSBM-P is superior to LPA in those networks, and achieves a similar performance to OSLOM. There are several parameters to generate the benchmark networks, including the number of vertices n, average degree, maximum degree, the degree distribution, the community size distribution, the range of community size C, and the ratio that a vertex links to vertices outside its community (i.e., topological mixing parameter µt). When the mixing parameter is smaller than 0.5, the communities in generated networks are strong communities [37] where each vertex has more connections with vertices On the relationship between Gaussian stochastic blockmodels and label propagation algorithms15 inside its community than vertices outside the community. When topological mixing parameter µt = 1 in benchmark networks, communities of planted partition have no intra-community edges. We set two kind of parameters with different range of community size according to [34] while leaving the mixing parameter µt as the independent variable. We compare GSBM-P with LPA-P and LPA. The ratio of relative normalized mutual information (Eq. (26)) between the obtained partition and planted partition is calculated. For OSLOM, adjusted NMI [31] is calculated. Fig. 5 shows how the performance of these algorithms vary according to the mixing parameter in two kind of networks. (a) (b) Figure 5. Performance with respect to the mixing parameter µt for different algorithms on two unweighted test benchmarks [26]. We use ratio of relative normalized mutual information (Eq. (26)) for LPA, LPA-P and GSBM-P. We use adjusted NMI [31] for OSLOM. Each data point is an average over 30 networks generated by the same parameters. In two subfigures, the size of networks is 1000, the average degree is 20, and the maximum degree is 50. In (a), the range of community size is C = [10, 50]. In (b), the range of community size is C = [20, 100]. From Fig. 5(a) and Fig. 5(b), it can be seen that the planted partition is an optimum of our method when the mixing parameter µt is small. When mixing parameter µt is small, coordinate ascent method for GSBM-P always converges to the optimum in every run. Our method outperforms LPA. The label propagation approach applied in LPA is very suitable for finding strong communities. However, as the mixing parameter is larger than 0.5 (i.e., weak communities), LPA fails. The performance of LPA-P is not satisfying. We can not directly compare the performance of our coordinate ascent method for GSBM-P with OSLOM since their performance are evaluated by different measures. However, values of both measures equal one when the obtained partition or covering is identical to planted partition. Fig. 5(a) shows that our coordinate ascent method recovers planted partition in a similar range of topological mixing parameters to OSLOM in networks with small communities. Fig. 5(b) shows that the performance of our On the relationship between Gaussian stochastic blockmodels and label propagation algorithms16 coordinate ascent method is close to that of OSLOM in networks with large communities. We then show the corresponding average number of communities found by different algorithms in Fig. 6. The average number of planted communities is also shown. LPA discovers one community when topological mixing parameter µt equals or is larger than 0.6 in benchmark networks with small communities, and equals or is larger than 0.5 in benchmark networks with large communities. In benchmark networks with small communities, our coordinate ascent method for GSBM-P discovers reasonable number of communities in a similar range of topological mixing parameters to OSLOM. However, in benchmark networks with large communities, our method discovers more communities when µt equals or is larger than 0.55. As discussed above, it may improve the performance of our method if mergence procedure is introduced. (a) (b) Figure 6. Number of communities found with respect to the mixing parameter µt for different algorithms on two unweighted test benchmarks [26]. Each data point is an average over 30 networks generated by the same parameters. In two subfigures, the size of networks is 1000, the average degree is 20, and the maximum degree is 50. In (a), the range of community size is C = [10, 50]. In (b), the range of community size is C = [20, 100]. We then show the running time of algorithms in Fig. 7. In Fig. 7, GSBM-P(alter) represents the alternative coordinate ascent method for GSBM-P that only updates node preferences everytime all vertices are traversed. Mixing parameter µt is set to 0.1, while parameters other than the number of vertices and community size are setting according to [34]. In Fig. 7(a), the community sizes are fixed to range from 20 to 100, and the number of vertices varies among the test networks. In Fig. 7(b), network sizes are fixed to 3000, the community size varies. The community size in x axis represents the average value, for instance, 390 in x axis represents the community sizes ranges from 370 to 410, and so forth. It shows that the running time of our method is linear to network size and community size. For very large networks with large communities, the alternative coordinate ascent method can be applied. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms17 (a) (b) Figure 7. Running time with respect to the network size and community size for different algorithms on unweighted test benchmarks [26]. Each data point is an average over 100 runs. In two subfigures, the average degree is 20 ,the maximum degree is 50 and the topological mixing parameter µt is 0.1. In (a), the range of community size is C = [20, 100]. In (b), the size of networks is 3000. 4.2.2. Weighted synthetic networks We then test the algorithms in the weighted benchmark networks proposed by Lancichinetti and Fortunato [27]. The weights of edges are non-negative in these benchmark networks. There are two more parameters in weighted benchmark networks than unweighted benchmark networks, namely β which controls the power-law relation between the sum of weights a vertex links to its neighbors and the vertex's degree, and the ratio of weights a vertex links to vertices outside its community (i.e., mixing parameter µw). We compare our method with LPA and the variational Bayes method for WSBM. We set the parameter α in WSBM (see Eq. (8)) to 0.0 and 0.5, corresponding to pure WSBM and WSBM with auxiliary degree correction respectively. Number of planted communities is given for WSBM in all networks. We set two kind of parameters with different topological mixing parameter while leaving the mixing parameter µw as the independent variable. The network sizes are fixed to 150, the average degree is 15, and the maximum degree is 30, and all other parameters are identical to that in [34]. The results are illustrated in Fig. 8. For algorithms that have an objective function, each point in Fig. 8 shows the average rrNMI over the results with highest objective function values in 10 runs on each of 30 networks. When µw is 1.0, communities in planted partition have total intra-community edge weights close to zero. Both LPA and the coordinate ascent method for GSBM-P fail to obtain partitions similar to the planted partition. WSBM can group vertices with similar connectivity pattern, and do discover some communities with total intra-community edge weights close to zero. Thus, rrNMI is much larger than 0 for WSBM when µw is 1.0. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms18 (a) (b) Figure 8. Performance with respect to the mixing parameter µw for different algorithms on two small weighted test benchmarks [27]. We use ratio of relative normalized mutual information (Eq. (26)) for WSBM, LPA and GSBM-P. We use adjusted NMI [31] for OSLOM. Each data point is an average over 30 networks generated by same parameters. In (a) and (b), the size of networks is 150, the average degree is 15, the maximum degree is 30, and the range of community size is C = [10, 20]. In (a), the topological mixing parameter µt is 0.5. In (b), the topological mixing parameter µt is 0.8. The variational Bayes algorithm for WSBM is actually not efficient. For example, it often reaches a poor local optimum. Only sometimes, it reaches a better result with higher marginal likelihood, which may not presents in 10 runs. Sometimes, the variational Bayes algorithm even is not converged in 200 iterations. From Fig. 8, WSBM fails to give a good partition even when mixing parameter µw is small, which may due to the lack of degree correction for modeling edge weights. Moreover, the time complexity of each iteration of naive variational Bayes algorithm for WSBM is O(mK 2), where m denotes the total number of edges in networks and K denotes the number of communities, which limits its application in very large networks. The coordinate ascent method for GSBM-P performs much better, and is comparable to LPA. In Fig. 8(a), when mixing parameter µw is small, it recovers the planted partition. For OSLOM, it is sensible to topological mixing parameter µt. In figure 8(b), the performance of OSLOM is unsatisfactory, and OSLOM identifies each vertex as a community when µw is larger than 0.35. In figure 8(a), OSLOM returns same communities as planted communities in some tested benchmark networks with small µw, but different communities in other tested benchmark networks with small µw. We show the performance of our method in weighted networks with 1000 vertices. We set four kind of parameters with different range of community size and different topological mixing parameter according to [34] while leaving the mixing parameter µw as the independent variable. The results are illustrated in Fig. 9. Here we omit the presentation of WSBM, because it takes too much time to run on these networks. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms19 (a) (b) (c) (d) Figure 9. Performance with respect to the mixing parameter µw for different algorithms on four weighted test benchmarks [27]. We use ratio of relative normalized mutual information (Eq. (26)) for LPA, LPA-P and GSBM-P. We use adjusted NMI [31] for OSLOM. Each data point is an average over 30 networks generated by same parameters. In four subfigures, the size of networks is 1000, the average degree is 20, and the maximum degree is 50. In (a), the range of community size is C = [10, 50] and the topological mixing parameter µt is 0.5. In (b), the range of community size is C = [20, 100] and the topological mixing parameter µt is 0.5. In (c), the range of community size is C = [10, 50] and the topological mixing parameter µt is 0.8. In (d), the range of community size is C = [20, 100] and the topological mixing parameter µt is 0.8. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms20 In all of the four groups of weighted benchmark networks, the coordinate ascent method for GSBM-P recovers the planted partition(see Fig. 9(a)) or achieves the results whose rrNMI are only slightly lower than that of LPA (see Fig. 9(b), Fig. 9(c) and Fig. 9(d)). When mixing parameter µw is slightly larger, our method outperforms LPA. In Fig. 9(c) and Fig. 9(d), LPA discovers much more communities than the planted partition even when the mixing parameter µw is small. It implies that the communities are not well connected inside themselves. The performance of our method is again comparable to LPA on those benchmark networks, while LPA-P is not satisfying. OSLOM performs really well in benchmark networks when µt = 0.5, but again fails when µt = 0.8. 5. Conclusions and Future Work In this paper, we proposed the Gaussian stochastic blockmodel with node preference (GSBM-P). The maximum likelihood estimation of GSBM-P is proved to be equivalent to maximizing the objective function below: QGSBM−P = Xz λ2 z , where λz is the principal eigenvalue of the adjacency submatrix in community z. We then proved that our coordinate ascent method optimizes our objective function in a similar way to label propagation with node preference. We demonstrated that the vector composed by node preferences of vertices inside community z is the product of √λz and the intra-community eigenvector centrality, i.e. the L2-normalized dominant eigenvector of the adjacency matrix inside the community. Experiments showed that the coordinate ascent method for Gaussian stochastic blockmodel with node preference worked well It outperforms the variational Bayes method for weighted stochastic blockmodel and label propagation with intra-community RandomWalk as node preference in the aspect of community detection. In unweighted networks, the coordinate ascent method for GSBM-P is superior to LPA, and achieves similar performance to OSLOM. In weighted networks, the performance of our method is comparable to LPA. in most cases. Subelj and Bajec [4] have proposed that the iterative order implicitly contains the propagation strength. In the future, we may explore the suitable iterative order for our coordinate ascent method. Moreover, coordinate ascent method is not the only way to optimize our objective function. We may explore different optimization algorithms in the future. We make two strong assumptions for our model, such that it is related to label propagation algorithms. However, these assumptions may be strict. The first one is that we fixed the expected edge weights between distinct communities to be zero. In the future, we may try to leave this small expected inter-community edge weight as a tunable parameter. The second one is that we treat the block indicators as parameters. Possible future work also includes placing a prior on block indicators and adopts more advanced approximation inference methods such as variational Expectation Maximization. On the relationship between Gaussian stochastic blockmodels and label propagation algorithms21 6. Acknowledgement We thank Christopher Aicher for providing the implementation of weighted stochastic blockmodel. We thank Andrea Lancichinetti, Filippo Radicchi, Jos´e Javier Ramasco and Santo Fortunato for providing the implementation of order statistics local optimization method. We thank Pan Zhang for providing the implementation of relative normalized mutual information. 7. References [1] Girvan M and Newman M E 2002 Proceedings of the National Academy of Sciences 99 7821 -- 7826 [2] Newman M E J and Girvan M 2004 Physical Review E 69 026113 [3] Raghavan U N, Albert R and Kumara S 2007 Physical Review E 76 036106 [4] Subelj L and Bajec M 2011 The European Physical Journal B-Condensed Matter and Complex Systems 81 353 -- 362 [5] Barber M J and Clark J W 2009 Physical Review E 80 026129 [6] Leung I X, Hui P, Lio P and Crowcroft J 2009 Physical Review E 79 066107 [7] Subelj L and Bajec M 2011 Physical Review E 83 036103 [8] Liu X and Murata T 2010 Physica A: Statistical Mechanics and its Applications 389 1493 -- 1500 [9] Schuetz P and Caflisch A 2008 Physical Review E 77 046112 [10] Brin S and Page L 1998 Computer networks and ISDN systems 30 107 -- 117 [11] Holland P W, Laskey K B and Leinhardt S 1983 Social networks 5 109 -- 137 [12] Hofman J M and Wiggins C H 2008 Physical Review Letters 100 258701 [13] Karrer B and Newman M E 2011 Physical Review E 83 016107 [14] Airoldi E M, Blei D M, Fienberg S E and Xing E P 2008 Journal of Machine Learning Research 9 3 [15] Aicher C, Jacobs A Z and Clauset A 2014 arXiv preprint arXiv:1404.0431 [16] Gopalan P, Wang C and Blei D 2013 Modeling overlapping communities with node popularities Advances in Neural Information Processing Systems pp 2850 -- 2858 [17] Aicher C, Jacobs A Z and Clauset A 2013 arXiv preprint arXiv:1305.5782 [18] Tib´ely G and Kert´esz J 2008 Physica A: Statistical Mechanics and its Applications 387 4982 -- 4984 [19] Bonacich P 1987 American journal of sociology 1170 -- 1182 [20] Lancichinetti A, Radicchi F, Ramasco J J and Fortunato S 2011 PloS one 6 e18961 [21] Kleinberg J M 1999 Journal of the ACM 46 604 -- 632 [22] He S, Zou X, Xiao L and Hu J 2014 Construction of diachronic ontologies from peoples daily of fifty years Language Resources and Evaluation Conference pp 3258 -- 3263 [23] Traag V A, Van Dooren P and Nesterov Y 2011 Physical Review E 84 016114 [24] Zachary W 1977 Journal of anthropological research 33 452 -- 473 [25] Adamic L A and Glance N 2005 The political blogosphere and the 2004 us election: divided they blog Proceedings of the 3rd international workshop on Link discovery (ACM) pp 36 -- 43 [26] Lancichinetti A, Fortunato S and Radicchi F 2008 Physical Review E 78 046110 [27] Lancichinetti A and Fortunato S 2009 Physical Review E 80 016118 [28] Erdos P and R´enyi A 1959 Publ. Math. Debrecen 6 290 -- 297 [29] Witten I H and Frank E 2005 Data Mining: Practical machine learning tools and techniques (Morgan Kaufmann) [30] Zhang P 2015 arXiv preprint arXiv:1501.03844 [31] Lancichinetti A, Fortunato S and Kert´esz J 2009 New Journal of Physics 11 033015 [32] Agarwal G and Kempe D 2008 The European Physical Journal B-Condensed Matter and Complex Systems 66 409 -- 418 On the relationship between Gaussian stochastic blockmodels and label propagation algorithms22 [33] Koutsourelakis P S and Eliassi-Rad T 2008 Finding mixed-memberships in social networks. AAAI Spring Symposium: Social Information Processing pp 48 -- 53 [34] Lancichinetti A and Fortunato S 2009 Physical Review E 80 056117 [35] Fortunato S and Barthelemy M 2007 Proceedings of the National Academy of Sciences 104 36 -- 41 [36] Subelj L and Bajec M 2011 arXiv preprint arXiv:1110.2711 [37] Radicchi F, Castellano C, Cecconi F, Loreto V and Parisi D 2004 Proceedings of the National Academy of Sciences 101 2658 -- 2663
1301.5809
3
1301
2013-02-18T13:56:21
Producing a Unified Graph Representation from Multiple Social Network Views
[ "cs.SI", "physics.soc-ph" ]
In many social networks, several different link relations will exist between the same set of users. Additionally, attribute or textual information will be associated with those users, such as demographic details or user-generated content. For many data analysis tasks, such as community finding and data visualisation, the provision of multiple heterogeneous types of user data makes the analysis process more complex. We propose an unsupervised method for integrating multiple data views to produce a single unified graph representation, based on the combination of the k-nearest neighbour sets for users derived from each view. These views can be either relation-based or feature-based. The proposed method is evaluated on a number of annotated multi-view Twitter datasets, where it is shown to support the discovery of the underlying community structure in the data.
cs.SI
cs
Producing a Unified Graph Representation from Multiple Social Network Views Derek Greene and P´adraig Cunningham School of Computer Science & Informatics, University College Dublin {derek.greene,padraig.cunningham}@ucd.ie Abstract. In many social networks, several different link relations will exist between the same set of users. Additionally, attribute or textual information will be associated with those users, such as demographic details or user-generated content. For many data analysis tasks, such as community finding and data visualisation, the provision of multiple heterogeneous types of user data makes the analysis process more com- plex. We propose an unsupervised method for integrating multiple data views to produce a single unified graph representation, based on the combination of the k-nearest neighbour sets for users derived from each view. These views can be either relation-based or feature-based. The pro- posed method is evaluated on a number of annotated multi-view Twitter datasets, where it is shown to support the discovery of the underlying community structure in the data. 1 Introduction Social networks are often represented using multiple views or relations that share all, or part of the same user set. In many cases, these views will consist of graphs with heterogeneous edge types, where each type has different semantics, along with different frequency or weight distributions [3]. For instance, in the case of Twitter, we can characterise users by the accounts whom they follow (or who follow them), the users whom they retweet (or who retweet them), the curated lists to which they have been assigned, and so on. In bibliographic networks, we can describe groups of researchers in terms of either their co-authorship relations or co-citation links. Additionally, users in real-world social networks often have associated attribute information, such as demographic details or user-generated textual content (e.g. the content of a user’s tweets on Twitter; a collection of abstracts for papers published by a researcher). For many social network analysis tasks, it will be preferable to work with a unified representation that summarises the information provided by all the data views, rather than working separately on the individual views. A wide variety of community finding algorithms have been proposed in the literature that assume the existence of a single relation between nodes [5]. However, increasingly there is interest in uncovering community structure from richer data sources that provide multiple relations [12]. From a visualisation perspective, it is much easier to interpret a graph with a single aggregated relation (as shown in Figs. 2-4), than it is to interpret representations that include multiple different types of relations (e.g. retweet, follows, mentions). In the task of user curation on social media platforms, it is necessary to combine information from multiple views to produce a definitive set of recommendations [9]. In Section 3, we propose a new method for integrating multiple data views to provide a sparse, unified graph representation, which retains the most informa- tive connections from the original views. The aggregation process is performed at a local level, by combining the ranked neighbour sets for each individual user, and then constructing an overall directed nearest neighbour graph from the lo- cal neighbour sets. Unlike many alternative approaches, the views can be either relation-based or feature-based, once a similarity or ranking measure is defined on those views. The views can be incomplete (i.e. not all users are present in each view), once there is a partial mapping between the views. Also, there is no requirement to manually select parameters indicating the relative importance of the different views, and no requirement for supervision in the form of la- belled training examples. In Section 4, we describe evaluations on a collection of annotated Twitter datasets, which show that the unified graphs facilitate the identification of meaningful community structure from multi-view data. In Sec- tion 5, we conclude with a discussion of extensions and further applications for our proposed method. 2 Related Work A range of techniques have been described for clustering across multiple feature- based views. Bickel & Scheffer [2] introduced multi-view versions of the tradi- tional k-Means and EM clustering algorithms, which operate by interleaving the optimisation processes for the different views. Zhou & Burges [14] proposed a spectral clustering approach for application to multiple graphs sharing the same set of nodes, based on a mixture of Markov chains defined on the different views. The relative importance of each graph is defined by a manually-specified parameter. Greene & Cunningham [8] proposed a “late integration” strategy for clustering heterogeneous data sources, based on the concept of cumulative voting in unsupervised ensembles. The strategy was applied to bibliographic data, consisting of co-citation relations and paper abstracts represented using a bag-of-words model. More recently, Liu et al. [11] proposed a joint non-negative matrix factorisation algorithm, which applies an iterative update procedure to find a consensus between the input matrices. The influence of each view on the outcome is determined by a user-specified set of regularisation parameters. In the context of network analysis, the direct integration of multiple re- lation types can prove difficult, if the relations in the different views are not comparable, or if the relations in one view are considerably more sparse than another [12]. Cai et al. [3] emphasised the importance of mining heterogeneous relations in social networks to identify hidden groups. The authors proposed a regression-based technique to find the optimal linear combination of a number of different weighted relation matrices, relying on a set of input examples that have been assigned community labels. Based on the combined relations, the authors then applied a spectral clustering algorithm to produce disjoint communities. Recently, Gollini & Murphy [6] proposed an extension of existing latent space models for jointly modelling information from multiple network link relations on a given set of nodes. To fit the model, the authors use a variational Bayes inference approach, supporting the analysis of up to thousands of nodes. While most community finding algorithms assume the existence of only one kind of relation, Tang et al. [12] focused on the problem of finding groups of related users in “multi-dimensional networks”. The authors described a range of alternative strategies, including modularity-based community finding applied to the average interaction network among a group of users, a “feature integration” strategy where structural features from different views are mapped into the same compatible space, and a strategy based on an ensemble of clusterings generated on different views. These alternatives were evaluated on synthetic data and a dataset of YouTube users represented via five network views, where the feature integration strategy was shown to be most effective. 3 Methods We now propose a method to produce a unified network representation from either feature-based or relational views on a set of social network users. Specifi- cally, we propose the application of SVD rank aggregation to a matrix encoding multiple nearest neighbour sets for each user. This form of rank aggregation has been previously used in identifying anomalous behaviour [13], and for recom- mending users in list curation [9]. The resulting aggregated per-user rankings are then combined to form a global graph covering all users. This sparse graph represents a unified summarisation of the strongest connections between users across all views. 3.1 Neighbour Set Identification The input to the aggregation process is a dataset of users {u1 , . . . , un}, along with l different views, each representing some or all of the n users. These views may be relation-based or feature-based. The only requirement is that some measure of similarity is provided for each view – either a metric or non-metric measure can be used. The only parameter required for the aggregation process is a value for the number of nearest neighbours k . This value controls the sparsity of the output graph – a lower value of k will result in a less dense graph. The first phase of the aggregation process is as follows, for each user ui : 1. For each view j = 1 to l, compute a similarity vector vij between ui and all other users present in that view, using the similarity measure provided for the view. 2. From the values in vij , produce a rank vector of all other (n− 1) users relative to ui , denoted rij . In cases where not all users are present in view j , missing (a) view 1 (b) view 2 (c) view 3 (d) aggregated Fig. 1. Example of the proposed aggregation method, involving six users and three views. Graphs (a)-(c) show the ranked neighbour sets for the user u1 for k = 3. By combining the ranks from these neighbourhoods, we produce the aggregated neighbour set {u2 , u3 , u4 } for u1 , as shown in (d). users are assigned a rank of (n(cid:48) j + 1), where n(cid:48) j is the number of users present in the view. 3. Stack all l rank vectors as columns, to form the (n − 1) × l rank matrix Ri , and normalise the columns of this matrix to unit length. T 4. Compute the SVD of R i , and extract the first left singular vector. Arrange the entries in this vector in descending order, to produce a ranking of all other (n − 1) users. Then select the k highest ranked users as the neighbour set of ui . A simple example illustrating the method is shown in Fig. 1. The procedure can be readily parallelised by processing multiple users simultaneously. In addition, the time required for the aggregation process can be reduced considerably by computing the truncated SVD of the rank matrices. While many alternative rank aggregation techniques exist that could be used in conjunction with our method (e.g. [10]), we choose SVD ranking for computational reasons. 3.2 Unified Graph Construction Once the k-nearest neighbour sets have been identified for all n users, we use this information to build a global graph representation of the dataset. A natural approach to combine the sets is to construct the corresponding asymmetric k- nearest-neighbour graph. Specifically, we construct a directed unweighted graph, where each node is a user and an edge exists from node i to j , if uj is contained in the neighbour set of ui . This process yields a sparse, unified graph encod- ing the connectivity information derived from all original views in the dataset, representing all users that were present in one or more of those views. Note that, since the neighbour relations produced using the above method are not necessarily symmetric, it can be the case that an edge exists from ui to uj , but not from uj to ui . In applications where directed graphs are not appropriate (e.g. for certain community finding algorithms), we can readily build an undirected mutual nearest neighbour graph based on shared neighbours [7]. u1u2u3u4132u1u2u4u5312u1u2u313u62u1u2u3u4u51u632 4 Evaluation We now examine the degree to which the aggregation method proposed in Sec- tion 3 preserves the most informative underlying associations between users in the original views, as determined by ground truth community assignments. 4.1 Datasets For our evaluation, we collected five new Twitter datasets, for which sets of manually-curated ground truth communities are available. footbal l : A collection of 248 English Premier League football players and clubs active on Twitter. The disjoint ground truth communities correspond to the 20 individual clubs in the league. olympics : A dataset of 464 users1 , covering athletes and organisations that were involved in the London 2012 Summer Olympics. The disjoint ground truth communities correspond to 28 different sports. politics-ie : A collection of Irish politicians and political organisations, assigned to seven disjoint ground truth groups, according to their affiliation. politics-uk : 419 Members of Parliament (MPs) in the United Kingdom. The ground truth consists of five groups, corresponding to political parties. rugby : A collection of 854 international Rugby Union players, clubs, and or- ganisations currently active on Twitter. The ground truth consists of over- lapping communities corresponding to 15 countries. In the case of players, these user accounts can potentially be assigned to both their home nation and the nation in which they play club rugby. Summary statistics for the five datasets are provided in Table 1. Pre-processed versions of these datasets are available online2 . Table 1. Summary of Twitter datasets used in our evaluations, including total number of users, tweets, user lists, and the number of associated ground truth communities. Dataset footbal l olympics politics-ie politics-uk rugby # Users # Tweets # User Lists # Communities 20 7,814 351,300 248 464 725,662 4,942 28 7 1,047 267,488 348 5 3,614 539,592 419 854 1,166,379 5,900 15 For each dataset, we constructed a heterogeneous collection of nine network- and content-based views, containing some or all of the complete set of Twitter 1 A subset of a Twitter user list originally curated by The Telegraph in 2012: https://twitter.com/Telegraph2012/london2012 2 See http://mlg.ucd.ie/networks users for that dataset. In all cases, cosine similarity is applied to the represen- tation to produce the pairwise similarities used in the aggregation process. For a more detailed explanation of the representations listed below, consult [9]. 1. tweet content: User content profiles, constructed from the concatenation of the 500 most recently-posted tweets for each user. 2. list text: List content profiles, constructed from the concatenation of both the names and the descriptions of the 500 Twitter lists to which each user has most recently been assigned. 3. follows: From the unweighted directed follower graph, construct binary user profile vectors based on the users whom they follow (i.e. out-going links). 4. followed-by: From the unweighted directed follower graph, construct binary user profile vectors based on the users that follow them (i.e. incoming links). A pair of users are deemed to be similar if they are frequently “co-followed” by the same users. 5. mentions: From the weighted directed mention graph, construct user profile vectors based on the users whom they mention. 6. mentioned-by: From the weighted directed mention graph, construct binary user profile vectors based on the users that mention them. A pair of users are deemed to be similar if they are frequently “co-mentioned” by the same users. 7. retweets: From the weighted directed retweet graph, construct user profile vectors based on the users whom they retweet. 8. retweeted-by: From the weighted directed retweet graph, construct user profile vectors based on the users that retweet them. Users are deemed to be similar if they are frequently “co-retweeted” by the same users. 9. co-listed: Based on Twitter user list memberships, construct an unweighted bipartite graph, such that an edge between a list and a user indicates that the list contains the specified user. A pair of users are deemed to be similar if they are frequently linked to the same lists. Again, we only consider the 500 lists to which each user has been assigned most recently assigned. 4.2 Evaluation Measures Ding & He [4] formalised the concept of k-nearest-neighbour consistency for clustering. That is, for any item in a cluster, its k-nearest neighbours should also be assigned to the same cluster. Motivated by this work, given a ground truth set of user communities, we evaluate the degree to which alternative views preserve the k-nearest-neighbour consistency of those communities. A representation of the data that corresponds well to the ground truth will have a high level of consistency, while a representation that does not preserve the structure of the ground truth will yield a low level of consistency. For a single user ui and view, we can compute the user consistency as the fraction of that user’s k nearest neighbours in that view that are assigned to the same ground truth community. In the case of overlapping ground truth commu- nities, we generalise by counting the fraction of neighbours that are assigned to at least one community also containing ui . For a complete dataset, we compute the micro-average consistency as the simple average of all n user consistency scores. As with traditional micro-averaged classification accuracy, this will tend to reflect performance on larger communities, where community sizes are un- balanced. Therefore, we also compute the macro-average consistency as follows: for each ground truth community, we calculate the average user consistency for users assigned to that community; an overall score for the dataset is calculated as the simple average of all community scores. Thus, in the macro measure, both small and larger ground truth communities are weighted equally. 4.3 Discussion When we apply our proposed approach to the five Twitter datasets, a visual inspection of the output (based on force-directed layouts produced using Gephi [1]) highlights the sparsity of the unified graphs. In a number of cases we see al- most entirely disconnected components, where users assigned to the same ground truth communities are densely-connected, while there is little connectivity be- tween those communities. This is particularly clear in the case of the two political datasets. For instance, in Fig. 2 we see that, for the unified graph at k = 5, there Fig. 2. Unified graph constructed from nine views of the politics-uk dataset (k = 5). Users are coloured and labelled based on a ground truth, corresponding to five different political groupings. LabourConservativeLiberal DemocratSNPOther is a clear separation between the various political groupings, with only a handful of long-range inter-community links in the graph. Given that we can see the sepa- ration clearly by visual inspection alone, any reasonable single-mode community finding algorithm should be able to identify this grouping. It is interesting to note that our approach also supports the discovery of sub-communities relative to the ground truth, which had not been identified manually. In Fig. 2, we observe that the community for the Labour Party contains a smaller sub-community of users. On inspecting these accounts, it is apparent that they correspond to Labour Party MPs based in Scotland. Fig. 3 shows that the aggregated approach clearly divides the data in the footbal l dataset according to the different Premier League clubs. The small number of weak ties between clubs almost all indicate players who have recently been transferred or loaned between clubs, leading to some conflicting information, particularly in the cases of their less recent tweet content and user list assignments. Fig. 3. Unified graph constructed from nine views of the footbal l dataset (k = 5). Groups of users are coloured and labelled based on a ground truth, corresponding to 20 English Premier League clubs. WiganReadingFulhamWest BromArsenalChelseaEvertonSouthamptonStokeLiverpoolNewcastleMan CityWest HamNorwichSwanseaSpursMan UtdAston VillaSunderland A more complex picture is visible in the case of the rugby dataset in Fig. 4. The presence of overlapping nodes generally leads to a higher level of connectivity between communities. Again we see strong evidence for sub-communities within the ground truth communities – in particular we see sub-groups corresponding to individual clubs based in England, Ireland, Scotland, and Australia. Also, we see that certain nodes lying between communities correspond to players who have recently transferred between clubs located in different countries. Overall, we observed similar patterns of clustering behaviour across all the datasets, for a wide range of k values. Fig. 4. Unified graph constructed from nine views of the rugby dataset (k = 5). Users are coloured and labelled based on a ground truth, corresponding to 15 different coun- tries. Users assigned to multiple communities are coloured in grey. IrelandEnglandNewZealandScotlandAustraliaFranceWalesItalySouthAfricaArgentina To quantitatively analyse the effectiveness of our method, we calculated micro-average and macro-average consistency scores, for neighbourhood sizes k ∈ [2, 15]. We then compared the scores afforded by the k-nearest neighbours for the individual views with those achieved by the unified graph. Fig. 5 shows the micro-average consistency scores for the nine individual views, plus the ag- (a) footbal l (b) olympics (c) politics-ie (d) politics-uk (e) rugby Fig. 5. Comparison of micro-average consistency scores for k ∈ [2, 15], calculated on nine individual views and the resulting unified graph, across five Twitter datasets. 0.000.100.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.800.850.900.951.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets gregated representation. In four of the five datasets, the unified graph provides a higher level of consistency among neighbours than any of the individual views. It is only in the case of the politics-uk dataset that the co-listed view out- performs the aggregated approach. Here it appears that there is a high number of carefully-curated user lists on Twitter corresponding to UK political party (a) footbal l (b) olympics (c) politics-ie (d) politics-uk (e) rugby Fig. 6. Comparison of macro-average consistency scores for k ∈ [2, 15], calculated on nine individual views and the resulting unified graph, across five Twitter datasets. 0.000.100.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.200.300.400.500.600.700.800.901.00 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets0.600.650.700.750.800.850.900.95 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15KAggregatedFollowed-byFollowsList textCo-listedMentioned-byMentionsRetweeted-byRetweetsTweets memberships, while the aggregation method is somewhat affected by the poor quality of information provided by tweet content. In Fig. 6, the macro-average consistency scores for experiments on the five datasets are shown. We see simi- lar trends for the datasets as in Fig. 5, with the aggregation method performing well, even in the presence of unbalanced ground truth community sizes, such as in the politics-ie and olympics datasets. Again, it is only in the case of the politics-uk dataset where an individual view achieves higher scores. One key observation that can be made from the above results is that no single individual view out-performs all others on every dataset. So while, for example, user lists are highly-informative in the case of the politics-uk dataset, user list information proves far less useful for identifying distinct political group- ings in the case of the politics-ie dataset. In general, we will typically not know a priori which individual view is most informative for a given dataset. This will prove problematic for multi-view analysis methods that require the relative im- portance of each view to be specified as an input parameter. In contrast, our proposed method does not require the manual prioritisation or weighting of the constituent views, and performed robustly across all datasets in our experiments. 5 Conclusions We have demonstrated that we can use a form of rank aggregation applied to nearest neighbour sets to construct a single unified graph from multiple hetero- geneous data views. Evaluations on a number of annotated Twitter datasets have shown that the unified graphs can preserve and highlight the underlying com- munity structure in the data. We suggest that this procedure will prove useful as a pre-processing step prior to other network analysis tasks, such as community finding, visualisation, and user recommendation. In our current model, each user in the aggregated graph has at most k out- going edges. In future work, we plan to examine the adaptive selection of k on a per-user basis, to allow for hub users with many connections, or outlying users with little connectivity in any of the data views. We also plan to expand our evaluations to include the use of unified graphs in conjunction with existing community finding algorithms. Our method also has potential applications in cross-network analysis, to support the combination of partial views from multi- ple social media platforms, such as Twitter and Facebook. Acknow ledgments. This research was supported by Science Foundation Ireland Grant 08/SRC/I1407 (Clique: Graph and Network Analysis Cluster). References 1. M. Bastian, S. Heymann, and M. Jacomy. Gephi: An open source software for exploring and manipulating networks. In Proc. 3rd International Conference on Weblogs and Social Media (ICWSM’09), pages 361–362. AAAI, 2009. 2. S. Bickel and T. Scheffer. Multi-view clustering. In Proc. 4th IEEE International Conference on Data Mining (ICDM’04), pages 19–26, 2004. 3. D. Cai, Z. Shao, X. He, X. Yan, and J. Han. Mining hidden community in hetero- geneous social networks. In Proc. 3rd International Workshop on Link Discovery, pages 58–65, 2005. 4. C. Ding and X. He. K-nearest-neighbor consistency in data clustering: Incorpo- rating local information into global optimization. In Proc. ACM Symposium on Applied Computing (SAC’04), pages 584–589, 2004. 5. S. Fortunato. Community detection in graphs. Physics Reports, 486(3-5):75–174, 2010. 6. I. Gollini and T. Brendan Murphy. Joint Modelling of Multiple Network Views. ArXiv e-prints, Jan. 2013. 7. K. Gowda and G. Krishnan. Agglomerative clustering using the concept of mutual nearest neighbourhood. Pattern Recognition, 10(2):105–112, 1978. 8. D. Greene and P. Cunningham. Multi-view clustering for mining heterogeneous social network data. In Workshop on Information Retrieval over Social Networks, 31st European Conference on Information Retrieval (ECIR’09), 2009. 9. D. Greene, G. Sheridan, B. Smyth, and P. Cunningham. Aggregating Content and Network Information to Curate Twitter User Lists. In Proc. 4th ACM RecSys Workshop on Recommender Systems & The Social Web, 2012. 10. A. Klementiev, D. Roth, and K. Small. An unsupervised learning algorithm for rank aggregation. In Proc. 18th European Conference on Machine Learning (ECML’07), pages 616–623, 2007. 11. J. Liu, C. Wang, J. Gao, and J. Han. Multi-view clustering via joint nonnegative matrix factorization. In Proc. SIAM Data Mining Conf. (SDM’13), 2013. 12. L. Tang, X. Wang, and H. Liu. Community detection via heterogeneous interaction analysis. Data Mining and Know ledge Discovery, 25(1):1–33, 2012. 13. G. Wu, D. Greene, and P. Cunningham. Merging multiple criteria to identify suspicious reviews. In Proc. 4th ACM Conference on Recommender Systems (Rec- Sys’10), pages 241–244. ACM, 2010. 14. D. Zhou and C. Burges. Spectral clustering and transductive learning with multiple views. In Proc. 24th International Conference on Machine Learning, pages 1159– 1166. ACM, 2007.